Hole Detection and Boundary Recognition in Wireless Sensor Networks Kun-Ying Hsieh ( 謝坤穎 ) Dept. of Computer Science and Information Engineering National.

Slides:



Advertisements
Similar presentations
Dynamic Object Tracking in Wireless Sensor Networks Tzung-Shi Chen 1, Wen-Hwa Liao 2, Ming-De Huang 3, and Hua-Wen Tsai 4 1 National University of Tainan,
Advertisements

Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks Xiaorui Wang, Guoliang Xing, Yuanfang Zhang*, Chenyang Lu, Robert Pless,
Guang Tan, Stephen A. Jarvis, and Anne-Marie Kermarrec IEEE Transactions on Mobile Computing, VOL. 8, NO.6, JUNE Yun-Jung Lu.
Topological Hole Detection Ritesh Maheshwari CSE 590.
SUSTAIN: An Adaptive Fault Tolerance Service for Geographically Overlapping Wireless Cyber-Physical Systems Gholam Abbas Angouti Kolucheh, Qi Han
1 On Constructing k- Connected k-Dominating Set in Wireless Networks Department of Computer Science and Information Engineering National Cheng Kung University,
1 Emergency Navigation by Wireless Sensor Networks in 2D and 3D Indoor Environments Yu-Chee Tseng Deptment of Computer Science National Chiao Tung University.
1 Distributed Navigation Algorithms for Sensor Networks Chiranjeeb Buragohain, Divyakant Agrawal, Subhash Suri Dept. of Computer Science, University of.
Layered Diffusion based Coverage Control in Wireless Sensor Networks Wang, Bang; Fu, Cheng; Lim, Hock Beng; Local Computer Networks, LCN nd.
1 Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network Prof. Yu-Chee Tseng Department of Computer Science National Chiao-Tung University.
後卓越計畫進度報告 (2007/6/4) 中央大學 許健平教授 淡江大學 張志勇教授. Routing with Hexagonal Virtual Coordinate in Wireless Sensor Networks.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
Yanyan Yang, Yunhuai Liu, and Lionel M. Ni Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE MASS 2009.
A Distributed Localization Scheme for Wireless Sensor Networks with Improved Grid-Scan and Vector- Based Refinement Jang-Ping Sheu, Pei-Chun Chen, and.
LPT for Data Aggregation in Wireless Sensor Networks Marc Lee and Vincent W.S. Wong Department of Electrical and Computer Engineering, University of British.
Authors: Sheng-Po Kuo, Yu-Chee Tseng, Fang-Jing Wu, and Chun-Yu Lin
Mobility Limited Flip-Based Sensor Networks Deployment Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic.
Lifetime and Coverage Guarantees Through Distributed Coordinate- Free Sensor Activation ACM MOBICOM 2009.
Hongyu Gong, Lutian Zhao, Kainan Wang, Weijie Wu, Xinbing Wang
A novel gossip-based sensing coverage algorithm for dense wireless sensor networks Vinh Tran-Quang a, Takumi Miyoshi a,b a Graduate School of Engineering,
2015/10/1 A color-theory-based energy efficient routing algorithm for mobile wireless sensor networks Tai-Jung Chang, Kuochen Wang, Yi-Ling Hsieh Department.
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
Minimal Hop Count Path Routing Algorithm for Mobile Sensor Networks Jae-Young Choi, Jun-Hui Lee, and Yeong-Jee Chung Dept. of Computer Engineering, College.
Boundary Recognition in Sensor Networks by Topology Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B.
1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
P-Percent Coverage Schedule in Wireless Sensor Networks Shan Gao, Xiaoming Wang, Yingshu Li Georgia State University and Shaanxi Normal University IEEE.
WEAR: A Balanced, Fault-Tolerant, Energy-Aware Routing Protocol for Wireless Sensor Networks Kewei Sha, Junzhao Du, and Weisong Shi Wayne State University.
Selection and Navigation of Mobile sensor Nodes Using a Sensor Network Atul Verma, Hemjit Sawant and Jindong Tan Department of Electrical and Computer.
Neighborhood-Based Topology Recognition in Sensor Networks S.P. Fekete, A. Kröller, D. Pfisterer, S. Fischer, and C. Buschmann Corby Ziesman.
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
1 Shape Segmentation and Applications in Sensor Networks Xianjin Xhu, Rik Sarkar, Jie Gao Department of CS, Stony Brook University INFOCOM 2007.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
Rendezvous Regions: A Scalable Architecture for Service Location and Data-Centric Storage in Large-Scale Wireless Sensor Networks Karim Seada, Ahmed Helmy.
1 Probabilistic Coverage in Wireless Sensor Networks Nadeem Ahmed, Salil S. Kanhere and Sanjay Jha Computer Science and Engineering, University of New.
Bounded relay hop mobile data gathering in wireless sensor networks
A Dead-End Free Topology Maintenance Protocol for Geographic Forwarding in Wireless Sensor Networks IEEE Transactions on Computers, vol. 60, no. 11, November.
Central China Normal University A Cluster-based and Range Free Multidimensional Scaling-MAP Localization Scheme in WSN 1 Ke Xu, Yuhua Liu ( ), Cui Xu School.
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
Topological Hole Detection in Wireless Sensor Networks and its Applications Stefan Funke Department of Computer Science, Stanford University, U.S.A. DIAL-M-POMC.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Computer Network Lab. Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks SenSys ’ 03 Xiaorui Wang, Guoliang Xing, Yuanfang.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Ching-Ju Lin Institute of Networking and Multimedia NTU
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
GLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks Qing Fang, Jie Gao, Leonidas J. Guibas, Vin de Silva, Li Zhang Department of Electrical.
Po-Yu Chen, Zan-Feng Kao, Wen-Tsuen Chen, Chi-Han Lin Department of Computer Science National Tsing Hua University IEEE ICPP 2011 A Distributed Flow-Based.
Energy-Aware Data-Centric Routing in Microsensor Networks Azzedine Boukerche SITE, University of Ottawa, Canada Xiuzhen Cheng, Joseph Linus Dept. of Computer.
Data Gathering in Wireless Sensor Networks with Mobile Collectors Ming Ma and Yuanyuan Yang State University of New York, Stony Brook 1 IEEE Parallel and.
Localized Low-Power Topology Control Algorithms in IEEE based Sensor Networks Jian Ma *, Min Gao *, Qian Zhang +, L. M. Ni *, and Wenwu Zhu +
Energy-Efficient Randomized Switching for Maximizing Lifetime in Tree- Based Wireless Sensor Networks Sk Kajal Arefin Imon, Adnan Khan, Mario Di Francesco,
A Load-Balanced Guiding Navigation Protocol in Wireless Sensor Networks Wen-Tsuen Chen Department of Computer Science National Tsing Hua University Po-Yu.
FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions Young-Mi Song, Sung-Hee Lee and Young- Bae Ko Ajou University.
GholamHossein Ekbatanifard, Reza Monsefi, Mohammad H. Yaghmaee M., Seyed Amin Hosseini S. ELSEVIER Computer Networks 2012 Queen-MAC: A quorum-based energy-efficient.
Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees IEEE ICDCSW, 2011 Pouya Ostovari Department of Computer and Information.
Younghwan Yoo† and Dharma P. Agrawal‡ † School of Computer Science and Engineering, Pusan National University, Busan, KOREA ‡ OBR Center for Distributed.
Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network You-Chiun Wang, Chun-Chi Hu, and Yu-Chee Tseng IEEE Transactions on Mobile Computing.
Deploying Sensors for Maximum Coverage in Sensor Network Ruay-Shiung Chang Shuo-Hung Wang National Dong Hwa University IEEE International Wireless Communications.
Zijian Wang, Eyuphan Bulut, and Boleslaw K. Szymanski Center for Pervasive Computing and Networking and Department of Computer Science Rensselaer Polytechnic.
A Coverage-Preserving and Hole Tolerant Based Scheme for the Irregular Sensing Range in WSNs Azzedine Boukerche, Xin Fei PARADISE Research Lab Univeristy.
1 Hierarchical Data Dissemination Scheme for Large Scale Sensor Networks Anand Visvanathan and Jitender Deogun Department of Computer Science and Engg,
Reliable Mobicast via Face- Aware Routing Qingfeng Huang,Chenyang Lu and Gruia-Catalin Roman Department of Computer Science and Engineering Washington.
National Taiwan University Department of Computer Science and Information Engineering Vinod Namboodiri and Lixin Gao University of Massachusetts Amherst.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Prof. Yu-Chee Tseng Department of Computer Science
Salah A. Aly ,Moustafa Youssef, Hager S. Darwish ,Mahmoud Zidan
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
The Coverage Problem in a Wireless Sensor Network
Speaker : Lee Heon-Jong
Presentation transcript:

Hole Detection and Boundary Recognition in Wireless Sensor Networks Kun-Ying Hsieh ( 謝坤穎 ) Dept. of Computer Science and Information Engineering National Central University Jang-Ping Sheu ( 許健平 ) Dept. of Computer Science National Tsing Hua University IEEE PIMRC 2009

Outline Introduction Related Works Assumption Distributed Boundary Recognition Algorithm Simulation and Performance Analysis Conclusion

Introduction Wireless sensor network (WSN) is composed of several sensor nodes deployed and scattered over a specific monitoring region for collecting sensed data. Most of the applications in WSNs require sufficient sensing coverage and connectivity.

