Perera 2020
Perera 2020
Abstract— In this paper, a resource allocation and data comparison and insights of the system performance results.
gathering scenario of an unmanned aerial vehicle (UAV) assisted Finally, the performance superiority of the proposed system is
wireless powered sensor network is investigated, in which the demonstrated with compare to identified baseline WSNs.
sensor nodes (SNs) are remotely powered by power beacons
(PBs) via radio-frequency wireless power transmission (RF- Index Terms— RF energy harvesting, RF wireless power
WPT). A time-block structure with two phases is proposed to transfer, UAV communication, wireless sensor networks and
accommodate operations in the proposed system. During Phase- 5G communication.
I, SNs harvest energy from PBs and periodically send its sensed
data to the selected cluster heads (CHs). In Phase-II, an UAV I. I NTRODUCTION
collects the data from CHs to be delivered to the data sink for
further processing avoiding the need for long range transmission
and multi hop communication to the data sink. Then, a closed-
form expression for outage probability of the proposed system
A DVANCES in fifth generation and beyond (5GB)
communication networks are designed to accommo-
date emerging technologies such as Internet-of-Things (IoT),
over Rayleigh and Rician fading channels is derived. Next, outage to increase new innovations across various industries. Oper-
probability minimization problem is formulated to obtain optimal ationally advanced IoT services are empowered by using
time allocation for RF-WPT energy harvesting to improve the
system performance. Due to the complexity of the problem, massive number of sensor nodes (SNs) in wireless sensor net-
Lagrangian duality method is used to develop an asymptotic works (WSNs). Multiple groups of SNs, which are positioned
optimal solution with less execution complexity avoiding complex in the field-of-interest are used to sense the environmental
brute force/ exhaustive search approach. Furthermore, a heuristic conditions of special events and hard-to-reach locations such
method is presented to further lower the computation complexity. as natural disasters, agricultural fields, smart cities, volcanic
Simulation results reveal the superiority of the proposed methods
compare to brute force/ exhaustive search approach via analysis, environments, natural gas reservoirs etc. A sensor node (SN)
is composed of multiple sensors to detect specific changes
Manuscript received March 31, 2020; revised June 23, 2020; accepted in the surrounding environment, which are later to be deliv-
July 30, 2020. This work was supported in part by the Russian Foundation for ered to data sinks for further processing. However, these
Basic Research (RFBR) under Grant 19-37-90037, in part by the framework of
the Competitiveness Enhancement Program of the National Research Tomsk SNs are significantly constrained in terms of its battery life,
Polytechnic University, Russia, under Grant VIU-ISHITR-180/2020, and in limiting the operational capabilities of the WSN and achiev-
part by the Scheme for Promotion of Academic and Research Collaboration able quality of service (QoS). Hence, a significant number
(SPARC), Ministry of Human Resource Development, India, under Grant
SPARC/2018 − 2019/P145/S L. The work of Jun Li was supported in of different energy-aware protocols have been proposed to
part by the National Key Research and Development Program under Grant minimize energy consumption in order to improve the life-
2018YFB1004800 and in part by the National Natural Science Foundation time of WSNs. Nevertheless, current energy-aware protocols
of China under Grant 61727802 and Grant 61872184. The Associate Editor
for this article was M. Guizani. (Corresponding authors: Dushantha Nalin unable to achieve uninterrupted long-term operations for the
K. Jayakody; Jun Li.) WSNs [1]. Thus, energy harvesting (EH) techniques have been
Tharindu Dilshan Ponnimbaduge Perera and Stefan Panic are with the applied to WSNs enabling SNs to powered-up or replenish its
School of Computer Science and Robotics, National Research Tomsk Poly-
technic University, 634050 Tomsk, Russia (e-mail: [email protected]; inbuilt batteries from ambient sources [2]. However, in general,
[email protected]). ambient energy sources i.e., solar, wind, are unable to power-
Dushantha Nalin K. Jayakody is with the School of Computer Science and up WSNs continuously, even after adopting effective energy
Robotics, National Research Tomsk Polytechnic University, 634050 Tomsk,
Russia, and also with the Centre for Telecommunication Research, School allocation and management schemes [3]. To overcome the
of Engineering, Sri Lanka Technological Campus, Padukka 10500, Sri Lanka aforementioned drawbacks, a new EH technique named radio
(e-mail: [email protected]). frequency wireless power transfer (RF-WPT) has emerged to
P. Muthuchidambaranathan is with the Department of Electronics and
Communication Engineering, National Institute of Technology Tiruchirappalli, power-up WSNs. RF-WPT is reliable and stable compare to
Tiruchirappalli 620015, India (e-mail: [email protected]). ambient energy sources. Thus, EH from RF-WPT is suitable
Jun Li is with the School of Electronic and Optical Engineering, Nanjing for low power energy constrained communication networks
University of Science and Technology, Nanjing 210094, China (e-mail:
[email protected]). such as WSNs, to increase the overall operational time unin-
Digital Object Identifier 10.1109/TITS.2020.3018493 terruptedly [1], [2]. RF-WPT is investigated in open literature
1524-9050 © 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: Auckland University of Technology. Downloaded on November 05,2020 at 16:17:11 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
along with recent advances in wireless communication sys- schemes i.e., static collection and direct trajectory. A novel
tems, cf. [2]. data acquisition framework in WSN using UAV is proposed
In recent decade, RF-WPT applied WSNs have been inves- in [15] to increase the efficiency of data gathering process.
