Figure 4: Average coverage over an intruder for different
number of nodes.
Figure 5 shows the average number of active
nodes in each cycle. As shown, to provide the
requested coverage always a fixed number of nodes
are required which means by increasing the number
of deployed nodes wakeup probability is reduced.
The main reason to use dynamic k-coverage is its
power efficiency. The number of active nodes in
each cycle is a very good measure of energy
consumption of each method. All dynamic
approaches wake less than a third of the static
approach.
Figure 5: Average number of active for different number
of nodes.
6 CONCLUSIONS
In this paper we presented a dynamic approach to
provide k-coverage over the area of an intrusion.
This approach provides 1-coverage over the
surveillance zone and k-coverage over the area of an
intrusion. Several solutions for misplaced k-
coverage problem which rises due to the dynamic
nature of approach are discussed. Each solution is
more suitable for a different kind of application. Our
simulations show dramatic improvement in energy
consumption of the network which results in higher
network lifetime. Our approach is completely
compatible with current popular MAC protocols in
WSNs. In this approach nodes do not need any
location information and due to its probabilistic
nature, minimal communication to provide k-
coverage is needed.
REFERENCES
Akyildiz I.F., Su W., Sankarasubramaniam Y., and Cayirci
E., 2002. "Wireless sensor networks: a survey,"
Computer Networks, vol. 38, pp. 393-422.
Chen B., Jamieson K., Balakrishnan H., and Morris R.,
2002, "Span: An Energy-Efficient Coordination
Algorithm for Topology Maintenance in Ad Hoc
Wireless Networks," Wireless Networks, vol. 8, pp.
481-494.
Dam T.V., and Langendoen K., 2003. "An adaptive
energy-efficient MAC protocol for wireless sensor
networks," In Proceedings of the 1st international
conference on Embedded networked sensor systems,
Los Angeles, California, USA: ACM, pp. 171-180.
Kumar S., Lai T.H., and Balogh J., October 2006. "On k-
coverage in a mostly sleeping sensor network,"
Wireless Networks.
Lu G., Sandagopan N., Krishnamachari B., and Goel A.,
"Delay efficient sleep scheduling in wireless sensor
networks, 2005." INFOCOM 2005. 24th Annual Joint
Conference of the IEEE Computer and
Communications Societies. Proceedings IEEE, vol. 4,
pp. 2470-2481 vol. 4.
Tian D. and Georganas N.D., 2002."A coverage-
preserving node scheduling scheme for large wireless
sensor networks," in Proceedings of the 1st ACM
international workshop on Wireless sensor networks
and applications, Georgia, USA: ACM, pp. 32-41.
Wang L. and Xiao Y., 2005. "Energy saving mechanisms
in sensor networks," Broadband Networks, 2005 2nd
International Conference on, pp. 777-785.
Wang Rui et al., 2006. “Swarm Intelligence for the Self-
Organization of Wireless Sensor Network,” In IEEE
congress on Evolutionary Computing, p. 838-842.
Wang X., et al. 2003, "Integrated coverage and
connectivity configuration in wireless sensor
networks," Proceedings of the 1st international
conference on Embedded networked sensor systems,
pp. 28-39.
Yahyavi A. et al., 2008. “DyKCo, Dynamic K-Coverage
in Wireless Sensor Networks,” IEEE International
Conference on Systems, Man, and Cybernetics, to
appear.
Ye F., Zhong G., Lu S., and Zhang L., 2002. "PEAS: a
robust energy conserving protocol for long-lived
sensor networks," Network Protocols, 2002.
Proceedings. 10th IEEE International Conference on,
pp. 200-201.
Ye W., Heidemann J., and Estrin D., 2004. "Medium
access control with coordinated adaptive sleeping for
wireless sensor networks," IEEE/ACM Trans. Netw.,
vol. 12, pp. 493-506.
WINSYS 2008 - International Conference on Wireless Information Networks and Systems
46