SlideShare a Scribd company logo
ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010




    A Fuzzy Based Priority Approach in Mobile
            Sensor Network Coverage
                          Bahareh J. Farahani, Hossein Ghaffarian ,Mahmood Fathy
              Computer Engineering School, Iran University of Science and Technology, Tehran, Iran
                     Farahani.ict@gmail.com, Ghaffarian@iust.ac.ir, MahFathy@iust.ac.ir

Abstract— In this paper a new fuzzy based approach for            effectiveness of this algorithm, our algorithm is
improving network coverage in wireless mobile sensor              compared with FOA [1], TRI [2] and VEC [3]
networks is proposed. In the proposed approach firstly            algorithms. Comparison will show that our algorithm
each mobile sensor node determines its neighbors and its          exhibit better performance.
distance from borders and obstacles. According to these
values, fuzzy inference engine calculates the priority of
                                                                     This paper is organized as follows: In section II, an
node for movement. Then according to the priority, in             overview on related approaches is presented. Section
turn, nodes move away from each other to increase                 III consists of problem setup and an overview and
coverage area in the target field. Simulation results show        analysis of effective parameters on the position of
that our fuzzy approach can reach higher degree of                mobile sensors. How to fuzzy reasoning and proposed
coverage against other common approaches like FOA,                method have been describe in section IV and the results
VEC and TRI algorithms.                                           of performance evaluation of our method, FOA, VEC
                                                                  and TRI algorithms have been presented in section V.
Index Terms— Mobile Sensor Network, Coverage, Fuzzy
                                                                  Finally the paper has been concluded in section VI.
Priority, Movement

                                                                                   II. RELATED APPROACHES
                     I. INTRODUCTION
                                                                     Dealing with coverage problem, researchers have
   Advances in Micro Electro Mechanical Systems
                                                                  proposed numerous solutions. Some algorithms are
(MEMS), embedded processors and wireless
                                                                  based on the notion of potential field [4], [5], [6] and
communications have enabled the expansion of multi-
                                                                  virtual forces[7],[8] after an initial random deployment.
functional, low-cost and tiny sensor nodes which can
                                                                     The next three distributed self deployment
sense the environment, perform data processing and
                                                                  algorithms proposed in [3] known as the VEC, VOR,
communicate with each other over short distances.
                                                                  and Minimax are based on the structure of Voronoi
Wireless sensor networks (WSNs) are playing an
                                                                  diagram in which nodes are relocated to fill up
increasingly significant role in a wide range of
                                                                  coverage holes.
applications such as environmental conditions
                                                                     The vector-based algorithm, VEC, pushes nodes
monitoring, wildlife monitoring, security surveillance
                                                                  away from densely covered areas to sparsely covered
in military and battle-fields, nuclear, smart homes and
                                                                  areas. Two nodes exert a repulsive force when they are
offices, improved medical treatment, industrial
                                                                  too close to each other. VOR is a greedy strategy that
diagnosis, etc. The concept of area coverage can be
                                                                  pulls nodes towards the locations of their local
considered as a measure of the quality of service (QoS)
                                                                  maximum coverage holes. The MiniMax algorithm is
in a wireless sensor network. Random deployment of
                                                                  very similar to VOR; it moves a node inside its
nodes often does not guarantee full coverage, resulting
                                                                  Voronoi polygon, such that, the distance from its
in accumulation of nodes at certain parts of the sensing
                                                                  farthest Voronoi vertex is minimized. In [9] and [10],
field while leaving other parts deprived of nodes. Some
                                                                  an incremental and greedy self-deployment algorithm is
of the deployment strategies take advantage of mobility
                                                                  presented for mobile sensor networks in which nodes
to relocate nodes to sparsely covered regions after an
                                                                  are deployed one at a time into an unknown
initial random deployment to improve coverage. Thus
                                                                  environment. Each node makes use of the information
as a solution, mobile sensor networks (MSNs) can be
                                                                  gathered by previously deployed nodes to determine its
used for network coverage improvements.
                                                                  optimal deployment location. Conceptually, it is similar
   In this paper, a novel algorithm for placement of
                                                                  to the frontier-based approach [11]; however, in this
mobile sensors is designed. The main result of this
                                                                  case, occupancy maps are built from live sensory data
paper is as follows:
                                                                  and are analyzed to find frontiers between the free
   A Fuzzy logic method is described to find the
                                                                  space and the unknown space.
movement priority for mobile sensors and a distributed
                                                                     The TRI algorithm is proposed in [2]. The basic idea
fault tolerant, self deployment and iterative algorithm
                                                                  of TRI algorithm is to adjust the distance between two
to cover an area. Mobile sensors only need to have
knowledge of their location and with the assistance of            Delaunay neighbors to                . After several rounds
local communication they will act in a completely                 of such adjustments, the layout of the network will be
distributed fashion. To demonstrate the generality and


                                                             45
© 2010 ACEEE
DOI: 01.ijns.01.02.09
ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010


close to the ideal equilateral triangle layout. As a result,        Sensor equipment: Each mobile sensor is equipped with
the coverage area of the network will be maximized.                 a battery that provides sufficient power to move and
   The ATRI algorithm [2] is offered in order to reduce             exchange information with other sensors. There is also
the back-and-forth movement of nodes.                               a memory in each sensor which used to preserve
   The algorithms described in previous apply to                    require information of network elements.
networks where all the nodes are capable of moving
                                                                    B. Effect of Adjacent Nodes
around. However, there is a high cost associated to
make each node mobile; a balance can be achieved by                    Cellular networks are a good example of an
using a combination of static and mobile nodes, usually             engineering task for supporting and presenting good
referred to as hybrid sensor networks, while still                  quality of coverage in network. Due to easier
ensuring sufficient coverage. In [12], such a protocol is           calculations, in these networks, engineers have used
described, called the bidding protocol, where the                   hexagonal shapes for each cell. It has been proven [2]
problem is reduced to the well-known NP-hard set-                   that in ideal layout, the sensors are located in vertices
covering problem.In [1] a Fuzzy Optimization                        of equilateral Delaunay triangles [16] with edge length
Algorithm (FOA) is proposed to deploy sensors                       of              . By this layout, the coverage area of
efficiently. Authors use the number of neighbors and                nodes will be maximized with the minimum coverage
average Euclidean distance between sensors as inputs                overlap.
of the proposed Fuzzy reasoning engine algorithm and                   Using this value as a standard distance between
get a distance measure as output. In proposed algorithm             neighbor nodes, if the distance between two nodes
each sensor calculates the forces imposed by the other              becomes shorter than this distance, the virtual force
sensors within its communication range. Then by                     between them will push them to move away from each
applying Coulomb’s law and accumulating the vectors                 other.
of all the forces, the sensor can calculate the magnitude
                                                                    C. Effect of Borders and Obstacles
and the angle of its next movement vector in order to
move toward the new next location.                                     Coverage in the presence of obstacles is a
                                                                    challenging problem. In order to make the deployment
     III. PROBLEM SETUP AND EFFECTIVE COMPONENTS                    algorithm more practical, the sensors must be able to
                                                                    avoid obstacles and boundaries. Because an accurate
   Before describing proposed method, it is necessary               map of the sensing area may not always be available
to describe some related concepts and effective                     before the deployment, it is assumed that each sensor is
components on the position of a mobile sensor in a                  equipped with an ultrasonic obstacle-detecting module,
target field. In proposed method, effects of these                  which makes it possible to detect obstacles when it
components have been collected.                                     moves close enough to the obstacles. In order to avoid
A. Preliminaries                                                    the coverage gap or overlap between nodes and
                                                                    boundaries, intuitively, the optimum distance between
Two-dimensional deployment: It is assumed that all                  adjacent nodes and boundaries should be shorter than
devices are located in two dimensions plan.
                                                                              .
Location awareness: Knowing the location of sensor
nodes is important for our algorithm. Many techniques
have been proposed to supply this information for
mobile sensors [13],[14].
Boundary and Obstacle detecting: It is assumed that
each sensor node is equipped with an ultrasonic
obstacle detecting module which makes it possible to
detect boundaries when it moves close enough to it.
                                                                     Figure 1. The effect of adjacent nodes causes a   distance
Sensing model: Each sensor node in our algorithm is
                                                                                              between them.
associated with a sensing area which is represented by
                                                                       In Fig. 1, if the dashed line between two cells is
a circle with the same Sensing Radius. This Circular
                                                                    considered as a boundary, the distance between the
area is called Sensing Range and depends on several
factors in the network [15]. A sensor node can detect               node and the boundary should be set                , but
all the events in its Sensing Range. The areas which are            using this approach will make some uncovered
not covered by these circles are called coverage holes.             triangular holes beside the boundary. In order to avoid
Radio range: Apart from Sensing Range, each sensor                  the coverage gap, as shown in Fig. 2, the point P must
has a Communication Range which is much longer than                 touch the boundary. By preliminary mathematics in
Sensing Range. When a node broadcasts a message, all                geometry, an effective distance between boundaries or
the sensor nodes in its Communication                               obstacles and mobile sensor nodes can be calculated.
Range will receive this message.                                    As mentioned in section B, the distance of two adjacent
                                                                    mobile sensor nodes has to be adjusted to              .
                                                                    Thus, the distance between a node and a boundary must