tigated extensively to improve operational time of the com- The authors have introduced a priority based frame selection
munication systems [4]–[9]. The simulation for a complete scheme to reduce the number of redundant data transmission
system of RF-WPT is used to energized SNs of WSN in [4]. between SNs and the UAV. The UAV aided data collection
In addition, the authors of [4] were implemented a prototype to strategy for a SNs located in a straight line has been studied
identify the difference between simulation and the real world in [16]. Here the aviation time of the UAV can be minimized
applications. The authors of [5] implemented a RF energy by following classical water filling policy for optimal power
harvester made of compact ferrite rod antenna together with allocation.
rectenna, in principle, to power-up SNs within 120 km of If all SNs transmit the sensed data to the data sink with
150 kW transmitter. In [6], the authors aimed to optimize the aid of an UAV, energy efficiency of the entire system
the power allocation strategy in priority constraint RF-WPT can be decreased in a considerable amount causing decrease
system with a large number of SNs in cognitive IoT. The in QoS. Generally, neighbouring SNs have the similar data
authors proposed a critical path based decomposition strategy since each group of SNs collect information within a specific
with low computational complexity. A selective, tracking area [16]. In addition, collecting data from each SN in a
and power adaptive far-field RF-WPT system, which can large scale WSN using UAV can be practically infeasible
integrate into passive WSNs proposed in [7]. Furthermore, due to UAV’s limited inbuilt battery capacity. Thus, as a
the authors have shown that effective far-field RF-WPT links solution for the aforementioned problems, a cluster head (CH)
can be created with reasonable simplicity making RF-WPT is selected from each cluster of SNs in the WSN. CHs received
a competitive candidate for energy constrained problem in the data from SNs in the matching cluster and then UAV
WSNs. The authors of [8] presented RF-WPT and intelligent collects the data from the CHs in order to be conveyed to
routing modules to preserve energy consumption and life- the data sink. Thus, the selection of CH for a given cluster is
time of SNs. The authors exploited wireless power charging one of the vital problem in WSNs, which affects the overall
device to solve the multi-objective function for charging trails. system performance. In order to overcome unreasonable CH
By considering downlink RF-WPT and uplink information selections and excessive energy consumption, a modified CH
transmission, the authors of [9] established a task processing selection algorithm based on LEACH was proposed in [17].
strategy including uplink and downlink power information Furthermore, the authors managed to balance the network
dynamic time division. Furthermore, it is shown that the down energy burden and improved energy efficiency by leveraging
going energy transmission can effectively improve the average CH competitive mechanism in the proposed algorithm. In [18],
received power maximizing the throughput. firefly with cyclic randomization is proposed for CH selection
In most of the WSN applications, SNs are required to to improve communication network performance. In [19],
send collected sensor observations directly or through multiple the authors have proposed CH selection scheme that rotates
hops to data sinks for further processing. Thus, there is a the CH position among the SNs with higher energy levels as
requirement for an innovative new design of data collection compared to other.
strategy to enhance the scalability and the performance of the However, [4-16] have not focused on the combination of
WSN. Recently, unmanned aerial vehicle (UAV) is identified RF-WPT, UAV aided data collection strategy and the perfor-
as an effective application to collect data from SNs located in mance metrics at the data sinks in a WSN while considering
hard-to-reach environments, when there are no feasible con- possibility of occupying different types of fading channels
nections towards data sinks [10]. As Compared to conventional within the communication network, which can resemble a real
WSNs that depend on static data collecting nodes or multi- world practical scenario in IoT applications. RF-WPT is a
hop data relaying, the UAV can directly communicate with potential and effective candidate to reduce carbon footprint in
the SN exploiting favourable LoS dominant air-to-ground IoT applications [20]. Following are the identified advantages
channels. Furthermore, UAVs are help to increase coverage of RF-WPT for future IoT applications, i.e. 1). RF-WPT acts
area and sum-throughput of the WSNs while reducing the as a bridge between green energy sources and communication
overall energy consumption of the WSNs [11], [12]. devices, 2). The energy harvested via RF-WPT at a receiver
Various applications of UAV-aided WSNs have been inves- is foreseeable, 3). The amount of harvested energy depends
tigated in the literature [13]–[18]. A UAV-aided data collec- upon to transmit power, propagation loss, and wavelength.
tion scheme for wireless powered WSN over Rician fading In addition, the rapid advances in intelligent transportation
channels is developed in [13]. The authors analyzed the systems (ITS) have led to a rapid expansion in condition
outage probability of the proposed system under the assump- monitoring of communication systems, infrastructures, vehi-
tion of Rician fading channels and demonstrated that for cles, and machinery using SNs [21]. Thus, in this work,
the given information rate, outage probability threshold and an energy efficient UAV-aided data collection strategy for wire-
UAV location, the achievable service range can be uniquely less powered WSN is proposed and the system performance
determined. In [14], the authors have jointly optimized the is investigated in terms of outage probability and achievable
SNs’ wake up schedule and UAV’s trajectory to minimize throughput at the data sink. In particular, this work aims at
the energy consumption of each SN. This proposed scheme introducing a framework to realize the integration of WPT,
achieved significant energy savings compared to its benchmark UAV into WSNs to improve overall energy efficiency of
Authorized licensed use limited to: Auckland University of Technology. Downloaded on November 05,2020 at 16:17:11 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
PERERA et al.: WPT-ENABLED UAV-ASSISTED CONDITION MONITORING SCHEME FOR WIRELESS SENSOR NETWORKS 3
Authorized licensed use limited to: Auckland University of Technology. Downloaded on November 05,2020 at 16:17:11 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
Fig. 2. Time allocation diagram of the proposed WSN, where total operational time is divide into two phases. Time allocation for energy harvesting process
for SNs and CHs denote by τ and β.
locality with the CHs along with the trajectory. Furthermore, h mn denotes the channel coefficient between SN n and the
CHs’ locations and energy level are assumed to be known at CH of cluster m, sn denotes the normalized modulated signal
the UAV. The details of such approach can be found in [23]. transmitted from SN n with the value E[|sn |2 ] = 1 and
n mn represents the AWGN noise between the SN n and the
A. Phase-I respective CH. Thus, by considering (1) and (2), the effective
Let P j denotes the transmission power of the j t h PB during signal-to-noise ratio (SNR) at the CH in cluster m can be given
the time T ατ , where j ∈ {1, .., M}. Assuming that the as
transmitted RF-WPT signals by PBs are mutually independent J −1 P d ω |h |2 |h |2 τ
j nj nj mn
as in [22], the total harvested energy at the n t h SN can be γm = . (4)
(1 − τ )σmn
2
expressed as n=1
M
M
En = En j = P j dnωj ηn |h n j |2 T ατ, (1) B. Phase-II
j =1 j =1
At the beginning of the Phase-II, CHs possess the aggre-
where dn j denotes the distance between n t h SN and j t h PB, gated data received from the SNs during the Phase-I. During
ω represents the path-loss exponent and 0 < ηn < 1 is the time slot Fβ, CH in m t h cluster harvests energy from the
the energy conversion efficiency at the n t h SN. After SNs UAV’s RF-WPT signal. Thus, the amount of energy harvested
energized its rechargeable batteries, SNs sense data from the by the CH can be expressed as
surrounding environment. The transmit power of the each
Pu ηn |gmu |2 ρu Fβ, if E mu < E max
SN during the Phase-I can be given by E mu = (5)
0, otherwise
M P d ω η |h |2 τ
En j nj n nj
where Pu denotes the RF-WPT transmission power of the
Pn = = . (2)
T α(1 − τ ) (1 − τ ) UAV, F = T (1 − α)/M, gmu represents the complex fading
j =1
coefficient between the UAV and CH, ρu = κdmu ω denotes
Therefore, the received signals by the CH at the end of
the pathloss between UAV and CH, where κ is the constant
Phase-I can be expressed as
coefficient of the pathloss and dmu is the LoS distance between
J −1
UAV and the CH. It is also noteworthy that the dmu = Hmin
ym = Pn |h mn |sn + n mn , (3) during the time when UAV is hovering on top of the CH. Also
n=1 it is assumed that the Hmin is the minimum altitude required
where m ∈ {1, . . . , M} is the index of the clusters in the for maneuvering without any terrain blockage and it complies
WSN, J = N/M denotes the number of SNs per each cluster, with the municipal rules and regulations of the area. Thus,
Authorized licensed use limited to: Auckland University of Technology. Downloaded on November 05,2020 at 16:17:11 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
PERERA et al.: WPT-ENABLED UAV-ASSISTED CONDITION MONITORING SCHEME FOR WIRELESS SENSOR NETWORKS 5
the total energy available in CH to use for data transmission cluster m, where m = {1, . . . , M} can be calculated as
can be calculated by adding (3) and (4).2 The received signal ∞ ∞
m
at the UAV from the CH of cluster m can be written as Pout = FX 2
0
0 √ √
yum = Pnm |gum |ρu (ym ) + n um , (6) γ2 a3 X 1 + γ2 X 1 ρu σu2 + γ2 σu2
×
X 1 X 3 (a1 − a2 γ2 )
where Pnm denotes the transmission power of the CH in
× f X 1 (X 1 ) f X 3 (X 3 )d X 1 d X 3 , (11)
cluster m, gum represents the complex fading coefficient
between CH in m and the UAV and n um denotes the AWGN where cumulative distribution function (CDF) FX 2 (X 2 ) is fol-
noise between CH and the UAV. Then, the end-to-end SNR lows Rayleigh distribution. Thus, probability density function
can be written as (PDF) of Rayleigh distributed SNR at the CH can be expressed
J −1 as
Pm |gum |2 ρu2 m=1 Pn |h mn |2
γum = . (7) X2
Pm |gum | ρu σmn + σum
2 2 2 2
FX 2 (X 2 ) = 1 − exp − , (12)
mn
By substituting (2), (4) and (5) into (7) SNR at the UAV
at the end of data collecting from CH in cluster m can be where mn = E(X 2 ) denotes the average channel SNR
arrange as in (8) given in bottom of the page, where a1 = between SNs and the CH. Similarly, PDF function f X 3 (X 3 ) is
P j dnωj ατ Mηn2 +ρu2 Pu ρu (1−α)β ηn P j dnωj ατρu Nakagami-m distributed SNR at the SN and can be expressed
(1−α)(1−τ )(1−β) , a2 = a1κ 2, a3 = (1−α)(1−β) . as
J −1 M
j =1 a1 |gu,m | |h n, j | |h m,n |
4 2 2
n=1
γum = J −1 M M
(8)
j =1 |gu,m | |h n, j | |h m,n | a2 + j =1 |gu,m | |h m,n | a3 + |gu,m |2 |ρu σu2 + σu2
4 2 2 2 2
n=1
∞
∞ ( p+q) M √
∞ γ
√ M
(1 + K i )( p+q+2) K exp(−2K i )M 2 X 1 + γ2 X 1 ρu σu2 + γ2 σu2 2
2 a3
i
m
Pout =1−4
p+q+2 M
M
X 1 (a1 − a2 γ2 )
n, j hi ( p + 1) (q + 1) p!q!
p=0 q=0 2 0
um
⎛ ⎞
√ √
p+q
⎝ γ 2 a 3 X 1 + γ 2 X 1 ρu σu
2 + γ σ2
2 u ⎠ (1 + K 1 )
× X1 K M 2
2
M K ( p−q) 2 X1 d X1 (15)
X 1 (a1 − a2 γ2 ) um um
Authorized licensed use limited to: Auckland University of Technology. Downloaded on November 05,2020 at 16:17:11 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
d( f 1 (X 1 , X 3 ))
= 0,
d X1
d( f 1 (X 1 , X 3 ))
= 0, (17)
d X3
∞ p−1
p+1 p
m (1 + K m ) 2 K m exp(−K m ) a3m γ2 2 (1 + K m ))a3m
Pout =1−2 × K ( p−1) 2 (18)
um ( p + 1) p! (a1m − a2m γ2 ) n,m (a1m − a2m γ2 ) u,m mn
p=0
Authorized licensed use limited to: Auckland University of Technology. Downloaded on November 05,2020 at 16:17:11 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
PERERA et al.: WPT-ENABLED UAV-ASSISTED CONDITION MONITORING SCHEME FOR WIRELESS SENSOR NETWORKS 7
The constraint (26) enforces that a SN cannot be selected This optimization problem is a non linear mixed integer
as a CH if it is not in cluster m. The constraints (27) and (28) programming problem involving finding optimal clustering,
assure that there is only one CH per each cluster and a SN CH selections with joint computation of time ratios α, τ, βm
cannot be selected as CH if the harvested energy is less than and optimal energy allocations. Due to the complexity of the
the provided threshold value, respectively. The symbol Tnm formulated problem, an asymptotic solution with less com-
indicates the UAV’s trajectory and constraint (29) enforces plexity as compared to highly complex Brute-force/exhaustive
that the CH n is selected for UAVs trajectory. Following search method is presented in the following section.
trajectory constraints ensure that the UAV starts from the
selected starting point, fly over all CHs to collect data and V. A SYMPTOTIC O PTIMAL S OLUTION
finally arrive at the destination location as in [24], [25]. The discrete nature of the binary variables involved in
clustering, CH selection and trajectory of the UAV, causes dif-
Yz,q = 1, (30)
ficulties in solving the formulated problem in (35), especially
z∈Bm (zq)∈V
when the amount of harvested energy and transmission power
Y Sz = 1, (31) of the SNs and the UAV are considered. Therefore, a method
z∈V that offers asymptotically optimal values for variables with
Yq D = 1, (32) minimum time complexity is required for the proposed system.
