Wireless Networks

, Volume 19, Issue 5, pp 945–968 | Cite as

Deployment of a mobile wireless sensor network with k-coverage constraint: a cellular learning automata approach

Article

Abstract

Deployment of a wireless sensor network is a challenging problem, especially when the environment of the network does not allow either of the random deployment or the exact placement of sensor nodes. If sensor nodes are mobile, then one approach to overcome this problem is to first deploy sensor nodes randomly in some initial region within the area of the network, and then let the sensor nodes to move around and cooperatively and gradually increase the covered section of the area. Recently, a cellular learning automata-based deployment strategy, called CLA-DS, is introduced in literature which follows this approach and is robust against inaccuracies which may occur in the measurements of sensor positions or in the movements of sensor nodes. Despite its advantages, this deployment strategy covers every point within the area of the network with only one sensor node, which is not enough for applications with k-coverage requirement. In this paper, we extend CLA-DS so that it can address the k-coverage requirement. This extension, referred to as CLA-EDS, is also able to address k-coverage requirement with different values of k in different regions of the network area. Experimental results have shown that the proposed deployment strategy, in addition to the advantages it inherits from CLA-DS, outperforms existing algorithms such as DSSA, IDCA, and DSLE in covering the network area, especially when required degree of coverage differs in different regions of the network.

Keywords

Mobile sensor network Cellular learning automata Self-regulated deployment k-Coverage 

