跳到主要內容

簡易檢索 / 詳目顯示

研究生: 李哲嘉
Che-Chia Li
論文名稱: 以虛擬力演算法改善無線感測網路之覆蓋範圍
Improving Coverage in Wireless Sensor Networks Using Virtual Force Algorithm
指導教授: 蔡章仁
Jang-Zern Tsai
口試委員:
學位類別: 碩士
Master
系所名稱: 資訊電機學院 - 電機工程學系
Department of Electrical Engineering
畢業學年度: 97
語文別: 英文
論文頁數: 61
中文關鍵詞: 無線感測網路覆蓋空洞移動
外文關鍵詞: mobility, coverage hole, Wireless Sensor Network
相關次數: 點閱:9下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 解決感測覆蓋問題是在無線感測網路(WSNs)領域裡相當重要的問題之ㄧ。當感測節點被隨機佈置在監測範圍裡,通常在這區域裡會產生一些覆蓋空洞(coverage hole)。或著,由於一些感測節點的耗進或一些事件的發生而導致在一個完全被覆蓋住的監測區域裡產生了一些覆蓋空洞(coverage hole)。舉例而言,在戰場裡一些炸彈的爆炸。為了維持任何兩個感測節點間的覆蓋區域(coverage area)及連接性(connectivity),一些感測節點應該根據一些規則去重新覆蓋已存在的覆蓋空洞。在這篇論文中,我們提出了稱為混合虛擬力演算法(Hybrid Virtual Force Algorithm, HVFA),進而利用一些感測節點去移動(mobility)及放大能量階級(increasing power level)而重新覆蓋已存在的覆蓋空洞。在HVFA中,我們根據吸引力及排斥力進而訂出了一些規則去決定一些邊界感測節點(boundary node)去運行移動、以及另一部份的邊界感測節點去放大能量階級,進而去重新覆蓋原有的覆蓋空洞。


    Solving sensing coverage problem is one of the important issues in wireless sensor networks (WSNs). Usually there are some coverage holes when the sensor nodes are randomly deployed in the monitoring area. Or, a fully covered monitoring area may be created some holes by some of sensor nodes were died or some events happened. For example, the bombs explored in the battleground. In order to maintain the coverage area and connectivity between any pair of sensor nodes, some of sensors nodes should recover the coverage holes based on some rules. In this paper, we proposed a algorithm is called Hybrid Virtual Force Algorithm (HVFA) to recover the coverage holes using some of sensor nodes operate mobility or increasing power level. In HVFA, we made some rules to decide some of boundary sensor nodes to operate mobility, and some part of them to increase power level for recovering the coverage holes based on attractive force and repulsive force.

    目錄 頁次 中文摘要 I 英文摘要 II 誌謝 III 目錄 IV 圖目錄 VI Chapter 1 Introduction 1 Chapter 2 RelatedWork and Motivations   2.1 Related Work 2 Chapter 3 Problem Formulation   3.1 Assumptions                    4   3.2 Definitions 4 Chapter 4 HVFA Algorithm   4.1 The Steps of HVFA 10   4.2 Lemmas 10   4.3 Increasing Sensing Radius Algorithm 12   4.4 Mobility Algorithm 12 Chapter 5 Performance Analysis 5.1 Simulation Setup 17 5.2 Performance Evaluation 17 Chapter 6 Conclusion 25 Reference 26 Appendix A. The HVFA NS2 Code 29 Appendix B. The MATLAB Code of Validation 58

    [1] K. Akkaya and M. Younis, "$C^{2}AP:Coverage-aware and Connectivity constrained Actor Positioning in Wireless Sensor and Actor Networks", in Proc. IEEE Performance, Computing, and Communications Conference, 2007. IPCCC 2007. IEEE Internationa, pp.11-13, 2007.
    [2] Ruay-Shiung Chang and Shuo-Hung Wang, "Self-Deployment by Density Control in Sensor Networks", IEEE Transactions on Vehicular Technology, Volume 57, Issue 3, pp. 1745-1755, May, 2008.
    [3] Quanjun Chen, Salil S. Kanhere, and Mahbub Hassan, "Analysis of Per-Node Traffic Load in Multi-Hop Wireless Sensor Networks", IEEE Transactions on Wireless Communications, Volume 8, Issue 2, pp. 958-967, Feb, 2009.
    [4] Chi Zhang, Yanchao Zhang, and Yuguang Fang, "Detecting Coverage Boundary Nodes in Wireless Sensor Networks", in Proc. the 2006 IEEE International Conference onNetworking, Sensing and Control, 2006. ICNSC ''06., pp. 868-873, 2006.
    [5] Amitabha Ghosh, "Estimating Coverage Holes and Enhancing Coverage in Mixed Sensor Networks", IEEE International Conference on Local Computer Networks, 2004. 29th Annual , pp. 68-76, 2004.
    [6] Habib M. Ammari and Sajal K. Das, "Promoting Heterogeneity, Mobility, and Energy-Aware Voronoi Diagram in Wireless Sensor Networks", IEEE Transactions on Parallel and Distributed Systems, Volume 19, Issue 7, pp. 995-1008, July, 2008.
    [7] Jin Zhang, Daxin Liu, Yuezhu Xu, Meng Zhao, and Wenhui Zhao, "Potential Target Traversing Detection Algorithm Based on Voronoi Diagram", the 2008 International Conference on Internet Computing in Science and Engineering, pp 31-34, 2008.
    [8] Dimitrios Lymberopoulos,Thiago Teixeira, and Andreas Savvides, "Macroscopic Human Behavior Interpretation Using Distributed Imager and Other Sensors", in Proc. of the IEEE, Volume 96, Issue 10, pp. 1657-1677, Oct., 2008.
    [9] Renita Machado, and Sirin Tekinay, "Neural Network-Based Approach for Adaptive Density Control and Reliability in Wireless Sensor Networks",IEEE Wireless Communications and Networking Conference, 2008. WCNC 2008., pp. 2537-2542, 2008.
    [10] Sevgi. C., and Kocyigit. A., "On Determining Cluster Size of Randomly Deployed Heterogeneous WSNs", IEEE Communications Letters, Volume 12, Issue 4, pp. 232-234, April, 2008.
    [11] Shuhui Yang, Minglu Li, and Jie Wu, "Scan-Based Movement-Assisted Sensor Deployment Methods in Wireless Sensor Networks", IEEE Transactions on Parallel and Distributed Systems, Volume 18, Issue 8, pp. 1108-1121, Aug., 2007.
    [12] G. K. Singh, and Sa''ad Ahmed Saleh Al Kazzaz, "Development of an Intelligent Diagnostic System for Induction Machine Health Monitoring", IEEE SYSTEMS JOURNAL, Volume 2, Issue 2, pp. 273-288, June, 2008.
    [13] Xiaorui Wang, Guoliang Xing, Yuanfang Zhang, Chenyang Lu, Robert Pless, and Christopher Gill, "Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks", in Proc. The 1st international conference on Embedded networked
    sensor systems, pp. 28-39, 2003.
    [14] Yun Wang, Xiaodong Wang, Bin Xie, Demin Wang, and Dharma P. Agrawal, "Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks", IEEE Transactions on Mobile Computing, Volume 7, Issue 6, pp. 698-711, June, 2008.
    [15] Demin Wang, Bin Xie, and Dharma P. Agrawal, "Coverage and Lifetime Optimization of Wireless Sensor Networks with Gaussian Distribution", IEEE Transactions on Mobile Computing, Volume 7, Issue 12, pp. 1444-1458, Dec, 2008.
    [16] Alan Chi Wai Wong, Ganesh Kathiresan, Chung Kei Thomas Chan, Omar Eljamaly, Okundu Omeni, Declan McDonagh, Alison J. Burdett, and Christofer Toumazou, "A 1 V Wireless Transceiver for an Ultra-Low-Power SoC for Biotelemetry Applications",IEEE Journal of Solid-State Circuits, Volume 43, Issue 7, pp.1511-1521,July, 2008.
    [17] Jie Wu, and Shuhui Yang, "SMART: A Scan-Based Movement-Assisted Sensor Deployment Method in Wireless Sensor Networks", in Proc. INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 4, pp. 2313-2324, 2005.
    [18] Xiaoling WU, Jinsung CHO, Brian J. D''AURIOL, and Sungyoung LEE, "Mobility-Assisted Relocation for Self-Deployment in Wireless Sensor Networks", IEICE Transactions on Communications,Volume E90-B, Number 8, pp. 2056-2069, 2007.
    [19] Shuhui Yang, Fei Dai, Mihaela Cardei, and Jie Wu, "On Multiple Point Coverage in Wireless Sensor Networks", IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005. , pp. 756-764, Nov, 2005.
    [20] Honghai Zhang, and Jennifer C. Hou, "Maintaining Sensing Coverage and Connectivity in Large Sensor Networks", Ad Hoc and Sensor Wireless Networks, Volume 1, pp. 89-124, March, 2005.
    [21] Zhen Jiang, Jie Wu, Robert Kline, and Jennifer Krantz, "Mobility Control for Complete Coverage in Wireless Sensor Networks", The 28th International Conference on Distributed Computing Systems Workshops, pp. 291-296, June, 2008.
    [22] Yi Zou, and Krishnendu Chakrabarty, "Sensor Deployment and Target Localization Based on Virtual Forces", INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies , Volume 2, pp. 1293-1303, 2003.
    [23] Boukerche A, and Xin Fei, "A Voronoi Approach for Coverage Protocols in Wireless Sensor Networks", Global Telecommunications Conference, pp. 5190-5194, 2007.

    QR CODE
    :::