Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Coverage by randomly deployed wireless sensor networks

Published: 01 June 2006 Publication History
  • Get Citation Alerts
  • Abstract

    One of the main applications of wireless sensor networks is to provide proper coverage of their deployment regions. A wireless sensor network k-covers its deployment region if every point in its deployment region is within the coverage ranges of at least k sensors. In this paper, we assume that the sensors are deployed as either a Poisson point process or a uniform point process in a square or disk region, and study how the probability of the k-coverage changes with the sensing radius or the number of sensors. Our results take the complicated boundary effect into account, rather than avoiding it by assuming the toroidal metric as done in the literature.

    References

    [1]
    {1} P. Hall, Introduction to the Theory of Coverage Processes. New York: Wiley, 1988.
    [2]
    {2} S. Kumar, T. H. Lai, and J. Balogh, "On k -coverage in a mostly sleeping sensor network," in Proc. Tenth Annu. Int. Conf. Mobile Comput. Netw. (MobiCom'04), Sep.-Oct. 26-1, 2004.
    [3]
    {3} P.-J. Wan and C.-W. Yi, "Asymptotic critical transmission radius and critical neighbor number for k-connectivity in wireless ad hoc networks," in Proc. Fifth ACM Int. Symp. Mobile Ad Hoc Netw. Comput. (MobiHoc 2004), Mar. 24-26, 2004.
    [4]
    {4} X. Wang, G. Xing, Y. Zhang, C. Lu, R. Pless, and C. Gill, "Integrated coverage and connectivity configuration in wireless sensor networks," in Proc. First Int. Conf. Embedded Netw. Sensor Syst., Nov. 2003, pp. 28-39.
    [5]
    {5} C.-W. Yi, P.-J. Wan, X.-Y. Li, and O. Frieder, "Asymptotic distribution of the number of isolated nodes in wireless ad hoc networks with Bernoulli nodes," in IEEE Wireless Communications and Networking Conference (WCNC 2003), Mar. 16-20, 2003.
    [6]
    {6} H. Zhang and J. Hou, "On deriving the upper bound of α-lifetime for large sensor networks," in Proc. Fifth ACM Int. Symp. Mobile Ad Hoc Netw. Comput. (MobiHoc 2004), Mar. 24-26, 2004.

    Cited By

    View all
    • (2017)Multi-Objective WSN Deployment Using Genetic Algorithms Under Cost, Coverage, and Connectivity ConstraintsWireless Personal Communications: An International Journal10.1007/s11277-017-3974-094:4(2739-2768)Online publication date: 1-Jun-2017
    • (2017)Deployment Strategies in the Wireless Sensor NetworksWireless Personal Communications: An International Journal10.1007/s11277-016-3800-095:2(819-846)Online publication date: 1-Jul-2017
    • (2016)3D-kCov-ComForACM Transactions on Sensor Networks10.1145/282289412:4(1-32)Online publication date: 15-Nov-2016
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image IEEE/ACM Transactions on Networking
    IEEE/ACM Transactions on Networking  Volume 14, Issue SI
    Special issue on networking and information theory
    June 2006
    475 pages

    Publisher

    IEEE Press

    Publication History

    Published: 01 June 2006
    Published in TON Volume 14, Issue SI

    Author Tags

    1. asymptotics
    2. connectivity
    3. k-coverage
    4. node density
    5. sensing radius
    6. wireless ad hoc sensor networks

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0

    Other Metrics

    Citations

    Cited By

    View all
    • (2017)Multi-Objective WSN Deployment Using Genetic Algorithms Under Cost, Coverage, and Connectivity ConstraintsWireless Personal Communications: An International Journal10.1007/s11277-017-3974-094:4(2739-2768)Online publication date: 1-Jun-2017
    • (2017)Deployment Strategies in the Wireless Sensor NetworksWireless Personal Communications: An International Journal10.1007/s11277-016-3800-095:2(819-846)Online publication date: 1-Jul-2017
    • (2016)3D-kCov-ComForACM Transactions on Sensor Networks10.1145/282289412:4(1-32)Online publication date: 15-Nov-2016
    • (2016)Sensor Density for Confident Information Coverage in Randomly Deployed Sensor NetworksIEEE Transactions on Wireless Communications10.1109/TWC.2016.251868915:5(3238-3250)Online publication date: 6-May-2016
    • (2015)Adaptive Network Defense Management for Countering Smart Attack and Selective Capture in Wireless Sensor NetworksIEEE Transactions on Network and Service Management10.1109/TNSM.2015.244105912:3(451-466)Online publication date: 1-Sep-2015
    • (2015)Homology-based distributed coverage hole detection in wireless sensor networksIEEE/ACM Transactions on Networking10.1109/TNET.2014.233835523:6(1705-1718)Online publication date: 1-Dec-2015
    • (2014)Barrier Coverage by Sensors with Adjustable RangesACM Transactions on Sensor Networks10.1145/262951811:1(1-20)Online publication date: 28-Jul-2014
    • (2014)Barrier Coverage Using Sensors with OffsetsProceedings of the 9th International Conference on Wireless Algorithms, Systems, and Applications - Volume 849110.1007/978-3-319-07782-6_36(389-400)Online publication date: 23-Jun-2014
    • (2013)Adaptive k-coverage contour evaluation and deployment in wireless sensor networksACM Transactions on Sensor Networks10.1145/2489253.24892579:4(1-31)Online publication date: 23-Jul-2013
    • (2013)Multi-covered path in wireless sensor networksTelecommunications Systems10.1007/s11235-013-9713-254:1(19-33)Online publication date: 1-Sep-2013
    • Show More Cited By

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media