On multiple point coverage in wireless sensor networks

We consider a wireless sensor network consisting of a set of sensors deployed randomly. A point in the monitored area is covered if it is within the sensing range of a sensor. In some applications, when the network is sufficiently dense, area coverage can be approximated by guaranteeing point covera...

Full description

Saved in:
Bibliographic Details
Published inIEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005 pp. 8 pp. - 764
Main Authors Shuhui Yang, Fei Dai, Cardei, M., Jie Wu
Format Conference Proceeding
LanguageEnglish
Published IEEE 2005
Subjects
Online AccessGet full text
ISBN0780394658
9780780394650
ISSN2155-6806
DOI10.1109/MAHSS.2005.1542868

Cover

Loading…
Abstract We consider a wireless sensor network consisting of a set of sensors deployed randomly. A point in the monitored area is covered if it is within the sensing range of a sensor. In some applications, when the network is sufficiently dense, area coverage can be approximated by guaranteeing point coverage. In this case, all the points of wireless devices could be used to represent the whole area, and the working sensors are supposed to cover all the sensors. Many applications related to security and reliability require guaranteed k-coverage of the area at all times. In this paper, we formalize the k-(connected) coverage set (k-CCSlk-CS) problems, develop a linear programming algorithm, and design two non-global solutions for them. Some theoretical analysis is also provided followed by simulation results
AbstractList We consider a wireless sensor network consisting of a set of sensors deployed randomly. A point in the monitored area is covered if it is within the sensing range of a sensor. In some applications, when the network is sufficiently dense, area coverage can be approximated by guaranteeing point coverage. In this case, all the points of wireless devices could be used to represent the whole area, and the working sensors are supposed to cover all the sensors. Many applications related to security and reliability require guaranteed k-coverage of the area at all times. In this paper, we formalize the k-(connected) coverage set (k-CCSlk-CS) problems, develop a linear programming algorithm, and design two non-global solutions for them. Some theoretical analysis is also provided followed by simulation results
Author Cardei, M.
Fei Dai
Shuhui Yang
Jie Wu
Author_xml – sequence: 1
  surname: Shuhui Yang
  fullname: Shuhui Yang
  organization: Dept. of Comput. Sci. & Eng., Florida Atlantic Univ., Boca Raton, FL
– sequence: 2
  surname: Fei Dai
  fullname: Fei Dai
– sequence: 3
  givenname: M.
  surname: Cardei
  fullname: Cardei, M.
– sequence: 4
  surname: Jie Wu
  fullname: Jie Wu
BookMark eNotj81OAjEYAJsIiYC8gF76Art-7fb3SIiKCYYD3El3-y2pLt1Nu0p8e01gLnObZOZkEvuIhDwyKBkD-_yx2uz3JQeQJZOCG2XuyBy0gcoKJc2EzDiTslAG1D1Z5vwJ_whZaWtmRO0iPX93Yxg6pEMf4kib_geTOyENkV5Cwg5zphlj7hONOF769JUfyLR1XcblzQtyeH05rDfFdvf2vl5ti2BhLLg02GjtoXXKscYzZWvPrWydNN5JcFoY4VuujBCVtV5pz2vJFGLdgHesWpCnazYg4nFI4ezS7_F2Wf0Bz7ZIlQ
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/MAHSS.2005.1542868
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EndPage 764
ExternalDocumentID 1542868
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IPLJI
M43
OCL
RIE
RIL
RNS
ID FETCH-LOGICAL-i90t-258ec77d0fa6a1cd169bd295fa58da50a7484df26844399d67d2b516eebc0da13
IEDL.DBID RIE
ISBN 0780394658
9780780394650
ISSN 2155-6806
IngestDate Tue Aug 26 19:53:15 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-258ec77d0fa6a1cd169bd295fa58da50a7484df26844399d67d2b516eebc0da13
ParticipantIDs ieee_primary_1542868
PublicationCentury 2000
PublicationDate 20050000
PublicationDateYYYYMMDD 2005-01-01
PublicationDate_xml – year: 2005
  text: 20050000
PublicationDecade 2000
PublicationTitle IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005
PublicationTitleAbbrev MAHSS
PublicationYear 2005
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000453798
ssj0001286290
Score 1.482927
Snippet We consider a wireless sensor network consisting of a set of sensors deployed randomly. A point in the monitored area is covered if it is within the sensing...
SourceID ieee
SourceType Publisher
StartPage 8 pp.
SubjectTerms Algorithm design and analysis
Analytical models
Computer networks
Computer science
Intelligent networks
Linear programming
Neodymium
Performance analysis
Switches
Wireless sensor networks
Title On multiple point coverage in wireless sensor networks
URI https://ieeexplore.ieee.org/document/1542868
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV27TsMwFLXaTrAU2iLe8sCIWyexHWdEiKpCKiC1SN0qP6UKlFRtuvD12E5SHmJgi7PEsRyfe07uPReAm1hrapk2KE04QcQhJMocSiOBiYq45amUXoecPrHJK3lc0EUL3O5rYYwxIfnMDP1l-JevC7XzUtnIwX3MGW-DtttmVa3WXk9xoUmS1tSh0ldcrB4kFgdqFDGOWWDtHCcZcbBbm-80Y9wU1OBsNL2bzGaV3FI_8UfrlYA84y6YNnOuEk7ehrtSDtXHLzvH_77UERh81fjBlz16HYOWyXug2zR5gPU33wOH3xwL-4A957DJQYTrYpWXUPkkUHcqwVUOvfHxuzs74dax42ID8yrJfDsA8_HD_H6C6tYLaJXhEsWUG5WmGlvBRKR0xDKp44xaQbkWFAvvQKqtd4rxfEazVMeSRswYqbAWUXICOnmRm1MAbRILS1IsImIJFkJo4mISlRnJtSPB_Az0_Zos15W5xrJejvO_b1-Ag-CdGjSQS9ApNztz5aKCUl6H7fAJsUivFw
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED2VMgBLoQXxjQdG3DqJ7TgjQlQFmoLUInWrnNiRKlBStenCr8fOR_kQA1ucJY7l-N29vHsHcO0qxRKuNPY9QTE1CIkDg9JYEho7IhF-FFkeMhzxwSt9nLJpA242tTBa60J8prv2sviXr7J4bamynoF7V3CxBdsG9ykrq7U2jIoJTjy_Sh5KhsVE6wXJYmCNYS4IL_J2QbyAGuCt7HfqMalLakjQC28H43FJuFTP_NF8pcCefgvCetal5OStu86jbvzxy9Dxv6-1D4dfVX7oZYNfB9DQaRtadZsHVH31bdj75lnYAf6colqFiBbZPM1RbGWg5lxC8xRZ6-N3c3qilcmPsyVKS5n56hAm_fvJ3QBXzRfwPCA5dpnQse8rkkgunVg5PIiUG7BEMqEkI9J6kKrEesXYjEZxX7kRc7jWUUyUdLwjaKZZqo8BJZ4rE-oT6dCEEimloiYqiQMdCWXSYHECHbsms0VprzGrluP079tXsDOYhMPZ8GH0dAa7hZNqwYicQzNfrvWFiRHy6LLYGp8T-rJk
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=IEEE+International+Conference+on+Mobile+Adhoc+and+Sensor+Systems+Conference%2C+2005&rft.atitle=On+multiple+point+coverage+in+wireless+sensor+networks&rft.au=Shuhui+Yang&rft.au=Fei+Dai&rft.au=Cardei%2C+M.&rft.au=Jie+Wu&rft.date=2005-01-01&rft.pub=IEEE&rft.isbn=9780780394650&rft.issn=2155-6806&rft.spage=8+pp.&rft.epage=764&rft_id=info:doi/10.1109%2FMAHSS.2005.1542868&rft.externalDocID=1542868
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2155-6806&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2155-6806&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2155-6806&client=summon