Coverage Problems in Wireless Ad-hoc Sensor Networks Seapahn Meguerdichian 1 Farinaz Koushanfar 2 Miodrag Potkonjak 1 Mani Srivastava 2 University of California,

Slides:



Advertisements
Similar presentations
Coverage in Wireless Sensor Network Phani Teja Kuruganti AICIP lab.
Advertisements

1/22 Worst and Best-Case Coverage in Sensor Networks Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, and Mani Srivastava IEEE TRANSACTIONS.
Worst & Best-Case Coverage in Sensors Networks DEC 2004 Presented by: Eugene Khokhlov (847) Seapahn Megerian Ph.D. UCLA.
Lower Bound for Sparse Euclidean Spanners Presented by- Deepak Kumar Gupta(Y6154), Nandan Kumar Dubey(Y6279), Vishal Agrawal(Y6541)
Yang Yang, Miao Jin, Hongyi Wu Presenter: Buri Ban The Center for Advanced Computer Studies (CACS) University of Louisiana at Lafayette 3D Surface Localization.
Comments We consider in this topic a large class of related problems that deal with proximity of points in the plane. We will: 1.Define some proximity.
Approximations of points and polygonal chains
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
4/29/2015 Wireless Sensor Networks COE 499 Deployment of Sensor Networks II Tarek Sheltami KFUPM CCSE COE
Management Science 461 Lecture 2b – Shortest Paths September 16, 2008.
Coverage Algorithms Mani Srivastava & Miodrag Potkonjak, UCLA [Project: Sensorware (RSC)] & Mark Jones, Virginia Tech [Project: Dynamic Sensor Nets (ISI-East)]
Routing in WSNs through analogies with electrostatics December 2005 L. Tzevelekas I. Stavrakakis.
1 Sensor Relocation in Mobile Sensor Networks Guiling Wang, Guohong Cao, Tom La Porta, and Wensheng Zhang Department of Computer Science & Engineering.
Does Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger.
XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
Using Structure Indices for Efficient Approximation of Network Properties Matthew J. Rattigan, Marc Maier, and David Jensen University of Massachusetts.
Worst and Best-Case Coverage in Sensor Networks Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, Mani Srivastava IEEE TRANSACTIONS ON MOBILE.
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Topology Control II.
1 Distributed Navigation Algorithms for Sensor Networks Chiranjeeb Buragohain, Divyakant Agrawal, Subhash Suri Dept. of Computer Science, University of.
Geometric Spanners for Routing in Mobile Networks Jie Gao, Leonidas Guibas, John Hershberger, Li Zhang, An Zhu.
1 Worst and Best-Case Coverage in Sensor Networks Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, Mani Srivastava IEEE TRANSACTIONS ON MOBILE.
SMART: A Scan-based Movement- Assisted Sensor Deployment Method in Wireless Sensor Networks Jie Wu and Shuhui Yang Department of Computer Science and Engineering.
1 Two-step Routing and Apex Angle Routing for Delaunay Triangulations PhD Candidate: Weisheng Si Supervisor: Prof. Albert Y. Zomaya School of Information.
Dynamic Medial Axis Based Motion Planning in Sensor Networks Lan Lin and Hyunyoung Lee Department of Computer Science University of Denver
1 University of Denver Department of Mathematics Department of Computer Science.
Exposure In Wireless Ad-Hoc Sensor Networks S. Megerian, F. Koushanfar, G. Qu, G. Veltri, M. Potkonjak ACM SIG MOBILE 2001 (Mobicom) Journal version: S.
VII-1 Part VII: Foundations of Sensor Network Design Ack: Aman Kansal Copyright © 2005.
Delay Analysis of Large-scale Wireless Sensor Networks Jun Yin, Dominican University, River Forest, IL, USA, Yun Wang, Southern Illinois University Edwardsville,
Sensor network coverage Ref: 1.Seapahn Megerian et al., “Worst and best-case coverage in sensor networks” 2.Chi-Fu Huang and Yu-Chee Tseng, “The coverage.
UNC Chapel Hill M. C. Lin Point Location Chapter 6 of the Textbook –Review –Algorithm Analysis –Dealing with Degeneracies.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
Design Automation Lab. / SNU Sensor Network Design Automation Lab. Jung, Jinyong.