                                                               46
© 2010 ACEEE
DOI: 01.ijns.01.02.09
ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010



to be adjusted to           instead of                               as        the communication range of that node will get this
shown in below calculation.                                                    message and will wait for a specific time (T wait) to
                                                                               receive all possible HELLO messages from the
                                                                               network. In this interval time, nodes will start to update
                                                                 -1            their Neighboring Matrix that is consists of gathered
                                                                               information from other mobile nodes around it. The
                                                                               mobile nodes which have some changes in their
                                                                               neighboring matrix will broadcast their information as
                                                                               a new HELLO message and will set a counter
                                                                                          (                    ). If within           no
                             P                                                 new HELLO message is received, the node starts to use
   Figure 2. The effect of a border or obstacle on a node causes a
                                                                               fuzzy controller to define its priority for movement.
                             distance between them.
                                                                                  The proposed fuzzy controller has two inputs:
                                                                                    • Number of mobile nodes in the sensing range of
D. Effect of Corners                                                                  the node
                                                                                    • Length of Sensing Shadow on boundaries or
   A corner is the junction of at least two different                                 obstacles.
boundaries. Thereby the proposed effective distance
that has been calculated in section C, is not efficient                          Definition 1. In a two-dimensional mode, sensing
here. For achieving a full coverage at corners, sensor                         shadow is the length of boundary which is inside the
must become close enough to the furthest point at the                          sensing range of the sensor node.
corner. Therefore mobile sensor node must stand at
distance        from the furthest point of corner. This
value does not affected by different angels of corners.
In the case of multiple corners, sensor will move
toward the farthest vertex of corners and stop when the                                                                 Distance
                                                                                                                        from
farthest corner vertex can be seen within the sensing                                                                   border/obst
                                                                                                                        acle
radius of mobile node.
                                                                                                                          Sensing
                                                                                                                          Shadow

                                                                                          Figure 4. A schematic of sensing shadow.

                                                                                  Sensing shadow can be calculated in the same way
                                                                               of equation (1) and its value is between                  .
                                                                               If the distance between mobile node and boundary or
                                                                               obstacle is greater than or equal to         , the sensing
 Figure 3. The effect of a corner on a node causes a       distance            shadow will be zero and if mobile node sticks to the
                   from farthest vertex of corner.                             boundary or obstacle, the sensing shadow will be
                                                                                        . This parameter is used to define the priority of
           IV. PROPOSED FUZZY BASED APPROACH                                   standing in place for mobile sensor nodes. The nodes
                                                                               with minimum distance from borders or obstacles have
   Fuzzy reasoning tries to continue the way of natural                        highest priority for standing and should move after
reasoning of human. It can present more smooth results                         their adjacent nodes.
than common proposed methods in reasoning. How to                                 The maximum number of hexagonal neighbor cells
use fuzzy reasoning in a manner to make decision                               is six; therefore in the proposed algorithm it is assumed
procedures for deployment of mobile sensor nodes in a                          that more than six neighbors is the worst case for initial
target field is described in this section.                                     deployment. So the number of neighbors is limited to
A. Fuzzy Based Priority Coverage Algorithm (FBPC)                              ten as an upper bound for our controller so the
                                                                               controller will omit other extra neighbors
   Proposed method consists of two phases: First                               automatically. In order to normalizing the value of
gathering information of neighbors and determining the                         sensing shadow into [0-1], it is divided by          .
priority of mobile sensor node to move and second                                 The linguistic variables to represent the number of
calculating movement vector. At the first phase, the                           mobile nodes in the sensing range of the node are
nodes try to find other mobile sensor nodes within their                       divided into three levels: high, average and low; and
communication range and also detect boundaries and                             those to represent the Length of Sensing Shadow are
obstacles and the distance from them.                                          also divided into three levels: high, average and low.
   After being activated, each node waits for a random                         The consequent is divided into five levels: very high,
time and then broadcasts a HELLO message including
its position in the target area. The sensors which are in


                                                                          47
© 2010 ACEEE
DOI: 01.ijns.01.02.09
ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010


high, average, very low and low. Table 1 summaries the                 of its neighbor nodes, boundaries, obstacles and
rules and consequents.                                                 corners. In our model, each node s i is subjected to three
   One example of rules is as follows:                                 kinds of forces: (1) an attractive or repulsive force F i j ,
   IF the number of mobile nodes in the sensing range                  by another node sj depending on its distance and
of sensor i is high and length of Sensing Shadow of                    orientation from si, (2) a repulsive force F i B, exerted by
sensor i on boundaries or obstacles is low, THEN the                   obstacles or boundaries, and (3) a repulsive force F i C,
standing priority result of sensor i will be very high.                exerted by corners. The net force on a sensor s i is the
                                                                       vector sum of all the above forces. Table 2 summaries
                       TABLE 1.                                        these three types of forces.
   RULE BASE OF THE PROPOSED FUZZY STANDING PRIORITY                     After calculating movement vector and defining
                           CONTROLLER                                  destination, the node will send a GOODBYE packet
                                                                       that consists of the new calculated position of mobile
         Priority                   Neighbor Number                    node. Then lowest priority mobile node runs into the
      Controller Rules       Low       Average         High
                                                                       new position. Other nodes will update their neighboring
                                                                       matrix information after receiving GOODBYE packet
                                         Very                          and use this updated version in their calculation to find
                  Low       High                    Very High
      Sensi                              High
                                                                       their final position.
       ng        Averag
      Shad         e
                             Low       Average         High               After moving all nodes, this algorithm will be
       ow                    Very                                      repeated again until nodes have not any changes in
                  High                   Low           High
                             Low                                       their positions. Algorithm 1 shows a pseudo code of the
                                                                       proposed Fuzzy Based Priority Coverage (FBPC)
  Fig. 5 shows input and output membership functions                   algorithm.
of our proposed fuzzy controller. The nodes with                       1:    FBPC ()
lowest standing priority must move first in a group of                 2:    {
adjacent mobile sensor networks.                                       3:      while ()
                                                                       4:      {
                                                                       5:        Stand for a random time t
                                                                       6:        Broadcast a HELLO packet
                                                                       7:            Stand for T wait to receive all possible HELLO
                                                                       8:    packets
                                                                       9:        Update Neighboring matrix
                                                                       10:       If there are some changes in Neighboring matrix
                                                                       11:        {
              a. Neighbor Number membership function                   12:           Broadcast a HELLO packet.
                                                                       13:           Stand for Tthreshold
                                                                       14:            If within T threshold some new HELLO message
                                                                       15:           is received
                                                                       16:                go to line 8
                                                                       17:         }
                                                                       18:          If there are not any changes in the position of
                                                                       19:       node and its adjacent nodes
                                                                       20:                  break;
              b. Sensing shadow membership function                    21:       Calculate Sensing Shadow
                                                                       22:       Determine movement turning according to the
                                                                       23:       standing priority of node using Fuzzy priority
                                                                       24:       controller
                                                                       25:           Stand until receiving movement turning of the
                                                                       26:       nodes and update the Neighboring matrix
                                                                       27:       according to the
                                                                       28:        information of the receiving GOODBYE packets
                  c. Priority membership function                      29:          Calculate MOVEMENT VECTOR according to
                                                                       30:       the Neighboring matrix
  Figure 5. Membership functions of the proposed Fuzzy Priority        31:           Broadcast GOODBYE packet and travel to the
                          controller.                                  32:       new position in target field
                                                                               }
                                                                             }
At this stage, there is no need for nodes to rebroadcast
information of their priorities, because each mobile
sensor can easily calculate the priority of its neighbors.
At the second phase, each node with minimum standing
priority can move before other nodes. So sensor will
calculate its MOVEMENT VECTOR based on forces


                                                                  48
© 2010 ACEEE
DOI: 01.ijns.01.02.09
ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010


