Snap and Spread: a self-deployment algorithm for mobile sensor networks

Size: px
Start display at page:

Download "Snap and Spread: a self-deployment algorithm for mobile sensor networks"

Transcription

1 Snap and Spread: a self-deployment algorithm for mobile sensor networks N. Bartolini, T. Calamoneri, E. Fusco, A. Massini, S. Silvestri Department of Computer Science University of Rome Sapienza, Italy {bartolini, calamo, fusco, massini, simone.silvestri}@di.uniroma1.it Abstract. The use of mobile sensors is motivated by the necessity to monitor critical areas where sensor deployment cannot be performed manually. In these working scenarios, sensors must move from their initial position to reach a final deployment which meets some given performance objectives such as covered area extension, coverage uniformity, total moving distance, number of message exchanges and convergence rate. We propose an original algorithm for autonomous deployment of mobile sensors called SNAP & SPREAD. Decisions regarding the behavior of each sensor are based on locally available information and do not require any prior knowledge of the operating conditions nor any manual tuning of key parameters. We conduct extensive simulations to evaluate the performance of our algorithm. This experimental study shows that, unlike previous solutions, our algorithm reaches a final stable deployment, covering even irregular target areas with guaranteed uniformity. Simulations also give insights on the choice of some algorithm variants that may be used under some different working scenarios. 1 Introduction The research in the field of mobile wireless sensor networks is motivated by the need of surveillance and monitoring in critical situations such as wild fires, disaster areas, toxic regions or battlefields where static sensor deployment cannot be performed manually. In these typical working scenarios, sensors may be air-dropped from an aircraft or sent from a safe location. In such situations the initial deployment is obviously far from having the desirable features of full coverage and uniform distribution over the area of interest (AOI), whereas a uniform and regular deployment is necessary to enhance the coverage, extend the network lifetime and improve the routing performance. Mobile sensors can dynamically adjust their position to improve coverage with respect to their initial deployment, thus leading to a better coverage and more uniform placement. Centralized solutions are inefficient because they require either a prior assignment of sensors to positions or a starting topology that ensures the connectivity of all sensors (for global coordination purposes). On the one hand, a prior

2 assignment is inapplicable because it requires an excessive amount of movements to deploy sensors independently of their initial position. On the other hand, connectivity cannot be guaranteed in any starting scenario. Therefore, feasible and scalable solutions should employ a distributed scheme according to which sensors make local decisions to meet global objectives. Due to the limited power availability at each sensor, energy consumption is a primary issue that must be taken into account in the design of any selfdeployment scheme for mobile sensors. Since sensor movements and, to a minor extent, message exchanges, are energy consuming activities, a deployment algorithm should minimize movements and message exchanges during deployment, while pursuing a satisfactory coverage. The main contribution of this paper is the original algorithm for mobile sensor self-deployment, SNAP & SPREAD. The proposed algorithm quickly converges to a complete, uniform and regular coverage of the AOI, independently of its shape and of the initial sensor deployment. It ensures low energy consumption and stability. It also makes the sensors traverse small distances, avoiding useless movements. Furthermore, it improves previous approaches producing, when possible, a redundant coverage. A redundant sensor placement has several benefits as it allows better target sensing, stronger environmental monitoring features, and fault tolerance capability. Additionally, a redundant coverage of the AOI allows to prolong the network life-time, for example switching-off some sensors without any loss of coverage. Our algorithm has some basic self- * properties of autonomic computing, in particular self-configuration and selfadaptation. Decisions regarding the behavior of each sensor are based on locally available information and do not require any prior knowledge of the operative scenario nor any manual tuning of key parameters. The implementation of our algorithm requires the definition of a protocol for the coordination of actions among locally communicating sensors. This protocol is designed to minimize energy consumption entailing a small number of message exchanges, which is possible because the algorithm decisions are only based on a small amount of local information. 2 The SNAP & SPREAD algorithm In order to make the exposition clearer, we divide this section into three parts. In the first one we outline the algorithm, in the second one we detail it and, finally, in the third one we propose some possible variants.

3 2.1 The idea We propose a distributed algorithm providing that each sensor pursues two main objectives: completeness and uniformity of the coverage. To this purpose, sensors aim at tiling the AOI with hexagons that are inscribed in the sensing area, so guaranteeing a complete coverage. Notice that the hexagonal tiling corresponds to a triangular lattice arrangement, that is the one that guarantees optimal coverage as discussed in [1]. Hence some sensors snap to the centers of a hexagonal tiling and spread the others to uniformly cover the AOI. These snap and spread actions are performed in an interleaved manner so that the final deployment consists in having at least one sensor at the center of each tile. A sensor, s init, is assigned the role of starter of the tiling procedure. It defines a hexagonal tiling electing its position as the center of the first hexagon. The same s init starts the snap activity selecting at most six sensors among those located within its transmission radius R TX and make them snap to the center of adjacent hexagons. Such deployed sensors, in their turn, give start to an analogous selection and snap activity thus expanding the boundary of the current tiling. This process goes on until no other snaps are possible, either because the whole AOI is covered, or because all sensors located at boundary tiles do not have any un-snapped sensor to make it snap. While the snap activity extends the hexagonal tiling, an interleaved spread activity pushes un-snapped redundant sensors toward low density areas. Namely, a snapped sensor transfers redundant sensors lying inside its hexagon to lower density tiles. The combination of these two activities expands the tiling and, at the same time, does its best to uniformly distribute redundant sensors over the tiled area. Figure 1 shows an example of the algorithm execution. Figure (a) depicts the starting configuration, with nine randomly placed sensors and (b) highlights s init starting the hexagonal tiling. In figures from (c) to (h) the starter sensor s init selects six sensors to be snapped in adjacent hexagons, according to the minimum distance criterion. Figure (i) shows the configuration after the snap action of s init. In (j), while s init starts the spread action sending its slave to a lower density hexagon, at the same time a deployed sensor starts a new snap action. In (k) the deployed sensor snaps the slave just received from the starter, reaching the final configuration (l). 2.2 Details of SNAP & SPREAD algorithm In order to describe the algorithm, we give some definitions.

4 (a) (b) (c) (d) (e) (f) (g) (h) (i) (j) (k) (l) Fig. 1. Snap and spread actions: an example. Let V be a set of equally equipped sensors. The sensor having the role of starter, s init, starts the hexagonal tiling procedure. The hexagon side length is chosen as the minimum between the sensing radius R s and 3 3 R TX. This setting guarantees both coverage and connectivity independently of the relationship between R s and R TX. A sensor being positioned in the center of a hexagon is referred to as a snapped sensor. Given a sensor x snapped to the center of a hexagon, we call slaves of x all the other sensors lying in its hexagon. We denote the set of the slaves of x by S(x) and the hexagonal area whose center is covered by x by Hex(x). All sensors that are neither snapped nor slaves are called free.