q∈V By using the Lagrangian duality method adhering to the
⎧ ⎫ requirements of the proposed system, the formulated (P1)
⎨1, z = S ⎬
Yzq − Yqz = −1, z = D , (33) in (35) can be solved as follows. First, a set D is defined
⎩ ⎭ with all possible clustering c1 = Cm,n , selected CHs c2 =
(z,q)∈V (q,z)∈V 0
Cnm , UAV’s trajectory information y = Yz,q and time ratio
Rz − Rq + Yzq M <= M − 1. (34)
β = βm . The set D satisfies the all constraints (C6), (C7) and
The constraints (30), (31), (32) and (33) enforce UAV to fly (C8). Thus, the corresponding Lagrangian dual function of the
from selected starting point to selected destination flying over problem (P1) is given by
only one CH of each cluster. Finally, constraint (34) asserts
g() min L( p, c1 , c2 , y, β, α, τ ; ), (36)
that the UAV will not get into a flying loop during the data p ∈ P(c1 , c2 , y, β)
collection. Then, the corresponding optimization problem can (c1 , c2 , y, β) ∈ D
be mathematically expressed as
where p denotes the set of power allocation for given set P
M
of clusters, CHs, UAV trajectory and time ratio βm . The
m
(P1) : min Pout
{m∈M,E m ,Pu α,τ,β} corresponding Lagrangian expression of (36) can be expressed
m=1
γ2 T (1 − α)(1 − β) as
subject to: (C1) : E nm ≥ ,
M
M
M Hmin m
L( p, c1 , c2 , y, β, α, τ ; ) = Pout + λu (E u − Em )
M
m=1 m=1
(C2) : Eu ≥ Em ,
m=1
J M
+ λmn (E nm − E n j ),
γ1 T ατ
(C3) : En ≥ , n=1 j =1
max[D]−ω
(37)
(C4) : 0 < α < 1,
(C5) : 0 < τ < 1, where = (λu , . . . , λn,m ) ≥ 0 representing the vector of dual
variables adhering to the energy constraints of the proposed
(C6) : 0 ≤ βm < 1, ∀m ∈ B,
WSN. Therefore, the dual problem can be formulated as
(C7) : (22) − (29),
(P2) : max g()
(C8) : (30) − (34), (35)
subject to: ≥ 0. (38)
where m = {1, . . . , M}, E nm denotes the amount of energy
harvested by the CH, E u represents the energy allocated for Dual function g() is a concave function by definition
UAV’s RF-WPT link to power-up CHs and E n denotes the since it has a point wise minimum of affine functions.
amount of energy harvested by SNs from RF-WPT signal (L( p, c1 , c2 , y, β, α, τ ; ) is affine, i.e. linear, in ()) [27].
received from PBs. The objective of (35) is to minimize the Therefore, gradient or subgradient based methods can be used
outage probability at the UAV by identifying optimal time to solve the (P2) with guaranteed convergence. Then the
ratios. Constraint (C1) make sure that each CH has harvested subgradient of (36) can be written as
sufficient energy to maintain the expected QoS between CH
M
T (1 − α)(1 − β)
and the UAV. Constraint (C2) represents the required amount λu = E u − Pm∗ () , (39)
of energy by the UAV for RF-WPT. The constraint (C3) M
m=1
ensures that the PBs’ RF-WPT transmission power is ade- M
quate enough for SNs to harvest energy to maintain expected λmn = E nm − P j∗ ()dnωj |h n, j |2 T ατ, (40)
QoS during information transmission between SNs and CHs. j =1
Authorized licensed use limited to: Auckland University of Technology. Downloaded on November 05,2020 at 16:17:11 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
where = (λu , λm,1 , . . . λm,J ). This updated method of the dual function can be expressed as
consists of polynomial computational complexity similar to the
M
J
number of dual primal variables ( J + 1), where J = N/M. g() min Cm,n Cnm L3(m,n) + λu E u
Determining the optimal optimization variables in (36) realize p ∈ P(c1 , c2 , y, β) m=1 n=1
the computation of the dual function. Thus, the dual function (c1 , c2 , y, β) ∈ D
in (36) can be re-written as
M
+ λmn E nm . (47)
M
J
m=1
g() min L2(m,n) + λu E u
p ∈ P(c1 , c2 , y, β) m=1 n=1 Then, it is easily perceived that the optimal clustering and
(c1 , c2 , y, β) ∈ D CH selection should be the one having minimum value for
as L3(m,n) as
M
+ λmn E nm , (41) ∗ 1, (m, n) = arg min L3(m,n)
m=1 Cmn = , (48)
0, otherwise
where 1, n = arg min L3(m,n)
Cnm = , (49)
0, otherwise
M
T (1 − α)(1 − β) 1, Cnm = arg min L3(m,n)
L2(n,m) m
Pout − λu Pm () Tnm = . (50)
M 0, otherwise
m=1
J
M Hence, the function L3(m,n) works as the optimal criteria for
ω 2
− λmn P j ()dn, j |h n, j | T ατ. (42) clustering and CH selection under the threshold SNR values
m=1 j =1 γ1 , γ2 provided in the proposed system to maintained the
expected QoS. Finally, by considering the values obtained
The optimal transmission power allocation of PB and CH in (48) and (49) substitute in L3(m,n) and adhering to the
over a given cluster of SNs can be ascertained by finding constraints (C1)(C3)(C6) in (35), the optimal value for βm
solutions for following formulated problem can be expressed as
∞
p−1
(P3) : min L2(m,n) γ 2
γ1 K m2 (1 − α ∗ )τ ∗ α ∗
βm∗ = 2
subject to: Pm > 0 & P j > 0. (43) M Hmin ηn (1 − γ1 κm2 )
p=0
The function L2(m,n) is a concave function of P j , Pm , where γ1 γ2 (1 + p)κm2 exp(−2K m )
× K (v) 2 . (51)
P j denotes the transmission power of the PB and Pm denotes ηn um ( p + 1) p!
