Professional Documents
Culture Documents
This article has been accepted for publication in a future issue of this journal, but has not been fully edited.
Content may change prior to final publication in an issue of the journal. To cite the paper please use the doi provided on the Digital Library page.
Arouna Ndam Njoya1,* , Christopher Thron2 , Jordan Barry2 , Wahabou Abdou3 , Emmanuel Tonye4 ,
Siri Konje Lawrencia Nukenine1 , Albert Dipanda3
1
University Institute of Technology, University of Ngaoundéré, Ngaoundéré, Cameroon
2
Department of Mathematics, Texas A&M University-Central Texas, Killeen, USA
3
Laboratoire Electronique, Informatique et Image, Univ. Bourgogne Franche-Comté, Dijon, France
4
National Advanced School of Engineering, University of Yaoundé I, Yaoundé, Cameroon
5
University Institute of Technology, University of Ngaoundéré, Ngaoundéré, Cameroon
*
ndanjoa@gmail.com
Abstract: Large applications of sensor networks, such as environmental risk monitoring, require
the deployment of hundreds or even thousands of nodes. This paper proposes and implements a
novel stochastic physics-based optimization algorithm that is both efficient (guarantees full target
coverage with a reduced number of sensors) and scalable (meaning that it can be executed for very
large-scale problems in a reasonable computation time). The algorithm employs “virtual sensors”
which move, merge, recombine, and “explode” during the course of the algorithm, where the
process of merging and recombining virtual sensors reduces the number of actual sensors while
maintaining full coverage. The parameters which control sensor merging and explosion are varied
during the algorithm to perform the same function as an annealing schedule in simulated annealing.
Simulation results illustrate the rapidity and the effectiveness of the proposed method.
1. Introduction
1
IET Review Copy Only
IET Wireless Sensor Systems Page 2 of 22
This article has been accepted for publication in a future issue of this journal, but has not been fully edited.
Content may change prior to final publication in an issue of the journal. To cite the paper please use the doi provided on the Digital Library page.
Although coverage requirements may vary considerably from application to application, the
requirements typically fall into one of three categories [5, 6, 7, 4]:
• Area coverage, which focuses on complete coverage of the entire monitoring area [8, 9, 10,
11].
• Target coverage, whose objective is to monitor specific points of the monitoring area. Target
coverage can be further divided into three categories: (1) Simple coverage, where each target
should be covered by at least one sensor; (2) k-coverage, which requires that at least k sensors
to cover each target; (3) Q-coverage, where the number of sensors required to cover each
target is specified individually for each target [7, 12, 13, 14].
• Barrier coverage, that seeks to limit intrusion into a bounded area. In this case, sensors are
required to cover the boundary of the restricted region [15, 16, 17].
This paper focuses on the deterministic placement of sensor nodes for simple target coverage.
The objective is to minimize the number of deployed sensors while maintaining coverage of all
targets. For this purpose, an algorithm that is based on an analogy with the physical motion of
astronomical bodies is introduced: an efficient sensor placement is attained through a process in
which potential sensor locations move and combine under the influence of “forces” exerted by
other potential sensor locations.
Our algorithm is noteworthy in three very important respects. First, unlike previous algorithms
it does not fix the number of sensors, but rather reduces the number of sensors during the course of
the algorithm’s execution by means of “sensor combine” operations. Second, the algorithm guar-
antees full target coverage, unlike many algorithms which attempt to obtain the “best” coverage
with a fixed number of sensors. Third, execution time scales linearly with the size of the problem,
which means that in can applied to extremely large systems.
The rest of the paper is organized as follows. Section 2 reviews previous work on the sensor
placement problem. In Section 3 the problem is formally defined. The proposed method is given in
Section 4. Section 5 presents the effectiveness of the proposed method through simulations results.
Section 6 summarizes our conclusions.
2. Related Work
The sensor deployment problem for target coverage has been shown to be a NP-hard optimization
problem [18, 5]. Existing approaches fall into three categories [5]: exhaustive search, discrete
optimization based approaches, and approximation algorithms.
Exhaustive search consists of enumerating all possible sensor placements and selecting the best
one(s). This technique is only practical for very small problems, because the computation time of
the exhaustive search grows exponentially with the number of targets [5, 19].
Discrete optimization-based approaches reformulate the problem as an integer-valued con-
strained optimization problem [19, 20, 21, 22]. It is possible to formulate the sensor placement
problem as an integer linear program [20, 21, 23], which can then be solved with conventional
solvers. Once again, a high computational effort is required to compute the solution in larger sys-
tems [6, 5, 20, 23, 37]. Computation time can be decreased by decomposing the original problem
into sub-problems that are solved independently and then merged to find an overall solution. How-
ever, these methods cannot guarantee optimality of the merged solution [5]. Some researchers have
proposed adaptive heuristics to approximate the solution of the problem [20, 21, 23, 14].
2
IET Review Copy Only
Page 3 of 22 IET Wireless Sensor Systems
This article has been accepted for publication in a future issue of this journal, but has not been fully edited.
Content may change prior to final publication in an issue of the journal. To cite the paper please use the doi provided on the Digital Library page.
Approximation algorithms are heuristics that try to find a nearly optimal solution within a rea-
sonable execution time. Such algorithms are typically used when exact methods are impractical.
Many approximation algorithms based on different mathematical techniques have been developed
for various cases of the sensor node placement problem. Techniques employed include greedy
algorithms [24], simulated annealing [25], genetic algorithms [9, 26, 27, 28, 29, 30, 31], ant
colony optimization [4], artificial bee colony and particle swarm optimization [7]. Many of these
techniques are inspired by analogies with physical or biological processes.