References

  1. 1.
    Ilyas, M., & Mahgoub, I. (2005). Handbook of sensor networks: Compact wireless and wired sensing systems. London, Washington, DC: CRC Press.Google Scholar
  2. 2.
    Dhillon, S. S., Chakrabarty, K., & Iyengar, S. S. (2002). Sensor placement for grid coverage under imprecise detections. International conference on information fusion (FUSION) 2002, Annapolis, 2002, pp. 1581–1587.Google Scholar
  3. 3.
    Tilak, S., Abu-Ghazaleh, N. B., & Heinzelman, W. (2002, September). Infrastructure trade-offs for sensor networks. ACM WSNA’02, pp. 49–58.Google Scholar
  4. 4.
    Musman, S., Lehner, P. E., & Elsaesser, C. (1997). Sensor planning for elusive targets. Journal of Computer Mathematical Modeling, 25(3), 103–115.MATHCrossRefGoogle Scholar
  5. 5.
    Salhieh, A., Weinmann, J., Kochhal, M., & Schwiebert, L. (2001). Power efficient topologies for wireless sensor network (pp. 156–163). Spain: International Conference on Parallel Processing.Google Scholar
  6. 6.
    Schwiebert, L., Gupta, S. K. S., & Weinamann, J. (2001, July). Research challenges in wireless networks of biomedical sensors. ACM SIGMOBILE 2001, Rome, pp. 151–165.Google Scholar
  7. 7.
    Petriu, E. M., Georganas, N. D., Petriu, D., Makrakis, D., & Groza, V. Z. (2000, December). Sensor-based information appliances. IEEE Instrumentation Measurement Magazine, pp. 31–35.Google Scholar
  8. 8.
    Chakrabarty, K., Iyengar, S. S., Qi, H., & Cho, E. (2002). Grid coverage for surveillance and target location in distributed sensor networks. IEEE Transactions on Computers, 51, 1448–1453.MathSciNetCrossRefGoogle Scholar
  9. 9.
    Heinzelman, W., Chandrakasan, A., & Balakrishnan, H. (2000, January). Energy-efficient communication protocol for wireless microsensor networks. HICSS 2000, Maui, pp. 8020–8029.Google Scholar
  10. 10.
    Heinzelman, W. (2000, June). Application-specific protocol architecture for wireless networks. Ph.D. dissertation, Massachusetts Institute of Technology.Google Scholar
  11. 11.
    Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications, 1(4), 660–670.CrossRefGoogle Scholar
  12. 12.
    Lindsey, S., & Raghavendra, C. S. (2002, March). PEGASIS: Power-efficient gathering in sensor information systems. IEEE aerospace conference, pp. 1125–1130.Google Scholar
  13. 13.
    Lindsey, S., Raghavendra, C., & Sivalingam, K. M. (2002). Data gathering algorithms in sensor networks using energy metrics. IEEE Transactions on Parallel Distributed Systems, 13(9), 924–935.CrossRefGoogle Scholar
  14. 14.
    Willig, A., Shah, R., Rabaey, J., & Wolisz, A. (2002, August) Altruists in the PicoRadio sensor network. 4th IEEE International Workshop on Factory Communications Systems, Sweden, pp. 175–184.Google Scholar
  15. 15.
    Howard, A., Mataric, M. J., & Sukhatme, G. S. (2002, June), Mobile sensor network deployment using potential fields: A distributed scalable solution to the area coverage problem. International symposium on distributed autonomous robotics systems, Fukuoka, Japan, pp. 299–308.Google Scholar
  16. 16.
    Zou, Y., & Chakrabarty, K. (2003). Sensor deployment and target localization based on virtual forces. In Proceedings of IEEE infocom conference, pp. 1293–1303.Google Scholar
  17. 17.
    Poduri, S., & Sukhatme, G. (2004). Constrained coverage for mobile sensor networks. In Proceedings of IEEE international conference on robotics and automation (ICRA’04).Google Scholar
  18. 18.
    Zou, Y., & Chakrabarty, K. (2004, February). Sensor deployment and target localization in distributed sensor networks. ACM Transactions on Embedded Computing Systems, Special Issue on Networked Embedded Computing: Tools, Architectures and Applications, 3(1), 61–91.Google Scholar
  19. 19.
    Heo, N., & Varshney, P. K. (2005). Energy-efficient deployment of intelligent mobile sensor networks. IEEE Transactions on Systems, Man, and Cybernetics (Part A), 35(1), 78–92.Google Scholar
  20. 20.
    Wang, G., Cao, G. & La Porta, T. (2006, June). Movement-assisted sensor deployment. IEEE Transactions on Mobile Computing, 5(6), 640–652.Google Scholar
  21. 21.
    Wang, P. C., Hou, T. W., & Yan, R. H. (2006). Maintaining coverage by progressive crystallattice permutation in mobile wireless sensor networks. IEEE international conference on systems and networks communication (ICSNC), pp. 1–6.Google Scholar
