Advertisement

Computing

, Volume 101, Issue 4, pp 363–385 | Cite as

Area coverage of heterogeneous wireless sensor networks in support of Internet of Things demands

  • Saeed Sedighian KashiEmail author
Article
  • 145 Downloads

Abstract

As the Internet of Things (IoT) evolves, more and more Wireless Sensor Networks (WSNs) are being deployed in the real world. Connected vehicles, smart grids, smart cities, smart healthcare, networks of robots, and disaster recovery networks are some examples. In WSNs, the area coverage is one of the most important quality of service metrics. A WSN without enough area coverage yields incorrect results. So calculating the covered area of a WSN is mandatory. Previous studies have used a simple approach: all nodes send their location to the sink, and it calculates the covered area centrally which makes huge unnecessary communication overhead. In our previous work titled Distributed Exact Coverage Rate Calculation, we calculated the covered area of a homogenous WSN in a distributed manner. In this paper, we provide a Heterogeneous Distributed Precise Coverage Rate (HDPCR) mechanism that calculates the covered area of a Heterogeneous Wireless Sensor Network by using a localized mechanism. With the use of boundary detection mechanisms, the HDPCR detects the boundary of the network and calculates its area. HDPCR also detects holes and calculates their area precisely. By subtracting these two calculated values, the covered area of the network can be computed. Many related studies have evaluated the coverage rate approximately with error and require more calculations to reduce the error rate. HDPCR calculates the coverage rate precisely without an error rate using simple arithmetic calculations. The exhaustive simulation also shows the superiority of HDPCR as compared to the previous approaches.

