On Energy-Efficient Trap Coverage in Wireless Sensor Networks

Size: px
Start display at page:

Download "On Energy-Efficient Trap Coverage in Wireless Sensor Networks"

Transcription

1 On Energy-Efficient Trap Coverage in Wireless Sensor Networks JIMING CHEN, JUNKUN LI, and SHIBO HE, Zhejiang University TIAN HE, University of Minnesota YU GU, Singapore University of Technology and Design YOUXIAN SUN, Zhejiang University 2 In wireless sensor networks (WSNs), trap coverage has recently been proposed to trade off between the availability of sensor nodes and sensing performance. It offers an efficient framework to tackle the challenge of limited resources in large-scale sensor networks. Currently, existing works only studied the theoretical foundation of how to decide the deployment density of sensors to ensure the desired degree of trap coverage. However, practical issues, such as how to efficiently schedule sensor node to guarantee trap coverage under an arbitrary deployment, are still left untouched. In this article, we formally formulate the Minimum Weight Trap Cover Problem and prove it is an NP-hard problem. To solve the problem, we introduce a bounded approximation algorithm, called Trap Cover Optimization (TCO) to schedule the activation of sensors while satisfying specified trap coverage requirement. We design Localized Trap Coverage Protocol as the localized implementation of TCO. The performance of Minimum Weight Trap Coverage we find is proved to be at most O(ρ) times of the optimal solution, where ρ is the density of sensor nodes in the region. To evaluate our design, we perform extensive simulations to demonstrate the effectiveness of our proposed algorithm and show that our algorithm achieves at least 14% better energy efficiency than the state-of-the-art solution. Categories and Subject Descriptors: C.2.1 [Computer-Communication Networks]: Network Architecture and Design Wireless communication General Terms: Design, Algorithms, Performance Additional Key Words and Phrases: Wireless sensor networks, trap coverage, energy-efficient, scheduling ACM Reference Format: Chen, J., Li, J., He, S., He, T., Gu, Y., and Sun, Y On energy-efficient trap coverage in wireless sensor networks. ACM Trans. Sensor Netw. 10, 1, Article 2 (November 2013), 29 pages. DOI: 1. INTRODUCTION While recent advances in wireless communication and hardware device have posed a bright blueprint for Wireless Sensor Network (WSN) applications in a large range of fields, including military affairs, healthcare, and environment surveillance [Ko et al. A preliminary version of this article was presented in Proceedings of the IEEE Real-Time Systems Symposium (RTSS) [Li et al. 2011]. Research was supported in part by the NSFC under grants and , the SRFDP under grant , the 111 Program under grant B07031, the 863 High-Tech Project under grant 2011AA , SUTD-ZJU/RES/03/2011, Singapore-MIT International Design Center IDG , and SUTD SRG ISTD Authors addresses: J. Chen (corresponding author), J. Li, S. He, and Y. Sun, State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou , China; s: {jmchen, yxsun}@iipc.zju.edu.cn, {lijunkun, ferrer}@zju.edu.cn; T. He, Computer Science and Engineering, University of Minnesota; tianhe@cs.umn.edu; Y. Gu, Pillar of Information System Technology and Design, Singapore University of Technology and Design, Singapore; jasongu@sutd.edu.sg. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies show this notice on the first page or initial screen of a display along with the full citation. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers, to redistribute to lists, or to use any component of this work in other works requires prior specific permission and/or a fee. Permissions may be requested from Publications Dept., ACM, Inc., 2 Penn Plaza, Suite 701, New York, NY USA, fax +1 (212) , or permissions@acm.org. c 2013 ACM /2013/11-ART2 $15.00 DOI:

2 2:2 J. Chen et al. Fig. 1. An example of trap coverage; D is the largest diameter among all coverage holes. 2010; Cao et al. 2008; Zahedi et al. 2010], most practical implementations are restricted to small-scale experiments or applications with dozens or hundreds of sensors. One of the major reason for such relatively small-scale deployment is the prohibitively high cost of deploying thousands/millions of sensor nodes for large-scale applications. Consequently, designing a sensor network where the number of sensor nodes does not increase quickly (e.g., exponentially) with the deployment size while maintaining desired system performance is a fundamental challenge. Partial coverage is introduced in Liu and Liang [2005] to address the limited quantity of sensor nodes in large-scale applications, as it is prohibitively expensive to guarantee the full coverage of the Region of Interest (RoI) [Cardei et al. 2005; He et al. 2012a; Slijepcevic and Potkonjak 2001; Chen et al. 2010]. Partial coverage allows for coverage holes [Jeong et al. 2009], and its quality of coverage is mainly indicated by the ratio of uncovered area to the whole region [Liu and Liang 2005; Wang et al. 2004; Liu and Towsley 2004]. By adopting a partial coverage scheme, a significant number of sensor nodes could be saved and thus scale well with the network size. However, for the partial coverage, it is difficult to evaluate the actual network performance by the ratio of uncovered area, as the size of coverage holes could be extremely large or even unbounded. For applications such as intrusion detection, this implies that the moving target could travel an arbitrarily long distance and time in certain area of the RoI without being detected. Therefore, the simple partial coverage has a very narrow spectrum of practical applications that has been well recognized by many researchers. To trade off the scalability and network performance, Balister et al. have recently proposed a new kind of coverage, called trap coverage [Balister et al. 2009], based on the concept of partial coverage. In trap coverage, the size of each coverage hole is incorporated as the indicator of quality of sensing. For the coverage hole, its size is indicated by its diameter D, which is defined as the largest Euclidean distance between any two points in the coverage hole. A set of sensor nodes is said to provide D-Trap Coverage to the RoI A, if the diameter of every coverage hole in A is smaller than or equal to D. Although there may exist lots of coverage holes in the network according to this definition, the largest area of coverage holes is no more than π D 2. An example of trap coverage is illustrated in Figure 1. A target is trapped in a coverage hole, as it will be detected within a maximal moving distance of D. Compared with the partial coverage which takes coverage ratio as an indicator, trap coverage guarantees the quality of coverage in the worst case. By carefully controlling the parameter D, network performance such as connectivity or delay of detecting intrusions can be ensured in trap coverage. Balister et al. study for the first time the trap coverage of randomly deployed sensor networks. They consider the fundamental problem of how to design reliable and explicit

3 On Energy-Efficient Trap Coverage in WSNs 2:3 deployment density required to achieve D-trap coverage. Their work is concerned with conceptual network design, however, practical implementation scheme, such as how to simultaneously guarantee trap coverage and energy efficiency, is left uninvestigated. As sensor nodes could be deployed in an arbitrary manner, the required number of sensor nodes to ensure D-trap coverage is usually more than the optimal value. In this article, we fill in this gap by considering the energy-efficient scheduling of sensor nodes in the randomly deployed sensor networks to achieve D-trap coverage for the first time. In fact, this problem is extremely difficult, and we have proved that it is an NP-hard problem. To effectively solve this problem, we design an approximation algorithm called Trap Cover Optimization and implement the algorithm in a localized way. Specifically, the main intellectual contributions of this work are as follows. (1) To the best of our knowledge, we are the first to study how to schedule the activation of sensors to maximize network lifetime while guaranteeing D-trap coverage in the randomly deployed sensor networks. The problem of scheduling the activation of sensors while achieving D-trap coverage is first formulated in this article. Efficient algorithms have been designed to solve the problem in polynomial time. (2) We first introduce a centralized solution and theoretically prove that the performance of this centralized algorithm is not greater than O(ρ) times of the optimal solution, where ρ is the density of sensors scattered in the RoI, that is, ρ is defined as the ratio of the number of sensor nodes N to the size of RoI S. Our algorithm attains a provable guarantee in the worst case which is only related to ρ. The approximation ratio will be more desirable when our algorithm is applied to largescale wireless sensor networks. (3) To make our design practical for real sensor network systems, we introduce a localized trap coverage coverage protocol that can be implemented at individual sensor nodes. (4) Extensive simulations are performed to demonstrate that our proposed algorithm is effective and much more energy efficient than a naive approach to the optimal lifetime scheduling for trap coverage problem, as well as the state-of-the-art solutions. The rest of the article is organized as follows. We discuss related work in Section 2, followed by the formulation of Minimum Weight Trap Cover Problem in Section 3. Section 4 presents the details of our algorithm design. The approximation ratio of the algorithm is obtained theoretically in Section 5. We design a localized protocol in Section 6, perform extensive simulations to verify the effectiveness of algorithm in Section 7 and conclude in Section RELATED WORK Sensing coverage has been attracting considerable attention in WSNs [Berman et al. 2005; Cardei et al. 2005; Slijepcevic and Potkonjak 2001; He et al. 2012b; Meguerdichian et al. 2001]. Most of existing works concentrate on duty-cycling sensors to achieve full coverage as well as energy efficiency during the network operation [Berman et al. 2005; Slijepcevic and Potkonjak 2001]. Centralized and distributed algorithms are both proposed to dynamically activate a subset of sensors to ensure coverage, connectivity, and optimize energy consumption [Yang et al. 2005; Kasbekar et al. 2009; Dong et al. 2010]. Requiring every point in the RoI to be covered is infeasible in many real-life largescale deployments. Liu and Liang [2005] demonstrate that in some application scenarios, full coverage is either impossible or unnecessary. They indicate that a partial coverage with a certain degree of guaranteed coverage is acceptable and analyze its

