Skip to main content

Coverage and Connectivity

  • Chapter
  • First Online:
Wireless Sensor Networks

Abstract

A major advantage of wireless sensor networks (WSNs) over wired networks is the potential for ad hoc deployment of the network. If the monitoring of a dangerous environment is required, then one may not be able to deploy a wired network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 84.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. S. Adlakha and M. Srivastava, “Critical density thresholds for coverage in wireless sensor networks,” IEEE Wireless Communications and Networking, vol. 3, pp. 1615–1620, March 2003.

    Google Scholar 

  2. A. Agah, S.K. Das, K. Basu, and M. Asadi, “Intrusion detection in sensor networks: a non-competitive game approach,” Third IEEE International Symposium on Network Computing and Applications, pp. 343–346, 2004.

    Google Scholar 

  3. A. Arora, R. Ramnath, E. Ertin, P. Sinha, S. Bapat, V. Naik, V. Kulathumani, H. Zhang, H. Cao, M. Sridharan, S. Kumar, N. Seddon, C. Anderson, T. Hermon, N. Trivedi, C. Zhang, M. Nesterenko, R. Shah, S. Kulkarni, M. Aramugam, L. Wang, M. Gouda, Y. Choi, D. Culler, P. Dutta, C. Sharp, G. Tolle, M. Grimmer, B. Ferriera, and K. Parker, “ExScal: elements of an extreme scale wireless sensor network,” Proc. Of the 11th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, pp. 102–108, August 2005.

    Google Scholar 

  4. G. Carlsson and V. de Silva, “Topological approximation using small simplicial complexes,” (Preprint), 2003.

    Google Scholar 

  5. C. G. Cassandras and W. Li, “Sensor networks and cooperative control,” European Journal of Control, vol. 11, pp. 436–463, 2005.

    Google Scholar 

  6. S. Chaudhry, V. Hung, and R. Guha, “Optimal placement of wireless sensor nodes with fault tolerance and minimal energy consumption,” IEEE International Conference on Mobile Ad-hoc and Sensor Systems, pp. 610–615, October 2006.

    Google Scholar 

  7. V. Chvátal, “A combinatorial theorem on plane geometry,” Journal of Combinatorial Theory, Series B, vol. 18, pp. 39–41, 1975.

    Google Scholar 

  8. “CHomP: computational homology project,” http://chomp.rutgers.edu.

  9. J. Cortes and F. Bullo, “Coordination and geometric optimization via distributed dynamical systems,” SIAM Journal on Control and Optimization, vol. 44, no. 5, 2005, pp. 1543–1574.

    Google Scholar 

  10. J. Cortes, S. Martinez, T. Karatas, and F. Bullo, “Coverage control for mobile sensing networks,” IEEE Transactions on Robotics and Automation, vol. 20, no. 2, 2004, pp. 243–255.

    Google Scholar 

  11. H. Edelsbrunner, “The union of balls and its dual shape,” Discrete & Computational Geometry, vol. 13, pp. 415–440, 1995.

    Google Scholar 

  12. M. Fiedler, Algebraic connectivity of graphs, Czech. Math. J., vol. 23, no. 98, 1973, pp. 298–305.

    Google Scholar 

  13. S. Funke and C. Klein, “Hole detection or: how much geometry hides in connectivity?,” SCG ’06: Proceedings of the Twenty-Second Annual Symposium on Computational Geometry, pp. 377–385, New York, NY, 2006.

    Google Scholar 

  14. S. Funke and N. Milosavljevic, “Network sketching or: how much geometry hides in connectivity? – Part II,” Proc. of the 18th ACM-SIAM Symposium on Discrete Algorithms (SODA), 2007.

    Google Scholar 

  15. S. Funke, “Topological hole detection in wireless sensor networks and its applications,” DIALM-POMC: Joint Workshop on Foundations of Mobile Computing, 2005.

    Google Scholar 

  16. D.W. Gage, “Command control for many-robot systems,” Proc. of Nineteenth Annual AUVS Technical Symposium, pp. 22–24, 1992.

    Google Scholar 

  17. A. Ganguli, S. Susca, S. Martinez, F. Bullo, and J. Cortes, “On collective motion in sensor networks: sample problems and distributed algorithms,” Proc. of the 44th IEEE Conference on Decision and Control, and the European Control Conference, 2005, pp. 4239–4244.

