Distributed Coordinate-free Hole Recovery
|
|
- Georgina Parks
- 8 years ago
- Views:
Transcription
1 Distributed Coordinate-free Hole Recovery Xiaoyun Li Department of Computing and Electronic Systems University of Essex Colchester, UK CO4 3SQ Abstract This paper proposes a distributed coordinate-free non-triangulated hole recovery algorithm for sensor networks called 3MeSH-DR (Triangular Mesh Distributed hole Recovery), which recovers coverage holes with the minimum number of redundant nodes using only connectivity information. If this hole cannot be triangulated by edges between pairs of nodes closer that 2 units from each other, the boundary of the hole is detected accurately with the minimum number of edges. It is shown to be error-free by thousands of simulations with different random topologies and node densities. Because of its high reliability and modest requirements for computing power and memory, 3MeSH- DR is an efficient solution for hole detection and recovery without location information in real sensor network applications. Index Terms hole detection; hole recovery; coverage; triangulation; graph theory; wireless sensor network I I. INTRODUCTION n this paper, an algorithm for distributed coverage hole recovery in sensor networks is proposed which activates redundant nodes adjacent to a hole which cannot be covered by existing active nodes. If this cannot be done, then an accurate hole boundary is detected. Location awareness is not necessary, since only connectivity information is required. The algorithm is an enhanced version of 3MeSH [1-2]. A. Related work There has been much related research on the coverage problem for both mobile and static sensor networks. Most such proposals use computational geometry with geometric tools such as Voronoi diagrams to detect holes. Solutions exist for single-level coverage, in static sensor networks [3-9], and in mobile sensor networks [10-12]. Also, solutions exist for multiple-level coverage in dense static sensor networks [13-15]. All these techniques require coordinate information about the sensor nodes in the target sensing area. An algebraic topological method utilizing homology theory can detect single-level coverage holes without coordinates [16-17]. It employs a central control algorithm that requires connectivity information for all nodes in the sensing area, but cannot guarantee to detect the boundary of a hole accurately. If there are N nodes, the calculation time is O(N 5 ). A boundary detection algorithm using a communication graph has also been proposed [18-19]. It selects one or more nodes as seeds, to build a shortest path tree by flooding. With no coverage holes in a continuous target area, nodes which lie the same number of hops away from the seed node should form an unbroken circle. Therefore each node can examine those David K. Hunter Department of Computing and Electronic Systems University of Essex Colchester, UK CO4 3SQ dkhunter@essex.ac.uk neighbors which are an equal number of hops away from it, to determine whether or not such a circle can be formed. In this way, the boundary nodes of a coverage hole can be detected. This algorithm is suitable for a coordinate-free environment, but it requires the node density to be high enough to guarantee sufficient accuracy, which is not suitable for randomly deployed sensor networks, because the node density of the area adjacent to a hole is generally lower than in a hole-free area. Also, it cannot detect multiple adjacent holes. Another problem is the high communication overhead of frequent flooding when the network topology changes due to node failure or mobility. As a node failure can disrupt full coverage, self-recovery must be implemented. GS3 [20] and SoRCA [21] employ selfhealing algorithms to recover a hole with adjacent redundant nodes, but they require coordinate location information for all sensor nodes. Their algorithms partition the target area into fixed hexagonal cells, and assume a cell is covered if at least one node is inside it, hence they cannot maintain critical full coverage without redundancy. To the best of our knowledge, no hole recovery algorithm for coordinate-free scenarios has yet been proposed. B. A brief introduction to the 3MeSH hole detection algorithm 3MeSH (Triangular Mesh Self-healing Hole detection algorithm) is a distributed coordinate-free hole detection algorithm. Assume each node has a circular sensing range with radius R. A subset of active nodes is elected initially so that any two active nodes are more than R units away from each other. A node lying closer than R units to any active node is considered as a redundant node because it is covered by the active node. After active node election, each node becomes either active or redundant. Then the algorithm monitors the network to detect boundary nodes among all the active nodes. A boundary node is an active node adjacent to a coverage hole. 3MeSH requires only the connectivity information about whether two nodes are R units apart for active node election, and whether two nodes are 2R units apart for boundary node detection. Hence 3MeSH is coordinate-free. It can detect any large hole (non-triangulated hole) accurately (Figure 1b), but cannot detect trivial holes (triangulated holes) as shown in Figure 2. Trivial holes can only be detected accurately if accurate distances between nodes are known. Given a set of sensor nodes V in a coordinate-free environment, a graph G(V, E) can be defined, where the set E contains all links between each node in the set V and its 1
2 neighbors. The graph hence indicates connectivity between neighbors by means of edges, but need not directly relate to the geographical or spatial organization of the nodes. Figure 1a. 3MeSH ring. Figure 1b. A large hole. Figure 1 shows how G(V N, E), a sub-graph of G(V, E), is defined by a node and its neighbors, in order to facilitate discussion of the algorithm. In Figure 1a, node A is a nonboundary node (since it is not on the boundary of any large hole), but in Figure 1b, a large hole exists, and node B is a boundary node. Each active node N defines a graph G(V N, E), where V N is the set of active nodes neighboring N, and E is the set of links between neighboring pairs of nodes in V N, and N itself is not included in V N. In Figure 1a, all the nodes in V A define a closed polygon, known as a ring. If the nodes in set V A cannot by themselves define links which partition the area within the ring into triangles, it is known as a 3MeSH ring. By definition, all the links terminating on node A, in addition to the links in set E, partition the area within the 3MeSH ring into triangles, therefore node A is not adjacent to a large hole. However in Figure 1b, all the neighbors of node B, namely nodes B 1, B 2, B 3 and B 4, do not form a ring encircling B, and nodes C 1 through to C n must be added to do this. Therefore a large hole exists, enclosed by a ring with at least four edges, which cannot be partitioned into triangles by links. Proof of the algorithm can be found in references [1-2]. II. Figure 2. Trivial hole. 3MESH-DR: THE DISTRIBUTED HOLE RECOVERY ALGORITHM 3MeSH-DR is an improved version of the 3MeSH hole detection and recovery algorithm. The boundary node and hole detection algorithm is exactly the same as before [1-2], but the hole recovery algorithm becomes distributed and more efficient. A. Distributed hole recovery in 3MeSH-DR After a hole is detected by 3MeSH, one of the boundary nodes adjacent to it broadcasts a hole message containing the IDs of all boundary nodes. Assume each node is aware of its neighbors during self-organization of the network. Distributed hole recovery for 3MeSH-DR is described below: 1. If a redundant node is adjacent to all the boundary nodes of the hole, it elects itself as an active node in order to recover the hole, and the algorithm terminates. This process is unchanged as described in [1-2]. 2. Each of the N boundary nodes adjacent to the hole broadcasts a neighbor message containing node IDs of all its neighbors (either active or redundant) lying within 2R units. N is the number of boundary nodes adjacent to the hole. 3. Each redundant node covered by any boundary node starts to compare received neighbor messages with its own neighbor set. If its neighbors are a subset of a boundary node s neighbor set, then it can make no more contribution towards recovering the hole than the boundary node. So it quits hole recovery. This is a distributed algorithm to filter out redundant nodes. 4. A redundant node elects itself as an active node and broadcasts a hole recovery message if it is connected to two boundary nodes no less than N / 3 hops away (Fig. 3a), providing another node has not already done so. If no single redundant node is activated, and a boundary node connected to redundant node D and another boundary node connected to redundant node E are no less than N /3 hops away (Fig. 3b), either node D or E broadcasts a hole recovery message and elects both D and E as active nodes, providing another node has not already done so. Hole recovery then restarts from step 1 for the reduced hole(s). If no redundant node is activated, an unrecoverable hole is detected. The algorithm terminates. N / 3 is the smallest integer no less than N/3 (see Necessary Condition A). Two boundary nodes are x hops apart if they are connected via x 1 other boundary nodes which are each adjacent to the hole. 5. If hole recovery has been repeated for more than M iterations without convergence (M = 5 is suggested by simulation), further distributed hole detection is performed by the redundant nodes. A redundant node that did not quit in step 3 and which is connected to any two connected boundary nodes broadcasts a boundary neighbor message, providing another node has not already done so. If any two connected boundary nodes cannot find a redundant node connected to both of them, an unrecoverable hole is detected (see proof of condition B), and the algorithm terminates. Fig. 3a 1 bridge redundant node A 1 Fig. 3b 2 bridge redundant nodes A 1, A 2 This algorithm is distributed and error-free. Any redundant node which can recover the hole elects itself as an active node, until this takes place. A hole is regarded as unrecoverable only if all possible redundant nodes become active and the hole has still not been recovered. This does not mean that the algorithm 2
3 has difficulty converging, because in step 3, the distributed algorithm running on the redundant nodes themselves has filtered out most unnecessary nodes. Further hole detection in step 5 is important to limit the convergence of the algorithm to just a few iterations, especially for high density networks. 3MeSH-DR can also accurately detect the boundary of an unrecoverable hole. Fig. 4a shows an example of a detected unrecoverable hole where the recovery algorithm does not employ step 5. It terminates after 30 iterations when all adjacent redundant nodes are activated. This could easily deplete the energy of sensor nodes by transmitting many neighbor messages, and could cause extremely long hole recovery delay. The bold polygon is the boundary of the detected hole, and the shaded area in the center of the polygon is the uncovered area of the hole. The small circles are activated nodes, and each large circle is the coverage area with one activated node in the centre. Fig. 4b shows the result when using further hole detection as specified in step 5. It terminates at the sixth iteration and detects the hole boundary accurately, with six redundant nodes being activated. This process can detect more than 95% of unrecoverable holes, with an accurate boundary, in six iterations, and other unrecoverable holes (5%) are detected in 12 iterations at most according to the simulations of Section 3. Fig. 4a. Hole detection without step 5 Fig. 4b. Hole detection with step 5 This distributed hole recovery algorithm has been shown to be efficient and error free through thousands of simulations with different random node deployments. It can elect the minimum number of nodes to recover the hole without redundancy, because in each step only one or two redundant nodes are elected. If the hole is recovered by the elected redundant node(s), they must be necessary. If the hole is not recovered, then it has been reduced in size. Hence the elected node(s) are necessary for further hole recovery, and to detect the boundary of a unrecoverable hole accurately. When a hole is detected i.e. not triangulated by the boundary nodes, using the minimum number of nodes to recover this hole means that all the recovery nodes are necessary. For example, if a hole can be recovered by N nodes, and is not recovered after discarding any one of them, then they are all necessary to recover this hole. Although there may be more than one way to recover a hole with different numbers of necessary nodes, all these options are said to have used the minimum number of nodes. Therefore the minimum number of nodes to recover a hole does not necessarily mean the optimal number of nodes. To select the optimal number of nodes required to recover a hole could be NP-hard even in coordinate-aware scenarios, therefore it is not discussed here. In coordinate-free scenarios, hole boundary detection is accurate if the hole is enclosed by a polygon with the minimum number of edges. For example, a hole is detected as being enclosed by a polygon with five edges (a pentagon), if it could not be enclosed by any four nodes (a quadrangle), so the hole boundary detection is accurate. Although there could be more than one way to enclose the hole by