4 2:4 J. Chen et al. corresponding properties for the first time. In most of the existing literatures, the percentage of uncovered area to the RoI mainly acts as the indicator of quality of partial coverage [Berman et al. 2005; Wang et al. 2004; Liu and Towsley 2004]. These solutions provide approaches to achieve desirable percentage of uncovered area with a guaranteed approximation ratio. Nevertheless, the fraction of uncovered region to the whole region only indicates quality of coverage at average. A target moving in a WSN can remain undetected for an arbitrarily long distance even though a large fraction of RoI is covered. This is because the area of the coverage hole in partial coverage can be arbitrarily large or even unbounded. On the other hand, for many applications, the quality of sensing coverage needs to be guaranteed in the worst, instead of average case. The quality of partial coverage in the worst case has been studied [Ren et al. 2007; Balasubramanian et al. 2006; Sankararaman et al. 2009; Gui and Mohapatra 2004; Cao et al. 2005]. In Ren et al. [2007], wave protocol is designed to improve the coverage performance in the worst case. For any specified continuous curve with two ends on opposite borders of the field, it always finds a subset of sensors whose sensing ranges completely cover this curve. The curve is allowed to move so that every geographical point on the field can be scanned at least once in one wave scanning period and the detection period in the worst case is guaranteed. In Gui and Mohapatra [2004], the quality of partial coverage is defined as the expected travel distance before a moving object is detected. In Balasubramanian et al. [2006], κ-weak coverage is first introduced to characterize the worst case in partial coverage. The problem of maximum network lifetime of κ-weak coverage is presented in Sankararaman et al. [2009], and an algorithm based on square and hexagonal tiling is proposed to solve the problem by dividing disjoint sensor sets as many as possible. The disadvantage of this approach is that it heavily depends on the uniformity of sensor deployment, which may not be applicable in a randomly deployed WSN of large scale. The framework of optimal sleep scheduling for rare event detection is described in Cao et al. [2005], and event detection delay is treated as an indicator of quality of partial coverage. Trap coverage is proposed in Balister et al. [2009], which defines the size of coverage hole as the indicator of quality of coverage. In Balister et al. [2009] the expected density of sensors to achieve the desired quality of coverage is studied. Balister and Kumar [2009] also study the effect of random failures of sensor nodes when sensor nodes are deployed randomly versus deterministically. Our work differentiates from the aforementioned works in that we focus on maximizing the network lifetime based on trap coverage. To our best knowledge, we are the first to address the problem by rotating active state of sensor nodes to guarantee trap coverage and prolong the network lifetime in large scale WSNs. An approximation algorithm called Trap Cover Optimization is proposed to solve the problem in polynomial time, based on which the network lifetime is maximized efficiently. We rotate sensor nodes at each time slot in a localized way and thus balance the energy consumption among sensors to extend the network lifetime. There also exist other kinds of sensing coverage in WSN besides full/blanket coverage. Barrier coverage was first proposed in Kumar et al. [2005]. The goal of barrier coverage is to detect crossing across a certain area with a barrier of sensors instead of providing full/blanket coverage to the area. In random sensor deployments, scheduling the activation of sensors alternatively to form barriers can help prolong the network lifetime. Several sensor scheduling algorithms for barrier coverage have been proposed in the literature [Kumar et al. 2005, 2010; Li et al. 2012]. Sweep coverage utilizes the mobile sensors to cover the area while guaranteeing the worst time delay. The nodes have locomotion capabilities and spread out to maximize the area covered by the network (e.g., [Cheng et al. 2008]).

5 On Energy-Efficient Trap Coverage in WSNs 2:5 3. PRELIMINARY AND PROBLEM FORMULATION 3.1. Network Model We consider a large-scale WSN in the RoI A. We assume A is a rectangle of size S = l 1 l 2 for simplicity. The WSN consists of N sensor nodes. Assume that the location of each sensor is known, either by GPS or other localization techniques [Mao et al. 2007; Patwari et al. 2005]. The location of individual sensor nodes is denoted by P i, where i = 1, 2,...,N. Each sensor can only detect targets in a certain range, which we refer to as sensing region, denoted by R. Each sensor is assigned with a unique ID number. We assume the sensing regions of sensor nodes are homogeneous, and all are unit open disc centered at the location of the sensor with radius of r, which does not include the boundary of sensing region. While we are aware that the actual sensing region is typically irregular dependent on the type of sensors and the environments [Hwang et al. 2007], we argue that the disk model can be regarded as the largest embedded circle of the actual sensing region [Yan et al. 2008]. By making such a simplified assumption, we can concentrate on our main problem and understand its intrinsical property, with a minor penalty of performance degradation in practical applications. The boundary of sensing region R i of sensor i is referred to as sensing border, which is essentially a circle of radius r centered at P i. For large-scale sensor network applications, controlled deployments of sensor nodes is normally infeasible, and therefore leads to the popular adoption of random deployment. For example, an airplane can be used to air drop sensor nodes in a forest. So for our network, we assume sensor nodes are randomly deployed with a density of ρ. Apparently, ρ can be approximated by N/S, where S = l 1 l 2 is the area of region A. While a classic Poisson point process is assumed in Balister et al. [2009], our solution can be applied to all potential deployment processes. We divide operation time of individual nodes into time slots. At each slot, a subset of sensors is activated to ensure trap coverage. We rotate active time of sensor nodes in different slots in order to extend network lifetime. Assume that each sensor has an initial energy of E units, E > 1, and consumes one unit per slot if it is active. For simplicity, if a sensor is put in sleep mode, we assume it consumes no energy. The sensor node with residual energy less than one unit can not be activated any more. In terms of communication, each sensor node can only communicate with other sensor nodes within a certain range, referred to as transmission range. As proved in Wang et al. [2003], if the transmission range of sensor node is at least twice of its sensing range, coverage implies connectivity of the network. This is to say if the sensing region of two sensors intersects with each other, they are connected. In trap coverage, the sensing regions of isolated sensors do not intersect with each other, meaning the isolated set of sensors must be trapped in a coverage hole with uncovered physical points around. If we neglect the detection measurements of isolated sensors, the main connected component of sensors can still provide required D-trap coverage (see the definition in the Section 3.2). We therefore assume that trap coverage also implies connectivity of the network Trap Coverage Model Trap coverage is a new coverage model allowing the existence of uncovered physical points in the RoI but restricts the size of coverage holes, as shown in Figure 1. In this section, we give a mathematical definition of trap coverage. Definition 1 (Coverage Hole). A set of uncovered points in RoI A forms a coverage hole H, if for any two points a and b in H, there always exists a curve ζ whose start

6 2:6 J. Chen et al. and end points are a and b, respectively, satisfying that ζ ( i C R i) =, where C is the set of active sensor nodes at that time. Obviously, H A. The diameter of coverage hole H is defined as the largest Euclidean distance between any two points in the coverage hole. Denote the diameter of coverage hole H by d(h) and dist(a, b) is the Euclidean distance between point a and b, then d(h) = max(dist(a, b)). (1) a,b H Definition 2 (D-Trap Coverage). Sensor set C provides D-trap coverage to RoI A, if the diameter of every coverage hole H in A is not greater than D, thatis, d(h) D, H A. (2) We call C a D-trap cover of RoI A. Obviously, if we set diameter threshold D to zero, D-trap coverage reverts back to full coverage Minimum Weight Trap Cover Problem To achieve energy efficiency, in this work we aim to design sensing scheduling algorithms that activate the minimal number of sensor nodes per time slot while guaranteeing D-trap coverage. To guarantee the balance of energy consumption among all sensors, we also require that the activated sensors should be those with more residual energy. Each sensor in the network is assigned with a weight based on its residual energy at the beginning of each time slot. We show an example of weight assigning in this article. Let E i denote the residual energy of sensor node i and γ i = 1 E i /E denote its energy consumption ratio, where, γ i is a variable between 0 and 1. The weight of sensor node i at time slot t, t = 1, 2,...,is assigned as an exponential function related to the residual energy, that is, w i (t) = θ γi(t) /E, 0 γ i < 1, (3) where θ is a constant value greater than one. Sensor i is specially marked by assigning weight θ N, which is greater than the sum of weights of other sensors with residual energy, if it has no residual energy, that is, γ i = 1. The weight θ N can also be viewed as an infinite high weight. After weight assigning, we formulate the Minimum Weight Trap Cover Problem in this section. Consider a sensor set C which provides D-trap coverage to RoI A, that is, each sensor i in C is associated with a weight w i. The weight of trap cover C is defined as the sum of weights of all sensors in C,thatis,w(C) = i C w i. Given the diameter threshold D, there exists a family of trap covers ℵ. Definition 3 (Minimum Weight Trap Cover). Given RoI A, a set of sensors {1, 2,...,N} with corresponding weights w 1,...,w N. A minimum weight trap cover C is a trap cover with minimum weight among all trap covers, that is, w(c ) = min w(c) = min w i. (4) C ℵ C ℵ Minimum Weight Trap Cover Problem. Given RoI A, a set of sensors {1, 2,...,N} with their corresponding weights w 1,w 2,...,w N, and sensing radius r. C is a subset of sensors. There are M coverage holes H 1,...,H M in RoI A if all sensors in C are activated while other sensors not in C are put into sleep. The minimum weight trap cover problem is to choose a minimum weight set C which can ensure that every i C

7 On Energy-Efficient Trap Coverage in WSNs 2:7 Fig. 2. A demonstration of diameter calculation. The diameter of coverage hole H equals the maximum Euclidean distance between the intersection points a and b in point set Hm,thatis,d(H) = max a,b Hm dist(a, b), hereby Hm ={P 1, P 2,...,P 8 } is the set of intersection points on the boundary hole H. coverage hole in A has a diameter no more than D, where D is a threshold set by applications. The problem can be formally formulated as follows. min C ℵ i C w i s.t. d(h m ) D, m = 1,...,M. 4. ALGORITHM DESIGN In this section, we show the concept of intersection point and then discuss how to calculate the diameters of coverage holes in the RoI. Based on the results, we further design our algorithm, Trap Cover Optimization, for minimum weight trap cover problem Finding the Diameter of A Coverage Hole We will show how to calculate the diameters of coverage holes in this section to prepare for the design of trap coverage optimization algorithm. An intersection point is one of the two points where two sensors sensing boundaries intersect with each other. We would like to introduce some basic knowledge on intersection points in previous literatures before presenting an efficient solution to the minimum weight trap cover problem. Let denote the set of intersection points of all sensors sensing boundaries in RoI. First, a sensor set covers every point in region A if and only if it covers all points in set. This theorem is first presented and proved in Kasbekar et al. [2009]. Considering the sensing region of a sensor is a disc, the problem of region coverage can be easily transformed into the problem of finding a vertex cover [Yang et al. 2005]. Note that the sensing region of a sensor is open which does not include the boundary of sensing region, the intersection points marked by red dot in Figure 2 are still not covered. Recall that the diameter of a coverage hole is defined as the largest Euclidean distance between any two points in the coverage hole. Let a denote the set of intersection points of all active sensors sensing boundaries. Without loss of generality, we also consider the situation on the edge of A by adding intersection points among all active sensors sensing boundaries and the boundary of A into set a. The set Hm denotes the intersection points on the border of H m. (5)

