Download presentation

Presentation is loading. Please wait.

Published byElian Cosgrave Modified about 1 year ago

1
Geometric Algorithms for Coverage in Wireless Sensor Networks Dr. Dinesh Dash Asst. Prof.NIT Patna

2
Outline of Talk Introduction Application of geometric algorithms in Sensor Network Geometric Algorithm for Coverage problem in sensor network Area Coverage Barrier Coverage Line Coverage

3
Introduction Sensor networks composed of a large number of sensor nodes, which are deployed to sense environmental parameters and send it to a sink.

4
Example of Sensor Network Sensing devices sense environment, do some local processing and send the sensed data to a base station directly or indirectly. Base station collator

5
Some Applications Sensor networks have been used for habitat monitoring [ mainwaring:2002 ], agriculture monitoring [ bilsa:2009 ], structure monitoring, forest fire detection, object tracking [ tsaia:2007 ], military application, etc.

6

7
Applications of Geometric Algorithms in Sensor Network Routing Localization Coverage

8
Location Based Routing Assumption Every node knows its location and its neighbors’ locations The source knows the location of destination Greedy Forwarding A node always forwards the message to a neighbor whose Euclidean distance to the destination is smaller source destination

9
The message reaches node x, no next hop can be selected for Greedy Forwarding, because both w and y are further away from D than x is. Greedy forwarding may fail

10
Planer Graph and Face Routing helps

11
Localized ways to planerize a unit disk graph Gabriel GraphRelative Neighborhood Graph

12
Face Routing source destination face

13
Localization Determines physical / relative positions of sensor nodes in the network based on known information Essential for: The development of low-cost sensor networks for use in location-aware applications Geographic routing

14
Beacon Based Algorithm

15
Coverage Coverage problem measures how well a set of deployed sensors cover(sense) an area or a set of objects

16
Different measures of coverage is possible depending on its applications Area coverage, target coverage, barrier coverage, trap coverage, perimeter coverage, line coverage, breach and support etc.

17
Coverage Algorithms

18
Measures of Coverage: Examples Area coverage [ thai:2008, bai:2005, huang:2005 ] Measures coverage of an area/region Can be full coverage (every point of the area is sensed by at least one sensor) or partial (some fraction of the area is covered) Target coverage [ cardei :2005 ] Given a set of target points, each point in the set is sensed by at least one (or k) sensor

19
Area Coverage Is the entire area covered?

20
Is the entire region k-covered? An area A is k-covered if all intersection points among the sensing circles and area boundaries are k-covered There are at most O(n 2 ) intersection points Each intersection point can be verify in O(n) An area A is k-covered iff each sensor in A is k perimeter covered

21
П2П Perimeter coverage is modeled by set of intervals and can be verified in O(n log n ) Is the perimeter k-covered?

22
Barrier coverage A rectangular belt region is said to be 1-barrier covered by the deployed sensors if all the crossing paths must intersect at least one sensor’s sensing region [kumar:2005] forts were surrounded by deep trenches

23
Barrier formed by sensors L R Open barrier Closed barrier

24
Graph view of barriers One vertex for each sensor, two dummy vertices L and R for left and right boundaries in open barrier Edge between two vertices if the sensing regions of the two sensors intersect L R

25
For open barrier a path from L to R in the graph ensures barrier coverage For closed barrier a non-contractible cycle ensures barrier coverage

26
L R Is a boundary k-barrier covered? Construct a graph G(V, E) V: sensor nodes, plus two dummy nodes L, R E: edge (u,v) if their sensing disks overlap Region is k-barrier covered iff there are k-disjoint paths between L and R

27
Line/path coverage Measures the degree of coverage of lines/paths Some variants Every point of a line segment is under the sensing range of at least one sensor [ harada:2009 ] fraction of coverage [ harada:2009 ] : the fraction of the whole path that is within the sensing range of some sensors

28
Path Coverage Maximal breach and support path [ megerian:2005 ] Breach path A path that want to maintain distance from the sensors Support path A path that want to stay close to the sensors