                                                                   simulation round: total coverage, average moving
                         TABLE 2.
            TYPES OF FORCES EACH NODE ENCOUNTERS
                                                                   distance and average number of rounds. Fig. 6 shows
                                                                   the total coverage of three algorithms as the number of
                                                                   sensors increases.
                                                Related
                   Force                       Standard
                                               Distance

   Fij=Standard Distance between nodes
   -d(si,sj)
   FiB=Standard Distance from boundary
   -d(si,boundary)
   FiC=Standard Distance from corner-
   d(si,boundary)
                                                                                    Figure 6. Total coverage
 A Robust Algorithm                                                   From the figure, it can be seen that the FBPC
   In some situations, a sensor may calculate a new                algorithm prepares the best total coverage. The primary
position; but when it wants to move, because of some               reason is that unlike other algorithms, FBPC
environmental conditions like holes, dead-end paths,               paysattention to obstacles and boundaries and keeps
etc; it could not reach destination target position. In            distance from them in order not to waste its sensing
such conditions FBPC algorithm is robust; because if               range.
one of the nodes cannot move to its final position, in                Also, it can be seen that in sparse conditions, VEC
the next round of algorithm, it can contribute in new              algorithm stands in the second place, but in dense
making decision routine according to the information               conditions, VEC is replaced by FOA.
of its new position, not previous announced                        Another dimension of evaluation is the average moving
information. Therefore, FBPC is a fault tolerant                   distance. As depicted in Fig.7, TRI algorithm performs
algorithm that can tolerate probable mistakes and can              the worst in average moving distance a mong FBPC,
correct its behavior in further rounds. Even if there are          FOA, and VEC, Because in TRI mobile nodes are
some errors in collecting local messages via network,              located in a unique point in target field and after
FBPC can recover its action in consequent rounds.                  calculating their accurate positions, they will move.
                                                                   Thus they must move more.
              V. PERFORMANCE EVALUATION                               After TRI, FBPC algorithm has the bigger average
                                                                   moving distance. This happens because it tries to do a
A. Objectives and Metrics                                          fast deployment and reach to a high level of coverage.
   Our deployment protocols have been implemented in               Also in FBPC, nodes move away from borders and
Matlab (version R2008a). Our objective in conducting               obstacles. Results of VEC and FOA can be compared
this evaluation study is: by comparing FOA, TRI, VEC               with their coverage values. More coverage needs more
and our algorithm giving some insight on choosing                  moving distance.
suitable algorithm in different situations.
   The simulations are run under different sensor
densities, which determines the sensor coverage that
can be reached and the difficulty to reach it. In a 100 m
×100 m target field, five different numbers of sensors
have been distributed, ranging from 60 to 140 in
increment of 20 sensors. The initial deployment of
proposed algorithm, FOA and also VEC algorithm
follow the random distribution, however in TRI,                                 Figure 7. Average moving distance
according to [2], at the beginning of the experiment,
sensors are randomly placed within a            1m × 1m               The number of rounds in FOA algorithm is high.
compact square, which is centered at point (50m, 50m).             Although some of the authors disregard the effect of
Then the nodes explode to a large evenly deployed                  message complexity in increasing energy consumption,
layout. To evaluate each metric under different                    this cannot be ignored by increase in number of rounds.
parameter setting, 5 experiments based on different                Calculated from Robomote [17],[3], approximately, to
initial distribution are run and the average results are           move a sensor one meter consumes a similar amount of
beening calculated. The Sensing Range is set to be 6               energy as transmitting 300 messages . Assume that in
meters and 20 meters as the Communication Range.                   each round each sensor transmits one packet for a
                                                                   network with 100 sensors, by running the FOA
B. Simulation Results                                              algorithm after each 3 rounds and 30 rounds, the
   In order to evaluate the performance and cost of the            movement distance of nodes will be increased 1m and
three algorithms, three metrics are measured for each


                                                              49
© 2010 ACEEE
DOI: 01.ijns.01.02.09
ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010


10m, respectively. Moreover it is assumed that all                       Communications and Networking Conference, Vol.
packets can be transmitted without any error.                            3, pp.1903 – 1908, 13-17 March 2005.
   Random distribution of sensors occurs in urgent                [2]    Ma, M. and Yang, Y., “Adaptive Triangular Deployment
cases or for some special application. In such an urgent                 Algorithm for Unattended Mobile Sensor Networks”,
                                                                         IEEE Transactions on Computers, Vol. 56, NO. 7, pp.
situation, the fast deployment of the sensors is in the                  946 – 847, JULY 2007.
first priority. In this case the performance of the FOA           [3]    Wang, G., Cao, G. and La Porta, T. ,“Movement-
algorithm is not applicable at all, whereas FBPC                         Assisted Sensor Deployment”, IEEE Transaction on
algorithm presents better coverage with fast reaction.                   Mobile Computing, Vol.5, no.6, pp. 640–652, June 2006.
   Fig. 8 shows the result of average number of rounds            [4]    O. Khatib, “Real-time obstacle avoidance for
in algorithms.                                                           manipulators and mobile robots”, International Journal
                                                                         of Robotics Research, pp. 90–98, 1986.
                                                                  [5]    A. Howard, M. Mataric and G. Sukhatme, “Mobile
                                                                         sensor network deployment using potential fields: A
                                                                         distributed scalable solution to the area coverage
                                                                         problem”, Proceedings of the 6th International
                                                                         Symposium on Distributed Autonomous Robotic
                                                                         Systems, Fukuoka, Japan, pp. 299–308,June 2002.
                                                                  [6]    S. Poduri, G.S. Sukhatme, “Constrained coverage in
                                                                         mobile sensor networks”, Proceedings of IEEE
                                                                         International Conference on Robotics and Automation,
             Figure 8. Average number of rounds                          New Orleans, LA, pp. 40–50, April–May 2004.
                                                                  [7]    Y. Zou, K. Chakrabarty, “Sensor deployment and target
   As it can be seen, FBPC and VEC achieve quite                         localization    in   distributed   sensor    networks”,
                                                                         Transactions on IEEE Embedded Computing Systems,
similar number of rounds and they can deploy very
                                                                         pp. 61–91, 2004.
fast. As this figure shows, FOA algorithm has the worst           [8]    Y. Zou, K. Chakrabarty, “Sensor deployment and target
performance.                                                             localization based on virtual forces”, Proceedings of
   Selecting the random intervals for waiting in FBPC                    IEEE Infocom, INFOCOM’03, San Francisco, CA, pp.
algorithm in order to decrease the number of collision                   1293–1303, April 2003.
during the packet transformation, not only decreases              [9]    A. Howard, M. Mataric, “Cover me! a self-deployment
the effect of not arriving a packet to the destination but               algorithm for mobile sensor networks”, Proceedings of
also the next following packets can cover the effect of                  IEEE International Conference on Robotics and
this error. While other existence algorithms act poorly                  Automation, ICRA’02, Washington, DC, pp. 80–91,
                                                                         May 2002.
and don’t pay much attention in sending the messages
                                                                  [10]   A. Howard, M. Mataric, G. Sukhatme, “An incremental
and exchanging information.                                              self-deployment algorithm for mobile sensor networks”,
                                                                         Autonomous Robots Special Issue on Intelligent
          VI. CONCLUSION AND FEATURE WORKS                               Embedded Systems, pp.113–126, 2002.
                                                                  [11]   B. Yamauchi, “A frontier-based approach for
    In this paper, a new fault tolerant deployment fuzzy                 autonomous       exploration”,   IEEE     International
based algorithm is proposed for unattended mobile                        Symposium on Computational Intelligence in Robotics
sensor networks, called, the Fuzzy Based Priority                        and Automation, CIRA’97, Montere, CA, , pp. 146–156,
Coverage (FBPC) algorithm. Algorithm is run in a                         June 1997.
completely distributed fashion by each node based only            [12]   G. Wang, G. Cao, T. LaPorta, “A bidding protocol for
on local communications. Proposed method uses                            deploying mobile sensors”, Proceedings of the 11th
number of neighbors and distance from borders and                        IEEE International Conference on Network Protocols,
obstacles as inputs of a fuzzy inference engine. The                     ICNP’03, Atlanta, GA, pp. 80–91, November 2003.
                                                                  [13]   Datta, S., Klinowski, C., Rudafshani, M., Khaleque, S.,
output is the actual priority of movement for sensor
                                                                         “Distributed localization in static and mobile sensor
node. Nodes move away according to their priorities.                     networks”, IEEE International Conference on Wireless
Simulation results show that proposed method received                    and      Mobile     Computing,      Networking      and
a very good coverage comparing other common                              Communications, p.p. 69 – 76, 19-21 June 2006.
approaches, especially in the sparse networks.                    [14]   Li, X. and Santoro, N., “A ZONE-based Sensor
   For future works, we consider to improve the ability                  Relocation Protocol for Mobile Sensor Networks”,
of our algorithm in sparse networks. Improving                           Proceedings of      31st IEEE Conference on Local
network coverage in sparse conditions will result in                     Computer Networks, p.p. 923 – 930, Nov. 2006.
reducing overall cost of network.                                 [15]   Zhao, F. and Guibas, L., “Wireless sensor networks: an
                                                                         information processing approach”, Boston: Elsevier-
                                                                         Morgan Kaufmann, 2004.
                        REFERENCES                                [16]   Kwok, A. and Martinez, S., “Deployment algorithms for
[1] Hainin Shu, Qilian Liang, “Fuzzy optimization for                    a power-constrained mobile sensor network”, IEEE
    distributed sensor deployment”, IEEE Wireless                        International Conference on Robotics and Automation,
                                                                         ICRA, p.p. 140 – 145, 19-23 May 2008.



                                                             50
© 2010 ACEEE
DOI: 01.ijns.01.02.09
Ad

Recommended

A self localization scheme for mobile wireless sensor networks
A self localization scheme for mobile wireless sensor networks
ambitlick
 
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
ambitlick
 
Cube2012 Submission 359
Cube2012 Submission 359
Sandeep Saxena
 
Localization
Localization
prasannagelli
 
Iaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless ad
Iaetsd Iaetsd
 
Indoor Localization in Wireless Sensor Networks
Indoor Localization in Wireless Sensor Networks
International Journal of Engineering Inventions www.ijeijournal.com
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
ijwmn
 
Dd4301605614
Dd4301605614
IJERA Editor
 
Article GSM
Article GSM
Iva Jumez
 
Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...
IDES Editor
 
Self Healing
Self Healing
Muhammad Ikram
 
Computational Geometry based Remote Networking
Computational Geometry based Remote Networking
idescitation
 
Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...
ijcseit
 
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks
IDES Editor
 
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
ijtsrd
 
293 299
293 299
Editor IJARCET
 
Localization for wireless sensor
Localization for wireless sensor
IJCNCJournal
 
Ant Colony Optimization for Wireless Sensor Network: A Review
Ant Colony Optimization for Wireless Sensor Network: A Review
iosrjce
 
O026084087
O026084087
ijceronline
 
026 icsca2012-s065
026 icsca2012-s065
auwalaumar
 
G0261041046
G0261041046
inventionjournals
 
Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Iqra khalil
 
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
IDES Editor
 
HACBPS: A Hierarchical Access Control- Based Proxy Signature
HACBPS: A Hierarchical Access Control- Based Proxy Signature
IDES Editor
 
New Fault Tolerance Approach using Antecedence Graphs in Multi Agent Systems
New Fault Tolerance Approach using Antecedence Graphs in Multi Agent Systems
IDES Editor
 
Low-Cost Multiple Degrees-of-Freedom Optical Tracking for 3D Interaction in H...
Low-Cost Multiple Degrees-of-Freedom Optical Tracking for 3D Interaction in H...
IDES Editor
 
Text-Image Separation in Document Images Using Boundary/Perimeter Detection
Text-Image Separation in Document Images Using Boundary/Perimeter Detection
IDES Editor
 
Predictable Packet Lossand Proportional Buffer Scaling Mechanism
Predictable Packet Lossand Proportional Buffer Scaling Mechanism
IDES Editor
 
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
IDES Editor
 
Land Cover Feature Extraction using Hybrid Swarm Intelligence Techniques - A ...
Land Cover Feature Extraction using Hybrid Swarm Intelligence Techniques - A ...
IDES Editor
 

More Related Content

What's hot (14)

Article GSM
Article GSM
Iva Jumez
 
Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...
IDES Editor
 
Self Healing
Self Healing
Muhammad Ikram
 
Computational Geometry based Remote Networking
Computational Geometry based Remote Networking
idescitation
 
Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...
ijcseit
 
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks
IDES Editor
 
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
ijtsrd
 
293 299
293 299
Editor IJARCET
 
Localization for wireless sensor
Localization for wireless sensor
IJCNCJournal
 
Ant Colony Optimization for Wireless Sensor Network: A Review
Ant Colony Optimization for Wireless Sensor Network: A Review
iosrjce
 
O026084087
O026084087
ijceronline
 
026 icsca2012-s065
026 icsca2012-s065
auwalaumar
 
G0261041046
G0261041046
inventionjournals
 
Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Iqra khalil
 
Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...
IDES Editor
 
Computational Geometry based Remote Networking
Computational Geometry based Remote Networking
idescitation
 
Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...
ijcseit
 
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks
IDES Editor
 
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
ijtsrd
 
Localization for wireless sensor
Localization for wireless sensor
IJCNCJournal
 
Ant Colony Optimization for Wireless Sensor Network: A Review
Ant Colony Optimization for Wireless Sensor Network: A Review
iosrjce
 
026 icsca2012-s065
026 icsca2012-s065
auwalaumar
 
Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Iqra khalil
 

Viewers also liked (20)

A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
IDES Editor
 
HACBPS: A Hierarchical Access Control- Based Proxy Signature
HACBPS: A Hierarchical Access Control- Based Proxy Signature
IDES Editor
 
New Fault Tolerance Approach using Antecedence Graphs in Multi Agent Systems
New Fault Tolerance Approach using Antecedence Graphs in Multi Agent Systems
IDES Editor
 
Low-Cost Multiple Degrees-of-Freedom Optical Tracking for 3D Interaction in H...
Low-Cost Multiple Degrees-of-Freedom Optical Tracking for 3D Interaction in H...
IDES Editor
 
Text-Image Separation in Document Images Using Boundary/Perimeter Detection
Text-Image Separation in Document Images Using Boundary/Perimeter Detection
IDES Editor
 
Predictable Packet Lossand Proportional Buffer Scaling Mechanism
Predictable Packet Lossand Proportional Buffer Scaling Mechanism
IDES Editor
 
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
IDES Editor
 
Land Cover Feature Extraction using Hybrid Swarm Intelligence Techniques - A ...
Land Cover Feature Extraction using Hybrid Swarm Intelligence Techniques - A ...
IDES Editor
 
On Demand Bandwidth Reservation for Real- Time Traffic in Cellular IP Network...
On Demand Bandwidth Reservation for Real- Time Traffic in Cellular IP Network...
IDES Editor
 
Filtering Electrocardiographic Signals using filtered- X LMS algorithm
Filtering Electrocardiographic Signals using filtered- X LMS algorithm
IDES Editor
 
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...
IDES Editor
 
Characteristics Analysis of Voltage Sag in Distribution System using RMS Volt...
Characteristics Analysis of Voltage Sag in Distribution System using RMS Volt...
IDES Editor
 
Ch10 Recursion
Ch10 Recursion
leminhvuong
 
Parallel sorting
Parallel sorting
Mr. Vikram Singh Slathia
 
Voltage sag and it’s mitigation
Voltage sag and it’s mitigation
Mayur Dhande
 
Voltage sag
Voltage sag
AJAL A J
 
Computer Science Engineering : Data structure & algorithm, THE GATE ACADEMY
Computer Science Engineering : Data structure & algorithm, THE GATE ACADEMY
klirantga
 
RSA Algorithm
RSA Algorithm
West University of Timisoara
 
Teaching Reading Extensive vs intensive reading, and reading sequence
Teaching Reading Extensive vs intensive reading, and reading sequence
Rizky Amelia
 
Skimming & Scanning
Skimming & Scanning
Unggul DJatmika
 
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
IDES Editor
 
HACBPS: A Hierarchical Access Control- Based Proxy Signature
HACBPS: A Hierarchical Access Control- Based Proxy Signature
IDES Editor
 
New Fault Tolerance Approach using Antecedence Graphs in Multi Agent Systems
New Fault Tolerance Approach using Antecedence Graphs in Multi Agent Systems
IDES Editor
 
Low-Cost Multiple Degrees-of-Freedom Optical Tracking for 3D Interaction in H...
Low-Cost Multiple Degrees-of-Freedom Optical Tracking for 3D Interaction in H...
IDES Editor
 
Text-Image Separation in Document Images Using Boundary/Perimeter Detection
Text-Image Separation in Document Images Using Boundary/Perimeter Detection
IDES Editor
 
