Abstract
A major advantage of wireless sensor networks (WSNs) over wired networks is the potential for ad hoc deployment of the network. If the monitoring of a dangerous environment is required, then one may not be able to deploy a wired network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
S. Adlakha and M. Srivastava, “Critical density thresholds for coverage in wireless sensor networks,” IEEE Wireless Communications and Networking, vol. 3, pp. 1615–1620, March 2003.
A. Agah, S.K. Das, K. Basu, and M. Asadi, “Intrusion detection in sensor networks: a non-competitive game approach,” Third IEEE International Symposium on Network Computing and Applications, pp. 343–346, 2004.
A. Arora, R. Ramnath, E. Ertin, P. Sinha, S. Bapat, V. Naik, V. Kulathumani, H. Zhang, H. Cao, M. Sridharan, S. Kumar, N. Seddon, C. Anderson, T. Hermon, N. Trivedi, C. Zhang, M. Nesterenko, R. Shah, S. Kulkarni, M. Aramugam, L. Wang, M. Gouda, Y. Choi, D. Culler, P. Dutta, C. Sharp, G. Tolle, M. Grimmer, B. Ferriera, and K. Parker, “ExScal: elements of an extreme scale wireless sensor network,” Proc. Of the 11th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, pp. 102–108, August 2005.
G. Carlsson and V. de Silva, “Topological approximation using small simplicial complexes,” (Preprint), 2003.
C. G. Cassandras and W. Li, “Sensor networks and cooperative control,” European Journal of Control, vol. 11, pp. 436–463, 2005.
S. Chaudhry, V. Hung, and R. Guha, “Optimal placement of wireless sensor nodes with fault tolerance and minimal energy consumption,” IEEE International Conference on Mobile Ad-hoc and Sensor Systems, pp. 610–615, October 2006.
V. Chvátal, “A combinatorial theorem on plane geometry,” Journal of Combinatorial Theory, Series B, vol. 18, pp. 39–41, 1975.
“CHomP: computational homology project,” http://chomp.rutgers.edu.
J. Cortes and F. Bullo, “Coordination and geometric optimization via distributed dynamical systems,” SIAM Journal on Control and Optimization, vol. 44, no. 5, 2005, pp. 1543–1574.
J. Cortes, S. Martinez, T. Karatas, and F. Bullo, “Coverage control for mobile sensing networks,” IEEE Transactions on Robotics and Automation, vol. 20, no. 2, 2004, pp. 243–255.
H. Edelsbrunner, “The union of balls and its dual shape,” Discrete & Computational Geometry, vol. 13, pp. 415–440, 1995.
M. Fiedler, Algebraic connectivity of graphs, Czech. Math. J., vol. 23, no. 98, 1973, pp. 298–305.
S. Funke and C. Klein, “Hole detection or: how much geometry hides in connectivity?,” SCG ’06: Proceedings of the Twenty-Second Annual Symposium on Computational Geometry, pp. 377–385, New York, NY, 2006.
S. Funke and N. Milosavljevic, “Network sketching or: how much geometry hides in connectivity? – Part II,” Proc. of the 18th ACM-SIAM Symposium on Discrete Algorithms (SODA), 2007.
S. Funke, “Topological hole detection in wireless sensor networks and its applications,” DIALM-POMC: Joint Workshop on Foundations of Mobile Computing, 2005.
D.W. Gage, “Command control for many-robot systems,” Proc. of Nineteenth Annual AUVS Technical Symposium, pp. 22–24, 1992.
A. Ganguli, S. Susca, S. Martinez, F. Bullo, and J. Cortes, “On collective motion in sensor networks: sample problems and distributed algorithms,” Proc. of the 44th IEEE Conference on Decision and Control, and the European Control Conference, 2005, pp. 4239–4244.
A. Ghosh and S. Das, “Coverage and connectivity issues in wireless sensor networks,” in Mobile, Wireless, and Sensor Networks: Technology, Applications, and Future Directions, Ed. R. Shorey, A.L. Ananda, M.C. Chan, and W.T. Ooi, John Wiley & Sons, Inc., 2006.
R. Ghrist and A. Muhammad, “Coverage and hole-detection in sensor networks via homology,” Proc. ISPN, 2005.
A. Gusrialdi, T. Hatanaka, and M. Fujita, “Coverage control for mobile networks with limited-range anisotropic sensors,” Proc. 47 th IEEE Conference on Decision and Control, Cancun, Mexico, Dec. 2009.
M. Hefeeda and H. Ahmadi, “A probabilistic coverage protocol for wireless sensor networks,” Proc. of IEEE International Conference on Network Protocols (ICNP ’07), pp. 41–50, Beijing, China, October 2007.
N. Heo and P.K. Varshney, “A distributed self-spreading algorithm for mobile wireless sensor networks,” Proc. IEEE Wireless Communications and Networking Conference, (WCNC’03), New Orleans, LA, March 2003, pp. 1597–1602.
A. Howard, M.J. Matraric, and G.S. Sukhatme, “Mobile sensor network deployment using potential fields: a distributed, scalable solution to the area coverage problem,” International Symposium on Distributed Autonomous Robotics Systems, June 2002.