  22. 22.
    Chellappan, S., Bai, X., Ma, B., Xuan, D., & Xu, C. (2007). Mobility limited flip-based sensor networks deployment. IEEE Transactions on Parallel and Distributed Systems, 18(2), 199–211.Google Scholar
  23. 23.
    Chellappan, S., Gu, W., Bai, X., Xuan, D., Ma, B., & Zhang, K. (2007). Deploying wireless sensor networks under limited mobility constraints. IEEE Transactions on Mobile Computing, 6(10), 1142–1157.CrossRefGoogle Scholar
  24. 24.
    Jiang, Z., Wu, J., Kline, R., & Krantz, J. (2008). Mobility control for complete coverage in wireless sensor networks. In Proceedings of the 28th international conference on distributed computing systems workshops (ICDCS), pp. 291–296.Google Scholar
  25. 25.
    Wang, G., Cao, G., Porta, T. L., & Zhang, W. (2005). Sensor relocation in mobile sensor networks. IEEE INFOCOM, pp. 2302–2312.Google Scholar
  26. 26.
    Yang, S., Li, M., & Wu, J. (2007). Scan-based movement-assisted sensor deployment methods in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 18(8), 1108–1121.Google Scholar
  27. 27.
    Wu, J., & Yang, S. (2007). Optimal movement-assisted sensor deployment and its extensions in wireless sensor networks. Simulation Modeling Practice and Theory, 15(4), 383–399.CrossRefGoogle Scholar
  28. 28.
    Yang, S., Wu, J., & Dai, F. (2006). Localized movement-assisted sensor deployment in wireless sensor networks. IEEE workshops in the international conference on mobile adhoc and sensor systems (MASS), pp. 753–758.Google Scholar
  29. 29.
    Esnaashari, M., & Meybodi, M. R. (2011). A cellular learning automata-based deployment strategy for mobile wireless sensor networks. Journal of Parallel and Distributed Computing, 71(7), 988–1001.Google Scholar
  30. 30.
    Arora, A., Dutta, P., Bapat, S., Kulathumani, V., Zhang, H., Naik, V., et al. (2004, December). A line in the sand: A wireless sensor network for target detection, classification, and tracking. Computer Networks, 46(5), 605–634.Google Scholar
  31. 31.
    Mehta, D., Lopez, M., & Lin, L. (2003, May). Optimal coverage paths in ad hoc sensor networks. IEEE international conference on communications, pp. 507–511.Google Scholar
  32. 32.
    Kumar, S., Lai, T. H., & Balogh, J. (2004). On k-Coverage in a Mostly Sleeping Sensor Network (pp. 144–158). Philadelphia, Pennsylvania, USA: 10th Annual International Conference on Mobile Computing and Networking.Google Scholar
  33. 33.
    Zhao, Z., & Govindan, R. (2003, November). Understanding packet delivery performance in dense wireless sensor networks. In 3th ACM conference on embedded networked sensor systems, Los Angeles, CA, pp. 1–13.Google Scholar
  34. 34.
    Hall, D., & Llinas, J. (2001). Handbook of multisensor data fusion. New York: CRC Press.Google Scholar
  35. 35.
    Wang, B., Lim, H. B., & Ma, D. (2009). A survey of movements strategies for improving network coverage in wireless sensor networks. Computer Communications, 32, 1427–1436.CrossRefGoogle Scholar
  36. 36.
    Wang, Y. C., Hu, C. C., & Tseng, Y. C. (2008). Efficient placement and dispatch of sensors in a wireless sensor network. IEEE Transactions on Mobile Computing, 7(2), 262–274.CrossRefGoogle Scholar
  37. 37.
    Wang, Y. C., & Tseng, Y. C. (2008, September). Distributed deployment schemes for mobile wireless sensor networks to ensure multi-level coverage. IEEE Transactions on Parallel and Distributed Systems, 19(9), 1280–1294.Google Scholar
  38. 38.
    Katsuma, R., Murata, Y., Shibata, N., Yasumoto, K., & Ito, M. (2010, April). Extending k-coverage lifetime of wireless sensor networks with surplus nodes. In Proceedings of the 5th international conference on mobile computing and ubiquitous networking (ICMU2010), pp. 9–16.Google Scholar
  39. 39.
    Mo, W., Qiao, D., & Wang, Z. (2006). Lifetime maximization of sensor networks under connectivity and k-coverage constraints. Lecture Notes in Computer Science, 4026, 422–442. Berlin/Heidelberg: Springer.Google Scholar
  40. 40.
    Mo, W., Qiao, D., & Wang, Z. (2005, September). Mostly-sleeping wireless sensor networks: connectivity, k-coverage, and α-lifetime. Allerton Conference, UIUC.Google Scholar
  41. 41.
    Kalayci, T. E., Yildirim, K. S., & Ugur, A. (2007, October). Maximizing coverage in a connected and k-covered wireless sensor network using genetic algorithms. International Journal of Applied Mathematics and Informatics, 1(3), 123–130.Google Scholar
  42. 42.
    Abeyweera, I. S. (2007, February). A coverage control mechanism satisfying application requirements in a wireless sensor network. Master’s Thesis, Department of Information Networking, Osaka University.Google Scholar
  43. 43.
    Ye, M., Chan, E., Chen, G., & Wu, J. (2006, July). Energy efficient fractional coverage schemes for low cost wireless sensor networks. In 26th IEEE International Conference on Distributed Computing Systems Workshop, pp. 74–79.Google Scholar
  44. 44.
    Slijepcevic, S., & Potkonjak, M. (2001, June). Power efficient organization of wireless sensor networks. In IEEE international conference on communications, pp. 472–476.Google Scholar
  45. 45.
    Makhoul, A., Saadi, R., & Pham, C. (2009, October). Coverage and adaptive scheduling algorithms for criticality management on video wireless sensor networks. In International conference on ultra modern telecommunications & workshops, pp. 1–8.Google Scholar
  46. 46.
    Gao, S., Vu, C. T., Li, Y. (2006). Sensor scheduling for k-coverage in wireless sensor networks. Lecture Notes in Computer Science, 4325, 268–280. Berlin/Heidelberg: Springer.Google Scholar
  47. 47.
    Huang, C. F., & Tseng, Y. C. (2005). The coverage problem in a wireless sensor network. Mobile Networks and Applications, 10(4), 519–528.MathSciNetCrossRefGoogle Scholar
  48. 48.
    Liu, Y., Pu, J., Zhang, S., Liu, Y., & Xiong, Z. (2009). A localized coverage preserving protocol for wireless sensor networks. Sensors, 9, 281–302.CrossRefGoogle Scholar
  49. 49.
    Simon, G., Molnar, M., Gonczy, L., & Cousin, B. (2007). Dependable k-Coverage Algorithms for Sensor Networks (pp. 1–6). Warsaw, Poland: Instrumentation and Measurement Technology Conference.Google Scholar
  50. 50.
    Pocquet, A., Cousin, B., Molnar, M., & Parraud, P. (2008, August). Performance analysis of CGS, a k-coverage algorithm based on one-hop neighboring knowledge. In 2nd international conference on sensor technologies and applications, pp. 115–122.Google Scholar
  51. 51.
    Zhou, Z., Das, S., & Gupta, H. (2004, October). Connected k-coverage problem in sensor networks. In 13th international conference on computer communications and networks, Chicago, IL, pp. 373–378.Google Scholar
  52. 52.
    Kasbekar, G. S., Bejerano, Y., & Sarkar, S. (2009, September). Lifetime and coverage guarantees through distributed coordinate-free sensor activation. In 15th annual international conference on mobile computing and networking. Beijing, China, pp. 169–180.Google Scholar
  53. 53.
    Zhang, H., & Hou, J. C. (2005, Marach). Maintaining sensing coverage and connectivity in large sensor networks. Ad Hoc & Sensor Wireless Networks, 1, 89–124.Google Scholar
  54. 54.
    Huang, C. F., Lo, L. C., & Tseng, Y. C. (2006, May). Decentralized energy-conserving and coverage-preserving protocols for wireless sensor networks. ACM Transactions on Sensor Networks, 2(2), 182–187.Google Scholar
  55. 55.
    Fusco, G., & Gupta, H. (2009, June) Selection and orientation of directional sensors for coverage maximization. In 6th Annual IEEE communications society conference on sensor, Mesh, and ad hoc communications and networks. Rome, pp. 1–9.Google Scholar
  56. 56.
    Bagheri, M. (2007). Efficient k-coverage algorithms for wireless sensor networks and their applications to early detection of forest fires. PhD thesis, Simon Fraser University.Google Scholar
  57. 57.
    Hefeeda, M., & Bagheri, M. (2007, May). Randomized k-coverage algorithms for dense sensor networks. IEEE INFOCOM 2007, Anchorage, AK, pp. 2376–2380.Google Scholar
  58. 58.
    Fusco, G., & Gupta, H. (2009). ε-Net approach to sensor k-coverage, In 4th International conference on wireless algorithms, systems, and applications, pp. 104–114.Google Scholar
  59. 59.
    Ammari, H. M., & Das, S. K. (2008, June). Joint k-coverage and hybrid forwarding in duty-cycled three-dimensional wireless sensor networks. In 5th annual IEEE communications society conference on sensor, mesh, and ad hoc communications and networks. San Francisco, CA, pp. 170–178.Google Scholar
  60. 60.