5 At the beginning, s init is prearranged as starter of the snap activity from its initial location. For fault tolerance purposes, other sensors may act as starters as well with a certain probability (inversely proportional to the number of sensors). In order to propagate the tiling, a snapped sensor x performs a neighbor discovery, determines whether some adjacent snapping positions are still to be covered and acts as leader of the corresponding snap actions. The neighbor discovery allows x to gather information regarding S(x) and all the free and snapped sensors located in radio proximity from x. We define LAP (x), Leader Available Pool of x, the set composed by the free sensors located in radio proximity to the leader x and by its slaves S(x). To give start to new snap actions, x selects the sensor in LAP (x) which is the closest to each uncovered position. A snapped sensor leads the snapping of as many adjacent hexagons as possible. The snap activity of x ends when (i) some hexagons are left uncovered because no more sensors in LAP (x) are available or (ii) all the hexagons adjacent to Hex(x) have been covered. In case (i) the leader waits until a new sensor arrives into its hexagon. In case (ii) the leader stops leading any further snapping dedicating itself only to spreading redundant sensors. Now we describe the spread activity of a snapped sensor. Given two snapped sensors x and y located in radio proximity from each other, x may offer one of its slaves to y and push it inside the hexagon of y, if S(x) S(y) + 1. Notice that, in case S(x) = S(y) + 1 slaves may indefinitely go along cycles. In order to avoid such endless cycling of slaves, we introduce an order function ord : V N which reflects the snap sequence. In particular ord(s init ) = 0, and if ord(x) = i each sensor y snapped by x will have ord(y) = i + 1. Obviously, the function ord( ) is upper-bounded by the number of available sensors V. We formalize these observations be defining the following Moving Condition, that enables the movement of a sensor from Hex(x) to Hex(y): { S(x) > S(y) + 1} { S(x) = S(y) + 1 ord(x) < ord(y)} (1) Among its slaves, x selects the sensor to push according to the criterion of minimum traversed distance. The selected sensor moves to the hexagon of a snapped sensor y selected as the one with the lowest number of slaves, among those in radio connectivity with x (on the basis of the information that x gathers during the neighbor discovery phase). If more than one hexagon contains the minimum number of sensors, the closest to x is preferred. If a snapped sensor receives a neighbor discovery request while involved in a spread activity, it replies as if the ongoing movements were already concluded. Indeed a snapped sensor communicating its own number of slaves without keep-

6 ing into account the ongoing movements may cause inconsistencies (for example either too many sensors may move to the same hexagon or the same sensor may be offered to several snapped sensors). The snapped sensors involved in a spread action always advertise their neighborhood of the changed number of slaves. Theorem 1. Algorithm SNAP & SPREAD terminates in a finite time. Proof. See Appendix A. In order to implement SNAP & SPREAD, we define a communication protocol that provides the rules to solve contentions that may happen in several cases. For example, two or more snapped sensors can decide to issue a snap command to more than one sensor towards the same hexagon tile or a low density hexagon can be selected by several snapped sensors as candidate for receiving redundant slaves. These contentions are solved by properly scheduling actions according to message time-stamps and by advertising related decisions as soon as they are made. Due to space limitations we do not give any further detail on the protocol underlying SNAP & SPREAD. 2.3 Algorithm variants Since some performance objectives such as average traversed distance, network life length, covered area, may be in contrast with each other, we introduce some algorithm variants that specifically prioritize one objective over the others. Sensor role exchange oriented to coverage endurance. According to the basic version of SNAP & SPREAD, slaves consume more energy than snapped sensors, because they are involved in a larger number of message exchanges and movements. We introduce an algorithm variant to balance the energy consumption over the set of available sensors making them exchange their roles. We name with the acronym BV the basic version of the algorithm, that does not provide any role exchange. Any time a slave has to make a movement across a hexagon as a consequence of a spread action, it evaluates the opportunity to substitute itself with the snapped sensors of the hexagon it is traversing. This role exchange has a cost for both the slave and the snapped sensor involved in the substitution. Indeed the slave sensor has to reach the center of the current hexagon and perform a profile packet exchange with the snapped sensor that has to move towards the destination of the slave. A profile packet contains the key information needed by a sensor to perform its new role after a substitution.

7 The criterion at the basis of this variant, called Uniform Energy Consumption (UEC), provides that two sensors exchange their role whenever the energy imbalance is reduced. Spread destination selection oriented to movement limitation. The basic version (BV) of algorithm SNAP & SPREAD allows any slave movements that satisfy only the Moving Condition. This can lead to unnecessary movements of redundant sensors, e.g. when many sensors are located close to the boundary of the AOI, they may move back and forth before reaching their definitive location. In order to reduce this phenomenon, we restrict the number of allowed movements, according to two possible criteria. The first one is based on a rough evaluation of a density threshold T d. This is an integer value greater than the optimal density, that is the number of sensors that would be allocated in each hexagon according to the most uniform coverage calculated off-line. This variant (Density Threshold, DT) provides that a slave movement from Hex(x) to Hex(y) is allowed if, besides the Moving Condition, the constraint S(y) < T d is satisfied, that is the number of sensors located in Hex(y) is below the density threshold. This variant avoids unnecessary movements of sensors to overcrowded hexagons that certainly exceed the optimal density. Notice that when T d < 1, this variant can not be applied as it could limit the flow of redundant sensors to the AOI boundaries, thus impeding the coverage completion. The second variant (Two Thresholds, 2T) is based on an on-line evaluation of two density thresholds T low and T high. Once established the orientation of the hexagonal tiling, s init calculates the exact number of sensors n that would be located into each hexagon in the case of uniform coverage (n is the ratio between the number of available sensors and the number of hexagons necessary to tile the AOI). This value is communicated in correspondence to every snap action. Slave movements from Hex(x) to Hex(y), satisfying the Moving Condition, will be forbidden if ( S(x) = T high ) ( S(y) = T low ) where T low = n and T high = n. This variant avoids unnecessary movements of sensors among hexagons that are already covered by the best possible number of sensors, which is either T high or T low. Notice that when T low = 1 this variant cannot be applied because it may impede the coverage completion. 3 Simulation results In order to make performance comparisons among the different policies, we developed a simulator on the basis of the wireless module of the OPNET modeler software [2].

