An Efficient Recovery Algorithm for Coverage Hole in WSNs

Similar documents
The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

An algorithm of choosing LSPs in the MPLS network with unreliable links

A Secure Password-Authenticated Key Agreement Using Smart Cards

APPLICATION OF BINARY DIVISION ALGORITHM FOR IMAGE ANALYSIS AND CHANGE DETECTION TO IDENTIFY THE HOTSPOTS IN MODIS IMAGES

Automated information technology for ionosphere monitoring of low-orbit navigation satellite signals

An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

A Binary Quantum-behaved Particle Swarm Optimization Algorithm with Cooperative Approach

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

DEGREES OF EQUIVALENCE IN A KEY COMPARISON 1 Thang H. L., Nguyen D. D. Vietnam Metrology Institute, Address: 8 Hoang Quoc Viet, Hanoi, Vietnam

Cluster Analysis. Cluster Analysis

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

Calculating the high frequency transmission line parameters of power cables

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Present Values and Accumulations

THE LOAD PLANNING PROBLEM FOR LESS-THAN-TRUCKLOAD MOTOR CARRIERS AND A SOLUTION APPROACH. Professor Naoto Katayama* and Professor Shigeru Yurimoto*

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

Master s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks

A Generalized Temporal and Spatial Role-Based Access Control Model

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

EXAMPLE PROBLEMS SOLVED USING THE SHARP EL-733A CALCULATOR

Research Article QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST)

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

A Dynamic Load Balancing for Massive Multiplayer Online Game Server

Load Balancing Based on Clustering Methods for LTE Networks

Damage detection in composite laminates using coin-tap method

Testing and Debugging Resource Allocation for Fault Detection and Removal Process

Trust Network and Trust Community Clustering based on Shortest Path Analysis for E-commerce

A Falling Detection System with wireless sensor for the Elderly People Based on Ergnomics

Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET)

2. RELATED WORKS AND PROBLEM STATEMENT

The Design of Efficiently-Encodable Rate-Compatible LDPC Codes

Cooperative Load Balancing in IEEE Networks with Cell Breathing

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Resource Sharing Models and Heuristic Load Balancing Methods for

A Revised Received Signal Strength Based Localization for Healthcare

A Programming Model for the Cloud Platform

A DATA MINING APPLICATION IN A STUDENT DATABASE

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

Document Clustering Analysis Based on Hybrid PSO+K-means Algorithm

Network Security Situation Evaluation Method for Distributed Denial of Service

Descriptive Models. Cluster Analysis. Example. General Applications of Clustering. Examples of Clustering Applications

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network

A heuristic task deployment approach for load balancing

Sensor placement for leak detection and location in water distribution networks

Ant Colony Optimization for Economic Generator Scheduling and Load Dispatch

Formulating & Solving Integer Problems Chapter

Heuristic Static Load-Balancing Algorithm Applied to CESM

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center

Adaptive and Dynamic Load Balancing in Grid Using Ant Colony Optimization

A Practical Study of Regenerating Codes for Peer-to-Peer Backup Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

A General and Practical Datacenter Selection Framework for Cloud Services

P2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks

An RFID Distance Bounding Protocol

Wireless Inter-Session Network Coding - An Approach Using Virtual Multicasts

Sciences Shenyang, Shenyang, China.

Waste to Energy System in Shanghai City

Autonomous Deployment for Load Balancing k-surface Coverage in Sensor Networks

Activity Scheduling for Cost-Time Investment Optimization in Project Management

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Comparison of Control Strategies for Shunt Active Power Filter under Different Load Conditions

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Perfect QoS Routing Algorithm for Finding the Best Path for Dynamic Networks

Improved SVM in Cloud Computing Information Mining

Investigation of Modified Bee Colony Algorithm with Particle and Chaos Theory

Secure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks

A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks

Energy Conserving Routing in Wireless Ad-hoc Networks

Software project management with GAs

How To Improve Delay Throughput In Wireless Networks With Multipath Routing And Channel Codeing

Project Networks With Mixed-Time Constraints

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services

Transcription:

An Effcent Recover Algorthm for Coverage Hole n WSNs Song Ja 1,*, Wang Balng 1, Peng Xuan 1 School of Informaton an Electrcal Engneerng Harbn Insttute of Technolog at Weha, Shanong, Chna Automatc Test an Control Insttute Harbn Insttute of Technolog,Harbn, Chna * songja@htwh.eu.cn Abstract. Falures are nevtable n wreless sensor networks, an t s mportant to etect an patch the coverage hole. In ths paper, we propose an effcent recover algorthm base on mnmum stance reunant noes. B numercal algorthm, the snk noe gets the centre of the coverage hole, an then wakes up a reunant noe, whch has the mnmum stance to the centre, to recover the hole. Smulaton results emonstrate that, b choosng approprate number of reunant noes, ths algorthm wll have great recover accurac an coverage qualt, also acheve the purpose of prolongng the lfeccle of WSNs. Kewors: coverage hole; fault management; WSNs 1 Introucton Falures are nevtable n wreless sensor networks (WSNs) ue to the nhosptable envronment an unattene eploment. Furthermore, the constrane energ, storage capact an computatonal ablt make the stuaton worse. In practcal applcaton, fault sensor noes are one of the most mportant sources of faults. A noe s fragle an has lmte resources, whch makes t eas to become fault. So there appears some coverage hole, whch wll en the lfe of WSNs an leave much more energ resources waste n the networks [1] []. Noe Self Detecton b Hstor ata an Neghbors (NDHN) algorthm [3] an Fault Detecton Technque base on Clusterng (FDTC) [4] are propose to etect the fault noes. In ths paper, we target the problem of recoverng the coverage hole. Relate Work There are man reunant noes eploe ranoml n WSNs, so t s possble to solate fale noes rectl an choose some reunant noes to restructure a new Supporte b the Natonal Scence Nature Founaton of Chna uner Grant No 611706 ASP 013, ASTL Vol. 18, pp. 5-9, 013 SERSC 013 5

Proceengs, The n Internatonal Conference on Avance Sgnal Processng route to transmt the nformaton. Man exstng approaches use ths technque to hanle smple fault stuaton. Mart et al. [5] propose a technque to etect fault neghbor an choose another new neghbor nstea. Usng moble noe to repar coverage hole s another most effectve technques n fault recover, whch can solve har fault. In the paper [6], Gulng Wang propose an algorthm that the snk noe etermne reunant noe s locaton an controlle t to move to the proper place to repar the hole. 3 Localze Fault Recover Algorthms 3.1 Sesson Scenaro The algorthms n ths paper are evelope uner the followng assumptons: 1) Actve noes are structure an eploe n avance; reunant noes are eploe ranoml; ) All sensor noes are statonar after eploment, wth sensng range R s ; 3) All sensor noes have the same structure an functon, an ther status s equal n an wa; 4) There s onl one snk noe, an t s eploe outse the network, whch has unrestrcte energ; 5) Ever noe has ts locaton nformaton. Rs N3 Nr3 Nr4 N4 X N1 N Lo Lo Nr1 N5 N6 Nr (1) () (3) (4) Fg. 1. Sesson scenaro Fg.1 llustrates the man role urng a recover sesson, whch starts when the snk noe etects a eath noe N1 through NDHN technque [3]. The coverage hole cause b N1 s showe b the shaow X (1). Accorng to the locaton nformaton of N1 s neghbors, such as N N3 N4 N5 an N6, we can obtan the rregular shape of X. Then seek a foursquare to cover the whole area of X, whch the square area shoul be mnmum (). After that, t s mportant to seek a mnmum crcle to cover the foursquare, an the centre of the crcle wll be the optmum locaton of a substtute noe, marke Lo (3). Furthermore, the ajacent reunant noes calculate the stances to Lo, an transform the stances to the snk noe. Fnall, accorng to the prncple of mnmum stance, snk noe chooses reunant noes Nr1 as the substtute noe, an wake t up to jon the network (4). 6

An Effcent Recover Algorthm for Coverage Hole n WSNs 3. Dervaton of Recover Proceure The proceure of recoverng a coverage hole can be explane as follows. Denote R N ) as a boune close set of n m that contans actve noes ( 1, N Nn, an reunant noes N r, Nr,... Nrm N,... as N ( x, )( 1, n) ( x l, l L n R N ) spot ) = an N ( x, m) ( are compute b equaton (1). r r, an enote r r 1. Denote ther coornates )( = 1,. Denote an arbtrar r as the stance from L to N, whch = ( xl x ) + ( l ) (1) We also enote L x, ) as the optmal locaton of recover noe. An enote o( lo lo as the stance from 3.3 Algorthm N to L, whch are compute b equaton (). r o = ( xlo xr) + ( lo r) () 1) NDHN algorthm wll be operate n the cluster, an then the snk noe makes a ecson whether there has a fault noe N ; ) Calculatng the stance from an arbtrar spot L to N j, neghbor noe of N, b equaton (1). When ever r s satsfe wth r R s, t ncates that the arbtrar spot L s n the coverage hole ; 3) Searchng for the extreme x-coornates of all arbtrar spots n the coverage hole, marke x an x mn, an the extreme -coornates, marke an mn ; 4) Choosng the greater value of x t an square S h, an etermnng four enponts of t as the length of the se of one S h at the same tme, marke P x', ' ; P x', ' ), P x', ' ), P x', ' ) an ) 1( mn mn crcle of ( mn 3( 4( mn 5) Choosng a crcle to cover S h completel, an the centre of the mnmum Cmn wll be the optmal locaton of replacement noe, marke L o. The raus C mn an the coornate of L o wll be calculate; 6) Calculatng the value of b equaton (). Snk noe actves noe jon the network an sense parameters, whch has the mnmum value of orers the rest of the reunant noes to sleep. N r to, an 7

Proceengs, The n Internatonal Conference on Avance Sgnal Processng 4 Smulaton an Dscussons MATLAB s use to perform the smulatons. It contans 4 noes n a square regon of sze 140 100m, n whch actve noes are structure an eploe n avance an 10 reunant noes are eploe ranoml. We use the NDHN technque to etect the voltages of the noes. Once the voltages are lower than.v, noes n the sstem wll stop transmttng ata an be regare as fault practcall. Then MDRN technque s trggere to recover the coverage hole. Fg.. Recover accurac Fg.3. Qualt of recover Because the number of reunant noes wll affect the recover result serousl, we choose 10, 0, 30 an 50 reunant noes respectvel to recover 1 fault noe, an then to recover fault noes. In ever stuaton, we operate MDRN algorthm 30 tmes an calculate the average value. The recover accurac of MDRN s showe n Fg., an the qualt of recover s showe n Fg.3. 5 Concluson Ths paper presents a technque MDRN for noe fault recover n fault management of WSNs. Accorng to the smulaton result, t s feasble an effectve for treatng coverage hole cause b fault noe. Furthermore, the metho coul be serve as a support for sensor networks energ balancng an optmzaton. In the future, we wll explore the technque of reucng the number of reunant noes, an mprovng the recover accurac when treatng the stuaton of multple fault noes. References 1. Aklz, I.F.,Welan Su, Sankarasubramanam, Y., Carc, E.: A surve on sensor networks. J. Communcatons Magazne, IEEE, 10-114(00).. Peng Yu, Song Ja, Peng Xuan. Surve of Fault Management Framework n Wreless Sensor Networks[J]. Journal of Electronc Measurement an Instrument,1-10(009) 3. Peng Yu, Song Ja, Peng Xuan. A Self Detecton Technque n Fault Management n WSN. C. In:011 Internatonal nstrumentaton an measurement technolog conference (IMTC011), 1755-1758(011) 4. Song Ja, Peng Yu, Peng Xuan. Fault Detecton Technque base on Clusterng n WSN. J. Chnese Journal of Scentfc Instrument. 14-0(01) 8

An Effcent Recover Algorthm for Coverage Hole n WSNs 5. S. Mart et al., Mtgatng Routng Msbehavor n Moble A Hoc Networks. C. In:ACM MobCom 0, Boston, MA, 000 6. Gulng Wang, Guohong Cao, La Porta, T., Wensheng Zhang.Sensor relocaton n moble sensor networks. C. In: 4th Annual Jont Conference of the IEEE Computer an Communcatons Socetes. pp. 30-31. Proceengs IEEE. INFOCOM 005 9