29
Breach and Support Breach value of a path is the minimum distance of any point on the path from the closest sensor Support value of a path is the maximum distance of any point on the path to its closest sensor i f 5 PiPi 18 PfPf Breach value support value

30
a) The maximal breach path -> Voronoi diagram b) The maximal support path -> Delaunay triangulation

31
How to find maximal breach path? Theorem : At least one Maximal Breach Path must lie on the line segments of the bounded Voronoi diagram formed by the locations of the sensors. Apply binary search and breadth first search on the weighted edge of the Voronoi diagram to find a maximal breach path

32
How to find maximal support path? Theorem : At least one maximal Support Path must lie on the edges of the Delaunay triangulation. Apply binary search and breadth first search on the weighted edge of Delaunay triangulation to find a maximal support path Find Euclidean minimum spanning tree of the set of sensors including initial and final points.

33
Line Coverage Problem

34
A line segment is said to be k-covered if it is sensed by k sensors 3-covered line segment 3-uncovered line segment

35
Definition Smallest k-covered line segment Given a sensor deployment, the minimum length line segment that intersects at least k sensors’ sensing regions Longest k-uncovered line segment Given a sensor deployment, the maximum length line segment that intersects at most k-1 sensors’ sensing regions Maximal 3-uncovered line segment Minimal 3-covered line segment

36
Problems Addressed Designed algorithms for finding smallest k-covered and longest k- uncovered line segment given a sensor deployment in a bounded rectangular region R for Axis-parallel line segments in O((n+ χ) log n) time and linear space, where n is the number of sensors and χ is the number of intersections between the circles corresponding to the sensor’s sensing regions Arbitrary line segment starting from a given point in O((n+χ) log n) time and linear space ICDCN 2012(Poster)

37
Arbitrary line segments Smallest k-covered segment in O(χ 2 logn+n 4 ) time and linear space Longest k-uncovered segment in O((χ 2 +n 3 )logn) time and linear space JPDC 2014

38
Algorithm for Smallest k-Covered Axis-Parallel Line Segment Overall approach Find the smallest k-covered horizontal line segment Find the smallest k-covered vertical line segment Choose the one with the minimum length among the two Only the algorithm for horizontal line segments discussed, the algorithm for vertical line segments is the same

39
Some Definitions Top end point Bottom-end point Left-half circle Right-half circle

40
Note: Two equal radius circles can make only one left-left intersection and one right-right intersection Left-left intersection Right-right intersection Left-right intersection

41
Minimal length k-covered horizontal segment: A k-covered horizontal line segment/interval such that no subinterval of it is k-covered. Minimal length 3-covered Horizontal segment Non Minimal length 3-covered Horizontal segment

42
Midpoint between Two Circles (x q,y q ) (x p,y p )y mid = (y p +y q ) /2 Midpoint between two circles C p and C q is the y- coordinate where the horizontal distance between the two circles is minimum. For unit circle, it is at (y p +y q )/2 where y p and y q are the y–coordinates of the centers of C p and C q respectively

43
Approach Use plane sweep paradigm Horizontal sweep line moves from top to bottom of region Proved that minimal length k-covered horizontal line segments are only created or deleted when the sweep line touches a top-endpoint, a bottom- endpoint, or a left-left or right-right intersection Keep track of all such minimal length k-covered horizontal segments created Determine the minimum length attained by each segment (using the mid-point events) Update the global minimum as necessary

44
Sweep-Line Touches the Top- Endpoint of a Circle [c 1 r,c 3 l ] [c 1 r,c 4 l ] [c 2 r,c 5 l ] Sweep line [c 2 r,c 4 l ] [c 3 r,c 5 l ] [c 0 r,c 2 l ] [c 4 r,c 6 l ] c6c6 c5c5 c4c4 c3c3 c2c2 c1c1 c0c0 Before touching top-endpoint of c 3, the set of minimal length 3-covered segments, are [c 0 r,c 2 l ], [c 1 r,c 4 l ], [c 2 r,c 5 l ], [c 4 r,c 6 l ] As it touches top-endpoint of c 3 Existing segments [c 1 r,c 4 l ], [c 2 r,c 5 l ] are deleted New segments [c 1 r,c 3 l], [c 2 r,c 4 l ], [c 3 r,c 5 l ] are created

45
Lemma : When the sweep-line touches the top-endpoint of a circle, at most k new minimal length k-covered segments can be created on the sweep line. Moreover, if x (x>0) k-covered segments are created, then exactly x−1 existing k-covered segments will be deleted.

