2019
DOI: 10.1109/jcn.2019.000005
|View full text |Cite
|
Sign up to set email alerts
|

Coverage protocols for wireless sensor networks: Review and future directions

Abstract: The coverage problem in wireless sensor networks (WSNs) can be generally defined as a measure of how effectively a network field is monitored by its sensor nodes. This problem has attracted a lot of interest over the years and as a result, many coverage protocols were proposed. In this survey, we first propose a taxonomy for classifying coverage protocols in WSNs. Then, we classify the coverage protocols into three categories (i.e. coverageaware deployment protocols, sleep scheduling protocols for flat network… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
92
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 184 publications
(93 citation statements)
references
References 96 publications
0
92
0
1
Order By: Relevance
“…At the same time, the attainment of the maximum possible coverage of the network field for a given number of sensor nodes is anticipated. For these reasons, methodologies that pursue coverage maximization in two dimensions [174,175], three dimensions [176], or in conjunction with connectivity preservation are proposed [177][178][179].…”
Section: Open Research Issuesmentioning
confidence: 99%
“…At the same time, the attainment of the maximum possible coverage of the network field for a given number of sensor nodes is anticipated. For these reasons, methodologies that pursue coverage maximization in two dimensions [174,175], three dimensions [176], or in conjunction with connectivity preservation are proposed [177][178][179].…”
Section: Open Research Issuesmentioning
confidence: 99%
“…Another direction for future research is to measure barrier coverage using a nonlinear model of sensor deterioration over distance (e.g., the Elfes sensing model, see ).…”
Section: Conclusion and Open Problemsmentioning
confidence: 99%
“…We separate the common and data channel to isolate image download process of a certain e-tag from connection management of all other tags. Lastly, a gateway is wall-powered so that there is no energy constraint, and it is usually attached to the ceiling to maximize its coverage [19], as shown in FIGURE 1.…”
Section: B Main Hardware Componentsmentioning
confidence: 99%