Exposure In Wireless Ad-Hoc Sensor Networks Seapahn Meguerdichian Computer Science Department University of California, Los Angeles Farinaz Koushanfar.
The Coverage Problem in Wireless Ad Hoc Sensor Networks Supervisor: Prof. Sanjay Srivastava By, Rucha Kulkarni
Exposure In Wireless Ad-Hoc Sensor Networks Seapahn Meguerdichian Computer Science Department University of California, Los Angeles Farinaz Koushanfar.
Target Tracking.
Mobility Limited Flip-Based Sensor Networks Deployment Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
Boundary Recognition in Sensor Networks by Topology Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B.
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor Networks Yong-hwan Kim Korea.
Minimum Average Routing Path Clustering Problem in Multi-hop 2-D Underwater Sensor Networks Presented By Donghyun Kim Data Communication and Data Management.
Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF.
On Graphs Supporting Greedy Forwarding for Directional Wireless Networks W. Si, B. Scholz, G. Mao, R. Boreli, et al. University of Western Sydney National.
An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks Seema Bandyopadhyay and Edward J. Coyle Presented by Yu Wang.
Bounded relay hop mobile data gathering in wireless sensor networks
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
Maximizing Lifetime per Unit Cost in Wireless Sensor Networks
Kansas State University Department of Computing and Information Sciences Friday, July 13, 2001 Mantena V. Raju Department of Computing and Information.
Using local geometry for Topology Construction in Wireless Sensor Networks Sameera Poduri Robotic Embedded Systems Lab(RESL)
UNC Chapel Hill M. C. Lin Delaunay Triangulations Reading: Chapter 9 of the Textbook Driving Applications –Height Interpolation –Constrained Triangulation.
Distributed Algorithms for Dynamic Coverage in Sensor Networks Lan Lin and Hyunyoung Lee Department of Computer Science University of Denver.
1. For minimum vertex cover problem in the following graph give
Efficient Point Coverage in Wireless Sensor Networks Jie Wang and Ning Zhong Department of Computer Science University of Massachusetts Journal of Combinatorial.
Optimal Trajectory for Network Establishment of Remote UAVs –1–1 Prachya Panyakeow, Ran Dai, and Mehran Mesbahi American Control Conference June 2013.
1 Power Efficient Monitoring Management in Sensor Networks A.Zelikovsky Georgia State joint work with P. BermanPennstate G. Calinescu Illinois IT C. Shah.
Spanning Trees Dijkstra (Unit 10) SOL: DM.2 Classwork worksheet Homework (day 70) Worksheet Quiz next block.
Honors Track: Competitive Programming & Problem Solving Seminar Topics Kevin Verbeek.
A K-Main Routes Approach to Spatial Network Activity Summarization(SNAS) Group 8.
Coverage In Wireless Ad-Hoc Sensor Networks Shimon Tal Sion Cohen Instructor: Dr. Michael Segal.
Coverage and Deployment 1. Coverage Problems Coverage: is a measure of the Quality of Service (QoS) of a sensor network How well can the network observe.
Vineet Mittal Should more be added here Committee Members:
Dynamic Coverage In Wireless Ed-Hoc Sensor Networks
CS223 Advanced Data Structures and Algorithms
Outline Introduction Network Model and Problem Formulation
Worst & Best-Case Coverage in Sensors Networks DEC 2004
Connectivity and Scheduling in Wireless Sensor Networks
at University of Texas at Dallas
Presentation transcript:

Coverage Problems in Wireless Ad-hoc Sensor Networks Seapahn Meguerdichian 1 Farinaz Koushanfar 2 Miodrag Potkonjak 1 Mani Srivastava 2 University of California, Los Angeles

Coverage Problem Given: Given: Field A Field A N sensors, specified by coordinates N sensors, specified by coordinates Initial and final locations of an agent (I, F) Initial and final locations of an agent (I, F) How well can the field be observed ? n Worst Case Coverage: Find a maximal breach path for an agent moving in A. n Best Case Coverage: Find a maximal support path for an agent moving in A.