the transmission power of the CH in the cluster m. Hence, Finally, substituting(45) and (51) into (44) and consider-
the optimal power allocations can be obtained by applying ing (39),(40) and constraints (C1)(C2)(C3)(C4)(C5) in (35),
Karush-Kuhn-Tucker (KKT) conditions as in [27], [28] the optimal values for τ and α can be expressed as
−ω 2 ∗
∗ ∗ Pu |gmu |2 ηn ρu γ2 βm 1 γ1 dn j σn j α T α ∗ + |h n j |2
Pm = P j 1 + , (44) τ∗ = + , (52)
((1 − βm )σu2 + βm κ 2 ) γ1 P j |h n j | 2 Mmax(D)−ω
and and
M
p−1
2 d −ω ∗ [γ1 γ2 ]( 2 )
+ T |h n j |2 |h mn |2
σn2j σmn α =
P j∗ =
nj
max[D]ω Mj =1 P j ηn |h n j | M
2
x(1 − τ )|h n j |2 |h mn |2 p=0
(1 + K m )
(1 − τ )γ1 α|h n j |2 |h mn |2
− λu T ατ |h n j |2 × K (v) × . (53)
× 2 Md −ω
, (45) mn
mn
λu x + (1 − τ )ασnm mn
By analyzing (53), it can be observed that γ1 and γ2
where play a significant role in deciding α ∗ . Also it is noteworthy
that the α ∗ is independent from the time ratios τ ∗ and β ∗ .
λnm (1 − τ )α|h mn |2 σn2j However, τ ∗ in (52) depends on α ∗ , while β ∗ in (51) depends
x= . (46) on both α ∗ and τ ∗ . This phenomena can be easily under-
λu |h n j |2 σmn
2
stand by analyzing (43) and (44) with respect to the Fig. 2.
It is also noteworthy that the dual variables λu and λm,n The computational complexity of the proposed asymptotic
affects the pricing scheme of the WSN in terms of economic method is O(N · M 5 · J 2 ) considering the traveling salesman
perspective of the energy usage at the UAV and the PBs for problem (TSP) for UAV trajectory. It is noteworthy that
RF-WPT technique. Next, substituting the optimal transmis- the the proposed asymptotic method is having a less time
sion power in (44) and (45) in (42), the transmission power complexity compared to the traditional Brute-force search
variables can be eliminated from (42) and is denoted by L3(m,n) . method of O(N 3 · (N − J )! · J · M 6 ) N! which is a NP-Hard
Then, by applying the changes into (41), an alternative version problem [29].
Authorized licensed use limited to: Auckland University of Technology. Downloaded on November 05,2020 at 16:17:11 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
PERERA et al.: WPT-ENABLED UAV-ASSISTED CONDITION MONITORING SCHEME FOR WIRELESS SENSOR NETWORKS 9
Authorized licensed use limited to: Auckland University of Technology. Downloaded on November 05,2020 at 16:17:11 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
Authorized licensed use limited to: Auckland University of Technology. Downloaded on November 05,2020 at 16:17:11 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
PERERA et al.: WPT-ENABLED UAV-ASSISTED CONDITION MONITORING SCHEME FOR WIRELESS SENSOR NETWORKS 11
TABLE III
O UTAGE P ROBABILITY OF THE P ROPOSED S YSTEM W ITH R ESPECT TO T IME R ATIO α, τ, β
Authorized licensed use limited to: Auckland University of Technology. Downloaded on November 05,2020 at 16:17:11 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
Fig. 5. Outage probability for different number of SNs versus number of Fig. 6. Outage probability for different transmission powers of PBs versus
clusters in proposed WSN. The both asymptotic and simulation based optimal number SNs in WSN.
values for time ratios (α, β, τ ) are used in the simulation.
Authorized licensed use limited to: Auckland University of Technology. Downloaded on November 05,2020 at 16:17:11 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
PERERA et al.: WPT-ENABLED UAV-ASSISTED CONDITION MONITORING SCHEME FOR WIRELESS SENSOR NETWORKS 13
Fig. 8. (a) Sample input network topology for low complexity heuristics method, where N = 100 and M ∗ = 5. (b) Output network topology of low
complexity heuristics method when S and D of the UAV are located in west and east side of the network, respectively. (c) Output network topology of low
complexity heuristics method when S and D of the UAV are located in north and south side of the network, respectively.
Fig. 9. Sum throughput achieved by the proposed system with respect to difference transmission power of the PB for comparison of the algorithms.
(a) WSN with N = 20 due to the high complexity of Brute-force method, which is unable to realize for higher number of SNs. (b) WSN with N = 100
using the general parameters as in TABLE II.
approximately close performance as Brute-force search with a fare comparison, i.e. (1). UAV-aided WSN without WPT,
higher transmission power of PBs. However, in lower transmis- (2) WSN without UAV and RF-WPT, in which CHs are
sion powers of PBs primal solution of the Brute-force method directly communicating with the data sink. As it can
shows significant superiority having a duality gap between clearly seen from the Fig. 10, the both proposed asymp-
primal and proposed asymptotic method. On the other hand, totic and heuristic methods show superiority in achievable
the proposed heuristic method shows inferior performance sum-throughput at data sink compared to baseline WSNs.
compared to the proposed asymptotic method. Since Fig. 9a The proposed asymptotic method shows 41.44% performance
alone is not enough to claim the performance difference gain as compared to traditional WSN without UAV and RF-
between proposed asymptotic and heuristic methods, sum WPT, while the proposed heuristic method shows 39.63%
throughput versus transmission power of PBs in WSN with performance gain in terms of achievable sum-throughput.