Predictable Packet Lossand Proportional Buffer Scaling Mechanism
Predictable Packet Lossand Proportional Buffer Scaling Mechanism
IDES Editor
 
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
IDES Editor
 
Land Cover Feature Extraction using Hybrid Swarm Intelligence Techniques - A ...
Land Cover Feature Extraction using Hybrid Swarm Intelligence Techniques - A ...
IDES Editor
 
On Demand Bandwidth Reservation for Real- Time Traffic in Cellular IP Network...
On Demand Bandwidth Reservation for Real- Time Traffic in Cellular IP Network...
IDES Editor
 
Filtering Electrocardiographic Signals using filtered- X LMS algorithm
Filtering Electrocardiographic Signals using filtered- X LMS algorithm
IDES Editor
 
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...
IDES Editor
 
Characteristics Analysis of Voltage Sag in Distribution System using RMS Volt...
Characteristics Analysis of Voltage Sag in Distribution System using RMS Volt...
IDES Editor
 
Voltage sag and it’s mitigation
Voltage sag and it’s mitigation
Mayur Dhande
 
Voltage sag
Voltage sag
AJAL A J
 
Computer Science Engineering : Data structure & algorithm, THE GATE ACADEMY
Computer Science Engineering : Data structure & algorithm, THE GATE ACADEMY
klirantga
 
Teaching Reading Extensive vs intensive reading, and reading sequence
Teaching Reading Extensive vs intensive reading, and reading sequence
Rizky Amelia
 
Ad

Similar to A Fuzzy Based Priority Approach in Mobile Sensor Network Coverage (20)

Estimating coverage holes and enhancing coverage in mixed sensor networks or
Estimating coverage holes and enhancing coverage in mixed sensor networks or
marwaeng
 
Optimization of Average Distance Based Self-Relocation Algorithm Using Augmen...
Optimization of Average Distance Based Self-Relocation Algorithm Using Augmen...
csandit
 
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
IJCSEIT Journal
 
IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...
IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...
IRJET Journal
 
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
chennaijp
 
Energy-Balanced Dispatch of Mobile Sensors in a Hybrid Wireless Sensor Network
Energy-Balanced Dispatch of Mobile Sensors in a Hybrid Wireless Sensor Network
ambitlick
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
ijceronline
 
Outstanding Framework for Simulating and Generating Anchor Trajectory in Wire...
Outstanding Framework for Simulating and Generating Anchor Trajectory in Wire...
ijcncjournal019
 
Outstanding Framework for Simulating and Generating Anchor Trajectory in Wire...
Outstanding Framework for Simulating and Generating Anchor Trajectory in Wire...
IJCNCJournal
 
Outstanding Framework for Simulating and Generating Anchor Trajectory in Wire...
Outstanding Framework for Simulating and Generating Anchor Trajectory in Wire...
IJCNC
 
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Sigma web solutions pvt. ltd.
 
AN EFFICIENT DEPLOYMENT APPROACH FOR IMPROVED COVERAGE IN WIRELESS SENSOR NET...
AN EFFICIENT DEPLOYMENT APPROACH FOR IMPROVED COVERAGE IN WIRELESS SENSOR NET...
csandit
 
Network Lifetime Enhancement by Node Deployment in WSN
Network Lifetime Enhancement by Node Deployment in WSN
IJTET Journal
 
Bm32410415
Bm32410415
IJERA Editor
 
Toward accurate mobile sensor network localization in noisy environments
Toward accurate mobile sensor network localization in noisy environments
JPINFOTECH JAYAPRAKASH
 
A voronoi diagram based approach for analyzing area coverage of various node ...
A voronoi diagram based approach for analyzing area coverage of various node ...
ijasuc
 
A VORONOI DIAGRAM-BASED APPROACH FOR ANALYZING AREA COVERAGE OF VARIOUS NODE ...
A VORONOI DIAGRAM-BASED APPROACH FOR ANALYZING AREA COVERAGE OF VARIOUS NODE ...
ijasuc
 
.Net project titles 2011, Real time projects in .net, Java Final year project...
.Net project titles 2011, Real time projects in .net, Java Final year project...
Suresh Radhakrishnan
 
IEEE final year projects in chennai,MATLAB projects in chennai,Engineering P...
IEEE final year projects in chennai,MATLAB projects in chennai,Engineering P...
Suresh Radhakrishnan
 
Mobile computing projects in chennai,Ns2 projects in chennai,.Net projects in...
Mobile computing projects in chennai,Ns2 projects in chennai,.Net projects in...
Suresh Radhakrishnan
 
Estimating coverage holes and enhancing coverage in mixed sensor networks or
Estimating coverage holes and enhancing coverage in mixed sensor networks or
marwaeng
 
Optimization of Average Distance Based Self-Relocation Algorithm Using Augmen...
Optimization of Average Distance Based Self-Relocation Algorithm Using Augmen...
csandit
 
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
IJCSEIT Journal
 
IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...
IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...
IRJET Journal
 
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
chennaijp
 
Energy-Balanced Dispatch of Mobile Sensors in a Hybrid Wireless Sensor Network
Energy-Balanced Dispatch of Mobile Sensors in a Hybrid Wireless Sensor Network
ambitlick
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
ijceronline
 
Outstanding Framework for Simulating and Generating Anchor Trajectory in Wire...
Outstanding Framework for Simulating and Generating Anchor Trajectory in Wire...
ijcncjournal019
 
Outstanding Framework for Simulating and Generating Anchor Trajectory in Wire...
Outstanding Framework for Simulating and Generating Anchor Trajectory in Wire...
IJCNCJournal
 
Outstanding Framework for Simulating and Generating Anchor Trajectory in Wire...
Outstanding Framework for Simulating and Generating Anchor Trajectory in Wire...
IJCNC
 
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Sigma web solutions pvt. ltd.
 
AN EFFICIENT DEPLOYMENT APPROACH FOR IMPROVED COVERAGE IN WIRELESS SENSOR NET...
AN EFFICIENT DEPLOYMENT APPROACH FOR IMPROVED COVERAGE IN WIRELESS SENSOR NET...
csandit
 
Network Lifetime Enhancement by Node Deployment in WSN
Network Lifetime Enhancement by Node Deployment in WSN
IJTET Journal
 
Toward accurate mobile sensor network localization in noisy environments
Toward accurate mobile sensor network localization in noisy environments
JPINFOTECH JAYAPRAKASH
 
A voronoi diagram based approach for analyzing area coverage of various node ...
A voronoi diagram based approach for analyzing area coverage of various node ...
ijasuc
 
A VORONOI DIAGRAM-BASED APPROACH FOR ANALYZING AREA COVERAGE OF VARIOUS NODE ...
A VORONOI DIAGRAM-BASED APPROACH FOR ANALYZING AREA COVERAGE OF VARIOUS NODE ...
ijasuc
 
.Net project titles 2011, Real time projects in .net, Java Final year project...
.Net project titles 2011, Real time projects in .net, Java Final year project...
Suresh Radhakrishnan
 
IEEE final year projects in chennai,MATLAB projects in chennai,Engineering P...
IEEE final year projects in chennai,MATLAB projects in chennai,Engineering P...
Suresh Radhakrishnan
 
Mobile computing projects in chennai,Ns2 projects in chennai,.Net projects in...
Mobile computing projects in chennai,Ns2 projects in chennai,.Net projects in...
Suresh Radhakrishnan
 
Ad

More from IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A Review
IDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
IDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
IDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
IDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
IDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
IDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’s
IDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance Analysis
IDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
IDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
IDES Editor
 
Power System State Estimation - A Review
Power System State Estimation - A Review
IDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
IDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
IDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
IDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
IDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
IDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’s
IDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance Analysis
IDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
IDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
IDES Editor
 

Recently uploaded (20)

A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Priyanka Aash
 
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
 
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
Earley Information Science
 
Daily Lesson Log MATATAG ICT TEchnology 8
Daily Lesson Log MATATAG ICT TEchnology 8
LOIDAALMAZAN3
 
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
 
Agentic AI for Developers and Data Scientists Build an AI Agent in 10 Lines o...
Agentic AI for Developers and Data Scientists Build an AI Agent in 10 Lines o...
All Things Open
 
Database Benchmarking for Performance Masterclass: Session 2 - Data Modeling ...
Database Benchmarking for Performance Masterclass: Session 2 - Data Modeling ...
ScyllaDB
 
UserCon Belgium: Honey, VMware increased my bill
UserCon Belgium: Honey, VMware increased my bill
stijn40
 