    Google Scholar 

  18. A. Ghosh and S. Das, “Coverage and connectivity issues in wireless sensor networks,” in Mobile, Wireless, and Sensor Networks: Technology, Applications, and Future Directions, Ed. R. Shorey, A.L. Ananda, M.C. Chan, and W.T. Ooi, John Wiley & Sons, Inc., 2006.

    Google Scholar 

  19. R. Ghrist and A. Muhammad, “Coverage and hole-detection in sensor networks via homology,” Proc. ISPN, 2005.

    Google Scholar 

  20. A. Gusrialdi, T. Hatanaka, and M. Fujita, “Coverage control for mobile networks with limited-range anisotropic sensors,” Proc. 47 th IEEE Conference on Decision and Control, Cancun, Mexico, Dec. 2009.

    Google Scholar 

  21. M. Hefeeda and H. Ahmadi, “A probabilistic coverage protocol for wireless sensor networks,” Proc. of IEEE International Conference on Network Protocols (ICNP ’07), pp. 41–50, Beijing, China, October 2007.

    Google Scholar 

  22. N. Heo and P.K. Varshney, “A distributed self-spreading algorithm for mobile wireless sensor networks,” Proc. IEEE Wireless Communications and Networking Conference, (WCNC’03), New Orleans, LA, March 2003, pp. 1597–1602.

    Google Scholar 

  23. A. Howard, M.J. Matraric, and G.S. Sukhatme, “Mobile sensor network deployment using potential fields: a distributed, scalable solution to the area coverage problem,” International Symposium on Distributed Autonomous Robotics Systems, June 2002.

    Google Scholar 

  24. T. Kaczynski, K. Mischaikow, and M. Mrozek, Computational Homology, Applied Mathematical Sciences 157, Springer-Verlag, 2004.

    Google Scholar 

  25. J. Kanno, J. G. Buchart III, R. R. Selmic and V. Phoha, “Detecting coverage holes in wireless sensor networks,” Proc. 17th Mediterranean Conference on Control and Automation, Thessaloniki, Greece, June 24–26, 2009.

    Google Scholar 

  26. K. Kar and S. Banerjee, “Node placement for connected coverage in sensor networks”, Proc.of WiOpt 2003: Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, 2003.

    Google Scholar 

  27. D. Klatte and B. Kummer, Nonsmooth Equations in Optimization, Kluwer Academic Publishers, Dordrecht, The Netherlands, 2002.

    Google Scholar 

  28. A.A. Kooshesh and B.M.E. Moret, “Three-coloring the vertices of a triangulated simple polygon,” Pattern Recognition, vol. 25, pp. 443–444, 1992.

    Google Scholar 

  29. S. Kumar, T. H. Lai, and A. Arora, “Barrier coverage with wireless sensor networks,” Proc. of the 11th Annual International Conference on Mobile Computing and Networking, Cologne, Germany, pp. 284–298, 2005.

    Google Scholar 

  30. A.K. Lédeczi, A. Nádas, P. Völgysi, G. Balogh, B. Kusy, J. Sallai, G. Pap, S. Dóra, and K. Molnár, “Countersniper systems for urban warfare,” ACM Transactions on Sensor Networks, vol. 1, no. 2, pp. 153–177, Nov. 2005.

    Google Scholar 

  31. D.T. Lee and A.K. Lin, “Computational complexity of art gallery problems,” IEEE Transactions on Information Theory, vol. 32, no. 2, pp. 276–282, March 1986.

    Google Scholar 

  32. M. Marengoni, B.A. Draper, A. Hanson, and R.A. Sitaraman, “System to place observers on a polyhedral terrain in polynomial time,” Image and Vision Computing, vol. 18, pp. 773–780, 1996.

    Google Scholar 

  33. S. Meguerdichian, F. Koushanfar, M. Potkonjak, and M. Srivastava, “Coverage poblems in wireless ad-hoc sensor networks,” IEEE Infocom 2001, pp. 1380–1387, April 2001.

    Google Scholar 

  34. B. Mohar, “The Laplacian spectrum of graphs,” in Graph Theory, Combinatorics, and Applications, vol. 2, Ed. Y. Alavi, G. Chartrand, O. R. Oellermann, A. J. Schwenk, Wiley, 1991, pp. 871–898.