Keywords

Internet of Things Heterogeneous wireless sensor networks Area coverage 

Mathematics Subject Classification

68U05 

References

  1. 1.
    Georgakopoulos D, Jayaraman PP (2016) Internet of things: from internet scale sensing to smart services. Computing 98(10):1041–1058MathSciNetCrossRefGoogle Scholar
  2. 2.
    Whitmore A, Agarwal A, Da Xu L (2015) The Internet of Things—a survey of topics and trends. Inf Syst Front 17(2):261–274CrossRefGoogle Scholar
  3. 3.
    Mainetti L, Patrono L, Vilei A (2011) Evolution of wireless sensor networks towards the Internet of Things: a survey. In: IEEE international conference on software, telecommunications and computer networks (SoftCOM), pp 1–6Google Scholar
  4. 4.
    Minh QT, Shibata Y, Borcea C, Yamada S (2014) On-site configuration of disaster recovery access networks made easy. Ad Hoc Netw 40(C):46–60Google Scholar
  5. 5.
    Di Felice M et al (2013) STEM-mesh: self-organizing mobile cognitive radio network for disaster recovery operations. In: International wireless communications and mobile computing conference (IWCMC), pp 602–608Google Scholar
  6. 6.
    Saha S, Nandi S, Paul PS, Shah VK, Roy A, Das SK (2015) Designing delay constrained hybrid ad hoc network infrastructure for post-disaster communication. Ad Hoc Netw 25(PB):406–429CrossRefGoogle Scholar
  7. 7.
    Minh Q, Nguyen K, Borcea C, Yamada S (2014) On-the-fly establishment of multihop wireless access networks for disaster recovery. IEEE Commun Mag 52(10):60–66CrossRefGoogle Scholar
  8. 8.
    Atzori L, Lera A, Morabito G (2010) Internet of Things: a survey. Comput Netw. 54(15):2787–2805CrossRefzbMATHGoogle Scholar
  9. 9.
    Borgia E (2014) The internet of things vision: key features, applications and open issues. Comput Commun 54:1–31CrossRefGoogle Scholar
  10. 10.
    Konstantopoulos C, Pantziou G, Gavalas D, Mpitziopoulos A, Mamalis B (2012) A rendezvous-based approach enabling energy-efficient sensory data collection with mobile sinks. IEEE Trans Parallel Distrib Syst 23(5):809–817CrossRefGoogle Scholar
  11. 11.
    Guo B, Zhang D, Yu Z, Liang Y, Wang Z, Zhou X (2013) From the internet of things to embedded intelligence. World Wide Web 16(4):399–420CrossRefGoogle Scholar
  12. 12.
    Mahmoud MS, Mohamad AAH (2016) A study of efficient power consumption wireless communication techniques/modules for Internet of Things (IoT) applications. Adv Internet Things 6(2):19–29CrossRefGoogle Scholar
  13. 13.
    Zhang C, Zhang Y, Fang Y (2007) Localized algorithms for coverage boundary detection in wireless sensor networks. Wirel Netw 15(1):3–20CrossRefGoogle Scholar
  14. 14.
    Xingfa S, Jiming C, Youxian S (2006) Grid scan: a simple and effective approach for coverage issue in wireless sensor networks. In: IEEE international conference on communications, vol 8, pp 3480–3484Google Scholar
  15. 15.
    Sheu J-P, Chang G-Y, Chen Y-T (2008) A novel approach for k-coverage rate evaluation and re-deployment in wireless sensor networks. In: IEEE global telecommunications conference (GLOBECOM), pp 1–5Google Scholar
  16. 16.
    Sharma V, Patel RB, Bhadauria HS, Prasad D (2016) Deployment schemes in wireless sensor network to achieve blanket coverage in large-scale open area: a review. Egypt Inform J 17:45–56CrossRefGoogle Scholar
  17. 17.
    Balister B, Zheng Z, Kumar S, Sinha P (2009) Trap coverage: allowing coverage holes of bounded diameter in wireless sensor networks. In: IEEE international conference on computer communications (INFOCOM), pp 136–144Google Scholar
  18. 18.
    Pashazadeh S, Sharifi M (2009) Determining the best sensing coverage for 2-dimensional acoustic target tracking. Sensors 9(5):3405–3436CrossRefGoogle Scholar
  19. 19.
    Watfa MK, Commuri S (2009) Energy-efficient approaches to coverage holes detection in wireless sensor networks. In: IEEE international conference on computer aided control system design, pp 131–136Google Scholar
  20. 20.
    Frey H, Görgen D (2005) Planar graph routing on geographical clusters. Ad Hoc Netw 3(5):560–574CrossRefGoogle Scholar
  21. 21.
    Argany M, Mostafavi MA, Karimipour F (2010) Voronoi-based approaches for geosensor networks coverage determination and optimisation: a survey. In: International symposium on Voronoi diagrams in science and engineering (ISVD), pp 115–123Google Scholar
  22. 22.
    Nayak A, Stojmenović I (2009) Wireless sensor and actuator networks: algorithms and protocols for scalable coordination and data communication. Wiley, New YorkzbMATHGoogle Scholar
  23. 23.
    Liu B, Towsley D (2004) A study of the coverage of large-scale sensor networks. In: IEEE international conference on mobile adhoc and sensor systems, pp 475–483Google Scholar
  24. 24.
    Chen J, Li S, Sun Y (2007) Novel deployment schemes for mobile sensor networks. Sensors 7(11):2907–2919CrossRefGoogle Scholar
  25. 25.
    Aziz NAA, Aziz KA, Ismail WZW (2009) Coverage strategies for wireless sensor networks. World Acad Sci Eng Technol 3(2):145–150Google Scholar
  26. 26.
    Sedighian Kashi S, Sharifi M (2012) Coverage rate calculation in wireless sensor networks. Computing 94(11):833–856MathSciNetCrossRefGoogle Scholar
  27. 27.
    Lazos L, Poovendran R, Ritcey JA (2007) On the deployment of heterogeneous sensor networks for detection of mobile targets. In: International symposium on modeling and optimization in mobile, ad hoc, and wireless networks (WiOpt)Google Scholar
  28. 28.
    Killijian M, Cunningham R, Meier R, Mazare L, Cahill V (2001) Towards group communication for mobile participants. In: ACM workshop on principles of mobile computing (POMC)Google Scholar
  29. 29.
    Shen F, Te Sun M, Liu C, Salazar A (2009) Coverage-aware sleep scheduling for cluster-based sensor networks. In: IEEE wireless communications and networking conference (WCNC), pp 1–6Google Scholar
  30. 30.
    Dhillon SS, Chakrabarty K (2003) Sensor placement for effective coverage and surveillance in distributed sensor networks. In: IEEE wireless communications and networking conference (WCNC), vol 3, pp 1609–1614Google Scholar
  31. 31.
    Chakrabarty K, Iyengar SS, Qi H, Cho E (2002) Grid coverage for surveillance and target location in distributed sensor networks. IEEE Trans Comput 51(12):1448–1453MathSciNetCrossRefzbMATHGoogle Scholar
  32. 32.
    Zou Y, Chakrabarty K (2003) Sensor deployment and target localization based on virtual forces. In: IEEE international conference on computer communications (INFOCOM), vol 2, no C, pp 1293–1303Google Scholar
  33. 33.
    Lambrou TP, Panayiotou CG (2009) Collaborative area monitoring using wireless sensor networks with stationary and mobile nodes. EURASIP J Adv Signal Process 2009:750657CrossRefGoogle Scholar
  34. 34.
    Ismail WZW, Abd Manaf S (2010) Study on coverage in wireless sensor network using grid based strategy and particle swarm optimization. In: IEEE Asia Pacific conference on circuit and system, pp 1175–1178Google Scholar
  35. 35.
    Akshay N, Kumar MP, Harish B, Dhanorkar S (2010) An efficient approach for sensor deployments in wireless sensor network. In: International conference on emerging trends in robotics and communication technologies (INTERACT), pp 350–355Google Scholar
  36. 36.
    Deif DS, Gadallah Y (2014) Classification of wireless sensor networks deployment techniques. IEEE Commun Surv Tutor 16(2):834–855CrossRefGoogle Scholar
  37. 37.
    Sheu J, Chang G, Wu S, Chen Y (2013) Adaptive k-coverage contour evaluation and deployment in wireless sensor networks. ACM Trans Sens Netw 9(4):40CrossRefGoogle Scholar
  38. 38.
    Saha D, Das N, Pal S (2014) A digital-geometric approach for computing area coverage in wireless sensor networks. In: International conference on distributed computing and internet technology, pp 134–145Google Scholar
  39. 39.
    Saha D, Das N, Bhattacharya B (2014) Fast estimation of coverage area in a pervasive computing environment. In: International conference on advanced computing, networking and informatics, vol 2, pp 19–27Google Scholar
  40. 40.
    Ghosh A (2004) Estimating coverage holes and enhancing coverage in mixed sensor networks. In: IEEE international conference on local computer networks, pp 68–76Google Scholar
  41. 41.
    Wang G, Cao G, Berman P, La Porta TF (2007) Bidding protocols for deploying mobile sensors. IEEE Trans Mob Comput 6(5):515–528CrossRefGoogle Scholar
  42. 42.
    Wang B (2010) Coverage control in sensor networks. Springer, BerlinCrossRefzbMATHGoogle Scholar
  43. 43.
    Alsalih W, Islam K, Núñez-Rodríguez Y, Xiao H (2008) Distributed Voronoi diagram computation in wireless sensor networks. In: Annual symposium on parallelism in algorithms and architectures (SPAA), no 1, p 364Google Scholar
  44. 44.
    Boukerche A, Xin F (2007) A Voronoi approach for coverage protocols in wireless sensor networks. In: IEEE global telecommunications conference (GLOBECOM), pp 5190–5194Google Scholar
  45. 45.
    Li J-S, Kao H-C (2010) Distributed k-coverage self-location estimation scheme based on Voronoi diagram. IET Commun 4(2):167MathSciNetCrossRefzbMATHGoogle Scholar
  46. 46.
    Cai Y, Li M, Shu W, Wu M (2007) ACOS: an area-based collaborative sleeping protocol for wireless sensor networks. Ad Hoc Sens Wirel Netw 3(1):77–97Google Scholar
  47. 47.
    Huang C, Tseng Y (2005) The coverage problem in a wireless sensor network. Mob Netw Appl 10(4):519–528CrossRefGoogle Scholar
  48. 48.
    Zhang H, Hou JC (2005) Maintaining sensing coverage and connectivity in large sensor networks. Ad Hoc Sens Wirel Netw 1:89–124Google Scholar
  49. 49.
    Khan I, Mokhtar H, Merabti M (2008) A survey of boundary detection algorithms for sensor networks. In: Annual postgraduate symposium on the convergence of telecommunications, networking and broadcastingGoogle Scholar
  50. 50.
    Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393–422CrossRefGoogle Scholar
  51. 51.
    Karp B, Kung H (2000) GPSR: Greedy perimeter stateless routing for wireless networks. In: International conference on mobile computing and networking, pp 243–254Google Scholar
  52. 52.
    Braden B (1986) The surveyor’s area formula. Coll Math J 17(4):326CrossRefGoogle Scholar
  53. 53.
    Mohamed S, Hamza H, Saroit I (2015) Harmony search-based k-coverage enhancement in wireless sensor networks. Harmony 1:19924Google Scholar

Copyright information

© Springer-Verlag GmbH Austria, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Computer EngineeringK. N. Toosi University of TechnologyTehranIran

Personalised recommendations