Distributed Coordinate-free Hole Recovery

Size: px
Start display at page:

Download "Distributed Coordinate-free Hole Recovery"

Transcription

1 Distributed Coordinate-free Hole Recovery Xiaoyun Li Department of Computing and Electronic Systems University of Essex Colchester, UK CO4 3SQ Abstract This paper proposes a distributed coordinate-free non-triangulated hole recovery algorithm for sensor networks called 3MeSH-DR (Triangular Mesh Distributed hole Recovery), which recovers coverage holes with the minimum number of redundant nodes using only connectivity information. If this hole cannot be triangulated by edges between pairs of nodes closer that 2 units from each other, the boundary of the hole is detected accurately with the minimum number of edges. It is shown to be error-free by thousands of simulations with different random topologies and node densities. Because of its high reliability and modest requirements for computing power and memory, 3MeSH- DR is an efficient solution for hole detection and recovery without location information in real sensor network applications. Index Terms hole detection; hole recovery; coverage; triangulation; graph theory; wireless sensor network I I. INTRODUCTION n this paper, an algorithm for distributed coverage hole recovery in sensor networks is proposed which activates redundant nodes adjacent to a hole which cannot be covered by existing active nodes. If this cannot be done, then an accurate hole boundary is detected. Location awareness is not necessary, since only connectivity information is required. The algorithm is an enhanced version of 3MeSH [1-2]. A. Related work There has been much related research on the coverage problem for both mobile and static sensor networks. Most such proposals use computational geometry with geometric tools such as Voronoi diagrams to detect holes. Solutions exist for single-level coverage, in static sensor networks [3-9], and in mobile sensor networks [10-12]. Also, solutions exist for multiple-level coverage in dense static sensor networks [13-15]. All these techniques require coordinate information about the sensor nodes in the target sensing area. An algebraic topological method utilizing homology theory can detect single-level coverage holes without coordinates [16-17]. It employs a central control algorithm that requires connectivity information for all nodes in the sensing area, but cannot guarantee to detect the boundary of a hole accurately. If there are N nodes, the calculation time is O(N 5 ). A boundary detection algorithm using a communication graph has also been proposed [18-19]. It selects one or more nodes as seeds, to build a shortest path tree by flooding. With no coverage holes in a continuous target area, nodes which lie the same number of hops away from the seed node should form an unbroken circle. Therefore each node can examine those David K. Hunter Department of Computing and Electronic Systems University of Essex Colchester, UK CO4 3SQ dkhunter@essex.ac.uk neighbors which are an equal number of hops away from it, to determine whether or not such a circle can be formed. In this way, the boundary nodes of a coverage hole can be detected. This algorithm is suitable for a coordinate-free environment, but it requires the node density to be high enough to guarantee sufficient accuracy, which is not suitable for randomly deployed sensor networks, because the node density of the area adjacent to a hole is generally lower than in a hole-free area. Also, it cannot detect multiple adjacent holes. Another problem is the high communication overhead of frequent flooding when the network topology changes due to node failure or mobility. As a node failure can disrupt full coverage, self-recovery must be implemented. GS3 [20] and SoRCA [21] employ selfhealing algorithms to recover a hole with adjacent redundant nodes, but they require coordinate location information for all sensor nodes. Their algorithms partition the target area into fixed hexagonal cells, and assume a cell is covered if at least one node is inside it, hence they cannot maintain critical full coverage without redundancy. To the best of our knowledge, no hole recovery algorithm for coordinate-free scenarios has yet been proposed. B. A brief introduction to the 3MeSH hole detection algorithm 3MeSH (Triangular Mesh Self-healing Hole detection algorithm) is a distributed coordinate-free hole detection algorithm. Assume each node has a circular sensing range with radius R. A subset of active nodes is elected initially so that any two active nodes are more than R units away from each other. A node lying closer than R units to any active node is considered as a redundant node because it is covered by the active node. After active node election, each node becomes either active or redundant. Then the algorithm monitors the network to detect boundary nodes among all the active nodes. A boundary node is an active node adjacent to a coverage hole. 3MeSH requires only the connectivity information about whether two nodes are R units apart for active node election, and whether two nodes are 2R units apart for boundary node detection. Hence 3MeSH is coordinate-free. It can detect any large hole (non-triangulated hole) accurately (Figure 1b), but cannot detect trivial holes (triangulated holes) as shown in Figure 2. Trivial holes can only be detected accurately if accurate distances between nodes are known. Given a set of sensor nodes V in a coordinate-free environment, a graph G(V, E) can be defined, where the set E contains all links between each node in the set V and its 1

2 neighbors. The graph hence indicates connectivity between neighbors by means of edges, but need not directly relate to the geographical or spatial organization of the nodes. Figure 1a. 3MeSH ring. Figure 1b. A large hole. Figure 1 shows how G(V N, E), a sub-graph of G(V, E), is defined by a node and its neighbors, in order to facilitate discussion of the algorithm. In Figure 1a, node A is a nonboundary node (since it is not on the boundary of any large hole), but in Figure 1b, a large hole exists, and node B is a boundary node. Each active node N defines a graph G(V N, E), where V N is the set of active nodes neighboring N, and E is the set of links between neighboring pairs of nodes in V N, and N itself is not included in V N. In Figure 1a, all the nodes in V A define a closed polygon, known as a ring. If the nodes in set V A cannot by themselves define links which partition the area within the ring into triangles, it is known as a 3MeSH ring. By definition, all the links terminating on node A, in addition to the links in set E, partition the area within the 3MeSH ring into triangles, therefore node A is not adjacent to a large hole. However in Figure 1b, all the neighbors of node B, namely nodes B 1, B 2, B 3 and B 4, do not form a ring encircling B, and nodes C 1 through to C n must be added to do this. Therefore a large hole exists, enclosed by a ring with at least four edges, which cannot be partitioned into triangles by links. Proof of the algorithm can be found in references [1-2]. II. Figure 2. Trivial hole. 3MESH-DR: THE DISTRIBUTED HOLE RECOVERY ALGORITHM 3MeSH-DR is an improved version of the 3MeSH hole detection and recovery algorithm. The boundary node and hole detection algorithm is exactly the same as before [1-2], but the hole recovery algorithm becomes distributed and more efficient. A. Distributed hole recovery in 3MeSH-DR After a hole is detected by 3MeSH, one of the boundary nodes adjacent to it broadcasts a hole message containing the IDs of all boundary nodes. Assume each node is aware of its neighbors during self-organization of the network. Distributed hole recovery for 3MeSH-DR is described below: 1. If a redundant node is adjacent to all the boundary nodes of the hole, it elects itself as an active node in order to recover the hole, and the algorithm terminates. This process is unchanged as described in [1-2]. 2. Each of the N boundary nodes adjacent to the hole broadcasts a neighbor message containing node IDs of all its neighbors (either active or redundant) lying within 2R units. N is the number of boundary nodes adjacent to the hole. 3. Each redundant node covered by any boundary node starts to compare received neighbor messages with its own neighbor set. If its neighbors are a subset of a boundary node s neighbor set, then it can make no more contribution towards recovering the hole than the boundary node. So it quits hole recovery. This is a distributed algorithm to filter out redundant nodes. 4. A redundant node elects itself as an active node and broadcasts a hole recovery message if it is connected to two boundary nodes no less than N / 3 hops away (Fig. 3a), providing another node has not already done so. If no single redundant node is activated, and a boundary node connected to redundant node D and another boundary node connected to redundant node E are no less than N /3 hops away (Fig. 3b), either node D or E broadcasts a hole recovery message and elects both D and E as active nodes, providing another node has not already done so. Hole recovery then restarts from step 1 for the reduced hole(s). If no redundant node is activated, an unrecoverable hole is detected. The algorithm terminates. N / 3 is the smallest integer no less than N/3 (see Necessary Condition A). Two boundary nodes are x hops apart if they are connected via x 1 other boundary nodes which are each adjacent to the hole. 5. If hole recovery has been repeated for more than M iterations without convergence (M = 5 is suggested by simulation), further distributed hole detection is performed by the redundant nodes. A redundant node that did not quit in step 3 and which is connected to any two connected boundary nodes broadcasts a boundary neighbor message, providing another node has not already done so. If any two connected boundary nodes cannot find a redundant node connected to both of them, an unrecoverable hole is detected (see proof of condition B), and the algorithm terminates. Fig. 3a 1 bridge redundant node A 1 Fig. 3b 2 bridge redundant nodes A 1, A 2 This algorithm is distributed and error-free. Any redundant node which can recover the hole elects itself as an active node, until this takes place. A hole is regarded as unrecoverable only if all possible redundant nodes become active and the hole has still not been recovered. This does not mean that the algorithm 2

