Distributed Hole Detection Algorithms for Wireless Sensor Networks

被引:17
|
作者
Ghosh, Pradipta [1 ]
Krishnamachari, Bhaskar [1 ]
Gao, Jie [2 ]
Gasparri, Andrea [3 ]
机构
[1] Univ Southern Calif, Ming Hsieh Dept Elect Engn, Los Angeles, CA 90089 USA
[2] SUNY Stony Brook, Comp Sci, Stony Brook, NY 11794 USA
[3] Univ Roma Tre, Dipartimento Ingn, Rome, Italy
关键词
D O I
10.1109/MASS.2014.25
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We present two novel distributed algorithms for hole detection in a wireless sensor network (WSN) based on the distributed Delaunay triangulation of the underlying communication graph. The first, which we refer to as the distance-vector hole determination (DVHD) algorithm, is based on traditional distance vector routing for multi-hop networks and shortest path lengths between node pairs. The second, which we refer to as the Gaussian curvature-based hole determination (GCHD) algorithm, applies the Gauss-Bonnet theorem on the Delaunay graph to calculate the number of holes based on the graph's Gaussian curvature. We present a detailed comparative performance analysis of both methods based on simulations, showing that while DVHD is conceptually simpler, the GCHD algorithm shows better performance with respect to run-time and message count per node.
引用
收藏
页码:257 / 261
页数:5
相关论文
共 50 条
  • [31] Distributed algorithms for barrier coverage via sensor rotation in wireless sensor networks
    Yueshi Wu
    Mihaela Cardei
    [J]. Journal of Combinatorial Optimization, 2018, 36 : 230 - 251
  • [32] Distributed Detection of Local Phenomena with Wireless Sensor Networks
    Lucchi, Matteo
    Chiani, Marco
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [33] A System for Distributed Event Detection in Wireless Sensor Networks
    Wittenburg, Georg
    Dziengel, Norman
    Wartenburger, Christian
    Schiller, Jochen
    [J]. PROCEEDINGS OF THE 9TH ACM/IEEE INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS, 2010, : 94 - 104
  • [34] Distributed Detection of Jamming and Defense in Wireless Sensor Networks
    Lin, Ying
    Li, Mingyan
    [J]. 2009 43RD ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1 AND 2, 2009, : 829 - +
  • [35] Distributed detection in bandwidth constrained wireless sensor networks
    Thejaswi, C
    Patro, RK
    [J]. 2006 IEEE RADIO AND WIRELESS SYMPOSIUM, PROCEEDINGS, 2006, : 95 - 98
  • [36] Distributed Intrusion Detection System for Wireless Sensor Networks
    Medhat, Karen
    Ramadan, Rabie A.
    Talkhan, Ihab
    [J]. 2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 234 - 239
  • [37] Distributed Detection of Clone Attacks in Wireless Sensor Networks
    Conti, Mauro
    Di Pietro, Roberto
    Mancini, Luigi Vincenzo
    Mei, Alessandro
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (05) : 685 - 698
  • [38] Hierarchical censoring for distributed detection in wireless sensor networks
    Patwari, N
    Hero, AO
    [J]. 2003 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL IV, PROCEEDINGS: SIGNAL PROCESSING FOR COMMUNICATIONS SPECIAL SESSIONS, 2003, : 848 - 851
  • [39] Distributed routing for signal detection in wireless sensor networks
    Qiu, Wanzhi
    Skafidas, Efstratios
    [J]. COMPUTER NETWORKS, 2013, 57 (18) : 3957 - 3966
  • [40] Distributed Detection of Wormhole Attacks in Wireless Sensor Networks
    de Graaf, Rennie
    Hegazy, Islam
    Horton, Jeffrey
    Safavi-Naini, Reihaneh
    [J]. AD HOC NETWORKS, 2010, 28 : 208 - +