A Tabu Search WSN Deployment Method for Monitoring Geographically Irregular Distributed Events

被引:29
作者
Aitsaadi, Nadjib [1 ]
Achir, Nadjib [2 ]
Boussetta, Khaled [2 ]
Pujolle, Guy [1 ]
机构
[1] Univ Paris 06, LIP6, F-75016 Paris, France
[2] Univ Paris 13, L2TI, F-93430 Villetaneuse, France
关键词
Wireless Sensor Network Deployment; Differentiated detection; Connectivity; Tabu Search heuristic; COVERAGE;
D O I
10.3390/s90301625
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In this paper, we address the Wireless Sensor Network (WSN) deployment issue. We assume that the observed area is characterized by the geographical irregularity of the sensed events. Formally, we consider that each point in the deployment area is associated a differentiated detection probability threshold, which must be satisfied by our deployment method. Our resulting WSN deployment problem is formulated as a Multi-Objectives Optimization problem, which seeks to reduce the gap between the generated events detection probabilities and the required thresholds while minimizing the number of deployed sensors. To overcome the computational complexity of an exact resolution, we propose an original pseudo-random approach based on the Tabu Search heuristic. Simulations show that our proposal achieves better performances than several other approaches proposed in the literature. In the last part of this paper, we generalize the deployment problem by including the wireless communication network connectivity constraint. Thus, we extend our proposal to ensure that the resulting WSN topology is connected even if a sensor communication range takes small values.
引用
收藏
页码:1625 / 1643
页数:19
相关论文
共 18 条
[1]  
AITSAADI N, 2007, IEEE OES OCEANS 07
[2]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[3]  
[Anonymous], MOBIHOC 06
[4]  
Brusco MJ., 2005, Branch-and-bound applications in combinatorial data analysis, V2
[5]   Grid coverage for surveillance and target location in distributed sensor networks [J].
Chakrabarty, K ;
Iyengar, SS ;
Qi, HR ;
Cho, EC .
IEEE TRANSACTIONS ON COMPUTERS, 2002, 51 (12) :1448-1453
[6]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[7]  
CORREIA LHA, 2007, ELSEVIER COMPUTER NE
[8]  
DHILLON S, 2002, P INT C INF FUS
[9]  
Elfes A., 1991, AUTONOMOUS MOBILE RO, V1, P60
[10]  
Glover F., 1989, ORSA Journal on Computing, V1, P190, DOI [10.1287/ijoc.2.1.4, 10.1287/ijoc.1.3.190]