3 has difficulty converging, because in step 3, the distributed algorithm running on the redundant nodes themselves has filtered out most unnecessary nodes. Further hole detection in step 5 is important to limit the convergence of the algorithm to just a few iterations, especially for high density networks. 3MeSH-DR can also accurately detect the boundary of an unrecoverable hole. Fig. 4a shows an example of a detected unrecoverable hole where the recovery algorithm does not employ step 5. It terminates after 30 iterations when all adjacent redundant nodes are activated. This could easily deplete the energy of sensor nodes by transmitting many neighbor messages, and could cause extremely long hole recovery delay. The bold polygon is the boundary of the detected hole, and the shaded area in the center of the polygon is the uncovered area of the hole. The small circles are activated nodes, and each large circle is the coverage area with one activated node in the centre. Fig. 4b shows the result when using further hole detection as specified in step 5. It terminates at the sixth iteration and detects the hole boundary accurately, with six redundant nodes being activated. This process can detect more than 95% of unrecoverable holes, with an accurate boundary, in six iterations, and other unrecoverable holes (5%) are detected in 12 iterations at most according to the simulations of Section 3. Fig. 4a. Hole detection without step 5 Fig. 4b. Hole detection with step 5 This distributed hole recovery algorithm has been shown to be efficient and error free through thousands of simulations with different random node deployments. It can elect the minimum number of nodes to recover the hole without redundancy, because in each step only one or two redundant nodes are elected. If the hole is recovered by the elected redundant node(s), they must be necessary. If the hole is not recovered, then it has been reduced in size. Hence the elected node(s) are necessary for further hole recovery, and to detect the boundary of a unrecoverable hole accurately. When a hole is detected i.e. not triangulated by the boundary nodes, using the minimum number of nodes to recover this hole means that all the recovery nodes are necessary. For example, if a hole can be recovered by N nodes, and is not recovered after discarding any one of them, then they are all necessary to recover this hole. Although there may be more than one way to recover a hole with different numbers of necessary nodes, all these options are said to have used the minimum number of nodes. Therefore the minimum number of nodes to recover a hole does not necessarily mean the optimal number of nodes. To select the optimal number of nodes required to recover a hole could be NP-hard even in coordinate-aware scenarios, therefore it is not discussed here. In coordinate-free scenarios, hole boundary detection is accurate if the hole is enclosed by a polygon with the minimum number of edges. For example, a hole is detected as being enclosed by a polygon with five edges (a pentagon), if it could not be enclosed by any four nodes (a quadrangle), so the hole boundary detection is accurate. Although there could be more than one way to enclose the hole by a pentagon with different subset of nodes, only one option has the smallest enclosed area. However, it is impossible to determine which option encloses the smallest area in coordinate-free scenarios. B. Necessary conditions for hole recovery In 3MeSH-DR, the hole cannot be recovered (triangulated) if it cannot be reduced in size by one or two connected redundant nodes which are connected to two boundary nodes no less than N /3 hops apart. This is a necessary condition to triangulate a hole as described below. For the 3MeSH hole detection algorithm, a hole is detected which is enclosed by more than three boundary nodes. All the redundant nodes adjacent to the hole are within R units of one or more of the boundary nodes. In the best case, the coverage area for any boundary node B, which includes all the redundant nodes lying closer than R from B is a circle of radius 2R (large circles in Figure 5a). If the hole can be covered by circles of radii 2R centred on each of the boundary nodes, it can possibly be recovered by redundant nodes covered by these boundary nodes. In this case, the hole can have been triangulated by links connecting two boundary nodes within 4R units of one another. Otherwise the hole cannot be recovered by redundant nodes. 3MeSH-DR can also recover a hole detected by a hole detection algorithm other than 3MeSH, if all the available adjacent redundant nodes are within 2R units of one or more boundary nodes. Hence the area covered by a boundary node, plus the area covered by all the redundant nodes lying within 2R units of it, lies within a circle with radius 3R. Based on the analysis above, a necessary condition to recover (triangulate) a hole is summarized below. Necessary condition A: if the hole can be triangulated by links between pairs of boundary nodes up to 6R (4R for 3MeSH) units apart, this hole may possibly be triangulated (i.e. recovered) by redundant nodes lying up to 2R (R for 3MeSH) units from any of the boundary nodes. Otherwise the hole cannot be recovered by one or more redundant nodes. Necessary condition for Necessary Condition A: Assume a hole is enclosed by N boundary nodes and cannot be triangulated by links of length 2R or shorter. However it can be triangulated by longer links (for example, of length 4R or 6R). In this case, at least one longer link should exist which connects at least one pair of boundary nodes separated by no fewer than N / 3 hops. Proof: this necessary condition is proved by contradiction. If no such link connects any two boundary nodes separated by no fewer than N / 3 hops, then consider a planar graph defined by links between pairs of nodes less than N / 3 hops apart. It must be possible to define a polygon in this way with 3

