On multiple point coverage in wireless sensor networks
We consider a wireless sensor network consisting of a set of sensors deployed randomly. A point in the monitored area is covered if it is within the sensing range of a sensor. In some applications, when the network is sufficiently dense, area coverage can be approximated by guaranteeing point covera...
Saved in:
Published in | IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005 pp. 8 pp. - 764 |
---|---|
Main Authors | , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
2005
|
Subjects | |
Online Access | Get full text |
ISBN | 0780394658 9780780394650 |
ISSN | 2155-6806 |
DOI | 10.1109/MAHSS.2005.1542868 |
Cover
Loading…
Abstract | We consider a wireless sensor network consisting of a set of sensors deployed randomly. A point in the monitored area is covered if it is within the sensing range of a sensor. In some applications, when the network is sufficiently dense, area coverage can be approximated by guaranteeing point coverage. In this case, all the points of wireless devices could be used to represent the whole area, and the working sensors are supposed to cover all the sensors. Many applications related to security and reliability require guaranteed k-coverage of the area at all times. In this paper, we formalize the k-(connected) coverage set (k-CCSlk-CS) problems, develop a linear programming algorithm, and design two non-global solutions for them. Some theoretical analysis is also provided followed by simulation results |
---|---|
AbstractList | We consider a wireless sensor network consisting of a set of sensors deployed randomly. A point in the monitored area is covered if it is within the sensing range of a sensor. In some applications, when the network is sufficiently dense, area coverage can be approximated by guaranteeing point coverage. In this case, all the points of wireless devices could be used to represent the whole area, and the working sensors are supposed to cover all the sensors. Many applications related to security and reliability require guaranteed k-coverage of the area at all times. In this paper, we formalize the k-(connected) coverage set (k-CCSlk-CS) problems, develop a linear programming algorithm, and design two non-global solutions for them. Some theoretical analysis is also provided followed by simulation results |
Author | Cardei, M. Fei Dai Shuhui Yang Jie Wu |
Author_xml | – sequence: 1 surname: Shuhui Yang fullname: Shuhui Yang organization: Dept. of Comput. Sci. & Eng., Florida Atlantic Univ., Boca Raton, FL – sequence: 2 surname: Fei Dai fullname: Fei Dai – sequence: 3 givenname: M. surname: Cardei fullname: Cardei, M. – sequence: 4 surname: Jie Wu fullname: Jie Wu |
BookMark | eNotj81OAjEYAJsIiYC8gF76Art-7fb3SIiKCYYD3El3-y2pLt1Nu0p8e01gLnObZOZkEvuIhDwyKBkD-_yx2uz3JQeQJZOCG2XuyBy0gcoKJc2EzDiTslAG1D1Z5vwJ_whZaWtmRO0iPX93Yxg6pEMf4kib_geTOyENkV5Cwg5zphlj7hONOF769JUfyLR1XcblzQtyeH05rDfFdvf2vl5ti2BhLLg02GjtoXXKscYzZWvPrWydNN5JcFoY4VuujBCVtV5pz2vJFGLdgHesWpCnazYg4nFI4ezS7_F2Wf0Bz7ZIlQ |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/MAHSS.2005.1542868 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EndPage | 764 |