a pentagon with different subset of nodes, only one option has the smallest enclosed area. However, it is impossible to determine which option encloses the smallest area in coordinate-free scenarios. B. Necessary conditions for hole recovery In 3MeSH-DR, the hole cannot be recovered (triangulated) if it cannot be reduced in size by one or two connected redundant nodes which are connected to two boundary nodes no less than N /3 hops apart. This is a necessary condition to triangulate a hole as described below. For the 3MeSH hole detection algorithm, a hole is detected which is enclosed by more than three boundary nodes. All the redundant nodes adjacent to the hole are within R units of one or more of the boundary nodes. In the best case, the coverage area for any boundary node B, which includes all the redundant nodes lying closer than R from B is a circle of radius 2R (large circles in Figure 5a). If the hole can be covered by circles of radii 2R centred on each of the boundary nodes, it can possibly be recovered by redundant nodes covered by these boundary nodes. In this case, the hole can have been triangulated by links connecting two boundary nodes within 4R units of one another. Otherwise the hole cannot be recovered by redundant nodes. 3MeSH-DR can also recover a hole detected by a hole detection algorithm other than 3MeSH, if all the available adjacent redundant nodes are within 2R units of one or more boundary nodes. Hence the area covered by a boundary node, plus the area covered by all the redundant nodes lying within 2R units of it, lies within a circle with radius 3R. Based on the analysis above, a necessary condition to recover (triangulate) a hole is summarized below. Necessary condition A: if the hole can be triangulated by links between pairs of boundary nodes up to 6R (4R for 3MeSH) units apart, this hole may possibly be triangulated (i.e. recovered) by redundant nodes lying up to 2R (R for 3MeSH) units from any of the boundary nodes. Otherwise the hole cannot be recovered by one or more redundant nodes. Necessary condition for Necessary Condition A: Assume a hole is enclosed by N boundary nodes and cannot be triangulated by links of length 2R or shorter. However it can be triangulated by longer links (for example, of length 4R or 6R). In this case, at least one longer link should exist which connects at least one pair of boundary nodes separated by no fewer than N / 3 hops. Proof: this necessary condition is proved by contradiction. If no such link connects any two boundary nodes separated by no fewer than N / 3 hops, then consider a planar graph defined by links between pairs of nodes less than N / 3 hops apart. It must be possible to define a polygon in this way with 3
4 more than three edges, which cannot be triangulated. Hence the hole cannot be triangulated, proving the condition. The necessary condition for Necessary Condition A motivates the hole recovery process in step 4 of 3MeSH-DR (activating one or two connected redundant nodes which are connected to boundary nodes no less than N / 3 hops away). If this condition is not met, hole recovery terminates early because the hole is unrecoverable. Figure 5a. A hole triangulated by links up to 4R units long. Figure 5b. A hole triangulated by links up to 2R units long. Figure 5a shows a hole enclosed by a polygon with nine edges. Boundary nodes B0, B3 and B6 are 3 (= N/3) hops apart, and they are connected with links no more than 4R units long. This hole may be triangulated by redundant nodes lying up to R units away from one or more of the boundary nodes according to Condition A. Figure 5b shows a possible triangulation of this hole using redundant nodes. C0, C3 and C6 are redundant nodes lying within R units of boundary nodes B0, B3 and B6 respectively. They are fully connected with links up to 2R units long. Hence B0, B3 and B6 are fully connected, with two formerly redundant nodes connecting each pair. This hole is recovered by redundant nodes. Figure 6. Proof for condition B Necessary condition B: Any two neighboring boundary nodes should have at least one common redundant node connected to both of them. Otherwise the hole cannot be recovered. Proof: If two adjacent boundary nodes B 1 and B 2 have no common redundant nodes connected to them, for any path between B 1 and B 2 {B 1 R 1 R n B 2 } where n 2 (Figure 6), the polygon P m {B 1 R 1 R n B 2 B 1 } cannot be triangulated by links between vertices on the polygon. This is because a triangle with B 1 and B 2 as vertices does not exist, therefore P m cannot be partitioned into triangles. Hence the hole with B 1 and B 2 as boundary nodes cannot be recovered, proving necessary condition B. C. Other details of the distributed algorithm 1) Accurate hole boundary detection When a hole is reduced in size by activating a redundant node, how is the new boundary determined accurately? The activated node(s) may connect to nodes other than the two boundary nodes which were no less than N/3 hops apart, and thus triangulate part of the hole. In this case, all the boundary nodes connected to the activated node(s) should be discarded for the next hole recovery iteration, except those (e.g. B 1 and B 5 in Fig. 3a) which are connected to boundary node(s) (e.g. B 6 ) which are not connected to the bridge node(s) (e.g. A 1 ). Therefore only nodes {B 1, B 6, B 5, A 1 } are adjacent to the reduced hole in Fig. 3a, yielding a more accurate hole boundary for the next hole recovery iteration. 2) Loop avoidance The elected redundant nodes have become active nodes, and should not be considered in further node election for hole recovery. Otherwise there is a possibility of the recovery process repeatedly activating the same node indefinitely. D. Advantages in resource constrained sensor networks 3MeSH-DR is the first practical hole detection and recovery algorithm for sensor network applications. It has the following advantages over a centralized algorithm. 1) Computation time Each node only needs to compare its connectivity information to the boundary nodes in order to filter out unnecessary redundant nodes. Assume the computation is running on the PIC 18f252 microchip [22], for which the execution time of a 16-bit add operation is 2 µs. For a hole enclosed by N = 10 boundary nodes, with high node density λ = 20, the calculation time for each node is 10 4λ 2µs = 1.6 ms, whereas in the centralized algorithm [1-2], the computational time could be several tens of seconds with node density λ > 6. 2) Communication time Only the N boundary nodes adjacent to the hole need to broadcast their connectivity information. Moreover, one or at most two nodes broadcast their connectivity information at each hole recovery iteration. In the worst case, for N = 10, the convergence time is 13 iterations according to the simulation. If each iteration activates two redundant nodes, the total communication time is (N ) 800 bits / bps = 1.5 seconds. The mean communication time is much shorter than in the worst case, because the mean number of iterations for convergence is less than three, and for more than 94% of hole recoveries, only one redundant node is activated in each iteration. Therefore the average communication time is: (N + 3) 800bits / 19200bps = 0.54 seconds. It is almost constant, not being sensitive to increased node density, according to simulation with various node densities. Another communication overhead for 3MeSH-DR is the broadcast at step 5 for at most N redundant nodes which are each connected to any two adjacent boundary nodes. Because the broadcast message contains only the neighboring boundary nodes ID, which is very short, and only under 10% of hole recoveries need this process (as demonstrated by simulation), this communication overhead can be neglected. 3) Accurate hole boundary detection The hole boundary detected using 3MeSH-DR is more accurate than with existing coordinate-free centralized algorithms including 3MeSH [1-2], and that using the 4
5 homology algorithm [16-17]. In 3MeSH-DR, all the activated redundant nodes are involved in detecting the hole precisely; see the comparison of Figure 7a and 7b with the same node deployment. The small black circles are activated redundant nodes for hole recovery, and the bold polygons are detected unrecoverable holes. The centralized hole recovery algorithm of 3MeSH (Figure 7a) can only detect the hole enclosed by the active boundary nodes, whereas the distributed hole recovery algorithm (3MeSH-DR in Figure 7b) not only detects the hole enclosed by the active boundary nodes, but also activates the minimum number of redundant nodes to recover the holes so that unrecoverable holes are either partly recovered or divided into smaller holes. Therefore more accurate boundaries of unrecoverable holes are detected. holes/simulation on average for λ = 14). The number of recoverable holes using more than one iteration is largest for 5 λ 7 (around 3 holes/simulation on average), and drops slowly to less than one hole per simulation on average for λ 10. The number of unrecoverable holes drops when node density increases. For λ = 3 and 4, the number of unrecoverable holes is largest (around 4 holes/simulation on average); for higher node densities, the average number of unrecoverable holes drops quickly to less than one hole per simulation (λ 7), and drops to less than 0.01 holes/simulation (λ 10). For λ = 2 the average number of unrecoverable holes is 2.9 holes/simulation, which should be larger, but some holes cannot be detected due to the boundary effect in sparse sensor networks. For high node densities (λ > 10), most detected holes are recoverable using one redundant node. Figure 7a. Centralized hole detection. Figure 7b. Distributed hole detection. III. SIMULATION RESULTS For each node density 2 λ 14, simulations are performed in a target area of 64 square units (1 square unit = πr 2 ) within 100 different random node deployments for each node density. During the 1300 simulations, holes are detected including 9464 recoverable holes and 1628 unrecoverable holes holes could be recovered using one redundant node in the first iteration, and 1876 holes are recovered using more than one redundant node and more than one iteration. Figure 8 shows that the mean number of recoverable holes is largest for node densities 6 λ 8 (around 10 holes on average for one simulation). For λ = 8, the number of holes recovered in the first iteration is largest (8 holes/simulation on average), then it drops slowly for higher node densities (5 Figure 8. Number of holes. Because holes recovered using one redundant node require zero communication and calculation overheads for both centralized and distributed algorithms, those 7770 holes are not discussed below. Only the 1628 unrecoverable holes and 1871 recoverable holes requiring more than one iteration are discussed below. Figure 9 compares the number of hole recovery iterations with and without further hole detection (step 5 of 3MeSH-DR). During 1300 simulations (100 simulations per node density), the 1876 recoverable holes recovered by more than one redundant node do not benefit from the further hole detection process because they could be recovered previously. For the 1628 unrecoverable holes, if iterations are permitted without further hole detection, there are 15 unrecoverable holes detected after more than 10 iterations, including one terminating at the 30 th iteration (λ = 13), and one terminating at the 23 rd iteration (λ = 12), which is the worst case for convergence of hole recovery. If further hole detection is performed at each iteration after the fifth recovery iteration, which is suggested by 3MeSH-DR, the number of unrecoverable holes detected after no more than five iterations is exactly the same as that without the further detection process (the worst case). However the number of unrecoverable holes detected at the sixth iteration almost doubles (from 98 to 192) compared to that without further 5
6 detection. Furthermore the convergence of hole detection improves significantly for unrecoverable holes detected after more than seven iterations, which is exactly the same as when performing further hole detection at each iteration (the best case). Simulation shows that performing further hole detection for each iteration after the fifth iteration can achieve similar convergence as when performing further detection at each iteration. But it causes much less communication overhead, because 94% of the 1876 recoverable holes are recovered and 87% of the 1628 unrecoverable holes are detected before six iterations, so the communication overhead is not necessary for the further hole detection process. Figure 9. Unrecoverable holes using different detection processes. IV. CONCLUSIONS This paper proposed an innovative coverage hole detection and recovery algorithm for coordinate-free sensor networks. Both the hole detection and hole recovery algorithms are distributed without any central control, which is very convenient for randomly deployed sensor networks with resource constrained nodes, especially in those scenarios with frequent topology change due to node mobility or unpredictable node failures. Simulation results with thousands of different random node deployments and node densities show that the algorithm is accurate and reliable when detecting the precise boundary of any unrecoverable holes, recovering all recoverable holes using the minimum number of redundant nodes, with an average convergence time of less than three iterations. Its high reliability and efficiency, as well as its distributed character, indicate that this is a