11,808 research outputs found
Coverage Protocols for Wireless Sensor Networks: Review and Future Directions
The coverage problem in wireless sensor networks (WSNs) can be generally
defined as a measure of how effectively a network field is monitored by its
sensor nodes. This problem has attracted a lot of interest over the years and
as a result, many coverage protocols were proposed. In this survey, we first
propose a taxonomy for classifying coverage protocols in WSNs. Then, we
classify the coverage protocols into three categories (i.e. coverage aware
deployment protocols, sleep scheduling protocols for flat networks, and
cluster-based sleep scheduling protocols) based on the network stage where the
coverage is optimized. For each category, relevant protocols are thoroughly
reviewed and classified based on the adopted coverage techniques. Finally, we
discuss open issues (and recommend future directions to resolve them)
associated with the design of realistic coverage protocols. Issues such as
realistic sensing models, realistic energy consumption models, realistic
connectivity models and sensor localization are covered
A Coverage Monitoring algorithm based on Learning Automata for Wireless Sensor Networks
To cover a set of targets with known locations within an area with limited or
prohibited ground access using a wireless sensor network, one approach is to
deploy the sensors remotely, from an aircraft. In this approach, the lack of
precise sensor placement is compensated by redundant de-ployment of sensor
nodes. This redundancy can also be used for extending the lifetime of the
network, if a proper scheduling mechanism is available for scheduling the
active and sleep times of sensor nodes in such a way that each node is in
active mode only if it is required to. In this pa-per, we propose an efficient
scheduling method based on learning automata and we called it LAML, in which
each node is equipped with a learning automaton, which helps the node to select
its proper state (active or sleep), at any given time. To study the performance
of the proposed method, computer simulations are conducted. Results of these
simulations show that the pro-posed scheduling method can better prolong the
lifetime of the network in comparison to similar existing method
On the vulnerabilities of voronoi-based approaches to mobile sensor deployment
Mobile sensor networks are the most promising solution to cover an Area of Interest (AoI) in safety critical scenarios. Mobile devices can coordinate with each other according to a distributed deployment algorithm, without resorting to human supervision for device positioning and network configuration. In this paper, we focus on the vulnerabilities of the deployment algorithms based on Voronoi diagrams to coordinate mobile sensors and guide their movements. We give a geometric characterization of possible attack configurations, proving that a simple attack consisting of a barrier of few compromised sensors can severely reduce network coverage. On the basis of the above characterization, we propose two new secure deployment algorithms, named SecureVor and Secure Swap Deployment (SSD). These algorithms allow a sensor to detect compromised nodes by analyzing their movements, under different and complementary operative settings. We show that the proposed algorithms are effective in defeating a barrier attack, and both have guaranteed termination. We perform extensive simulations to study the performance of the two algorithms and compare them with the original approach. Results show that SecureVor and SSD have better robustness and flexibility and excellent coverage capabilities and deployment time, even in the presence of an attac
Algorithms on Minimizing the Maximum Sensor Movement for Barrier Coverage of a Linear Domain
In this paper, we study the problem of moving sensors on a line to form a
barrier coverage of a specified segment of the line such that the maximum
moving distance of the sensors is minimized. Previously, it was an open
question whether this problem on sensors with arbitrary sensing ranges is
solvable in polynomial time. We settle this open question positively by giving
an time algorithm. For the special case when all sensors have
the same-size sensing range, the previously best solution takes time.
We present an time algorithm for this case; further, if all
sensors are initially located on the coverage segment, our algorithm takes
time. Also, we extend our techniques to the cycle version of the problem
where the barrier coverage is for a simple cycle and the sensors are allowed to
move only along the cycle. For sensors with the same-size sensing range, we
solve the cycle version in time, improving the previously best
time solution.Comment: This version corrected an error in the proof of Lemma 2 in the
previous version and the version published in DCG 2013. Lemma 2 is for
proving the correctness of an algorithm (see the footnote of Page 9 for why
the previous proof is incorrect). Everything else of the paper does not
change. All algorithms in the paper are exactly the same as before and their
time complexities do not change eithe
On the Displacement for Covering a dimensional Cube with Randomly Placed Sensors
Consider sensors placed randomly and independently with the uniform
distribution in a dimensional unit cube (). The sensors have
identical sensing range equal to , for some . We are interested in
moving the sensors from their initial positions to new positions so as to
ensure that the dimensional unit cube is completely covered, i.e., every
point in the dimensional cube is within the range of a sensor. If the
-th sensor is displaced a distance , what is a displacement of minimum
cost? As cost measure for the displacement of the team of sensors we consider
the -total movement defined as the sum , for some
constant . We assume that and are chosen so as to allow full
coverage of the dimensional unit cube and .
The main contribution of the paper is to show the existence of a tradeoff
between the dimensional cube, sensing radius and -total movement. The
main results can be summarized as follows for the case of the dimensional
cube.
If the dimensional cube sensing radius is and
, for some , then we present an algorithm that uses
total expected movement (see Algorithm 2 and
Theorem 5).
If the dimensional cube sensing radius is greater than
and is a natural
number then the total expected movement is
(see Algorithm 3 and Theorem 7).
In addition, we simulate Algorithm 2 and discuss the results of our
simulations
- …