• 沒有找到結果。

Decentralized Boundary Detection without Location Information in Wireless Sensor Networks

N/A
N/A
Protected

Academic year: 2021

Share "Decentralized Boundary Detection without Location Information in Wireless Sensor Networks"

Copied!
23
0
0

加載中.... (立即查看全文)

全文

(1)

/ 23

Decentralized Boundary

Detection without Location

Information in Wireless

Sensor Networks

Wei-Cheng Chu Kuo-Feng Ssu

Institute of Computer and Communication Engineering Department of Electrical Engineering

National Cheng Kung University Tainan, Taiwan

(2)

Outline

Introduction Related work

Network assumptions

Decentralized Boundary Detection (DBD)

Simulation Conclusions

(3)

Introduction

Wireless sensor networks have a wide range of

applications

The environment may contain physical obstacles

and communication holes

A hole or a physical obstacle can be regarded as

(4)

Motivation

Obstacle detection (or boundary detection) is a

major concern in most WSN applications

Previous detection mechanisms are

topology-based, which are not suitable for the dynamic hole detection

(5)

Goals

Distributed Location-free

Dynamic hole detection Correctness guaranteed

(6)

Related Work (THD)

S. Funke and C. Klein, “Hole Detection or: “How

much Geometry hides in Connectivity?””

Breakpoint Broken contour 1 2 3 1 2 3 s s

(7)

Related Work (TTG)

D. Dong, Y. Liu, and X. Liao, “Fine-grained

Boundary Recognition in Wireless Ad Hoc and

Sensor Networks by Topological Methods”

(8)

Related Work (BR)

O. Saukh, R. Sauter, M. Gauger, and P. J.

Marron, “On Boundary Recognition without Location Information in Wireless Sensor

Networks”

Flower structure Fail to construct the flower structure

(9)

Assumptions and System Model

Location-free

Non-unit disk graph

d-Quasi Unit Disk Graph (d-QUDG)

Each edge is a two-way communication link

Each node is aware of its one, two, and three-hop

(10)

Overview

s

Broken contour Contour

s

A boundary node should be nearby a broken contour

(11)

Definition of Hole

Hole cycle: a cycle with length larger than three

and it cannot be decomposed into several cycles with smaller length

Hole: the face formed by hole cycle

Hole

Hole

(12)

Rule 1

For the hole cycle with length larger than five

 Determines whether the contour in two-hop neighbor graph is broken or not

Broken contour

Node s is a boundary node

s s

s

The contour in one-hop neighbor graph is difficult to determine whether it is broken or not

(13)

s

Exception of Rule 1

Not able to identify the hole cycle with length

(14)

s

Rule 2

For the hole cycle with length smaller than six

 Identifies the hole cycle in one, two-hop neighbor graph

s

(15)

Correctness Proof

Step 1: A hole cycle has continuity and

consistency properties

Step 2: All nodes of hole cycles can be identified

Step 3: All boundary nodes near or belonging to

hole cycles

Step 4: The identified boundaries of DBD contain

(16)

Simulation

Network field: 600m × 600m

Communication range: 20m

Embeddings: UDG and 0.7-QUDG

Number of nodes: 700 to 2200 Number of runs: 100

(17)

Control Overhead

The control overhead is calculated as the average

(18)

Detection Results (1/4)

UDG with degree 12

(19)

Detection Results (2/4)

UDG with degree 12

(20)

Detection Results (3/4)

0.7-QUDG with degree 12

(21)

Detection Results (4/4)

0.7-QUDG with degree 12

(22)

Conclusions

No UDG constraint

Any length of hole cycle can be detected

Requires only 3-hop neighbors’ information

Can be applied in the environment with mobile

nodes

The accuracy of hole shape is better than previous

(23)

參考文獻

相關文件

 Service Level Agreement – ensure at least 99.7% availability of the WiFi service, support four-hour response time and four-hour service recovery with active monitoring,

• Learn about wireless communications and networks!. • Why is it so different from wired communications

“Ad-Hoc On Demand Distance Vector Routing”, Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), pages 90-100, 1999.. “Ad-Hoc On Demand

The PLCP Header is always transmitted at 1 Mbit/s and contains Logical information used by the PHY Layer to decode the frame. It

• As RREP travels backwards, each node sets pointer to sending node and updates destination sequence number and timeout entry for source and destination routes.. “Ad-Hoc On

Kyunghwi Kim and Wonjun Lee, “MBAL: A Mobile Beacon-Assisted Localization Scheme for Wireless Sensor Networks,” The 16th IEEE International Conference on Computer Communications

Krishnamachari and V.K Prasanna, “Energy-latency tradeoffs for data gathering in wireless sensor networks,” Twenty-third Annual Joint Conference of the IEEE Computer

Wen Ouyang, Yu-Ting Liu, Yu-Wei Lin[18]在 2009 年發表了論文-”Entropy-based Distributed Fault-tolerant Event Boundary Detection Algorithm in Wireless Sensor