Using Directional Antenna for Continuous Moving Object Tracking in WSN with Uncovered Holes

Using Directional Antenna for Continuous Moving Object Tracking in WSN with Uncovered Holes Zhefeng Sun, Huan Li State Key Laboratory of Software Deve...
Author: Edith Woods
1 downloads 0 Views 191KB Size
Using Directional Antenna for Continuous Moving Object Tracking in WSN with Uncovered Holes Zhefeng Sun, Huan Li State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University, Beijing, China Abstract—As a distinguished target monitoring system, wireless sensor networks have spawned great advances. Most existing work concentrates on improving the accuracy and energy saving in a fully covered area by making full use of omnidirectional antenna. In reality, however, due to the death of sensors caused by harsh environment or energy depletion, the target may enter into a hole that is not covered by sensors. On the other hand, representative researches on boundary detection do not take target tracking into consideration. To address this issue, we introduce the idea of applying directional antenna to accomplish mobile target tracking in WSN with uncovered holes. We propose a collaborative signaling protocol to achieve the goal of continuous target tracking with low-energy-consumption. Simulation results have shown that the proposed approach can realize the realtime detection of moving object when it runs into and out of the hole, and at the same time, consume much less energy than the omnidirectional antenna based methods.

I.

I NTRODUCTION

As a promising direction to enrich the interactions between physical world and human beings, wireless sensor networks (WSN) have emerged and simulate great changes in the collection and handling of information. One of the most important applications of wireless sensor networks is continuous moving target tracking, such as for wild animal habit monitoring and forest fire tracing. Different from the centralized monitoring system, the advantages of applying WSN in those applications are distinguished, since it catches with the physical world in real-time and thus can satisfy the quality of service, e.g, the demand of high accuracy of path detection.

investigated in this paper. Second, as the objects are moving, the path could be totally random. If it passed the hole, how to awake the relevant nodes that can catch up with the trace in real-time, but at the same time, keep low energy consumption is another objective that will be addressed here. Most existing work of target tracking concentrates on improving the accuracy and energy saving in a fully covered area by making full use of omnidirectional antenna [1], [2]. On the other hand, representative researches on boundary detection do not take target tracking into consideration [3]–[5]. The major contributions of this work are as follows. •

We introduce the idea of applying directional antenna to mobile target tracking in wireless sensor networks, which breaks the omnidirectional antenna’s presumption in this field.



We propose a collaborative based prediction algorithm to not only achieve continuous tracking, but also minimize the energy consumption by automatically switching the mode from active sensing to idle status for those boundary nodes that are not needed any more. In addition, a signaling protocol is applied in order to make real-time and accurate path prediction.



Extensive simulation results have shown that this proposed protocol can realize the real-time detection of moving target when it runs into and out of the hole, and at the same time, reduce energy consumption compared to the traditional representative methods.

Normally all nodes in the wireless sensor network are randomly deployed with some density to achieve full coverage. However, nodes may suffer from the harsh environment that may lead to the death of nodes. Due to the unexpected changes in the entire monitoring area, several holes (the subareas that are not covered by the sensing nodes) will appear as time elapses. Under the assumption that nodes are deployed unattended in the remote field, how to keep tracking moving objects in the environment where the sensor network functions well even holes exist is a challenging problem.

To the best of our knowledge, we are the first to propose to use direction antenna to achieve continuous moving target under the condition when the hole exits. This rest of the article is organized as follows. Section II surveys the related work. Section III presents the system models and problem statement. Section IV introduces the real-time tracking protocol. Section V discusses the performance evaluation. Finally, Section VI concludes the paper and points out the future work.

First, we never know when a hole may suddenly appear. The unequal death of nodes may be caused by the different energy depletion or the outside factors, e.g., fire or rain. How to predict whether the tracking target is moving into the hole and when it should come out is the first problem that will be

Target tracking algorithms in WSN: Moving target tracking is one of the most important applications in wireless sensor networks. Most of them aim at prolonging the network lifetime or meeting the demands of accuracy prediction in static sensor networks [1], [2], [6]. FindingHumo [7] relies on the complex construction to reduction of energy consumption. [8] tracks targets based on the combination of a Kalman Filter and

Corresponding author: Dr. Huan Li, [email protected].