8 2:8 J. Chen et al. Second, the diameter of coverage hole H m equals to d( Hm ) if the sensing regions are convex, that is, d(h m ) = d( Hm ) = max dist(a, b), (6) a,b Hm where d( Hm ) denotes the largest Euclidean distance between any two points in set Hm. This theorem and detailed proof are first presented in Balister et al. [2009]. We can therefore calculate the diameter of a coverage hole in a convenient way. An example is demonstrated in Figure 2. In Figure 2, the boundary of coverage hole H is composed of sensors sensing boundaries, and Hm ={P 1,...,P 8 } are the intersection points of these sensing borders. The diameter of coverage hole H equals to the maximum Euclidean distance of the intersection points in Hm,thatis,d(H) = max a,b Hm dist(a, b) Algorithm Overview The threshold D in the Minimum Weight Trap Cover Problem, which indicates the quality of coverage, is determined by the applications, so we need to guarantee the threshold D in the algorithm design. First, we present the following theorem. THEOREM 1. Minimum Weight Trap Cover Problem is NP-hard. PROOF. Assume the minimum distance between any two intersection points in RoI is ɛ. Assume the parameter D in Minimum Weight Trap Cover Problem which satisfies ɛ>d > 0. If there exists a coverage hole with diameter M in the RoI, then M ɛ>d since M is the distance between two intersection points and it should be no less than ɛ. Thus, there exists no coverage hole in the RoI if D-trap coverage is guaranteed. We need to cover all intersection points with active sensors to provide D-trap coverage in this case. In this special case, that is, ɛ>d > 0, Minimum Weight Trap Cover Problem is reduced to a set covering problem which has already been proved to be NP-hard [Karp 2010]. As a conclusion, Minimum Weight Trap Cover Problem (for any D > 0), as a more general problem, should be no less hard than the set covering problem. So we can claim that Minimum Weight Trap Cover Problem is NP-hard. Since the problem is NP-hard and can not be precisely solved in polynomial time unless P = NP, we develop an efficient approximation algorithm Trap Cover Optimization (TCO) to solve minimum weight trap cover problem. Assume C is the minimum weight sensor cover [Berman et al. 2005], which is a set of sensors that provide full coverage to A, andc is the trap cover which provides D-trap coverage to A. We will derive C from set C in TCO, that is, C C. TCO is composed of two major steps. First, a minimum weight sensor cover C is selected to cover the whole RoI A, which is viewed as Minimum Weight Sensor Cover Problem [Berman et al. 2005]. Given RoI A, a set of sensors s 1...s n, and monitored subregion, and the weight w i for each sensor, the problem is to find a set of sensors with minimum total weight. Let denote the set of intersection points of all sensors sensing boundaries in RoI A. We regard all intersection points in as targets to be covered. Existing literatures have developed algorithms to efficiently solve this problem [Cardei et al. 2005; Yang et al. 2005; Cardei and Du 2005; Kasbekar et al. 2009]. We will introduce DSC proposed in Kasbekar et al. [2009] and use it to find a minimum weight sensor cover in Step 1 in Section 6.1. The output of TCO, C, isempty initially. We let represent the C C to simplify our description. Second, we remove each sensor in C successively and consider whether to put it into C. Consider a sensor i in C. Given the sensors in are active, sensor i is added into C when the maximum coverage hole diameter will exceed the threshold D if i is inactive.

9 On Energy-Efficient Trap Coverage in WSNs 2:9 Fig. 3. T (i) is an upper bound of increment of a coverage hole when i is removed. There exists a coverage hole with diameter d 1. The dots denote the intersection points. The sensor i denoted by the dashed circle is about to be removed. Assume the diameter of coverage hole after removing i is d 2 and d q is an auxiliary line. Finally, C is empty and C, the output of TCO, equals. TCO activates the sensors in C. As we can see in the procedure of TCO, given the sensors in are active, sensor i is removed from only when the maximum coverage hole diameter will not exceed the threshold D if i is set to be inactive. Our aim is to remove as much sensors with poor residual energy as possible in and activate only a few sensors which are rich in residual energy. The challenge is to design an optimal removal strategy and remove sensors in a proper order so that we can achieve a better performance Removal Strategy Design We will discuss how to design the removal strategy in this section. Again, We let represent the C C to simplify our description. To remove more sensors from, we consider the possible impact of removing a candidate sensor on the diameters of existing coverage holes. The diameters of coverage holes will increase or remain unchanged when we remove a sensor from. Intuitively, if we always remove sensors which will cause the diameters of existing coverage holes increase quickly, the largest diameter will soon approach the threshold D, thus only a few sensors can be removed. More sensors can be removed if we choose to remove sensors with less impact on the diameters of existing coverage holes. To quantify and bound the impact, we introduce T (i) and D (i) as the upper bounds of increase on the diameter of coverage hole when removing a sensor node i. At first, let (i) represent all intersection points which are covered by set but not covered by set ( i). Assume points in set (i) belong to boundary points of M i coverage holes. Accordingly, we divide (i)into 1 (i), 2 (i),..., Mi (i). Assume the diameters of these coverage holes are d 1 (i),...,d Mi (i), respectively. T (i) denotes the aggregate diameters of all coverage holes which are covered by sensor i but not covered by set ( i), that is, the sum of diameters of all newly emerging coverage hole when sensor i is removed. We set M i T (i) = d j (i). (7) j=1 Actually, T (i) is the largest possible increment of a coverage hole when i is removed from. We illustrate that T (i) is an upper bound of increase on the diameter of coverage hole in Figure 3. As shown in Figure 3, there exists a coverage hole with diameter d 1. The dots denote the intersection points. The sensor i denoted by the dashed circle is about to be removed and T (i) is marked in the figure. Assume the diameter of coverage hole after removing i is d 2. We introduce an auxiliary line d q which

10 2:10 J. Chen et al. Fig. 4. Amount of removed sensors by TCO and random approach vs. N, D = 25. connects two intersection points in the initial coverage hole in Figure 3. d 1 is greater than d q due to the definition of diameter of coverage hole. d 2 < d q + T (i) holds because of the triangle inequality. Thus, we have d 2 d 1 < T (i), which suggests that T (i) is an upper bound of increment of a coverage hole when i is removed. Note that T (i) should not be the maximum diameter among all newly emerging holes because these holes may merge into one large coverage hole when removing other sensors. Actually, the impacts should be bounded by summing up the diameters. We set D (i) asineq.(8). D (i) = min{t (i), 2r}. (8) As shown in Figure 3, T (i) is an upper bound of increment of a coverage hole. Meanwhile, the increment of a coverage hole when removing a sensor should not be greater than the diameter of sensing region. Thus, we have Eq. (8) as a more strict upper bound for the increase on diameter of coverage hole, which is important to determine how to remove sensors with less impact on the diameter of coverage holes. D (i) is an important metric because it denotes the possible impact of removing a candidate sensor on the diameters of existing coverage holes. Since D (i) represents the increment of diameters of coverage holes when sensor i is removed from C, we can preferably remove sensors with low D (i) whose effects on the existing coverage holes are bounded. Consequently, potentially more sensor nodes can be removed before the diameter of any coverage hole is beyond D. We adopt D (i) in TCO as an important factor. We also conduct simulation experiments to justify our design. Sensors with same weights are deployed randomly and a full cover set C is picked with aforementioned methods. We compare the amount of sensors removed from between TCO and a random approach which randomly selects a sensor to remove. The average results are plotted in Figure 4, which shows that TCO improves the amount of removed sensors significantly by considering D (i). Besides the amount of sensors in C, we also need to minimize the weights of sensors in C, so we consider normalizing the weights of sensors by D (i) to determine which sensor is to be removed. D (i) is a variable between 0 and 2r. To avoid zero in the denominator, we set the normalized factor as 1/(1 + αd (i)), where α = 1/(2r). Furthermore, the normalized weight G(i) ofsensori is defined, that is, G(i) = w i /(1 + αd (i)). (9) We remove the sensor with the greatest normalized weight G(i) each time. If there exist sensors with same G(i), we remove the sensor with the lowest ID number. In this way, sensors with less residual energy or less upper bound of increment of a coverage hole, that is, D (i), are supposed to be removed from with a higher priority. Every sensor i in set C is checked iteratively and added to C if the maximum coverage hole

11 On Energy-Efficient Trap Coverage in WSNs 2:11 Fig. 5. An illustration of Algorithm 1. diameter of ( i) exceeds the threshold D, while the uncovered intersection points and coverage holes are updated accordingly. TCO terminates when C is empty. The remaining set C is the output of TCO. Sensors with no residual energy are not involved in minimum weight sensor cover C since they have infinite weights, unless there are no set covers with residual energy to provide full coverage. Even if sensors with no residual energy are involved in C,they are removed first in TCO because they have infinite normalized weights. If the output of TCO, C contains sensors with no residual energy, it indicates that there are no trap covers with redundant energy to provide D-trap coverage any more, which means that the network reaches the end of its lifetime. Remark. Though we assume that the sensing radius of sensors are equal as a common scenario for simplicity, TCO can also be applied if the sensing ranges of sensors are unequal. Assume r max as the maximum sensing radius among all sensors in this case. We only need to replace the radius r by r max in TCO to guarantee the upper bound. That is to say, Eq. (8) should be D (i) = min{t (i), 2r max },andα in Eq. (9) should be 1/(2r max ). The rest of TCO does not need to be modified for an unequal sensing radius case Algorithm Illustration We illustrate TCO in Figure 5 to help understand the algorithm. The detailed algorithm is shown in Algorithm 1 and d( ) is used to represent the maximum diameter of coverage holes when only sensors in set are activated. ALGORITHM 1: Trap Cover Optimization. (1) Find a minimum weight cover set C which ensures the whole region A is covered. Let C =, α = 1/(2r). Let represent C C. (2) For every sensor i in set C,calculateG(i) = w i /(1 + αd (i)). If C =, return trap cover C. (3) Find the sensor i with maximum G(i) and remove i from C. (4) Update existing uncovered intersection points in A and the boundaries of coverage holes with respect to set. (5) Calculate d( ). If d( ) > D, thenletc = C {i}. (6) Back to step 2.

