This paper addresses the coverage breach problem in wireless sensor networks with limited bandwidths. In wireless sensor networks, sensor nodes are powered by batteries. To make efficient use of battery energy is critical to sensor network lifetimes. When targets are redundantly covered by multiple sensors, especially in stochastically deployed sensor networks, it is possible to save battery energy by organizing sensors into mutually exclusive subsets and alternatively activating only one subset at any time. Active nodes are responsible for sensing, computing and communicating. While the coverage of each subset is an important metric for sensor organization, the size of each subset also plays an important role in sensor network performance because when active sensors periodically send data to base stations, contention for channel access must be considered. The number of available channels imposes a limit on the cardinality of each subset. Coverage breach happens when a subset of sensors cannot completely cover all the targets. To make efficient use of both energy and bandwidth with a minimum coverage breach is the goal of sensor network design. This paper presents the minimum breach problem using a mathematical model, studies the computational complexity of the problem, and provides two approximate heuristics. Effects of increasing the number of channels and increasing the number of sensors on sensor network coverage are studied through numerical simulations. Overall, the simulation results reveal that when the number of sensors increases, network lifetimes can be improved without loss of network coverage if there is no bandwidth constraint; with bandwidth constraints, network lifetimes may be improved further at the cost of coverage breach.
M. X. Cheng et al., "Achieving Minimum Coverage Breach under Bandwidth Constraints in Wireless Sensor Networks," Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005, Institute of Electrical and Electronics Engineers (IEEE), Aug 2005.
The definitive version is available at http://dx.doi.org/10.1109/INFCOM.2005.1498547
24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005
Keywords and Phrases
Combinatories; Coverage Breach; Mathematical Programming
Library of Congress Subject Headings
Article - Conference proceedings
© 2005 Institute of Electrical and Electronics Engineers (IEEE), All rights reserved.