3,267 research outputs found

    Approximate K-Coverage Configuration in WirelessSensor Networks

    Get PDF
    The K-coverage configuration is widely exploited to guarantee the surveillance quality of applications on wireless sensor networks. To prolong the system lifetime, a sensor node is determined to sleep if its sensing range is already K-covered. Many K-coverage configuration algorithms in literature cannot satisfy the requirements of high quality and low cost simultaneously. In this paper, we propose an efficient K-coverage eligibility algorithm, which determines the eligibility of each sensor node at very low cost. The distinct feature of the ACE algorithm is to discover the regions with lower coverage degree of each sensor node. Experimental results show that the accuracy of the ACE algorithm is guaranteed to be higher than 90%, while its computational cost is only 11% of a well-known deterministic algorithm. The ACE algorithm is suitable to be used for a long-term monitoring task on wireless sensor networks

    A smart self-organizing node deployment algorithm in wireless sensor networks

    Get PDF

    A Localized Coverage Preserving Protocol for Wireless Sensor Networks

    Get PDF
    In a randomly deployed and large scale wireless sensor network, coverage-redundant nodes consume much unnecessary energy. As a result, turning off these redundant nodes can prolong the network lifetime, while maintaining the degree of sensing coverage with a limited number of on-duty nodes. None of the off-duty eligibility rules in the literature, however, are sufficient and necessary conditions for eligible nodes. Hence redundancy or blind points might be incurred. In this paper we propose a complete Eligibility Rule based on Perimeter Coverage (ERPC) for a node to determine its eligibility for sleeping. ERPC has a computational complexity of O(N2log(N)), lower than the eligibility rule in the Coverage Control Protocol (CCP), O(N3), where N is the number of neighboring nodes. We then present a Coverage Preserving Protocol (CPP) to schedule the work state of eligible nodes. The main advantage of CPP over the Ottawa protocol lies in its ability to configure the network to any specific coverage degree, while the Ottawa protocol does not support different coverage configuration. Moreover, as a localized protocol, CPP has better adaptability to dynamic topologies than centralized protocols. Simulation results indicate that CPP can preserve network coverage with fewer active nodes than the Ottawa protocol. In addition, CPP is capable of identifying all the eligible nodes exactly while the CCP protocol might result in blind points due to error decisions. Quantitative analysis and experiments demonstrate that CPP can extend the network lifetime significantly while maintaining a given coverage degree

    A novel distributed algorithm for complete targets coverage in energy harvesting wireless sensor networks

    Get PDF
    A fundamental problem in energy harvesting Wireless Sensor Networks (WSNs) is to maximize coverage, whereby the goal is to capture events of interest that occur in one or more target areas. To this end, this paper addresses the problem of maximizing network lifetime whilst ensuring all targets are monitored continuously by at least one sensor node. Specifically, we will address the Distributed Maximum Lifetime Coverage with Energy Harvesting (DMLC-EH) problem. The objective is to determine a distributed algorithm that allows sensor nodes to form a minimal set cover using local information whilst minimizing missed recharging opportunities. We propose an eligibility test that ensures the sensor nodes with higher energy volunteer to monitor targets. After that, we propose a Maximum Energy Protection (MEP) protocol that places an on-duty node with low energy to sleep while maintaining complete targets coverage. Our results show MEP increases network lifetime by 30% and has 10% less redundancy as compared to two similar algorithms developed for finite battery WSNs

    An Energy-Efficient Distributed Algorithm for k-Coverage Problem in Wireless Sensor Networks

    Get PDF
    Wireless sensor networks (WSNs) have recently achieved a great deal of attention due to its numerous attractive applications in many different fields. Sensors and WSNs possesses a number of special characteristics that make them very promising in many applications, but also put on them lots of constraints that make issues in sensor network particularly difficult. These issues may include topology control, routing, coverage, security, and data management. In this thesis, we focus our attention on the coverage problem. Firstly, we define the Sensor Energy-efficient Scheduling for k-coverage (SESK) problem. We then solve it by proposing a novel, completely localized and distributed scheduling approach, naming Distributed Energy-efficient Scheduling for k-coverage (DESK) such that the energy consumption among all the sensors is balanced, and the network lifetime is maximized while still satisfying the k-coverage requirement. Finally, in related work section we conduct an extensive survey of the existing work in literature that focuses on with the coverage problem

    QoS Provision for Wireless Sensor Networks

    Get PDF
    Wireless sensor network is a fast growing area of research, receiving attention not only within the computer science and electrical engineering communities, but also in relation to network optimization, scheduling, risk and reliability analysis within industrial and system engineering. The availability of micro-sensors and low-power wireless communications will enable the deployment of densely distributed sensor/actuator networks. And an integration of such system plays critical roles in many facets of human life ranging from intelligent assistants in hospitals to manufacturing process, to rescue agents in large scale disaster response, to sensor networks tracking environment phenomena, and others. The sensor nodes will perform significant signal processing, computation, and network self-configuration to achieve scalable, secure, robust and long-lived networks. More specifically, sensor nodes will do local processing to reduce energy costs, and key exchanges to ensure robust communications. These requirements pose interesting challenges for networking research. The most important technical challenge arises from the development of an integrated system which is 1)energy efficient because the system must be long-lived and operate without manual intervention, 2)reliable for data communication and robust to attackers because information security and system robustness are important in sensitive applications, such as military. Based on the above challenges, this dissertation provides Quality of Service (QoS) implementation and evaluation for the wireless sensor networks. It includes the following 3 modules, 1) energy-efficient routing, 2) energy-efficient coverage, 3). communication security. Energy-efficient routing combines the features of minimum energy consumption routing protocols with minimum computational cost routing protocols. Energy-efficient coverage provides on-demand sensing and measurement. Information security needs a security key exchange scheme to ensure reliable and robust communication links. QoS evaluation metrics and results are presented based on the above requirements

    Connectivity-guaranteed and obstacle-adaptive deployment schemes for mobile sensor networks

    Get PDF
    Mobile sensors can relocate and self-deploy into a network. While focusing on the problems of coverage, existing deployment schemes largely over-simplify the conditions for network connectivity: they either assume that the communication range is large enough for sensors in geometric neighborhoods to obtain location information through local communication, or they assume a dense network that remains connected. In addition, an obstacle-free field or full knowledge of the field layout is often assumed. We present new schemes that are not governed by these assumptions, and thus adapt to a wider range of application scenarios. The schemes are designed to maximize sensing coverage and also guarantee connectivity for a network with arbitrary sensor communication/sensing ranges or node densities, at the cost of a small moving distance. The schemes do not need any knowledge of the field layout, which can be irregular and have obstacles/holes of arbitrary shape. Our first scheme is an enhanced form of the traditional virtual-force-based method, which we term the Connectivity-Preserved Virtual Force (CPVF) scheme. We show that the localized communication, which is the very reason for its simplicity, results in poor coverage in certain cases. We then describe a Floor-based scheme which overcomes the difficulties of CPVF and, as a result, significantly outperforms it and other state-of-the-art approaches. Throughout the paper our conclusions are corroborated by the results from extensive simulations

    A Level-Wise Periodic Tree Construction Mechanism for Sleep Scheduling in WSN

    Get PDF
    The wireless sensor network(WSN) has been extensively used to monitor and control the natural ecosystem on a large scale like air quality, natural life, etc. Low battery power,low storage, and limited processing ability are the most critical areas of concern in WSN. To reduce energy utilization, the sensor nodes in WSN work in a cyclic process between active and sleep mode. A certain number of nodes are chosen active and they areresponsible for sensing as well as data transmission and rest of the nodes are gone to sleep. In order to lengthen the lifetime of network, in this paper we proposed a level wise periodic tree construction algorithm that uses a specific set of nodes to participate in tree construction, instead of all the nodes, to minimize the energy consumption. In this proposed approach, the main idea is to put the nodes, which are currently active and have already spent a significant amount of energy, to sleep mode, while giving chances to the leaf nodes, which has comparatively spent less energy, to become an active node and maintain connectivity. The performance of the proposed protocol is evaluated usingthe Castalia simulator. The simulation results show that the proposed level-wise periodic tree construction approach increases the durability of the network in conjunction with the non-level approach
    • 

    corecore