Guang Tan, Stephen A. Jarvis, and Anne-Marie Kermarrec IEEE Transactions on Mobile Computing, VOL. 8, NO.6, JUNE 2009 1Yun-Jung Lu.

Slides:



Advertisements
Similar presentations
Dynamic Object Tracking in Wireless Sensor Networks Tzung-Shi Chen 1, Wen-Hwa Liao 2, Ming-De Huang 3, and Hua-Wen Tsai 4 1 National University of Tainan,
Advertisements

Design Guidelines for Maximizing Lifetime and Avoiding Energy Holes in Sensor Networks with Uniform Distribution and Uniform Reporting Stephan Olariu Department.
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
1 Sensor Deployment and Target Localization Based on Virtual Forces Y. Zou and K. Chakrabarty IEEE Infocom 2003 Conference, pp ,. ACM Transactions.
Movement-Assisted Sensor Deployment Author : Guiling Wang, Guohong Cao, Tom La Porta Presenter : Young-Hwan Kim.
Topological Hole Detection Ritesh Maheshwari CSE 590.
산업 및 시스템 공학과 통신시스템 및 인터넷보안연구실 김효원 Optimizing Tree Reconfiguration for Mobile Target Tracking in Sensor Networks Wensheng Zhang and Guohong Cao.
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
KAIST Adaptive Triangular Deployment Algorithm for Unattended Mobile Sensor Networks Suho Yang (September 4, 2008) Ming Ma, Yuanyuan Yang IEEE Transactions.
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
Mobility Improves Coverage of Sensor Networks Benyuan Liu*, Peter Brass, Olivier Dousse, Philippe Nain, Don Towsley * Department of Computer Science University.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Dissemination protocols for large sensor networks Fan Ye, Haiyun Luo, Songwu Lu and Lixia Zhang Department of Computer Science UCLA Chien Kang Wu.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
Results Showing the potential of the method for arbitrary networks The following diagram show the increase of networks’ lifetime in which SR I =CR I versus.
Dynamic Medial Axis Based Motion Planning in Sensor Networks Lan Lin and Hyunyoung Lee Department of Computer Science University of Denver
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
1 Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network Prof. Yu-Chee Tseng Department of Computer Science National Chiao-Tung University.
Yanyan Yang, Yunhuai Liu, and Lionel M. Ni Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE MASS 2009.
Direct movement has long relocation time and overuses the redundant sensor Motivation Coverage under random deployment Coverage under clustering All the.
1 The Orphan Problem in ZigBee- based Wireless Sensor Networks IEEE Trans. on Mobile Computing (also in MSWiM 2007) Meng-Shiuan Pan and Yu-Chee Tseng Department.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
Mobility Limited Flip-Based Sensor Networks Deployment Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic.
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
WMNL Sensors Deployment Enhancement by a Mobile Robot in Wireless Sensor Networks Ridha Soua, Leila Saidane, Pascale Minet 2010 IEEE Ninth International.
Boundary Recognition in Sensor Networks by Topology Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B.
Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Cardei, M.; Jie Wu; Mingming Lu; Pervaiz, M.O.; Wireless And Mobile.
1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.
KAIS T A Bidding Protocol for Deploying Mobile Sensors 발표자 : 권 영 진 Guiling Wang, Guohong Cao, Tom LaPorta The Pennsylvania State University IEEE, ICNP.
Pei-Ling Chiu Mobile Sensor Networks. Pei-Ling Chiu2 Outline Research Framework Paper: ”Movement-Assisted Sensor Deployment” Related Work Discussion.
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks Seema Bandyopadhyay and Edward J. Coyle Presented by Yu Wang.
WEAR: A Balanced, Fault-Tolerant, Energy-Aware Routing Protocol for Wireless Sensor Networks Kewei Sha, Junzhao Du, and Weisong Shi Wayne State University.
Selection and Navigation of Mobile sensor Nodes Using a Sensor Network Atul Verma, Hemjit Sawant and Jindong Tan Department of Electrical and Computer.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
1 Probabilistic Coverage in Wireless Sensor Networks Nadeem Ahmed, Salil S. Kanhere and Sanjay Jha Computer Science and Engineering, University of New.
Bounded relay hop mobile data gathering in wireless sensor networks
A Dead-End Free Topology Maintenance Protocol for Geographic Forwarding in Wireless Sensor Networks IEEE Transactions on Computers, vol. 60, no. 11, November.
By Naeem Amjad 1.  Challenges  Introduction  Motivation  First Order Radio Model  Proposed Scheme  Simulations And Results  Conclusion 2.
1 Utilizing Shared Vehicle Trajectories for Data Forwarding in Vehicular Networks IEEE INFOCOM MINI-CONFERENCE Fulong Xu, Shuo Gu, Jaehoon Jeong, Yu Gu,
Network Coding Data Collecting Mechanism based on Prioritized Degree Distribution in Wireless Sensor Network Wei Zhang, Xianghua Xu, Qinchao Zhang, Jian.
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
Covering Points of Interest with Mobile Sensors Milan Erdelj, Tahiry Razafindralambo and David Simplot-Ryl INRIA Lille - Nord Europe IEEE Transactions on.
A Dynamic Query-tree Energy Balancing Protocol for Sensor Networks H. Yang, F. Ye, and B. Sikdar Department of Electrical, Computer and systems Engineering.
Hole Detection and Boundary Recognition in Wireless Sensor Networks Kun-Ying Hsieh ( 謝坤穎 ) Dept. of Computer Science and Information Engineering National.
Self-stabilizing energy-efficient multicast for MANETs.
Energy-Efficient Randomized Switching for Maximizing Lifetime in Tree- Based Wireless Sensor Networks Sk Kajal Arefin Imon, Adnan Khan, Mario Di Francesco,
An Adaptive Zone-based Storage Architecture for Wireless Sensor Networks Thang Nam Le, Dong Xuan and *Wei Yu Department of Computer Science and Engineering,
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
Adaptive Triangular Deployment Algorithm for Unattended Mobile Sensor Networks Ming Ma and Yuanyuan Yang Department of Electrical & Computer Engineering.
Saran Jenjaturong, Chalermek Intanagonwiwat Department of Computer Engineering Chulalongkorn University Bangkok, Thailand IEEE CROWNCOM 2008 acceptance.
Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees IEEE ICDCSW, 2011 Pouya Ostovari Department of Computer and Information.
Relying on Safe Distance to Achieve Strong Partitionable Group Membership in Ad Hoc Networks Authors: Q. Huang, C. Julien, G. Roman Presented By: Jeff.
Distributed Algorithms for Dynamic Coverage in Sensor Networks Lan Lin and Hyunyoung Lee Department of Computer Science University of Denver.
Younghwan Yoo† and Dharma P. Agrawal‡ † School of Computer Science and Engineering, Pusan National University, Busan, KOREA ‡ OBR Center for Distributed.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network You-Chiun Wang, Chun-Chi Hu, and Yu-Chee Tseng IEEE Transactions on Mobile Computing.
Deploying Sensors for Maximum Coverage in Sensor Network Ruay-Shiung Chang Shuo-Hung Wang National Dong Hwa University IEEE International Wireless Communications.
KAIS T Sensor Deployment Based on Virtual Forces Reference: Yi Zou and Krishnendu Chakarabarty, “Sensor Deployment and Target Localization Based on Virtual.
Repairing Sensor Network Using Mobile Robots Y. Mei, C. Xian, S. Das, Y. C. Hu and Y. H. Lu Purdue University, West Lafayette ICDCS 2006 Speaker : Shih-Yun.
A Coverage-Preserving and Hole Tolerant Based Scheme for the Irregular Sensing Range in WSNs Azzedine Boukerche, Xin Fei PARADISE Research Lab Univeristy.
A New Class of Mobility Models for Ad Hoc Wireless Networks Rahul Amin Advisor: Dr. Carl Baum Clemson University SURE 2006.
National Taiwan University Department of Computer Science and Information Engineering Vinod Namboodiri and Lixin Gao University of Massachusetts Amherst.
Prof. Yu-Chee Tseng Department of Computer Science
The Coverage Problem in a Wireless Sensor Network
Minimizing Broadcast Latency and Redundancy in Ad Hoc Networks
Presentation transcript:

