1 A Coverage-Preserving & Hole Tolerant Based Scheme for the Irregular Sensing Range in WSN Azzedine Boukerche, Xin Fei, Regina B. Araujo PARADISE Research.

Slides:



Advertisements
Similar presentations
Yang Yang, Miao Jin, Hongyi Wu Presenter: Buri Ban The Center for Advanced Computer Studies (CACS) University of Louisiana at Lafayette 3D Surface Localization.
Advertisements

Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Coverage Estimation in Heterogeneous Visual Sensor Networks Mahmut Karakaya and Hairong Qi Advanced Imaging & Collaborative Information Processing Laboratory.
Beyond Trilateration: On the Localizability of Wireless Ad Hoc Networks Reported by: 莫斌.
Coverage Preserving Redundancy Elimination in Sensor Networks Bogdan Carbunar, Ananth Grama, Jan Vitek Computer Sciences Department Purdue University West.
KAIST Adaptive Triangular Deployment Algorithm for Unattended Mobile Sensor Networks Suho Yang (September 4, 2008) Ming Ma, Yuanyuan Yang IEEE Transactions.
Target Tracking Algorithm based on Minimal Contour in Wireless Sensor Networks Jaehoon Jeong, Taehyun Hwang, Tian He, and David Du Department of Computer.
Randomized k-Coverage Algorithms for Dense Sensor Networks
Data Transmission and Base Station Placement for Optimizing Network Lifetime. E. Arkin, V. Polishchuk, A. Efrat, S. Ramasubramanian,V. PolishchukA. EfratS.
The Chinese Univ. of Hong Kong Dept. of Computer Science & Engineering A Sensibility-Based Sleeping Configuration Protocol for Dependable Wireless Sensor.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
A Hierarchical Energy-Efficient Framework for Data Aggregation in Wireless Sensor Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 3, MAY.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 9 Introduction to Networks and the Internet.
Computing the Delaunay Triangulation By Nacha Chavez Math 870 Computational Geometry; Ch.9; de Berg, van Kreveld, Overmars, Schwarzkopf By Nacha Chavez.
The Chinese Univ. of Hong Kong Node Scheduling Schemes for Coverage Preservation and Fault Tolerance in Wireless Sensor Networks Chen Xinyu Group Meeting.
1 Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network Prof. Yu-Chee Tseng Department of Computer Science National Chiao-Tung University.
An Energy-efficient Target Tracking Algorithm in Wireless Sensor Networks Wang Duoqiang, Lv Mingke, Qin Qi School of Computer Science and technology Huazhong.
Lifetime and Coverage Guarantees Through Distributed Coordinate- Free Sensor Activation ACM MOBICOM 2009.
A Sweeper Scheme for Localization and Mobility Prediction in Underwater Acoustic Sensor Networks K. T. DharanC. Srimathi*Soo-Hyun Park VIT University Vellore,
Dynamic Coverage Enhancement for Object Tracking in Hybrid Sensor Networks Computer Science and Information Engineering Department Fu-Jen Catholic University.
Miao Zhao, Ming Ma and Yuanyuan Yang
A novel gossip-based sensing coverage algorithm for dense wireless sensor networks Vinh Tran-Quang a, Takumi Miyoshi a,b a Graduate School of Engineering,
Shih-Chieh Lee 1 Detection and Tracking of Region-Based Evolving Targets in Sensor Networks Chunyu Jiang, Guozhu Dong, Bin Wang Wright State University.
WMNL Sensors Deployment Enhancement by a Mobile Robot in Wireless Sensor Networks Ridha Soua, Leila Saidane, Pascale Minet 2010 IEEE Ninth International.
APPL: Anchor Path Planning –based Localization for Wireless Sensor Networks Imane BENKHELIFA and Samira MOUSSAOUI LSI, Computer Science Department Houari.
Boundary Recognition in Sensor Networks by Topology Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B.
HETEROGENEOUS WIRELESS SENSOR NETWORK DEPLOYMENT Yeh-Ching Chung Department of Computer Science National Tsing Hua University.
Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor Networks Yong-hwan Kim Korea.
Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Cardei, M.; Jie Wu; Mingming Lu; Pervaiz, M.O.; Wireless And Mobile.
Coordinated Sensor Deployment for Improving Secure Communications and Sensing Coverage Yinian Mao, Min Wu Security of ad hoc and Sensor Networks, Proceedings.
On Energy-Efficient Trap Coverage in Wireless Sensor Networks Junkun Li, Jiming Chen, Shibo He, Tian He, Yu Gu, Youxian Sun Zhejiang University, China.
Xiaobing Wu, Guihai Chen
P-Percent Coverage Schedule in Wireless Sensor Networks Shan Gao, Xiaoming Wang, Yingshu Li Georgia State University and Shaanxi Normal University IEEE.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
Survey: Barrier Coverage with Wireless Sensor Networks. Feras Batarseh EEL 6788.
Trade-offs Between Mobility and Density for Coverage in Wireless Sensor Networks Wei Wang, Vikram Srinivasan and Kee-Chaing Chua National University of.
1 Probabilistic Coverage in Wireless Sensor Networks Nadeem Ahmed, Salil S. Kanhere and Sanjay Jha Computer Science and Engineering, University of New.
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Efficient k-Coverage Algorithms for Wireless Sensor Networks Mohamed Hefeeda.
11/25/2015 Wireless Sensor Networks COE 499 Localization Tarek Sheltami KFUPM CCSE COE 1.
University “Ss. Cyril and Methodus” SKOPJE Cluster-based MDS Algorithm for Nodes Localization in Wireless Sensor Networks Ass. Biljana Stojkoska.
Chinh T. Vu, Yingshu Li Computer Science Department Georgia State University IEEE percom 2009 Delaunay-triangulation based complete coverage in wireless.
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
LOCALIZED MINIMUM - ENERGY BROADCASTING IN AD - HOC NETWORKS Paper By : Julien Cartigny, David Simplot, And Ivan Stojmenovic Instructor : Dr Yingshu Li.
Hole Detection and Boundary Recognition in Wireless Sensor Networks Kun-Ying Hsieh ( 謝坤穎 ) Dept. of Computer Science and Information Engineering National.
Data Gathering in Wireless Sensor Networks with Mobile Collectors Ming Ma and Yuanyuan Yang State University of New York, Stony Brook 1 IEEE Parallel and.
A Coverage-Preserving Node Scheduling Scheme for Large Wireless Sensor Networks Di Tian, and Nicolas D. Georanas ACM WSNA ‘ 02.
Mobile Sensor Deployment for a Dynamic Cluster-based Target Tracking Sensor Network Niaoning Shan and Jindong Tan Department of Electrical and Computter.
Adaptive Triangular Deployment Algorithm for Unattended Mobile Sensor Networks Ming Ma and Yuanyuan Yang Department of Electrical & Computer Engineering.
Distributed Topology Control In Wireless Sensor Networks with Assymetric Links Presenter: Himali Saxena.
Xiaoyuan Liang, Jie Tian, Guiling Wang New Jersey Institute of Technology Deploying Mobile Survivability-Heterogeneous Sensor Networks for Barrier Coverage.
Maximal Independent Set and Connected Dominating Set Xiaofeng Gao Research Group on Mobile Computing and Wireless Networking Univ. of Texas at Dallas.
Saran Jenjaturong, Chalermek Intanagonwiwat Department of Computer Engineering Chulalongkorn University Bangkok, Thailand IEEE CROWNCOM 2008 acceptance.
Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, Shojiro Nishio
Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network You-Chiun Wang, Chun-Chi Hu, and Yu-Chee Tseng IEEE Transactions on Mobile Computing.
1 Power Efficient Monitoring Management in Sensor Networks A.Zelikovsky Georgia State joint work with P. BermanPennstate G. Calinescu Illinois IT C. Shah.
Zijian Wang, Eyuphan Bulut, and Boleslaw K. Szymanski Center for Pervasive Computing and Networking and Department of Computer Science Rensselaer Polytechnic.
A Coverage-Preserving and Hole Tolerant Based Scheme for the Irregular Sensing Range in WSNs Azzedine Boukerche, Xin Fei PARADISE Research Lab Univeristy.
I owa S tate U niversity Laboratory for Advanced Networks (LAN) Coverage and Connectivity Control of Wireless Sensor Networks under Mobility Qiang QiuAhmed.
Scalable Coverage Maintenance for Dense Wireless Sensor Networks Jun Lu, Jinsu Wang, Tatsuya Suda University of California, Irvine Secon ‘ 06.
Coverage and Deployment 1. Coverage Problems Coverage: is a measure of the Quality of Service (QoS) of a sensor network How well can the network observe.
Mingze Zhang, Mun Choon Chan and A. L. Ananda School of Computing
Prof. Yu-Chee Tseng Department of Computer Science
Abstract In this paper, the k-coverage problem is formulated as a decision problem, whose goal is to determine whether every point in the service area.
Dynamic Coverage In Wireless Ed-Hoc Sensor Networks
Power Efficient Monitoring Management In Sensor Networks
The Coverage Problem in a Wireless Sensor Network
Connected Sensor Cover Problem
Survey on Coverage Problems in Wireless Sensor Networks - 2
Survey on Coverage Problems in Wireless Sensor Networks
at University of Texas at Dallas
Presentation transcript:

1 A Coverage-Preserving & Hole Tolerant Based Scheme for the Irregular Sensing Range in WSN Azzedine Boukerche, Xin Fei, Regina B. Araujo PARADISE Research Laboratory, University of Ottawa IEEE GLOBECOM 2006

2 Outline  Introduction  Intersection Point Method  Conclusions

3 Introduction  Wireless sensor networks (WSN) Tiny, low-power devices Sensing units, transceiver, actuators, and even mobilizers Gather and process environmental information  WSN applications Surveillance Biological detection Monitoring

4 Work motivation  Can a distributed scheme that solves the coverage problem under a polygon sensing range without relying on the GPS system be devised?  Another interesting aspect of coverage is tolerance to holes (blind areas) since high accuracy coverage is not always necessary (the accuracy for tracking a person is not the same as that for tracking a tank)

5 Outline  Introduction  Intersection Point Method  Conclusions

6 Intersection Point Method: Assume  The sensors ’ density is high enough that only part of them are able to monitor the desired region R m  The Sensing range is a closed simple polygon and can be detected by sensors.  The Communication range is twice the maximum sensing range

7 Definitions (1/3)  [Transmission Neighboring Set]: Consider a set of sensors {p 1...p n } in a finite area δ. If we assume that r is the radio radius of a sensor, then the neighboring sensor set TNS pi of sensor p i is defined as: TNS pi = {n ∈ ℵ | distance(p i, p j ) < r, p i  p j }  [Sensing Neighboring Set]: Consider a set of sensors {p 1...p n } in a finite area δ. If we assume that SR is the sensing range of a sensor, then the neighboring sensor set SNS pi of sensor pi is defined as: SNS pi = {n ∈ ℵ | SR pi ∩ SR pj  φ, p i  p j }

8 Definitions (2/3)  [Candidate-Fully Sponsored Sensor]: We refer to a node A as a Candidate or as fully sponsored by its neighbors if the sensing area S(A) is fully covered by S(SNS A ) where SNS A represents the sensing neighboring set of sensor A, denoted SNS A → A  [Simple Polygon]: A polygon P is said to be simple (or Jordan) if the only points of the plane belonging to two polygon edges of P are the polygon vertices of P FS

9 Definitions (3/3)  [ Intersection Point of Polygons ]: A point p is said to be an intersection point of two polygons if the two edges, which generate such a point, belong to different polygons. If there is no vertex of any other polygon located in exactly the same location, such a point p is called a Line Intersection Point of Polygons (LIP) Otherwise, it is called a Vertex Intersection Point of Polygons (VIP)  [ Intersection sub-polygon ]: A sub-polygon of polygon P is considered to be an Intersection sub-polygon if its vertices belong to the Intersection Points set of P and P ’ s neighbors. If such a sub-polygon exists inside of P we consider it to be a Breach Intersection Polygon FS

10 Basic Lemma 1  A polygon P is fully covered by its sponsors only if there is no intersection point p ’ ∈ P, which is generated by two sponsor polygons P 1, P 2, and it is covered only by polygon P

11 Intersection Point Method  In the simple polygon world, the relation of polygons is fourfold: inside, overlapping, tilling and intersecting  We can determine that polygon A is inside polygon B by checking the vertices of polygon A against those of polygon B to see if they are all inside polygon B. If no vertex is outside the range of polygon B, we can say that polygon A is inside polygon B

12 Intersection Point Method  The problem of identifying a polygon, that intersects with others and is not fully sponsored, is similar to the problem of finding the intersection sub-polygon, which is in polygon B and is only covered by polygon B  The basic solution to finding such a sub- polygon is to identify all intersection sub- polygons and map them against the sponsored polygon

13 Basic Lemma 2  If a polygon P intersects with its sponsors and is not fully sponsored, there must exist an intersection polygon inside P whose vertices are composed of the intersection points of P and its sponsors

14 Lemma ’ s consequences …  Therefore, if we can identify an intersection point in polygon P adjoined to any area that belongs only to P, we can say that P is not fully sponsored. Actually, for the off-duty scheme we are more interested in the existence of such a breach polygon than in obtaining all of the information concerning its vertices.  Thus, the following algorithm is proposed to identify a non-fully sponsored sensor

15 Algorithm: Intersection Point Method  Intersection Point Method FOR (each node q)  { Investigating all of the intersection points with neighbors by a line sweep algorithm; Removing intersection points uncovered by P; Finding an intersection Point (IP) that adjoin to a breach intersection polygon; If there is no such IP,  The tested sensor is fully sponsored;  }//end of loop

16 Key point in algorithm …  The key issue of this algorithm is the method for testing the intersection point that adjoins a breach intersection polygon  Tto resolve such a problem, the Unit Circle method was devised

17 Tolerance to Holes …  In IPM, the hole tolerance control can be supported by adjusting radius r of the Test Circle - we can allow the algorithm tolerant holes that are not larger than the Test Circle.  Figure 4 shows that when we enlarge the Test Circle from the solid line circle to the dash line circle, the breach polygon which is created by polygons X and Y and is marked as the black brick area, is ignored.

18 Outline  Introduction  Intersection Point Method  Conclusions

19 Conclusions  A new, fully-sponsored sensor discovery scheme, the Intersection Point Method (IPM), which works under the irregular sensing range  Can efficiently increase the accuracy of the discovery method through a Unit Circle Test