46
Sweep-Line Touches the Bottom- Endpoint of a Circle Before touching bottom-endpoint of c 4, the set of minimal length 3-covered segments, are [c 1 r,c 3 l ], [c 2 r,c 4 l ], [c 3 r,c 5 l ], [c 4 r,c 6 l ] [c 3 r,c 5 l ] [c 2 r,c 4 l ] [c 4 r,c 6 l ] Sweep line [c 2 r,c 5 l ] [c 3 r,c 6 l ] [c 1 r,c 3 l ] c0c0 c1c1 c2c2 c3c3 c4c4 c5c5 c6c6 Existing segments [c 2 r,c 4 l ], [c 3 r,c 5 l ], [c 4 r,c 6 l ] are deleted New segments [c 2 r,c 5 l ], [c 3 r,c 6 l ] are created As it touches the bottom-endpoint of c 4

47
Lemma : When the sweep-line touches the bottom-endpoint of a circle, at most k existing k-covered segments are deleted from the sweep line. Moreover, if x (x>0) existing k- covered segments are deleted, then exactly x−1 new k-covered segments will be created.

48
Sweep-Line Crosses Right-Right Intersection of Two Circles [c 3 r,c 5 l ] Sweep line [c 2 r,c 4 l ] [c 1 r,c 3 l ] Right-right intersection c0c0 c1c1 c2c2 c3c3 c4c4 c5c5 [c 0 r,c 2 l ] [c 2 r,c 3 l ] [c 1 r,c 4 l ] Before touching right-right intersection between c 1 & c 2, the set of minimal length 3-covered segments are [c 0 r,c 2 l ], [c 2 r,c 3 l ], [c 1 r,c 4 l ], [c 3 r,c 5 l ] As it crosses the right-right intersection between c 1 & c 2 Existing segments [c 2 r,c 3 l ] & [c 1 r,c 4 l ] are deleted New segments [c 1 r,c 3 l ] & [c 2 r,c 4 l ] are created

49
Sweep-Line Touches Left-Left or Right-Right Intersection Lemma : When the sweep-line touches the left- left or right-right intersection point between two circles then it creates at most two new k-covered segments. Moreover, if x (0 ≤ x ≤ 2) new k- covered segments are created, then exactly x existing k-covered segments are deleted.

50
Sweep-line touches left-right intersection of two circles Sweep line [c 1 r,c 3 l ] [c 0 r,c 2 l ] left-right intersection c0c0 c1c1 c2c2 c3c3 Before touching left-right intersection between c 1 & c 2, the set of minimal length 3-covered segments are [c 0 r,c 2 l ], [c 1 r,c 3 l ] As it touches the intersection no existing segments are deleted as well as no new segments are created When sweep-line crosses any left-right intersection point no new k- covered intervals are created or deleted [c 1 r,c 3 l ] [c 0 r,c 2 l ]

51
Algorithm Outline Move the sweep line from top to bottom Identify when it touches a top-endpoint, bottom- endpoint, left-left intersection, right-right intersection or the mid-point where the length of a k-covered line segment is minimized (events) Keep track of the minimal length k-covered segments formed, deleted, and their minimum lengths on each such event

