1 A Probabilistic Coverage Protocol for Wireless Sensor Networks Mohamed Hefeeda, Hossein Ahmadi School of Computing Science Simon Fraser University Surrey,

Slides:



Advertisements
Similar presentations
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
Advertisements

Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
1 Sensor Deployment and Target Localization Based on Virtual Forces Y. Zou and K. Chakrabarty IEEE Infocom 2003 Conference, pp ,. ACM Transactions.
Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks Xiaorui Wang, Guoliang Xing, Yuanfang Zhang*, Chenyang Lu, Robert Pless,
5/2/2015 Wireless Sensor Networks COE 499 Sleep-based Topology Control II Tarek Sheltami KFUPM CCSE COE
Tufts Wireless Laboratory Tufts University School Of Engineering Energy-Efficient Structuralized Clustering for Sensor-based Cyber Physical Systems Jierui.
Guang Tan, Stephen A. Jarvis, and Anne-Marie Kermarrec IEEE Transactions on Mobile Computing, VOL. 8, NO.6, JUNE Yun-Jung Lu.
KAIST Adaptive Triangular Deployment Algorithm for Unattended Mobile Sensor Networks Suho Yang (September 4, 2008) Ming Ma, Yuanyuan Yang IEEE Transactions.
1 School of Computing Science Simon Fraser University, Canada PCP: A Probabilistic Coverage Protocol for Wireless Sensor Networks Mohamed Hefeeda and Hossein.
July, 2007Simon Fraser University1 Probabilistic Coverage and Connectivity in Wireless Sensor Networks Hossein Ahmadi
Randomized k-Coverage Algorithms for Dense Sensor Networks
Differentiated Surveillance for Sensor Networks Ting Yan, Tian He, John A. Stankovic CS294-1 Jonathan Hui November 20, 2003.
1-1 Topology Control. 1-2 What’s topology control?
A Survey of Energy-Efficient Scheduling Mechanisms in Sensor Networks Author : Lan Wang·Yang Xiao(2006) Presented by Yi Cheng Lin.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
A Hierarchical Energy-Efficient Framework for Data Aggregation in Wireless Sensor Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 3, MAY.
EWSN 04 – Berlin, Jan. 20, 2004 Silence is Golden with High Probability: Maintaining a Connected Backbone in Wireless Sensor Networks Paolo Santi* Janos.
1 TTS: A Two-Tiered Scheduling Algorithm for Effective Energy Conservation in Wireless Sensor Networks Nurcan Tezcan & Wenye Wang Department of Electrical.
Novel Self-Configurable Positioning Technique for Multihop Wireless Networks Authors : Hongyi Wu Chong Wang Nian-Feng Tzeng IEEE/ACM TRANSACTIONS ON NETWORKING,
1 On Multiple Point Coverage in Wireless Sensor Networks Shuhui Yangy, Fei Daiz, Mihaela Cardeiy, and Jie Wuy Department of Computer Science and Engineering.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Layered Diffusion based Coverage Control in Wireless Sensor Networks Wang, Bang; Fu, Cheng; Lim, Hock Beng; Local Computer Networks, LCN nd.
Maximum Network lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Mihaela Cardei, Jie Wu, Mingming Lu, and Mohammad O. Pervaiz Department.
Energy Saving In Sensor Network Using Specialized Nodes Shahab Salehi EE 695.
1 Power Control for Distributed MAC Protocols in Wireless Ad Hoc Networks Wei Wang, Vikram Srinivasan, and Kee-Chaing Chua National University of Singapore.
The Coverage Problem in Wireless Ad Hoc Sensor Networks Supervisor: Prof. Sanjay Srivastava By, Rucha Kulkarni
Hongyu Gong, Lutian Zhao, Kainan Wang, Weijie Wu, Xinbing Wang
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha.
Mobile Ad hoc Networks Sleep-based Topology Control
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
1 Cross-Layer, Energy-Efficient Design for Supporting Continuous Queries in Wireless Sensor Networks A Quorum-Based Approach Chia-Hung Tsai, Tsu-Wen Hsu,
Using Pattern of Social Dynamics in the Design of Social Networks of Sensors - Marello Tomasini, Franco Zambonelli, Ronaldo Menezes 한국기술교육대학교 전기전자통신 공학부.
Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Cardei, M.; Jie Wu; Mingming Lu; Pervaiz, M.O.; Wireless And Mobile.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Co-Grid: an Efficient Coverage Maintenance Protocol for Distributed Sensor Networks Guoliang Xing; Chenyang Lu; Robert Pless; Joseph A. O ’ Sullivan Department.