12 2:12 J. Chen et al. Fig. 6. An example of Algorithm 1. A simple example of TCO is presented in Figure 6. The four sensors in set C are deployed symmetrically which full cover the square region with side length a and set C is empty initially. The sensors are assumed to have the same weights. The threshold of the coverage hole is supposed to be less than a. We will show how TCO works then. At first, we assume TCO picks Sensor 1 to be removed from set C.Sinced( ) where = C C is not beyond the threshold, Sensor 1 will not be added into set C. Next, we find that Sensor 3 has the lowest D (i) amongc and only contains Sensor 2, 3, and 4 now. Considering the sensors have the same weights, we will remove Sensor 3 from C. After that, d( ) is still not beyond the threshold, so Sensor 3 will not be added into set C either. We then remove Sensor 2 from set C. The diameter of which only contains Sensor 4 can not provide required trap coverage any more, so we add Sensor 2 into set C. In the same way, we remove Sensor 4 from C and add it into set C. Finally, TCO terminates when C is empty and Sensors 2 and 4 in C are activated to provide required trap coverage. The time complexity of TCO is apparently polynomial, since we only traverse the elements in C once. Later on, we will prove the approximation ratio of TCO is only related to the sensor deployment density in Section 5. Simulations in Section 7 have confirmed that G(i)-based TCO always picks trap cover with higher average residual energy and lower energy consumption. 5. PERFORMANCE ANALYSIS 5.1. Theoretical Analysis We investigate the performance of our proposed algorithm TCO theoretically in this section. Before the derivation, we make assumptions as follows. Assumption 1. Given RoI A of size l 1 l 2, l 1 r + D and l 2 r + D, where r is the sensing range of each sensor and D is the diameter threshold of D-trap coverage. We will first prove the ratio bound of aggregate weight between the output C and the initial input C of TCO. Let N C denote the number of sensors in C. w C and w C denote the aggregate weight of sensors in C and C, respectively. LEMMA 1. w C 2N C 2N C +D/(2r) w C. PROOF. Let C = C C denote the set of sensors which are removed from set C by Algorithm 1. Here we use D(i) to represent D (i) for simplicity. Suppose at the (k+1)th iteration d(c k+1 ) exceeds threshold D for the first time. Let Q denote the set C C k,

13 On Energy-Efficient Trap Coverage in WSNs 2:13 where C k denotes C at the kth iteration. Thus, C C k. Obviously, Q C, which means w Q w C. Since TCO always selects to remove sensor i from C with maximum G(i) = w i /(1 + αd(i)), we get that { w Q i Q (1 + αd(i)) max j C w C w j 1 + αd( j) j C (1 + αd( j)). According to the definition of set Q and D(i), the upper bound of the incremental of maximum coverage hole diameter, we have D(i) D 2r. (11) i Q With Eqs. (10), (11), and α = 1/(2r), With w C = w C + w C,wehave w C w C w Q w C i Q (1 + αd(i)) j C (1 + αd( j)) αd. (1 + 2αr)N C } (10) (12) w C w C (1 + 2αr)N C (1 + 2αr)N C + αd (13) 2N C w C 2N C + D/(2r) w C, (14) which concludes the proof. We denote the optimum minimum weight trap cover which provide D-trap coverage as OPT.LetN 1 denote the number of sensors in OPT. LEMMA 2. The number of sensors providing D-trap coverage to RoI A of size l 1 l 2 2S must be greater than 3, where S = l 3(r+D) 2 1 l 2. PROOF. Suppose that there exists a point P in a coverage hole. The distance between P and the nearest boundary of detection area is less than D. Assume the boundary is belonged to sensor i. Then the distance between P and sensor i is less than (r + D) according to the triangle inequality and P will be covered if the sensing distance of i increases to (r + D). For all sensors, if the sensing radius r is increased to (r + D), the sensor set will provide full coverage to A. It is well known that it is optimal to deploy sensor nodes of disk sensing model on the vertices of equilateral triangles to cover a plane [Bai et al. 2006]. If l 1 r + D and l 2 r + D, according to the property of equilateral triangles, the minimum number of 2S sensors with sensing range r + D which provide full coverage to the RoI A is 3. 3(r+D) 2 We have 2S N 1 3 3(r + D). (15) 2 This concludes the proof.

14 2:14 J. Chen et al. Fig. 7. Optimal deployment on the vertices of equilateral triangles. Assume that w OPT denotes the aggregate weight of sensors in set OPT. According to Eq. (3), the weight of energy-redundant sensor i, w(i) satisfies that θ/e >w(i) 1/E. We have w OPT N 1 /E. (16) w C w OPT < Nθ/E N 1 /E θ N 3 3(r + D) 2. (17) 2S = ρθ 3 3(r + D) 2 2 We have the following main result for TCO, which theoretically guarantees the performance of TCO even in the worst case. Based on Lemma 1 and Eq. (17), we have the following theorem. 2N THEOREM 2. w C /w OPT < C 2N C +D/(2r) ρθ, where = 3 3(r+D) 2. 2 As θ, r and D are constants, the approximation ratio of TCO is only related to the density ρ. As the number of sensors in a full cover set N C increases, the approximation ratio approaches ρθ, which is treated as O(ρ). The bound guarantees the approximation ratio of TCO compared with optimal solution even in the worst case. A better ratio is possible for special cases, but in the worst case, our approximation ratio holds. If more and more sensor nodes are placed, the optimal solution improves quickly since more options are available. Compared with optimal solution, our algorithm relatively improves slower. Thus, the worst bound may deteriorate as ρ increases. But the performance of our algorithm is still desirable, since the density of nodes will not be extremely high for real deployment. We also plot a figure to show the magnitude of the ratio intuitively. If we set the average amount of sensors to cover the region N C is 20, D = 5, r = 15, θ = 1.01, we have the approximation ratio curve in Figure 8. For the sensing radius r which is 15, ρ above 0.01 is relatively high in reality, since there are almost seven sensors within the sensing range of a sensor whose area is πr 2. Remark. As we remark in Section. 4.3, TCO can be applied even if the sensing ranges of sensors are unequal. Assume that r max is the maximum sensing radius among the sensing ranges of all sensors. In this case, the approximation ratio of TCO is 2N C 2N C +D/(2r max ) ρθ, where = 3 3(r max +D) 2. The induction is very similar to the proof of 2 Theorem 2, so we do not repeat here.

15 On Energy-Efficient Trap Coverage in WSNs 2:15 Fig. 8. Approximation ratio vs. ρ, N C = 20, D = 5, r = 15, θ = Network Lifetime Analysis Given a minimum weight trap cover with an approximation ratio O(ρ) acquired by TCO, we can induct the approximation ratio bound of network lifetime if TCO is performed every time slot. We refer to the framework of proof of network lifetime approximation ratio in Kasbekar et al. [2009] to induct our approximation ratio of network lifetime below. Assume L is the network lifetime by TCO and L is the theoretical maximum lifetime by optimal algorithm. If TCO activates sensors with residual energy, the network is said to be alive; else if TCO attempts to activate sensors with no residual energy, the network is dead. We define ς ={1,...,L} as the set of time slots when the lifetime of network is alive. Since L is not greater than L, we define ς ={L + 1,...,L } as the set of slots when the network is dead under TCO algorithm but might still stay alive if running optimal algorithm. THEOREM 3. L is at most an O(ρ) factor greater than L. PROOF. Assume trap cover set C(t) is selected by TCO at each slot t and C (t) is the trap cover which is set to be active by optimal maximum lifetime algorithm. w C (t) is the sum of the weights of sensors in set C(t) atslott and wc (t) is the sum of the weights of sensors in set C (t) during the period of running TCO each time slot, w C (t) = i C(t) w i(t) andwc (t) = i C (t) w i(t). As proved in Theorem 2, we have w C (t) ρθ w COPT (t) ρθ w C (t). If the network is not alive, t ς,wehavew C (t) θ N. Thus, w C (t) N ρ t ς. Define the function X{i C (t)} as follows. X{i C (t)} = { 1, if i C (t); 0, otherwise.