4 more than three edges, which cannot be triangulated. Hence the hole cannot be triangulated, proving the condition. The necessary condition for Necessary Condition A motivates the hole recovery process in step 4 of 3MeSH-DR (activating one or two connected redundant nodes which are connected to boundary nodes no less than N / 3 hops away). If this condition is not met, hole recovery terminates early because the hole is unrecoverable. Figure 5a. A hole triangulated by links up to 4R units long. Figure 5b. A hole triangulated by links up to 2R units long. Figure 5a shows a hole enclosed by a polygon with nine edges. Boundary nodes B0, B3 and B6 are 3 (= N/3) hops apart, and they are connected with links no more than 4R units long. This hole may be triangulated by redundant nodes lying up to R units away from one or more of the boundary nodes according to Condition A. Figure 5b shows a possible triangulation of this hole using redundant nodes. C0, C3 and C6 are redundant nodes lying within R units of boundary nodes B0, B3 and B6 respectively. They are fully connected with links up to 2R units long. Hence B0, B3 and B6 are fully connected, with two formerly redundant nodes connecting each pair. This hole is recovered by redundant nodes. Figure 6. Proof for condition B Necessary condition B: Any two neighboring boundary nodes should have at least one common redundant node connected to both of them. Otherwise the hole cannot be recovered. Proof: If two adjacent boundary nodes B 1 and B 2 have no common redundant nodes connected to them, for any path between B 1 and B 2 {B 1 R 1 R n B 2 } where n 2 (Figure 6), the polygon P m {B 1 R 1 R n B 2 B 1 } cannot be triangulated by links between vertices on the polygon. This is because a triangle with B 1 and B 2 as vertices does not exist, therefore P m cannot be partitioned into triangles. Hence the hole with B 1 and B 2 as boundary nodes cannot be recovered, proving necessary condition B. C. Other details of the distributed algorithm 1) Accurate hole boundary detection When a hole is reduced in size by activating a redundant node, how is the new boundary determined accurately? The activated node(s) may connect to nodes other than the two boundary nodes which were no less than N/3 hops apart, and thus triangulate part of the hole. In this case, all the boundary nodes connected to the activated node(s) should be discarded for the next hole recovery iteration, except those (e.g. B 1 and B 5 in Fig. 3a) which are connected to boundary node(s) (e.g. B 6 ) which are not connected to the bridge node(s) (e.g. A 1 ). Therefore only nodes {B 1, B 6, B 5, A 1 } are adjacent to the reduced hole in Fig. 3a, yielding a more accurate hole boundary for the next hole recovery iteration. 2) Loop avoidance The elected redundant nodes have become active nodes, and should not be considered in further node election for hole recovery. Otherwise there is a possibility of the recovery process repeatedly activating the same node indefinitely. D. Advantages in resource constrained sensor networks 3MeSH-DR is the first practical hole detection and recovery algorithm for sensor network applications. It has the following advantages over a centralized algorithm. 1) Computation time Each node only needs to compare its connectivity information to the boundary nodes in order to filter out unnecessary redundant nodes. Assume the computation is running on the PIC 18f252 microchip [22], for which the execution time of a 16-bit add operation is 2 µs. For a hole enclosed by N = 10 boundary nodes, with high node density λ = 20, the calculation time for each node is 10 4λ 2µs = 1.6 ms, whereas in the centralized algorithm [1-2], the computational time could be several tens of seconds with node density λ > 6. 2) Communication time Only the N boundary nodes adjacent to the hole need to broadcast their connectivity information. Moreover, one or at most two nodes broadcast their connectivity information at each hole recovery iteration. In the worst case, for N = 10, the convergence time is 13 iterations according to the simulation. If each iteration activates two redundant nodes, the total communication time is (N ) 800 bits / bps = 1.5 seconds. The mean communication time is much shorter than in the worst case, because the mean number of iterations for convergence is less than three, and for more than 94% of hole recoveries, only one redundant node is activated in each iteration. Therefore the average communication time is: (N + 3) 800bits / 19200bps = 0.54 seconds. It is almost constant, not being sensitive to increased node density, according to simulation with various node densities. Another communication overhead for 3MeSH-DR is the broadcast at step 5 for at most N redundant nodes which are each connected to any two adjacent boundary nodes. Because the broadcast message contains only the neighboring boundary nodes ID, which is very short, and only under 10% of hole recoveries need this process (as demonstrated by simulation), this communication overhead can be neglected. 3) Accurate hole boundary detection The hole boundary detected using 3MeSH-DR is more accurate than with existing coordinate-free centralized algorithms including 3MeSH [1-2], and that using the 4

5 homology algorithm [16-17]. In 3MeSH-DR, all the activated redundant nodes are involved in detecting the hole precisely; see the comparison of Figure 7a and 7b with the same node deployment. The small black circles are activated redundant nodes for hole recovery, and the bold polygons are detected unrecoverable holes. The centralized hole recovery algorithm of 3MeSH (Figure 7a) can only detect the hole enclosed by the active boundary nodes, whereas the distributed hole recovery algorithm (3MeSH-DR in Figure 7b) not only detects the hole enclosed by the active boundary nodes, but also activates the minimum number of redundant nodes to recover the holes so that unrecoverable holes are either partly recovered or divided into smaller holes. Therefore more accurate boundaries of unrecoverable holes are detected. holes/simulation on average for λ = 14). The number of recoverable holes using more than one iteration is largest for 5 λ 7 (around 3 holes/simulation on average), and drops slowly to less than one hole per simulation on average for λ 10. The number of unrecoverable holes drops when node density increases. For λ = 3 and 4, the number of unrecoverable holes is largest (around 4 holes/simulation on average); for higher node densities, the average number of unrecoverable holes drops quickly to less than one hole per simulation (λ 7), and drops to less than 0.01 holes/simulation (λ 10). For λ = 2 the average number of unrecoverable holes is 2.9 holes/simulation, which should be larger, but some holes cannot be detected due to the boundary effect in sparse sensor networks. For high node densities (λ > 10), most detected holes are recoverable using one redundant node. Figure 7a. Centralized hole detection. Figure 7b. Distributed hole detection. III. SIMULATION RESULTS For each node density 2 λ 14, simulations are performed in a target area of 64 square units (1 square unit = πr 2 ) within 100 different random node deployments for each node density. During the 1300 simulations, holes are detected including 9464 recoverable holes and 1628 unrecoverable holes holes could be recovered using one redundant node in the first iteration, and 1876 holes are recovered using more than one redundant node and more than one iteration. Figure 8 shows that the mean number of recoverable holes is largest for node densities 6 λ 8 (around 10 holes on average for one simulation). For λ = 8, the number of holes recovered in the first iteration is largest (8 holes/simulation on average), then it drops slowly for higher node densities (5 Figure 8. Number of holes. Because holes recovered using one redundant node require zero communication and calculation overheads for both centralized and distributed algorithms, those 7770 holes are not discussed below. Only the 1628 unrecoverable holes and 1871 recoverable holes requiring more than one iteration are discussed below. Figure 9 compares the number of hole recovery iterations with and without further hole detection (step 5 of 3MeSH-DR). During 1300 simulations (100 simulations per node density), the 1876 recoverable holes recovered by more than one redundant node do not benefit from the further hole detection process because they could be recovered previously. For the 1628 unrecoverable holes, if iterations are permitted without further hole detection, there are 15 unrecoverable holes detected after more than 10 iterations, including one terminating at the 30 th iteration (λ = 13), and one terminating at the 23 rd iteration (λ = 12), which is the worst case for convergence of hole recovery. If further hole detection is performed at each iteration after the fifth recovery iteration, which is suggested by 3MeSH-DR, the number of unrecoverable holes detected after no more than five iterations is exactly the same as that without the further detection process (the worst case). However the number of unrecoverable holes detected at the sixth iteration almost doubles (from 98 to 192) compared to that without further 5