REECH ME: Regional Energy Efficient Cluster Heads based on Maximum Energy Routing Protocol Prepared by: Arslan Haider. 1.
Vertical Optimization Of Data Transmission For Mobile Wireless Terminals MICHAEL METHFESSEL, KAI F. DOMBROWSKI, PETER LANGENDORFER, HORST FRANKENFELDT,
A new Ad Hoc Positioning System 컴퓨터 공학과 오영준.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
1 Probabilistic Coverage in Wireless Sensor Networks Nadeem Ahmed, Salil S. Kanhere and Sanjay Jha Computer Science and Engineering, University of New.
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Efficient k-Coverage Algorithms for Wireless Sensor Networks Mohamed Hefeeda.
A Dead-End Free Topology Maintenance Protocol for Geographic Forwarding in Wireless Sensor Networks IEEE Transactions on Computers, vol. 60, no. 11, November.
By Naeem Amjad 1.  Challenges  Introduction  Motivation  First Order Radio Model  Proposed Scheme  Simulations And Results  Conclusion 2.
Computer Network Lab. Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks SenSys ’ 03 Xiaorui Wang, Guoliang Xing, Yuanfang.
A Wakeup Scheme for Sensor Networks: Achieving Balance between Energy Saving and End-to-end Delay Xue Yang, Nitin H.Vaidya Department of Electrical and.
Rami Melhem Sameh Gobriel & Daniel Mosse Modeling an Energy-Efficient MAC Layer Protocol.
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks Tijs van Dam, Koen Langendoen In ACM SenSys /1/2005 Hong-Shi Wang.
Coverage and Energy Tradeoff in Density Control on Sensor Networks Yi Shang and Hongchi Shi University of Missouri-Columbia ICPADS’05.
Energy-Aware Data-Centric Routing in Microsensor Networks Azzedine Boukerche SITE, University of Ottawa, Canada Xiuzhen Cheng, Joseph Linus Dept. of Computer.
A Coverage-Preserving Node Scheduling Scheme for Large Wireless Sensor Networks Di Tian, and Nicolas D. Georanas ACM WSNA ‘ 02.
Localized Low-Power Topology Control Algorithms in IEEE based Sensor Networks Jian Ma *, Min Gao *, Qian Zhang +, L. M. Ni *, and Wenwu Zhu +
SenSys 2003 Differentiated Surveillance for Sensor Networks Ting Yan Tian He John A. Stankovic Department of Computer Science, University of Virginia November.
Saran Jenjaturong, Chalermek Intanagonwiwat Department of Computer Engineering Chulalongkorn University Bangkok, Thailand IEEE CROWNCOM 2008 acceptance.
Toward Reliable and Efficient Reporting in Wireless Sensor Networks Authors: Fatma Bouabdallah Nizar Bouabdallah Raouf Boutaba.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Structure-Free Data Aggregation in Sensor Networks.
Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network You-Chiun Wang, Chun-Chi Hu, and Yu-Chee Tseng IEEE Transactions on Mobile Computing.
/ 24 1 Deploying Wireless Sensors to Achieve Both Coverage and Connectivity Xiaole Bai Santosh Kumar Dong Xuan Computer Science and Engineering The Ohio.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Mingze Zhang, Mun Choon Chan and A. L. Ananda School of Computing
2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)
Net 435: Wireless sensor network (WSN)
Introduction Wireless Ad-Hoc Network
Speaker : Lee Heon-Jong
On Constructing k-Connected k-Dominating Set in Wireless Networks
Survey on Coverage Problems in Wireless Sensor Networks - 2
Presentation transcript:

1 A Probabilistic Coverage Protocol for Wireless Sensor Networks Mohamed Hefeeda, Hossein Ahmadi School of Computing Science Simon Fraser University Surrey, BC, Canada IEEE International Conference on Network Protocols (ICNP'07)

2 Outlines Introduction Probabilistic Coverage Probabilistic Coverage Protocol (PCP) Simulation Conclusion

3 Introduction Applications of WSN  Forest fire detection, area surveillance, and natural habitat monitoring… Sensors collaboration  Every sensor can detect an event occurring within its sensing range, and sensors collaborate in some way to deliver events, to processing centers for possible actions.