practical hole detection and recovery algorithm for real resource constrained sensor networks with limited energy, limited memory and computational capability, and lack of location information etc. This algorithm may also be used in detection of routing holes, jamming holes, and most sink and worm holes in sensor networks, and is more efficient and reliable than existing solutions for these problems. REFERENCES [1] X. Li, D. K. Hunter, K. Yang, Distributed Coordinate-Free Hole Detection and Recovery, IEEE GLOBECOM, San Francisco, USA, November 27 December 1, [2] X. Li, D. K. Hunter, Distributed Coordinate-free Algorithm for Full Sensing Coverage, International Journal of Sensor Networks, [3] B. Carbunar, A. Grama, J. Vitek, O. Carbunar, Coverage Preserving Redundancy Elimination in Sensor Networks, IEEE SECON, October [4] H. Zhang, J. C. Hou, Maintaining Sensing Coverage and Connectivity in Large Sensor Networks, UIUC, [5] J. Wu, S. Yang, Coverage Issue in Sensor Networks with Adjustable Ranges, ICPPWorkshops, 2004, pp [6] D. Tian, N. D. Georganas, A Coverage-preserving Node Scheduling Scheme for Large Wireless Sensor Networks, First ACM International Workshop on WSN, Georgia, USA, [7] C.-F. Huang, Y.-C. Tseng, The Coverage Problem in a Wireless Sensor Network, Second ACM WSNA, [8] J. Jiang, W. Dou, A Coverage Preserving Density Control Algorithm for Wireless Sensor Networks, ADHOC-NOW, pp42 55, Springer- Verlag, July [9] S. Meguerdichian, F. Koushanfar, M. Potkonjak, M. Srivastava, Coverage Problems in Wireless Ad-hoc Sensor Network, IEEE INFOCOM, 2001, pp [10] G. Wang, G. Cao, T. La Porta, Movement-assisted Sensor Deployment, IEEE INFOCOM, [11] A. Howard, M. J. Mataric, G. S Sukhatme, Mobile Sensor Network Deployment Using Potential Fields: A Distributed, Scalable Solution to the Area Coverage Problem, Sixth International Symposium on DARS, June [12] N. Bulusu, J. Heidemann, D. Estrin, T. Tran, Self-configuring Localization Systems: Design and Experimental Evaluation, ACM Transactions on Embedded Computing Systems, May [13] X.-Y. Li, P.-J. Wan, O. Frieder, Coverage in Wireless Ad-hoc Sensor Networks, IEEE Transactions on Computers, vol. 52, no. 6, pp , [14] X. Wang, G. Xing, Y. Zhang, C. Lu, R. Pless, C. Gill, Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks, Proceedings of the ACM, SenSys, pp28 39, November [15] T. Yan, T. He, J. Stankovic, Differentiated Surveillance for Sensor Networks, Proceedings of the ACM, SenSys, [16] R. Ghrist, A. Muhammad, Coverage and Hole-detection in Sensor Networks via Homology Information Processing in Sensor Networks, IPSN, 15 April 2005, pp [17] V. de Silva, R. Ghrist, A. Muhammad, Blind Swarms for Coverage in 2-D, Proceedings on Robotics: Systems and Science, [18] Y. Wang, J. Gao, and J. S. B. Mitchell. Boundary Recognition in Sensor Networks by Topological Methods, MobiCom, New York, NY, USA, ACM Press, [19] S. Funke, C. Klein. Hole Detection or: How Much Geometry Hides in Connectivity?, Proceedings of the Twenty-second Annual Symposium on Computational Geometry, SCG, pp , New York, NY, USA, ACM Press, [20] H. Zhang, A. Arora, GS3: Scalable Self-configuration and Self-healing in Wireless Networks, ACM Symposium on Principles of Distributed Computing, [21] X. Wang, T. Berger, Self-Organizing Redundancy Cellular Architecture for Wireless Sensor Networks, WCNC, [22] 6
Int. J. Sensor Networks, Vol. 5, No. 3, 2009 153
Int. J. Sensor Networks, Vol. 5, No. 3, 2009 153 Distributed coordinate-free algorithm for full sensing coverage Xiaoyun Li Complex and Adaptive Systems Laboratory, University College Dublin, Dublin 4,
More informationConnectivity-based Distributed Coverage Hole Detection in Wireless Sensor Networks
Connectivity-based Distributed Coverage Hole Detection in Wireless Sensor Networks Feng Yan, Philippe Martins, Laurent Decreusefond To cite this version: Feng Yan, Philippe Martins, Laurent Decreusefond.
More informationCoverage-Hole Trap Model in Target Tracking using Distributed Relay-Robot Network
Coverage-Hole Trap Model in Target Tracking using Distributed Relay-Robot Network Huawei Miao, Chia Ching Ooi, Xiaowen Wu, and Christian Schindelhauer Computer Networks and Telematics, Department of Computer
More informationA Hierarchical Structure based Coverage Repair in Wireless Sensor Networks
A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks Jie Wu Computer Science & Engineering Department Florida Atlantic University Boca Raton, FL 3343, USA E-mail: jie@cse.fau.edu
More informationRepairing Sensor Network Using Mobile Robots
Repairing Sensor Network Using Mobile Robots 1 Yongguo Mei, Changjiu Xian, Saumitra Das, Y. Charlie Hu and Yung-Hsiang Lu Purdue University, West Lafayette {ymei, cjx, smdas, ychu, yunglu}@purdue.edu Abstract
More informationEBHEAL: Distributed and Localized Mechanism for Coverage Hole Detection and Healing
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:39-74 Volume 4 Issue 7 July 05, Page No. 3457-346 EBHEAL: Distributed and Localized Mechanism for Coverage Hole Detection and
More informationProbabilistic Coverage in Wireless Sensor Networks
Probabilistic Coverage in Wireless Sensor Networks Nadeem Ahmed 1,2 nahmed@cse.unsw.edu.au 1 Computer Science and Engineering, University of New South Wales, Sydney, Australia. Salil S. Kanhere 1 salilk@cse.unsw.edu.au
More informationA Bidding Protocol for Deploying Mobile Sensors
A Bidding Protocol for Deploying Mobile Sensors Guiling Wang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania State University, University Park, PA 1 Email: {guiwang,gcao,tlp}@cse.psu.edu
More informationMobile Network Analysis - Hole Healing
, pp.143-150 http://dx.doi.org/10.14257/ijfgcn.2013.6.6.15 Decentralized Mobile Sensor Navigation for Hole Healing Policy in Wireless Hybrid Sensor Networks Fu-Tian Lin 1, 2, Chu-Sing Yang 1, Tien-Wen
More informationKeywords coverage holes, energy efficient, hole detection, hole healing
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Hole Detection and
More informationPartial Coverage in Homological Sensor Networks
!000000999 IIIEEEEEEEEE IIInnnttteeerrrnnnaaatttiiiooonnnaaalll CCCooonnnfffeeerrreeennnccceee ooonnn WWWiiirrreeellleeessssss aaannnddd MMMooobbbiiillleee CCCooommmpppuuutttiiinnnggg,,, NNNeeetttwwwooorrrkkkiiinnnggg
More informationModified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Detection Algorithm for Distributed WSNs K. Lakshmi Joshitha 1 and Dr.S.Jayashri 2 1 Research Scholar, Anna University, Chennai, India Email: lakshmijoshitha@yahoo.com 2 Director, Adhiparasakthi
More informationAn Energy Efficient Location Service for Mobile Ad Hoc Networks
An Energ Efficient Location Service for Mobile Ad Hoc Networks Zijian Wang 1, Euphan Bulut 1 and Boleslaw K. Szmanski 1, 1 Department of Computer Science, Rensselaer Poltechnic Institute, Tro, NY 12180
More informationAccuracy of Homology based Approaches for Coverage Hole Detection in Wireless Sensor Networks
Accuracy of Homology based Approaches for Coverage Hole Detection in Wireless Sensor Networks Feng Yan, Philippe Martins, Laurent Decreusefond To cite this version: Feng Yan, Philippe Martins, Laurent
More informationCoverage Related Issues in Networks
Coverage Related Issues in Networks Marida Dossena* 1 1 Department of Information Sciences, University of Naples Federico II, Napoli, Italy Email: marida.dossena@libero.it Abstract- Wireless sensor networks
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
More informationDAG based In-Network Aggregation for Sensor Network Monitoring
DAG based In-Network Aggregation for Sensor Network Monitoring Shinji Motegi, Kiyohito Yoshihara and Hiroki Horiuchi KDDI R&D Laboratories Inc. {motegi, yosshy, hr-horiuchi}@kddilabs.jp Abstract Wireless
More informationModified Sensor Deployment Algorithm for Hole Detection and Healing using NS2
RESEARCH ARTICLE OPEN ACCESS Modified Sensor Deployment Algorithm for Hole Detection and Healing using NS2 Vaishnavi Sukumaran, T.P. Saravanabava M.E, College Of Engineering, Guindy, Chennai, India, 2014
More informationHole Detection and Healing Using Heal Algorithm
Hole Detection and Healing Using Heal Algorithm Divya K Suku, Phini Ann Philip Pursuing M.Tech, Department of ECE, CAARMEL Engineering College, Pathanamthitta, Kerala, India Assistant Professor, Department
More informationQUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
More informationA Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-4 E-ISSN: 2347-2693 A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy
More informationA Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks Dajin Wang Department of Computer Science Montclair State University, Upper Montclair, NJ 07043, USA wang@pegasus.montclair.edu
More informationHoles in Wireless Sensor Network
HOLE DETECTION AND HEALING FOR A RoI IN WIRELESS SENSOR NETWORKS Divya K Suku, Phini Ann Philip PG Scholar, Department of ECE, CAARMEL Engineering College, Pathanamthitta, Kerala Assistant Professor, Department
More informationPower Efficiency Metrics for Geographical Routing In Multihop Wireless Networks
Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks Gowthami.A, Lavanya.R Abstract - A number of energy-aware routing protocols are proposed to provide the energy efficiency
More informationSTUDY OF MOBILE NODE BASED COVERAGE RECOVERY PROCESS FOR WSN DEPLOYED IN LARGE FOOD GRAIN WAREHOUSE
STUDY OF MOBILE NODE BASED COVERAGE RECOVERY PROCESS FOR WSN DEPLOYED IN LARGE FOOD GRAIN WAREHOUSE Neha Deshpande 1 & A. D. Shaligram 2 1 A.G.College, Pune, Maharshtra, India 2 Dept. Of Electronic Science,
More informationConsecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks
21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks Jeongcheol Lee, Euisin
More informationAnalysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks
Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks Mahmuda Ahmed, Mehrab Shariar, Shobnom Zerin and Ashikur Rahman Department of Computer Science and Engineering Bangladesh
More informationStrictly Localized Construction of Planar Bounded-Degree Spanners of Unit Disk Graphs
Strictly Localized Construction of Planar Bounded-Degree Spanners of Unit Disk Graphs Iyad A. Kanj Ljubomir Perković Ge Xia Abstract We describe a new distributed and strictly-localized approach for constructing
More informationConnected Identifying Codes for Sensor Network Monitoring
Connected Identifying Codes for Sensor Network Monitoring Niloofar Fazlollahi, David Starobinski and Ari Trachtenberg Dept. of Electrical and Computer Engineering Boston University, Boston, MA 02215 Email:
More informationCoverage in Wireless Sensor Networks: A Survey
Coverage in Wireless Sensor Networks: A Survey Raymond Mulligan Wireless Sensor and Mobile Ad-hoc Networks (WiSeMAN) Research Lab Department of Computer Science, Hofstra University Hempstead, NY 11549,
More informationA RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers
, pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang
More informationOptimal Hole Coverage Using Hole Detection and Replacing Algorithm in Wireless Sensor Networks
Optimal Hole Coverage Using Hole Detection and Replacing Algorithm in Wireless Sensor Networks 1 D. Jewel, 2 P. Brundha, 3 D. C. Joy Winnie Wise 1,2,3 Department of CSE, Francis Xavier Engineering College
More informationIntroduction to LAN/WAN. Network Layer
Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services
More informationRecent advances in microelectromechanical
COVER FEATURE Energy-Efficient Area Monitoring for Sensor Networks The nodes in sensor networks must self-organize to monitor the target area as long as possible. Optimizing energy consumption in area
More informationEnergy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India nadhachandra@gmail.com Abstract Energy efficient load balancing in a Wireless Sensor
More informationDecentralized Utility-based Sensor Network Design
Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA narayans@cs.usc.edu, bkrishna@usc.edu
More informationImplementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
More informationA Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification
A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification Sheng-Cong Hu r00631036@ntu.edu.tw Jen-Hou Liu r99631038@ntu.edu.tw Min-Sheng
More informationThe K-Observer Problem in Computer Networks
The K-Observer Problem in Computer Networks H. B. Acharya 1, Taehwan Choi 1, Rida A. Bazzi 2, and Mohamed G. Gouda 1,3 1 The University of Texas at Austin, USA 2 Arizona State University, USA 3 The National
More informationIsolines: Energy-efficient Mapping in Sensor Networks
Isolines: Energy-efficient Mapping in Sensor Networks Ignacio Solis and Katia Obraczka {isolis, katia}@cse.ucsc.edu Computer Engineering Department University of California, Santa Cruz April 15, 2005 Abstract
More informationDistributed Coverage in Wireless Ad Hoc and Sensor Networks by Topological Graph Approaches
2010 International Conference on Distributed Computing Systems Distributed Coverage in Wireless Ad Hoc and Sensor Networks by Topological Graph Approaches Dezun Dong, Yunhao Liu, Kebin Liu and Xiangke
More informationA Survey on Rendezvous Data Collection in Wireless Sensor Networks. Presented by Longfei Shangguan Supervisor:Dr.Yunhao Liu
A Survey on Rendezvous Data Collection in Wireless Sensor Networks Presented by Longfei Shangguan Supervisor:Dr.Yunhao Liu Roadmap Background Introduction of state-of-art solutions Future works References
More informationMedial Axis Construction and Applications in 3D Wireless Sensor Networks
