Coverage Problems in Wireless Adhoc Sensor Networks - PowerPoint PPT Presentation

1 / 23
About This Presentation
Title:

Coverage Problems in Wireless Adhoc Sensor Networks

Description:

1 Computer Science Department. 2 Electrical Engineering Department. Coverage Problem ... GATEWAY. MAIN SERVER. CONTROL. CENTER. Key Highlight ... – PowerPoint PPT presentation

Number of Views:34
Avg rating:3.0/5.0
Slides: 24
Provided by: mani84
Category:

less

Transcript and Presenter's Notes

Title: Coverage Problems in Wireless Adhoc Sensor Networks


1
Coverage Problems in Wireless Ad-hoc Sensor
Networks
  • Seapahn Meguerdichian1 Farinaz Koushanfar2
    Miodrag Potkonjak1 Mani Srivastava2

University of California, Los Angeles 1 Computer
Science Department 2 Electrical Engineering
Department
2
Coverage Problem
  • Given
  • Field A
  • N sensors, specified by coordinates
  • Initial and final locations of an agent (I , F)
  • How well can the field be observed ?
  • Worst Case Coverage
  • Find a maximal breach path for an agent moving
    in A.
  • Best Case Coverage
  • Find a maximal support path for an agent moving
    in A.

3
Sensor Network Architecture
4
Key Highlight
  • Transform the difficult to represent coverage
    problems to discrete-domain optimization using
    computational geometry and graph theory
    constructs
  • Voronoi Diagram
  • Delaunay Triangulation

5
Outline
  • Sensing models and assumptions
  • Coverage formulations
  • Maximal Breach
  • Maximal Support
  • Interesting results
  • Strengths and weaknesses
  • Future directions
  • Conclusion

6
Sensing Model
We express the general sensing model S at an
arbitrary point p for a sensor s as
where d(s,p) is the Euclidean distance between
the sensor s and the point p, and positive
constants ? and K are sensor technology dependent
parameters
7
Assumption
  • Sensing effectiveness diminishes as distance
    increases (monotonic)
  • Homogeneous sensor nodes
  • Non-directional sensing technology
  • Centralized computation model

8
Coverage Formulation
  • How well can the field be observed ?
  • Worst Case Coverage Maximal Breach Path
  • Best Case Coverage Maximal Support Path
  • The paths are generally not unique. They
    quantify the best and worst case observability
    (coverage) in the sensor field.

9
Maximal Breach
  • Given Field A instrumented with sensors areas I
    and F.
  • Problem Identify PB, the maximal breach path in
    S, starting in I and ending in F.
  • PB is defined as a path with the property that
    for any point p on the path PB, the distance from
    p to the closest sensor is maximized.

10
Enabling Step Voronoi Diagram
By construction, each line-segment maximizes
distance from the nearest point
(sensor). Consequence Path of Maximal Breach of
Surveillance in the sensor field lies on the
Voronoi diagram lines.
11
Graph-Theoretic Formulation
  • Given Voronoi diagram D with vertex set V and
    line segment set L and sensors S
  • Construct graph G(N,E)
  • Each vertex vi?V corresponds to a node ni ?N
  • Each line segment li ?L corresponds to an edge ei
    ?E
  • Each edge ei?E, Weight(ei) Distance of li from
    closest sensor sk ?S
  • Formulation Is there a path from I to F which
    uses no edge of weight less than K?

12
Finding Maximal Breach Path
  • Algorithm
  • Generate Voronoi Diagram
  • Apply Graph-Theoretic Abstraction
  • Search for PB
  • Check existence of path I --gt F using BFS
  • Search for path with maximal, minimum edge
    weights
  • This is a Maximal Breach Path

13
Bounded Voronoi Diagram
14
Maximal Support
  • Given Delaunay Triangulation
  • of the sensor nodes
  • Construct graph G(N,E)
  • The graph is dual to the Voronoi graph previously
    described
  • Formulation what is the path from which the
    agent can best be observed while moving from I to
    F? (The path is embedded in the Delaunay graph of
    the sensors)
  • Solution Similar to the max breach algorithm,
    use BFS and Binary Search to find the shortest
    path on the Delaunay graph.

15
Critical Regions
16
Maximal Breach Path Example (50 nodes)
17
Maximal Breach Path Example (200 nodes)
18
Maximal Breach Sensor Deployment
19
Maximal Support Sensor Deployment
20
Asymptotic Behavior
21
Localized Behavior
Using incremental techniques, we can handle
changes in node locations by locally adjusting
the diagram, rather than relying on global
re-calculations
22
Future Directions
  • Distributed Schemes
  • Path planning
  • Multi-sensor deployment optimization
  • Average-case coverage calculations
  • Exposure

23
Conclusions
  • Best and Worst case coverage formulations
  • Efficient optimal algorithms using computational
    geometry and graph theory
  • Maximal Breach Path (worst-case coverage)
  • Maximal Support Path (best-case coverage)
  • Applications in
  • Deployment
  • Asymptotic analysis
Write a Comment
User Comments (0)
About PowerShow.com