11,808 research outputs found

    Coverage Protocols for Wireless Sensor Networks: Review and Future Directions

    Full text link
    The coverage problem in wireless sensor networks (WSNs) can be generally defined as a measure of how effectively a network field is monitored by its sensor nodes. This problem has attracted a lot of interest over the years and as a result, many coverage protocols were proposed. In this survey, we first propose a taxonomy for classifying coverage protocols in WSNs. Then, we classify the coverage protocols into three categories (i.e. coverage aware deployment protocols, sleep scheduling protocols for flat networks, and cluster-based sleep scheduling protocols) based on the network stage where the coverage is optimized. For each category, relevant protocols are thoroughly reviewed and classified based on the adopted coverage techniques. Finally, we discuss open issues (and recommend future directions to resolve them) associated with the design of realistic coverage protocols. Issues such as realistic sensing models, realistic energy consumption models, realistic connectivity models and sensor localization are covered

    A Coverage Monitoring algorithm based on Learning Automata for Wireless Sensor Networks

    Full text link
    To cover a set of targets with known locations within an area with limited or prohibited ground access using a wireless sensor network, one approach is to deploy the sensors remotely, from an aircraft. In this approach, the lack of precise sensor placement is compensated by redundant de-ployment of sensor nodes. This redundancy can also be used for extending the lifetime of the network, if a proper scheduling mechanism is available for scheduling the active and sleep times of sensor nodes in such a way that each node is in active mode only if it is required to. In this pa-per, we propose an efficient scheduling method based on learning automata and we called it LAML, in which each node is equipped with a learning automaton, which helps the node to select its proper state (active or sleep), at any given time. To study the performance of the proposed method, computer simulations are conducted. Results of these simulations show that the pro-posed scheduling method can better prolong the lifetime of the network in comparison to similar existing method

    On the vulnerabilities of voronoi-based approaches to mobile sensor deployment

    Get PDF
    Mobile sensor networks are the most promising solution to cover an Area of Interest (AoI) in safety critical scenarios. Mobile devices can coordinate with each other according to a distributed deployment algorithm, without resorting to human supervision for device positioning and network configuration. In this paper, we focus on the vulnerabilities of the deployment algorithms based on Voronoi diagrams to coordinate mobile sensors and guide their movements. We give a geometric characterization of possible attack configurations, proving that a simple attack consisting of a barrier of few compromised sensors can severely reduce network coverage. On the basis of the above characterization, we propose two new secure deployment algorithms, named SecureVor and Secure Swap Deployment (SSD). These algorithms allow a sensor to detect compromised nodes by analyzing their movements, under different and complementary operative settings. We show that the proposed algorithms are effective in defeating a barrier attack, and both have guaranteed termination. We perform extensive simulations to study the performance of the two algorithms and compare them with the original approach. Results show that SecureVor and SSD have better robustness and flexibility and excellent coverage capabilities and deployment time, even in the presence of an attac

    Algorithms on Minimizing the Maximum Sensor Movement for Barrier Coverage of a Linear Domain

    Full text link
    In this paper, we study the problem of moving nn sensors on a line to form a barrier coverage of a specified segment of the line such that the maximum moving distance of the sensors is minimized. Previously, it was an open question whether this problem on sensors with arbitrary sensing ranges is solvable in polynomial time. We settle this open question positively by giving an O(n2logn)O(n^2 \log n) time algorithm. For the special case when all sensors have the same-size sensing range, the previously best solution takes O(n2)O(n^2) time. We present an O(nlogn)O(n \log n) time algorithm for this case; further, if all sensors are initially located on the coverage segment, our algorithm takes O(n)O(n) time. Also, we extend our techniques to the cycle version of the problem where the barrier coverage is for a simple cycle and the sensors are allowed to move only along the cycle. For sensors with the same-size sensing range, we solve the cycle version in O(n)O(n) time, improving the previously best O(n2)O(n^2) time solution.Comment: This version corrected an error in the proof of Lemma 2 in the previous version and the version published in DCG 2013. Lemma 2 is for proving the correctness of an algorithm (see the footnote of Page 9 for why the previous proof is incorrect). Everything else of the paper does not change. All algorithms in the paper are exactly the same as before and their time complexities do not change eithe

    On the Displacement for Covering a dd-dimensional Cube with Randomly Placed Sensors

    Full text link
    Consider nn sensors placed randomly and independently with the uniform distribution in a dd-dimensional unit cube (d2d\ge 2). The sensors have identical sensing range equal to rr, for some r>0r >0. We are interested in moving the sensors from their initial positions to new positions so as to ensure that the dd-dimensional unit cube is completely covered, i.e., every point in the dd-dimensional cube is within the range of a sensor. If the ii-th sensor is displaced a distance did_i, what is a displacement of minimum cost? As cost measure for the displacement of the team of sensors we consider the aa-total movement defined as the sum Ma:=i=1ndiaM_a:= \sum_{i=1}^n d_i^a, for some constant a>0a>0. We assume that rr and nn are chosen so as to allow full coverage of the dd-dimensional unit cube and a>0a > 0. The main contribution of the paper is to show the existence of a tradeoff between the dd-dimensional cube, sensing radius and aa-total movement. The main results can be summarized as follows for the case of the dd-dimensional cube. If the dd-dimensional cube sensing radius is 12n1/d\frac{1}{2n^{1/d}} and n=mdn=m^d, for some mNm\in N, then we present an algorithm that uses O(n1a2d)O\left(n^{1-\frac{a}{2d}}\right) total expected movement (see Algorithm 2 and Theorem 5). If the dd-dimensional cube sensing radius is greater than 33/d(31/d1)(31/d1)12n1/d\frac{3^{3/d}}{(3^{1/d}-1)(3^{1/d}-1)}\frac{1}{2n^{1/d}} and nn is a natural number then the total expected movement is O(n1a2d(lnnn)a2d)O\left(n^{1-\frac{a}{2d}}\left(\frac{\ln n}{n}\right)^{\frac{a}{2d}}\right) (see Algorithm 3 and Theorem 7). In addition, we simulate Algorithm 2 and discuss the results of our simulations
    corecore