16 2:16 J. Chen et al. We can derive that N ρ (L L) wc (t) t ς = w i (L + 1) t ς i C (t) = N w i (L + 1)X{i C (t)}. (18) t ς = i=1 N w i (L + 1) X{i C (t)} t ς i=1 E N w i (L + 1) i=1 Because the network is dead when t ς, any sensor i, i C (t) does not consume energy, which means w i (L + 1) = w i ( j), t ς. Inequality t ς X{i C (t)} E holds, because active sensor i under theoretical optimal lifetime algorithm must not cost more energy than E. At any slot t ς, sensori / C(t) will not consume any energy, thus w i (t) = w i (t + 1). The aggregate weight C(t) i C(t) θl i (t) Nθ, t ς. Hence we get E E N (w i (t + 1) w i (t)) = E (w i (t + 1) w i (t)) i=1 = i C(t) i C(t) log 2 θ ( ) θ l i(t) 2 log 2 θ E 1 i C(t) Nθ log 2 θ. θ l i(t) E We can know that N E w i (L + 1) i=1 L N = E (w i (t + 1) w i (t)). (19) t=1 i=1 N θ log 2 θ LN + E w i (1) = N(Lθ log 2 θ + 1) i=1

17 On Energy-Efficient Trap Coverage in WSNs 2:17 Fig. 9. The performance of TCO, D = 40. By combining Inequalities (18) and (19), we get L L(ρθ log 2 θ + 1) + ρ, (20) where and θ can be seen as constants. The proof completes Simulation Performance TCO removes as many sensors with high weight as possible. We conduct simulations to validate the performance of TCO, that is, how much aggregate weight can be removed. The ratio of the aggregate weight of removed sensors to the aggregate weight of initial full cover sensor set is viewed as the indicator of the performance of TCO. We present the boxplot in Figure 9(a), which shows the statistics of running for 300 times to test the performance of TCO in average. As we can see, TCO performs well both in the average case and in the worst case. The removed aggregate weight ratio is even above 0.45 in the worst case, which guarantees the effect of employing TCO. We also record the status of maximum hole diameter and aggregate weight of sensors in during a period of TCO running in Figure 9(b). The results illustrate the running status of TCO. The maximum hole diameter increases very slowly when it approaches D. That is because we remove sensors not just dependent on G(i). We enumerate each candidate sensor i successively according to the magnitude of G(i) when the maximum hole diameter is about to exceed D. Candidate sensor i is removed only if it will not cause violation against restraint of D. Hence, many sensors are removed with no significant effect on maximum hole diameter at the end. 6. LOCALIZED PROTOCOL 6.1. Protocol We have proposed and analyzed our algorithm TCO in Sections 4 and 5. It is significant to implement our algorithm in a real WSN. Due to the nature of WSN, we design a localized protocol, Localized Trap Coverage Protocol, to implement TCO in WSN, which avoids global communication and thus improves energy efficiency of network. Each sensor has two modes: sleep and active. At the beginning of each time slot, every sensor wakes up and performs distributed algorithm DSC [Kasbekar et al. 2009] to determine whether to be active initially. DSC is a distributed protocol that guarantees full coverage. Each sensor in DSC calculates the so-called activation preference ratio based on local information and determines whether to sleep according to the activation preference ratio. The upper bound of approximation ratio of the distributed algorithm is O(log n), the same as the well-known centralized algorithm on set cover problem [Chvatal 1979]. The active sensors then perform Localized Trap Coverage

18 2:18 J. Chen et al. Protocol to find a minimum D-trap cover. We focus on the design of Localized Trap Coverage Protocol next. Each sensor communicates with other sensors within a distance of (r + D) ina multihop way, where r is the sensing range and D is the diameter threshold. The sensors within a distance of (r + D) from sensor i is defined as neighbor sensors of i, denoted by set C i. Suppose that set V i contains active sensors in C i. Every active sensor broadcasts an initial-message, including location information at the beginning to recognize its neighbor sensors. Since the location of each sensor is known by itself, either by GPS or other localization techniques [Mao et al. 2007; Patwari et al. 2005], it is not difficult for sensor i to find its active neighbor sensors. In TCO, the sensor with the greatest G(i) in Eq. (9) has the highest priority to be removed, or to say, switch to sleep. If there exist sensors with same G(i), we remove the sensor with the lowest ID number. Since the protocol is designed as localized implementation of TCO, we also introduce priority to schedule the sensors. Define pr i ={G(i), ID i } as the priority of sensor i, where ID i is a unique number of sensor i and G(i) is calculated by sensor i as Eq. (9). pr i > pr j if (i) G(i) > G( j) or (ii) G(i) = G( j) and ID i < ID j.sensori packs the priority pr i into the initial message, and shares the information with its neighbor sensors. Thus, every sensor knows the initial priority of its active neighbor sensors after initialization. Sensor i will send mode-message to broadcast its decision after it has chosen to sleep or stay active. There exist two kinds of mode message: Mode-Message sleep and Mode- Message active.ifi receives Mode-Message sleep ( j) from sensor j in V i, it removes j from V i. Suppose set M i contains sensors in V i with higher priority than sensor i which have not decided to sleep or stay active. If i receives any kind of Mode-Message from sensor j in M i, it removes sensor j from M i. Sensor i starts to make decisions when M i is empty. If there does not exist a coverage hole whose diameter is greater than D in the area around sensor i within the range of (r + D) which is covered by set V i, it means the set V i can guarantee D-trap coverage within the area. Then sensor i chooses to sleep to save energy. Note that sensor i is not in set V i.ifv i is not sufficient to cover the area with no hole greater than the threshold, sensor i has to stay active since D-trap coverage can not be guaranteed without sensor i. Sensor i broadcasts the mode message and stays active or turns into sleep accordingly after decision making. However, for sensor i, G(i) maybe varies when a sensor whose sensing region overlaps with that of i chooses to sleep (see the definition of G(i) ineq.(9)).wheng(i) varies, sensor i needs to broadcast the updated priority to its neighbor sensors in an update message, which is used to convey updated priority of sensors. There is a useful property of the priority of sensors. Since D (i) will never decrease and w i remains unchanged during a time slot, G(i) can only decrease if it varies. Thus the priority of sensor i will not increase during a time slot. Based on the property of priority, sensor i only needs to consider update messages from sensors in M i since updated priority is always lower than original value. If sensor i receives an update message from sensor j in set M i, it compares the updated priority with pr i to decide whether to remove j from M i. The set M i may also be updated due to the change of pr i to guarantee that M i only contains sensors with higher priority than pr i. To help understand the procedure of the protocol, we illustrate the process of a normal sensor i in Figure 10 for Localized Trap Coverage Protocol. At the first state, sensor i receives initial messages from its neighbor sensors. Sensor i also broadcasts its own initial message and other received messages whose senders are within a certain range. After a certain period of time, referred to as t w,sensori turns into the second state, which suggests that the initialization process ends. At the second state, sensor i receives mode messages and update messages from other sensors, and broadcasts its

Probabilistic Coverage in Wireless Sensor Networks

Probabilistic Coverage in Wireless Sensor Networks Probabilistic Coverage in Wireless Sensor Networks Mohamed Hefeeda and Hossein Ahmadi School of Computing Science Simon Fraser University Surrey, Canada {mhefeeda, hahmadi}@cs.sfu.ca Technical Report:

More information

ENERGY-EFFICIENT NODE SCHEDULING MODELS IN SENSOR NETWORKS WITH ADJUSTABLE RANGES

ENERGY-EFFICIENT NODE SCHEDULING MODELS IN SENSOR NETWORKS WITH ADJUSTABLE RANGES International Journal of Foundations of Computer Science c World Scientific Publishing Company ENERGY-EFFICIENT NODE SCHEDULING MODELS IN SENSOR NETWORKS WITH ADJUSTABLE RANGES JIE WU and SHUHUI YANG Department

More information

Low-Latency Multi-Source Broadcast in Radio Networks

Low-Latency Multi-Source Broadcast in Radio Networks Low-Latency Multi-Source Broadcast in Radio Networks Scott C.-H. Huang City University of Hong Kong Hsiao-Chun Wu Louisiana State University and S. S. Iyengar Louisiana State University In recent years

More information

p-percent Coverage in Wireless Sensor Networks

p-percent Coverage in Wireless Sensor Networks p-percent Coverage in Wireless Sensor Networks Yiwei Wu, Chunyu Ai, Shan Gao and Yingshu Li Department of Computer Science Georgia State University October 28, 2008 1 Introduction 2 p-percent Coverage

More information

Coverage in Sensor Networks

Coverage in Sensor Networks Coverage in Sensor Networks Xiang Luo ECSE 6962 Coverage problems Definition: the measurement of quality of service (surveillance) that can be provided by a particular sensor network Coverage problems

More information

Redundancy and Coverage Detection in Sensor Networks

Redundancy and Coverage Detection in Sensor Networks Redundancy and Coverage Detection in Sensor Networks BOGDAN CĂRBUNAR, ANANTH GRAMA, and JAN VITEK Purdue University and OCTAVIAN CĂRBUNAR IFIN-NIPNE We study the problem of detecting and eliminating redundancy

More information

Target Coverage in Wireless Sensor Networks with Probabilistic Sensors

Target Coverage in Wireless Sensor Networks with Probabilistic Sensors Article Target Coverage in Wireless Sensor Networks with Probabilistic Sensors Anxing Shan 1, Xianghua Xu 1, * and Zongmao Cheng 2 1 School of Computer Science, Hangzhou Dianzi University, Hangzhou 310018,

More information

Coverage Issue in Sensor Networks with Adjustable Ranges

Coverage Issue in Sensor Networks with Adjustable Ranges overage Issue in Sensor Networks with Adjustable Ranges Jie Wu and Shuhui Yang Department of omputer Science and Engineering Florida Atlantic University oca Raton, FL jie@cse.fau.edu, syang@fau.edu Abstract

More information

Fault Tolerant Barrier Coverage for Wireless Sensor Networks

Fault Tolerant Barrier Coverage for Wireless Sensor Networks IEEE INFOCOM - IEEE Conference on Computer Communications Fault Tolerant Barrier Coverage for Wireless Sensor Networks Zhibo Wang, Honglong Chen, Qing Cao, Hairong Qi and Zhi Wang Department of Electrical

More information

Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes

Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes 7th Mediterranean Conference on Control & Automation Makedonia Palace, Thessaloniki, Greece June 4-6, 009 Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes Theofanis

More information

A Greedy Algorithm for Target Coverage Scheduling in Directional Sensor Networks

A Greedy Algorithm for Target Coverage Scheduling in Directional Sensor Networks A Greedy Algorithm for Target Coverage Scheduling in Directional Sensor Networks Youn-Hee Han, Chan-Myung Kim Laboratory of Intelligent Networks Advanced Technology Research Center Korea University of

More information

Node Deployment Strategies and Coverage Prediction in 3D Wireless Sensor Network with Scheduling

Node Deployment Strategies and Coverage Prediction in 3D Wireless Sensor Network with Scheduling Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 8 (2017) pp. 2243-2255 Research India Publications http://www.ripublication.com Node Deployment Strategies and Coverage