ExternalDocumentID | 1542868 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IPLJI M43 OCL RIE RIL RNS |
ID | FETCH-LOGICAL-i90t-258ec77d0fa6a1cd169bd295fa58da50a7484df26844399d67d2b516eebc0da13 |
IEDL.DBID | RIE |
ISBN | 0780394658 9780780394650 |
ISSN | 2155-6806 |
IngestDate | Tue Aug 26 19:53:15 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i90t-258ec77d0fa6a1cd169bd295fa58da50a7484df26844399d67d2b516eebc0da13 |
ParticipantIDs | ieee_primary_1542868 |
PublicationCentury | 2000 |
PublicationDate | 20050000 |
PublicationDateYYYYMMDD | 2005-01-01 |
PublicationDate_xml | – year: 2005 text: 20050000 |
PublicationDecade | 2000 |
PublicationTitle | IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005 |
PublicationTitleAbbrev | MAHSS |
PublicationYear | 2005 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0000453798 ssj0001286290 |
Score | 1.482927 |
Snippet | We consider a wireless sensor network consisting of a set of sensors deployed randomly. A point in the monitored area is covered if it is within the sensing... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 8 pp. |
SubjectTerms | Algorithm design and analysis Analytical models Computer networks Computer science Intelligent networks Linear programming Neodymium Performance analysis Switches Wireless sensor networks |
Title | On multiple point coverage in wireless sensor networks |
URI | https://ieeexplore.ieee.org/document/1542868 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV27TsMwFLXaTrAU2iLe8sCIWyexHWdEiKpCKiC1SN0qP6UKlFRtuvD12E5SHmJgi7PEsRyfe07uPReAm1hrapk2KE04QcQhJMocSiOBiYq45amUXoecPrHJK3lc0EUL3O5rYYwxIfnMDP1l-JevC7XzUtnIwX3MGW-DtttmVa3WXk9xoUmS1tSh0ldcrB4kFgdqFDGOWWDtHCcZcbBbm-80Y9wU1OBsNL2bzGaV3FI_8UfrlYA84y6YNnOuEk7ehrtSDtXHLzvH_77UERh81fjBlz16HYOWyXug2zR5gPU33wOH3xwL-4A957DJQYTrYpWXUPkkUHcqwVUOvfHxuzs74dax42ID8yrJfDsA8_HD_H6C6tYLaJXhEsWUG5WmGlvBRKR0xDKp44xaQbkWFAvvQKqtd4rxfEazVMeSRswYqbAWUXICOnmRm1MAbRILS1IsImIJFkJo4mISlRnJtSPB_Az0_Zos15W5xrJejvO_b1-Ag-CdGjSQS9ApNztz5aKCUl6H7fAJsUivFw |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED2VMgBLoQXxjQdG3DqJ7TgjQlQFmoLUInWrnNiRKlBStenCr8fOR_kQA1ucJY7l-N29vHsHcO0qxRKuNPY9QTE1CIkDg9JYEho7IhF-FFkeMhzxwSt9nLJpA242tTBa60J8prv2sviXr7J4bamynoF7V3CxBdsG9ykrq7U2jIoJTjy_Sh5KhsVE6wXJYmCNYS4IL_J2QbyAGuCt7HfqMalLakjQC28H43FJuFTP_NF8pcCefgvCetal5OStu86jbvzxy9Dxv6-1D4dfVX7oZYNfB9DQaRtadZsHVH31bdj75lnYAf6colqFiBbZPM1RbGWg5lxC8xRZ6-N3c3qilcmPsyVKS5n56hAm_fvJ3QBXzRfwPCA5dpnQse8rkkgunVg5PIiUG7BEMqEkI9J6kKrEesXYjEZxX7kRc7jWUUyUdLwjaKZZqo8BJZ4rE-oT6dCEEimloiYqiQMdCWXSYHECHbsms0VprzGrluP079tXsDOYhMPZ8GH0dAa7hZNqwYicQzNfrvWFiRHy6LLYGp8T-rJk |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=IEEE+International+Conference+on+Mobile+Adhoc+and+Sensor+Systems+Conference%2C+2005&rft.atitle=On+multiple+point+coverage+in+wireless+sensor+networks&rft.au=Shuhui+Yang&rft.au=Fei+Dai&rft.au=Cardei%2C+M.&rft.au=Jie+Wu&rft.date=2005-01-01&rft.pub=IEEE&rft.isbn=9780780394650&rft.issn=2155-6806&rft.spage=8+pp.&rft.epage=764&rft_id=info:doi/10.1109%2FMAHSS.2005.1542868&rft.externalDocID=1542868 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2155-6806&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2155-6806&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2155-6806&client=summon |