Introduction However, holes may exist within the network due to obstacles such as ponds or small hills that cause the network partitioned and uncovered. Moreover, the holes may make the routing failure when a node transmits sensing data back to the sink.

Problem Discovering the nodes on the boundaries which may be inner that encircles the holes and outer that surrounds the network boundaries.

Related Works Y. Wang, J. Gao, and J. S. B. Mitchell, “Boundary Recognition in Sensor Networks by Topological Methods,” in Proc. of MobiCom, pp , USA, Sept Flood the network from an arbitrary node, r.

Related Works

Determine a shortest cycle, R, enclosing the composite hole; R serves as a coarse inner boundary

Related Works Flood the network from the cycle R. Each node in the network records its minimum hop count to R.

Related Works Detect “ extremal nodes ” whose hop counts to R are locally maximal

Related Works Refine the coarse inner boundary R to provide tight inner and outer boundaries. These boundaries are in fact cycles of shortest paths connecting adjacent extremal nodes.

Related Works Higher packet control overheard – Collect information form neighboring nodes

Assumption Sensor node has a unique ID Without having location information Communication graph is a unit disk graph.

Distributed Boundary Recognition Algorithm Closure nodes selection Coarse boundary cycles identification Discover exact boundary nodes

CLOSURE NODES SELECTION Distributed Boundary Recognition Algorithm

Closure nodes selection r n

A B D F I E C H Landmark Node (LN) K G J Virtual Hexagonal Landmark (VHL) Construct a Virtual Hexagonal Landmark (VHL) by selecting some specific nodes to be the Landmark Nodes (LNs) within the network.

Closure nodes selection Normal node Landmark node Closure node

COARSE BOUNDARY CYCLES IDENTIFICATION Distributed Boundary Recognition Algorithm

Coarse boundary cycles identification Connect the CNs to form the rough boundaries enclosing the obstacles. These rough boundaries are named as Coarse Boundary Cycles (CBCs) and each of them is assigned a unique ID (i.e. CBC_ID).

Coarse boundary cycles identification Normal node Landmark node Closure node Will check whether its ID is larger than other two adjacent CN’s IDs. The CN broadcasts a CBC_create(CN’s ID, CBC’s ID, CBC_list) packet.

Coarse boundary cycles identification Normal node Landmark node Closure node

Coarse boundary cycles identification ABC DE K JIH GF Landmark node Closure node CBC_1 CBC_2 CBC_create CBC_create_reply

Coarse boundary cycles identification Normal node Landmark node Closure node

DISCOVER EXACT BOUNDARY NODES Distributed Boundary Recognition Algorithm

Discover exact boundary nodes Each CN broadcasts the CN_info packet to inform its adjacent CNs and the node within this broadcasting range A B C

Discover exact boundary nodes Each CN’s ring-shaped area must pass through its two adjacent CNs. Similarly, each CN is also passed through by its two adjacent CNs’ ring-shaped areas. A B C

Discover exact boundary nodes Additionally, some CNs’ ring-shaped areas are cut off by obstacles; the flooding of packets along these ring-shaped areas must be stopped by the boundaries of obstacles. A B C ←Cut-edge

Discover exact boundary nodes A B C maximum hop counts ←Boundary node x

Discover exact boundary nodes The best selected new BN is located on the intersection point of this two virtual limit lines as it is very close to the boundary of the obstacle. C A virtual limit lines

Discover exact boundary nodes C

Each BN to select two BNs on its two-side is that each BN firstly chooses two different adjacent CN on its two-side as reference CNs, separately. The BN x referring to (a) the reference CN A to select node z as the new BN and (b) the reference CN C to select node y as the new BN.

Simulation and Performance Analysis Simulation parametersInitial values implementedNs-2 with the latest version 2.33 Number of nodes3500 Shape of sensing filedSquare Size of sensing field500m × 500m Communication range13m, 15m, 17m, 20m Node degree7, 10, 13, 16 Shape of holesCircle Number of holes1, 2, 3, 4, 5, 6, 7, 8 r value6 n value1

Simulation and Performance Analysis Effect of node degree on percentage of accuracy ratio

Simulation and Performance Analysis Effect of number of holes on control packet overhead

Simulation and Performance Analysis Effect of number of holes on simulation time

Conclusion Proposed a distributed protocol to find the boundary nodes enclosing the holes and the frontier of the network This paper has less control message overhead and simulation time than previous work when number of holes is larger than 6.