More information

Interference-Aware Joint Routing and TDMA Link Scheduling for Static Wireless Networks

Interference-Aware Joint Routing and TDMA Link Scheduling for Static Wireless Networks Interference-Aware Joint Routing and TDMA Link Scheduling for Static Wireless Networks Yu Wang Weizhao Wang Xiang-Yang Li Wen-Zhan Song Abstract We study efficient interference-aware joint routing and

More information

Analysis of Power Assignment in Radio Networks with Two Power Levels

Analysis of Power Assignment in Radio Networks with Two Power Levels Analysis of Power Assignment in Radio Networks with Two Power Levels Miguel Fiandor Gutierrez & Manuel Macías Córdoba Abstract. In this paper we analyze the Power Assignment in Radio Networks with Two

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February ISSN

International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February ISSN International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February-2016 181 A NOVEL RANGE FREE LOCALIZATION METHOD FOR MOBILE SENSOR NETWORKS Anju Thomas 1, Remya Ramachandran 2 1

More information

TOPOLOGY, LIMITS OF COMPLEX NUMBERS. Contents 1. Topology and limits of complex numbers 1

TOPOLOGY, LIMITS OF COMPLEX NUMBERS. Contents 1. Topology and limits of complex numbers 1 TOPOLOGY, LIMITS OF COMPLEX NUMBERS Contents 1. Topology and limits of complex numbers 1 1. Topology and limits of complex numbers Since we will be doing calculus on complex numbers, not only do we need

More information

Utilization-Aware Adaptive Back-Pressure Traffic Signal Control

Utilization-Aware Adaptive Back-Pressure Traffic Signal Control Utilization-Aware Adaptive Back-Pressure Traffic Signal Control Wanli Chang, Samarjit Chakraborty and Anuradha Annaswamy Abstract Back-pressure control of traffic signal, which computes the control phase

More information

Extending lifetime of sensor surveillance systems in data fusion model

Extending lifetime of sensor surveillance systems in data fusion model IEEE WCNC 2011 - Network Exting lifetime of sensor surveillance systems in data fusion model Xiang Cao Xiaohua Jia Guihai Chen State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing,

More information

Performance Analysis of a 1-bit Feedback Beamforming Algorithm

Performance Analysis of a 1-bit Feedback Beamforming Algorithm Performance Analysis of a 1-bit Feedback Beamforming Algorithm Sherman Ng Mark Johnson Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2009-161

More information

Zigzag Coverage Scheme Algorithm & Analysis for Wireless Sensor Networks

Zigzag Coverage Scheme Algorithm & Analysis for Wireless Sensor Networks Zigzag Coverage Scheme Algorithm & Analysis for Wireless Sensor Networks Ammar Hawbani School of Computer Science and Technology, University of Science and Technology of China, E-mail: ammar12@mail.ustc.edu.cn

More information

Localization (Position Estimation) Problem in WSN

Localization (Position Estimation) Problem in WSN Localization (Position Estimation) Problem in WSN [1] Convex Position Estimation in Wireless Sensor Networks by L. Doherty, K.S.J. Pister, and L.E. Ghaoui [2] Semidefinite Programming for Ad Hoc Wireless

More information

EasyChair Preprint. A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network

EasyChair Preprint. A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network EasyChair Preprint 78 A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network Yuzhou Liu and Wuwen Lai EasyChair preprints are intended for rapid dissemination of research results and

More information

Energy-Balanced Cooperative Routing in Multihop Wireless Ad Hoc Networks

Energy-Balanced Cooperative Routing in Multihop Wireless Ad Hoc Networks Energy-Balanced Cooperative Routing in Multihop Wireless Ad Hoc Networs Siyuan Chen Minsu Huang Yang Li Ying Zhu Yu Wang Department of Computer Science, University of North Carolina at Charlotte, Charlotte,

More information

Energy-Efficient Connected Coverage of Discrete Targets in Wireless Sensor Networks

Energy-Efficient Connected Coverage of Discrete Targets in Wireless Sensor Networks Energy-Efficient Connected Coverage of Discrete Targets in Wireless Sensor Networks Mingming Lu, Jie Wu, Mihaela Cardei, and Minglu Li Department of Computer Science and Engineering Florida Atlantic University,

More information

Calculation on Coverage & connectivity of random deployed wireless sensor network factors using heterogeneous node

Calculation on Coverage & connectivity of random deployed wireless sensor network factors using heterogeneous node Calculation on Coverage & connectivity of random deployed wireless sensor network factors using heterogeneous node Shikha Nema*, Branch CTA Ganga Ganga College of Technology, Jabalpur (M.P) ABSTRACT A

More information

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Mariam Kaynia and Nihar Jindal Dept. of Electrical and Computer Engineering, University of Minnesota Dept. of Electronics and Telecommunications,

More information

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Shih-Hsien Yang, Hung-Wei Tseng, Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

Energy-Efficient Area Coverage in Bistatic Radar Sensor Networks

Energy-Efficient Area Coverage in Bistatic Radar Sensor Networks Energy-Efficient Area Coverage in Bistatic Radar Sensor Networks Qianqian Yang Shibo He Jiming Chen State Key Lab. of Industrial Control Technology, Zhejiang University, China School of Electrical, Computer,

More information

Acc: Generic On-Demand Accelerations for Neighbor Discovery in Mobile Applications

Acc: Generic On-Demand Accelerations for Neighbor Discovery in Mobile Applications Acc: Generic On-Demand Accelerations for Neighbor Discovery in Mobile Applications Desheng Zhang, Tian He {zhang,tianhe}@cs.umn.edu Yunhuai Liu yunhuai@trimps.ac.cn Yu Gu jasongu@sutd.edu.sg Fan Ye fanye@us.ibm.com

More information

An Efficient Distributed Coverage Hole Detection Protocol for Wireless Sensor Networks

An Efficient Distributed Coverage Hole Detection Protocol for Wireless Sensor Networks Article An Efficient Distributed Coverage Hole Detection Protocol for Wireless Sensor Networks Prasan Kumar Sahoo 1, Ming-Jer Chiang 2 and Shih-Lin Wu 1,3, * 1 Department of Computer Science and Information

More information

Self-Protection for Wireless Sensor Networks

Self-Protection for Wireless Sensor Networks Self-Protection for Wireless Sensor Networks Dan Wang 1, Qian Zhang, Jiangchuan Liu 1 1 School of Computing Science, Simon Fraser University, Burnaby, BC, Canada, V5A 1S6, Email: {danw, jcliu}@cs.sfu.ca

More information

Performance Evaluation of DV-Hop and NDV-Hop Localization Methods in Wireless Sensor Networks

Performance Evaluation of DV-Hop and NDV-Hop Localization Methods in Wireless Sensor Networks Performance Evaluation of DV-Hop and NDV-Hop Localization Methods in Wireless Sensor Networks Manijeh Keshtgary Dept. of Computer Eng. & IT ShirazUniversity of technology Shiraz,Iran, Keshtgari@sutech.ac.ir

More information

How (Information Theoretically) Optimal Are Distributed Decisions?

How (Information Theoretically) Optimal Are Distributed Decisions? How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr

More information

Energy-efficient Broadcast Scheduling with Minimum Latency for Low-Duty-Cycle Wireless Sensor Networks

Energy-efficient Broadcast Scheduling with Minimum Latency for Low-Duty-Cycle Wireless Sensor Networks 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems Energy-efficient Broadcast Scheduling with Minimum Latency for Low-Duty-Cycle Wireless Sensor Networks Lijie Xu, Jiannong Cao,

More information

Location Discovery in Sensor Network

Location Discovery in Sensor Network Location Discovery in Sensor Network Pin Nie Telecommunications Software and Multimedia Laboratory Helsinki University of Technology niepin@cc.hut.fi Abstract One established trend in electronics is micromation.

More information

Jie Wu and Mihaela Cardei

Jie Wu and Mihaela Cardei Int. J. Ad Hoc and Ubiquitous Computing, Vol. 4, Nos. 3/4, 2009 137 Energy-efficient connected coverage of discrete targets in wireless sensor networks Mingming Lu* Department of Computer Science, Central

More information

Fault-tolerant Coverage in Dense Wireless Sensor Networks

Fault-tolerant Coverage in Dense Wireless Sensor Networks Fault-tolerant Coverage in Dense Wireless Sensor Networks Akshaye Dhawan and Magdalena Parks Department of Mathematics and Computer Science, Ursinus College, 610 E Main Street, Collegeville, PA, USA {adhawan,

More information

IN wireless sensor networks, there is a trade-off between

IN wireless sensor networks, there is a trade-off between IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 5, APRIL 2011 465 Spatial-Temporal Coverage Optimization in Wireless Sensor Networks Changlei Liu, Student Member, IEEE, and Guohong Cao, Fellow, IEEE

More information

Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks

Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks Chunxiao Jiang, Yan Chen, and K. J. Ray Liu Department of Electrical and Computer Engineering, University of Maryland, College

More information

The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code

The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code Yaoyu Wang Nanjing University yaoyu.wang.nju@gmail.com June 10, 2016 Yaoyu Wang (NJU) Error correction with EEC June

More information

The Worst-Case Capacity of Wireless Sensor Networks

The Worst-Case Capacity of Wireless Sensor Networks The Worst-Case Capacity of Wireless Sensor Networks Thomas Moscibroda Microsoft Research Redmond WA 98052 moscitho@microsoft.com ABSTRACT The key application scenario of wireless sensor networks is data

More information

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Yuqun Zhang, Chen-Hsiang Feng, Ilker Demirkol, Wendi B. Heinzelman Department of Electrical and Computer

More information

Mobility Tolerant Broadcast in Mobile Ad Hoc Networks

Mobility Tolerant Broadcast in Mobile Ad Hoc Networks Mobility Tolerant Broadcast in Mobile Ad Hoc Networks Pradip K Srimani 1 and Bhabani P Sinha 2 1 Department of Computer Science, Clemson University, Clemson, SC 29634 0974 2 Electronics Unit, Indian Statistical

