loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Amir Yahyavi 1 ; Laleh Roostapour 2 ; Roohollah Aslanzadeh 2 ; Mehdi Dehghan 2 and Nasser Yazdani 1

Affiliations: 1 University of Tehran, Iran, Islamic Republic of ; 2 Amirkabir University of Technology, Iran, Islamic Republic of

Keyword(s): k-Coverage, Wireless Sensor networks, Surveillance and Monitoring, Sleep Scheduling.

Related Ontology Subjects/Areas/Topics: Data Communication Networking ; Information and Systems Security ; Mobile Ad-Hoc and Sensor Networks ; Network Management ; Sensor, Mesh and Ad Hoc Communications and Networks ; Telecommunications ; Wireless Information Networks and Systems

Abstract: One of the main applications of Wireless Sensor Networks is surveillance and monitoring. Providing and maintaining the required coverage over the area of an intrusion (or other events of our choice) is of great importance. The network should be able to provide different levels of coverage based on application needs and reconfigure itself while ensuring energy efficiency. In this paper we present a dynamic approach to provide asymptotic k-coverage over the area of an intrusion. This is a probabilistic approach which creates full coverage over the surveillance zone and provides k-coverage over the area of an event. Our simulations show that this approach is able to provide the requested coverage while consuming less than a third of the static approaches. Also due to probabilistic nature of this approach communication overhead is much lower than deterministic methods.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 52.14.0.24

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Yahyavi, A.; Roostapour, L.; Aslanzadeh, R.; Dehghan, M. and Yazdani, N. (2008). INTRUSION K-COVERAGE IN WIRELESS SENSOR NETWORKS. In Proceedings of the International Conference on Wireless Information Networks and Systems (ICETE 2008) - WINSYS; ISBN 978-989-8111-62-3, SciTePress, pages 41-46. DOI: 10.5220/0002024900410046

@conference{winsys08,
author={Amir Yahyavi. and Laleh Roostapour. and Roohollah Aslanzadeh. and Mehdi Dehghan. and Nasser Yazdani.},
title={INTRUSION K-COVERAGE IN WIRELESS SENSOR NETWORKS},
booktitle={Proceedings of the International Conference on Wireless Information Networks and Systems (ICETE 2008) - WINSYS},
year={2008},
pages={41-46},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002024900410046},
isbn={978-989-8111-62-3},
}

TY - CONF

JO - Proceedings of the International Conference on Wireless Information Networks and Systems (ICETE 2008) - WINSYS
TI - INTRUSION K-COVERAGE IN WIRELESS SENSOR NETWORKS
SN - 978-989-8111-62-3
AU - Yahyavi, A.
AU - Roostapour, L.
AU - Aslanzadeh, R.
AU - Dehghan, M.
AU - Yazdani, N.
PY - 2008
SP - 41
EP - 46
DO - 10.5220/0002024900410046
PB - SciTePress