Achieving Minimum Coverage Breach under Bandwidth Constraints in Wireless Sensor Networks Maggie X. Cheng, Lu Ruan and Weili Wu Dept. of Comput. Sci, Missouri.

Slides:



Advertisements
Similar presentations
February 20, Spatio-Temporal Bandwidth Reuse: A Centralized Scheduling Mechanism for Wireless Mesh Networks Mahbub Alam Prof. Choong Seon Hong.
Advertisements

1/22 Worst and Best-Case Coverage in Sensor Networks Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, and Mani Srivastava IEEE TRANSACTIONS.
Minimum Clique Partition Problem with Constrained Weight for Interval Graphs Jianping Li Department of Mathematics Yunnan University Jointed by M.X. Chen.
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Haiming Jin, He Huang, Lu Su and Klara Nahrstedt University of Illinois at Urbana-Champaign State University of New York at Buffalo October 22, 2014 Cost-minimizing.
Maximal Lifetime Scheduling in Sensor Surveillance Networks Hai Liu 1, Pengjun Wan 2, Chih-Wei Yi 2, Siaohua Jia 1, Sam Makki 3 and Niki Pissionou 4 Dept.
1 On Constructing k- Connected k-Dominating Set in Wireless Networks Department of Computer Science and Information Engineering National Cheng Kung University,
1 Maximizing Lifetime of Sensor Surveillance Systems IEEE/ACM TRANSACTIONS ON NETWORKING Authors: Hai Liu, Xiaohua Jia, Peng-Jun Wan, Chih- Wei Yi, S.
Optimal Sleep-Wakeup Algorithms for Barriers of Wireless Sensors S. Kumar, T. Lai, M. Posner and P. Sinha, BROADNETS ’ 2007.
1 Delay-efficient Data Gathering in Sensor Networks Bin Tang, Xianjin Zhu and Deng Pan.
Placement of Integration Points in Multi-hop Community Networks Ranveer Chandra (Cornell University) Lili Qiu, Kamal Jain and Mohammad Mahdian (Microsoft.
Deployment Strategies for Differentiated Detection in Wireless Sensor Network Jingbin Zhang, Ting Yan, and Sang H. Son University of Virginia From SECON.
Energy-Efficient Target Coverage in Wireless Sensor Networks Mihaela Cardei, My T. Thai, YingshuLi, WeiliWu Annual Joint Conference of the IEEE Computer.
Approximation Algorithms
Computer Algorithms Integer Programming ECE 665 Professor Maciej Ciesielski By DFG.
SMART: A Scan-based Movement- Assisted Sensor Deployment Method in Wireless Sensor Networks Jie Wu and Shuhui Yang Department of Computer Science and Engineering.
Zoë Abrams, Ashish Goel, Serge Plotkin Stanford University Set K-Cover Algorithms for Energy Efficient Monitoring in Wireless Sensor Networks.
Integer Programming Difference from linear programming –Variables x i must take on integral values, not real values Lots of interesting problems can be.
1 Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network Prof. Yu-Chee Tseng Department of Computer Science National Chiao-Tung University.
Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy under contract.
Maximum Network lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Mihaela Cardei, Jie Wu, Mingming Lu, and Mohammad O. Pervaiz Department.
Distributed Combinatorial Optimization
Maximizing the Lifetime of Wireless Sensor Networks through Optimal Single-Session Flow Routing Y.Thomas Hou, Yi Shi, Jianping Pan, Scott F.Midkiff Mobile.
Exposure In Wireless Ad-Hoc Sensor Networks S. Megerian, F. Koushanfar, G. Qu, G. Veltri, M. Potkonjak ACM SIG MOBILE 2001 (Mobicom) Journal version: S.
1 Target-Oriented Scheduling in Directional Sensor Networks Yanli Cai, Wei Lou, Minglu Li,and Xiang-Yang Li* The Hong Kong Polytechnic University, Hong.
Network Aware Resource Allocation in Distributed Clouds.
1 11 Subcarrier Allocation and Bit Loading Algorithms for OFDMA-Based Wireless Networks Gautam Kulkarni, Sachin Adlakha, Mani Srivastava UCLA IEEE Transactions.
Optimal Scheduling of File Transfers with Divisible Sizes on Multiple Disjoint Paths Mugurel Ionut Andreica Polytechnic University of Bucharest Computer.
Design Techniques for Approximation Algorithms and Approximation Classes.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
The Chinese Univ. of Hong Kong Dept. of Computer Science & Engineering A Point-Distribution Index and Its Application to Sensor Grouping Problem Y. Zhou.