8 In the following experiments we set R TX = 2 3R S with R s = 5 mt. This setting guarantees that each snapped sensor is able to communicate with the snapped sensors located two hexagons apart. This choice allows us to show the benefits of the substitution mechanism (UEC variant) whereas it does not imply significant changes in the qualitative analysis with respect to other settings. In all the experiments of this section we assume that the sensor speed is 1 mt/sec. The following figures 2 e 3 show how SNAP & SPREAD performs when starting with an initial configuration where 150 sensors are sent from a high density region. In figure 2 the AOI is a square 80 mt 80 mt while in figure 3 the AOI has a more complex shape in which a narrows connects two regions 40 mt 40 mt. As we will argue in section 4, previous approaches fail when applied to irregular AOIs such as the one considered in figure 3. For example, the Voronoi approach [3] does not contemplate the presence of concavity in the AOI, while the approaches based on virtual forces are not able to push sensors through narrows [4]. (a) (b) (c) (d) Fig. 2. Sensor deployment on a square, starting from a dense configuration (a) (b) (c) (d) Fig. 3. Sensor deployment on an irregular AOI, starting from a dense configuration Figure 4 shows instead how SNAP & SPREAD covers a square 80 mt 80 mt starting from a random initial deployment of 150 sensors. Either starting from a high density distribution or from a random one, the algorithm SNAP & SPREAD completely covers the AOI. Of course, the coverage is much faster and consumes less energy when starting from a random configuration. In the following figures we show some performance comparisons among the basic version of SNAP & SPREAD and the two variants DT and UEC introduced

9 (a) (b) (c) (d) Fig. 4. Sensor deployment on a square, starting from a uniform configuration in section 2.3. We use the scenario in figure 2.a, that is a square AOI 80 mt 80 mt with a high density initial sensor configuration. In order to make fair performance comparisons, we show the average results of 30 simulation runs obtained by varying the initial choice of the starter sensor s init. We do not show any result concerning 2T due to space limitations. Notice that in all the figures, in the case of variant DT the line starts when the number of sensor is 150. This is because this variant has been designed to work when the number of sensors is sufficient to entirely cover the AOI, i.e. when the threshold T d is strictly larger than 1. Figure 5 shows the time to converge to a final deployment when varying the number of available sensors. When the number of available sensors is lower than strictly necessary to cover the area even with optimal distribution, the time to converge to the final solution increases with the number of sensors because more sensors means a wider covered area. Once the number of sensors is high enough to cover the area, redundant sensors are helpful to complete the coverage faster. This explains the maximum in the curve when the number of sensors is around 150. Notice that the convergence time of UEC is larger than the other ones because it is comprehensive of the necessary time to perform substitutions. Instead, the convergence time of DT is slightly larger than the one of BV because Convergence time (sec) BV 50 UEC DT Number of sensors Coverage BV UEC DT Number of sensors Fig. 5. Time to converge to the final stable deployment Fig. 6. Percentage of AOI coverage of the final deployment

10 Avg moving distance (mt) BV UEC DT Std. dev. moving distance (mt) BV UEC DT Number of sensors Number of sensors Fig. 7. Average traversed distance Fig. 8. Std deviation of the traversed distance the additional constraints to the spread activity of DT slow down the whole process. Figure 6 shows the percentage of covered area with the three version of the algorithm, when varying the number of sensors. Note that incomplete coverages are due to a low number of sensors available and not to a wrong behavior of the algorithm. Since both mechanical movements and electronic communications consume energy, of which mechanical motion is the predominant one, we use the average traversed distance as a metric to highlight the energy consumption of the different algorithm variants. Figure 7 shows that variant DT is highly effective in reducing the energy consumed for unnecessary movements. Figure 8 complements the previous one by showing the effects of the two variants in terms of standard deviation of the traversed distance with respect to the average value. Variant UEC significantly reduces the standard deviation with respect to the other variants. Indeed this variant was designed with the purpose to equally balance the load over all the available sensors and this obviously leads to a lower deviation. This result is important if a primary objective is coverage endurance. The peak in the standard deviation obtained using the basic version of SNAP & SPREAD is due to the snap actions which govern the energy consumption when the sensors are less than 150. In case no substitutions are allowed (as in BV) the snap actions induce an initially high standard deviation of the traversed distance. Indeed sensors located close to the starter consume less energy than those that have to reach the farthest boundaries of the AOI. As we noticed before, the use of variant DT reduces unnecessary movements and consequently the average energy spent by each sensor. This results in a lower deviation as well.

11 4 Related Work There is an impressively growing interest in self-managing systems, starting from several industrial initiatives from IBM [5], Hewlett Packard [6] and Microsoft [7]. Various approaches have been proposed to self-deploy mobile sensors although few of them can be actually considered autonomic. The virtual force approach (VFA) [8 10] models the interactions among sensors as a combination of attractive and repulsive forces. This approach requires the definition of thresholds to determine the magnitude of the force one sensor exerts on another. As shown in [10], the VFA presents oscillatory sensor behavior. This problem is addressed by defining further arbitrary thresholds as stopping conditions. The tuning of such thresholds is laborious and relies on an off-line configuration. Also, it influences the resulting deployment, the overall energy consumption and the convergence rate. Moreover, this approach does not guarantee the coverage in presence of narrows. A variation of the VFA is presented in [11] where the introduction of two virtual forces guarantees better uniformity by providing at least K neighbors to each sensor. Other approaches are inspired by the physics as well, such as [12] and [13]. In [12] the sensors are modelled as particles of a compressible fluid and regulates their movement mimicking a diffusive behavior. In [13] two approaches that make use of gas theory to model sensor movements in presence of obstacles are proposed. However the last three approaches still suffer from oscillatory sensor behavior. The Voronoi approach is detailed in [3]. According to this proposal, each sensor iteratively calculates its own Voronoi polygon, determines the existence of coverage holes and moves to a better position if necessary. In this approach the relation between the transmission and the sensing range influences the obtained performances either moving sensors toward already covered positions or reducing the resulting covered area. Furthermore, this approach is not designed to improve the uniformity of an already complete coverage. According to [14] each sensor calculates a movement vector which takes into account the location of neighbor sensors to reach a final position that is as close as possible to the points of a hexagonal grid. This approach suffers from similar limitations to the VFA. Indeed it does not guarantee oscillation avoidance if not setting proper threshold parameters. In [15] the authors introduce the general concept of logical movements. Instead of moving iteratively, sensors calculate their target locations based on a distributed iterative algorithm, move logically, and exchange new logical locations with their new logical neighbors. Actual movement only occurs when sensors determine their final locations, thus sparing energy by avoiding zig-zag

12 motions at the expense of some more messaging activity. This use of virtual movement, also present in [3], will be integrated to our proposal as a future development. 5 Conclusions We proposed an original algorithm for mobile sensor self-deployment. Our algorithm outperforms previously proposed approaches in its ability to cover target areas of irregular shape. It leads to a final static coverage with guaranteed uniformity. According to the proposed algorithm, sensors located in radio proximity from each other, coordinate their movement in order to reduce the global energy consumption and its variance. Some improvements are being considered as future extension of this work, such as mechanisms to improve uniformity guarantees, obstacle detection and avoidance. References 1. P. Brass, Bounds on coverage and target detection capabilities for models of networks of mobile sensors, ACM Transactions on Sensor Networks, vol. 3, Opnet technologies inc G. Wang, G. Cao, and T. L. Porta, Movement-assisted sensor deployment, IEEE Transaction on Mobile Computing, vol. 6, A. Howard, M. J. Mataric, and G. S. Sukhatme, Mobile sensor network deployment using potential fields: A distributed, scalabel solution to the area coverage problem, Proceedings of the International Symposium on Distributed Autonomous Robotics Systems, DARS, Ibm: the vision of autonomic computing, 6. Hewlett packard: Adaptive enterprise design principles, 7. Microsoft: The drive to self-managing dynamic systems, 8. Y. Zou and K. Chakrabarty, Sensor deployment and target localization based on virtual forces, Proc. IEEE INFOCOM 03, N. Heo and P. Varshney, Energy-efficient deployment of intelligent mobile sensor networks, IEEE Transactions on Systems, Man and Cybernetics, vol. 35, J. Chen, S. Li, and Y. Sun, Novel deployment schemes for mobile sensor networks, Sensors, vol. 7, S. Poduri and G. S. Sukhatme, Constrained coverage for mobile sensor networks, Proc. of IEEE Int l Conf. on Robotics and Automation (ICRA 04), M. R. Pac, A. M. Erkmen, and I. Erkmen, Scalable self-deployment of mobile sensor networks; a fluid dynamics approach, Proc. of IEEE/RSJ Int l Conf. on Intelligent Robots and Systems (IROS 06), W. Kerr, D. Spears, W. Spears, and D. Thayer, Two formal flud models for multi-agent sweeping and obstacle avoidance, Proc. of AAMAS, M. Ma and Y. Yang, Adaptive triangular deployment algorithm for unattended mobile sensor networks, IEEE Transactions on Computers, vol. 56, G. Wang, G. Cao, and T. L. Porta, Proxy-based sensor deployment for mobile sensor networks, IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), 2004.

13 Appendix A Let us introduce some notation. Let L = {l 1, l 2,..., l L } be the set of snapped sensors. Definition 1 (Network State). A network state is a vector s whose i-th component represents the number of sensors deployed inside the hexagon Hex(i) governed by the snapped sensor i. Therefore s =< s 1, s 2,..., s L > where s i = S(i) + 1, i = 1,..., L. Definition 2 (Stable State). A network state s =< s 1,..., s L > is stable, if the Moving Condition (1) is false for each couple of snapped sensors in L located in radio proximity to each other. Theorem 1. Algorithm SNAP & SPREAD terminates in a finite time. Proof. As long as new sensors are being snapped the covered area keeps on growing. This process eventually ends either because the AOI has been completely covered or because the sensors have reached a configuration that does not allow any further expansion of the tiling. In order to prove the theorem, it suffices to prove that if no further sensor is snapped, the algorithm reaches a stable configuration in a finite time. Let us consider the set of snapped sensors L as fixed. The order function related to each snapped sensor, ord(l i ), is fixed during the unfolding of the algorithm. ( L Let f : N L N 2 defined as follows: f(s) = i=1 s2 i, ) L i=1 s i ord(l i ). We say that f(s) f(s ) if f(s) and f(s ) are in lexicographic order. We can state that function f is lower bounded by the following pair ( L, V L i=1 ord(l i)), in fact 1 s i V. Therefore if we prove that at every state change, the value of f decreases, we also prove that no infinite sequence of state changes is possible. To this purpose, let us show that every state change from s to s causes f(s) f(s ). Let us consider a generic state change which involves the snapped sensors x and y, with x sending a slave sensor to Hex(y). We have that s i = s i i x, y, and s x = s x 1 and s y = s y + 1. As the transfer of the slave has been done according to the Moving Condition (1), two cases are possible: either s x > s y + 1, or (s x = s y + 1) (ord(x) < ord(y)). In the first case, s x > s y + 1 trivially implies that L i=1 s 2 i < L i=1 s2 i. In the second case, from s x = s y + 1 and ord(x) < ord(y), easy calcuations imply that L i=1 s2 i = L i=1 s 2 i and L i=1 ord(l i)s i > L i=1 ord(l i)s i. Therefore in both cases f(s) f(s ).

14 Therefore the function f is lower bounded and always decreasing of discrete quantities (integer values) at any state change. So, after a finite number of steps, it is impossible to perform a further state change, i.e. the network will be in a stable state in a finite time.

P&P Protocol: Local Coordination of Mobile Sensors for Self-deployment

P&P Protocol: Local Coordination of Mobile Sensors for Self-deployment P&P Protocol: Local Coordination of Mobile Sensors for Self-deployment Novella Bartolini, A. Massini, S. Silvestri Department of Computer Science University of Rome "Sapienza", Italy {bartolini, massini,

More information

On adaptive density deployment to mitigate the sink-hole problem in mobile sensor networks

On adaptive density deployment to mitigate the sink-hole problem in mobile sensor networks Noname manuscript No. (will be inserted by the editor) On adaptive density deployment to mitigate the sink-hole problem in mobile sensor networks Novella Bartolini Tiziana Calamoneri Annalisa Massini Simone

More information

Voronoi-based Deployment of Mobile Sensors in the Face of Adversaries

Voronoi-based Deployment of Mobile Sensors in the Face of Adversaries Voronoi-based Deployment of Mobile Sensors in the Face of Adversaries N. Bartolini, G. Bongiovanni Department of Computer Science Sapienza University of Rome, Italy {bartolini, bongio}@di.uniroma1.it T.

More information

Distributed Coordinate-free Hole Detection and Recovery

Distributed Coordinate-free Hole Detection and Recovery Distributed Coordinate-free Hole Detection and Recovery Xiaoyun Li xliw@essex.ac.uk David K. Hunter dkhunter@essex.ac.uk Kun Yang kunyang@essex.ac.uk Abstract A distributed algorithm is introduced which

More information

Mobility Control for Complete Coverage in Wireless Sensor Networks

Mobility Control for Complete Coverage in Wireless Sensor Networks Mobility Control for Complete Coverage in Wireless Sensor Networks Zhen Jiang Computer Sci. Dept. West Chester University West Chester, PA 9383, USA zjiang@wcupa.edu Jie Wu Computer Sci. & Eng. Dept. Florida

More information

Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks

Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks Qiaoqin Li 12, Mei Yang 1, Hongyan Wang 1, Yingtao Jiang 1, Jiazhi Zeng 2 1 Department

More information

Robots-Assisted Redeployment in Wireless Sensor Networks

Robots-Assisted Redeployment in Wireless Sensor Networks Robots-Assisted Redeployment in Wireless Sensor Networks Hanen Idoudi #1, Chiraz Houaidia #2, Leila Azouz Saidane #3, Pascale Minet 4 # National School of Computer Sciences, University of Manouba Campus

