Optimization scheme for sensor coverage scheduling with bandwidth constraints

被引:23
作者
Wang, Chen [1 ]
Thai, My T. [2 ]
Li, Yingshu [3 ]
Wang, Feng [4 ]
Wu, Weili [5 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
[2] Univ Florida, Dept Comp & Informat Sci & Engn, Gainesville, FL 32611 USA
[3] Georgia State Univ, Dept Comp Sci, Atlanta, GA 30303 USA
[4] Arizona State Univ, Dept Math Sci App Comp, Phoenix, AZ USA
[5] Univ Texas Dallas, Dept Comp Sci, Richardson, TX 75083 USA
关键词
Sensor Node; Wireless Sensor Network; Network Lifetime; Total Lifetime; Bandwidth Constraint;
D O I
10.1007/s11590-008-0091-8
中图分类号
C93 [管理学]; O22 [运筹学];
学科分类号
070105 ; 12 ; 1201 ; 1202 ; 120202 ;
摘要
Wireless Sensor Network has attracted a lot of attentions due to its broad applications in recent years and also introduces many challenges. Network lifetime is a critical issue in Wireless Sensor Networks. It is possible to extend network lifetime by organizing the sensors into a number of sensor covers. However, with the limited bandwidth, coverage breach (i.e, targets that are not covered) can occur if the number of available time-slots/channels is less than the number of sensors in a sensor cover. In this paper, we study a joint optimization problem in which the objective is to minimize the coverage breach as well as to maximize the network lifetime. We show a "trade-off" scheme by presenting two strongly related models, which aim to tradeoffs between the two conflicting objectives. The main approach of our models is organizing sensors into non-disjoint sets, which is different from the current most popular approach and can gain longer network lifetime as well as less coverage breach. We proposed two algorithms for the first model based on linear programming and greedy techniques, respectively. Then we transform these algorithms to solve the second model by revealing the strong connection between the models. Through numerical simulation, we showed the good performance of our algorithms and the pictures of the tradeoff scheme in variant scenarios, which coincide with theoretical analysis very well. It is also showed that our algorithms could obtain less breach rate than the one proposed in (Cheng et al. in INFOCOM' 05, 2005).
引用
收藏
页码:63 / 75
页数:13
相关论文
共 10 条
  • [1] [Anonymous], P ACM SIGCOMM WORKSH
  • [2] Synthesis of application-specific memories for power optimization in embedded systems
    Benini, L
    Macii, A
    Macii, E
    Poncino, M
    [J]. 37TH DESIGN AUTOMATION CONFERENCE, PROCEEDINGS 2000, 2000, : 300 - 303
  • [3] BERMAN P, 2004, WCNC 04
  • [4] Cardei M., 2005, ACM WIRELESS NETWORK, V11
  • [5] Cardei M., 2005, INFOCOM '05
  • [6] CHENG MX, 2005, INFOCOM 05
  • [7] Estrin Deborah., 1999, MobiCom
  • [8] Kahn J., 1999, Mobicom
  • [9] Energy-aware wireless microsensor networks
    Raghunathan, V
    Schurgers, C
    Park, S
    Srivastava, MB
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2002, 19 (02) : 40 - 50
  • [10] SLIJEPCEVIC S, 2001, IEEE INT INT C COMM