1 Worst and Best-Case Coverage in Sensor Networks Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, Mani Srivastava IEEE TRANSACTIONS ON MOBILE.

Slides:



Advertisements
Similar presentations
Distributed Algorithms for Mobile Sensor Networks Chelsea Sanders Ben Tullis.
Advertisements

Coverage in Wireless Sensor Network Phani Teja Kuruganti AICIP lab.
1/22 Worst and Best-Case Coverage in Sensor Networks Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, and Mani Srivastava IEEE TRANSACTIONS.
Worst & Best-Case Coverage in Sensors Networks DEC 2004 Presented by: Eugene Khokhlov (847) Seapahn Megerian Ph.D. UCLA.
Comments We consider in this topic a large class of related problems that deal with proximity of points in the plane. We will: 1.Define some proximity.
Geometric Algorithms for Coverage in Wireless Sensor Networks
Approximations of points and polygonal chains
Design Guidelines for Maximizing Lifetime and Avoiding Energy Holes in Sensor Networks with Uniform Distribution and Uniform Reporting Stephan Olariu Department.
 Distance Problems: › Post Office Problem › Nearest Neighbors and Closest Pair › Largest Empty and Smallest Enclosing Circle  Sub graphs of Delaunay.
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
4/29/2015 Wireless Sensor Networks COE 499 Deployment of Sensor Networks II Tarek Sheltami KFUPM CCSE COE
Movement-Assisted Sensor Deployment Author : Guiling Wang, Guohong Cao, Tom La Porta Presenter : Young-Hwan Kim.
Coverage Algorithms Mani Srivastava & Miodrag Potkonjak, UCLA [Project: Sensorware (RSC)] & Mark Jones, Virginia Tech [Project: Dynamic Sensor Nets (ISI-East)]
KAIST Adaptive Triangular Deployment Algorithm for Unattended Mobile Sensor Networks Suho Yang (September 4, 2008) Ming Ma, Yuanyuan Yang IEEE Transactions.
Routing in WSNs through analogies with electrostatics December 2005 L. Tzevelekas I. Stavrakakis.
Network Correlated Data Gathering With Explicit Communication: NP- Completeness and Algorithms R˘azvan Cristescu, Member, IEEE, Baltasar Beferull-Lozano,
Worst and Best-Case Coverage in Sensor Networks Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, Mani Srivastava IEEE TRANSACTIONS ON MOBILE.
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
1 Distributed Navigation Algorithms for Sensor Networks Chiranjeeb Buragohain, Divyakant Agrawal, Subhash Suri Dept. of Computer Science, University of.
SMART: A Scan-based Movement- Assisted Sensor Deployment Method in Wireless Sensor Networks Jie Wu and Shuhui Yang Department of Computer Science and Engineering.
1 Two-step Routing and Apex Angle Routing for Delaunay Triangulations PhD Candidate: Weisheng Si Supervisor: Prof. Albert Y. Zomaya School of Information.
Dynamic Medial Axis Based Motion Planning in Sensor Networks Lan Lin and Hyunyoung Lee Department of Computer Science University of Denver
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
1 Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network Prof. Yu-Chee Tseng Department of Computer Science National Chiao-Tung University.
Exposure In Wireless Ad-Hoc Sensor Networks S. Megerian, F. Koushanfar, G. Qu, G. Veltri, M. Potkonjak ACM SIG MOBILE 2001 (Mobicom) Journal version: S.
The Art Gallery Problem
The Art Gallery Problem
Sensor network coverage Ref: 1.Seapahn Megerian et al., “Worst and best-case coverage in sensor networks” 2.Chi-Fu Huang and Yu-Chee Tseng, “The coverage.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
Design Automation Lab. / SNU Sensor Network Design Automation Lab. Jung, Jinyong.
Exposure In Wireless Ad-Hoc Sensor Networks Seapahn Meguerdichian Computer Science Department University of California, Los Angeles Farinaz Koushanfar.
The Coverage Problem in Wireless Ad Hoc Sensor Networks Supervisor: Prof. Sanjay Srivastava By, Rucha Kulkarni
Exposure In Wireless Ad-Hoc Sensor Networks Seapahn Meguerdichian Computer Science Department University of California, Los Angeles Farinaz Koushanfar.
Target Tracking.
Mobility Limited Flip-Based Sensor Networks Deployment Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic.
WMNL Sensors Deployment Enhancement by a Mobile Robot in Wireless Sensor Networks Ridha Soua, Leila Saidane, Pascale Minet 2010 IEEE Ninth International.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
Boundary Recognition in Sensor Networks by Topology Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B.
Prediction-based Object Tracking and Coverage in Visual Sensor Networks Tzung-Shi Chen Jiun-Jie Peng,De-Wei Lee Hua-Wen Tsai Dept. of Com. Sci. and Info.
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor Networks Yong-hwan Kim Korea.
Minimum Average Routing Path Clustering Problem in Multi-hop 2-D Underwater Sensor Networks Presented By Donghyun Kim Data Communication and Data Management.
1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.
1 Mobile-Assisted Localization in Wireless Sensor Networks Nissanka B.Priyantha, Hari Balakrishnan, Eric D. Demaine, Seth Teller IEEE INFOCOM 2005 March.
Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF.
The Application of The Improved Hybrid Ant Colony Algorithm in Vehicle Routing Optimization Problem International Conference on Future Computer and Communication,
On Graphs Supporting Greedy Forwarding for Directional Wireless Networks W. Si, B. Scholz, G. Mao, R. Boreli, et al. University of Western Sydney National.
A Study of Balanced Search Trees: Brainstorming a New Balanced Search Tree Anthony Kim, 2005 Computer Systems Research.
1 Efficient Obstacle-Avoiding Rectilinear Steiner Tree Construction Chung-Wei Lin, Szu-Yu Chen, Chi-Feng Li, Yao-Wen Chang, Chia-Lin Yang National Taiwan.
Bounded relay hop mobile data gathering in wireless sensor networks
Chinh T. Vu, Yingshu Li Computer Science Department Georgia State University IEEE percom 2009 Delaunay-triangulation based complete coverage in wireless.
Presenter : Kuang-Jui Hsu Date : 2011/3/24(Thur.).
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
Maximizing Lifetime per Unit Cost in Wireless Sensor Networks
Two Finger Caging of Concave Polygon Peam Pipattanasomporn Advisor: Attawith Sudsang.
U of Minnesota DIWANS'061 Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and.
Coverage Problems in Wireless Ad-hoc Sensor Networks Seapahn Meguerdichian 1 Farinaz Koushanfar 2 Miodrag Potkonjak 1 Mani Srivastava 2 University of California,
Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees IEEE ICDCSW, 2011 Pouya Ostovari Department of Computer and Information.
Efficient Point Coverage in Wireless Sensor Networks Jie Wang and Ning Zhong Department of Computer Science University of Massachusetts Journal of Combinatorial.
1 Power Efficient Monitoring Management in Sensor Networks A.Zelikovsky Georgia State joint work with P. BermanPennstate G. Calinescu Illinois IT C. Shah.
Spanning Trees Dijkstra (Unit 10) SOL: DM.2 Classwork worksheet Homework (day 70) Worksheet Quiz next block.
Honors Track: Competitive Programming & Problem Solving Seminar Topics Kevin Verbeek.
Coverage In Wireless Ad-Hoc Sensor Networks Shimon Tal Sion Cohen Instructor: Dr. Michael Segal.
Coverage and Deployment 1. Coverage Problems Coverage: is a measure of the Quality of Service (QoS) of a sensor network How well can the network observe.
Prof. Yu-Chee Tseng Department of Computer Science
Outline Introduction Network Model and Problem Formulation
Worst & Best-Case Coverage in Sensors Networks DEC 2004
Connectivity and Scheduling in Wireless Sensor Networks
Survey on Coverage Problems in Wireless Sensor Networks - 2
Presentation transcript:

1 Worst and Best-Case Coverage in Sensor Networks Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, Mani Srivastava IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL.4, NO. 1, JANUARY-FEBRUARY 2005 IEEE Infocom 2001IEEE Infocom 2001, Vol. 3, pp , April 2001.

2 Outlines Introduction Sensing models and assumptions Coverage formulations Maximal Breach Maximal Support Experimental Conclusion

3 Coverage Coverage can be considered as a measure of the quality of service of a sensor network. Coverage formulations can  try to find weak points in a sensor field  suggest future deployment or reconfiguration schemes for improving the overall quality of service.

4 Coverage Problem Given:  Field A  S sensors, specified by coordinates  Initial(I) and final(F) locations of an agent (I, F) How well can the field be observed ? nWorst Case Coverage: Find a maximal breach path for an agent moving in A. nBest Case Coverage: Find a maximal support path for an agent moving in A.

5 Worst Case Coverage We want to find the closest distance to sensors that an agent traveling on any path in the sensor field must encounter at least once. We determine the closest distance to sensors even if the agent tries to optimally avoid the sensors.

6 Best Case Coverage We want to find the farthest distance to sensors that an agent traveling on any path in the sensor field must have from sensors, even if it tries to stay as close to sensors as possible. At some points, the agent must move away from sensors in order to be able to traverse the field.

7 Key Highlight Transform the difficult to represent coverage problems to discrete-domain optimization using computational geometry( 計算幾何 ) and graph theory constructs: Voronoi Diagram Delaunay Triangulation

8 Sensing Model We express the general sensing model S at an arbitrary point p for a sensor s as: where d(s,p) is the Euclidean distance between the sensor s and the point p, and positive constants and K are sensor technology dependent parameters

9 Assumption Sensing effectiveness diminishes as distance increases  Homogeneous sensor nodes  Sensor node locations are known  Non-directional sensing technology  Centralized computation model

10 Coverage Formulation How well can the field be observed ? nWorst Case Coverage: Maximal Breach Path nBest Case Coverage: Maximal Support Path The “ paths ” are generally not unique. They quantify the best and worst case observability (coverage) in the sensor field.

11 Maximal Breach Path Given: Field A instrumented with sensors S; areas I and F. Breach: the minimum Euclidean distance from P to any sensor in S. Problem: Identify P B, the Maximal Breach Path in S, starting in I and ending in F. P B is defined as a path with the property that for any point p on the path P B, the distance from p to the closest sensor is maximized.

12 Enabling Step: Voronoi Diagram By construction, each line-segment maximizes distance from the nearest point (sensor). Consequence: Path of Maximal Breach of Surveillance in the sensor field lies on the Voronoi diagram lines.

13

14

15 Graph-Theoretic Formulation Given : Voronoi diagram D with vertex set V and line segment set L and sensors S Construct graph G(N,E): Each vertex v i  V corresponds to a node n i  N Each line segment l i  L corresponds to an edge e i  E Each edge e i  E, Weight(e i ) = Distance of l i from closest sensor s k  S Formulation : Is there a path from I to F which uses no edge of weight less than K?

16 Finding Maximal Breach Path Algorithm 1.Generate Voronoi Diagram 2.Apply Graph-Theoretic Abstraction 3.Search for P B Check existence of path I --> F using BFS Search for path with maximal, minimum edge weights This is a Maximal Breach Path, P B, and it is not unique.

17

18 Critical Regions 30 sensors are deployed at random.

19 Bounded Voronoi Diagram Sensor field with Voronoi Diagram and a Maximal Breach Path.

20 Maximal Support Path Given: Field A instrumented with sensors S; areas I and F. Support : the maximum Euclidean distance from the path P to the closest sensor in S.. Problem: Identify Ps, the Maximal Support Path in S, starting in I and ending in F. Only requirement: the distance from the farthest point on Ps to the closest sensor is minimized.

21 Maximal Support Path Given : Delaunay Triangulation of the sensor nodes Construct graph G(N,E): The graph is dual to the Voronoi graph previously described Formulation : what is the path from which the agent can best be observed while moving from I to F? (The path is embedded in the Delaunay graph of the sensors) Solution: Similar to the max breach algorithm, use BFS and Binary Search to find the shortest path on the Delaunay graph. Sensor field with Delaunay triangulation and a Maximal Support Path (Ps)

22 Maximal Breach Path Example (50 nodes)

23 Maximal Breach Path Example (200 nodes)

24 Maximal Breach Path – Sensor Deployment Even after deploying 100 sensors, breach coverage can be improved by about 10 percent by deploying just one more sensor.

25 Maximal Support Path – Sensor Deployment

26 Asymptotic Behavior On average, after deploying about 100 sensors, additional random sensors do not improve coverage very significantly.

27 Conclusions Best and Worst case coverage formulations Efficient optimal algorithms using computational geometry and graph theory  Maximal Breach Path (worst-case coverage)  Maximal Support Path (best-case coverage) Applications in:  Deployment  Asymptotic analysis