T. Kaczynski, K. Mischaikow, and M. Mrozek, Computational Homology, Applied Mathematical Sciences 157, Springer-Verlag, 2004.
J. Kanno, J. G. Buchart III, R. R. Selmic and V. Phoha, “Detecting coverage holes in wireless sensor networks,” Proc. 17th Mediterranean Conference on Control and Automation, Thessaloniki, Greece, June 24–26, 2009.
K. Kar and S. Banerjee, “Node placement for connected coverage in sensor networks”, Proc.of WiOpt 2003: Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, 2003.
D. Klatte and B. Kummer, Nonsmooth Equations in Optimization, Kluwer Academic Publishers, Dordrecht, The Netherlands, 2002.
A.A. Kooshesh and B.M.E. Moret, “Three-coloring the vertices of a triangulated simple polygon,” Pattern Recognition, vol. 25, pp. 443–444, 1992.
S. Kumar, T. H. Lai, and A. Arora, “Barrier coverage with wireless sensor networks,” Proc. of the 11th Annual International Conference on Mobile Computing and Networking, Cologne, Germany, pp. 284–298, 2005.
A.K. Lédeczi, A. Nádas, P. Völgysi, G. Balogh, B. Kusy, J. Sallai, G. Pap, S. Dóra, and K. Molnár, “Countersniper systems for urban warfare,” ACM Transactions on Sensor Networks, vol. 1, no. 2, pp. 153–177, Nov. 2005.
D.T. Lee and A.K. Lin, “Computational complexity of art gallery problems,” IEEE Transactions on Information Theory, vol. 32, no. 2, pp. 276–282, March 1986.
M. Marengoni, B.A. Draper, A. Hanson, and R.A. Sitaraman, “System to place observers on a polyhedral terrain in polynomial time,” Image and Vision Computing, vol. 18, pp. 773–780, 1996.
S. Meguerdichian, F. Koushanfar, M. Potkonjak, and M. Srivastava, “Coverage poblems in wireless ad-hoc sensor networks,” IEEE Infocom 2001, pp. 1380–1387, April 2001.
B. Mohar, “The Laplacian spectrum of graphs,” in Graph Theory, Combinatorics, and Applications, vol. 2, Ed. Y. Alavi, G. Chartrand, O. R. Oellermann, A. J. Schwenk, Wiley, 1991, pp. 871–898.
A. Muhammad and M. Egerstedt, “Connectivity graphs as models of local interactions,” Proc. of the 43rd IEEE Conference on Decision and Control, pp. 124–129, December 2004.
J.R. Munkres, Elements of Algebraic Topology, Addison Wesley, 1993.
J. O’Rourke, Art Gallery Theorems and Algorithms, Oxford University Press, 1987.
R. Pandit and P.M. Ferreira, “Determination of minimum number of sensors and their locations for an automated facility: an algorithmic approach,” European Journal of Operational Research, vol. 63, no. 2, pp. 231–239, 1992.
S. Poduri and G.S. Sukhatme, “Constrained coverage in mobile sensor networks,” Proc. IEEE Int. Conf. Robotics and Automation (ICRA ’04), New Orleans, LA, April 2004, pp. 40–50.
S. Ramazani, J. Kanno, R. Selmic, and M. Brust, “Topological and combinatorial coverage hole detection in coordinate-free wireless sensor networks,” International Journal of Sensor Networks, vol. 21, no. 1, pp. 40–52, 2016.
W. Ren, R. W. Beard, and E. M. Atkins, “Information consensus in multivehicle cooperative control,” IEEE Control System Magazine, vol. 27, no. 2, April 2007.
R. Roman, J. Zhou, and J. Lopez, “Applying intrusion detection systems to wireless sensor networks,” Consumer Communications and Networking Conference, vol. 1, pp. 640–644, January 2006.
L. Sabattini, N. Chopra, and C. Secchi, “On decentralized connectivity maintenance for mobile robotic systems,” 50 th IEEE Conference on Decision and Control, Orlando, FL, USA, December 2011.
R. Selmic, J. Kanno, J. Buchart, N. Richardson, “Quadratic optimal control of sensor network deployment,” Cyberspace Research Workshop, Shreveport, LA, November 2007.
V.de Silva and R. Ghrist, “Homological sensor networks,” Notices of the American Mathematical Society, vol. 54, no. 1, pp. 10–17, Jan. 2007.
“Plex: simplicial complexes in MATLAB,” website: http://comptop.stanford.edu/programs.
S. Slijepcevic and M. Potkonjak, “Power efficient organization of wireless sensor networks,” IEEE International Conference on Communications, vol. 2, pp. 472–476, June 2001.
D. Tian and N. Georganas, “A coverage-preserving node scheduling scheme for large wireless sensor networks,” ACM Workshop of Wireless Sensor Networks and Applications, Atlanta, GA, October 2002.
L. Vietoris, “Über den höheren zusammenhang kompakter Raume und eine klasse von zusammenhangstreuen abbildungen,” Mathematische Annalen, vol. 97, pp. 454–472, 1927.
G. Want, G. Cao, and T. LaPorta, “A bidding protocol for deploying mobile sensors,” Proc. 11 th IEEE Int. Conf. Network Protocols (ICNP’03), Atlanta, GA, Nov. 2003, pp. 80–91.
G. Wang, G. Cao, and T. LaPorta, “Movement-assisted sensor deployment,” Proc. IEEE InfoCom, Hong Kong, March 2004, pp. 80–91.
X. Wang, G. Xing, Y. Zang, C. Lu, R. Pless, and C. Gill, “Integrated coverage and connectivity configuration in wireless sensor networks,” ACM SenSys, Los Angeles, November 2003.
G. Werner-Allen, K. Lorincz, M. Ruiz, O. Marcillo, J. Johnson, J. Lees, and M. Welsh, “Deploying a wireless sensor network on an active volcano,” IEEE Internet Computing, vol. 10, no. 2, pp. 18–25, April 2006.
D.B. West, Introduction to Graph Theory, Prentice Hall, Upper Saddle River, New Jersey, 2001.
P. Yang, R.A. Freeman, G.J. Gordon, K.M. Lynch, S.S. Srinivasa, and R. Sukthankar, “Decentralized estimation and control of graph connectivity for mobile sensor networks,” Automatica, vol. 46, pp. 390–396, 2010.
F. Yu, Y. Choi, S. Park, Y. Tian, and S. Kim, “A hole geometric modeling in wireless sensor networks,” International Conference on Wireless Communications, Networking and Mobile Computing, pp. 2432–2435, September 2007.
H. Zhang and J.C. Hou, “Maintaining sensing coverage and connectivity in large sensor networks,” Wireless Ad Hoc Sensor Networks: An International Journal, vol. 1 no. 1–2, pp. 89-124, 2005.
Y. Zou and K. Chakrabarty, “Sensor deployment and target localization based on virtual forces,” IEEE INFOCOM 2003, March 2003.
Y. Zou and K. Chakrabarty, “Uncertainty-aware sensor deployment algorithms for surveillance applications,” Proc. IEEE Global Communications Conference, December 2003.
Y. Zou and K. Chakrabarty, “Sensor deployment and target localization in distributed sensor networks,” IEEE Trans. Embedded Comput. Syst., vol. 3., no. 1, pp. 61–91, 2004.
Author information
Authors and Affiliations
Corresponding author
Questions and Exercises
Questions and Exercises
-
1.
What is the degree of a vertex in a graph G? Provide an example.
-
2.
Explain when is a graph connected? Draw examples of connected and disconnected graphs.
-
3.
Demonstrate by example that if a graph G is disconnected, then its complement \(\bar{G}\) is connected. Show another example that the opposite is not true—if the graph G is connected, then its complement \(\bar{G}\) is not necessary disconnected. Finally, prove this statement rigorously.
-
4.
Study the Chvátal’s art gallery theorem and find out what is an upper bound on the minimal number of guards that are required to cover the gallery? Please describe “upper bound on the minimal number” in case of this problem.
-
5.
If the gallery floor plan can be divided into square rooms, what would be the upper bound on the minimal number of guards required to cover the gallery in this case?
-
6.
When one can say that complete sensing coverage of a convex region implies connectivity of the network?
-
7.
Given a graph \(V = \{ 1,2,3,4,5,6,7\}\), \(E = \{ (1,2),(1,3),(1,5),(2,3),(3,5),(4,7),(6,7)\}\), using a graph Laplacian check if the graph is connected. Find the number of spanning trees using Laplacian eigenvalues.
-
8.
Given a graph \(V = \{ 1,2,3,4,5,6,7,8,9\}\), \(E = \{ (1,2),(1,3),(1,5),(2,3),(3,5),(3,6),(4,5),(5,8),(5,9),(6,7),(6,8)\}\), estimate the lower and upper bounds on the graph diameter.
-
9.
For a graph with vertices \(V = \{ 1,2,3,4,5\}\), draw a complex and a simplicial complex.
-
10.
For a set of points in two-dimensional space with the following coordinates \(X = \{ ( - 1, - 2),(1,0),(2,3),(3, - 4),( - 3, - 5)\}\), draw a Voronoi diagram and derive alpha shape complex.
-
11.
Describe a k-coverage in sensor networks and its relationship with the Rips complex. What does it mean by 2-coverage specifically and in terms of the Rips complex?
-
12.
Use linear quadratic control problem setup similar to the one given in Eq. (5.31) and formulate a sensor network coverage control problem where it is required for mobile nodes to be attracted to the target node, to be repelled from the static sensor nodes, and to be repelled from each other (mobile nodes).
-
13.
How can you extend the previous problem formulation and include constraints that would ensure collision avoidance between mobile sensor nodes?
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this chapter
Cite this chapter
Selmic, R.R., Phoha, V.V., Serwadda, A. (2016). Coverage and Connectivity. In: Wireless Sensor Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-46769-6_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-46769-6_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-46767-2
Online ISBN: 978-3-319-46769-6
eBook Packages: Computer ScienceComputer Science (R0)