6 detection. Furthermore the convergence of hole detection improves significantly for unrecoverable holes detected after more than seven iterations, which is exactly the same as when performing further hole detection at each iteration (the best case). Simulation shows that performing further hole detection for each iteration after the fifth iteration can achieve similar convergence as when performing further detection at each iteration. But it causes much less communication overhead, because 94% of the 1876 recoverable holes are recovered and 87% of the 1628 unrecoverable holes are detected before six iterations, so the communication overhead is not necessary for the further hole detection process. Figure 9. Unrecoverable holes using different detection processes. IV. CONCLUSIONS This paper proposed an innovative coverage hole detection and recovery algorithm for coordinate-free sensor networks. Both the hole detection and hole recovery algorithms are distributed without any central control, which is very convenient for randomly deployed sensor networks with resource constrained nodes, especially in those scenarios with frequent topology change due to node mobility or unpredictable node failures. Simulation results with thousands of different random node deployments and node densities show that the algorithm is accurate and reliable when detecting the precise boundary of any unrecoverable holes, recovering all recoverable holes using the minimum number of redundant nodes, with an average convergence time of less than three iterations. Its high reliability and efficiency, as well as its distributed character, indicate that this is a practical hole detection and recovery algorithm for real resource constrained sensor networks with limited energy, limited memory and computational capability, and lack of location information etc. This algorithm may also be used in detection of routing holes, jamming holes, and most sink and worm holes in sensor networks, and is more efficient and reliable than existing solutions for these problems. REFERENCES [1] X. Li, D. K. Hunter, K. Yang, Distributed Coordinate-Free Hole Detection and Recovery, IEEE GLOBECOM, San Francisco, USA, November 27 December 1, [2] X. Li, D. K. Hunter, Distributed Coordinate-free Algorithm for Full Sensing Coverage, International Journal of Sensor Networks, [3] B. Carbunar, A. Grama, J. Vitek, O. Carbunar, Coverage Preserving Redundancy Elimination in Sensor Networks, IEEE SECON, October [4] H. Zhang, J. C. Hou, Maintaining Sensing Coverage and Connectivity in Large Sensor Networks, UIUC, [5] J. Wu, S. Yang, Coverage Issue in Sensor Networks with Adjustable Ranges, ICPPWorkshops, 2004, pp [6] D. Tian, N. D. Georganas, A Coverage-preserving Node Scheduling Scheme for Large Wireless Sensor Networks, First ACM International Workshop on WSN, Georgia, USA, [7] C.-F. Huang, Y.-C. Tseng, The Coverage Problem in a Wireless Sensor Network, Second ACM WSNA, [8] J. Jiang, W. Dou, A Coverage Preserving Density Control Algorithm for Wireless Sensor Networks, ADHOC-NOW, pp42 55, Springer- Verlag, July [9] S. Meguerdichian, F. Koushanfar, M. Potkonjak, M. Srivastava, Coverage Problems in Wireless Ad-hoc Sensor Network, IEEE INFOCOM, 2001, pp [10] G. Wang, G. Cao, T. La Porta, Movement-assisted Sensor Deployment, IEEE INFOCOM, [11] A. Howard, M. J. Mataric, G. S Sukhatme, Mobile Sensor Network Deployment Using Potential Fields: A Distributed, Scalable Solution to the Area Coverage Problem, Sixth International Symposium on DARS, June [12] N. Bulusu, J. Heidemann, D. Estrin, T. Tran, Self-configuring Localization Systems: Design and Experimental Evaluation, ACM Transactions on Embedded Computing Systems, May [13] X.-Y. Li, P.-J. Wan, O. Frieder, Coverage in Wireless Ad-hoc Sensor Networks, IEEE Transactions on Computers, vol. 52, no. 6, pp , [14] X. Wang, G. Xing, Y. Zhang, C. Lu, R. Pless, C. Gill, Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks, Proceedings of the ACM, SenSys, pp28 39, November [15] T. Yan, T. He, J. Stankovic, Differentiated Surveillance for Sensor Networks, Proceedings of the ACM, SenSys, [16] R. Ghrist, A. Muhammad, Coverage and Hole-detection in Sensor Networks via Homology Information Processing in Sensor Networks, IPSN, 15 April 2005, pp [17] V. de Silva, R. Ghrist, A. Muhammad, Blind Swarms for Coverage in 2-D, Proceedings on Robotics: Systems and Science, [18] Y. Wang, J. Gao, and J. S. B. Mitchell. Boundary Recognition in Sensor Networks by Topological Methods, MobiCom, New York, NY, USA, ACM Press, [19] S. Funke, C. Klein. Hole Detection or: How Much Geometry Hides in Connectivity?, Proceedings of the Twenty-second Annual Symposium on Computational Geometry, SCG, pp , New York, NY, USA, ACM Press, [20] H. Zhang, A. Arora, GS3: Scalable Self-configuration and Self-healing in Wireless Networks, ACM Symposium on Principles of Distributed Computing, [21] X. Wang, T. Berger, Self-Organizing Redundancy Cellular Architecture for Wireless Sensor Networks, WCNC, [22] 6

Int. J. Sensor Networks, Vol. 5, No. 3, 2009 153

Int. J. Sensor Networks, Vol. 5, No. 3, 2009 153 Int. J. Sensor Networks, Vol. 5, No. 3, 2009 153 Distributed coordinate-free algorithm for full sensing coverage Xiaoyun Li Complex and Adaptive Systems Laboratory, University College Dublin, Dublin 4,

More information

Connectivity-based Distributed Coverage Hole Detection in Wireless Sensor Networks

Connectivity-based Distributed Coverage Hole Detection in Wireless Sensor Networks Connectivity-based Distributed Coverage Hole Detection in Wireless Sensor Networks Feng Yan, Philippe Martins, Laurent Decreusefond To cite this version: Feng Yan, Philippe Martins, Laurent Decreusefond.

