Vector method based coverage hole recovery in wireless sensor networks

Prasan Kumar Sahoo, Jang Zern Tsai, Hong Lin Ke

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

24 Scopus citations

Abstract

In Wireless Sensor Networks (WSN), sensors form the network dynamically without help of any infrastructure. The accidental death of the nodes due to technical failures or death due to power exhaustion may disturb the existing coverage and connectivity of the network. In this paper, distributed coverage hole recovery algorithms for the wireless sensor networks are designed that use the vector methods to decide the magnitude and direction of the mobile nodes. In the post deployment scenario, coverage holes of the network are repaired by moving the nodes in a self organized manner. To minimize the energy consumption of the nodes due to mobility, algorithms are designed in such a way that the mobility is limited within only one-hop of the nodes and highest coverage (k-coverage) of a node is not increased after its mobility. Performance evaluation of the proposed algorithms show that cent percent of coverage recovery could be possible by moving the nodes within their communication range. Besides, the average mobility distance of the nodes is very small to recover the coverage holes by our algorithms.

Original languageEnglish
Title of host publication2010 2nd International Conference on COMmunication Systems and NETworks, COMSNETS 2010
DOIs
StatePublished - 2010
Event2010 2nd International Conference on COMmunication Systems and NETworks, COMSNETS 2010 - Bangalore, India
Duration: 5 Jan 20109 Jan 2010

Publication series

Name2010 2nd International Conference on COMmunication Systems and NETworks, COMSNETS 2010

Conference

Conference2010 2nd International Conference on COMmunication Systems and NETworks, COMSNETS 2010
Country/TerritoryIndia
CityBangalore
Period5/01/109/01/10

Fingerprint

Dive into the research topics of 'Vector method based coverage hole recovery in wireless sensor networks'. Together they form a unique fingerprint.

Cite this