More information

Hierarchical Agglomerative Aggregation Scheduling in Directional Wireless Sensor Networks

Hierarchical Agglomerative Aggregation Scheduling in Directional Wireless Sensor Networks Hierarchical Agglomerative Aggregation Scheduling in Directional Wireless Sensor Networks Min Kyung An Department of Computer Science Sam Houston State University Huntsville, Texas 77341, USA Email: an@shsu.edu

More information

Distributed Energy-Efficient Scheduling Approach For k-coverage In Wireless Sensor Networks

Distributed Energy-Efficient Scheduling Approach For k-coverage In Wireless Sensor Networks Distributed Energy-Efficient Scheduling Approach For k-coverage In Wireless Sensor Networks Chinh T. Vu Shan Gao Wiwek P. Deshmukh Yingshu Li Department of Computer Science Georgia State University, Atlanta,

More information

Sweep Coverage with Mobile Sensors

Sweep Coverage with Mobile Sensors 1 Sweep Coverage with Mobile Sensors Mo Li 1 Weifang Cheng 2 Kebin Liu 3 Yunhao Liu 1 Xiangyang Li 4 Xiangke Liao 2 973 WSN Joint Lab 1 Hong Kong University of Science and Technology, Hong Kong 2 National

More information

Improved Directional Perturbation Algorithm for Collaborative Beamforming

Improved Directional Perturbation Algorithm for Collaborative Beamforming American Journal of Networks and Communications 2017; 6(4): 62-66 http://www.sciencepublishinggroup.com/j/ajnc doi: 10.11648/j.ajnc.20170604.11 ISSN: 2326-893X (Print); ISSN: 2326-8964 (Online) Improved

More information

Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks

Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Ka Hung Hui, Dongning Guo and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern

More information

Introduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1

Introduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1 ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS Xiang Ji and Hongyuan Zha Material taken from Sensor Network Operations by Shashi Phoa, Thomas La Porta and Christopher Griffin, John Wiley,

More information

Deployment-Based Lifetime Optimization Model for Homogeneous Wireless Sensor Network under Retransmission

Deployment-Based Lifetime Optimization Model for Homogeneous Wireless Sensor Network under Retransmission Sensors 2014, 14, 23697-23723; doi:10.3390/s141223697 OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Article Deployment-Based Lifetime Optimization Model for Homogeneous Wireless Sensor

More information

Coalface WSN Sub-area Model and Network Deployment Strategy

Coalface WSN Sub-area Model and Network Deployment Strategy 2011 International Conference on Computer Communication and Management Proc.of CSIT vol.5 (2011) (2011) IACSIT Press, Singapore Coalface WSN Sub-area Model and Network Deployment Strategy Peng Zhang 1,

More information

Lecture 2. 1 Nondeterministic Communication Complexity

Lecture 2. 1 Nondeterministic Communication Complexity Communication Complexity 16:198:671 1/26/10 Lecture 2 Lecturer: Troy Lee Scribe: Luke Friedman 1 Nondeterministic Communication Complexity 1.1 Review D(f): The minimum over all deterministic protocols

More information

Connected Identifying Codes

Connected Identifying Codes Connected Identifying Codes Niloofar Fazlollahi, David Starobinski and Ari Trachtenberg Dept. of Electrical and Computer Engineering Boston University, Boston, MA 02215 Email: {nfazl,staro,trachten}@bu.edu

More information

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

Adaptation of MAC Layer for QoS in WSN

Adaptation of MAC Layer for QoS in WSN Adaptation of MAC Layer for QoS in WSN Sukumar Nandi and Aditya Yadav IIT Guwahati Abstract. In this paper, we propose QoS aware MAC protocol for Wireless Sensor Networks. In WSNs, there can be two types

More information

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS A Thesis by Masaaki Takahashi Bachelor of Science, Wichita State University, 28 Submitted to the Department of Electrical Engineering

More information

ON THE OPTIMAL COVERAGE AREA FOR SOLVING ENERGY-EFFICIENT PROBLEM IN WIRELESS SENSOR NETWORK

ON THE OPTIMAL COVERAGE AREA FOR SOLVING ENERGY-EFFICIENT PROBLEM IN WIRELESS SENSOR NETWORK Jurnal Karya Asli Lorekan Ahli Matematik Vol. 8 No.1 (2015) Page 119-125 Jurnal Karya Asli Lorekan Ahli Matematik ON THE OPTIMAL COVERAGE AREA FOR SOLVING ENERGY-EFFICIENT PROBLEM IN WIRELESS SENSOR NETWORK

More information

Rolling Partial Rescheduling with Dual Objectives for Single Machine Subject to Disruptions 1)

Rolling Partial Rescheduling with Dual Objectives for Single Machine Subject to Disruptions 1) Vol.32, No.5 ACTA AUTOMATICA SINICA September, 2006 Rolling Partial Rescheduling with Dual Objectives for Single Machine Subject to Disruptions 1) WANG Bing 1,2 XI Yu-Geng 2 1 (School of Information Engineering,

More information

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,

More information

Energy-Optimal and Energy-Balanced Sorting in a Single-Hop Wireless Sensor Network

Energy-Optimal and Energy-Balanced Sorting in a Single-Hop Wireless Sensor Network Energy-Optimal and Energy-Balanced Sorting in a Single-Hop Wireless Sensor Network Mitali Singh and Viktor K Prasanna Department of Computer Science University of Southern California Los Angeles, CA 90089,

More information

Multi-Radio Channel Detecting Jamming Attack Against Enhanced Jump-Stay Based Rendezvous in Cognitive Radio Networks

Multi-Radio Channel Detecting Jamming Attack Against Enhanced Jump-Stay Based Rendezvous in Cognitive Radio Networks Multi-Radio Channel Detecting Jamming Attack Against Enhanced Jump-Stay Based Rendezvous in Cognitive Radio Networks Yang Gao 1, Zhaoquan Gu 1, Qiang-Sheng Hua 2, Hai Jin 2 1 Institute for Interdisciplinary

More information

On Coding for Cooperative Data Exchange

On Coding for Cooperative Data Exchange On Coding for Cooperative Data Exchange Salim El Rouayheb Texas A&M University Email: rouayheb@tamu.edu Alex Sprintson Texas A&M University Email: spalex@tamu.edu Parastoo Sadeghi Australian National University

More information

A Random Network Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast

A Random Network Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast ISSN 746-7659, England, U Journal of Information and Computing Science Vol. 4, No., 9, pp. 4-3 A Random Networ Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast in Yang,, +, Gang

More information

Wi-Fi Fingerprinting through Active Learning using Smartphones

Wi-Fi Fingerprinting through Active Learning using Smartphones Wi-Fi Fingerprinting through Active Learning using Smartphones Le T. Nguyen Carnegie Mellon University Moffet Field, CA, USA le.nguyen@sv.cmu.edu Joy Zhang Carnegie Mellon University Moffet Field, CA,

More information

Energy-Efficient Routing in Wireless Networks in the Presence of Jamming

Energy-Efficient Routing in Wireless Networks in the Presence of Jamming 1 Energy-Efficient Routing in Wireless Networs in the Presence of Jamming Azadeh Sheiholeslami, Student Member, IEEE, Majid Ghaderi, Member, IEEE, Hossein Pishro-Ni, Member, IEEE, Dennis Goecel, Fellow,

More information

Joint Relaying and Network Coding in Wireless Networks

Joint Relaying and Network Coding in Wireless Networks Joint Relaying and Network Coding in Wireless Networks Sachin Katti Ivana Marić Andrea Goldsmith Dina Katabi Muriel Médard MIT Stanford Stanford MIT MIT Abstract Relaying is a fundamental building block

More information

COGNITIVE Radio (CR) [1] has been widely studied. Tradeoff between Spoofing and Jamming a Cognitive Radio

COGNITIVE Radio (CR) [1] has been widely studied. Tradeoff between Spoofing and Jamming a Cognitive Radio Tradeoff between Spoofing and Jamming a Cognitive Radio Qihang Peng, Pamela C. Cosman, and Laurence B. Milstein School of Comm. and Info. Engineering, University of Electronic Science and Technology of

More information

SIGNIFICANT advances in hardware technology have led

SIGNIFICANT advances in hardware technology have led IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 56, NO. 5, SEPTEMBER 2007 2733 Concentric Anchor Beacon Localization Algorithm for Wireless Sensor Networks Vijayanth Vivekanandan and Vincent W. S. Wong,

More information

COMP Online Algorithms. Paging and k-server Problem. Shahin Kamali. Lecture 11 - Oct. 11, 2018 University of Manitoba

COMP Online Algorithms. Paging and k-server Problem. Shahin Kamali. Lecture 11 - Oct. 11, 2018 University of Manitoba COMP 7720 - Online Algorithms Paging and k-server Problem Shahin Kamali Lecture 11 - Oct. 11, 2018 University of Manitoba COMP 7720 - Online Algorithms Paging and k-server Problem 1 / 19 Review & Plan

More information

Minimum-Latency Beaconing Schedule in Duty-Cycled Multihop Wireless Networks

Minimum-Latency Beaconing Schedule in Duty-Cycled Multihop Wireless Networks Minimum-Latency Beaconing Schedule in Duty-Cycled Multihop Wireless Networks Lixin Wang, Peng-Jun Wan, and Kyle Young Department of Mathematics, Sciences and Technology, Paine College, Augusta, GA 30901,

More information

Population Adaptation for Genetic Algorithm-based Cognitive Radios

Population Adaptation for Genetic Algorithm-based Cognitive Radios Population Adaptation for Genetic Algorithm-based Cognitive Radios Timothy R. Newman, Rakesh Rajbanshi, Alexander M. Wyglinski, Joseph B. Evans, and Gary J. Minden Information Technology and Telecommunications