More information

Coverage-Hole Trap Model in Target Tracking using Distributed Relay-Robot Network

Coverage-Hole Trap Model in Target Tracking using Distributed Relay-Robot Network Coverage-Hole Trap Model in Target Tracking using Distributed Relay-Robot Network Huawei Miao, Chia Ching Ooi, Xiaowen Wu, and Christian Schindelhauer Computer Networks and Telematics, Department of Computer

More information

A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks

A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks Jie Wu Computer Science & Engineering Department Florida Atlantic University Boca Raton, FL 3343, USA E-mail: jie@cse.fau.edu

More information

Repairing Sensor Network Using Mobile Robots

Repairing Sensor Network Using Mobile Robots Repairing Sensor Network Using Mobile Robots 1 Yongguo Mei, Changjiu Xian, Saumitra Das, Y. Charlie Hu and Yung-Hsiang Lu Purdue University, West Lafayette {ymei, cjx, smdas, ychu, yunglu}@purdue.edu Abstract

More information

EBHEAL: Distributed and Localized Mechanism for Coverage Hole Detection and Healing

EBHEAL: Distributed and Localized Mechanism for Coverage Hole Detection and Healing www.ijecs.in International Journal Of Engineering And Computer Science ISSN:39-74 Volume 4 Issue 7 July 05, Page No. 3457-346 EBHEAL: Distributed and Localized Mechanism for Coverage Hole Detection and

More information

Probabilistic Coverage in Wireless Sensor Networks

Probabilistic Coverage in Wireless Sensor Networks Probabilistic Coverage in Wireless Sensor Networks Nadeem Ahmed 1,2 nahmed@cse.unsw.edu.au 1 Computer Science and Engineering, University of New South Wales, Sydney, Australia. Salil S. Kanhere 1 salilk@cse.unsw.edu.au

More information

A Bidding Protocol for Deploying Mobile Sensors

A Bidding Protocol for Deploying Mobile Sensors A Bidding Protocol for Deploying Mobile Sensors Guiling Wang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania State University, University Park, PA 1 Email: {guiwang,gcao,tlp}@cse.psu.edu

More information

Mobile Network Analysis - Hole Healing

Mobile Network Analysis - Hole Healing , pp.143-150 http://dx.doi.org/10.14257/ijfgcn.2013.6.6.15 Decentralized Mobile Sensor Navigation for Hole Healing Policy in Wireless Hybrid Sensor Networks Fu-Tian Lin 1, 2, Chu-Sing Yang 1, Tien-Wen

More information

Keywords coverage holes, energy efficient, hole detection, hole healing

Keywords coverage holes, energy efficient, hole detection, hole healing Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Hole Detection and

More information

Partial Coverage in Homological Sensor Networks

Partial Coverage in Homological Sensor Networks !000000999 IIIEEEEEEEEE IIInnnttteeerrrnnnaaatttiiiooonnnaaalll CCCooonnnfffeeerrreeennnccceee ooonnn WWWiiirrreeellleeessssss aaannnddd MMMooobbbiiillleee CCCooommmpppuuutttiiinnnggg,,, NNNeeetttwwwooorrrkkkiiinnnggg

More information

Modified Coverage Hole Detection Algorithm for Distributed WSNs

Modified Coverage Hole Detection Algorithm for Distributed WSNs Modified Coverage Detection Algorithm for Distributed WSNs K. Lakshmi Joshitha 1 and Dr.S.Jayashri 2 1 Research Scholar, Anna University, Chennai, India Email: lakshmijoshitha@yahoo.com 2 Director, Adhiparasakthi

More information

An Energy Efficient Location Service for Mobile Ad Hoc Networks

An Energy Efficient Location Service for Mobile Ad Hoc Networks An Energ Efficient Location Service for Mobile Ad Hoc Networks Zijian Wang 1, Euphan Bulut 1 and Boleslaw K. Szmanski 1, 1 Department of Computer Science, Rensselaer Poltechnic Institute, Tro, NY 12180

More information

Accuracy of Homology based Approaches for Coverage Hole Detection in Wireless Sensor Networks

Accuracy of Homology based Approaches for Coverage Hole Detection in Wireless Sensor Networks Accuracy of Homology based Approaches for Coverage Hole Detection in Wireless Sensor Networks Feng Yan, Philippe Martins, Laurent Decreusefond To cite this version: Feng Yan, Philippe Martins, Laurent

More information

Coverage Related Issues in Networks

Coverage Related Issues in Networks Coverage Related Issues in Networks Marida Dossena* 1 1 Department of Information Sciences, University of Naples Federico II, Napoli, Italy Email: marida.dossena@libero.it Abstract- Wireless sensor networks

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

DAG based In-Network Aggregation for Sensor Network Monitoring

DAG based In-Network Aggregation for Sensor Network Monitoring DAG based In-Network Aggregation for Sensor Network Monitoring Shinji Motegi, Kiyohito Yoshihara and Hiroki Horiuchi KDDI R&D Laboratories Inc. {motegi, yosshy, hr-horiuchi}@kddilabs.jp Abstract Wireless

More information

Modified Sensor Deployment Algorithm for Hole Detection and Healing using NS2

Modified Sensor Deployment Algorithm for Hole Detection and Healing using NS2 RESEARCH ARTICLE OPEN ACCESS Modified Sensor Deployment Algorithm for Hole Detection and Healing using NS2 Vaishnavi Sukumaran, T.P. Saravanabava M.E, College Of Engineering, Guindy, Chennai, India, 2014

More information

Hole Detection and Healing Using Heal Algorithm

Hole Detection and Healing Using Heal Algorithm Hole Detection and Healing Using Heal Algorithm Divya K Suku, Phini Ann Philip Pursuing M.Tech, Department of ECE, CAARMEL Engineering College, Pathanamthitta, Kerala, India Assistant Professor, Department

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-4 E-ISSN: 2347-2693 A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy

More information

A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks

A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks Dajin Wang Department of Computer Science Montclair State University, Upper Montclair, NJ 07043, USA wang@pegasus.montclair.edu

More information

Holes in Wireless Sensor Network

Holes in Wireless Sensor Network HOLE DETECTION AND HEALING FOR A RoI IN WIRELESS SENSOR NETWORKS Divya K Suku, Phini Ann Philip PG Scholar, Department of ECE, CAARMEL Engineering College, Pathanamthitta, Kerala Assistant Professor, Department

More information

Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks

Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks Gowthami.A, Lavanya.R Abstract - A number of energy-aware routing protocols are proposed to provide the energy efficiency