II.

R ELATED WORK

maximum likelihood estimator. Bubble [6] takes accuracy as the major issue but the realtime property is not considered. Some special conditions, like the unreliable node sequence are discussed in [9], and [10] investigates the scenario in mobile sensor networks. Although those approaches try to either achieve energy efficiency or improve tracking accuracy, few of them take both requirements into consideration at the same time.

......

Directional antenna: The directional antenna has several advantages over the omnidirectional antenna, especially in the energy consumption and the reduction of collisions for multiple sensor nodes’ communication.

Fig. 1.

As an earlier research on MAC protocol with directional antenna, [11] designed MAC protocols for static wireless networks to reduce power consumption at the sensor nodes. Expect for the fundamental problems of MAC layer study, other issues such as the prediction of delay performance [12], the deafness/ hidden-terminal/exposed terminal problems [13], and neighbor discovery with a little amount of energy consumption [14], are investigated in recent research.

phenomena using a network of range sensors. [26] proposes and analyzes an algorithm to monitor an environmental boundary with mobile agents to optimally approximate the boundary with a polygon. Different from others, [4] aims at localized fault-tolerant event boundary detection. Adaptive estimation is to sparsely sample the field at random manner and determine where to sample next. [27] presents an efficient algorithm to actively select queries for identifying the boundaries.

With respect to routing protocol, [15] proposes algorithms for maximizing the lifetime, and [16] proposes dynamic source routing. In addition, ORRP [17] and MORRP [18] are lightweight-but-scalable routing protocols utilizing directional communications to relax information requirements.

According to our survey, no representative papers have investigated the mobile target tracking under the hole detection. What’s more, most of the algorithms focus on the improvement of the boundary detection’s accuracy and reduction of calculation time. Besides, how to take use of directional antenna to save energy is not considered in those scenarios.

As a pilot study of coverage with directional antenna in wireless sensor network, [19] proposes a set of optimal patterns to achieve full coverage and global connectivity under two different antenna models. Advanced researches include: the coverage and energy consumption control in mobile heterogeneous wireless sensor networks [20], optimal sensor deployment on 3D surfaces, aiming to achieve the highest overall sensing quality [21], and connectivity problem that is extremely challenging in the duty-cycled WSNs [22]. Till now, most researches using directional antenna in WSN are on the study of coverage, MAC layer and routing layer. The study of using directional antenna for continuous moving object tracking in WSN with uncovered holes remains to be considered. Hole detection and boundary discovery algorithms: As defined in [23], a boundary separates two regions of interest in a phenomenon, which can be visualized as an edge if there is a sharp change in the field value between the two regions or alternatively, as a contour with a field value f = τ separating two regions with field values f > τ and f < τ . Under this condition, holes can be defined as the area not covered by the sensing area of any nodes as τ = 0. This is different than the definition in BubbleTrace [6] where a hole refers to a target that is covered by less than three sensors. In this paper, we adopt the first definition. With regards to boundary discovery, several problems are discussed in the literature, i.e, field estimation, localized estimation and adaptive estimation. Field estimation is to sample the entire field and query for the points on boundary. [24] generates contour maps at the sink by gathering information from the whole network. Localized estimation is to identify which sensors lie on the boundary. [5], [25] examine the problem of tracking dynamic boundaries occurring in natural

mobile target’s tracking in the area where hole exists

III.