4 Introduction Disk sensing model  Detected : if an event happens at a distance less than or equal to r s from the sensor location, the sensor will deterministically detect this event.  Non-detected : an event occurring at a distance r s + ε (ε> 0) can not be detected at all, even for very small εvalues.  Fig.1(a).  May lead to: (i) deploying more sensors than needed and thus incurring higher cost, (ii) activating redundant sensors which increases interference and wastes energy, (iii) decreasing the lifetime of the sensor network.  CCP [2] : Coverage Configuration Protocol Deactivate redundant sensors by checking that all intersection points of sensing circles are covered.  OGDC [4] : Optimal Geographical Density Control Try to minimize the overlap between the sensing circles of activated sensors. [2] G. Xing, X. Wang, Y. Zhang, C. Lu, R. Pless, and C. Gill, “Integrated coverage and connectivity configuration for energy conservation in sensor networks,” ACM Transactions on Sensor Networks, vol. 1, no. 1, pp. 36–72, August [4] H. Zhang and J. Hou, “Maintaining sensing coverage and connectivity in large sensor networks,” Ad Hoc and Sensor Wireless Networks: An International Journal, vol. 1, no. 1-2, pp. 89–123, January 2005.

5 Introduction Probabilistic sensing models  Exponential model The sensing capacity degrades according to an exponential distribution after a certain threshold, Fig.1(b). CCANS[8] : Coverage-Centric Active Nodes Selection  CCANS employs the exponential sensing model.  The idea of CCANS is to start all nodes in active mode then iteratively deactivate nodes that are not needed for coverage.  Staircase model The sensing range can be modeled as layers of concentric disks with increasing diameters, and each layer has a fixed probability of sensing, Fig.1(c).  Polynomial function model A polynomial function to model the probabilistic nature of the sensing range, Fig.1(d). [8] Y Zou, K Chakrabarty, “A distributed coverage- and connectivity-centric technique for selecting active nodes in wireless sensor networks,” IEEE Transactions on Computers, vol. 54, no. 8, pp. 978– 991, August 2005.

6 [7] Y. Zou and K. Chakrabarty, “Sensor deployment and target localization in distributed sensor networks,” ACM Transactions on Embedded Computing Systems, vol. 3, no. 1, pp. 61–91, February [8] Y Zou, K Chakrabarty, “A distributed coverage- and connectivity-centric technique for selecting active nodes in wireless sensor networks,” IEEE Transactions on Computers, vol. 54, no. 8, pp. 978–991, August 2005.

7 [9] N. Ahmed, S. Kanhere, and S. Jha, “Probabilistic coverage in wireless sensor networks,” in Proc. of IEEE Conference on Local Computer Networks (LCN’05), Sydney, Australia, November 2005, pp. 672–681. [10] B. Liu and D. Towsley, “A study on the coverage of large-scale sensor networks,” in Proc. IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS’04), Fort Lauderdale, Florida, October 2004,pp. 475–483.

8 Probabilistic Coverage Definition 1 (Probabilistic Coverage): An area A is probabilistically covered by n sensors with threshold parameter θ (0 < θ ≤ 1) if P(x) = 1 − (1 − p i (x)) ≥ θ for every point x in A, where p i (x) is the probability that sensor i detects an event occurring at x.  P(x) : the collective probability from all n sensors to cover point x.  p i (x) : the probability that sensor i detects an event occurring at x.  θ : the coverage threshold parameter θ depends on the requirements of the target application. Disk sensing model : set θ = 1 and p i (x) as a binary function that takes on either 0 or 1. Definition 2 (Least-covered Point): A point x within an area A is called the least-covered point of A if P(x) ≤ P(y) for all y  x in A.

9 Probabilistic Coverage The structure of the optimal coverage using the disk sensing model. This structure minimizes the overlap between the sensing ranges of nodes. Covering an area with disks of same radius (r s ) can optimally be done by placing disks on vertices of a triangular lattice, where the side of the triangle is √3r s.[14] Location of the least-covered point in an equilateral triangle formed by three sensors. s = √3r s. [14] X. Bai, S. Kumar, D. Xuan, Z. Yun, and T. Lai, “Deploying wireless sensors to achieve both coverage and connectivity,” in Proc. of ACM MobiHoc’06, Florence, Italy, May 2006, pp. 131–142.

10 Probabilistic Coverage The main idea of our PCP  Ensure that the least-covered point in the monitored area has a probability of being sensed that is at least θ.  To implement this idea in a distributed protocol with no global knowledge.  Divide the area into smaller subareas. For each subarea, we determine the least-covered point in that subarea, and we activate the minimum number of sensors required to cover the least-covered point with a probability more than or equal to θ.  To enable our protocol to work optimally under the disk sensing model as well as probabilistic sensing models.  Divide the monitored area into equi-lateral triangles forming a triangular lattice.  Deterministic : tries to minimize the overlap between sensing ranges.  Probabilistic : stretches the separation between active sensors to its maximum while ensuring that the coverage at the least-covered point exceeds a given threshold θ.

11 The node activation process in PCP. Activated nodes try to form a triangular lattice over the area in a way that ensures that the least-covered point in each triangle has a probability of being sensed more than or equal to θ.

12 Probabilistic Coverage p(d) : the probability of detecting an event happening at a distance d from the sensor. r s : the threshold below which the sensing capacity is strong enough such that any event will be detected with probability 1. α : the sensing capacity decay factor Theorem 1 (Maximum Separation): Under the exponential sensing model defined in (1), the maximum separation s between any two active sensors on the triangular lattice to ensure that the probability of sensing at the least-covered point is at least θ is

13 Probabilistic Coverage Protocol (PCP) PCP is designed to achieve full coverage of a monitored area. PCP will ensure (with probability at least θ) that each point in the area is monitored by at least one sensor. The ideal of PCP is to activate a subset of deployed sensors to construct an approximate triangular lattice on top of the area to be covered.  The lattice is approximate because it is constructed in a distributed manner and is controlled by sensor deployment. Assumptions:  Single starting node.  Nodes are time-synchronized at a coarse-grain level.  Nodes know their locations.  Sensing ranges of all sensors follow the same probability distribution.

14 Probabilistic Coverage Protocol (PCP) PCP works in rounds of R seconds each. R is chosen to be much smaller than the average lifetime of sensors. In the beginning of each round, all nodes start running PCP independent of each other. A number of messages will be exchanged between nodes to determine which of them should be on duty (i.e., active) during the current round, and which should sleep till the beginning of the next round. The time it takes the protocol to determine active/sleep nodes is called the convergence time, and it is desired to be as small as possible. After convergence, no node changes its state and no protocol messages are exchanged till the beginning of the next round. In PCP, a node can be in one of 4 states: ACTIVE, SLEEP, WAIT, or START. In the beginning of a round, each node sets its state to be START, and selects a random startup timer T s proportional to its remaining energy level. The node with the smallest T s will become active, and broadcasts an activation message to all nodes in its communication range. The activator : the sender of activation message.

15 The state diagram of the PCP protocol. In each state, we mark which of the sensing, sending, and receiving modules is on.

16 Probabilistic Coverage Protocol (PCP) The activation message contains the coordinates of the activator. The activation message tries to activate nodes at vertices of the hexagon centered at the activator, while putting all other nodes within that hexagon to sleep. A node receiving the activation message can determine whether it is a vertex of the hexagon by measuring the distance and angle between itself and the activator. If the angle is multiple of π/3 and the distance is s, then node sets its state to ACTIVE and it becomes a new activator. Otherwise it goes to SLEEP state. PCP tries to activate the closest nodes to hexagon vertices in a distributed manner.  Every node receiving an activation message calculates an activation timer T a as a function of its closeness to the nearest vertex of the hexagon using T a = τ a (d v 2 + d a 2  2 ) d v : the Euclidean distances between the node and the vertex. d a : the Euclidean distances between the node and the activator.  : the angle between the line connecting the node with the activator and the line connecting the vertex with the activator. τ a : a constant.  The closer the node gets to the vertex, the smaller the T a will be.

