Ieee Infocom 2009 2009
DOI: 10.1109/infcom.2009.5061915
|View full text |Cite
|
Sign up to set email alerts
|

Trap Coverage: Allowing Coverage Holes of Bounded Diameter in Wireless Sensor Networks

Abstract: Abstract-Tracking of movements such as that of people, animals, vehicles, or of phenomena such as fire, can be achieved by deploying a wireless sensor network. So far only prototype systems have been deployed and hence the issue of scale has not become critical. Real-life deployments, however, will be at large scale and achieving this scale will become prohibitively expensive if we require every point in the region to be covered (i.e., full coverage), as has been the case in prototype deployments.In this paper… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
52
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 70 publications
(52 citation statements)
references
References 30 publications
(58 reference statements)
0
52
0
Order By: Relevance
“…The appropriate density that is needed to guarantee a desired probability of coverage is known [7], [25], [26]. As can be seen in Figure 9 of [7] where density estimates for barrier coverage are presented, these estimates are reliable; they closely match the behavior observed in experiments.…”
Section: A Statistical Redundancy In Random Deploymentsmentioning
confidence: 56%
“…The appropriate density that is needed to guarantee a desired probability of coverage is known [7], [25], [26]. As can be seen in Figure 9 of [7] where density estimates for barrier coverage are presented, these estimates are reliable; they closely match the behavior observed in experiments.…”
Section: A Statistical Redundancy In Random Deploymentsmentioning
confidence: 56%
“…In trap coverage, coverage holes are allowed to exist as long as the diameters of the holes are bounded. Sensor density estimation for these coverage requirements are derived [14], [4], [16], [5]. The optimal deterministic deployment pattern for 1-coverage is based on triangle lattices, which has been proved in [13].…”
Section: Related Workmentioning
confidence: 99%
“…Generally, if sensors are deployed in a bounded region, the area very close to the boundary is likely to have fewer sensors than the interior area, and hence less likely to be covered as required. A common method to avoid this boundary effect is to deploy the sensors in a slightly larger region A ′ , e.g., enlarging the side length of A from d to d +r [5]. The difference is negligible if A is sufficiently large.…”
Section: A Technique Overviewmentioning
confidence: 99%
See 1 more Smart Citation
“…only when the expected degree grows with n, while coverage requires the stronger condition that the network be connected. In the absence of coverage, Balister et al [3] determine the maximum diameter of the uncovered regions, while Dousse et al [12] prove that, for any λ > 0, the detection time for a target moving in a fixed direction has an exponential tail. (Note that this is not a mobility result as the nodes are fixed.…”
Section: Motivation and Related Workmentioning
confidence: 99%