100 SNs is given in Fig. 9b. The proposed asymptotic methods In addition, the proposed asymptotic and heuristic method
still show the superior performance compared to the proposed shows 8.27% and 6.89% performance gain in terms of sum-
heuristic method. However, increase in transmission power throughput at data sink, respectively with comparison to UAV-
of PB reduces the performance gap between the proposed assisted WSN without RF-WPT. The relative sum-throughput
asymptotic and heuristic methods. performance gain of the proposed asymptotic and heuristic
Finally, the sum-throughput performance of the proposed methods compared to baseline WSNs is given in Table IV.
asymptotic and heuristic methods with respect to baseline Jointly considering all the simulation results provided
WSNs are illustrated in Fig. 10. Two baseline systems are in this section, it is worth claiming that the proposed
used with similar parameters as mentioned in Table II to make RF-WPT enabled UAV-assisted WSN is showing significant
Authorized licensed use limited to: Auckland University of Technology. Downloaded on November 05,2020 at 16:17:11 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
R EFERENCES
Authorized licensed use limited to: Auckland University of Technology. Downloaded on November 05,2020 at 16:17:11 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
PERERA et al.: WPT-ENABLED UAV-ASSISTED CONDITION MONITORING SCHEME FOR WIRELESS SENSOR NETWORKS 15
[19] T. M. Behera, S. K. Mohapatra, U. C. Samal, M. S. Khan, Dushantha Nalin K. Jayakody (Senior Member,
M. Daneshmand, and A. H. Gandomi, “Residual energy-based cluster- IEEE) received the Ph.D. degree in electronics,
head selection in WSNs for IoT application,” IEEE Internet Things J., electrical, and communications engineering from
vol. 6, no. 3, pp. 5132–5139, Jun. 2019. University College Dublin, Ireland, in 2013. From
[20] H.-V. Tran and G. Kaddoum, “RF wireless power transfer: Regreening 2014 to 2016, he was a Postdoctoral Research Fel-
future networks,” IEEE Potentials, vol. 37, no. 2, pp. 35–41, Mar. 2018. low with the Institute of Computer science, Univer-
[21] V. J. Hodge, S. O’Keefe, M. Weeks, and A. Moulds, “Wireless sensor sity of Tartu, Estonia, and the Department of Infor-
networks for condition monitoring in the railway industry: A sur- matics, University of Bergen, Norway. Since 2016,
vey,” IEEE Trans. Intell. Transp. Syst., vol. 16, no. 3, pp. 1088–1106, he has been a Professor with the School of Computer
Jun. 2015. Science and Robotics, National Research Tomsk
[22] N. P. Le, “Throughput analysis of power-beacon-assisted energy harvest- Polytechnic University (TPU), Russia. In addition,
ing wireless systems over non-identical Nakagami-m fading channels,” since 2019, he also serves as the Dean of the School of Postgraduate and
IEEE Commun. Lett., vol. 22, no. 4, pp. 840–843, Apr. 2018. Research, Sri Lanka Technological Campus (SLTC), Padukka, Sri Lanka,
[23] D. Ebrahimi and C. Assi, “On the interaction between scheduling and and the Founding Director of the Centre of Telecommunication Research,
compressive data gathering in wireless sensor networks,” IEEE Trans. SLTC. He has received the Best Paper Award from the IEEE International
Wireless Commun., vol. 15, no. 4, pp. 2845–2858, Apr. 2016. Conference on Communication, Management and Information Technology
[24] C. You and R. Zhang, “3D trajectory optimization in Rician fading for (ICCMIT) in 2017 and International Conference on Emerging Technologies
UAV-enabled data harvesting,” IEEE Trans. Wireless Commun., vol. 18, of Information and Communications, Bhutan, in March 2019. In July 2019,
no. 6, pp. 3192–3207, Jun. 2019. he received the Education Leadership Award from the World Academic
[25] D. N. K. Jayakody, T. D. P. Perera, A. Ghrayeb, and M. O. Hasna, “Self- Congress in 2019. In 2017 and 2018, he received the Outstanding Faculty
energized UAV-assisted scheme for cooperative wireless relay networks,” Award by National Research Tomsk Polytechnic University, Russia. He also
IEEE Trans. Veh. Technol., vol. 69, no. 1, pp. 578–592, Jan. 2020. received Distinguished Researcher in Wireless Communications, Chennai,
[26] S. Panic, M. Stefanovic, J. Anastasov, and P. Spalevic, Fading and India, in 2019. He has published over 140 international peer reviewed journals
Interference Mitigation in Wireless Communications. Boca Raton, FL, and conference papers and books. His research interests include PHY and NET
USA: CRC, 2013. layer prospective of 5G communications technologies such as NOMA for 5G
[27] D. Knowles, “Lagrangian duality for dummies,” Stanford.edu, Stanford, etc., cooperative wireless communications, device to device communications,
CA, USA, Tech. Rep., Nov. 2010. [Online]. Available: https://www- LDPC codes, and Unmanned Ariel Vehicle. He has organized or co-organized
cs.stanford.edu/~davidknowles/lagrangian_duality.pdf more than 20 workshops and special sessions of various IEEE conferences.