    Google Scholar 

  35. A. Muhammad and M. Egerstedt, “Connectivity graphs as models of local interactions,” Proc. of the 43rd IEEE Conference on Decision and Control, pp. 124–129, December 2004.

    Google Scholar 

  36. J.R. Munkres, Elements of Algebraic Topology, Addison Wesley, 1993.

    Google Scholar 

  37. J. O’Rourke, Art Gallery Theorems and Algorithms, Oxford University Press, 1987.

    Google Scholar 

  38. R. Pandit and P.M. Ferreira, “Determination of minimum number of sensors and their locations for an automated facility: an algorithmic approach,” European Journal of Operational Research, vol. 63, no. 2, pp. 231–239, 1992.

    Google Scholar 

  39. S. Poduri and G.S. Sukhatme, “Constrained coverage in mobile sensor networks,” Proc. IEEE Int. Conf. Robotics and Automation (ICRA ’04), New Orleans, LA, April 2004, pp. 40–50.

    Google Scholar 

  40. S. Ramazani, J. Kanno, R. Selmic, and M. Brust, “Topological and combinatorial coverage hole detection in coordinate-free wireless sensor networks,” International Journal of Sensor Networks, vol. 21, no. 1, pp. 40–52, 2016.

    Google Scholar 

  41. W. Ren, R. W. Beard, and E. M. Atkins, “Information consensus in multivehicle cooperative control,” IEEE Control System Magazine, vol. 27, no. 2, April 2007.

    Google Scholar 

  42. R. Roman, J. Zhou, and J. Lopez, “Applying intrusion detection systems to wireless sensor networks,” Consumer Communications and Networking Conference, vol. 1, pp. 640–644, January 2006.

    Google Scholar 

  43. L. Sabattini, N. Chopra, and C. Secchi, “On decentralized connectivity maintenance for mobile robotic systems,” 50 th IEEE Conference on Decision and Control, Orlando, FL, USA, December 2011.

    Google Scholar 

  44. R. Selmic, J. Kanno, J. Buchart, N. Richardson, “Quadratic optimal control of sensor network deployment,” Cyberspace Research Workshop, Shreveport, LA, November 2007.

    Google Scholar 

  45. V.de Silva and R. Ghrist, “Homological sensor networks,” Notices of the American Mathematical Society, vol. 54, no. 1, pp. 10–17, Jan. 2007.

    Google Scholar 

  46. “Plex: simplicial complexes in MATLAB,” website: http://comptop.stanford.edu/programs.

  47. S. Slijepcevic and M. Potkonjak, “Power efficient organization of wireless sensor networks,” IEEE International Conference on Communications, vol. 2, pp. 472–476, June 2001.

    Google Scholar 

  48. D. Tian and N. Georganas, “A coverage-preserving node scheduling scheme for large wireless sensor networks,” ACM Workshop of Wireless Sensor Networks and Applications, Atlanta, GA, October 2002.

    Google Scholar 

  49. L. Vietoris, “Über den höheren zusammenhang kompakter Raume und eine klasse von zusammenhangstreuen abbildungen,” Mathematische Annalen, vol. 97, pp. 454–472, 1927.

    Google Scholar 

  50. G. Want, G. Cao, and T. LaPorta, “A bidding protocol for deploying mobile sensors,” Proc. 11 th IEEE Int. Conf. Network Protocols (ICNP’03), Atlanta, GA, Nov. 2003, pp. 80–91.

    Google Scholar 

  51. G. Wang, G. Cao, and T. LaPorta, “Movement-assisted sensor deployment,” Proc. IEEE InfoCom, Hong Kong, March 2004, pp. 80–91.

    Google Scholar 

  52. X. Wang, G. Xing, Y. Zang, C. Lu, R. Pless, and C. Gill, “Integrated coverage and connectivity configuration in wireless sensor networks,” ACM SenSys, Los Angeles, November 2003.

    Google Scholar 

  53. G. Werner-Allen, K. Lorincz, M. Ruiz, O. Marcillo, J. Johnson, J. Lees, and M. Welsh, “Deploying a wireless sensor network on an active volcano,” IEEE Internet Computing, vol. 10, no. 2, pp. 18–25, April 2006.