More information

STUDY OF MOBILE NODE BASED COVERAGE RECOVERY PROCESS FOR WSN DEPLOYED IN LARGE FOOD GRAIN WAREHOUSE

STUDY OF MOBILE NODE BASED COVERAGE RECOVERY PROCESS FOR WSN DEPLOYED IN LARGE FOOD GRAIN WAREHOUSE STUDY OF MOBILE NODE BASED COVERAGE RECOVERY PROCESS FOR WSN DEPLOYED IN LARGE FOOD GRAIN WAREHOUSE Neha Deshpande 1 & A. D. Shaligram 2 1 A.G.College, Pune, Maharshtra, India 2 Dept. Of Electronic Science,

More information

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks Jeongcheol Lee, Euisin

More information

Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks

Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks Mahmuda Ahmed, Mehrab Shariar, Shobnom Zerin and Ashikur Rahman Department of Computer Science and Engineering Bangladesh

More information

Strictly Localized Construction of Planar Bounded-Degree Spanners of Unit Disk Graphs

Strictly Localized Construction of Planar Bounded-Degree Spanners of Unit Disk Graphs Strictly Localized Construction of Planar Bounded-Degree Spanners of Unit Disk Graphs Iyad A. Kanj Ljubomir Perković Ge Xia Abstract We describe a new distributed and strictly-localized approach for constructing

More information

Connected Identifying Codes for Sensor Network Monitoring

Connected Identifying Codes for Sensor Network Monitoring Connected Identifying Codes for Sensor Network Monitoring Niloofar Fazlollahi, David Starobinski and Ari Trachtenberg Dept. of Electrical and Computer Engineering Boston University, Boston, MA 02215 Email:

More information

Coverage in Wireless Sensor Networks: A Survey

Coverage in Wireless Sensor Networks: A Survey Coverage in Wireless Sensor Networks: A Survey Raymond Mulligan Wireless Sensor and Mobile Ad-hoc Networks (WiSeMAN) Research Lab Department of Computer Science, Hofstra University Hempstead, NY 11549,

More information

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers , pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang

More information

Optimal Hole Coverage Using Hole Detection and Replacing Algorithm in Wireless Sensor Networks

Optimal Hole Coverage Using Hole Detection and Replacing Algorithm in Wireless Sensor Networks Optimal Hole Coverage Using Hole Detection and Replacing Algorithm in Wireless Sensor Networks 1 D. Jewel, 2 P. Brundha, 3 D. C. Joy Winnie Wise 1,2,3 Department of CSE, Francis Xavier Engineering College

More information

Introduction to LAN/WAN. Network Layer

Introduction to LAN/WAN. Network Layer Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services

More information

Recent advances in microelectromechanical

Recent advances in microelectromechanical COVER FEATURE Energy-Efficient Area Monitoring for Sensor Networks The nodes in sensor networks must self-organize to monitor the target area as long as possible. Optimizing energy consumption in area

More information

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India nadhachandra@gmail.com Abstract Energy efficient load balancing in a Wireless Sensor

More information

Decentralized Utility-based Sensor Network Design

Decentralized Utility-based Sensor Network Design Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA narayans@cs.usc.edu, bkrishna@usc.edu

More information

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,

More information

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification Sheng-Cong Hu r00631036@ntu.edu.tw Jen-Hou Liu r99631038@ntu.edu.tw Min-Sheng

More information

The K-Observer Problem in Computer Networks

The K-Observer Problem in Computer Networks The K-Observer Problem in Computer Networks H. B. Acharya 1, Taehwan Choi 1, Rida A. Bazzi 2, and Mohamed G. Gouda 1,3 1 The University of Texas at Austin, USA 2 Arizona State University, USA 3 The National

More information

Isolines: Energy-efficient Mapping in Sensor Networks

Isolines: Energy-efficient Mapping in Sensor Networks Isolines: Energy-efficient Mapping in Sensor Networks Ignacio Solis and Katia Obraczka {isolis, katia}@cse.ucsc.edu Computer Engineering Department University of California, Santa Cruz April 15, 2005 Abstract

More information

Distributed Coverage in Wireless Ad Hoc and Sensor Networks by Topological Graph Approaches

Distributed Coverage in Wireless Ad Hoc and Sensor Networks by Topological Graph Approaches 2010 International Conference on Distributed Computing Systems Distributed Coverage in Wireless Ad Hoc and Sensor Networks by Topological Graph Approaches Dezun Dong, Yunhao Liu, Kebin Liu and Xiangke

More information

A Survey on Rendezvous Data Collection in Wireless Sensor Networks. Presented by Longfei Shangguan Supervisor:Dr.Yunhao Liu

A Survey on Rendezvous Data Collection in Wireless Sensor Networks. Presented by Longfei Shangguan Supervisor:Dr.Yunhao Liu A Survey on Rendezvous Data Collection in Wireless Sensor Networks Presented by Longfei Shangguan Supervisor:Dr.Yunhao Liu Roadmap Background Introduction of state-of-art solutions Future works References

More information

Medial Axis Construction and Applications in 3D Wireless Sensor Networks

Medial Axis Construction and Applications in 3D Wireless Sensor Networks Medial Axis Construction and Applications in 3D Wireless Sensor Networks Su Xia, Ning Ding, Miao Jin, Hongyi Wu, and Yang Yang Presenter: Hongyi Wu University of Louisiana at Lafayette Outline Introduction

More information

Risk Management in Intrusion Detection Applications with Wireless Video Sensor Networks

Risk Management in Intrusion Detection Applications with Wireless Video Sensor Networks Risk Management in Intrusion Detection Applications with Wireless Video Sensor Networks Abdallah Makhoul University of Franche-Comté LIFC Laboratory Email: abdallah.makhoul@iut-bm.univ-fcomte.fr Rachid

More information

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,

More information

Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART

Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART Abdul Aziz Memon and Seung Ho Hong Abstract In this paper load-balancing routing algorithm for WirelessHART standard is proposed. WirelessHART

More information

A Novel Distributed Algorithm for Complete Targets Coverage in Energy Harvesting Wireless Sensor Networks

A Novel Distributed Algorithm for Complete Targets Coverage in Energy Harvesting Wireless Sensor Networks A Novel Distributed Algorithm for Complete Targets Coverage in Energy Harvesting Wireless Sensor Networks Changlin Yang School of Electrical, Computer and Telecommunications Engineering University of Wollongong

More information

Three Effective Top-Down Clustering Algorithms for Location Database Systems

Three Effective Top-Down Clustering Algorithms for Location Database Systems Three Effective Top-Down Clustering Algorithms for Location Database Systems Kwang-Jo Lee and Sung-Bong Yang Department of Computer Science, Yonsei University, Seoul, Republic of Korea {kjlee5435, yang}@cs.yonsei.ac.kr

