An Algorithm for Hybrid Nodes Barrier Coverage Based on Voronoi in Wireless Sensor Networks

被引:3
|
作者
Dang, Xiaochao [1 ,2 ]
Ma, Rucang [1 ]
Hao, Zhanjun [1 ,2 ]
Ma, Meixiu [3 ]
机构
[1] Northwest Normal Univ, Coll Comp Sci & Engn, Lanzhou 730070, Gansu, Peoples R China
[2] Gansu Prov Internet Things Engn Res Ctr, Lanzhou 730070, Gansu, Peoples R China
[3] Northwest Normal Univ, Coll Educ Technol, Lanzhou 730070, Gansu, Peoples R China
来源
DATA SCIENCE, PT II | 2017年 / 728卷
基金
中国国家自然科学基金;
关键词
Wireless Sensor Network (WSN); Voronoi diagram; Hybrid node; Barrier coverage; Reference Barrier Lines (RBL); The least square method;
D O I
10.1007/978-981-10-6388-6_18
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In order to make up for the deficiencies and insufficiencies that wireless sensor network is constituted absolutely by static or dynamic sensor nodes. So a deployment mechanism for hybrid nodes barrier coverage (HNBC) is proposed in wireless sensor network, which collaboratively consists of static and dynamic sensor nodes. We introduced the Voronoi diagram to divide the whole deployment area. According to the principle of least square method, and the static nodes are used to construct the reference barrier line (RBL). And we implemented effectively barrier coverage by monitoring whether there is a coverage hole in the deployment area, and then to determine whether dynamic nodes need limited mobility to redeploy the monitoring area. The simulation results show that the proposed algorithm improved the coverage quality, and completed the barrier coverage with less node moving distance and lower energy consumption, and achieved the expected coverage requirements and objectives.
引用
收藏
页码:212 / 229
页数:18
相关论文
共 50 条
  • [31] Voronoi Diagram based Indoor Localization in Wireless Sensor Networks
    He, Chunrong
    Guo, Songtao
    Yang, Yuanyuan
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 3269 - 3274
  • [32] Local Coverage Optimization Strategy Based on Voronoi for Directional Sensor Networks
    Zhang, Guanglin
    You, Shan
    Ren, Jiajie
    Li, Demin
    Wang, Lin
    SENSORS, 2016, 16 (12)
  • [33] Hybrid Model Approach for Wireless Sensor Networks Coverage Improvement
    Boualem, Adda
    Ayaida, Marwane
    De Runz, Cyril
    2020 8TH INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM 2020), 2020, : 112 - 117
  • [34] A cluster-based barrier construction algorithm in mobile Wireless Sensor Networks
    Cheng, Chien -Fu
    Hsu, Chu-Chiao
    Pan, Meng-Shiuan
    Srivastava, Gautam
    Lin, Jerry Chun -Wei
    PHYSICAL COMMUNICATION, 2022, 54
  • [35] Achieving location error tolerant barrier coverage for wireless sensor networks
    Wang, Zhibo
    Chen, Honglong
    Cao, Qing
    Qi, Hairong
    Wang, Zhi
    Wang, Qian
    COMPUTER NETWORKS, 2017, 112 : 314 - 328
  • [36] Enhancing barrier coverage with β quality of monitoring in wireless camera sensor networks
    Guo, Ling
    Li, Deying
    Zhu, Yuqing
    Kim, Donghyun
    Hong, Yi
    Chen, Wenping
    AD HOC NETWORKS, 2016, 51 : 62 - 79
  • [37] Maximum lifetime dependable barrier-coverage in wireless sensor networks
    Kim, Donghyun
    Kim, Hyunbum
    Li, Deying
    Kwon, Sung-Sik
    Tokuta, Alade O.
    Cobb, Jorge A.
    AD HOC NETWORKS, 2016, 36 : 296 - 307
  • [38] Barrier Coverage in Wireless Visual Sensor Networks with Importance of Image Consideration
    Cheng, Chien-Fu
    Tsai, Kuo-Tang
    2015 SEVENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS, 2015, : 793 - 798
  • [39] The Adjacency Matrix-based Algorithm of Constructing Barrier Coverage in Underwater Wireless Sensor Network
    Chang, Juan
    Shen, Xiaohong
    Zhao, Hongyan
    2017 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (ICSPCC), 2017,
  • [40] Measuring and Guaranteeing Quality of Barrier-Coverage in Wireless Sensor Networks
    Chen, Ai
    Lai, Ten H.
    Xuan, Dong
    MOBIHOC'08: PROCEEDINGS OF THE NINTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, 2008, : 421 - 430