The Cat and The Mouse -- The Case of Mobile Sensors and Targets David K. Y. Yau Lab for Advanced Network Systems Dept of Computer Science Purdue University.

Slides:



Advertisements
Similar presentations
Cooperative Transmit Power Estimation under Wireless Fading Murtaza Zafer (IBM US), Bongjun Ko (IBM US), Ivan W. Ho (Imperial College, UK) and Chatschik.
Advertisements

Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
Problem solving with graph search
Ch. 12 Routing in Switched Networks Routing in Packet Switched Networks Routing Algorithm Requirements –Correctness –Simplicity –Robustness--the.
1 ECE 776 Project Information-theoretic Approaches for Sensor Selection and Placement in Sensor Networks for Target Localization and Tracking Renita Machado.
Introduction to Algorithms Rabie A. Ramadan rabieramadan.org 2 Some of the sides are exported from different sources.
Coverage by Directional Sensors Jing Ai and Alhussein A. Abouzeid Dept. of Electrical, Computer and Systems Engineering Rensselaer Polytechnic Institute.
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Randomized Sensing in Adversarial Environments Andreas Krause Joint work with Daniel Golovin and Alex Roper International Joint Conference on Artificial.
Study Group Randomized Algorithms 21 st June 03. Topics Covered Game Tree Evaluation –its expected run time is better than the worst- case complexity.
Coverage Estimation in Heterogeneous Visual Sensor Networks Mahmut Karakaya and Hairong Qi Advanced Imaging & Collaborative Information Processing Laboratory.
CSE 380 – Computer Game Programming Pathfinding AI
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
Applications of Single and Multiple UAV for Patrol and Target Search. Pinsky Simyon. Supervisor: Dr. Mark Moulin.
Navigating Nets: Simple algorithms for proximity search Robert Krauthgamer (IBM Almaden) Joint work with James R. Lee (UC Berkeley)
1 Stochastic Event Capture Using Mobile Sensors Subject to a Quality Metric Nabhendra Bisnik, Alhussein A. Abouzeid, and Volkan Isler Rensselaer Polytechnic.
The Cat and The Mouse -- The Case of Mobile Sensors and Targets David K. Y. Yau Lab for Advanced Network Systems Dept of Computer Science Purdue University.
1 Maximizing Lifetime of Sensor Surveillance Systems IEEE/ACM TRANSACTIONS ON NETWORKING Authors: Hai Liu, Xiaohua Jia, Peng-Jun Wan, Chih- Wei Yi, S.
Mobility Improves Coverage of Sensor Networks Benyuan Liu*, Peter Brass, Olivier Dousse, Philippe Nain, Don Towsley * Department of Computer Science University.
Data Broadcast in Asymmetric Wireless Environments Nitin H. Vaidya Sohail Hameed.
Tracking a moving object with real-time obstacle avoidance Chung-Hao Chen, Chang Cheng, David Page, Andreas Koschan and Mongi Abidi Imaging, Robotics and.
Autonomous Target Assignment: A Game Theoretical Formulation Gurdal Arslan & Jeff Shamma Mechanical and Aerospace Engineering UCLA AFOSR / MURI.
Cache Placement in Sensor Networks Under Update Cost Constraint Bin Tang, Samir Das and Himanshu Gupta Department of Computer Science Stony Brook University.
1 Energy-Efficient localization for networks of underwater drifters Diba Mirza Curt Schurgers Department of Electrical and Computer Engineering.
Find a Path s A D B E C F G Heuristically Informed Methods  Which node do I expand next?  What information can I use to guide this.
AWESOME: A General Multiagent Learning Algorithm that Converges in Self- Play and Learns a Best Response Against Stationary Opponents Vincent Conitzer.
Theoretical Results on Base Station Movement Problem for Sensor Network Yi Shi ( 石毅 ) and Y. Thomas Hou ( 侯一釗 ) Virginia Tech, Dept. of ECE IEEE Infocom.
A Hierarchical Energy-Efficient Framework for Data Aggregation in Wireless Sensor Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 3, MAY.
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley Asynchronous Distributed Algorithm Proof.
May 11, 2005 Tracking on a Graph Songhwai Oh Shankar Sastry Target trajectoriesEstimated tracks Tracking in Sensor Networks Target tracking is a representative.
1 Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network Prof. Yu-Chee Tseng Department of Computer Science National Chiao-Tung University.
Mobility Models in Mobile Ad Hoc Networks Chun-Hung Chen 2005 Mar 8 th Dept. of Computer Science and Information Engineering National Taipei University.