More information

2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising

More information

Fast Placement Optimization of Power Supply Pads

Fast Placement Optimization of Power Supply Pads Fast Placement Optimization of Power Supply Pads Yu Zhong Martin D. F. Wong Dept. of Electrical and Computer Engineering Dept. of Electrical and Computer Engineering Univ. of Illinois at Urbana-Champaign

More information

Towards Optimal Sleep Scheduling in Sensor Networks for Rare-Event Detection

Towards Optimal Sleep Scheduling in Sensor Networks for Rare-Event Detection Towards Optimal Sleep Scheduling in Sensor Networks for Rare-Event Detection Qing Cao, Tarek Abdelzaher, Tian He, John Stankovic Department of Computer Science, University of Virginia, Charlottesville,

More information

Research Article ACO-Based Sweep Coverage Scheme in Wireless Sensor Networks

Research Article ACO-Based Sweep Coverage Scheme in Wireless Sensor Networks Sensors Volume 5, Article ID 89, 6 pages http://dx.doi.org/.55/5/89 Research Article ACO-Based Sweep Coverage Scheme in Wireless Sensor Networks Peng Huang,, Feng Lin, Chang Liu,,5 Jian Gao, and Ji-liu

More information

BRITISH COLUMBIA SECONDARY SCHOOL MATHEMATICS CONTEST, 2006 Senior Preliminary Round Problems & Solutions

BRITISH COLUMBIA SECONDARY SCHOOL MATHEMATICS CONTEST, 2006 Senior Preliminary Round Problems & Solutions BRITISH COLUMBIA SECONDARY SCHOOL MATHEMATICS CONTEST, 006 Senior Preliminary Round Problems & Solutions 1. Exactly 57.4574% of the people replied yes when asked if they used BLEU-OUT face cream. The fewest

More information

Game Theory and Randomized Algorithms

Game Theory and Randomized Algorithms Game Theory and Randomized Algorithms Guy Aridor Game theory is a set of tools that allow us to understand how decisionmakers interact with each other. It has practical applications in economics, international

More information

Monitoring Churn in Wireless Networks

Monitoring Churn in Wireless Networks Monitoring Churn in Wireless Networks Stephan Holzer 1 Yvonne-Anne Pignolet 2 Jasmin Smula 1 Roger Wattenhofer 1 {stholzer, smulaj, wattenhofer}@tik.ee.ethz.ch, yvonne-anne.pignolet@ch.abb.com 1 Computer

More information

Fast and efficient randomized flooding on lattice sensor networks

Fast and efficient randomized flooding on lattice sensor networks Fast and efficient randomized flooding on lattice sensor networks Ananth Kini, Vilas Veeraraghavan, Steven Weber Department of Electrical and Computer Engineering Drexel University November 19, 2004 presentation

More information

ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS

ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Coverage Issues in Wireless Sensor Networks

Coverage Issues in Wireless Sensor Networks ModernComputerApplicationsTechnologies Course Coverage Issues in Wireless Sensor Networks Presenter:XiaofeiXing Email:xxfcsu@gmail.com GuangzhouUniversity Outline q Wirelsss Sensor Networks q Coverage

More information

A GRAPH THEORETICAL APPROACH TO SOLVING SCRAMBLE SQUARES PUZZLES. 1. Introduction

A GRAPH THEORETICAL APPROACH TO SOLVING SCRAMBLE SQUARES PUZZLES. 1. Introduction GRPH THEORETICL PPROCH TO SOLVING SCRMLE SQURES PUZZLES SRH MSON ND MLI ZHNG bstract. Scramble Squares puzzle is made up of nine square pieces such that each edge of each piece contains half of an image.

More information

Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks

Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Yi Sun Department of Electrical Engineering The City College of City University of New York Acknowledgement: supported

More information

On the problem of energy efficiency of multi-hop vs one-hop routing in Wireless Sensor Networks

On the problem of energy efficiency of multi-hop vs one-hop routing in Wireless Sensor Networks On the problem of energy efficiency of multi-hop vs one-hop routing in Wireless Sensor Networks Symon Fedor and Martin Collier Research Institute for Networks and Communications Engineering (RINCE), Dublin

More information

Minimum Cost Localization Problem in Wireless Sensor Networks

Minimum Cost Localization Problem in Wireless Sensor Networks Minimum Cost Localization Problem in Wireless Sensor Networks Minsu Huang, Siyuan Chen, Yu Wang Department of Computer Science, University of North Carolina at Charlotte, Charlotte, NC 28223, USA. Email:{mhuang4,schen4,yu.wang}@uncc.edu

More information

Capacitated Cell Planning of 4G Cellular Networks

Capacitated Cell Planning of 4G Cellular Networks Capacitated Cell Planning of 4G Cellular Networks David Amzallag, Roee Engelberg, Joseph (Seffi) Naor, Danny Raz Computer Science Department Technion, Haifa 32000, Israel {amzallag,roee,naor,danny}@cs.technion.ac.il

More information

Graphs of Tilings. Patrick Callahan, University of California Office of the President, Oakland, CA

Graphs of Tilings. Patrick Callahan, University of California Office of the President, Oakland, CA Graphs of Tilings Patrick Callahan, University of California Office of the President, Oakland, CA Phyllis Chinn, Department of Mathematics Humboldt State University, Arcata, CA Silvia Heubach, Department

More information

UNIVERSITY OF NORTHERN COLORADO MATHEMATICS CONTEST

UNIVERSITY OF NORTHERN COLORADO MATHEMATICS CONTEST UNIVERSITY OF NORTHERN COLORADO MATHEMATICS CONTEST First Round For all Colorado Students Grades 7-12 October 31, 2009 You have 90 minutes no calculators allowed The average of n numbers is their sum divided

More information

Mobile Base Stations Placement and Energy Aware Routing in Wireless Sensor Networks

Mobile Base Stations Placement and Energy Aware Routing in Wireless Sensor Networks Mobile Base Stations Placement and Energy Aware Routing in Wireless Sensor Networks A. P. Azad and A. Chockalingam Department of ECE, Indian Institute of Science, Bangalore 5612, India Abstract Increasing

More information

DISTRIBUTED DYNAMIC CHANNEL ALLOCATION ALGORITHM FOR CELLULAR MOBILE NETWORK

DISTRIBUTED DYNAMIC CHANNEL ALLOCATION ALGORITHM FOR CELLULAR MOBILE NETWORK DISTRIBUTED DYNAMIC CHANNEL ALLOCATION ALGORITHM FOR CELLULAR MOBILE NETWORK 1 Megha Gupta, 2 A.K. Sachan 1 Research scholar, Deptt. of computer Sc. & Engg. S.A.T.I. VIDISHA (M.P) INDIA. 2 Asst. professor,

More information

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,

More information

DV-HOP LOCALIZATION ALGORITHM IMPROVEMENT OF WIRELESS SENSOR NETWORK

DV-HOP LOCALIZATION ALGORITHM IMPROVEMENT OF WIRELESS SENSOR NETWORK DV-HOP LOCALIZATION ALGORITHM IMPROVEMENT OF WIRELESS SENSOR NETWORK CHUAN CAI, LIANG YUAN School of Information Engineering, Chongqing City Management College, Chongqing, China E-mail: 1 caichuan75@163.com,

More information

On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing

On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing 1 On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing Liangping Ma arxiv:0809.4325v2 [cs.it] 26 Dec 2009 Abstract The first result

More information

HETEROGENEOUS LINK ASYMMETRY IN TDD MODE CELLULAR SYSTEMS

HETEROGENEOUS LINK ASYMMETRY IN TDD MODE CELLULAR SYSTEMS HETEROGENEOUS LINK ASYMMETRY IN TDD MODE CELLULAR SYSTEMS Magnus Lindström Radio Communication Systems Department of Signals, Sensors and Systems Royal Institute of Technology (KTH) SE- 44, STOCKHOLM,

More information

Context-Aware Resource Allocation in Cellular Networks

Context-Aware Resource Allocation in Cellular Networks Context-Aware Resource Allocation in Cellular Networks Ahmed Abdelhadi and Charles Clancy Hume Center, Virginia Tech {aabdelhadi, tcc}@vt.edu 1 arxiv:1406.1910v2 [cs.ni] 18 Oct 2015 Abstract We define

More information

Multi-Band Spectrum Allocation Algorithm Based on First-Price Sealed Auction

Multi-Band Spectrum Allocation Algorithm Based on First-Price Sealed Auction BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 1 Sofia 2017 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2017-0008 Multi-Band Spectrum Allocation

More information

Index Terms Deterministic channel model, Gaussian interference channel, successive decoding, sum-rate maximization.

Index Terms Deterministic channel model, Gaussian interference channel, successive decoding, sum-rate maximization. 3798 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 6, JUNE 2012 On the Maximum Achievable Sum-Rate With Successive Decoding in Interference Channels Yue Zhao, Member, IEEE, Chee Wei Tan, Member,

More information

Minimum Cost Deployment of Bistatic Radar Sensor for Perimeter Barrier Coverage

Minimum Cost Deployment of Bistatic Radar Sensor for Perimeter Barrier Coverage sensors Article Minimum Cost Deployment of Bistatic Radar Sensor for Perimeter Barrier Coverage Xianghua Xu 1, *, Chengwei Zhao 1, Tingcong Ye 1 and Tao Gu 1 School of Computer Science and Technology,

More information

Chapter 12. Cross-Layer Optimization for Multi- Hop Cognitive Radio Networks

Chapter 12. Cross-Layer Optimization for Multi- Hop Cognitive Radio Networks Chapter 12 Cross-Layer Optimization for Multi- Hop Cognitive Radio Networks 1 Outline CR network (CRN) properties Mathematical models at multiple layers Case study 2 Traditional Radio vs CR Traditional

More information

THE field of personal wireless communications is expanding

THE field of personal wireless communications is expanding IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 5, NO. 6, DECEMBER 1997 907 Distributed Channel Allocation for PCN with Variable Rate Traffic Partha P. Bhattacharya, Leonidas Georgiadis, Senior Member, IEEE,

More information