[28] S. Boyd, S. P. Boyd, and L. Vandenberghe, Convex Optimization. He also served as the Chair, Session Chair or Technical Program Committee
Cambridge, U.K.: Cambridge Univ. Press, 2004. Member for various international conferences, such as IEEE PIMRC 2013-
[29] J. Ny, E. Feron, and E. Frazzoli, “On the dubins traveling salesman 2019, IEEE WCNC 2014-2018, and IEEE VTC 2015-2018. He currently
problem,” IEEE Trans. Autom. Control, vol. 57, no. 1, pp. 265–270, serves as an Area Editor of Elsevier Physical Communications Journal, MDPI
Jan. 2012. Information journal, and Wiley Internet of Technology Letters. Also, he serves
[30] M. Mahajan, P. Nimbhorkar, and K. Varadarajan, “The planar k- as a reviewer for various IEEE Transactions and other journals.
means problem is NP-hard,” Theor. Comput. Sci., vol. 442, pp. 13–21,
Jul. 2012.
[31] Series 1000-Watt NDB Transmitter. (2020). Southern Avionics
Company, Leaders in Non Directional Beacon and Differential P. Muthuchidambaranathan (Member, IEEE)
GPS Transmitters. Accessed: Jun. 10, 2020. [Online]. Available: received the B.Eng. degree in electronics and com-
https://www.southernavionics.com/se-series-1000-watt-ndb munication engineering from the Government Col-
[32] G. Tuna and V. C. Gungor, “Energy harvesting and battery technologies lege of Technology, Coimbatore, India, in 1992,
for powering wireless sensor networks,” in Industrial Wireless Sensor the M.Eng. degree in microwave and optical engi-
Networks. Amsterdam, The Netherlands: Elsevier, 2016, pp. 25–38. neering from the A. C. College of Engineering and
Technology, Karaikudi, India, in 1994, and the Ph.D.
degree in optical communication from the National
Tharindu Dilshan Ponnimbaduge Perera (Grad- Institute of Technology (NIT), Tiruchirappalli, India,
uate Student Member, IEEE) received the B.Sc. in 2009. He is currently working as an Associate
degree (Hons.) in software engineering and the Professor with the Department of Electronics and
M.Sc. degree from the Department of Computing, Communication Engineering, National Institute of Technology (NIT), Tiruchi-
Faculty of ACES, Sheffield Hallam University, U.K. rappalli. His research interests include wireless communications and optical
He is currently pursuing the Ph.D. degree in com- communications. He published his research papers in refereed international
puter science and wireless communications with journals, and international and national conferences. He is an author of the
the Infocomm Lab, School of Computer Science textbook Wireless Communications (published by Prentice Hall of India).
and Robotics, National Research Tomsk Polytechnic
University, Russia. He has been awarded a full-time
scholarship from the Ministry of Education, Russian
Federation for Ph.D. studies. Also, he is working as a Research Engineer with
the Department of IT, School of Computer Science and Robotics, National Jun Li (Senior Member, IEEE) received the Ph.D.
Research Tomsk Polytechnic University. His research interests include simul- degree in electronic engineering from Shanghai Jiao
taneous wireless information and power transfer, interference exploitation in Tong University, Shanghai, China, in 2009. From
RF energy harvesting, and UAV-assisted communication. January 2009 to June 2009, he worked at the
Department of Research and Innovation, Alcatel
Stefan Panic (Member, IEEE) received the M.Sc. Lucent Shanghai Bell, as a Research Scientist. From
and Ph.D. degrees in electrical engineering from June 2009 to April 2012, he was a Postdoctoral
the Faculty of Electronic Engineering, Nis, Serbia, Fellow with the School of Electrical Engineering
in 2007 and 2010, respectively. He is currently an and Telecommunications, University of New South
Associated Professor with the Department of Infor- Wales, Australia. From April 2012 to June 2015, he
matics, Faculty of Natural Science and Mathematics, was a Research Fellow with the School of Electrical
University of Pristina. He has published over 40 SCI Engineering, The University of Sydney, Australia. Since June 2015, he has
indexed articles. His research interests in mobile been a Professor with the School of Electronic and Optical Engineering,
and multichannel communications include statistical Nanjing University of Science and Technology, Nanjing, China. He was
characterization and modeling of fading channels, a Visiting Professor with Princeton University from 2018 to 2019. His
performance analysis of diversity combining tech- research interests include network information theory, game theory, distributed
niques, and outage analysis of multiuser wireless systems subject to interfer- intelligence, multiple agent reinforcement learning, and their applications in
ence. Within digital communication, his current research interests include the ultradense wireless networks, mobile edge computing, network privacy and
information theory, source and channel coding, and signal processing. security, and industrial Internet of things.
Authorized licensed use limited to: Auckland University of Technology. Downloaded on November 05,2020 at 16:17:11 UTC from IEEE Xplore. Restrictions apply.