Coverage Optimization Strategy for WSN based on Energy-aware
Keywords:
WSN, coverage optimization, energy-aware, hole repair, sensing radiusAbstract
In order to optimize the wireless sensor network coverage, this paper designs a coverage optimization strategy for wireless sensor network (EACS) based on energy-aware. Under the assumption that the geographic positions of sensor nodes are available, the proposed strategy consists of energy-aware and network coverage adjustment. It is restricted to conditions such as path loss, residual capacity and monitored area and according to awareness ability of sensors, it would adjust the monitored area, repair network hole and kick out the redundant coverage. The purpose is to balance the energy distribution of working nodes, reduce the number of “dead” nodes and balance network energy consumption. As a result, the network lifetime is expanded. Simulation results show that: EACS effectively reduces the number of working nodes, improves network coverage, lowers network energy consumption while ensuring the wireless sensor network coverage and connectivity, so as to balance network energy consumption.
References
Mohamadi H., Ismail A.S., Salleh S. (2014); Solving target coverage problem using cover sets n wireless sensor networks based on leraning automata. Wireless Personal Communications, 5(1): 447-463 http://dx.doi.org/10.1007/s11277-013-1371-x
He S.B. et al. (2013); Barrier coverage in wireless sensor networks: From lined-based to urve-based deployment, Marco A, ed. Proc. of the 32nd IEEE Int'l Conf. on Computer ommunications , 10(9): 470-474 http://dx.doi.org/10.1109/infcom.2013.6566817
Chen J.M., Li J.K., Lai T.H. (2013): Energy-Efficient intrusion detection with a barrier of robabilistic sensors: Global and local; IEEE Trans. on Wireless Communications, 12(9): 742-4755 http://dx.doi.org/10.1109/TW.2013.072313.122083
Wu K., Gao Y., Li F., Xiao Y. (2005); Light weight deployment aware scheduling for wireless ensor network, ACM/Kluwer Mobile networks and Applications(MONET), 10(6):837-852.
Bulusu N., Heidemann J., Estrin D., Tran T. (2004); Self configuring Localization Systems: esign and Expermiental Evaluation, ACM Transac-tions on Embedded Computing Systems, (1): 24-60.
Khedr A.M., Osamy W. (2011); Minimum perimeter coverage ofquery regions in a heterogeneous ireless sensor network, Information Sciences, 181(15):3130-3142. http://dx.doi.org/10.1016/j.ins.2011.04.008
La GuilingWang, Guohong Cao T.P.(2006); Movement-assisted SensorDeployment, IEEE ransactions onMobile Computing, 5(6): 640-652.
Y. Yoon (2013); An efficient genetic algorithm for maximum coverage deployment in wireless ensor network, IEEE Transactions on Cybernerics, 45(5):1473-1483. http://dx.doi.org/10.1109/TCYB.2013.2250955
Giuseppe Anastasi et al(2009); Energy Conservation in Wireless Sensor Networks: A Survey, d Hoc Networks, 7(3) : 537-568.
Martins F.V.C. et al. (2011). A hybrid multiobjective evolutionary approach for improvingthe erformance of wireless sensor networks, IEEE Sensors Journal, 11(3): 545-554. http://dx.doi.org/10.1109/JSEN.2010.2048897
Wang D, Xie B, Agrawal DP (2008); Coverage and lifetime optimization of wireless sensor etworks with Gaussian distribution, IEEE Trans. on Mobile Computing, 7(12): 1444-1458 http://dx.doi.org/10.1109/TMC.2008.60
Amato G., Chessa S., Gennaro C., Vairo, C. (2011); Efficient detection of composite events n wireless sensor networks: Design and evaluation, Proc. of the IEEE Symp. on Computers nd Communications, 10(11):821-823. http://dx.doi.org/10.1109/iscc.2011.5983943
Yourim Y., Yong H.K. (2013); An efficient genetic algorithm for maximum coverage deployment n wireless sensor network, IEEE Transactions on Cybernetics, 45(5): 1473-1483.
Hossain A., Chakrabarti S., Biswas P.K. (2012); Impact of sensing model on wireless network overage, IET Wireless Sensor Systems, 2(3): 272-281.
Mini S., Udgata S.K., Sabat S.L. (2014); Sensor deployment and scheduling for target overage problem in wireless sensor networks, IEEE Sensors Journal, 14(3): 636-644. http://dx.doi.org/10.1109/JSEN.2013.2286332
Published
Issue
Section
License
ONLINE OPEN ACCES: Acces to full text of each article and each issue are allowed for free in respect of Attribution-NonCommercial 4.0 International (CC BY-NC 4.0.
You are free to:
-Share: copy and redistribute the material in any medium or format;
-Adapt: remix, transform, and build upon the material.
The licensor cannot revoke these freedoms as long as you follow the license terms.
DISCLAIMER: The author(s) of each article appearing in International Journal of Computers Communications & Control is/are solely responsible for the content thereof; the publication of an article shall not constitute or be deemed to constitute any representation by the Editors or Agora University Press that the data presented therein are original, correct or sufficient to support the conclusions reached or that the experiment design or methodology is adequate.