Impact of Different Mobility Models on Connectivity Probability of a Wireless Ad Hoc Network Tatiana K. Madsen, Frank H.P. Fitzek, Ramjee Prasad [tatiana.
CS 712 | Fall 2007 Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua. National University.
Energy Efficient Routing and Self-Configuring Networks Stephen B. Wicker Bart Selman Terrence L. Fine Carla Gomes Bhaskar KrishnamachariDepartment of CS.
1 Efficiency and Nash Equilibria in a Scrip System for P2P Networks Eric J. Friedman Joseph Y. Halpern Ian Kash.
Transit price negotiation: repeated game approach Sogea 23 Mai 2007 Nancy, France D.Barth, J.Cohen, L.Echabbi and C.Hamlaoui
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
Coordinated Sensor Deployment for Improving Secure Communications and Sensing Coverage Yinian Mao, Min Wu Security of ad hoc and Sensor Networks, Proceedings.
On Energy-Efficient Trap Coverage in Wireless Sensor Networks Junkun Li, Jiming Chen, Shibo He, Tian He, Yu Gu, Youxian Sun Zhejiang University, China.
1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.
Many random walks are faster than one Noga AlonTel Aviv University Chen AvinBen Gurion University Michal KouckyCzech Academy of Sciences Gady KozmaWeizmann.
Game-Theoretic Analysis of Mobile Network Coverage David K.Y. Yau.
1 Distributed and Optimal Motion Planning for Multiple Mobile Robots Yi Guo and Lynne Parker Center for Engineering Science Advanced Research Computer.
Selection and Navigation of Mobile sensor Nodes Using a Sensor Network Atul Verma, Hemjit Sawant and Jindong Tan Department of Electrical and Computer.
Mobile Agent Migration Problem Yingyue Xu. Energy efficiency requirement of sensor networks Mobile agent computing paradigm Data fusion, distributed processing.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
A Passive Approach to Sensor Network Localization Rahul Biswas and Sebastian Thrun International Conference on Intelligent Robots and Systems 2004 Presented.
Trade-offs Between Mobility and Density for Coverage in Wireless Sensor Networks Wei Wang, Vikram Srinivasan and Kee-Chaing Chua National University of.
1 Probabilistic Coverage in Wireless Sensor Networks Nadeem Ahmed, Salil S. Kanhere and Sanjay Jha Computer Science and Engineering, University of New.
APL: Autonomous Passive Localization for Wireless Sensors Deployed in Road Networks IEEE INFOCOM 2008, Phoenix, AZ, USA Jaehoon Jeong, Shuo Guo, Tian He.
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
Murat Demirbas Onur Soysal SUNY Buffalo Ali Saman Tosun U. San Antonio Data Salmon: A greedy mobile basestation protocol for efficient data collection.
Adaptive Sleep Scheduling for Energy-efficient Movement-predicted Wireless Communication David K. Y. Yau Purdue University Department of Computer Science.
Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China.
1 a1a1 A1A1 a2a2 a3a3 A2A Mixed Strategies When there is no saddle point: We’ll think of playing the game repeatedly. We continue to assume that.
MAIN RESULT: We assume utility exhibits strategic complementarities. We show: Membership in larger k-core implies higher actions in equilibrium Higher.
Community structure in graphs Santo Fortunato. More links “inside” than “outside” Graphs are “sparse” “Communities”
Smart Sleeping Policies for Wireless Sensor Networks Venu Veeravalli ECE Department & Coordinated Science Lab University of Illinois at Urbana-Champaign.
Selection and Navigation of Mobile Sensor Nodes Using a Sensor Network Atul Verma, Hemjit Sawant and Jindong Tan Department of Electrical and Computer.
Distributed Algorithms for Dynamic Coverage in Sensor Networks Lan Lin and Hyunyoung Lee Department of Computer Science University of Denver.
Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network You-Chiun Wang, Chun-Chi Hu, and Yu-Chee Tseng IEEE Transactions on Mobile Computing.
Optimal Relay Placement for Indoor Sensor Networks Cuiyao Xue †, Yanmin Zhu †, Lei Ni †, Minglu Li †, Bo Li ‡ † Shanghai Jiao Tong University ‡ HK University.
Privacy Vulnerability of Published Anonymous Mobility Traces Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip (Purdue University) Nageswara S. V. Rao (Oak.
Prof. Yu-Chee Tseng Department of Computer Science
Totally Disjoint Multipath Routing in Multihop Wireless Networks Sonia Waharte and Raoef Boutaba Presented by: Anthony Calce.
The Coverage Problem in a Wireless Sensor Network
Mobile-Assisted Localization in Sensor Network
Presentation transcript:

The Cat and The Mouse -- The Case of Mobile Sensors and Targets David K. Y. Yau Lab for Advanced Network Systems Dept of Computer Science Purdue University (Joint work with J. C. Chin, Y. Dong, and W. K. Hon) David K. Y. Yau Lab for Advanced Network Systems Dept of Computer Science Purdue University (Joint work with J. C. Chin, Y. Dong, and W. K. Hon)

Project Background  Sensor-cyber project in national defense  Near real-time detection, tracking, and analysis of plumes (nuclear, chemical, biological, …)  Multi-university partnership funded by Oak Ridge National Lab  Sensor testbed design and implementation  Research team: Purdue, UIUC, LSU, U of Florida, Syracuse  Personel  Purdue: Jren-Chit Chin, Yu Dong, David Yau, Wing-Kai Hon  Oak Ridge National Lab: Nageswara Rao  Partnership with SensorNet initiative  Sensor-cyber project in national defense  Near real-time detection, tracking, and analysis of plumes (nuclear, chemical, biological, …)  Multi-university partnership funded by Oak Ridge National Lab  Sensor testbed design and implementation  Research team: Purdue, UIUC, LSU, U of Florida, Syracuse  Personel  Purdue: Jren-Chit Chin, Yu Dong, David Yau, Wing-Kai Hon  Oak Ridge National Lab: Nageswara Rao  Partnership with SensorNet initiative

SensorNet Initiative  Building comprehensive incident management system  Coordinate knowledge and response effectively  Provide data highway for processing sensor data  Deliver near-real-time information for effective counter-measure  Building comprehensive incident management system  Coordinate knowledge and response effectively  Provide data highway for processing sensor data  Deliver near-real-time information for effective counter-measure Analysis, modeling and prediction Chemical Radiation Biological

Why Mobile?  The mouse  Evasion of detection  Nature of “mission”  The cat  Improved coverage with fewer sensors  Robustness against contingencies  Planned or random movement (randomness useful)  The mouse  Evasion of detection  Nature of “mission”  The cat  Improved coverage with fewer sensors  Robustness against contingencies  Planned or random movement (randomness useful)

Scenario—UAV Surveillance  UAV detect radioactive plume  Estimate position of plume source  Control center predicts movement  Emergency response

Mobility Model  Four-tuple  N: network area  M: accessibility constraints -- the “map”  T: trip selection  R: route selection  Random waypoint model is a special case  Null accessibility constraints  Uniform random trip selection  Cartesian straight line route selection  Four-tuple  N: network area  M: accessibility constraints -- the “map”  T: trip selection  R: route selection  Random waypoint model is a special case  Null accessibility constraints  Uniform random trip selection  Cartesian straight line route selection

Problem Formulation  Two player game  Payoff is time until detection (zero sum)  Cat plays detection strategy  Stochastic, characterized by per-cell presence probabilities  Mouse plays evasion strategy  Knows statistical process of cat’s movement, but not necessarily exact routes (exact positions at given times)  Two player game  Payoff is time until detection (zero sum)  Cat plays detection strategy  Stochastic, characterized by per-cell presence probabilities  Mouse plays evasion strategy  Knows statistical process of cat’s movement, but not necessarily exact routes (exact positions at given times)

Best Mouse Play  Cat’s presence matrix given  Network region divided into 2D cells  P i,j gives probability for mouse to find cat in cell (i, j)  Expected detection time “long” compared with trip from point A to point B  Dynamic programming solution to maximize detection time  Local greedy strategy does not always work  Cat’s presence matrix given  Network region divided into 2D cells  P i,j gives probability for mouse to find cat in cell (i, j)  Expected detection time “long” compared with trip from point A to point B  Dynamic programming solution to maximize detection time  Local greedy strategy does not always work

