On Multi-Round Sensor Deployment for Barrier Coverage

被引:14
|
作者
Eftekhari, Mohsen [1 ]
Narayanan, Lata [1 ]
Opatrny, Jaroslav [1 ]
机构
[1] Concordia Univ, Dept CSE, Montreal, PQ, Canada
关键词
Wireless sensor networks; Multi-round deployment; Barrier coverage; Cost model; Cost analysis; Probability of coverage;
D O I
10.1109/MASS.2013.85
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the k-barrier coverage problem, that is, the problem of deploying sensors on a border or perimeter to ensure that any intruder would be detected by at least k sensors. With random deployment of sensors, there is always a chance of gaps in coverage, thereby necessitating multiple rounds of deployment. In this paper, we study multi-round wireless sensor deployment on a border modelled as a line segment. We present two different classes of deployment strategies: complete and partial. In complete strategies, in every round, sensors are deployed over the entire border segment, while in partial strategies, sensors are deployed over only some part(s) of the border. First, we analyze the probability of k-coverage for any complete strategy as a function of parameters such as length of barrier to be covered, the width of the intruder, the sensing range of sensors, as well as the density of deployed sensors. Second, we propose two specific deployment strategies - Fixed-Density Complete and Fixed-Density Partial - and analyze the expected number of deployment rounds and expected total number of deployed sensors for each strategy. Next, we present a model for cost analysis of multi-round sensor deployment and calculate, for each deployment strategy, the expected total cost as a function of problem parameters and density of sensor deployment. Finally we find the optimal density of sensors in each round that minimizes the total expected cost of deployment for each deployment strategy. We validate our analysis by extensive simulation results.
引用
收藏
页码:310 / 318
页数:9
相关论文
共 50 条
  • [31] Multi-Round Auction for Bandwidth Assignment in Relay Transmission
    Zhou, Wei
    Jing, Tao
    Huo, Yan
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2014, 3 (04) : 361 - 364
  • [32] AntiCheetah: an Autonomic Multi-round Approach for Reliable Computing
    Di Pietro, Roberto
    Lombardi, Flavio
    Martinelli, Fabio
    Sgandurra, Daniele
    2013 IEEE 10TH INTERNATIONAL CONFERENCE ON AND 10TH INTERNATIONAL CONFERENCE ON AUTONOMIC AND TRUSTED COMPUTING (UIC/ATC) UBIQUITOUS INTELLIGENCE AND COMPUTING, 2013, : 371 - 379
  • [33] Multi-Round Contention in Wireless LANs with Multipacket Reception
    Zhang, Ying Jun
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (04) : 1503 - 1513
  • [34] Lossless Data Hiding with Multi-Round Difference Prediction
    Huang, Hsiang-Cheh
    Lin, Chuan-Chang
    Chen, Yueh-Hong
    Fang, Wai-Chi
    2014 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW), 2014,
  • [35] Multi-round cooperative search games with multiple players
    Korman, Amos
    Rodeh, Yoav
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2020, 113 : 125 - 149
  • [36] Addressing the valuation problem in multi-round combinatorial auctions
    Soumyakanti Chakraborty
    Anup K. Sen
    Amitava Bagchi
    Information Systems Frontiers, 2015, 17 : 1145 - 1160
  • [37] Multi-player and multi-round auctions with severely bounded communication
    Blumrosen, L
    Nisan, N
    Segal, I
    ALGORITHMS - ESA 2003, PROCEEDINGS, 2003, 2832 : 102 - 113
  • [38] Deployment and reallocation in mobile survivability-heterogeneous wireless sensor networks for barrier coverage
    Tian, Jie
    Liang, Xiaoyuan
    Wang, Guiling
    AD HOC NETWORKS, 2016, 36 : 321 - 331
  • [39] Improved neural distinguishers with multi-round and multi-splicing construction
    Liu, JiaShuo
    Ren, JiongJiong
    Chen, ShaoZhen
    Li, ManMan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 74
  • [40] Research on Genetic Algorithm and Nash Equilibrium in Multi-Round Procurement
    Bao Ngoc Trinh
    Quyet Thang Huynh
    Thuy Linh Nguyen
    NEW TRENDS IN INTELLIGENT SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2017, 297 : 51 - 64