17 Probabilistic Coverage Protocol (PCP) Definition 3 (δ-circle): The smallest circle drawn anywhere in the monitored area such that there is at least one node inside it is called the δ-circle, where δ is the diameter of the circle.

18 Probabilistic Coverage Protocol (PCP) Node deployment distribution determines the value of δ.  δ : the diameter of the smallest circle with at least one node inside it.  We assume that there are n nodes to be deployed on the monitored area, which is an l × l square.  Grid distribution : Nodes are deployed on a √n×√n virtual grid. The spacing between any two adjacent grid points is l/√n. To compute δ, consider any grid cell that is composed of 4 nodes forming a small square of size l/√n × l/√n. Set δ,δ=, larger than the diagonal of this small square ensures that a δ-circle drawn anywhere on the grid will contain at least one node.  Uniform distribution : Nodes are deployed according to a uniform distribution in the range [0, 2λ],  λ : the mean distance between adjacent nodes. δ should be 2√2λ.  To uniformly distribute n nodes over an l × l square, λ should be l/√n, which results in δ =  Random (uniform) deployment distribution results in larger δ values.  δ can be changed to account for node failures or decreasing node density with time.

19 Probabilistic Coverage Protocol (PCP) Multiple Starting Nodes  For large-scale sensor networks, multiple starting nodes let the coverage protocol converges faster in each round.  Faster convergence : nodes move quicker from START or WAIT state to either SLEEP or ACTIVE state, which reduces the total energy consumed in the network. START and WAIT are temporary states and they consume more energy than the SLEEP state.  Multiple starting nodes could increase the number of activated sensors because of the potential overlap between subareas that are covered due to different starting nodes.  The number of starting nodes in a round can be controlled by setting the range of the startup timer T s T s is chosen randomly between 0 and a constant τ s, 0 ≤ T s ≤ τ s  T c : the average convergence time of PCP.  If the startup timer T s of a node is less than T c, this node will become a starting node before the protocol converges.  The expected number of nodes with T s smaller than T c is k = (T c /τ s )n, which yields τ s = nT c / k τ s is scaled by the inverse of the normalized remaining energy level E r (0 < E r ≤ 1) of each node.  On average τ s = nT c / kE r to allow k nodes with the highest remaining energy levels to become starting nodes.

20 Probabilistic Coverage Protocol (PCP) Theorem 2 (Correctness and Convergence Time): The PCP protocol converges in at most l(τ a δ 2 + τ m )/(s − δ) time units with every point in the area has a probability of being sensed at least θ, unless node density is not enough to achieve coverage of the whole area.  τ a : the maximum value of the activation timer  l : the length of the area to be covered, which is assumed to be a square for simplicity of the analysis  τ m : a message transferred between two neighboring nodes takes at most τm time units, which includes propagation and transmission delays Theorem 3 (Activated Nodes and Message Complexity): The number of nodes activated by the PCP protocol is at most l 2 /√3(s − δ) 2, which is the same as the number of exchanged messages in a round. Theorem 4 (Network Connectivity): The subset of nodes activated by PCP will result in a connected network if the communication range of nodes r c is greater than or equal to the maximum separation between any two active nodes s.

21 Simulation Experimental Setup  NS-2 and our own packet level simulator in C++.  Uniformly at random deploy 20, 000 sensors over a 1km × 1km area.  2 sensing models: Disk sensing model  The sensing range of r s = 15m Exponential sensing model  Sensing capacity decay factor α = 0.05  r s = 15m  The energy model The node power consumption in transmission, reception, idle and sleep modes are 60, 12, 12, and 0.03 mWatt, respectively. The initial energy of a node is assumed to be 60 Jules.  The bandwidth of wireless communication channel : 40 kbps  The average message size : 34 bytes  A message transmission time τ m = 6.8ms  Repeat each experiment 10 times with different seeds, and report the averages.

22 Fig. 3. Validation of the PCP protocol: (a) Achieved coverage, (b) Connectivity of active nodes, and (c) Savings in number of active nodes. θ = 1denotes a deterministic (disk) sensing model. PCP ensured that 100% of the area is 1-covered.

23 Fig. 3. Validation of the PCP protocol: (a) Achieved coverage, (b) Connectivity of active nodes, and (c) Savings in number of active nodes. The maximum separation s = 34m. Our protocol achieves full connectivity when r c ≥ s. Theorem 4 (Network Connectivity).

24 Fig. 3. Validation of the PCP protocol: (a) Achieved coverage, (b) Connectivity of active nodes, and (c) Savings in number of active nodes. Less energy consumed and ultimately longer lifetimes. The savings can be increased if the coverage threshold θ is reduced.

25 Fig. 4. Robustness of the PCP protocol against: (a) Inaccurate node locations, (b) Imperfect time synchronization, and (c) Node failures. A node could have as much as 20m of error on any (or both) of its coordinates. PCP achieved full coverage even in presence of large location errors. Location inaccuracy could increase the number of active sensors.

26 Fig. 4. Robustness of the PCP protocol against: (a) Inaccurate node locations, (b) Imperfect time synchronization, and (c) Node failures. d max is the maximum clock drift, vary d max between 0 and 500ms. PCP is robust against clock drifts: It achieved full coverage in all cases. PCP converges in about 300ms on average.

27 Fig. 4. Robustness of the PCP protocol against: (a) Inaccurate node locations, (b) Imperfect time synchronization, and (c) Node failures. We randomly choose a fraction f of the nodes to be failed during the first 100 rounds of the protocol. We change f between 0% and 60%. Even with high failure rates, PCP maintained full coverage in almost all rounds.

28 Fig. 5. Energy consumption and network lifetime under PCP. Most of the nodes stay alive till round number 60. Then, they gradually die. The protocol did not over utilize some nodes in early rounds, otherwise, they would have died earlier. The coverage is maintained in most of the area throughout the network lifetime.

29 Fig. 6. Comparison between PCP and CCANS[8]. For both simulations, we show the minimum, average, and maximum values. PCP activates a much smaller number of nodes than CCANS, while ensuring the same level of probabilistic coverage. PCP could last much longer network lifetime.

30 Fig. 7. Comparison between PCP, OGDC[4], and CCP[2]. We use the disk sensing model for these 3 protocols. PCP protocol is much more energy conserving than CCP and OGDC. PCP protocol activates fewer number of nodes, converges faster, and exchanges fewer number of messages than CCP and OGDC.

31 Conclusion We proposed and evaluated a fully distributed, probabilistic coverage protocol. PCP protocol can be used with different sensing models, with minimal changes.

32 References [2] G. Xing, X. Wang, Y. Zhang, C. Lu, R. Pless, and C. Gill, “Integrated coverage and connectivity configuration for energy conservation in sensor networks,” ACM Transactions on Sensor Networks, vol. 1, no. 1, pp. 36–72, August [4] H. Zhang and J. Hou, “Maintaining sensing coverage and connectivity in large sensor networks,” Ad Hoc and Sensor Wireless Networks: An International Journal, vol. 1, no. 1-2, pp. 89–123, January [7] Y. Zou and K. Chakrabarty, “Sensor deployment and target localization in distributed sensor networks,” ACM Transactions on Embedded Computing Systems, vol. 3, no. 1, pp. 61–91, February [8] Y Zou, K Chakrabarty, “A distributed coverage- and connectivity-centric technique for selecting active nodes in wireless sensor networks,” IEEE Transactions on Computers, vol. 54, no. 8, pp. 978–991, August [9] N. Ahmed, S. Kanhere, and S. Jha, “Probabilistic coverage in wireless sensor networks,” in Proc. of IEEE Conference on Local Computer Networks (LCN’05), Sydney, Australia, November 2005, pp. 672–681. [10] B. Liu and D. Towsley, “A study on the coverage of large-scale sensor networks,” in Proc. IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS’04), Fort Lauderdale, Florida, October 2004,pp. 475–483.