没有合适的资源?快使用搜索试试~ 我知道了~
WSN中覆盖漏洞的出现和存在将大大降低网络覆盖性能和服务质量。 为了减少覆盖漏洞的负面影响,本文基于提出的新型置信信息覆盖模型(CIC),研究了置信信息覆盖漏洞检测问题(CICHD)。 为了解决CICHD问题,我们设计了一种有效的启发式CIC漏洞检测算法。 在所提出的算法中,首先根据空间相关性和相关范围将感知场划分为一系列的重构网格。 然后,将基于CIC模型对每个重建网格进行扫描和检测,以判断其是否是覆盖Kong。 在获得每个重建网格的覆盖状态之后,将通过图像处理方法提取覆盖Kong边界。 仿真结果表明,该方案能够有效地检测出出现的覆盖Kong,包括位置和数量。
资源推荐
资源详情
资源评论
A Novel Confident Information Coverage Hole
Detection Algorithm in Sensor Networks
Zenghui Zou, Xianjun Deng
∗
, Lingzhi Yi, Zujun Tang, Minghua Wang, Xueyu Gong
The Department of Communications Engineering, University of South China(USC), Hengyang, China
*: Corresponding Author, Email: dengxj615@gmail.com
Abstract—The emergence and existence of coverage holes in
WSNs will dramatically degrade the network coverage perfor-
mance and quality of service. To diminish the negative effects
of coverage holes, this paper studies the confident information
coverage hole detection problem(CICHD) based on the proposed
novel confident information coverage model(CIC). For solving
the CICHD problem, we design an effective heuristic CIC hole
detection algorithm. In the proposed algorithm, the sensing field
is firstly partitioned into a series of reconstruction grids based
on the spatial correlation and correlation range. Then each
reconstruction grid will be scanned and detected based on the
CIC model to be judged whether it is a coverage hole or not.
After obtaining the coverage status of each reconstruction grid,
the coverage hole boundary will be extracted by image processing
method. Simulation results show that the proposed scheme
can efficiently detect the emerged coverage holes including the
locations and the number.
Index Terms—Confident Information Coverage, Coverage Hole
Detection, Wireless Sensor Networks
I. INTRODUCTION
Wireless sensor networks(WSNs) recently have been de-
ployed for a wide range of crucial applications with strin-
gent accuracy requirements[1][2]. Many of the sensing and
monitoring environment of these applications is hazardous and
unfriendly, it is hardly to deterministically deploy the sensors,
so the sensors can only be randomly scattered around the
sensing field.
The random deployment of sensor nodes will lead to
some uncovered blank subregions which are called coverage
holes[3] in the sensing field. In addition to the randomness
feature, the limited energy of the battery powered nodes, the
depletion of the nodes due to the unbalanced energy con-
sumption also unavoidably cause the coverage holes[4], which
would seriously impact the network coverage performance.
Coverage, as a critical factor for the success of a WSN, re-
flects how well a field is sensed and monitored[5]. The WSN-
based applications nearly always have stringent requirements
on the network coverage performance and quality of service.
However, these coverage requirements would not always be
satisfied because of the emerged and existed coverage holes,
thus it extremely needs to detect and localize the coverage
holes, which we refer to as the coverage hole detection
problem.
In order to solve the coverage hole detection problem, a
wide range of efforts have been done[8]-[9]. However, most
of the current studies on the coverage hole detection are based
on the disk coverage model, which defines a disk centered at
the sensor with the radius of its sensing range [5][6][7]. The
disk coverage model is too simple and idealistic to be applied
in many practical applications, especially in the WSN-based
applications with rigid accuracy and error requirements.
To overcome the deficiencies of the disk model based hole-
detection schemes, in this paper, we study how to efficiently
detect the coverage holes of a WSN utilizing the confident
information coverage model(shorted as CIC or Φ-coverage)
which is a novel coverage model proposed in our previous
study[10]. We first address and model the Confident Infor-
mation Coverage Hole Detection(CICHD) problem with the
goal of finding all the locations and number of the confident
information coverage holes.
For solving the CICHD problem, we design an effective
heuristic confident information coverage hole detection al-
gorithm named CHD, which takes the Root Mean Square
Error(RMSE) as the evaluation indicator to judge a subregion
whether is a CIC coverage hole or not. The main idea of the
CHD scheme is to firstly partition the hole-detection required
sensing field into a series of reconstruction grids based on the
spatial correlation of the monitored physical attribute, and then
calculate the RMSE using the confident information coverage
model and compare it with the given RMSE threshold to
judge each grid whether is a hole. Once the RMSE of a
reconstruction grid is greater than the given threshold which
means the grid is a confident information coverage hole, the
CHD will extract the boundary of the CIC hole by using the
image processing methods. After achieving the coverage status
of each reconstruction grid, the CHD could obtain the two-
dimensional black-and-white image of the sensor network by
binarization, and suppress the image noise by using open and
close loop operations so that the shape features are maintained
and the irrelevant structures are removed. After that, the
boundary of the confident information coverage holes can be
successfully extracted.
The rest of this paper is organized as follows. Section II
reviews some coverage hole detection work studied in WSNs.
Section III presents the formal definition of the confident
information coverage hole detection problem. The proposed
heuristic algorithm is shown in Section IV and evaluated via
simulations in Section V. We conclude the paper in Section VI.
II. R
ELATED WORK
The emerged coverage holes will break the running of a
WSN and eventually lead to the failure of a specific WSN-
2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom)
and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)
978-1-5090-5880-8/16 $31.00 © 2016 IEEE
DOI 10.1109/iThings-GreenCom-CPSCom-SmartData.2016.57
199
2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom)
and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)
978-1-5090-5880-8/16 $31.00 © 2016 IEEE
DOI 10.1109/iThings-GreenCom-CPSCom-SmartData.2016.57
199
资源评论
weixin_38551143
- 粉丝: 3
- 资源: 937
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功