Optimal Escape Path Formulation  For each cell j, mouse decides whether to stay or to move to a neighbor cell (and which one)  If stay, expected max time until detection is E j [T stay ]  If move to neighbor cell k, expected max time until detection is E j [T move(k) ]  For cell j, expected max time until detection, E j [T], is largest of E j [T stay ] and E j [T move(k) ] for each neighbor cell k of j  E j [T stay ] determined by cat’s presence matrix and expected cat’s sojourn time in each cell  Optimal escape path is sequence of safest neighbors to move to, until mouse decides to stay  How to compute E j [T] for each cell j?  For each cell j, mouse decides whether to stay or to move to a neighbor cell (and which one)  If stay, expected max time until detection is E j [T stay ]  If move to neighbor cell k, expected max time until detection is E j [T move(k) ]  For cell j, expected max time until detection, E j [T], is largest of E j [T stay ] and E j [T move(k) ] for each neighbor cell k of j  E j [T stay ] determined by cat’s presence matrix and expected cat’s sojourn time in each cell  Optimal escape path is sequence of safest neighbors to move to, until mouse decides to stay  How to compute E j [T] for each cell j?

Computing E j [T]  Initialize E j [T] as E j [T stay ]  Insert all the cells into heap sorted by decreasing E j [T]  Delete root cell 0 from heap  For each neighbor cell k of 0, update E k [T] as E k [T] := max(E k [T], E k [T move(0) ])  Reorder heap in decreasing E j [T] order  Repeat until heap becomes empty  Initialize E j [T] as E j [T stay ]  Insert all the cells into heap sorted by decreasing E j [T]  Delete root cell 0 from heap  For each neighbor cell k of 0, update E k [T] as E k [T] := max(E k [T], E k [T move(0) ])  Reorder heap in decreasing E j [T] order  Repeat until heap becomes empty

Example Optimal Paths Path when mouse moves slowly Path when mouse moves quickly

Comparison with Local Greedy Strategy Local greedy strategy: mouse will stay Dynamic programming strategy: mouse moves to cell with small probability of cat’s presence (0.0075) Current mouse position

If Cat Plays Random Waypoint Strategy  Highest presence probability at the center of the network area  Lowest presence probabilities at the corners and perimeters  Good “safe havens” for mouse to hide  Sum of presence probabilities is one  n cats  sum of probabilities  n  Equality for disjoint cats’ surveillance areas  Highest presence probability at the center of the network area  Lowest presence probabilities at the corners and perimeters  Good “safe havens” for mouse to hide  Sum of presence probabilities is one  n cats  sum of probabilities  n  Equality for disjoint cats’ surveillance areas

Distribution of Movement Direction in 150 m by 150 m Network Area

Cat’s Presence Matrix for Random Waypoint Movement

Cat’s Presence Matrix in 500  500 m Network for Random Waypoint Movement

Distribution of Movement Direction (a) Calculated probabilities of sensor moving towards the center cell from different current cells (b) Measured probabilities of sensor moving towards the center cell from different current cells

Analytical Cell Coverage Statistics (a) Expected number of trips before covering a cell (average = , maximum = ) (b) Expected time before covering a cell (average = s, maximum = s)

Measured Cell Coverage Statistics (b) Expected number of trips before covering a cell (average = , maximum = ) (b) Expected time before covering a cell (average = s, maximum = s)

Optimal Cat Strategy  Maximize minimum presence probability among all the cells  Eliminate safe haven  Achieved by equal presence probabilities in each cell  Will lead to Nash Equilibrium  Zero sum game  Pareto optimality  Maximize minimum presence probability among all the cells  Eliminate safe haven  Achieved by equal presence probabilities in each cell  Will lead to Nash Equilibrium  Zero sum game  Pareto optimality

Presence Matrices Random Waypoint Model Bouncing

Seeing Mouse Strategy

Blind Mouse Strategies Compared Average Detection Time Cat Strategies ScanBouncingRWP Mouse Strategies DP RWP Stay V c = 10 m/s, V m = 10 m/s, R c = 25 m, R m = 0 m

Seeing Mouse Strategies Compared Average Detection Time Cat Strategies BouncingRWP Mouse Strategies Bouncing Centric Static Stay V c = 10 m/s, V m = 10 m/s, R c = 5 m, R m = 10 m

Effect of Mouse Sensing Range

Effect of Mouse Speed

Effect of Number of Cats

Minimum Sensing Range for Expected Random Waypoint Coverage  Stationary mouse; cat in random waypoint movement  Expected coverage desired by given deadline  What is minimum sensing distance required?  Stochastic analysis of shortest distance between cat and mouse within deadline  Stationary mouse; cat in random waypoint movement  Expected coverage desired by given deadline  What is minimum sensing distance required?  Stochastic analysis of shortest distance between cat and mouse within deadline

Lower Bound Cat-mouse Distance Network divided into m by n cells; each has fixed size s by s D(i, j): Euclidean distance between cell i and cell j N sets of cells sorted by set’s distance to mouse Each set of cells denoted as S j, 0 ≤ j ≤ N - 1 Each cell in S j is equidistant from the mouse; distance is D S j Distances sorted in increasing order; i.e., D S j < D S j+1 Network divided into m by n cells; each has fixed size s by s D(i, j): Euclidean distance between cell i and cell j N sets of cells sorted by set’s distance to mouse Each set of cells denoted as S j, 0 ≤ j ≤ N - 1 Each cell in S j is equidistant from the mouse; distance is D S j Distances sorted in increasing order; i.e., D S j < D S j+1

Example Equidistant Sets of Cells Mouse located at center of network area

Correlation between Cells Visited P i : probability that cat may visit cell i P S j : probability that cat may visit any cell in set S j P i : probability that cat may visit cell i P S j : probability that cat may visit any cell in set S j

Shortest Distance Probability Matrix from Cell i to Cell j 3-D probability matrix B Each element b i,j gives cat’s shortest distance distribution from mouse after trip from cell i to j is a size N vector: b i,j [k] is the probability that the shortest distance during the trip is D S k

where is the probability that D S 0 is shortest distance for trip l, and is probability that D S n is shortest distance for the trip, 1 ≤ n ≤ N - 1 Let denote, then is calculated as: Shortest Distance Probability Matrix after l Trips B l is the shortest distance probability matrix after l trips Computed by * operator B l is the shortest distance probability matrix after l trips Computed by * operator Each element of B l is calculated as:

Expected shortest distance  The expected shortest distance between cat and mouse after l trips:

Approximate Expected Shortest Distance  Approximate expected shortest distance from mouse after cat has visited k cells:  P D j (k) is probability that after visiting k cells, a cell in S j is visited, but no cell in S i, i< j, is visited  Approximate expected shortest distance from mouse after cat has visited k cells:  P D j (k) is probability that after visiting k cells, a cell in S j is visited, but no cell in S i, i< j, is visited

Lower Bound Cat-mouse Distance for Random Waypoint Model (a) Expected speed = 5 m/s (b) Expected speed = 10 m/s(c) Expected speed = 25 m/s

Lower Bound Cat-mouse Distance for Indiana Map-based Model

Conclusions  Considered cat and mouse game between mobile sensors and mobile target  For random waypoint model, other coverage properties can be obtained analytically  Expected cell sojourn time, expected time to cover general AOI, number of sensors to achieve coverage by given deadline, …  Considered cat and mouse game between mobile sensors and mobile target  For random waypoint model, other coverage properties can be obtained analytically  Expected cell sojourn time, expected time to cover general AOI, number of sensors to achieve coverage by given deadline, …

Conclusions (cont’d)  Many extensions possible  Explicit account for plume explosion / dispersion models  Model for sensor (un)reliability, interference, etc  Explicit quantification of sensing uncertainty and its reduction  Many extensions possible  Explicit account for plume explosion / dispersion models  Model for sensor (un)reliability, interference, etc  Explicit quantification of sensing uncertainty and its reduction

Approximating the theoretical lower bound

Statistical properties of nodal movement  Theorem 1 Let X and Y denote the width and height of the network, then the expected trip time is:

Statistical properties of nodal movement  Theorem 2 The expected movement direction at a given position (x,y) can be expressed as

Statistical properties of nodal movement  Theorem 3 Assume that each network cell is a circle with radius R. Within a single trip, the expected sojourn time (i)when the sensor is inside the starting (or ending) cell is (ii)when the sensor is not inside the starting or ending cell (i.e., when the sensor is crossing a cell in the trip) is Corollary 1 The expected cell sojourn time E[Ts] is  Theorem 3 Assume that each network cell is a circle with radius R. Within a single trip, the expected sojourn time (i)when the sensor is inside the starting (or ending) cell is (ii)when the sensor is not inside the starting or ending cell (i.e., when the sensor is crossing a cell in the trip) is Corollary 1 The expected cell sojourn time E[Ts] is

Expected cell sojourn time Size (m) V max (m/s) V min (m/s) E[T i ] (s) E[T c ] (s) E[T max ] (s) T measure ( s)

