File Download
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1155/2010/926075
- Scopus: eid_2-s2.0-77953497399
- WOS: WOS:000278611000001
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Perimeter coverage scheduling in wireless sensor networks using sensors with a single continuous cover range
Title | Perimeter coverage scheduling in wireless sensor networks using sensors with a single continuous cover range |
---|---|
Authors | |
Issue Date | 2010 |
Publisher | Hindawi Publishing Corp. The Journal's web site is located at http://www.hindawi.com/journals/wcn/index.html |
Citation | Eurasip Journal On Wireless Communications And Networking, 2010, v. 2010, article no. 926075 How to Cite? |
Abstract | In target monitoring problem, it is generally assumed that the whole target object can be monitored by a single sensor if the target falls within its sensing range. Unfortunately, this assumption becomes invalid when the target object is very large that a sensor can only monitor part of it. In this paper, we study the perimeter coverage problem where the perimeter of a big object needs to be monitored, but each sensor can only cover a single continuous portion of the perimeter. We describe how to schedule the sensors so as to maximize the network lifetime in this problem. We formally prove that the perimeter coverage scheduling problem is NP-hard in general. However, polynomial time solution exists in some special cases. We further identify the sufficient conditions for a scheduling algorithm to be a 2-approximation solution to the general problem, and propose a simple distributed 2-approximation solution with a small message overhead. Copyright © 2010 K.-S. Hung and K.-S. Lui. |
Persistent Identifier | http://hdl.handle.net/10722/155571 |
ISSN | 2023 Impact Factor: 2.3 2023 SCImago Journal Rankings: 0.661 |
ISI Accession Number ID | |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hung, KS | en_US |
dc.contributor.author | Lui, KS | en_US |
dc.date.accessioned | 2012-08-08T08:34:09Z | - |
dc.date.available | 2012-08-08T08:34:09Z | - |
dc.date.issued | 2010 | en_US |
dc.identifier.citation | Eurasip Journal On Wireless Communications And Networking, 2010, v. 2010, article no. 926075 | en_US |
dc.identifier.issn | 1687-1472 | en_US |
dc.identifier.uri | http://hdl.handle.net/10722/155571 | - |
dc.description.abstract | In target monitoring problem, it is generally assumed that the whole target object can be monitored by a single sensor if the target falls within its sensing range. Unfortunately, this assumption becomes invalid when the target object is very large that a sensor can only monitor part of it. In this paper, we study the perimeter coverage problem where the perimeter of a big object needs to be monitored, but each sensor can only cover a single continuous portion of the perimeter. We describe how to schedule the sensors so as to maximize the network lifetime in this problem. We formally prove that the perimeter coverage scheduling problem is NP-hard in general. However, polynomial time solution exists in some special cases. We further identify the sufficient conditions for a scheduling algorithm to be a 2-approximation solution to the general problem, and propose a simple distributed 2-approximation solution with a small message overhead. Copyright © 2010 K.-S. Hung and K.-S. Lui. | en_US |
dc.language | eng | en_US |
dc.publisher | Hindawi Publishing Corp. The Journal's web site is located at http://www.hindawi.com/journals/wcn/index.html | en_US |
dc.relation.ispartof | Eurasip Journal on Wireless Communications and Networking | en_US |
dc.rights | This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. | - |
dc.title | Perimeter coverage scheduling in wireless sensor networks using sensors with a single continuous cover range | en_US |
dc.type | Article | en_US |
dc.identifier.email | Lui, KS:kslui@eee.hku.hk | en_US |
dc.identifier.authority | Lui, KS=rp00188 | en_US |
dc.description.nature | published_or_final_version | en_US |
dc.identifier.doi | 10.1155/2010/926075 | en_US |
dc.identifier.scopus | eid_2-s2.0-77953497399 | en_US |
dc.identifier.hkuros | 210667 | - |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-77953497399&selection=ref&src=s&origin=recordpage | en_US |
dc.identifier.volume | 2010 | en_US |
dc.identifier.isi | WOS:000278611000001 | - |
dc.publisher.place | United States | en_US |
dc.identifier.scopusauthorid | Hung, KS=23008935900 | en_US |
dc.identifier.scopusauthorid | Lui, KS=7103390016 | en_US |
dc.identifier.issnl | 1687-1472 | - |