Medial Axis Construction and Applications in 3D Wireless Sensor Networks Su Xia, Ning Ding, Miao Jin, Hongyi Wu, and Yang Yang Presenter: Hongyi Wu University of Louisiana at Lafayette Outline Introduction
More informationRisk Management in Intrusion Detection Applications with Wireless Video Sensor Networks
Risk Management in Intrusion Detection Applications with Wireless Video Sensor Networks Abdallah Makhoul University of Franche-Comté LIFC Laboratory Email: abdallah.makhoul@iut-bm.univ-fcomte.fr Rachid
More informationEFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,
More informationMinimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART
Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART Abdul Aziz Memon and Seung Ho Hong Abstract In this paper load-balancing routing algorithm for WirelessHART standard is proposed. WirelessHART
More informationA Novel Distributed Algorithm for Complete Targets Coverage in Energy Harvesting Wireless Sensor Networks
A Novel Distributed Algorithm for Complete Targets Coverage in Energy Harvesting Wireless Sensor Networks Changlin Yang School of Electrical, Computer and Telecommunications Engineering University of Wollongong
More informationThree Effective Top-Down Clustering Algorithms for Location Database Systems
Three Effective Top-Down Clustering Algorithms for Location Database Systems Kwang-Jo Lee and Sung-Bong Yang Department of Computer Science, Yonsei University, Seoul, Republic of Korea {kjlee5435, yang}@cs.yonsei.ac.kr
More informationA Multi-Poller based Energy-Efficient Monitoring Scheme for Wireless Sensor Networks
A Multi-Poller based Energy-Efficient Monitoring Scheme for Wireless Sensor Networks Changlei Liu and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University E-mail:
More informationAn Optimal Algorithm for Coverage Hole Healing in Hybrid Sensor Networks
An Optimal Algorithm for Coverage Hole Healing in Hybrid Sensor Networks Dung T. Nguyen, Nam P. Nguyen, My T. Thai, Abdelsalam Helal Department of Computer and Information Science and Engineering, University
More informationStudy of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
More informationBabel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks
Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks Jing Deng Department of Computer Science University of New Orleans New Orleans, LA 7048, USA jing@cs.uno.edu Yunghsiang
More informationEvaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network
Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Sagar M Mane Walchand Institute of Technology Solapur. India. Solapur University, Solapur. S.S.Apte Walchand Institute
More informationOn Energy-Efficient Trap Coverage in Wireless Sensor Networks
211 32nd IEEE Real-Time Systems Symposium On Energy-Efficient Trap Coverage in Wireless Sensor Networks Junkun Li Jiming Chen Shibo He Tian He Yu Gu Youxian Sun State Key Lab. of Industrial Control Technology,
More informationCompetitive Analysis of On line Randomized Call Control in Cellular Networks
Competitive Analysis of On line Randomized Call Control in Cellular Networks Ioannis Caragiannis Christos Kaklamanis Evi Papaioannou Abstract In this paper we address an important communication issue arising
More informationArbitrary Obstacles Constrained Full Coverage in Wireless Sensor Networks
Arbitrary Obstacles Constrained Full Coverage in Wireless Sensor Networks Haisheng Tan Yuexuan Wang Xiaohong Hao Qiang-Sheng Hua Francis C.M. Lau Department of Computer Science, The University of Hong
More informationVertices And Wireless Networks - A Review
th International Workshop on Spatial Stochastic Models for Wireless Networks 4 Homology based algorithm for disaster recovery in wireless networks A. Vergne, I. Flint, L. Decreusefond and P. Martins Institut
More informationCROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
More informationDistributed Dynamic Load Balancing for Iterative-Stencil Applications
Distributed Dynamic Load Balancing for Iterative-Stencil Applications G. Dethier 1, P. Marchot 2 and P.A. de Marneffe 1 1 EECS Department, University of Liege, Belgium 2 Chemical Engineering Department,
More informationComputational Geometry. Lecture 1: Introduction and Convex Hulls
Lecture 1: Introduction and convex hulls 1 Geometry: points, lines,... Plane (two-dimensional), R 2 Space (three-dimensional), R 3 Space (higher-dimensional), R d A point in the plane, 3-dimensional space,
More informationCOVERAGE AND HOLE-DETECTION IN SENSOR NETWORKS VIA HOMOLOGY
COVERAGE AND HOLE-DETECTION IN SENSOR NETWORKS VIA HOMOLOGY Robert Ghrist Department of Mathematics Coordinated Science Laboratory University of Illinois Urbana, IL 601 USA Abubakr Muhammad School of Electrical
More informationNew Distributed Algorithm for Connected Dominating Set in Wireless Ad Hoc Networks
0-7695-1435-9/0 $17.00 (c) 00 IEEE 1 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS-35 0) 0-7695-1435-9/0 $17.00 00 IEEE Proceedings of the 35th Hawaii International
More informationEstimating Coverage Holes and Enhancing Coverage in Mixed Sensor Networks
Estimating Coverage Holes and Enhancing Coverage in Mixed Sensor Networks Amitabha Ghosh Honeywell Technology Solutions Laboratory 151/1 Doraisanipalya, Bannerghatta Road Bangalore 560076, INDIA amitabhaghosh@honeywellcom
More informationEnergy Effective Routing Protocol for Maximizing Network Lifetime of WSN
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India
More informationDATA COLLECTION SCHEME FOR WIRELESS SENSOR NETWORK WITH MOBILE COLLECTOR
DATA COLLECTION SCHEME FOR WIRELESS SENSOR NETWORK WITH MOBILE COLLECTOR Khaled Almi ani, Muder Almi ani, Ali Al_ghonmein and Khaldun Al-Moghrabi ABSTRACT Al-Hussein Bin Talal University, Ma an, Jordan
More informationHybrid Node Deployment Algorithm to Mitigate the Coverage Whole Problem in Wireless Sensor Network
Middle-East Journal of Scientific Research 23 (10): 2500-2506, 2015 ISSN 1990-9233 IDOSI Publications, 2015 DOI: 10.5829/idosi.mejsr.2015.23.10.02 Hybrid Node Deployment Algorim to Mitigate e Coverage
More informationInvestigating the Energy Sink-Hole Problem in Connected k-covered Wireless Sensor Networks
Investigating the Energy Sink-Hole Problem in Connected k-covered Wireless Sensor Networks Habib M. Ammari Wireless Sensor and Mobile Ad-hoc Networks (WiSeMAN) Research Lab Department of Computer and Information
More informationDefending Wireless Sensor Networks Against Adversarial Localization
Defending Wireless Sensor Networks Against Adversarial Localization Neelanjana Dutta, Abhinav Saxena and Sriram Chellappan Department of Computer Science Missouri University of Science and Technology Rolla,
More informationMCTA: Target Tracking Algorithm based on
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 27 proceedings. MCTA: Target Tracking Algorithm based on
More informationOPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM
OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM S. Sofia 1, M.Varghese 2 1 Student, Department of CSE, IJCET 2 Professor, Department of CSE, IJCET Abstract This paper proposes fault node recovery
More informationQuality of Service Routing in Ad-Hoc Networks Using OLSR
Quality of Service Routing in Ad-Hoc Networks Using OLSR Ying Ge Communications Research Centre ying.ge@crc.ca Thomas Kunz Carleton University tkunz@sce.carleton.ca Louise Lamont Communications Research
More informationA Review on Failure Node Recovery Algorithms in Wireless Sensor Actor Networks
A Review on Failure Node Recovery Algorithms in Wireless Sensor Actor Networks G.Sumalatha #1, N.Zareena *2, Ch.Gopi Raju #3 #1&2 Asst.Prof, Department of CSE, Vignan's LARA Institute Of Technology & Science,
More informationA NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM
A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM Hideto Horiuchi, Naoki Wakamiya and Masayuki Murata Graduate School of Information Science and Technology, Osaka University 1
More informationAN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
More informationThe Self-Protection Problem in Wireless Sensor Networks
The Self-Protection Problem in Wireless Sensor Networks DAN WANG Simon Fraser University QIAN ZHANG Hong Kong University of Science and Technology and JIANGCHUAN LIU Simon Fraser University Wireless sensor
More informationEXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually
More informationAnomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches
Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Md. Safiqul Islam *1, Syed AshiqurRahman *2 Department of Computer Science and Engineering Daffodil
More informationGPS (Global positioning system) enables a device to determine
1 Application of GPS to Mobile IP and Routing in Wireless Networks Mustafa Ergen,Sinem Coleri,Baris Dundar,Rahul Jain, Anuj Puri Dept. of Electrical Eng. and Computer Sci. University of California, Berkeley
More informationSecure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm
Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm Pallavi Motharkar 1, Dr.P.R.Deshmukh 2 and Prof.G.S.Thakare 3 1 M.E. (Computer Engineering), 2,3 Department
More informationImplementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks
Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks Gowthami.V.R, Divya Sharma M.Tech, Dept. of E&C. NHCE, VTU, Bengaluru India. Assistant
More informationLoad Balancing Routing Algorithm for Data Gathering Sensor Network
Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum
More informationHybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network
International Journal of Computer Applications (975 8887) Volume 4 No.6, July 21 Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network Harneet Kour Department of Computer
More informationCHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
More informationPEDAMACS: Power efficient and delay aware medium access protocol for sensor networks
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,
More informationEmergency Guiding and Monitoring Applications in Indoor 3D Environments by Wireless Sensor Networks
Emergency Guiding and Monitoring Applications in Indoor 3D Environments by Wireless Sensor Networks Meng-Shiuan Pan, Chia-Hung Tsai, and Yu-Chee Tseng Department of Computer Science National Chiao Tung
More informationA Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
More informationEnergy Efficient Coverage for Mobile Sensor Network
Volume 55 No., October Energy Efficient Coverage for Mobile Sensor Network Richa Singh Krishna Engineering College, Ghaziabad ABSTRACT Wireless sensor networks comprise the platform of a broad range of
More informationA Dynamically Configurable Topology Control for Hybrid Ad Hoc Networks with Internet Gateways
ynamically onfigurable Topology ontrol for Hybrid d Hoc Networks with Internet ateways eun-hee ho and Young-ae Ko raduate School of Information & ommunication, jou University, Republic of Korea {khzho,
More informationQuality of Service Routing Network and Performance Evaluation*
Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,
More informationSurvey on Network Lifetime Enhancement Method
International Journal of Computer Sciences and Engineering Open Access Survey Paper Volume-4, Issue-03 E-ISSN: 2347-2693 Survey on Network Lifetime Enhancement Method Abdul Jawad 1* and P. B. Mali 2 1*,2
More informationSome Security Trends over Wireless Sensor Networks
Some Security Trends over Wireless Sensor Networks ZORAN BOJKOVIC, BOJAN BAKMAZ, MIODRAG BAKMAZ Faculty of Transport and Traffic Engineering University of Belgrade Vojvode Stepe 305 SERBIA Abstract: -
More informationGreedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures
Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures Dmitri Krioukov, kc claffy, and Kevin Fall CAIDA/UCSD, and Intel Research, Berkeley Problem High-level Routing is
More informationLoad Balancing Geo-routing and routing around Holes in Wireless Sensor Networks Ashwini S R 1, Dr.Nataraj K R 2 1 PG Student, DCN, SJBIT, Bangalore
Load Balancing Geo-routing and routing around Holes in Wireless Sensor Networks Ashwini S R 1, Dr.Nataraj K R 2 1 PG Student, DCN, SJBIT, Bangalore 2 Professor and HOD, SJBIT, Bangalore Email: ashwinigowda@gmail.com,
More informationRouting and Transport in Wireless Sensor Networks
Routing and Transport in Wireless Sensor Networks Ibrahim Matta (matta@bu.edu) Niky Riga (inki@bu.edu) Georgios Smaragdakis (gsmaragd@bu.edu) Wei Li (wli@bu.edu) Vijay Erramilli (evijay@bu.edu) References
More informationSocial Media Mining. Graph Essentials
Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures
More informationLoad-Balanced Virtual Backbone Construction for Wireless Sensor Networks
Load-Balanced Virtual Backbone Construction for Wireless Sensor Networks Jing (Selena) He, Shouling Ji, Yi Pan, Zhipeng Cai Department of Computer Science, Georgia State University, Atlanta, GA, USA, {jhe9,
More informationA Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network
A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network Parama Bhaumik 1, Somprokash Bandyopadhyay 2 1 Dept. of Information Technology, Jadavpur
More informationScalable Source Routing
Scalable Source Routing January 2010 Thomas Fuhrmann Department of Informatics, Self-Organizing Systems Group, Technical University Munich, Germany Routing in Networks You re there. I m here. Scalable
More informationA Security Architecture for. Wireless Sensor Networks Environmental
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental
More informationPerformance of networks containing both MaxNet and SumNet links
Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for
More information