S YSTEM MODELS AND PROBLEM STATEMENT

A. Network model The wireless sensor network can be represented by a graph G(V, E), where V is the set of sensor nodes and E stands for the set of communication edges. Two nodes can communicate with each other only if their Euclidean distance is less than the maximum transmission distance given by the system settings. We assume that RT =3RS (RT denotes the transmission range and RS denotes the sensing distance.). This assumption is based on [28] in which the transmission range is proved to be at least twice of the sensing range to achieve a complete coverage of a convex area according to the investigation of the relationship between coverage and connectivity. Sensor nodes can turn on/off the communication function according to the system demand. We also assume that each sensor node is able to realize its location by GPS or related localization algorithms. Note here, how to achieve this is out of the scope of this work. B. Energy model In this work, we only consider the energy depletion for sensing and communication procedure and ignore others since they dominate the system energy consumption. As in previous work [29], the sensing energy is the product of voltage, electric current and time used to sense the environment, so the total sensing energy consumption is described in Eq. (1). The energy consumption for a communication process is represented in Eq. (2) [30]. The notations are shown in table I.

TABLE I.

E NERGY MODEL RELATED ATTRIBUTES

IV.

R EAL -T IME M OBILE TARGET D ETECTION P ROTOCOL

Notation

Meaning

Esensing

energy consumption for sensing

Vs

voltage

Is

electric current

tsi

time spent in sensing

Ecomm

energy consumption for communication

ET x

energy consumed in transmitting k bits data

ERx

energy consumed in receiving k bits data

Eelec ks

transmitters electric circuit consumed energy the number of bits sent

A. Detection of the hole

kr

the number of bits received

εamp

power amplifier consumed energy

r

communication range

λ

path loss

Suppose the nodes keep sensing with the interval of Δt until the target moves out of their sensing coverage area. At the moment when the node cannot catch the moving target, we can prove that the target must be in the neighbors’ sensing area. So once the target is moving out of the sight of current sensing nodes, these nodes will immediately send a startsensing packet to all its neighbors, and wait for the replies. If no sensed-ACK is received, the senders are considered to be on the boundary and the target has entered the hole; otherwise, the target does not enter the hole and the sensing procedure continues as in normal condition.

N  i=1

ESensingi (tsi ) =

N  i=1

= Vs ∗ Is ∗

When a hole exists, how to design a protocol to guarantee a real-time and low-energy consumption detection of the mobile target when it runs into and out of the hole is the problem to be addressed in this section. Three subproblems: 1) detection of the hole, 2) boundary node discovery, and 3) convergence of the protocol, are considered here. We assume that the design is based on a lossless channel.

(Vs ∗ Is ∗ tsi )

N 

i=1

(1) ts i

⎧ ⎨ Ecomm = ET x + ERx E =E ∗ k + εamp ∗ ks ∗ rλ ⎩ ET x = Eelec ∗ ks Rx elec r

(2)

If the transmission range is fixed, Eelec and rλ are constant, so we can set rλ = M ∗Eelec , where M is a constant. Thus, the total communication energy consumption is the sum of all the energy consumed in processes of transmission and reception, as follows: N 

Ecomm (i) =

i=1

N 

(ET x (i) + ERx (i))

i=1

= Eelec ∗ (

N 

ks (i) +

i=1

N  i=1

kr (i) +

N  i=1

(εamp (i) ∗ ks (i) ∗ M )) (3)

Note here, for directional antenna, the amplifier energy consumption is proportional to the angle [31]. C. Problem Statement The scenario addressed in this work can be depicted in Fig. 1. Suppose a moving object is walking/running across the hole in a field with a predictable average speed, and each sensor node knows its position and its one-hop neighbors’ information. The problem is: how the nodes can cooperate with one another to discover the hole accurately and detect the mobile target in time before it enters the hole and after it runs out of the hole. There are two objectives for solving this problem, they are: 1) to minimize the energy consumption in the communication and sensing processes; and 2) to guarantee the accuracy in real-time detection.

