Location-free boundary detection in mobile wireless sensor networks with a distributed approach

被引:19
|
作者
Chu, Wei-Cheng [1 ]
Ssu, Kuo-Feng [2 ,3 ]
机构
[1] Natl Cheng Kung Univ, Inst Comp & Commun Engn, Dept Elect Engn, Tainan 70101, Taiwan
[2] Natl Cheng Kung Univ, Dept Elect Engn, Tainan 70101, Taiwan
[3] Univ Delaware, Dept Comp & Informat Sci, Newark, DE 19716 USA
关键词
Wireless sensor network; Boundary detection; Location-free; OBSTACLE DETECTION; HOLES; ALGORITHM;
D O I
10.1016/j.comnet.2014.05.005
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Location-free boundary detection is an important issue in wireless sensor networks (WSNs). Detecting and locating boundaries have a great relevance for network services, such as routing protocol and coverage verification. Previous designs, which adopt topology-based approaches to recognizing obstacles or network boundaries, do not consider the environment with mobile sensor nodes. When a network topology changes, a topology-based approach has to reconstruct all boundaries. This study develops a distributed boundary detection (DBD) algorithm for identifying the boundaries of obstacles and networks. Each node only requires the information of its three-hop neighbors. Other information (e.g., node locations) is not needed. A node with DBD can determine whether itself is a boundary node by a distributed manner. The DBD approach further identifies the outer boundary of a network. Performance evaluation demonstrates that DBD can detect boundaries accurately in both static and mobile environments. This study also includes experiments to show that DBD is applicable in a real sensor network. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:96 / 112
页数:17
相关论文
共 50 条
  • [31] Location-Free Void Avoidance Routing Protocol for Underwater Acoustic Sensor Networks
    Pradeep Nazareth
    B. R. Chandavarkar
    [J]. Wireless Personal Communications, 2022, 123 : 575 - 600
  • [32] An Evaluation of Performance of Location-Based and Location-Free Routing Protocols in Underwater Sensor Networks
    Ismail, Nasarudin
    Mohamad, Mohd Murtadha
    [J]. EMERGING TRENDS IN INTELLIGENT COMPUTING AND INFORMATICS: DATA SCIENCE, INTELLIGENT INFORMATION SYSTEMS AND SMART COMPUTING, 2020, 1073 : 615 - 624
  • [33] Adaptive, distributed location management in mobile, wireless networks
    Lee, K
    Lee, HW
    Jha, S
    Bulusu, N
    [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7, 2004, : 4077 - 4081
  • [34] An adaptive stabilizing imposter detection scheme for distributed mobile wireless sensor networks
    Alrashed, Ebrahim A.
    Karaata, Mehmet H.
    Hamdan, Ali
    Albahar, Badour
    [J]. AD HOC NETWORKS, 2017, 65 : 1 - 12
  • [35] Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks
    Abdelhakim, Mai
    Lightfoot, Leonard E.
    Ren, Jian
    Li, Tongtong
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (04) : 950 - 959
  • [36] Applying the mobile agent paradigm to distributed intrusion detection in wireless sensor networks
    Ketel, Mohammed
    [J]. PROCEEDINGS OF THE 40TH SOUTHEASTERN SYMPOSIUM ON SYSTEM THEORY, 2008, : 74 - 78
  • [37] Distributed Intrusion Detection Systems for enhancing security in mobile Wireless Sensor Networks
    Mostarda, Leonardo
    Navarra, Alfredo
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2008, 4 (02) : 83 - 109
  • [38] A joint optimization approach for distributed collaborative beamforming in mobile wireless sensor networks
    Liang, Shuang
    Fang, Zhiyi
    Sun, Geng
    Liu, Yanheng
    Qu, Guannan
    Jayaprakasam, Suhanya
    Zhang, Ying
    [J]. AD HOC NETWORKS, 2020, 106
  • [39] Efficient distributed location verification in wireless sensor networks
    Qiyuan Zhang
    Xuehai Zhou
    [J]. Frontiers of Computer Science in China, 2010, 4 : 123 - 134
  • [40] A distributed location estimating algorithm for wireless sensor networks
    Sheu, Jang-Ping
    Li, Jian-Ming
    Hsu, Chih-Shun
    [J]. IEEE INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, UBIQUITOUS, AND TRUSTWORTHY COMPUTING, VOL 1, PROCEEDINGS, 2006, : 218 - +