More information

A Multi-Poller based Energy-Efficient Monitoring Scheme for Wireless Sensor Networks

A Multi-Poller based Energy-Efficient Monitoring Scheme for Wireless Sensor Networks A Multi-Poller based Energy-Efficient Monitoring Scheme for Wireless Sensor Networks Changlei Liu and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University E-mail:

More information

An Optimal Algorithm for Coverage Hole Healing in Hybrid Sensor Networks

An Optimal Algorithm for Coverage Hole Healing in Hybrid Sensor Networks An Optimal Algorithm for Coverage Hole Healing in Hybrid Sensor Networks Dung T. Nguyen, Nam P. Nguyen, My T. Thai, Abdelsalam Helal Department of Computer and Information Science and Engineering, University

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks

Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks Jing Deng Department of Computer Science University of New Orleans New Orleans, LA 7048, USA jing@cs.uno.edu Yunghsiang

More information

Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network

Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Sagar M Mane Walchand Institute of Technology Solapur. India. Solapur University, Solapur. S.S.Apte Walchand Institute

More information

On Energy-Efficient Trap Coverage in Wireless Sensor Networks

On Energy-Efficient Trap Coverage in Wireless Sensor Networks 211 32nd IEEE Real-Time Systems Symposium On Energy-Efficient Trap Coverage in Wireless Sensor Networks Junkun Li Jiming Chen Shibo He Tian He Yu Gu Youxian Sun State Key Lab. of Industrial Control Technology,

More information

Competitive Analysis of On line Randomized Call Control in Cellular Networks

Competitive Analysis of On line Randomized Call Control in Cellular Networks Competitive Analysis of On line Randomized Call Control in Cellular Networks Ioannis Caragiannis Christos Kaklamanis Evi Papaioannou Abstract In this paper we address an important communication issue arising

More information

Arbitrary Obstacles Constrained Full Coverage in Wireless Sensor Networks

Arbitrary Obstacles Constrained Full Coverage in Wireless Sensor Networks Arbitrary Obstacles Constrained Full Coverage in Wireless Sensor Networks Haisheng Tan Yuexuan Wang Xiaohong Hao Qiang-Sheng Hua Francis C.M. Lau Department of Computer Science, The University of Hong

More information

Vertices And Wireless Networks - A Review

Vertices And Wireless Networks - A Review th International Workshop on Spatial Stochastic Models for Wireless Networks 4 Homology based algorithm for disaster recovery in wireless networks A. Vergne, I. Flint, L. Decreusefond and P. Martins Institut

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Distributed Dynamic Load Balancing for Iterative-Stencil Applications

Distributed Dynamic Load Balancing for Iterative-Stencil Applications Distributed Dynamic Load Balancing for Iterative-Stencil Applications G. Dethier 1, P. Marchot 2 and P.A. de Marneffe 1 1 EECS Department, University of Liege, Belgium 2 Chemical Engineering Department,

More information

Computational Geometry. Lecture 1: Introduction and Convex Hulls

Computational Geometry. Lecture 1: Introduction and Convex Hulls Lecture 1: Introduction and convex hulls 1 Geometry: points, lines,... Plane (two-dimensional), R 2 Space (three-dimensional), R 3 Space (higher-dimensional), R d A point in the plane, 3-dimensional space,

More information

COVERAGE AND HOLE-DETECTION IN SENSOR NETWORKS VIA HOMOLOGY

COVERAGE AND HOLE-DETECTION IN SENSOR NETWORKS VIA HOMOLOGY COVERAGE AND HOLE-DETECTION IN SENSOR NETWORKS VIA HOMOLOGY Robert Ghrist Department of Mathematics Coordinated Science Laboratory University of Illinois Urbana, IL 601 USA Abubakr Muhammad School of Electrical

More information

New Distributed Algorithm for Connected Dominating Set in Wireless Ad Hoc Networks

New Distributed Algorithm for Connected Dominating Set in Wireless Ad Hoc Networks 0-7695-1435-9/0 $17.00 (c) 00 IEEE 1 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS-35 0) 0-7695-1435-9/0 $17.00 00 IEEE Proceedings of the 35th Hawaii International

More information

Estimating Coverage Holes and Enhancing Coverage in Mixed Sensor Networks

Estimating Coverage Holes and Enhancing Coverage in Mixed Sensor Networks Estimating Coverage Holes and Enhancing Coverage in Mixed Sensor Networks Amitabha Ghosh Honeywell Technology Solutions Laboratory 151/1 Doraisanipalya, Bannerghatta Road Bangalore 560076, INDIA amitabhaghosh@honeywellcom

More information

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India

More information

DATA COLLECTION SCHEME FOR WIRELESS SENSOR NETWORK WITH MOBILE COLLECTOR

DATA COLLECTION SCHEME FOR WIRELESS SENSOR NETWORK WITH MOBILE COLLECTOR DATA COLLECTION SCHEME FOR WIRELESS SENSOR NETWORK WITH MOBILE COLLECTOR Khaled Almi ani, Muder Almi ani, Ali Al_ghonmein and Khaldun Al-Moghrabi ABSTRACT Al-Hussein Bin Talal University, Ma an, Jordan

More information

Hybrid Node Deployment Algorithm to Mitigate the Coverage Whole Problem in Wireless Sensor Network

Hybrid Node Deployment Algorithm to Mitigate the Coverage Whole Problem in Wireless Sensor Network Middle-East Journal of Scientific Research 23 (10): 2500-2506, 2015 ISSN 1990-9233 IDOSI Publications, 2015 DOI: 10.5829/idosi.mejsr.2015.23.10.02 Hybrid Node Deployment Algorim to Mitigate e Coverage

More information

Investigating the Energy Sink-Hole Problem in Connected k-covered Wireless Sensor Networks

Investigating the Energy Sink-Hole Problem in Connected k-covered Wireless Sensor Networks Investigating the Energy Sink-Hole Problem in Connected k-covered Wireless Sensor Networks Habib M. Ammari Wireless Sensor and Mobile Ad-hoc Networks (WiSeMAN) Research Lab Department of Computer and Information

More information

Defending Wireless Sensor Networks Against Adversarial Localization

Defending Wireless Sensor Networks Against Adversarial Localization Defending Wireless Sensor Networks Against Adversarial Localization Neelanjana Dutta, Abhinav Saxena and Sriram Chellappan Department of Computer Science Missouri University of Science and Technology Rolla,

More information

MCTA: Target Tracking Algorithm based on

MCTA: Target Tracking Algorithm based on This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 27 proceedings. MCTA: Target Tracking Algorithm based on

More information

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM S. Sofia 1, M.Varghese 2 1 Student, Department of CSE, IJCET 2 Professor, Department of CSE, IJCET Abstract This paper proposes fault node recovery

