skip to main content
article
Free Access

Dynamic coverage in ad-hoc sensor networks

Authors Info & Claims
Published:01 February 2005Publication History
Skip Abstract Section

Abstract

Ad-hoc networks of sensor nodes are in general semi-permanently deployed. However, the topology of such networks continuously changes over time, due to the power of some sensors wearing out, to new sensors being inserted into the network, or even due to designers moving sensors around during a network re-design phase (for example, in response to a change in the requirements of the network). In this paper, we address the problem of how to dynamically maintain two important measures on the quality of the coverage of a sensor network: the best-case coverage and worst-case coverage distances. We assume that the ratio between upper and lower transmission power of sensors is bounded by a polynomial of n, where n is the number of sensors, and that the motion of mobile sensors can be described as a low-degree polynomial function of time. We maintain a (1 + Ã)-approximation on the best-case coverage distance and a (ã2 + Ã)-approximation on the worst-case coverage distance of the network, for any fixed à > 0. Our algorithms have amortized or worst-case poly-logarithmic update costs. We are able to efficiently maintain the connectivity of the regions on the plane with respect to the sensor network, by extending the concatenable queue data structure to also serve as a priority queue. In addition, we present an algorithm that finds the shortest maximum support path in time O(n log n).

References

  1. {1} A.V. Aho, J.E. Hopcroft and J.D. Ullman, The Design and Analysis of Computer Algorithms (Addison-Wesley, Reading, MA, 1974). Google ScholarGoogle Scholar
  2. {2} J. Basch, Kinetic data structures, Ph.D. dissertation, Stanford University (1999). Google ScholarGoogle Scholar
  3. {3} J. Basch, L.J. Guibas and J. Hershberger, Data structures for mobile data, in: Proc. of 8th ACM-SIAM Symposium on Discrete Algorithms (1997) pp. 747-756. Google ScholarGoogle Scholar
  4. {4} B.N. Clark and C.J. Colbourn, Unit disk graphs, Discrete Math. 86 (1990) 165-177. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. {5} L.J. Guibas, J. Hershberger, S. Suri and L. Zhang, Kinetic connectivity for unit disks, Discrete Comput. Geom. 25 (2001) 591-610.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. {6} J. Hershberger and S. Suri, An optimal algorithm for Euclidean shortest paths in the plane, SIAM J. Comput. 28(6) (1999) 2215-2256. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. {7} J. Holm, K. de Lichtenberg and M. Thorup, Poly-logarithmic deterministic fully-dynamic graph algorithms I: Connectivity and minimum spanning tree, Technical Report DIKU-TR-97/17, Department of Computer Science, University of Copenhagen (1997).Google ScholarGoogle Scholar
  8. {8} C.-F. Huang and Y.-C. Tseng, The coverage problem in a wireless sensor networks, in: Proc. of the 2nd ACM Internat. Conf. on Wireless Sensor Networks and Applications (2003) pp. 115-121. Google ScholarGoogle Scholar
  9. {9} X.-Y. Li, P.-J. Wan and O. Frieder, Coverage in wireless ad-hoc sensor networks, IEEE Trans. Comput. 52 (2003) 1-11. Google ScholarGoogle Scholar
  10. {10} S. Meguerdichian, F. Koushanfar, M. Potkonjak and M.B. Srivastava, Coverage problems in wireless ad-hoc sensor networks, in: Proc. of the 20th IEEE INFOCOM (2001) pp. 1380-1387.Google ScholarGoogle Scholar
  11. {11} S. Meguerdichian, F. Koushanfar, G. Qu and M. Potkonjak, Exposure in wireless ad-hoc sensor networks, in: Proc. of the 7th ACM MOBICOM (2001) pp. 139-150. Google ScholarGoogle Scholar
  12. {12} X. Wang, G. Xing, Y. Zhang, C. Lu, R. Pless and C.D. Gill, Integrated coverage and connectivity configuration in wireless sensor networks, in: Proc. of the 1st ACM Conf. on Embedded Networked Sensor Systems (2003). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. {13} H. Zhang and J.C. Hou, Maintaining sensing coverage and connectivity in large sensor networks, Technical Report UIUCDCS-R-2003-2351, UIUC (2003).Google ScholarGoogle Scholar

Index Terms

  1. Dynamic coverage in ad-hoc sensor networks

          Recommendations

          Reviews

          Ruay-Shiung Chang

          Sensor networks have received a lot of research attention recently. A sensor can detect the environment around it. Assuming that a sensor's detecting ability is omni-directional, we can model the coverage of a sensor as a disk centered at the sensor. The radius of such a disk is determined by the energy level of the sensor. The coverage area of the sensor network is the union of all such disks. It is desirable that the coverage area be as thorough and complete as possible, such that an intruder is detected no matter where he or she hides. Given two locations S and T, two relevant types of trajectories on the sensor plane are proposed. A maximum breach path from S to T is a path from S to T in which the minimum distance from a point P in the path to the sensor network is maximized. This distance is called the worst-case coverage distance of the network. Similarly, a maximum support path from S to T is a path in which the maximum distance of a point P in the path to the sensor network is minimized. This distance is called the best-case coverage distance of the network. The best-case and worst-case coverage distances are two measures of the quality of the coverage of a sensor network. How to obtain these two measures in a dynamic sensor network, where old sensors may die, or new sensors may be added, is discussed first. The authors successfully transform these problems into graph connectivity problems. They present two algorithms to maintain low constant approximations on the best-case and worst-case coverage distances. Both algorithms have low update and query costs. The paper does not consider the actual implementation scenario, where sensors have to communicate by sending data to one another. Frequent transmitting will soon exhaust the energy. The authors' algorithm requires every sensor to send distance data to one sensor. This will lead to a large number of packets, and great system overhead.

          Access critical reviews of Computing literature here

          Become a reviewer for Computing Reviews.

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader