120 likes | 279 Views
Chpater 15 Mobile Sensor Networks. An Overview prepared by Y.C. Wang and Y.C. Tseng. Introduction. As sensors become widely deployed, some sensors may be enhanced with mobility. Such mobile sensors may be more powerful and can re-charge themselves automatically.
E N D
Chpater 15Mobile Sensor Networks An Overview prepared by Y.C. Wang and Y.C. Tseng
Introduction • As sensors become widely deployed, some sensors may be enhanced with mobility. • Such mobile sensors may be more powerful and can re-charge themselves automatically. • An important application is in the robot area. • Why need mobile sensors? • Resilient to failures • Reactive to events • Support disparate missions
Research Directions on Mobile Sensor Networks • Improve network topology • WSN deployment • WSN fault diagnosis • Enhance sensing in WSN • Enhance routing in WSN • Applications
cutvertex Improve Network Topology (1/2) • Make a stronger network • P. Basu and J. Redi, “Movement control algorithms for realization of fault-tolerant ad hoc robot networks,”IEEE Network, vol. 18, no. 4, pp. 36–44, 2004. • Find out cut-vertices and move sensors around to make the network biconnected.
Improve Network Topology (2/2) • Enhancing an existing WSN • S. Zhou, M. Y. Wu, and W. Shu, “Finding optimal placements for mobile sensors: wireless sensor network topology adjustment,” in IEEE Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication, 2004, pp. 529–532. • Randomly drop sensors may not guarantee a connected network • Add mobile sensors to connect separated components Static sensors
WSN deployment (1/3) • Virtual force • Y. Zou and K. Chakrabarty, “Sensor deployment and target localization based on virtual forces,” in IEEE INFOCOM, 2003, pp. 1293–1303. • A sensor siwill be exerted by three kinds of forces • An attractive force by the deployed area • A repulsive force by all obstacles • A force by another sensor sj (is expressed by polar coordinate notation ) moving direction of S1 wA/wR: measure of the attractive/repulsive force dth: a threshold distance
WSN deployment (2/3) • Voronoi diagram • G.Wang, G. Cao, and T. L. Porta, “Movement-assisted sensor deployment,” in IEEE INFOCOM, 2004, pp. 2469–2479. • Use Voronoi diagram to find potential coverage holes and move sensors to cover these holes Voronoi diagram Node v is farthest to the vertex u, so it moves in that direction.
WSN deployment (3/3) • Grid structure • G. Wang, G. Cao, T. L. Porta, and W. Zhang, “Sensor relocation in mobile sensor networks,” in IEEE INFOCOM, 2005, pp. 2302–2312. • Grid-quorum • A high-density grid sends Advertisements along its row • A low-density grid sends Requests along its column • Cascaded movement • A direct (long) movement can be decomposed into multiple (short) movements. This can achieve better fairness.
WSN Diagnosis • Bidding Protocol • G. Wang, G. Cao, and T. L. Porta, “A Bidding Protocol for Deploying Mobile Sensors,” in IEEE Int’l Conf. on Network Protocols, 2003, pp. 315–324. • Static sensors estimate coverage holes, and then use hole sizes to compete for mobile sensors to move in.
Enhance Sensity of WSN • Event-based motion • Z. Butler and D. Rus, “Event-based motion control for mobile-sensor networks,”IEEE Pervasive Computing, vol. 2, no. 4, pp. 34–42, 2003. • Move more sensors closer to the event locations while still maintaining complete coverage of the field (1) Initial topology of the network (2) Determine event locations (3) Move sensors around so that event areas have higher sensor density. Complete coverage is maintained.
Enhance routing in WSN • Mobile relay • W. Wang, V. Srinivasan, and K. C. Chua, “Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks”, in Mobicom, 2005, pp. 270-283. • Use mobile relay to extend the lifetime for the bottleneck nodes. • Example: sensors A and B are rotated in routing packets.
pursuer static sensor evader Applications • Pursuer-evader problem • C. Sharp, S. Schaffert, A. Woo, N. Sastry, C. Karlof, S. Sastry, and D. Culler,“Design and implementation of a sensor network system for vehicle tracking and autonomous interception,” in European Workshop on Sensor Networks, 2005, pp. 93–107. • The evader will randomly move in the sensing field • The pursuer can capture the evader by the information from the static WSN