More information

Quality of Service Routing in Ad-Hoc Networks Using OLSR

Quality of Service Routing in Ad-Hoc Networks Using OLSR Quality of Service Routing in Ad-Hoc Networks Using OLSR Ying Ge Communications Research Centre ying.ge@crc.ca Thomas Kunz Carleton University tkunz@sce.carleton.ca Louise Lamont Communications Research

More information

A Review on Failure Node Recovery Algorithms in Wireless Sensor Actor Networks

A Review on Failure Node Recovery Algorithms in Wireless Sensor Actor Networks A Review on Failure Node Recovery Algorithms in Wireless Sensor Actor Networks G.Sumalatha #1, N.Zareena *2, Ch.Gopi Raju #3 #1&2 Asst.Prof, Department of CSE, Vignan's LARA Institute Of Technology & Science,

More information

A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM

A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM Hideto Horiuchi, Naoki Wakamiya and Masayuki Murata Graduate School of Information Science and Technology, Osaka University 1

More information

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological

More information

The Self-Protection Problem in Wireless Sensor Networks

The Self-Protection Problem in Wireless Sensor Networks The Self-Protection Problem in Wireless Sensor Networks DAN WANG Simon Fraser University QIAN ZHANG Hong Kong University of Science and Technology and JIANGCHUAN LIU Simon Fraser University Wireless sensor

More information

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually

More information

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Md. Safiqul Islam *1, Syed AshiqurRahman *2 Department of Computer Science and Engineering Daffodil

More information

GPS (Global positioning system) enables a device to determine

GPS (Global positioning system) enables a device to determine 1 Application of GPS to Mobile IP and Routing in Wireless Networks Mustafa Ergen,Sinem Coleri,Baris Dundar,Rahul Jain, Anuj Puri Dept. of Electrical Eng. and Computer Sci. University of California, Berkeley

More information

Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm

Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm Pallavi Motharkar 1, Dr.P.R.Deshmukh 2 and Prof.G.S.Thakare 3 1 M.E. (Computer Engineering), 2,3 Department

More information

Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks

Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks Gowthami.V.R, Divya Sharma M.Tech, Dept. of E&C. NHCE, VTU, Bengaluru India. Assistant

More information

Load Balancing Routing Algorithm for Data Gathering Sensor Network

Load Balancing Routing Algorithm for Data Gathering Sensor Network Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum

More information

Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network

Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network International Journal of Computer Applications (975 8887) Volume 4 No.6, July 21 Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network Harneet Kour Department of Computer

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,

More information

Emergency Guiding and Monitoring Applications in Indoor 3D Environments by Wireless Sensor Networks

Emergency Guiding and Monitoring Applications in Indoor 3D Environments by Wireless Sensor Networks Emergency Guiding and Monitoring Applications in Indoor 3D Environments by Wireless Sensor Networks Meng-Shiuan Pan, Chia-Hung Tsai, and Yu-Chee Tseng Department of Computer Science National Chiao Tung

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

Energy Efficient Coverage for Mobile Sensor Network

Energy Efficient Coverage for Mobile Sensor Network Volume 55 No., October Energy Efficient Coverage for Mobile Sensor Network Richa Singh Krishna Engineering College, Ghaziabad ABSTRACT Wireless sensor networks comprise the platform of a broad range of

More information

A Dynamically Configurable Topology Control for Hybrid Ad Hoc Networks with Internet Gateways

A Dynamically Configurable Topology Control for Hybrid Ad Hoc Networks with Internet Gateways ynamically onfigurable Topology ontrol for Hybrid d Hoc Networks with Internet ateways eun-hee ho and Young-ae Ko raduate School of Information & ommunication, jou University, Republic of Korea {khzho,

More information

Quality of Service Routing Network and Performance Evaluation*

Quality of Service Routing Network and Performance Evaluation* Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,

More information

Survey on Network Lifetime Enhancement Method

Survey on Network Lifetime Enhancement Method International Journal of Computer Sciences and Engineering Open Access Survey Paper Volume-4, Issue-03 E-ISSN: 2347-2693 Survey on Network Lifetime Enhancement Method Abdul Jawad 1* and P. B. Mali 2 1*,2

More information

Some Security Trends over Wireless Sensor Networks

Some Security Trends over Wireless Sensor Networks Some Security Trends over Wireless Sensor Networks ZORAN BOJKOVIC, BOJAN BAKMAZ, MIODRAG BAKMAZ Faculty of Transport and Traffic Engineering University of Belgrade Vojvode Stepe 305 SERBIA Abstract: -

More information

Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures

Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures Dmitri Krioukov, kc claffy, and Kevin Fall CAIDA/UCSD, and Intel Research, Berkeley Problem High-level Routing is

More information

Load Balancing Geo-routing and routing around Holes in Wireless Sensor Networks Ashwini S R 1, Dr.Nataraj K R 2 1 PG Student, DCN, SJBIT, Bangalore

Load Balancing Geo-routing and routing around Holes in Wireless Sensor Networks Ashwini S R 1, Dr.Nataraj K R 2 1 PG Student, DCN, SJBIT, Bangalore Load Balancing Geo-routing and routing around Holes in Wireless Sensor Networks Ashwini S R 1, Dr.Nataraj K R 2 1 PG Student, DCN, SJBIT, Bangalore 2 Professor and HOD, SJBIT, Bangalore Email: ashwinigowda@gmail.com,

More information

Routing and Transport in Wireless Sensor Networks

Routing and Transport in Wireless Sensor Networks Routing and Transport in Wireless Sensor Networks Ibrahim Matta (matta@bu.edu) Niky Riga (inki@bu.edu) Georgios Smaragdakis (gsmaragd@bu.edu) Wei Li (wli@bu.edu) Vijay Erramilli (evijay@bu.edu) References

More information

Social Media Mining. Graph Essentials

Social Media Mining. Graph Essentials Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures

More information

Load-Balanced Virtual Backbone Construction for Wireless Sensor Networks

Load-Balanced Virtual Backbone Construction for Wireless Sensor Networks Load-Balanced Virtual Backbone Construction for Wireless Sensor Networks Jing (Selena) He, Shouling Ji, Yi Pan, Zhipeng Cai Department of Computer Science, Georgia State University, Atlanta, GA, USA, {jhe9,

More information

A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network

A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network Parama Bhaumik 1, Somprokash Bandyopadhyay 2 1 Dept. of Information Technology, Jadavpur

More information

Scalable Source Routing

Scalable Source Routing Scalable Source Routing January 2010 Thomas Fuhrmann Department of Informatics, Self-Organizing Systems Group, Technical University Munich, Germany Routing in Networks You re there. I m here. Scalable

More information

A Security Architecture for. Wireless Sensor Networks Environmental

A Security Architecture for. Wireless Sensor Networks Environmental Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information