Advertisement

Mobile Sensors Deployment Methods: A Review

  • P. Thrilochan Sharma
  • Sushabhan Choudhury
  • Vinay ChowdaryEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 989)

Abstract

Usage of wireless sensor networks has become inevitable in the field of international border monitoring and zone surveillance. This application of sensors requires a barrier of sensors along the border to be monitored. The more the number of barriers, the better the monitoring system. Usage of a number of sensor nodes (SNs) in a specific configuration leads to the formation of a specific number of barriers. The challenge here is to develop a deployment algorithm, which provides the maximum number of barriers with the minimum number of SN relocation. Wireless Sensor Networks are used in hazardous environments and are preferred to be aerially deployed. In this paper, various methods of Mobile Sensor deployment methods are discussed along with their pros and cons. A comparative study is done based on many factors such as relocation distance, obstacle avoidance, scalability, etc.

References

  1. 1.
    Nguyen, T.G., So-In, C.: Distributed deployment algorithm for barrier coverage in mobile sensor networks. Post-doctoral training program, Khon Kaen University, IEEE (2018)CrossRefGoogle Scholar
  2. 2.
    Jun, H.E., Hongchi, S.H.I.: Constructing sensor barriers with minimum cost in wireless sensor networks. J. Parallel Distrib. Comput. 72(12), 1654–1663 (2012)CrossRefGoogle Scholar
  3. 3.
    Liu, B., Dousse, O., Wang, J., et al.: Strong barrier coverage of wireless sensor networks. In: Proceedings of the 9th ACM International Symposium on Mobile ad hoc Networking and Computing, ACM, pp. 411–420 (2008)Google Scholar
  4. 4.
    Kumar, S., Lai, T.H., Posner, M.E, et al.: Optimal sleep-wake up algorithms for barriers of wireless sensors. In: 2007 Fourth International Conference on Broadband Communications, Networks and Systems, BROADNETS, IEEE, pp. 327–336 (2007)Google Scholar
  5. 5.
    Chang, C.Y., Hsiao, C.Y., Chin, Y.T.: The k-barrier coverage mechanism in wireless mobile sensor networks. In: Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia, ACM (2014)Google Scholar
  6. 6.
    Mostafaei, H.: Stochastic barrier coverage in wireless sensor networks based on distributed learning automata. Comput. Commun. 55(1), 51–61 (2015)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Zou, Y., Chakrabarty, K.: Sensor deployment and target localization based on virtual forces. In: Twenty-Second Annual Joint Conference of the IEEE Computer and Communications (INFOCOM), vol. 2, no. C, pp. 1293–1303 (2003).  https://doi.org/10.1109/INFCOM.2003.1208965
  8. 8.
    Tan, G., Jarvis, S.A., Kermarrec, A.M.: Connectivity-guaranteed and obstacle-adaptive deployment schemes for mobile sensor networks. IEEE Trans. Mob. Comput. 8(6), 836–848 (2009).  https://doi.org/10.1109/TMC.2009.31CrossRefGoogle Scholar
  9. 9.
    Bartolini, N., Calamoneri, T., Fusco, E.G., Massini, A., Silvestri, S.: Autonomous deployment of self-organizing mobile sensors for a complete coverage. In: Self-Organizing Systems, pp. 194–205 (2008).  https://doi.org/10.1007/978-3-540-92157-8_17CrossRefGoogle Scholar
  10. 10.
    Kumar, A., Sharma, V., Prasad, D.: Distributed deployment scheme for homogeneous distribution of randomly deployed mobile sensor nodes in wireless sensor network. (IJACSA) Int. J. Adv. Comput. Sci. Appl. 4(4), 139–146 (2013). Retrieved from www.ijacsa.thesai.org
  11. 11.
    Gupta, M., Krishna, C.R., Prasad, D.: SEEDS: scalable energy efficient deployment scheme for homogeneous wireless sensor network. In: Proceedings of the 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques, ICICT 2014, pp. 416–423 (2014).  https://doi.org/10.1109/ICICICT.2014.6781318
  12. 12.
    Moreira, J.E., Rebello, V.E.F.: Proceedings of the 22nd International Symposium on Computer Architecture and High-Performance Computing, SBAC-PAD 2010: Message from the program committee co-chairs, 00(C), pp. 1597–1602 (2010).  https://doi.org/10.1109/SBAC-PAD.2010.6
  13. 13.
    Lee, H.J., Kim, Y.H., Han, Y.H., Park, C.Y.: Centroid-based movement assisted sensor deployment schemes in wireless sensor networks. IEEE Veh. Technol. Conf. (2009).  https://doi.org/10.1109/VETECF.2009.5379087
  14. 14.
    Liao, W.H., Kao, Y., Li, Y.S.: A sensor deployment approach using glowworm swarm optimization algorithm in wireless sensor networks. Expert Syst. Appl. 38(10), 12180–12188 (2011).  https://doi.org/10.1016/j.eswa.2011.03.053CrossRefGoogle Scholar
  15. 15.
    Zhang, Y., Sun, X., Wang, B.: Efficient algorithm for k-barrier coverage based on integer linear programming. China Commun. 13(7), 16–23 (2016).  https://doi.org/10.1109/CC.2016.7559071CrossRefGoogle Scholar
  16. 16.
    Ma, H., Li, D., Chen, W., Zhu, Q., Yang, H.: Energy efficient k-barrier coverage in limited mobile wireless sensor networks. Comput. Commun. 35(14), 1749–1758 (2012).  https://doi.org/10.1016/j.comcom.2012.04.021CrossRefGoogle Scholar
  17. 17.
    Wang, G., Member, S., Cao, G.: Movement-assisted sensor deployment. IEEE Trans. Mob. Comput. 5(6), 640–652 (2006)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • P. Thrilochan Sharma
    • 1
  • Sushabhan Choudhury
    • 2
  • Vinay Chowdary
    • 2
    Email author
  1. 1.Automation and RoboticsUniversity of Petroleum and Energy StudiesDehradunIndia
  2. 2.Electrical and Electronics DepartmentUniversity of Petroleum and Energy StudiesDehradunIndia

Personalised recommendations