A dual approach for the worst-case-coverage deployment problem in ad-hoc wireless sensor networks

被引:0
|
作者
Gau, Rung-Hung [1 ]
Peng, Yi-Yang [1 ]
机构
[1] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Kaohsiung 804, Taiwan
关键词
sensor networks; worst-case coverage; Voronoi diagram; duality; Delaunay triangles;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In this paper, we propose and evaluate algorithms for solving the worst-case-coverage deployment problem in ad-hoc wireless sensor networks. The worst-case-coverage deployment problem is to deploy additional sensors in the wireless sensor field to optimize the worst-case coverage. We derive a duality theorem that reveals the close relation between the maximum breach path and the minimum Delaunay cut. The duality theorem is similar to the well-known max-flow-min-cut theorem in the field of network optimization. The major difference lies in the fact that the object function we study in this paper is nonlinear rather than linear. Based on the duality theorem, we propose an efficient dual algorithm to solve the worst-case-coverage deployment problem. In addition, we propose a genetic algorithm for deploying a number of additional sensors simultaneously. We use analytical proofs and simulation results to justify the usage of the proposed approaches.
引用
收藏
页码:377 / +
页数:2
相关论文
共 50 条
  • [21] An Efficient Routing Approach over Mobile Wireless Ad-Hoc Sensor Networks
    Soliman, Hamdy
    AlOtaibi, Mohammad
    2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 701 - 705
  • [22] Robust sensor localization algorithm in wireless ad-hoc sensor networks
    Ji, X
    Zha, HY
    ICCCN 2003: 12TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2003, : 527 - 532
  • [23] Fuzzy Trust Approach for Wireless Ad-hoc Networks
    Hallani, H.
    Shahrestani, S. A.
    INNOVATION AND KNOWLEDGE MANAGEMENT IN BUSINESS GLOBALIZATION: THEORY & PRACTICE, VOLS 1 AND 2, 2008, : 150 - 156
  • [24] A framework for performance evaluation of wireless ad-hoc and sensor networks
    Hekmat, R.
    An, X.
    2007 15TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, 2007, : 48 - 54
  • [25] Scaling laws and operation of wireless ad-hoc and sensor networks
    Aeron, S
    Venkatesh, S
    PROCEEDINGS OF THE 2003 IEEE WORKSHOP ON STATISTICAL SIGNAL PROCESSING, 2003, : 367 - 370
  • [26] A secure communication protocol for ad-hoc wireless sensor networks
    Pearce, C
    Ma, VYM
    Bertok, P
    PROCEEDINGS OF THE 2004 INTELLIGENT SENSORS, SENSOR NETWORKS & INFORMATION PROCESSING CONFERENCE, 2004, : 79 - 84
  • [27] Mobility and security issues in wireless ad-hoc sensor networks
    Boudriga, N
    Obaidat, MS
    GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 2777 - 2781
  • [28] Coverage and Connectivity Problem in Wireless Sensor Networks at Worst Condition
    Liu Aiping
    Liu Zhong
    Luo Yasong
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON TEST AUTOMATION AND INSTRUMENTATION, VOL 4, 2008, : 1811 - 1815
  • [29] Wireless ad-hoc control networks
    Bu, SR
    Naghdy, F
    2005 3RD IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2005, : 839 - 844
  • [30] Ad-hoc, mobile, and wireless networks
    Palattella, Maria Rita
    Scanzio, Stefano
    INTERNET TECHNOLOGY LETTERS, 2021, 4 (04)