At initial stage, the nodes who firstly detect the existence of the hole will broadcast a hole-detection query signal to the nodes in all directions, and then initiate the boundary detection process (see the next section). Once the node can tell that it is on the boundary, it will then continue to send out holedetection signal to the next nodes on some directions using direction antenna and start sensing process till the target-catchup signal feedbacked/propogated to it. Then it is realized that the target has moving out of the hole and has been successfully detected by some sensing nodes on the boundary, the whole hole-detection process can thus stop. Except for the initial stage, in order to save energy, we design to take use of the direction antenna to transmit the signal to the neighboring nodes on the boundary. The problem is how to calculate the angle so that all nodes on the boundary can be covered. As illustrated in Fig.2, the receiver will choose a 180o degree in total from the sum of the angle of clockwise and counter-clockwise directions (each covering 90o ), based on the vector calculated from the position of sender to the receiver. Note here, we use a relative large angle so make sure that all boundary nodes can be covered for the signalling transition. In fact, in order to save the energy, the angle can be smaller and more adaptive to the scenario if the algorithm can predict the speed and the shape of the hole in more precise manners. This will be one of our future work. B. Boundary node discovery Although one node may receive several hole-detection signals from different nodes from one direction, for simplicity, upon the receipt of the first signal, this node will send out boundary-discovery query packet right away to the nodes in all directions at initial stage or some directions for the following steps, and then wait for the ACKs from those who received this packet. Other detection signals will be ignored since the first one already contains the proximity of the curve. Suppose the underneath protocol is CSMA-based MAC layer protocol, so it will not guarantee that all ACKs can

Path1

Path2

1000

1000

pos

600

600

pos

y

800

y

800

400

400

200

200

0

0

200

400

600

800

1000

0

0

200

400

x

Fig. 4.

Path1

Fig. 5.

1000

Path4 1000

pos

800

600

600

pos

y

800

y

Hole detection signalling process

800

Path2

Path3 1000

Fig. 2.

600 x

400

400

200

200

0

0

200

400

600

800

1000

0

0

200

x

Fig. 6.

400

600

800

1000

x

Path3

Fig. 7.

Path4

the timer to handle the neighboring case. Thus, we can draw a conclusion if the signal is received from another direction in the first time, the signalling protocol actually converges and no more signals need to be sent out.

Fig. 3.

Boundary discovery process

reach the sender without collision. To solve this problem, we introduce a threshold to help proceed the boundary discovery #ACK ≤ T hreshold, this node will process. That is: if #neighbors be identified as a boundary node. For any identified boundary node, it (1) starts hole-detection signal to some direction as discussed before; and (2) starts sensing target procedure. Otherwise, this node is not on the boundary, and it will stop involving in the hole detection process. Note here, #neighbors refers to the number of live neighbors (on the direction) that can be obtained using regular neighboring discovering process, and T hreshold is an empirical value that may be affected by the property of physical/MAC layer protocols. Still, for those nodes who need to tell if they are boundary nodes will also take use of directional antenna to send out the boundary-discovery packet instead of flooding to all directions, as illustrated in Fig.3. Here, we will use the hole-detection signal to calculate the 180o angle along the vector, to cover the area that faces to the hole. C. Convergence of the protocol The hole-detection signal may transit along the two directions of the hole. So if a sensor node receives a holedetection signal later again, it should check if it is from a different direction than previous ones. Since the time for one hop neighboring transition is relatively much shorter than the signal transition from another direction, we can easily design

Suppose the target may keep moving till out of the hole or stay for a while inside the hole and then move out. To handle both cases, in the protocol, we simply use the Stop signal to indicate the target-catch-up on the reversed path propagated back to the initial hole detection nodes. All sensing nodes that received this signal will stop sensing process immediately. Although the state about the neighboring boundary nodes should be maintained, the cost is very small since the number of those nodes is very limited.

V.

P ERFORMANCE E VALUATION

A. Experimental settings In this section, we evaluate the performance of the proposed protocol using simulation performed in NS3. We use the following parameters throughout the simulation: the sensed field is a rectangle with length 1000m and width 1000m, the sensors are randomly deployed and fixed, the default number of sensors is 450, the sensor’s transmission range RT and sensing range RS are 150m and 50m respectively, and the sensing interval is 0.1s. Four experiment settings are designed, where each contains an uncovered hole as follows: those nodes that are within the areas in the following coordinates are presumed to be dead: hole area 1 (x,y) = {(x, y)|x ∈ [575, 800], y ∈ [135, 285]}, hole area 2 (x,y) = {(x, y)|x ∈ [575, 800], y ∈ [135, 285]}, hole area 3 (x,y) = {(x, y)|x ∈ [650, 750], y ∈ [500, 700]}, hole area 4 (x,y) = {(x, y)|x ∈ [0, 200], y ∈ [800, 1000]}. Corresponding to each setting, one path is carried out as shown in Fig. 4-7. The design principles are based on different moving areas, turning around angles, running speed.

250000 200000 150000 100000 50000

proposed approach and the one using omnidirectional antenna. Fig.11 illustrates the results. As we can see, our method can not only converge, but also catch up the moving target in shorter delay than the one using omnidirectional antenna.

Directional OmniDirectional

90000

300000

Energy Consumption Factor2

Energy Consumption Factor1

100000

Directional OmniDirectional

350000

80000 70000 60000 50000 40000 30000

VI.

20000 10000

0

1

2

3

4

0

5

0

1

2

Path

Fig. 8.

Min objective one

Fig. 9.

4

5

Min objective two

14

Directional OmniDirectional

14000

3 Path

Directional OmniDirectional

10

10000

Delay(second)

Energy Consumption Factor3

12 12000

8000 6000

8 6

4000

4

2000

2

0

0

1

2

3

4

5

0

0

1

Path

Fig. 10.

2

3

4

5

Path

Min objective three

Fig. 11.

Real-time detection

B. Energy analysis According to the energy consumption models depicted in Eq. 1 and Eq. 3, the minimization of energy consumption can be obtained by the following three equations. Accordingly, Fig. 8 - Fig. 10 present the three corresponding results under the comparison of directional and omnidirectional antenna. ⎧ N N   ⎪ ⎪ ⎪ ks (i) + kr (i)) min( ⎪ ⎪ ⎪ ⎪ i=1 i=1 ⎪ ⎪ ⎪ N ⎨  (angle(i) ∗ ks (i))) min( ⎪ ⎪ i=1 ⎪ ⎪ ⎪ ⎪ N ⎪  ⎪ ⎪ ⎪ tsi ) ⎩ min(

C ONCLUSIONS AND FUTURE WORK

This paper presents continuous moving target tracking in WSN with uncovered holes. On one hand, we introduce the idea of using directional antenna, which breaks the omnidirectional antenna’s presumption in this field. On the other hand, we propose a collaborative based prediction algorithm and a signal protocol in order to realize a real-time and low-energyconsumption target tracking. Our simulations demonstrate the performance guarantee for real-time detection and reduction in energy consumption, compared to the approach using omnidirectional antenna. Though we have tackled the fundamental problem of using directional antenna to make continuous tracking possible in WSN under holes, several issues remains to be considered. For example, how to design an effective algorithm to precisely predict the boundary nodes and how to handle the unreliable and lossy channel are among the ones in our future work. ACKNOWLEDGMENT This work has been supported by National Natural Science Foundation of China (NSFC)(No. 61170293); the Scientific Research Foundation for the Returned Overseas Chinese Scholars, State Education Ministry; State Key Laboratory of Software Development Environment (SKLSDE-2012ZX-03). R EFERENCES

(4)

i=1

We have the following observations. First, the total number of bits sent and received (Fig. 8) in the approach using omnidirectional antenna is 1.6 to 3.3 times as much as that of the proposed approach. Second, the ratio of the minimal objective factor 2 (Fig. 9) between the the proposed approach and the one using omnidirectional antenna can be as much as 1:6, because of the small angle in the directional transmission. Third, the total sensing time (Fig. 10) of the proposed approach is less than that of the one using omnidirectional antenna, especially in path4, which is the result of on-demand sensing in the proposed approach. In summary, the proposed protocol outperforms the one using omnidirectional antenna for all different paths under different uncovered scenarios.

[1]

[2]

[3]

[4]

[5]

[6]

[7]

C. Real-time analysis The performance evaluation of real-time target tracking can be measured by the delay of the time between the moment when the target is moving out of the hole and the moment it is detected by some boundary nodes. Still, we compared the

[8]

P. Vicaire, T. He, Q. Cao, T. Yan, G.Zhou, L.Gu, L.Luo, R. Stoleru, J. A. Stankovic, and T. F. Abdelzaher, “Achieving long-term surveillance in vigilnet,” ACM transactions on Sensor Networks, vol. 5, no. 1, pp. 1–39, feb 2009. T. Jing, H. Snoussi, and C. Richard, “Decentralized variational filtering for target tracking in binary sensor networks,” IEEE Transactions on Mobile Computing, vol. 9, no. 10, pp. 1465–1477, oct 2010. H. Miao, C. Ooi, X. Wu, and C. Schindelhauer, “Coverage-hole trap model in target tracking using distributed relay-robot network,” in Proceedings of 2010 ACM Symposium on Applied Computing (SAC2010), Sierre, Switzerland, mar 2010, pp. 1299–1304. M. Ding, D. Chen, K. Xing, and X. Cheng, “Localized fault-tolerant event boundary detection in sensor networks,” in Proceedings of INFOCOM 2005, 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Florida, USA, mar 2005, pp. 902–913. S. Duttagupta, K. Ramamritham, P. Kulkarni, and K. Moudgalya, “Tracking dynamic boundary fronts using range sensors,” in Proceedings of the 5th European conference on Wireless sensor networks (EWSN2008), Bologna,Italy, jan 2008, pp. 125–140. P. Chen, Z. Zhong, and T. He, “Bubble trace: Mobile target tracking under insufficient anchor coverage,” in Proceedings of the 31st International Conference on Distributed Computing Systems (ICDCS2011), Minnesota, USA, june 2011, pp. 770–779. D. De, W. Song, M. Xu, C. Wang, D. Cook, and X. Huo, “Findinghumo: Real-time tracking of motion trajectories from anonymous binary sensing in smart environments,” in Proceedings IEEE of 32nd International Conference on Distributed Computing Systems (ICDCS2012), Macau, China, june 2012, pp. 163–172. X. Wang, M. Fu, and H. Zhang, “Target tracking in wireless sensor networks based on the combination of KF and MLE using distance measurements,” IEEE Transactions on Mobile Computing, vol. 11, no. 4, pp. 567–576, apr 2012.

[9]

Z. Zhong, T. Zhu, D. Wang, and T. He, “Tracking with unreliable node sequences,” in Proceedings IEEE of INFOCOM2009, Rio de Janeiro, Brazil, april 2009, pp. 1215–1223.

[10]

F. Mourad, H. Chehade, H. Snoussi, F. Yalaoui, L. Amodeo, and C. Richard, “Controlled mobility sensor networks for target tracking using ant colony optimization,” IEEE Transactions on Mobile Computing, vol. 11, no. 8, pp. 1261–1273, aug 2012.

[11]

S. Zhang and A. Datta, “A directional-antenna based mac protocol for wireless sensor networks,” in Proceedings of the 2005 international conference on Computational Science and Its Applications(ICCSA2005), Singapore, may 2005, pp. 686–695.

[12]

E. Felemban, S. Vural, R. Murawski, E. Ekici, K. Lee, Y. Moon, and S. Park, “Samac: A cross-layer communication protocol for sensor networks with sectored antennas,” IEEE Transactions on Mobile Computing, vol. 9, no. 8, pp. 1072–1088, aug 2010.

[13]

A. Abdullah, L. Cai, and F. Gebali, “Dsdmac: Dual sensing directional mac protocol for ad hoc networks with directional antennas,” IEEE Transactions on Vehicular Technology, vol. 61, no. 3, pp. 1266–1275, mar 2012.

[14]

R. Murawski, E. Felemban, E. Ekici, S. Park, S. Yoo, K. Lee, J. Park, and Z. H. Mir, “Neighbor discovery in wireless networks with sectored antennas,” Ad Hoc Networks, vol. 10, no. 1, pp. 1–18, apr 2012.

[15]

A. Orda and B.-A. Yassour, “Maximum-lifetime routing algorithms for networks with omnidirectional and directional antennas,” in Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing(MobiHoc2005), IL, USA, may 2005, pp. 426–437.

[16]

R. R. Choudhury and N. H. Vaidya, “Performance of ad hoc routing using directional antennas,” Ad Hoc Networks, vol. 3, no. 2, pp. 157– 173, mar 2005.

[17]

B.-N. Cheng, M. Yuksel, and S. Kalyanaraman, “Orthogonal rendezvous routing protocol for wireless mesh networks,” IEEE/ACM Transactions on Networking, vol. 17, no. 2, pp. 542–555, april 2009.

[18]

C. Bow-Nan, Y. Murat, and K. Shivkumar, “Using directionality in mobile routing,” Wireless Networks, vol. 16, no. 7, pp. 2065–2086, oct 2010.

[19]

Z. Yu, J. Teng, X. Bai, D. Xuan, and W. Jia, “Connected coverage in wireless networks with directional antennas,” in Proceedings IEEE of INFOCOM 2011, Shanghai,China, april 2011, pp. 2264–2272.

[20]

X. Wang, S. Han, Y. Wu, and X. Wang, “Coverage and energy consumption control in mobile heterogeneous wireless sensor networks,” IEEE Transactions on Automatic Control, no. 99, pp. 1–15, oct 2012.

[21]

M. Jin, G. Rong, H. Wu, L. Shuai, and X. Guo, “Optimal surface deployment problem in wireless sensor networks,” in Proceedings IEEE of INFOCOM 2012, Florida, USA, march 2012, pp. 2345–2353.

[22]

S. He, J. Chen, and Y. Sun, “Coverage and connectivity in duty-cycled wireless sensor networks for event monitoring,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 3, pp. 475–482, march 2012.

[23]

S. Srinivasan, S. Duttagupta, P. Kulkarni, and K. Ramamritham, “A survey of sensory data boundary estimation, covering and tracking techniques using collaborating sensors,” Pervasive and Mobile Computing, vol. 8, no. 3, pp. 358–375, 2012.

[24]

X. Meng, T. Nandagopal, L. Li, and S. Lu, “Contour maps: monitoring and diagnosis in sensor networks,” Computer Networks, vol. 50, no. 15, pp. 2820–2838, oct 2006.

[25]

S. Duttagupta, K. Ramamritham, and P. Kulkarni, “Tracking dynamic boundaries using sensor network,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 10, pp. 1766–1774, oct 2011.

[26]

S. Susca, F. Bullo, and S. Martinez, “Monitoring environmental boundaries with a robotic sensor network,” IEEE Transactions on Control Systems Technology, vol. 16, no. 2, pp. 288–296, mar 2008.

[27]

B. Bryan, J. Schneider, R. Nichol, C. Miller, C. Genovese, and L. Wasserman, “Active learning for identifying function threshold boundaries,” in Advances in Neural Information Processing Systems 18, Cambridge, MA, 2006, pp. 163–170.

[28]

X. Wang, G. Xing, Y. Zhang, C. Lu, R. Pless, and C. Gill, “Integrated coverage and connectivity configuration in wireless sensor networks,” in Proceedings of the 1st international conference on Embedded networked sensor systems(SenSys2003), California, USA, 2003, pp. 28–39.

[29]

H. Zhou, D. Luo, Y. Gao, and D. Zuo, “Modeling of node energy consumption for wireless sensor networks,” Wireless Sensor Network, vol. 3, no. 1, pp. 18–23, 2011. [30] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “An application-specific protocol architecture for wireless microsensor networks,” IEEE Transactions on Wireless Communications, vol. 1, no. 4, pp. 660–670, oct 2002. [31] J. Cho, J. Lee, T. Kwon, and Y. Choi, “Directional antenna at sink (daas) to prolong network lifetime in wireless sensor networks,” in Proceedings of the 12th European Wireless Conference 2006 - Enabling Technologies for Wireless Multimedia Communications (European Wireless), Athens,Greece, april 2006, pp. 1–5.

Suggest Documents