    Google Scholar 

  54. D.B. West, Introduction to Graph Theory, Prentice Hall, Upper Saddle River, New Jersey, 2001.

    Google Scholar 

  55. P. Yang, R.A. Freeman, G.J. Gordon, K.M. Lynch, S.S. Srinivasa, and R. Sukthankar, “Decentralized estimation and control of graph connectivity for mobile sensor networks,” Automatica, vol. 46, pp. 390–396, 2010.

    Google Scholar 

  56. F. Yu, Y. Choi, S. Park, Y. Tian, and S. Kim, “A hole geometric modeling in wireless sensor networks,” International Conference on Wireless Communications, Networking and Mobile Computing, pp. 2432–2435, September 2007.

    Google Scholar 

  57. H. Zhang and J.C. Hou, “Maintaining sensing coverage and connectivity in large sensor networks,” Wireless Ad Hoc Sensor Networks: An International Journal, vol. 1 no. 1–2, pp. 89-124, 2005.

    Google Scholar 

  58. Y. Zou and K. Chakrabarty, “Sensor deployment and target localization based on virtual forces,” IEEE INFOCOM 2003, March 2003.

    Google Scholar 

  59. Y. Zou and K. Chakrabarty, “Uncertainty-aware sensor deployment algorithms for surveillance applications,” Proc. IEEE Global Communications Conference, December 2003.

    Google Scholar 

  60. Y. Zou and K. Chakrabarty, “Sensor deployment and target localization in distributed sensor networks,” IEEE Trans. Embedded Comput. Syst., vol. 3., no. 1, pp. 61–91, 2004.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rastko R. Selmic .

Questions and Exercises

Questions and Exercises

  1. 1.

    What is the degree of a vertex in a graph G? Provide an example.

  2. 2.

    Explain when is a graph connected? Draw examples of connected and disconnected graphs.

  3. 3.

    Demonstrate by example that if a graph G is disconnected, then its complement \(\bar{G}\) is connected. Show another example that the opposite is not true—if the graph G is connected, then its complement \(\bar{G}\) is not necessary disconnected. Finally, prove this statement rigorously.

  4. 4.

    Study the Chvátal’s art gallery theorem and find out what is an upper bound on the minimal number of guards that are required to cover the gallery? Please describe “upper bound on the minimal number” in case of this problem.

  5. 5.

    If the gallery floor plan can be divided into square rooms, what would be the upper bound on the minimal number of guards required to cover the gallery in this case?

  6. 6.

    When one can say that complete sensing coverage of a convex region implies connectivity of the network?

  7. 7.

    Given a graph \(V = \{ 1,2,3,4,5,6,7\}\), \(E = \{ (1,2),(1,3),(1,5),(2,3),(3,5),(4,7),(6,7)\}\), using a graph Laplacian check if the graph is connected. Find the number of spanning trees using Laplacian eigenvalues.

  8. 8.

    Given a graph \(V = \{ 1,2,3,4,5,6,7,8,9\}\), \(E = \{ (1,2),(1,3),(1,5),(2,3),(3,5),(3,6),(4,5),(5,8),(5,9),(6,7),(6,8)\}\), estimate the lower and upper bounds on the graph diameter.

  9. 9.

    For a graph with vertices \(V = \{ 1,2,3,4,5\}\), draw a complex and a simplicial complex.

  10. 10.

    For a set of points in two-dimensional space with the following coordinates \(X = \{ ( - 1, - 2),(1,0),(2,3),(3, - 4),( - 3, - 5)\}\), draw a Voronoi diagram and derive alpha shape complex.

  11. 11.

    Describe a k-coverage in sensor networks and its relationship with the Rips complex. What does it mean by 2-coverage specifically and in terms of the Rips complex?

  12. 12.

    Use linear quadratic control problem setup similar to the one given in Eq. (5.31) and formulate a sensor network coverage control problem where it is required for mobile nodes to be attracted to the target node, to be repelled from the static sensor nodes, and to be repelled from each other (mobile nodes).

  13. 13.

    How can you extend the previous problem formulation and include constraints that would ensure collision avoidance between mobile sensor nodes?

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this chapter

Cite this chapter

Selmic, R.R., Phoha, V.V., Serwadda, A. (2016). Coverage and Connectivity. In: Wireless Sensor Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-46769-6_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-46769-6_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-46767-2

  • Online ISBN: 978-3-319-46769-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics