2010
DOI: 10.1109/tmc.2010.29
|View full text |Cite
|
Sign up to set email alerts
|

A Coverage Inference Protocol for Wireless Sensor Networks

Abstract: Abstract-After a wireless sensor network (WSN) is deployed, sensor nodes are usually left unattended for a long period of time.There is an inevitable devolution of the connected coverage of the WSN due to battery exhaustion of sensor nodes, intended physical destruction attacks on sensor nodes, unpredictable node movement by physical means like wind, and so on. It is, therefore, critical that the base station (BS) learns in real time how well the WSN performs the given sensing task (i.e., what is the current c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 33 publications
(14 citation statements)
references
References 43 publications
0
14
0
Order By: Relevance
“…The authors of [23] proposed the boundary node detection scheme, which uses the LVP (localized Voronoi polygons) algorithm to find border nodes. By using the algorithm, the nodes will know whether they are a border node or not by neighboring nodes' information only, and these nodes will transmit their status information to the sink.…”
Section: Discussion Of the Hole Anglementioning
confidence: 99%
“…The authors of [23] proposed the boundary node detection scheme, which uses the LVP (localized Voronoi polygons) algorithm to find border nodes. By using the algorithm, the nodes will know whether they are a border node or not by neighboring nodes' information only, and these nodes will transmit their status information to the sink.…”
Section: Discussion Of the Hole Anglementioning
confidence: 99%
“…The works in [20] and [21] used a Voronoi Polygon as a partition between the sensors. The authors proposed the BOND algorithm based on two novel geometric concepts: the Localised Voronoi Polygon (LVP) and the Tentative LVP (TLVP).…”
Section: Virtual Partition Techniquesmentioning
confidence: 99%
“…The optimal number and deployment of RFID readers depend on the size and shape of the monitored region, the number of tags, the minimum transmission range among the tags, the actual coverage requirement (say, -coverage), and other factors. This problem can be solved by referring to the existing rich literature on sensor network coverage (see [4] and the references therein) and is orthogonal to our work in this paper.…”
Section: A Problem Formulationmentioning
confidence: 99%