Open Access Open Access  Restricted Access Subscription or Fee Access

Maximizing the Lifetime of a Barrier of Wireless Sensors

S.D. Hamalatha, R. Mahalakshmi, R. Kavipriya

Abstract


To make a network last beyond the lifetime of an individual sensor, redundant sensors must be deployed. What sleep-wakeup schedule can then be used for individual sensors so that the redundancy is appropriately exploited to maximize the network lifetime? We develop optimal solutions to both problems for the case when wireless sensors are deployed to form an impenetrable barrier for detecting movements. In addition to being provably optimal, our algorithms work for non-disk sensing regions and heterogeneous sensing regions. Further, we provide an optimal solution for the more difficult case when the lifetimes of individual sensors are not equal. Developing optimal algorithms for both homogeneous and heterogeneous lifetimes allows us to obtain by simulation several interesting results. We show that even when an optimal number of sensors have been deployed randomly, statistical redundancy can be exploited to extend the network lifetime by up to seven times. We also use simulation to show that the assumption of homogeneous lifetime can result in severe loss (two-thirds) of the network lifetime. Although these results are specifically for barrier coverage, they provide an indication of behavior for other coverage models.

Keywords


Wireless Sensor Networks, Sleep-Wakeup, Sensor Deployment, Barrier Coverage, Multi-Route Network Flows.

Full Text:

PDF

References


S. Kumar, T. H. Lai, and A. Arora, “Barrier coverage with wireless sensors,” in International Conference on Mobile Computing and Networking (ACM MobiCom), Cologne, Germany, 2005, pp. 284–298.

A. Arora and et. al., “Line in the sand: A wireless sensor network for target detection, classification, and tracking,” Computer Networks, vol 46, no. 5, pp. 605–634, 2004.

A. Arora and et.al., “Exscal: Elements of an extreme scale wireless sensor network,” in Eleventh IEEE International Conference on Real- Time Computing Systems and Applications (IEEE RTCSA), Hong Kong, 2005.

Joengmin Hwang, Tian He, and Yongdae Kim, “Exploring in-situ sensing irregularity in wireless sensor networks,” in Fifth ACM Conference on Embedded Networked Sensor Systems (SenSys), New York, NY, 2007.

Gilman Tolle and D. E. Culler, “Design of an application-cooperative management system for wireless sensor networks,” in EWSN, Istanbul, Turkey, 2005.

Jonathan W. Hui and David Culler, “The dynamic behavior of a data dissemination protocol for network programming at scale,” in ACM Conference on Ebmedded Networked Sensor Systems (Sensys), 2004.

Paul Balister, B´ela Bollob´as, Amites Sarkar, and Santosh Kumar, “Reliable density estimates for coverage and connectivity in thin strips of finite length,” in 13th Annual ACM international conference on Mobile computing and networking (MobiCom), Montreal, Canada, 2007, pp. 75–86.

S. Slijepcevic and M. Potkonjak, “Power efficient organization of wireless sensor networks,” in IEEE International Conference on Communications Helsinki, Finland, 2001, vol. 2, pp. 472–476.

M. Cardei, M. Thai, and W. Wu, “Energy-efficient target coverage in wireless sensor networks,” in IEEE INFOCOM, Miami, FL, 2005.

T. He and et al, “Energy-efficient surveillance system using wireless sensor networks,” in International Conference on Mobile Systems, Applications, and Services (ACM Mobisys), Boston, MA, 2004, pp. 270– 283.

S. Kumar, T. H. Lai, and J. Balogh, “On k-coverage in a mostly sleeping sensor network,” in International Conference on Mobile Computing and Networking (ACM MobiCom), Philadelphia, PA, 2004, pp. 144–158.

H. Zhang and J. Hou, “Maintaining sensing coverage and connectivity in large sensor networks,” in NSF International Workshop on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks, 2004.

Ai Chen, Santosh Kumar, and Ten H. Lai, “Designing localized algorithms for barrier coverage,” in 13th annual ACM international conference on Mobile computing and networking (MobiCom), Montreal, Canada, 2007, pp. 63–74.

B. Liu, O. Dousse, J. Wang, and A. Saipulla, “Strong barrier coverage of wireless sensor networks,” in Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing. ACM, 2008, pp. 411–420.

K.-F. Ssu, W.-T. Wang, F.-K.Wu, and T.-T. Wu, “k-barrier coverage with a directional sensing model,” International Journal on Smart Sensing and Intelligent Systems, vol. 2, no. 1, 2009.

Douglas B. West, Introduction to Graph Theory, Prentice Hall, 2001.

Alexander Schrijver, Combinatorial Optimization, Springer, 2003.

M. Pinedo, Scheduling: Theory, Algorithms, and Systems, Prentice Hall, 1995.

Wataru Kishimoto, “A method for obtaining the maxmimum multiroute flows in a network,” Networks, vol. 27, no. 4, pp. 279–291, 1996.

Ben Kuris and Terry Dishongh, “Shimmer mote:hardware guide,” Online at http://www.eecs.harvard.edu/»konrad/projects/shimmer/ references/ SHIMMER HWGuide REV1P3.pdf, 2006.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.