Hybrid Deployment Schemes for Wireless Sensor Networks

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 131)


The Wireless Sensor Networks are used in many applications in military, ecological, health related areas, for example, rapid deployment, self-organization, and fault tolerance characteristics of sensor networks make them a very promising technique for military command, control, communications and the targeting systems. Sensor networks are expected to pay an essential role in the upcoming age of pervasive computing. These networks are deployed in harsh and inaccessible environments with the purpose of monitoring their respective surroundings, and generating observed readings. Deployment of nodes in Wireless Sensor Networks (WSNs) is a basic issue to be addressed as it can influence the performance metrics of WSNs connectivity, resilience and scalability requirements. Many deployment schemes have been proposed for wireless sensor networks. We survey six deployment models random, rectangular-grid, square-grid, triangular-grid, hexagonal-grid, grid-group, and proposed two novel schemes for deployment, combinational and hybrid deployment schemes, to show which deployment scheme can be used to increase network connectivity, and scalability requirements with respect to some factor. We present the analytical and simulation-based results of the WSN made up of mica2 motes using the deployment knowledge to motivate the use of these emerging paradigms. WSNs have been simulated with Network Simulator 2.34 for node configuration, sink node configuration, topology creation, and node configured with sensing, temperature and energy capabilities by using mannasim.


Wireless sensor network Deployment knowledge Connectivity  Scalability 


  1. 1.
    Kendall M, Martin K (2011) On the role of expander graphs in key predistribution schemes for wireless sensor networks. WEWoRC 2011:62–82 (Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, UK)Google Scholar
  2. 2.
    Yong W, Garhan A, Byrav R (2006) A survey of security issues in wireless sensor networks. IEEE Commun Surv Tutor (2nd Quarter) 8:2–23 (University of Nebraska-Lincoln)Google Scholar
  3. 3.
    Akyildiz IF, Su W, Sankarasubramaniam Y (2002) A survey on sensor networks. IEEE Commun Mag 40:102–114CrossRefGoogle Scholar
  4. 4.
    Messai M-L, Aliouat M, Seba H (2010) Tree based protocol for key management in wireless sensor networks. EURASIP J Wireless Commun Netw (research Article) 2010:910695CrossRefGoogle Scholar
  5. 5.
    Fan G, Wang R, Huang H, Sun L, Sha C (2010) Coverage-guaranteed sensor node deployment strategies for wireless sensor networks. Sensors 10:2064–2087CrossRefGoogle Scholar
  6. 6.
    Monica, Sharma AK (2010) Comparative study of energy consumption for wireless networks based on random and grid deployment strategies. Int J Comput Appl (0975–8887), 6(1):28–35Google Scholar
  7. 7.
    Yu Z, Guan Y (2008) A key management scheme using deployment knowledge for wireless sensor networks. IEEE Trans Parallel Distrib Syst 19(10):1411–1425CrossRefGoogle Scholar
  8. 8.
    Wu C-H, Chung Y-C (2010) A tiling-based approach for directional sensor network deployment. In: IEEE SENSORS 2010 conferenceGoogle Scholar
  9. 9.
    Grunbaum B, Shephard GC (1977) Tilings by regular polygons. Math Mag 50(5):227–247MathSciNetCrossRefGoogle Scholar
  10. 10.
    Liu D, Ning P, Du W (2008) Group-based key predistribution for wireless sensor networks. ACM Trans Sens Netw 4(2):Article 11Google Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  1. 1.Department of ITSri Sai Aditya Institute of Science and TechnologyKakinadaIndia
  2. 2.Department of CS & SECollege of Engineering, Andhra UniversityVisakhapatnamIndia

Personalised recommendations