Balanced k-Coverage in Visual Sensor Networks Md. Muntakim Sadik, Sakib Md. Bin Malek { mms, Department.
1 CS612 Algorithms for Electronic Design Automation CS 612 – Lecture 8 Lecture 8 Network Flow Based Modeling Mustafa Ozdal Computer Engineering Department,
Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Cardei, M.; Jie Wu; Mingming Lu; Pervaiz, M.O.; Wireless And Mobile.
On Energy-Efficient Trap Coverage in Wireless Sensor Networks Junkun Li, Jiming Chen, Shibo He, Tian He, Yu Gu, Youxian Sun Zhejiang University, China.
Optimal Base Station Selection for Anycast Routing in Wireless Sensor Networks 指導教授 : 黃培壝 & 黃鈴玲 學生 : 李京釜.
Co-Grid: an Efficient Coverage Maintenance Protocol for Distributed Sensor Networks Guoliang Xing; Chenyang Lu; Robert Pless; Joseph A. O ’ Sullivan Department.
Energy-Efficient Sensor Network Design Subject to Complete Coverage and Discrimination Constraints Frank Y. S. Lin, P. L. Chiu IM, NTU SECON 2005 Presenter:
Scheduling Optimization in Wireless MESH Networks with Power Control and Rate Adaptation SECON 2006 Antonio Capone and Giuliana Carello Keon Jang 2007.
1 11 Channel Assignment for Maximum Throughput in Multi-Channel Access Point Networks Xiang Luo, Raj Iyengar and Koushik Kar Rensselaer Polytechnic Institute.
CSE 589 Part VI. Reading Skiena, Sections 5.5 and 6.8 CLR, chapter 37.
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Efficient k-Coverage Algorithms for Wireless Sensor Networks Mohamed Hefeeda.
On the Topology of Wireless Sensor Networks Sen Yang, Xinbing Wang, Luoyi Fu Department of Electronic Engineering, Shanghai Jiao Tong University, China.
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
Analysis and algorithms of the construction of the minimum cost content-based publish/subscribe overlay Yaxiong Zhao and Jie Wu
ST-MAC: Spatial-Temporal MAC Scheduling for Underwater Sensor Networks Chih-Cheng Hsu, Kuang-Fu Lai, Cheng-Fu Chou, Kate Ching-Ju Lin IEEE INFOCOM 2009.
1 CS612 Algorithms for Electronic Design Automation CS 612 – Lecture 8 Lecture 8 Network Flow Based Modeling Mustafa Ozdal Computer Engineering Department,
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Tunable QoS-Aware Network Survivability Presenter : Yen Fen Kao Advisor : Yeong Sung Lin 2013 Proceedings IEEE INFOCOM.
Joint Base Station and Relay Station Placement for IEEE j Networks Hsiao-Chen Lu and Wanjiun Liao Department of Electrical Engineering, National.
Coverage and Scheduling in Wireless Sensor Networks Yong Hwan Kim Korea University of Technology and Education Laboratory of Intelligent.
Harbin Institute of Technology Application-Aware Data Collection in Wireless Sensor Networks Fang Xiaolin Harbin Institute of Technology.
Multi-Objective Optimization for Topology Control in Hybrid FSO/RF Networks Jaime Llorca December 8, 2004.
Efficient Point Coverage in Wireless Sensor Networks Jie Wang and Ning Zhong Department of Computer Science University of Massachusetts Journal of Combinatorial.
Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network You-Chiun Wang, Chun-Chi Hu, and Yu-Chee Tseng IEEE Transactions on Mobile Computing.
Optimal Relay Placement for Indoor Sensor Networks Cuiyao Xue †, Yanmin Zhu †, Lei Ni †, Minglu Li †, Bo Li ‡ † Shanghai Jiao Tong University ‡ HK University.
Approximation Algorithms based on linear programming.
1 Chapter 6 Reformulation-Linearization Technique and Applications.
1 Chapter 5 Branch-and-bound Framework and Its Applications.
Prof. Yu-Chee Tseng Department of Computer Science
Heuristic & Approximation
Computing and Compressive Sensing in Wireless Sensor Networks
The minimum cost flow problem
Chapter 9 Integer Programming
On Achieving Maximum Network Lifetime Through Optimal Placement of Cluster-heads in Wireless Sensor Networks High-Speed Networking Lab. Dept. of CSIE,
Energy-Efficient Target Coverage in Wireless Sensor Networks
A Better Approximation for Minimum Total Routing Path Clustering Problem in 2-D Underwater Sensor Networks Wei Wang, Donghyun Kim, and Weili Wu, A Better.
Survey on Coverage Problems in Wireless Sensor Networks - 2
Survey on Coverage Problems in Wireless Sensor Networks
at University of Texas at Dallas
Presentation transcript:

Achieving Minimum Coverage Breach under Bandwidth Constraints in Wireless Sensor Networks Maggie X. Cheng, Lu Ruan and Weili Wu Dept. of Comput. Sci, Missouri Univ. IEEE INFOCOM 2005

Outline Introduction Minimum Breach Problem in Sensor Networks Problem Definition Complexity Classification of the Minimum Breach Problem Approximation Algorithm Integer Programming Formulation of the Minimum Breach Problem Heuristic 1: RELAXATION Heuristic 2: MINBREACH Simulation Study Conclusion and Extensions

Introduction Stochastically deployed sensor network. Oscillated between active modes and inactive modes. Divided into mutually exclusive subsets without consideration on subset sizes. Disjoint set covers C 1 = { s 1, s 2 } C 2 = { s 3, s 4 } [Ref 1] Energy-Efficient Target Coverage in Wireless Sensor Networks, infocom 2004Ref 1 [Ref 2] Maximal_Lifetime_Scheduling__in_sensor_surveillance_networksRef 2

Why are Bandwidth Constraints? Each Active Sensor will send the sensory data directly to the base station. “ Bandwidth ” is the total number of time slots. The total number of sensors simultaneously sending to the base station must be restricted by the bandwidth. …… Bandwidth Constraints Slot 1Slot 2Slot W

Problem Definition(1/2) Object has equal chance of being detected from all direction. If sensors lie within the area boundary, the object is considered covered.

Problem Definition(2/2) Breach: If a target is not covered by any active sensor, it is called “ breach ”. PROBLEM: MINIMUM BREACH Given a collection S of sensors, a collection A of targets, and the sensor-target coverage map. QUESTION: Can we divide S into disjoint subsets such that the overall breach is at most B and each subset has at most W sensors in it?

Complexity Classification of the Minimum Breach Problem — MINIMUM BREACH Prove that MINIMUM BREACH problem is NP-complete. 1. Divide the sensors into two disjoint subsets to minimize the overall breach. — MINIMUM 2SET BREACH problem 2. MINIMUM SET SPLITTING (NP-Complete)  Given a collection C of subsets of a finite set S  Is there a partition of S into two subsets S 1 and S 2 such that the cardinality of the subsets in C that are not entirely contained in either S 1 or S 2 (splitted) is at least |C|-B.

Integer Programming Formulation of the Minimum Breach Problem

Heuristic I: RELAXATION First Step: the Integer Programming problem is relaxed to a Linear Programming problem, and an optimal solution for LP is computed. Second Step: a greedy algorithm is employed to find an integer solution based on the optimal solution obtained at the first set. Third Step: the solution from problem is used to construct the subsets.

Heuristic II: MINBREACH x1x2x3...xnx1x2x3...xn x = = y k,i. x k,i

Heuristic II: MINBREACH I 1 : denote the rows in the upper part {0,1,-1} I 2 : denote the rows in the lower part {0,1} Jx: represent the columns that correspond to the {x k,i } in the original (IP) Jy: represent the columns that correspond to the {y k,j } in the original (IP)

Simulation Study As the number of targets increase from 10 to 100, the number of sensors also increase from 10 to 100, and bandwidth increase from 2 to 20. It verifies that higher f leads to higher breach rate.

Conclusion and Extensions To improve sensor coverage, deploying more sensors must be accompanied by increasing bandwidth, otherwise, the coverage may be decreased as a result. To minimize the maximal breach is also an NP-complete problem that requires efficient approximation algorithm.

[back]back ~  (n 3 ) where n= N(N+M)/W

[back]back

[back]back

[back]back