Guang Tan, Stephen A. Jarvis, and Anne-Marie Kermarrec IEEE Transactions on Mobile Computing, VOL. 8, NO.6, JUNE Yun-Jung Lu

 Introduction  Preliminaries  The Connectivity-Preserved Virtual Force (CPVF) Scheme  The Floor-Based Scheme  Performance Evaluation  Conclusion 2Yun-Jung Lu

 In an mobile sensor network, the sensors are able to relocate and self-organize into a network.  The mobility and self-management of sensors are desirable for many application scenarios, including remote harsh fields, disaster areas or toxic urban regions, where manual operations are unsafe or burdensome. 3Yun-Jung Lu

 Given a target sensing field with an arbitrary initial sensor distribution, how should these sensors self- organize into a connected ad hoc network that has the maximum coverage, at the cost of a minimum moving distance? 4Yun-Jung Lu

 Potential Fields or Virtual Force ◦ When two electromagnetic particles are too close in proximity, a repulsive force pushes them apart.  Voronoi Diagrams (VDs) ◦ Allow sensors to move to maximize coverage in its own subarea 5Yun-Jung Lu

 The communication range of a sensor may not be large enough to cover all Voronoi neighbors. ◦ An incomplete view of the Voronoi neighbors may result in very inaccurate VDs being constructed. 6Yun-Jung Lu

 Network Connectivity? Network partition can still occur in a dense network. ◦ Generally, connectivity must be considered in protocol design.  Obstacle-free? ◦ Naturally, the real-world environments have obstacles or holes render such schemes ineffectual. 7Yun-Jung Lu

 To achieve connectivity for a network with an arbitrary initial distribution, communication/sensing range, or node density  To minimize moving distance, which dominates energy consumption in the deployment process  To be able to work without any knowledge of the field layout, which can be irregular and have obstacles of arbitrary shape 8Yun-Jung Lu

 System Assumptions ◦ All sensors have the same communication range r c and sensing range r s. ◦ At any given time, a sensor knows its own position and can recognize the boundary of the obstacles within its sensing range. ◦ Sensors move in steps of variable size.  In each step, a sensor moves in a straight line at a uniform speed for a period and denote by T. ◦ There is a reference point O ; all the sensors will try to connect to O generality. 9Yun-Jung Lu

 Obstacle Avoidance ◦ BUG2: “Path-Planning Strategies for a Point Mobile Automaton Moving amidst Unknown Obstacles of Arbitrary Shape,” Algorithmica, 1987 ◦ Reference Line : the straight line ( Start, Target ) ◦ H : hitting point ◦ Right-hand rule 10Yun-Jung Lu

 Lazy Movement (With multiple hop communication, not all disconnected sensors need to move to get connected.) ◦ At the end of each step, a sensor checks its neighbors to see if there are any ahead of it; ◦ If so, then it chooses the nearest neighbor as its candidate path parent. 11Yun-Jung Lu

 Achieving Connectivity  Maximizing Sensing Coverage 12Yun-Jung Lu

 Initially, all sensors are required to decide their states regarding connectivity. ◦ Flooding a message to the network  Sensor receives such a message, becomes aware that they are also connected  After a certain period of time, if a sensor still has not received such a message, it can decide that it is disconnected. ◦ It will allow a small random time period to elapse after which it starts to move using the BUG2 Algorithm(with lazy movement) toward the base station. 13Yun-Jung Lu

 Virtual Force is used to determine the direction to move. ◦ The obstacles and neighboring sensors exert repulsive forces onto a sensor. ◦ The sum of all forces determines the subsequent direction of that sensor. 14Yun-Jung Lu

 Connectivity Preserving Conditions ◦ The distance between s and s’ at time t’ is no greater than r c ◦ The distance between s’ ’s position at t’ and s’ ’s position at t + T is no grater than r c  A sensor can approximately determine the maximum valid step size by checking a set of possible values, for example, VT, 0.9 * VT, …, 0.1*VT, 0. A A B B C C f ba f ca V : the moving speed T : the moving time of one step VT A A t’ s’ 15Yun-Jung Lu

16Yun-Jung Lu

17Yun-Jung Lu

 Achieving Connectivity  Identifying Movable Sensors  Expanding Coverage 18Yun-Jung Lu

19Yun-Jung Lu

20Yun-Jung Lu

 To identify sensors that can move without partitioning the network and whose move is expected to increase network coverage  The Rules to achieve that: ◦ Obtain a list of neighbors within two hops of itself ◦ Try to find for each child a new parent ◦ Loop check for a particular child ◦ If all the children can find parents without crating loops, then it means that the sensor can safely move away. 21Yun-Jung Lu

 With all movable sensors identified, we can now expand the network’s coverage.  Three types of expansion policy ◦ Floor-line-guided expansion ◦ Boundary-line-guided expansion ◦ Interfloor-line-guided expansion 22Yun-Jung Lu

 Expansion Point  Expansion Circle is min(r c, r s ) frontier point Expansion Circle 23Yun-Jung Lu

24Yun-Jung Lu

25Yun-Jung Lu Frontier Point

 If a sensor can not find any expansion points in its expansion circle, it will stop the process.  Else, it will flood a Invitation Message to find some sensors to cover these points.  Invitation Message contains an EP to the network and a TTL value. 26Yun-Jung Lu

 It collects a certain number of invitations, and picks one with the highest priority.  It sends an AcceptInvitation message to the inviter. Yun-Jung Lu27

 The inviting sensor constructs a virtual place- holding fixed node in the tree, and sends a message to the root on behalf of the invited sensor to update the location information maintained by its ancestors. Yun-Jung Lu28

29Yun-Jung Lu

 An event-based simulator using C++  240 sensors are initially randomly distributed in a subarea {(x, y):0≦x ≦500m, 0≦y ≦500m} of a target field {(x, y):0≦x ≦1000m, 0≦y ≦1000m}  The base station is located at (0,0).  The maximum moving speed is 2 m/s.  The period length is 1 second.  The simulation runs for 750 seconds. 30Yun-Jung Lu

31Yun-Jung Lu

32Yun-Jung Lu

33Yun-Jung Lu

 Two sensor deployment schemes are proposed for mobile sensor network in this paper.  The major difference of the proposed schemes with the previous works is their adaptability to arbitrary network densities or communication ranges and to obstacles. 34Yun-Jung Lu