220 likes | 359 Views
Coverage Problem in Sensor Networks. Qinghui Tang. Related Papers. 1) S. Meguerdichian, F. Koushanfar, M. Potkonjak, and M. Srivastava . Coverage problems in wireless ad-hoc sensor networks . In Proc. of the Conf. on Computer Communications (INFOCOM), 2001.
E N D
Coverage Problem in Sensor Networks Qinghui Tang
Related Papers • 1) S. Meguerdichian, F. Koushanfar, M. Potkonjak, and M. Srivastava. Coverage problems in wireless ad-hoc sensor networks. In Proc. of the Conf. on Computer Communications (INFOCOM), 2001. • 2) S. Meguerdichian, F. Koushanfar, G. Qu, M. Potkonjak, "Exposure in Wireless Ad Hoc Sensor Networks", In Proceedings of 7th Annual International Conference on Mobile Computing and Networking (MobiCom '01), pp. 139-150, July 2001.
Importance of Coverage Problem • How well do the sensors observe the physical space. • Placement (deployment) and Cost • A measure of QoS • Ability to detect events • Latency of detection (and reporting) • Accuracy (redundancy)
Classification of Coverage Problem • Algorithms • Centralized, distributed, localized • Deployment • Deterministic, Stochastic
Classification of Coverage Problem • Area coverage • Point (node) coverage • Connection Coverage • Barrier coverage
Barrier Coverage • Goal : minimizing the probability of undetected penetration
Voronoi Diagram • Each polygon contains exactly one point • consists of the points closer to center point object than to any others • Polygon edge are equidistant from neighboring points.
Delaunay Triangulation The Delaunay triangulation is a triangulation which is equivalent to the nerve of the cells in a Voronoi diagram
Worst Case Coverage: Maximal Breach Path Breach path: finding areas of lower observability from sensor nodes
Best Case Coverage: Maximal Support Path • Support path: finding areas of high observability from sensor nodes
breach_weight & support_weight • breach_weight : the minimum distance from sensors that an agent must encounter • support_weight : the maximum distance from the closest sensors that an agent must encounter at least once.
Sensor Exposure Suppose S(s,p) represents the non-negative sensibility of sensor s to the point p. All-Sensor Field Intensity. The Exposure for an object in the sensor field during the interval [t1,t2]along the path p(t) is:
Result : • Continuous domain problem change to discrete domain
Result : Deterministic deployment • cross-based provided the best level of exposure, followed by the triangle-based scheme. • Deterministic deployment was higher than the average randomly generated network topology.
Summary Maximal Breach Path Maximal Support Path Maximal Exposure Path
Questions ? • Thank you