TITLE

Connectivity and Coverage Preserving Schemes for Surveillance Applications in WSN

AUTHOR(S)
Sharma, Lokesh; Singh, Jaspreet; Agnihotri, Swati
PUB. DATE
July 2012
SOURCE
International Journal of Computer Applications;7/15/2012, Vol. 50, p33
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
In applications such as surveillance and target monitoring, high degree of coverage and connectivity are required. This paper investigates the problem of energy efficient coverage and connectivity for random placement of nodes such that active sensor nodes are minimized. We introduce an algorithm based on connected dominating set (CDS) and use it as a virtual backbone for network connectivity. Some nodes are refined from isolation to the backbone network, while others are connected under the tributaries of backbone network. If all the nodes are activated simultaneously, it leads to redundancy and wastage of resources in the network. In our work, coverage is achieved such that overlapping area is minimized, while connectivity of network is maintained via backbone network and its tributaries.
ACCESSION #
79748168

 

Related Articles

  • Adding the Reliability on Tree Based Topology Construction Algorithms for Wireless Sensor Networks. Fiaz, Mahzeb; Yousaf, Roomana; Hanfi, Maryam; Asif, Waqar; Qureshi, Hassaan; Rajarajan, Muttukrishnan // Wireless Personal Communications;Jan2014, Vol. 74 Issue 2, p989 

    Topology control is a technique used in wireless sensor networks to maximize energy efficiency and network lifetime. In previous literature, many tree based techniques have been proposed to save energy and increase the network lifetime. In tree based algorithms, the most promising solution is...

  • Ready, SET, still not ready to go. Guglielmo, Connie // Inter@ctive Week;03/23/98, Vol. 5 Issue 11, p5 

    Reports that the Secure Electronic Transaction (SET) protocol which ensures secure card payments over the Internet, will take another year before it becomes a way of business for credit-card-carrying consumers, merchants and banks. What the major credit-card companies were set up to do; What...

  • Approximation Algorithms for Maximum Weight Independent Set of Links Under the SINR Model. WANG, LIXIN; XU, XIAOHUA // Adhoc & Sensor Wireless Networks;2013, Vol. 17 Issue 3/4, p293 

    We study the following optimization problem in a plane multihop wireless network under the physical interference model. Given a multi-hop wireless network and a positive link weight (or demand) function, select a set of independent links whose total weight is maximized. This problem is known to...

  • SET is nearly ready to go, but will it ignite the marketplace? Cutler, Jeffrey // American Banker;9/22/1997, Vol. 162 Issue 182, p1 

    Speculates on the success of the Secure Electronics Transactions (SET) protocol, a technology that makes the Internet safe for buying, selling and paying transactions. Product features; Operation mechanics; Criticisms and complaints against the technology; User benefits. INSET: An introduction...

  • ENHANCEMENTS OF LEACH ALGORITHM FOR WIRELESS NETWORKS: A REVIEW. Madheswaran, M.; Shanmugasundaram, R. N. // Economy of Industry;Dec2013, Vol. 4 Issue 4, p821 

    Low Energy Adaptive Clustering Hierarchy (LEACH) protocol is the first hierarchical cluster based routing protocol successfully used in the Wireless Sensor Networks (WSN). In this paper, various enhancements used in the original LEACH protocol are examined. The basic operations, advantages and...

  • Real Time Communication Capacity for Data Delivery in Wireless Sensor Networks. Virmani, Deepali; Jain, Satbir // International Journal of Computer Science Issues (IJCSI);Jul2011, Vol. 8 Issue 4, p673 

    Real-time applications are performance critical applications that require bounded service latency. In multi-hop wireless ad-hoc and sensor networks, communication delays are dominant over processing delays. Therefore, to enable real-time applications in such networks, the communication latency...

  • RTT Estimation Method in WSN. Hyun-Chul Yi; Hong-Ju Kim; Yu-Jong Kim; Joon-Young Choi // International Proceedings of Computer Science & Information Tech;2012, Vol. 27, p17 

    This paper proposes method of estimates a round trip time in Wireless Sensor Network. Wireless network had dynamic transmission capacity because of many reasons. So, flow control is more important issues in the network. Using by proposed method, wireless network can use RTT values to flow...

  • A Cluster-based Routing Algorithm for WSN based on Residual Energy of the Nodes. Das, Supriya; Bala, P. Shanthi // International Journal of Computer Applications;Jul2013, Vol. 74 Issue 1-21, p16 

    Wireless sensor networks can be said as the latest development or improvement in the field of wireless communication. However the advantages of the WSN become limited due to the limited resources, especially low-capacity battery of the sensor nodes. Thus, energy aware routing is an important...

  • Improved Leach using Highest Remaining Energy First based Cluster Head Selection. Kaur, Navjot; Singh, Gagandeep // International Journal of Computer Applications;Oct2014, Vol. 103 Issue 1-17, p1 

    Power effectiveness found to be main limitation in WSN due to insufficient battery of sensor nodes. Therefore, the most significant focus of the existing work is to locate the ways to decrease the difficulty of power utilization and will result in improvement in the network stability period and...

Share

Read the Article

Courtesy of NEW JERSEY STATE LIBRARY

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics