Localized algorithms for coverage boundary detection in wireless sensor networks

Chi Zhang, Yanchao Zhang, Yuguang Fang

Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

85 Citations (Scopus)

Abstract

Connected coverage, which reflects how well a target field is monitored under the base station, is the most important performance metric used to measure the quality of surveillance that wireless sensor networks (WSNs) can provide. To facilitate the measurement of this metric, we propose two novel algorithms for individual sensor nodes to identify whether they are on the coverage boundary, i.e., the boundary of a coverage hole or network partition. Our algorithms are based on two novel computational geometric techniques called localized Voronoi and neighbor embracing polygons. Compared to previous work, our algorithms can be applied to WSNs of arbitrary topologies. The algorithms are fully distributed in the sense that only the minimal position information of one-hop neighbors and a limited number of simple local computations are needed, and thus are of high scalability and energy efficiency. We show the correctness and efficiency of our algorithms by theoretical proofs and extensive simulations. © 2007 Springer Science+Business Media, LLC.
Original languageEnglish
Pages (from-to)3-20
JournalWireless Networks
Volume15
Issue number1
DOIs
Publication statusPublished - Jan 2009
Externally publishedYes

Bibliographical note

Publication details (e.g. title, author(s), publication statuses and dates) are captured on an “AS IS” and “AS AVAILABLE” basis at the time of record harvesting from the data source. Suggestions for further amendments or supplementary information can be sent to [email protected].

Research Keywords

  • Computational geometry
  • Connected coverage
  • Localized algorithm
  • Wireless sensor networks (WSNs)

Fingerprint

Dive into the research topics of 'Localized algorithms for coverage boundary detection in wireless sensor networks'. Together they form a unique fingerprint.

Cite this