Covering a target cell  Theorem 4 (Naïve case) Assume each cell is equally likely to be covered next when a sensor leaves a cell. The expected number of cells visited by the sensor before covering a target cell equals the total number of cells in the network, i.e., E[k] = mn.  Theorem 5 Let P i denote the probability that cell i is the next covered cell when the sensor leaves a cell. The expected number of cells visited by the sensor before covering the cell i, denoted as E[k i ], is 1/P i.  The expected travel time before the mobile sensor covers the target is about:  Theorem 4 (Naïve case) Assume each cell is equally likely to be covered next when a sensor leaves a cell. The expected number of cells visited by the sensor before covering a target cell equals the total number of cells in the network, i.e., E[k] = mn.  Theorem 5 Let P i denote the probability that cell i is the next covered cell when the sensor leaves a cell. The expected number of cells visited by the sensor before covering the cell i, denoted as E[k i ], is 1/P i.  The expected travel time before the mobile sensor covers the target is about:

Covering an Area-of-Interest (AOI)  Theorem 6 Let P i be the probability for the target cell i to be covered by a sensor at any instance of time. The expected number of cells visited by the sensor (i)before covering all cells in AOI is (ii)before covering all cells in the network is  Theorem 6 Let P i be the probability for the target cell i to be covered by a sensor at any instance of time. The expected number of cells visited by the sensor (i)before covering all cells in AOI is (ii)before covering all cells in the network is

How many sensors required?  Theorem 7 Suppose that we are given the deadline D, the expected cell sojourn time E[Ts], and the probability Pi for the target cell i to be covered at any instance of time (if there is only one sensor). Then, to cover the target cell I with expected time smaller than D, the minimum number of sensor required is about.

Movement prediction result by using map based model Performance of LD with a map-based movement model within a 10,800 m by 11,500 m local area in Lafayette, IN, USA. (a) Communication distance vs. allowable delay (b) Distance savings vs. allowable delay. (c) Actual delay vs. allowable delay

Complexity of theoretical lower bound calculation  Probability Matrix Approach: Update matrix for l trips: O((mn) 3 lN) Calculate E[d l min ]: O((mn) 2 N)  Approximation Approach: O(mn+N)  Probability Matrix Approach: Update matrix for l trips: O((mn) 3 lN) Calculate E[d l min ]: O((mn) 2 N)  Approximation Approach: O(mn+N)

Comparison of two approaches (a) Expected speed = 5 m/s.(b) Expected speed = 10 m/s.(c) Expected speed = 25 m/s. Lower bound of expected communication distance (as a function of delay) computed by probability matrix approach and approximation approach. number of cells5 x 59 x 9 Time for probability matrix approach (s) Time for approximation approach (s) Comparison of computation time

Experimental results  Comparison of the calculated theoretical lower bound of shortest communication distance to the target with the measurement results of the shortest distance, as well as the LD movement-prediction results.  Average of one hundred 20,000-second runs  Nodes moves in a 150 m by 150 m (or a 270 m by 270 m) network area, divided into 30 m by 30 m cells,  Target is located in the center of network  Modified random waypoint movement model  With scenarios of expected speed of 5 m/s, 10 m/s, and 25 m/s.  Comparison of the calculated theoretical lower bound of shortest communication distance to the target with the measurement results of the shortest distance, as well as the LD movement-prediction results.  Average of one hundred 20,000-second runs  Nodes moves in a 150 m by 150 m (or a 270 m by 270 m) network area, divided into 30 m by 30 m cells,  Target is located in the center of network  Modified random waypoint movement model  With scenarios of expected speed of 5 m/s, 10 m/s, and 25 m/s.

LD performance (a) Expected speed = 5 m/s.(b) Expected speed = 10 m/s.(c) Expected speed = 25 m/s. Comparison of performance of LD with experimental expected shortest distance, and the theoretical lower bound in network area of size 150 m by 150 m divided into 25 cell. (Error bars are omitted because of small standard deviations).

LD performance (2) (a) Expected speed = 5 m/s.(b) Expected speed = 10 m/s.(c) Expected speed = 25 m/s. Comparison of performance of LD with experimental expected shortest distance, and the theoretical lower bound in network area of size 270 m by 270 m divided into 81 cell. (Error bars are omitted because of small standard deviations).

Effect of cell size (a) Expected speed = 5 m/s.(b) Expected speed = 10 m/s.(c) Expected speed = 25 m/s. Performance comparison of LD under different grid settings