    Ammari, H. M. (2008, May). Energy efficient connected k-coverage, duty-cycling, and geographic forwarding in wireless sensor networks. In PhD thesis, University of Texas at Arlington.Google Scholar
  61. 61.
    Noy, A. B., Brown, T., Johnson, M. P., Porta, T. L., Sarioz, D., Verma, D., et al. (2007, October). Robust and efficient coverage in dense sensor deployment. ITA technical paper.Google Scholar
  62. 62.
    Yu, H., Iyer, J., Kim, H., Kim, E. J., Yum, K. H., & Mah, P. S. (2006). Assuring k-coverage in the presence of mobility in wireless sensor networks. San Francisco, CA: IEEE GLOBECOM.Google Scholar
  63. 63.
    Leibnitz, K., Abeyweera, I. S., Wakamiya, N., & Murata, M. (2008). A heuristic approach for k-coverage extension with energy-efficient sleep scheduling in sensor networks. In 3rd international conference on bio-inspired models of network, information, and computing systems.Google Scholar
  64. 64.
    Tang, S., Mao, X., & Li, X. Y. (2009, March). Optimal k-support coverage paths in wireless sensor networks. In IEEE international conference on pervasive computing and communications. Galveston, TX, pp. 1–6.Google Scholar
  65. 65.
    Kumar, S. (2006). Foundations of coverage in wireless sensor networks. PhD thesis, Ohio State University.Google Scholar
  66. 66.
    Ssu, K. F., Wang, W. T., Wu, F. K., & Wu, T. T. (2009, March). k-barrier coverage with a directional sensing model. International Journal on Smart Sensing and Intelligent Systems, 2(1), 75–93.Google Scholar
  67. 67.
    Wang, J. (2008, November). Communication protocols and sensing coverage in mobile ad hoc and wireless sensor networks. PhD thesis. Washington State University.Google Scholar
  68. 68.
    Zaidi, S. A. R., Hafeez, M., McLernon, D. C., & Ghogho, M. (2008). A probabilistic model of k-coverage in minimum cost wireless sensor networks. Madrid, Spain: ACM CoNEXT Conference.Google Scholar
  69. 69.
    Wang, Y., Wang, X., Agrawal, D. P., & Minai, A. A. (2006). Impact of heterogeneity on coverage and broadcast reachability in wireless sensor networks (pp. 63–67). Arlington, VA: 15th International Conference on Computer Communications and Networks.Google Scholar
  70. 70.
    Yen, L. H., Yu, C. W., & Cheng, Y. M. (2006). Expected k-coverage in wireless sensor networks. Ad Hoc Networks, 4, 636–650.CrossRefGoogle Scholar
  71. 71.
    Wan, P. J., & Yi, C. W. (2006, June). Coverage by randomly deployed wireless sensor networks. IEEE Transactions on Information Theory, 52(6), 2658–2669.Google Scholar
  72. 72.
    Lazos, L., & Poovendran, R. (2006, August). Stochastic coverage in heterogeneous sensor networks. ACM Transactions on Sensor Networks, 2(3), 325–358.Google Scholar
  73. 73.
    Lazos, L., & Poovendran, R. (2006, April). Coverage in heterogeneous sensor networks. In 4th international symposium on modeling and optimization in mobile, ad hoc, and wireless networks, pp. 1–10.Google Scholar
  74. 74.
    Bejerano, Y. (2008, April). Simple and efficient k-coverage verification without location information. In 27th IEEE conference on computer communications. Phoenix, AZ, pp. 291–295.Google Scholar
  75. 75.
    Bai, X., Li, S., & Xu, J. (2010, March, April). Mobile sensor deployment optimization for k-coverage n wireless sensor networks with a limited mobility model. IETE Technical Review, 27(2), 124–137.Google Scholar
  76. 76.
    Li, J. S., & Kao, H. C. (2010). Distributed k-coverage self-location estimation scheme based on voronoi diagram. IET Communications, 4(2), 167–177.MathSciNetCrossRefGoogle Scholar
  77. 77.
    Thathachar, M. A. L., & Sastry, P. S. (2002). Varieties of learning automata: An overview. IEEE Transaction on Systems, Man, and Cybernetics-Part B: Cybernetics, 32(6), 711–722.CrossRefGoogle Scholar
  78. 78.
    Narendra, K. S., & Thathachar, M. A. L. (1989). Learning automata: An introduction. Upper Saddle River, NJ: Prentice-Hall Inc.Google Scholar
  79. 79.
    Thathachar, M. A. L., & Sastry, P. S. (2004). Networks of learning automata. Boston: Kluwer Academic Publishers.Google Scholar
  80. 80.
    Wolfram, S. (2002). A new kind of science. Champaign, IL: Wolfram Media Inc.Google Scholar
  81. 81.
    Meybodi, M. R., Beygi, H., & Taherkhani, M. (2004). Cellular learning automata and its applications. Journal of Science Technology, Sharif (Sharif University of Technology, Tehran, Iran), pp. 54–77.Google Scholar
  82. 82.
    Meybodi, M. R., & Taherkhani, M. (2001, May). Application of cellular learning automata in modeling of rumor diffusion. In Proceedings of 9th conference on electrical engineering. Power and Water Institute of Technology, Tehran, Iran, pp. 102–110.Google Scholar
  83. 83.
    Beigy, H., & Meybodi, M. R. (2003). A self-organizing channel assignment algorithm: A cellular learning automata approach. Springer-Verlag Lecture Notes in Computer Science, 2690, 119–126.CrossRefGoogle Scholar
  84. 84.
    Meybodi, M. R., & Mehdipour, F. (2004, Summer). Application of cellular learning automata with input to VLSI placement. Journal of Modarres, University of Tarbeit Modarres, Vol. 16, pp. 81–95.Google Scholar
  85. 85.
    Beigy, H., & Meybodi, M. R. (2004, September, December). A mathematical framework for cellular learning automata. Advances in Complex Systems, 7(3, 4), 295–319.Google Scholar
  86. 86.
    Beigy, H., & Meybodi, M. R. (2010). Cellular learning automata with multiple learning automata in each cell and its applications. IEEE Transactions on Systems, Man, and Cybernetics, Part B, Cybernetics, 40(1), 54–66.CrossRefGoogle Scholar
  87. 87.
    Beigy, H., & Meybodi, M. R. (2007). Open synchronous cellular learning automata. Advances in Complex Systems, 10(4), 1–30.MathSciNetCrossRefGoogle Scholar
  88. 88.
    Beigy, H., & Meybodi, M. R. (2008, May) Asynchronous cellular learning automata. Automatica, Journal of International Federation of Automatic Control, 44(5), 1350-1357.Google Scholar
  89. 89.
    Esnaashari, M., & Meybodi, M. R. (2008). A cellular learning automata based clustering algorithm for wireless sensor networks. Sensor Letters, 6(5), 723–735.CrossRefGoogle Scholar
  90. 90.
    Esnaashari, M., & Meybodi, M. R. (2010). Dynamic point coverage problem in wireless sensor networks: A cellular learning automata approach. Journal of Ad hoc and Sensors Wireless Networks, 10(2–3), 193–234.Google Scholar
  91. 91.
    Ghaderi, R., Esnaashari, M., & Meybodi, M. R. (2010, February 20–22). Maintaining coverage and connectivity in sensor networks: A cellular learning automata approach. In Proceedings of the 15th annual CSI computer conference (CSICC’10), Tehran, Iran.Google Scholar
  92. 92.
    Shannon, C. E. (1948, July, October). A mathematical theory of communication. Bell System Technical Journal, 27, 379–423, 623–656.Google Scholar
  93. 93.
    Bettstetter, C., & Krause, O. (2001, August). On border effects in modeling and simulation of wireless ad hoc networks. In IEEE international conference on mobile and wireless communication networks. Recife, Brazil, pp. 20–27.Google Scholar
  94. 94.
    Sobeih, A., Chen, W. P., Hou, J. C., Kung, L. C., Li, N., Lim, H., et al. (2006). J-Sim: A simulation and emulation environment for wireless sensor networks. IEEE Wireless Communications, 13(4), 104–119.CrossRefGoogle Scholar
  95. 95.
    Zhou, Y., Schembri, J., Lamont, L., & Bird, J. (2009). Analysis of Stand-Alone GPS for relative location discovery in wireless sensor network (pp. 437–441). Newfoundland, Canada: Canadian Conference on Electrical and Computer Engineering.Google Scholar
  96. 96.
    Lee, H., Dong, H., & Aghajan, H. (2006, September). Robot-assisted localization techniques for wireless image sensor networks. In IEEE international conference on sensor, mesh, and ad hoc communications and networks (SECON), pp. 383–392.Google Scholar
  97. 97.
    Ramadurai, V., & Sichitiu, M. L. (2003). Localization in wireless sensor networks: A probabilistic approach. International conference on wireless networks, pp. 275–281.Google Scholar
  98. 98.
    Yap, T. N., & Shelton, Ch. R. (2008). Simultaneous learning of motion and sensor model parameters for mobile robots. In Proceedings of IEEE international conference on robotics and automation, pp. 2091–2097.Google Scholar

Copyright information

© Springer Science+Business Media New York 2012

Authors and Affiliations

  1. 1.Soft Computing Laboratory, Computer Engineering and Information Technology DepartmentAmirkabir University of TechnologyTehranIran
  2. 2.Institute for Studies in Theoretical Physics and Mathematics(IPM)School of Computer ScienceTehranIran

Personalised recommendations