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10
 
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
Fwdays
 
Wenn alles versagt - IBM Tape schützt, was zählt! Und besonders mit dem neust...
Wenn alles versagt - IBM Tape schützt, was zählt! Und besonders mit dem neust...
Josef Weingand
 
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
 
"Scaling in space and time with Temporal", Andriy Lupa.pdf
"Scaling in space and time with Temporal", Andriy Lupa.pdf
Fwdays
 
Quantum AI: Where Impossible Becomes Probable
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
 
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
Fwdays
 
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
 
Python Conference Singapore - 19 Jun 2025
Python Conference Singapore - 19 Jun 2025
ninefyi
 
“MPU+: A Transformative Solution for Next-Gen AI at the Edge,” a Presentation...
“MPU+: A Transformative Solution for Next-Gen AI at the Edge,” a Presentation...
Edge AI and Vision Alliance
 
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) Slides
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) Slides
Ravi Tamada
 
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
 
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Priyanka Aash
 
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
 
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
Earley Information Science
 
Daily Lesson Log MATATAG ICT TEchnology 8
Daily Lesson Log MATATAG ICT TEchnology 8
LOIDAALMAZAN3
 
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
 
Agentic AI for Developers and Data Scientists Build an AI Agent in 10 Lines o...
Agentic AI for Developers and Data Scientists Build an AI Agent in 10 Lines o...
All Things Open
 
Database Benchmarking for Performance Masterclass: Session 2 - Data Modeling ...
Database Benchmarking for Performance Masterclass: Session 2 - Data Modeling ...
ScyllaDB
 
UserCon Belgium: Honey, VMware increased my bill
UserCon Belgium: Honey, VMware increased my bill
stijn40
 
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10
 
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
Fwdays
 
Wenn alles versagt - IBM Tape schützt, was zählt! Und besonders mit dem neust...
Wenn alles versagt - IBM Tape schützt, was zählt! Und besonders mit dem neust...
Josef Weingand
 
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
 
"Scaling in space and time with Temporal", Andriy Lupa.pdf
"Scaling in space and time with Temporal", Andriy Lupa.pdf
Fwdays
 
Quantum AI: Where Impossible Becomes Probable
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
 
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
Fwdays
 
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
 
Python Conference Singapore - 19 Jun 2025
Python Conference Singapore - 19 Jun 2025
ninefyi
 
“MPU+: A Transformative Solution for Next-Gen AI at the Edge,” a Presentation...
“MPU+: A Transformative Solution for Next-Gen AI at the Edge,” a Presentation...
Edge AI and Vision Alliance
 
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) Slides
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) Slides
Ravi Tamada
 