Sensor Network Architecture GATEWAY MAIN SERVER CONTROL CENTER

Key Highlight Transform the difficult to represent coverage problems to discrete-domain optimization using computational geometry and graph theory constructs: Voronoi Diagram Voronoi Diagram Delaunay Triangulation Delaunay Triangulation

Outline Sensing models and assumptions Sensing models and assumptions Coverage formulations Coverage formulations Maximal Breach Maximal Breach Maximal Support Maximal Support Future directions Future directions Conclusion Conclusion

Sensing Model We express the general sensing model S at an arbitrary point p for a sensor s as: where d(s,p) is the Euclidean distance between the sensor s and the point p, and positive constants and K are sensor technology dependent parameters

Assumption Sensing effectiveness diminishes as distance increases (monotonic) Sensing effectiveness diminishes as distance increases (monotonic)  Homogeneous sensor nodes  Non-directional sensing technology  Centralized computation model

Coverage Formulation How well can the field be observed ? n Worst Case Coverage: Maximal Breach Path n Best Case Coverage: Maximal Support Path The “paths” are generally not unique. They quantify the best and worst case observability (coverage) in the sensor field.

Maximal Breach Given: Field A instrumented with sensors; areas I and F. Problem: Identify P B, the maximal breach path in S, starting in I and ending in F. P B is defined as a path with the property that for any point p on the path P B, the distance from p to the closest sensor is maximized.

Enabling Step: Voronoi Diagram By construction, each line-segment maximizes distance from the nearest point (sensor). Consequence: Path of Maximal Breach of Surveillance in the sensor field lies on the Voronoi diagram lines.

Graph-Theoretic Formulation Given : Voronoi diagram D with vertex set V and line segment set L and sensors S Construct graph G(N,E): Each vertex v i  V corresponds to a node n i  N Each line segment l i  L corresponds to an edge e i  E Each edge e i  E, Weight(e i ) = Distance of l i from closest sensor s k  S Formulation : Is there a path from I to F which uses no edge of weight less than K?

Finding Maximal Breach Path Algorithm 1. 1.Generate Voronoi Diagram 2. 2.Apply Graph-Theoretic Abstraction 3. 3.Search for P B Check existence of path I --> F using BFS Search for path with maximal, minimum edge weights This is a Maximal Breach Path

Bounded Voronoi Diagram

Maximal Support Given : Delaunay Triangulation of the sensor nodes Construct graph G(N,E): The graph is dual to the Voronoi graph previously described Formulation : what is the path from which the agent can best be observed while moving from I to F? (The path is embedded in the Delaunay graph of the sensors) Solution: Similar to the max breach algorithm, use BFS and Binary Search to find the shortest path on the Delaunay graph.

Maximal Breach Path Example (50 nodes)

Maximal Breach Path Example (200 nodes)

Future Directions Distributed Schemes Distributed Schemes Path planning Path planning Multi-sensor deployment optimization Multi-sensor deployment optimization Average-case coverage calculations Average-case coverage calculations Exposure Exposure

Conclusions Best and Worst case coverage formulations Best and Worst case coverage formulations Efficient optimal algorithms using computational geometry and graph theory Efficient optimal algorithms using computational geometry and graph theory Maximal Breach Path (worst-case coverage) Maximal Breach Path (worst-case coverage) Maximal Support Path (best-case coverage) Maximal Support Path (best-case coverage) Applications in: Applications in: Deployment Deployment Asymptotic analysis Asymptotic analysis