More information

Geometric Considerations for Distribution of Sensors in Ad-hoc Sensor Networks

Geometric Considerations for Distribution of Sensors in Ad-hoc Sensor Networks Geometric Considerations for Distribution of Sensors in Ad-hoc Sensor Networks Ted Brown, Deniz Sarioz, Amotz Bar-Noy, Tom LaPorta, Dinesh Verma, Matthew Johnson, Hosam Rowaihy November 20, 2006 1 Introduction

More information

Energy Aware Node Placement Algorithm for Wireless Sensor Network

Energy Aware Node Placement Algorithm for Wireless Sensor Network Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 6 (2014), pp. 541-548 Research India Publications http://www.ripublication.com/aeee.htm Energy Aware Node Placement Algorithm

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

ScienceDirect. Analogy between immune system and sensor replacement using mobile robots on wireless sensor networks

ScienceDirect. Analogy between immune system and sensor replacement using mobile robots on wireless sensor networks Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 35 (2014 ) 1352 1359 18 th International Conference in Knowledge Based and Intelligent Information & Engineering Systems

More information

CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level

CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level Ali Abdi Seyedkolaei 1 and Ali Zakerolhosseini 2 1 Department of Computer, Shahid Beheshti University, Tehran,

More information

PERFECT MATCHING THE CENTRALIZED DEPLOYMENT MOBILE SENSORS THE PROBLEM SECOND PART: WIRELESS NETWORKS 2.B. SENSOR NETWORKS OF MOBILE SENSORS

PERFECT MATCHING THE CENTRALIZED DEPLOYMENT MOBILE SENSORS THE PROBLEM SECOND PART: WIRELESS NETWORKS 2.B. SENSOR NETWORKS OF MOBILE SENSORS SECOND PART: WIRELESS NETWORKS 2.B. SENSOR NETWORKS THE CENTRALIZED DEPLOYMENT OF MOBILE SENSORS I.E. THE MINIMUM WEIGHT PERFECT MATCHING 1 2 ON BIPARTITE GRAPHS Prof. Tiziana Calamoneri Network Algorithms

More information

VIRTUAL FORCE ALGORITHM AND CUCKOO SEARCH ALGORITHM FOR NODE PLACEMENT TECHNIQUE IN WIRELESS SENSOR NETWORK

VIRTUAL FORCE ALGORITHM AND CUCKOO SEARCH ALGORITHM FOR NODE PLACEMENT TECHNIQUE IN WIRELESS SENSOR NETWORK VIRTUAL FORCE ALGORITHM AND CUCKOO SEARCH ALGORITHM FOR NODE PLACEMENT TECHNIQUE IN WIRELESS SENSOR NETWORK Puteri Azwa Ahmad 1, M. Mahmuddin 2, and Mohd Hasbullah Omar 3 1 Politeknik Tuanku Syed Sirajuddin,

More information

Replacing Failed Sensor Nodes by Mobile Robots

Replacing Failed Sensor Nodes by Mobile Robots Replacing Failed Sensor Nodes by Mobile Robots Yongguo Mei, Changjiu Xian, Saumitra Das, Y. Charlie Hu and Yung-Hsiang Lu Purdue University, West Lafayette {ymei, cjx, smdas, ychu, yunglu}@purdue.edu Abstract

More information

SMART: A Scan-Based Movement-Assisted Sensor Deployment Method in Wireless Sensor Networks

SMART: A Scan-Based Movement-Assisted Sensor Deployment Method in Wireless Sensor Networks : A Scan-Based Movement-Assisted Sensor Deployment Method in Wireless Sensor Networks Jie Wu and Shuhui Yang Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL Email:

More information

Estimating the Free Region of a Sensor Node

Estimating the Free Region of a Sensor Node Estimating the Free Region of a Sensor Node Laxmi Gewali, Navin Rongratana, Jan B. Pedersen School of Computer Science, University of Nevada 4505 Maryland Parkway Las Vegas, NV, 89154, USA Abstract We

More information

Sensor Deployment, Self- Organization, And Localization. Model of Sensor Nodes. Model of Sensor Nodes. WiSe

Sensor Deployment, Self- Organization, And Localization. Model of Sensor Nodes. Model of Sensor Nodes. WiSe Sensor Deployment, Self- Organization, And Localization Material taken from Sensor Network Operations by Shashi Phoa, Thomas La Porta and Christopher Griffin, John Wiley, 2007 5/20/2008 WiSeLab@WMU; www.cs.wmich.edu/wise

More information

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

OA-DVFA: A Distributed Virtual Forces-based Algorithm to Monitor an Area with Unknown Obstacles

OA-DVFA: A Distributed Virtual Forces-based Algorithm to Monitor an Area with Unknown Obstacles OA-DVFA: A Distributed Virtual Forces-based Algorithm to Monitor an Area with Unknown Obstacles Ines Khoufi, Pascale Minet, Anis Laouiti To cite this version: Ines Khoufi, Pascale Minet, Anis Laouiti.

More information

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks William Shaw 1, Yifeng He 1, and Ivan Lee 1,2 1 Department of Electrical and Computer Engineering, Ryerson University, Toronto,

More information

A Review: Optimization of Energy in Wireless Sensor Networks

A Review: Optimization of Energy in Wireless Sensor Networks A Review: Optimization of Energy in Wireless Sensor Networks Anjali 1, Navpreet Kaur 2 1 Department of Electronics & Communication, M.Tech Scholar, Lovely Professional University, Punjab, India 2Department

More information

Optimal Movement-Assisted Sensor Deployment and Its Extensions in Wireless Sensor Networks

Optimal Movement-Assisted Sensor Deployment and Its Extensions in Wireless Sensor Networks Optimal Movement-Assisted Sensor Deployment and Its Extensions in Wireless Sensor Networks Jie Wu and Shuhui Yang Department of Computer Science and Engineering Florida Atlantic University Boca Raton,

More information

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper)

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) Ngo Duc Thuan 1,, Hiroki Nishiyama 1, Nirwan Ansari 2,andNeiKato 1 1 Graduate School of Information

More information

OPTIMIZATION OF AVERAGE DISTANCE BASED SELF-RELOCATION ALGORITHM USING AUGMENTED LAGRANGIAN METHOD

OPTIMIZATION OF AVERAGE DISTANCE BASED SELF-RELOCATION ALGORITHM USING AUGMENTED LAGRANGIAN METHOD OPTIMIZATION OF AVERAGE DISTANCE BASED SELF-RELOCATION ALGORITHM USING AUGMENTED LAGRANGIAN METHOD ABSTRACT Shivani Dadwal 1 and T. S. Panag 2 1 Deptt of Electronics and Communication Engineering, BBSBEC,

More information

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks S. Gokilarani 1, P. B. Pankajavalli 2 1 Research Scholar, Kongu Arts and Science College,

More information

PERFECT MATCHING THE CENTRALIZED DEPLOYMENT MOBILE SENSORS THE PROBLEM SECOND PART: WIRELESS NETWORKS 2.B. SENSOR NETWORKS OF MOBILE SENSORS

PERFECT MATCHING THE CENTRALIZED DEPLOYMENT MOBILE SENSORS THE PROBLEM SECOND PART: WIRELESS NETWORKS 2.B. SENSOR NETWORKS OF MOBILE SENSORS SECOND PART: WIRELESS NETWORKS.B. SENSOR NETWORKS THE CENTRALIZED DEPLOYMENT OF MOBILE SENSORS I.E. THE MINIMUM WEIGHT PERFECT MATCHING ON BIPARTITE GRAPHS Prof. Tiziana Calamoneri Network Algorithms A.y.

More information

Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1

Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1 Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1 HAI THANH MAI AND MYOUNG HO KIM Department of Computer Science Korea Advanced Institute of Science

More information

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols 1 Negative Reinforcement Time out Explicitly degrade the path by re-sending interest with lower data rate. Source Gradient New Data Path

More information

An AIAD-Based Adaptive Routing Protocol in Ad-Hoc Wireless Networks

An AIAD-Based Adaptive Routing Protocol in Ad-Hoc Wireless Networks An AIAD-Based Adaptive Routing Protocol in Ad-Hoc Wireless Networks Youn-Sik Hong 1 and Ki-Young Lee 2 1 Department of Computer Science and Eng. 2 Department of Information and Telecommunication Eng.,

More information

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks Vol. 5, No. 5, 214 Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks MOSTAFA BAGHOURI SAAD CHAKKOR ABDERRAHMANE HAJRAOUI Abstract Ameliorating

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

Algorithms on Minimizing the Maximum Sensor Movement for Barrier Coverage of a Linear Domain

Algorithms on Minimizing the Maximum Sensor Movement for Barrier Coverage of a Linear Domain Algorithms on Minimizing the Maximum Sensor Movement for Barrier Coverage of a Linear Domain Danny Z. Chen 1, Yan Gu 2, Jian Li 3, and Haitao Wang 1 1 Department of Computer Science and Engineering University

More information

Zonal Rumor Routing for. Wireless Sensor Networks

Zonal Rumor Routing for. Wireless Sensor Networks Tarun Banka Department of Electrical and Computer Engineering tarunb@engr.colostate.edu Zonal Rumor Routing for. Wireless Sensor Networks Gagan Tandon Department of Computer Science gagan@cs.colostate.edu

More information

The Best Keying Protocol for Sensor Networks

The Best Keying Protocol for Sensor Networks The Best Keying Protocol for Sensor Networks Taehwan Choi Department of Computer Science The University of Texas at Austin Email: ctlight@cs.utexas.edu H. B. Acharya Department of Computer Science The

More information

Chapter 8 LOCATION SERVICES

Chapter 8 LOCATION SERVICES Chapter 8 LOCATION SERVICES Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Mobile IP Motivation Data transfer Encapsulation Location Services & Routing Classification of location

More information

Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method

Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.5, May 2017 265 Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method Mohammad Pashaei, Hossein Ghiasy

More information

COMPARATIVE PERFORMANCE ANALYSIS OF TEEN SEP LEACH ERP EAMMH AND PEGASIS ROUTING PROTOCOLS

COMPARATIVE PERFORMANCE ANALYSIS OF TEEN SEP LEACH ERP EAMMH AND PEGASIS ROUTING PROTOCOLS COMPARATIVE PERFORMANCE ANALYSIS OF TEEN SEP LEACH ERP EAMMH AND PEGASIS ROUTING PROTOCOLS Neha Jain 1, Manasvi Mannan 2 1 Research Scholar, Electronics and Communication Engineering, Punjab College Of

More information

Regression Based Cluster Formation for Enhancement of Lifetime of WSN

Regression Based Cluster Formation for Enhancement of Lifetime of WSN Regression Based Cluster Formation for Enhancement of Lifetime of WSN K. Lakshmi Joshitha Assistant Professor Sri Sai Ram Engineering College Chennai, India lakshmijoshitha@yahoo.com A. Gangasri PG Scholar

More information

Novel Cluster Based Routing Protocol in Wireless Sensor Networks

Novel Cluster Based Routing Protocol in Wireless Sensor Networks ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 32 Novel Cluster Based Routing Protocol in Wireless Sensor Networks Bager Zarei 1, Mohammad Zeynali 2 and Vahid Majid Nezhad 3 1 Department of Computer

More information

The Effect of Neighbor Graph Connectivity on Coverage Redundancy in Wireless Sensor Networks

The Effect of Neighbor Graph Connectivity on Coverage Redundancy in Wireless Sensor Networks The Effect of Neighbor Graph Connectivity on Coverage Redundancy in Wireless Sensor Networks Eyuphan Bulut, Zijian Wang and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Jinfang Zhang, Zbigniew Dziong, Francois Gagnon and Michel Kadoch Department of Electrical Engineering, Ecole de Technologie Superieure

More information

CHAPTER SIX. the RRM creates small covering roadmaps for all tested environments.

CHAPTER SIX. the RRM creates small covering roadmaps for all tested environments. CHAPTER SIX CREATING SMALL ROADMAPS Many algorithms have been proposed that create a roadmap from which a path for a moving object can be extracted. These algorithms generally do not give guarantees on

More information

13 Sensor networks Gathering in an adversarial environment

13 Sensor networks Gathering in an adversarial environment 13 Sensor networks Wireless sensor systems have a broad range of civil and military applications such as controlling inventory in a warehouse or office complex, monitoring and disseminating traffic conditions,

More information

QoS-Enabled Video Streaming in Wireless Sensor Networks

QoS-Enabled Video Streaming in Wireless Sensor Networks QoS-Enabled Video Streaming in Wireless Sensor Networks S. Guo and T.D.C. Little Department of Electrical and Computer Engineering Boston University, Boston, MA 02215 {guosong, tdcl}@bu.edu MCL Technical

More information

IMPLEMENTATION OF A FIXING STRATEGY AND PARALLELIZATION IN A RECENT GLOBAL OPTIMIZATION METHOD

IMPLEMENTATION OF A FIXING STRATEGY AND PARALLELIZATION IN A RECENT GLOBAL OPTIMIZATION METHOD IMPLEMENTATION OF A FIXING STRATEGY AND PARALLELIZATION IN A RECENT GLOBAL OPTIMIZATION METHOD Figen Öztoprak, Ş.İlker Birbil Sabancı University Istanbul, Turkey figen@su.sabanciuniv.edu, sibirbil@sabanciuniv.edu

More information

From Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols

From Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols SIAM Journal on Computing to appear From Static to Dynamic Routing: Efficient Transformations of StoreandForward Protocols Christian Scheideler Berthold Vöcking Abstract We investigate how static storeandforward

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

Sensor Tasking and Control

Sensor Tasking and Control Sensor Tasking and Control Outline Task-Driven Sensing Roles of Sensor Nodes and Utilities Information-Based Sensor Tasking Joint Routing and Information Aggregation Summary Introduction To efficiently

More information

Motion Planning. Howie CHoset

Motion Planning. Howie CHoset Motion Planning Howie CHoset Questions Where are we? Where do we go? Which is more important? Encoders Encoders Incremental Photodetector Encoder disk LED Photoemitter Encoders - Incremental Encoders -

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Context based optimal shape coding

Context based optimal shape coding IEEE Signal Processing Society 1999 Workshop on Multimedia Signal Processing September 13-15, 1999, Copenhagen, Denmark Electronic Proceedings 1999 IEEE Context based optimal shape coding Gerry Melnikov,

More information

Chapter 14 Global Search Algorithms

Chapter 14 Global Search Algorithms Chapter 14 Global Search Algorithms An Introduction to Optimization Spring, 2015 Wei-Ta Chu 1 Introduction We discuss various search methods that attempts to search throughout the entire feasible set.

More information

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani Centre for Telecommunication and Information Engineering Monash University,

More information

Excavation Balance Routing Algorithm Simulation Based on Fuzzy Ant Colony

Excavation Balance Routing Algorithm Simulation Based on Fuzzy Ant Colony 2018 5th International Conference on Electrical & Electronics Engineering and Computer Science (ICEEECS 2018) Excavation Balance Routing Algorithm Simulation Based on Fuzzy Ant Colony Luo Xiaojuan, Yan

More information

European Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105

European Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105 European Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105 A Holistic Approach in the Development and Deployment of WSN-based

More information

Stability Analysis of M-Dimensional Asynchronous Swarms With a Fixed Communication Topology

Stability Analysis of M-Dimensional Asynchronous Swarms With a Fixed Communication Topology 76 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 48, NO. 1, JANUARY 2003 Stability Analysis of M-Dimensional Asynchronous Swarms With a Fixed Communication Topology Yang Liu, Member, IEEE, Kevin M. Passino,

More information

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS 1 K MADHURI, 2 J.KRISHNA, 3 C.SIVABALAJI II M.Tech CSE, AITS, Asst Professor CSE, AITS, Asst Professor CSE, NIST

More information

outline Sensor Network Navigation without Locations 11/5/2009 Introduction

outline Sensor Network Navigation without Locations 11/5/2009 Introduction Sensor Network Navigation without Locations Mo Li, Yunhao Liu, Jiliang Wang, and Zheng Yang Department of Computer Science and Engineering Hong Kong University of Science and Technology, outline Introduction

More information

Hole Detection and Boundary Recognition in Wireless Sensor Networks

Hole Detection and Boundary Recognition in Wireless Sensor Networks Hole Detection and Boundary Recognition in Wireless Sensor Networks Kun-Ying Hsieh Dept. of Computer Science and Information Engineering National Central University Jhongli, 32054, Taiwan E-mail: rocky@axp1.csie.ncu.edu.tw

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

Mobile Agent Driven Time Synchronized Energy Efficient WSN

Mobile Agent Driven Time Synchronized Energy Efficient WSN Mobile Agent Driven Time Synchronized Energy Efficient WSN Sharanu 1, Padmapriya Patil 2 1 M.Tech, Department of Electronics and Communication Engineering, Poojya Doddappa Appa College of Engineering,

More information

Scan-Based Movement-Assisted Sensor Deployment Methods in Wireless Sensor Networks

Scan-Based Movement-Assisted Sensor Deployment Methods in Wireless Sensor Networks Scan-Based Movement-Assisted Sensor Deployment Methods in Wireless Sensor Networks Shuhui Yang, Minglu Li, and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton,

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Time Synchronization in Wireless Sensor Networks: CCTS

Time Synchronization in Wireless Sensor Networks: CCTS Time Synchronization in Wireless Sensor Networks: CCTS 1 Nerin Thomas, 2 Smita C Thomas 1, 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: A time synchronization algorithm

More information

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs Jin Liu 1, Hongmin Ren 1, Jun Wang 2, Jin Wang 2 1 College of Information Engineering, Shanghai Maritime University,

More information

Reliable Time Synchronization Protocol for Wireless Sensor Networks

Reliable Time Synchronization Protocol for Wireless Sensor Networks Reliable Time Synchronization Protocol for Wireless Sensor Networks Soyoung Hwang and Yunju Baek Department of Computer Science and Engineering Pusan National University, Busan 69-735, South Korea {youngox,yunju}@pnu.edu

More information

Fault-tolerant in wireless sensor networks using fuzzy logic

Fault-tolerant in wireless sensor networks using fuzzy logic International Research Journal of Applied and Basic Sciences 2014 Available online at www.irjabs.com ISSN 2251-838X / Vol, 8 (9): 1276-1282 Science Explorer Publications Fault-tolerant in wireless sensor

More information

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION 5.1 INTRODUCTION Generally, deployment of Wireless Sensor Network (WSN) is based on a many

More information

Conjectures concerning the geometry of 2-point Centroidal Voronoi Tessellations

Conjectures concerning the geometry of 2-point Centroidal Voronoi Tessellations Conjectures concerning the geometry of 2-point Centroidal Voronoi Tessellations Emma Twersky May 2017 Abstract This paper is an exploration into centroidal Voronoi tessellations, or CVTs. A centroidal

More information

Dual Power Management for Network Connectivity in Wireless Sensor Networks

Dual Power Management for Network Connectivity in Wireless Sensor Networks Dual Power Management for Network Connectivity in Wireless Sensor Networks Yanxia Rong, Hongsik Choi and Hyeong-Ah Choi Department of Computer Science George Washington University Washington DC Department

More information

IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS

IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS Indu Shukla, Natarajan Meghanathan Jackson State University, Jackson MS, USA indu.shukla@jsums.edu,

More information

CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS

CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS M.SASIKUMAR 1 Assistant Professor, Dept. of Applied Mathematics and Computational Sciences, PSG College of Technology, Coimbatore, Tamilnadu,

More information

Optimized Node Deployment using Enhanced Particle Swarm Optimization for WSN

Optimized Node Deployment using Enhanced Particle Swarm Optimization for WSN Optimized Node Deployment using Enhanced Particle Swarm Optimization for WSN Arvind M Jagtap 1, Prof. M.A.Shukla 2 1,2 Smt. Kashibai Navale COE, University of Pune, India Abstract Sensor nodes deployment

More information

Energy-Efficient Security Threshold Determination Method for the Enhancement of Interleaved Hop-By-Hop Authentication

Energy-Efficient Security Threshold Determination Method for the Enhancement of Interleaved Hop-By-Hop Authentication Vol. 9, No. 12, 218 Energy-Efficient Security Threshold Determination Method for the Enhancement of Interleaved Hop-By-Hop Authentication Ye Lim Kang 1, Tae Ho Cho *2 Department of Electrical and Computer

More information

Chapter 15 Introduction to Linear Programming

Chapter 15 Introduction to Linear Programming Chapter 15 Introduction to Linear Programming An Introduction to Optimization Spring, 2015 Wei-Ta Chu 1 Brief History of Linear Programming The goal of linear programming is to determine the values of

More information

Texture Segmentation by Windowed Projection

Texture Segmentation by Windowed Projection Texture Segmentation by Windowed Projection 1, 2 Fan-Chen Tseng, 2 Ching-Chi Hsu, 2 Chiou-Shann Fuh 1 Department of Electronic Engineering National I-Lan Institute of Technology e-mail : fctseng@ccmail.ilantech.edu.tw

More information

Wave front Method Based Path Planning Algorithm for Mobile Robots

Wave front Method Based Path Planning Algorithm for Mobile Robots Wave front Method Based Path Planning Algorithm for Mobile Robots Bhavya Ghai 1 and Anupam Shukla 2 ABV- Indian Institute of Information Technology and Management, Gwalior, India 1 bhavyaghai@gmail.com,

More information

Hierarchical Low Power Consumption Technique with Location Information for Sensor Networks

Hierarchical Low Power Consumption Technique with Location Information for Sensor Networks Hierarchical Low Power Consumption Technique with Location Information for Sensor Networks Susumu Matsumae Graduate School of Science and Engineering Saga University Saga 840-8502, Japan Fukuhito Ooshita

More information

Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network

Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network P.S Patheja, Akhilesh Waoo & Parul Shrivastava Dept.of Computer Science and Engineering, B.I.S.T, Anand Nagar,

More information

Mobile Element Scheduling for Efficient Data Collection in Wireless Sensor Networks: A Survey

Mobile Element Scheduling for Efficient Data Collection in Wireless Sensor Networks: A Survey Journal of Computer Science 7 (1): 114-119, 2011 ISSN 1549-3636 2011 Science Publications Mobile Element Scheduling for Efficient Data Collection in Wireless Sensor Networks: A Survey K. Indra Gandhi and

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

Non-linear Barrier Coverage using Mobile Wireless Sensors

Non-linear Barrier Coverage using Mobile Wireless Sensors Non-linear Barrier Coverage using Mobile Wireless Sensors arxiv:1611.07397v1 [cs.ni] 22 Nov 2016 Ashutosh Baheti Dept. of Computer Sc. & Engineering Indian Institute of Technology, Kharagpur Kharagpur,

More information

Modeling Robot Path Planning with CD++

Modeling Robot Path Planning with CD++ Modeling Robot Path Planning with CD++ Gabriel Wainer Department of Systems and Computer Engineering. Carleton University. 1125 Colonel By Dr. Ottawa, Ontario, Canada. gwainer@sce.carleton.ca Abstract.

More information

Mobile Robot Path Planning in Static Environments using Particle Swarm Optimization

Mobile Robot Path Planning in Static Environments using Particle Swarm Optimization Mobile Robot Path Planning in Static Environments using Particle Swarm Optimization M. Shahab Alam, M. Usman Rafique, and M. Umer Khan Abstract Motion planning is a key element of robotics since it empowers

More information

Evaluation of Information Dissemination Characteristics in a PTS VANET

Evaluation of Information Dissemination Characteristics in a PTS VANET Evaluation of Information Dissemination Characteristics in a PTS VANET Holger Kuprian 1, Marek Meyer 2, Miguel Rios 3 1) Technische Universität Darmstadt, Multimedia Communications Lab Holger.Kuprian@KOM.tu-darmstadt.de

More information

I. INTRODUCTION. Keywords: Novelty Filter, Routing, Singular Value Decomposition, Wireless Sensor Networks, Virtual Coordinates

I. INTRODUCTION. Keywords: Novelty Filter, Routing, Singular Value Decomposition, Wireless Sensor Networks, Virtual Coordinates Dimension Reduction of Virtual Coordinate Systems in Wireless Sensor Networks * Dulanjalie C. Dhanapala and Anura P. Jayasumana Department of Electrical and Computer Engineering, Colorado State University,

More information

Randomized k-coverage Algorithms For Dense Sensor Networks

Randomized k-coverage Algorithms For Dense Sensor Networks Randomized k-coverage Algorithms For Dense Sensor Networks Mohamed Hefeeda School of Computing Science Simon Fraser University Surrey, BC, Canada Majid Bagheri School of Computing Science Simon Fraser

More information

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network Evaluating the Performance of Mobile Agent-Based Communication among Mobile Hosts in Large Ad Hoc Wireless Network S. Bandyopadhyay Krishna Paul PricewaterhouseCoopers Limited Techna Digital Systems Sector

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,

More information

On the Interdependence of Congestion and Contention in Wireless Sensor Networks

On the Interdependence of Congestion and Contention in Wireless Sensor Networks On the Interdependence of Congestion and Contention in Wireless Sensor Networks Mehmet C. Vuran Vehbi C. Gungor School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA

More information

Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks

Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks Peng-Jun Wan Khaled M. Alzoubi Ophir Frieder Abstract Connected dominating set (CDS) has been proposed as virtual backbone

More information

A Message Passing Strategy for Decentralized. Connectivity Maintenance in Multi-Agent Surveillance

A Message Passing Strategy for Decentralized. Connectivity Maintenance in Multi-Agent Surveillance A Message Passing Strategy for Decentralized Connectivity Maintenance in Multi-Agent Surveillance Derya Aksaray Boston University, Boston, MA, 225 A. Yasin Yazıcıoğlu 2 Massachusetts Institute of Technology,

More information

Developing Energy-Efficient Topologies and Routing for Wireless Sensor Networks

Developing Energy-Efficient Topologies and Routing for Wireless Sensor Networks Developing Energy-Efficient Topologies and Routing for Wireless Sensor Networks Hui Tian, Hong Shen and Teruo Matsuzawa Graduate School of Information Science Japan Advanced Institute of Science and Technology

More information

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Fatiha Djemili Tolba University of Haute Alsace GRTC Colmar, France fatiha.tolba@uha.fr Damien Magoni University

More information

Adaptive Data Dissemination in Mobile ad-hoc Networks

Adaptive Data Dissemination in Mobile ad-hoc Networks Adaptive Data Dissemination in Mobile ad-hoc Networks Joos-Hendrik Böse, Frank Bregulla, Katharina Hahn, Manuel Scholz Freie Universität Berlin, Institute of Computer Science, Takustr. 9, 14195 Berlin

More information