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
 

A Fuzzy Based Priority Approach in Mobile Sensor Network Coverage

  • 1. ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010 A Fuzzy Based Priority Approach in Mobile Sensor Network Coverage Bahareh J. Farahani, Hossein Ghaffarian ,Mahmood Fathy Computer Engineering School, Iran University of Science and Technology, Tehran, Iran [email protected], [email protected], [email protected] Abstract— In this paper a new fuzzy based approach for effectiveness of this algorithm, our algorithm is improving network coverage in wireless mobile sensor compared with FOA [1], TRI [2] and VEC [3] networks is proposed. In the proposed approach firstly algorithms. Comparison will show that our algorithm each mobile sensor node determines its neighbors and its exhibit better performance. distance from borders and obstacles. According to these values, fuzzy inference engine calculates the priority of This paper is organized as follows: In section II, an node for movement. Then according to the priority, in overview on related approaches is presented. Section turn, nodes move away from each other to increase III consists of problem setup and an overview and coverage area in the target field. Simulation results show analysis of effective parameters on the position of that our fuzzy approach can reach higher degree of mobile sensors. How to fuzzy reasoning and proposed coverage against other common approaches like FOA, method have been describe in section IV and the results VEC and TRI algorithms. of performance evaluation of our method, FOA, VEC and TRI algorithms have been presented in section V. Index Terms— Mobile Sensor Network, Coverage, Fuzzy Finally the paper has been concluded in section VI. Priority, Movement II. RELATED APPROACHES I. INTRODUCTION Dealing with coverage problem, researchers have Advances in Micro Electro Mechanical Systems proposed numerous solutions. Some algorithms are (MEMS), embedded processors and wireless based on the notion of potential field [4], [5], [6] and communications have enabled the expansion of multi- virtual forces[7],[8] after an initial random deployment. functional, low-cost and tiny sensor nodes which can The next three distributed self deployment sense the environment, perform data processing and algorithms proposed in [3] known as the VEC, VOR, communicate with each other over short distances. and Minimax are based on the structure of Voronoi Wireless sensor networks (WSNs) are playing an diagram in which nodes are relocated to fill up increasingly significant role in a wide range of coverage holes. applications such as environmental conditions The vector-based algorithm, VEC, pushes nodes monitoring, wildlife monitoring, security surveillance away from densely covered areas to sparsely covered in military and battle-fields, nuclear, smart homes and areas. Two nodes exert a repulsive force when they are offices, improved medical treatment, industrial too close to each other. VOR is a greedy strategy that diagnosis, etc. The concept of area coverage can be pulls nodes towards the locations of their local considered as a measure of the quality of service (QoS) maximum coverage holes. The MiniMax algorithm is in a wireless sensor network. Random deployment of very similar to VOR; it moves a node inside its nodes often does not guarantee full coverage, resulting Voronoi polygon, such that, the distance from its in accumulation of nodes at certain parts of the sensing farthest Voronoi vertex is minimized. In [9] and [10], field while leaving other parts deprived of nodes. Some an incremental and greedy self-deployment algorithm is of the deployment strategies take advantage of mobility presented for mobile sensor networks in which nodes to relocate nodes to sparsely covered regions after an are deployed one at a time into an unknown initial random deployment to improve coverage. Thus environment. Each node makes use of the information as a solution, mobile sensor networks (MSNs) can be gathered by previously deployed nodes to determine its used for network coverage improvements. optimal deployment location. Conceptually, it is similar In this paper, a novel algorithm for placement of to the frontier-based approach [11]; however, in this mobile sensors is designed. The main result of this case, occupancy maps are built from live sensory data paper is as follows: and are analyzed to find frontiers between the free A Fuzzy logic method is described to find the space and the unknown space. movement priority for mobile sensors and a distributed The TRI algorithm is proposed in [2]. The basic idea fault tolerant, self deployment and iterative algorithm of TRI algorithm is to adjust the distance between two to cover an area. Mobile sensors only need to have knowledge of their location and with the assistance of Delaunay neighbors to . After several rounds local communication they will act in a completely of such adjustments, the layout of the network will be distributed fashion. To demonstrate the generality and 45 © 2010 ACEEE DOI: 01.ijns.01.02.09
  • 2. ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010 close to the ideal equilateral triangle layout. As a result, Sensor equipment: Each mobile sensor is equipped with the coverage area of the network will be maximized. a battery that provides sufficient power to move and The ATRI algorithm [2] is offered in order to reduce exchange information with other sensors. There is also the back-and-forth movement of nodes. a memory in each sensor which used to preserve The algorithms described in previous apply to require information of network elements. networks where all the nodes are capable of moving B. Effect of Adjacent Nodes around. However, there is a high cost associated to make each node mobile; a balance can be achieved by Cellular networks are a good example of an using a combination of static and mobile nodes, usually engineering task for supporting and presenting good referred to as hybrid sensor networks, while still quality of coverage in network. Due to easier ensuring sufficient coverage. In [12], such a protocol is calculations, in these networks, engineers have used described, called the bidding protocol, where the hexagonal shapes for each cell. It has been proven [2] problem is reduced to the well-known NP-hard set- that in ideal layout, the sensors are located in vertices covering problem.In [1] a Fuzzy Optimization of equilateral Delaunay triangles [16] with edge length Algorithm (FOA) is proposed to deploy sensors of . By this layout, the coverage area of efficiently. Authors use the number of neighbors and nodes will be maximized with the minimum coverage average Euclidean distance between sensors as inputs overlap. of the proposed Fuzzy reasoning engine algorithm and Using this value as a standard distance between get a distance measure as output. In proposed algorithm neighbor nodes, if the distance between two nodes each sensor calculates the forces imposed by the other becomes shorter than this distance, the virtual force sensors within its communication range. Then by between them will push them to move away from each applying Coulomb’s law and accumulating the vectors other. of all the forces, the sensor can calculate the magnitude C. Effect of Borders and Obstacles and the angle of its next movement vector in order to move toward the new next location. Coverage in the presence of obstacles is a challenging problem. In order to make the deployment III. PROBLEM SETUP AND EFFECTIVE COMPONENTS algorithm more practical, the sensors must be able to avoid obstacles and boundaries. Because an accurate Before describing proposed method, it is necessary map of the sensing area may not always be available to describe some related concepts and effective before the deployment, it is assumed that each sensor is components on the position of a mobile sensor in a equipped with an ultrasonic obstacle-detecting module, target field. In proposed method, effects of these which makes it possible to detect obstacles when it components have been collected. moves close enough to the obstacles. In order to avoid A. Preliminaries the coverage gap or overlap between nodes and boundaries, intuitively, the optimum distance between Two-dimensional deployment: It is assumed that all adjacent nodes and boundaries should be shorter than devices are located in two dimensions plan. . Location awareness: Knowing the location of sensor nodes is important for our algorithm. Many techniques have been proposed to supply this information for mobile sensors [13],[14]. Boundary and Obstacle detecting: It is assumed that each sensor node is equipped with an ultrasonic obstacle detecting module which makes it possible to detect boundaries when it moves close enough to it. Figure 1. The effect of adjacent nodes causes a distance Sensing model: Each sensor node in our algorithm is between them. associated with a sensing area which is represented by In Fig. 1, if the dashed line between two cells is a circle with the same Sensing Radius. This Circular considered as a boundary, the distance between the area is called Sensing Range and depends on several factors in the network [15]. A sensor node can detect node and the boundary should be set , but all the events in its Sensing Range. The areas which are using this approach will make some uncovered not covered by these circles are called coverage holes. triangular holes beside the boundary. In order to avoid Radio range: Apart from Sensing Range, each sensor the coverage gap, as shown in Fig. 2, the point P must has a Communication Range which is much longer than touch the boundary. By preliminary mathematics in Sensing Range. When a node broadcasts a message, all geometry, an effective distance between boundaries or the sensor nodes in its Communication obstacles and mobile sensor nodes can be calculated. Range will receive this message. As mentioned in section B, the distance of two adjacent mobile sensor nodes has to be adjusted to . Thus, the distance between a node and a boundary must 46 © 2010 ACEEE DOI: 01.ijns.01.02.09
  • 3. ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010 to be adjusted to instead of as the communication range of that node will get this shown in below calculation. message and will wait for a specific time (T wait) to receive all possible HELLO messages from the network. In this interval time, nodes will start to update -1 their Neighboring Matrix that is consists of gathered information from other mobile nodes around it. The mobile nodes which have some changes in their neighboring matrix will broadcast their information as a new HELLO message and will set a counter ( ). If within no P new HELLO message is received, the node starts to use Figure 2. The effect of a border or obstacle on a node causes a fuzzy controller to define its priority for movement. distance between them. The proposed fuzzy controller has two inputs: • Number of mobile nodes in the sensing range of D. Effect of Corners the node • Length of Sensing Shadow on boundaries or A corner is the junction of at least two different obstacles. boundaries. Thereby the proposed effective distance that has been calculated in section C, is not efficient Definition 1. In a two-dimensional mode, sensing here. For achieving a full coverage at corners, sensor shadow is the length of boundary which is inside the must become close enough to the furthest point at the sensing range of the sensor node. corner. Therefore mobile sensor node must stand at distance from the furthest point of corner. This value does not affected by different angels of corners. In the case of multiple corners, sensor will move toward the farthest vertex of corners and stop when the Distance from farthest corner vertex can be seen within the sensing border/obst acle radius of mobile node. Sensing Shadow Figure 4. A schematic of sensing shadow. Sensing shadow can be calculated in the same way of equation (1) and its value is between . If the distance between mobile node and boundary or obstacle is greater than or equal to , the sensing Figure 3. The effect of a corner on a node causes a distance shadow will be zero and if mobile node sticks to the from farthest vertex of corner. boundary or obstacle, the sensing shadow will be . This parameter is used to define the priority of IV. PROPOSED FUZZY BASED APPROACH standing in place for mobile sensor nodes. The nodes with minimum distance from borders or obstacles have Fuzzy reasoning tries to continue the way of natural highest priority for standing and should move after reasoning of human. It can present more smooth results their adjacent nodes. than common proposed methods in reasoning. How to The maximum number of hexagonal neighbor cells use fuzzy reasoning in a manner to make decision is six; therefore in the proposed algorithm it is assumed procedures for deployment of mobile sensor nodes in a that more than six neighbors is the worst case for initial target field is described in this section. deployment. So the number of neighbors is limited to A. Fuzzy Based Priority Coverage Algorithm (FBPC) ten as an upper bound for our controller so the controller will omit other extra neighbors Proposed method consists of two phases: First automatically. In order to normalizing the value of gathering information of neighbors and determining the sensing shadow into [0-1], it is divided by . priority of mobile sensor node to move and second The linguistic variables to represent the number of calculating movement vector. At the first phase, the mobile nodes in the sensing range of the node are nodes try to find other mobile sensor nodes within their divided into three levels: high, average and low; and communication range and also detect boundaries and those to represent the Length of Sensing Shadow are obstacles and the distance from them. also divided into three levels: high, average and low. After being activated, each node waits for a random The consequent is divided into five levels: very high, time and then broadcasts a HELLO message including its position in the target area. The sensors which are in 47 © 2010 ACEEE DOI: 01.ijns.01.02.09