52
References [thai:2008] M. T. Thai, F. Wang, and D. Du. “Coverage problems in wireless sensor networks: Designs and analysis”, ACM Journal on Sensor Network, 3(3): , [megerian:2005] S. Megerian, F. Koushanfar, M. Potkonjak, and M. B. Srivastava. “Worst and best-case coverage in sensor networks”, IEEE Trans. on Mobile Computing, 4(1): , 2005 [kumar:2005] S. Kumar, T. H. Lai, and A. Arora. “Barrier coverage with wireless sensors”, In ACM MOBICOM, pages , Aug [harada:2009] J. Harada, S. Shioda, and H. Saito. “Path coverage properties of randomly deployed sensors with finite data-transmission ranges”, Computer Networks, 53(7): , [cardei:2005] M. Cardei, M.T. Thai, Y. Li, and W. Wu. “Energy efficient target coverage in wireless sensor networks”, In IEEE INFOCOM, page , March [saipulla:2010] A. Saipulla, B. Liu, G. Xing, X. Fu, and J. Wang. “Barrier coverage with sensors of limited mobility”, In Intl. Symp. on Mobile Ad Hoc Networking and Computing, pages , Sept

53
[wu:2007] C. H. Wu, K. C. Lee, and Y. C. Chung. “A delaunay triangulation based method for wireless sensor network deployment”, ACM Computer Communications, 30(14-15), [chakrabarty:2002] K. Chakrabarty, S. S. Iyengar, H. Qi, and E. Cho. “Grid coverage for surveillance and target location in distributed sensor networks”, IEEE Trans. on Computers, 51(12), [agnetis:2009] A. Agnetis, E. Grande, P. B. Mirchandani, and A. Pacifici. “Covering a line segment with variable radius discs”, Computers and Operations Research, 36(5), [sekhar:2005] A. Sekhar, B. S. Manoj, and C. S. R. Murthy. “Dynamic coverage maintenance algorithms for sensor networks with limited mobility”, In Intl. Conf. on Pervasive Computing and Communications, pages 51–60, March 2005 [wang:2005] G. Wang, G. Cao, T. L. Porta, and W. Zhang. Sensor relocation in mobile sensor networks. In IEEE INFOCOM, pages 2302–2312, March 2005.

54
[huang:2005] C. Huang and Y. Tseng. “The coverage problem in wireless sensor network”, Mobile Networks and Applications, 10(4), [tsaia:2007] H.W Tsaia, C.P. Chua, T.S. Chenb; “Mobile object tracking in wireless sensor networks”, Computer Communications Vol. 30, No. 8, 2007 [zhao:2009] M.C. Zhao, J. Lei, M.Y. Wu, Y. Liu, and W. Shu. “Surface coverage in wireless sensor networks”, In IEEE INFOCOM, pages 109–117, April [ram:2007] S. S. Ram, D. Manjunath, S. K. Iyer, and D. Yogeshwaran. On the path coverage properties of random sensor networks. IEEE Trans. on Mobile Computing, 6(5), 2007.

55
[polastre:2004] J. Polastre, R. Szewczyk, C. Sharp, and D. Culler. The mote revolution: Low power wireless sensor network devices. In Hot Chips, [bai:2005] H. Bai, X. Chen, Y.-C. Ho, and X. Guan. Percentage coverage configuration in wireless sensor networks. In Intl. Conf. on Parallel and Distributed Processing and Applications, pages 780–791, Nov [bilas2009] Vedran Bilas, Faculty of Electrical Engineering andComputing Wireless Sensor Networks in Agriculture – Olive Growing; University of Zagreb,2009 [balister:2009] P. Balister, Z. Zheng, S. Kumar, and P. Sinha. Trap coverage: Allowing coverage holes of bounded diameter in wireless sensor network. In IEEE INFOCOM, pages 136–144, April 2009 [bhattacharya:2009] B. Bhattacharya, M. Burmester, Y. Hua, E. Kranakis, Q. Shi, and A.Wiesed. “Optimal movement of mobile sensors for barrier coverage of a planar region”, Theoretical Computer Science, 410(52), 2009

56
Thanks!

Similar presentations

© 2016 SlidePlayer.com Inc.

All rights reserved.

Ads by Google