  • 4. ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010 high, average, very low and low. Table 1 summaries the of its neighbor nodes, boundaries, obstacles and rules and consequents. corners. In our model, each node s i is subjected to three One example of rules is as follows: kinds of forces: (1) an attractive or repulsive force F i j , IF the number of mobile nodes in the sensing range by another node sj depending on its distance and of sensor i is high and length of Sensing Shadow of orientation from si, (2) a repulsive force F i B, exerted by sensor i on boundaries or obstacles is low, THEN the obstacles or boundaries, and (3) a repulsive force F i C, standing priority result of sensor i will be very high. exerted by corners. The net force on a sensor s i is the vector sum of all the above forces. Table 2 summaries TABLE 1. these three types of forces. RULE BASE OF THE PROPOSED FUZZY STANDING PRIORITY After calculating movement vector and defining CONTROLLER destination, the node will send a GOODBYE packet that consists of the new calculated position of mobile Priority Neighbor Number node. Then lowest priority mobile node runs into the Controller Rules Low Average High new position. Other nodes will update their neighboring matrix information after receiving GOODBYE packet Very and use this updated version in their calculation to find Low High Very High Sensi High their final position. ng Averag Shad e Low Average High After moving all nodes, this algorithm will be ow Very repeated again until nodes have not any changes in High Low High Low their positions. Algorithm 1 shows a pseudo code of the proposed Fuzzy Based Priority Coverage (FBPC) Fig. 5 shows input and output membership functions algorithm. of our proposed fuzzy controller. The nodes with 1: FBPC () lowest standing priority must move first in a group of 2: { adjacent mobile sensor networks. 3: while () 4: { 5: Stand for a random time t 6: Broadcast a HELLO packet 7: Stand for T wait to receive all possible HELLO 8: packets 9: Update Neighboring matrix 10: If there are some changes in Neighboring matrix 11: { a. Neighbor Number membership function 12: Broadcast a HELLO packet. 13: Stand for Tthreshold 14: If within T threshold some new HELLO message 15: is received 16: go to line 8 17: } 18: If there are not any changes in the position of 19: node and its adjacent nodes 20: break; b. Sensing shadow membership function 21: Calculate Sensing Shadow 22: Determine movement turning according to the 23: standing priority of node using Fuzzy priority 24: controller 25: Stand until receiving movement turning of the 26: nodes and update the Neighboring matrix 27: according to the 28: information of the receiving GOODBYE packets c. Priority membership function 29: Calculate MOVEMENT VECTOR according to 30: the Neighboring matrix Figure 5. Membership functions of the proposed Fuzzy Priority 31: Broadcast GOODBYE packet and travel to the controller. 32: new position in target field } } At this stage, there is no need for nodes to rebroadcast information of their priorities, because each mobile sensor can easily calculate the priority of its neighbors. At the second phase, each node with minimum standing priority can move before other nodes. So sensor will calculate its MOVEMENT VECTOR based on forces 48 © 2010 ACEEE DOI: 01.ijns.01.02.09
  • 5. ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010 simulation round: total coverage, average moving TABLE 2. TYPES OF FORCES EACH NODE ENCOUNTERS distance and average number of rounds. Fig. 6 shows the total coverage of three algorithms as the number of sensors increases. Related Force Standard Distance Fij=Standard Distance between nodes -d(si,sj) FiB=Standard Distance from boundary -d(si,boundary) FiC=Standard Distance from corner- d(si,boundary) Figure 6. Total coverage A Robust Algorithm From the figure, it can be seen that the FBPC In some situations, a sensor may calculate a new algorithm prepares the best total coverage. The primary position; but when it wants to move, because of some reason is that unlike other algorithms, FBPC environmental conditions like holes, dead-end paths, paysattention to obstacles and boundaries and keeps etc; it could not reach destination target position. In distance from them in order not to waste its sensing such conditions FBPC algorithm is robust; because if range. one of the nodes cannot move to its final position, in Also, it can be seen that in sparse conditions, VEC the next round of algorithm, it can contribute in new algorithm stands in the second place, but in dense making decision routine according to the information conditions, VEC is replaced by FOA. of its new position, not previous announced Another dimension of evaluation is the average moving information. Therefore, FBPC is a fault tolerant distance. As depicted in Fig.7, TRI algorithm performs algorithm that can tolerate probable mistakes and can the worst in average moving distance a mong FBPC, correct its behavior in further rounds. Even if there are FOA, and VEC, Because in TRI mobile nodes are some errors in collecting local messages via network, located in a unique point in target field and after FBPC can recover its action in consequent rounds. calculating their accurate positions, they will move. Thus they must move more. V. PERFORMANCE EVALUATION After TRI, FBPC algorithm has the bigger average moving distance. This happens because it tries to do a A. Objectives and Metrics fast deployment and reach to a high level of coverage. Our deployment protocols have been implemented in Also in FBPC, nodes move away from borders and Matlab (version R2008a). Our objective in conducting obstacles. Results of VEC and FOA can be compared this evaluation study is: by comparing FOA, TRI, VEC with their coverage values. More coverage needs more and our algorithm giving some insight on choosing moving distance. suitable algorithm in different situations. The simulations are run under different sensor densities, which determines the sensor coverage that can be reached and the difficulty to reach it. In a 100 m ×100 m target field, five different numbers of sensors have been distributed, ranging from 60 to 140 in increment of 20 sensors. The initial deployment of proposed algorithm, FOA and also VEC algorithm follow the random distribution, however in TRI, Figure 7. Average moving distance according to [2], at the beginning of the experiment, sensors are randomly placed within a 1m × 1m The number of rounds in FOA algorithm is high. compact square, which is centered at point (50m, 50m). Although some of the authors disregard the effect of Then the nodes explode to a large evenly deployed message complexity in increasing energy consumption, layout. To evaluate each metric under different this cannot be ignored by increase in number of rounds. parameter setting, 5 experiments based on different Calculated from Robomote [17],[3], approximately, to initial distribution are run and the average results are move a sensor one meter consumes a similar amount of beening calculated. The Sensing Range is set to be 6 energy as transmitting 300 messages . Assume that in meters and 20 meters as the Communication Range. each round each sensor transmits one packet for a network with 100 sensors, by running the FOA B. Simulation Results algorithm after each 3 rounds and 30 rounds, the In order to evaluate the performance and cost of the movement distance of nodes will be increased 1m and three algorithms, three metrics are measured for each 49 © 2010 ACEEE DOI: 01.ijns.01.02.09
  • 6. ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010 10m, respectively. Moreover it is assumed that all Communications and Networking Conference, Vol. packets can be transmitted without any error. 3, pp.1903 – 1908, 13-17 March 2005. Random distribution of sensors occurs in urgent [2] Ma, M. and Yang, Y., “Adaptive Triangular Deployment cases or for some special application. In such an urgent Algorithm for Unattended Mobile Sensor Networks”, IEEE Transactions on Computers, Vol. 56, NO. 7, pp. situation, the fast deployment of the sensors is in the 946 – 847, JULY 2007. first priority. In this case the performance of the FOA [3] Wang, G., Cao, G. and La Porta, T. ,“Movement- algorithm is not applicable at all, whereas FBPC Assisted Sensor Deployment”, IEEE Transaction on algorithm presents better coverage with fast reaction. Mobile Computing, Vol.5, no.6, pp. 640–652, June 2006. Fig. 8 shows the result of average number of rounds [4] O. Khatib, “Real-time obstacle avoidance for in algorithms. manipulators and mobile robots”, International Journal of Robotics Research, pp. 90–98, 1986. [5] A. Howard, M. Mataric and G. Sukhatme, “Mobile sensor network deployment using potential fields: A distributed scalable solution to the area coverage problem”, Proceedings of the 6th International Symposium on Distributed Autonomous Robotic Systems, Fukuoka, Japan, pp. 299–308,June 2002. [6] S. Poduri, G.S. Sukhatme, “Constrained coverage in mobile sensor networks”, Proceedings of IEEE International Conference on Robotics and Automation, Figure 8. Average number of rounds New Orleans, LA, pp. 40–50, April–May 2004. [7] Y. Zou, K. Chakrabarty, “Sensor deployment and target As it can be seen, FBPC and VEC achieve quite localization in distributed sensor networks”, Transactions on IEEE Embedded Computing Systems, similar number of rounds and they can deploy very pp. 61–91, 2004. fast. As this figure shows, FOA algorithm has the worst [8] Y. Zou, K. Chakrabarty, “Sensor deployment and target performance. localization based on virtual forces”, Proceedings of Selecting the random intervals for waiting in FBPC IEEE Infocom, INFOCOM’03, San Francisco, CA, pp. algorithm in order to decrease the number of collision 1293–1303, April 2003. during the packet transformation, not only decreases [9] A. Howard, M. Mataric, “Cover me! a self-deployment the effect of not arriving a packet to the destination but algorithm for mobile sensor networks”, Proceedings of also the next following packets can cover the effect of IEEE International Conference on Robotics and this error. While other existence algorithms act poorly Automation, ICRA’02, Washington, DC, pp. 80–91, May 2002. and don’t pay much attention in sending the messages [10] A. Howard, M. Mataric, G. Sukhatme, “An incremental and exchanging information. self-deployment algorithm for mobile sensor networks”, Autonomous Robots Special Issue on Intelligent VI. CONCLUSION AND FEATURE WORKS Embedded Systems, pp.113–126, 2002. [11] B. Yamauchi, “A frontier-based approach for In this paper, a new fault tolerant deployment fuzzy autonomous exploration”, IEEE International based algorithm is proposed for unattended mobile Symposium on Computational Intelligence in Robotics sensor networks, called, the Fuzzy Based Priority and Automation, CIRA’97, Montere, CA, , pp. 146–156, Coverage (FBPC) algorithm. Algorithm is run in a June 1997. completely distributed fashion by each node based only [12] G. Wang, G. Cao, T. LaPorta, “A bidding protocol for on local communications. Proposed method uses deploying mobile sensors”, Proceedings of the 11th number of neighbors and distance from borders and IEEE International Conference on Network Protocols, obstacles as inputs of a fuzzy inference engine. The ICNP’03, Atlanta, GA, pp. 80–91, November 2003. [13] Datta, S., Klinowski, C., Rudafshani, M., Khaleque, S., output is the actual priority of movement for sensor “Distributed localization in static and mobile sensor node. Nodes move away according to their priorities. networks”, IEEE International Conference on Wireless Simulation results show that proposed method received and Mobile Computing, Networking and a very good coverage comparing other common Communications, p.p. 69 – 76, 19-21 June 2006. approaches, especially in the sparse networks. [14] Li, X. and Santoro, N., “A ZONE-based Sensor For future works, we consider to improve the ability Relocation Protocol for Mobile Sensor Networks”, of our algorithm in sparse networks. Improving Proceedings of 31st IEEE Conference on Local network coverage in sparse conditions will result in Computer Networks, p.p. 923 – 930, Nov. 2006. reducing overall cost of network. [15] Zhao, F. and Guibas, L., “Wireless sensor networks: an information processing approach”, Boston: Elsevier- Morgan Kaufmann, 2004. REFERENCES [16] Kwok, A. and Martinez, S., “Deployment algorithms for [1] Hainin Shu, Qilian Liang, “Fuzzy optimization for a power-constrained mobile sensor network”, IEEE distributed sensor deployment”, IEEE Wireless International Conference on Robotics and Automation, ICRA, p.p. 140 – 145, 19-23 May 2008. 50 © 2010 ACEEE DOI: 01.ijns.01.02.09