In keeping with previous work, we take a heuristic approach due to the enormous computational
complexity of exact solutions for simple target coverage involving very large numbers of targets.
We also draw inspiration from a physical process, namely the motion of astronomical bodies under
the influence of mutual gravitational force.
1 if d(s, t) ≤ rs
f (s, t) = (1)
0 otherwise,
where d(s, t) is the Euclidean distance between a sensor s and a target t. With this model, a target
is considered to be covered by the sensor if it is located inside the disk. Otherwise the target is not
covered.
4. Proposed Method
4.1. Overview
The proposed method is based on the use of virtual sensors. These can be moved, merged, recom-
bined or unmerged in order to provide the best deployment. Initially, each target is covered by one
virtual sensor, so that at the beginning of the algorithm there are as many targets as virtual sensors.
It is evident that many sensors should cover multiple targets if we want to obtain a covering that
minimizes the number of sensors. To achieve this, the proposed algorithm allows the fusion of
close virtual sensors if this operation guarantees that all targets will be covered. This operation is
called “Merge”. Besides merging, the algorithm include other operations to dynamically change
the cover in order to explore efficient coverage options. Two operations denoted by “Grab” and
3
IET Review Copy Only
IET Wireless Sensor Systems Page 4 of 22
This article has been accepted for publication in a future issue of this journal, but has not been fully edited.
Content may change prior to final publication in an issue of the journal. To cite the paper please use the doi provided on the Digital Library page.
“Release” shuffle targets between existing sensors. In order to guarantee that the algorithm does
not get stuck in a suboptimal configuration, an “Explode” operation is also included that restores
a combined sensor back to the original state where each target is covered by only one sensor. In
addition to these operations that reconfigure the sensor coverage, a quasi-physical motion is intro-
duced in order to place sensors in favorable positions for merging or other operations. This motion
is determined by velocity and acceleration parameters which are specified for each active sensor.
4
IET Review Copy Only
Page 5 of 22 IET Wireless Sensor Systems
This article has been accepted for publication in a future issue of this journal, but has not been fully edited.
Content may change prior to final publication in an issue of the journal. To cite the paper please use the doi provided on the Digital Library page.
5
IET Review Copy Only
IET Wireless Sensor Systems Page 6 of 22
This article has been accepted for publication in a future issue of this journal, but has not been fully edited.
Content may change prior to final publication in an issue of the journal. To cite the paper please use the doi provided on the Digital Library page.
where the drag term is included to ensure that the velocity does not become too large.
4.5.1. Sensor Explode: Fig. 2b illustrates an example of the effects of the Sensor Explode
operation. In this case, the sensor S1 which covers targets T1 , T2 , T3 , and T4 explodes and produces
four sensor nodes Sj located at positions t~j , j = 1, 2, 3, 4. The velocities of these sensors are
computed as follows:
r t~j − s~1
→
− s P rob
vj = + (3)
2 (d(S1 , Tj ) + 0.00001) 2
where P rob is a bivariate normal random variable. (3) causes the sensors resulting from the explo-
sion to move away from the location of sensor 1, in order to increase the chances of their combining
6
IET Review Copy Only
Page 7 of 22 IET Wireless Sensor Systems
This article has been accepted for publication in a future issue of this journal, but has not been fully edited.
Content may change prior to final publication in an issue of the journal. To cite the paper please use the doi provided on the Digital Library page.
S2
d(S1, S3)>2rs t3
t1
t2 S3
S1
t2 t2
d(S 1, S 6)> s
Explode S1
t1 t1
2r
t4 t3 t4 t3
t5
t4 S4 S1
t6 S4
S3
S6
a b
Grab(S2, S25 )
Release(S2, S25 )
t2 S2
t6 S12
t12 t6 t12
t8
t13 t2 t8 t13
S6 t18 S8 t18
t34
t25
c d
4.5.2. Sensor Recombine: Two operators are performed in sensor recombine: Sensor Grab,
and Sensor Release. Note that only one of these operations is executed when sensor recombine is
called. The choice of which operation to execute is determined by the grab probability.
Sensor Release: An example case of the Sensor Release concept is shown in Fig. 2c in which
there are 3 sensors indexed by 2, 12 and 25 (each sensor is indexed with the smallest index of those
targets covered by the sensor). The Sensor Release operation eliminates all possible targets within
sensor 2 and gives them to sensors 12 and 25, where 12 and 25 are in sensor 2’s tryMerge list.
After reassigning, each remaining sensor is indexed by the minimum index of all targets covered
7
IET Review Copy Only
IET Wireless Sensor Systems Page 8 of 22
This article has been accepted for publication in a future issue of this journal, but has not been fully edited.
Content may change prior to final publication in an issue of the journal. To cite the paper please use the doi provided on the Digital Library page.
by that sensor. In the example in Fig. 2c, the remaining sensors are 2, 6, and 8. After execution of
this operation, the sensor.valid fields of remaining sensors are set to false and their sensor.pending
fields are set to true.
Sensor Grab: Fig. 2d describes an example case in which there are 3 sensors indexed by 2, 6
and 25. In this case, sensors 6 and 25 are both on the tryMerge list for sensor 2. The Sensor Grab
operation reassigns to sensor 2 all targets covered by 6 and 25 which can possibly be covered by
sensor 2. After reassigning, each remaining sensor is indexed by the minimum index of all targets
covered by that sensor. For the example in Fig. 2d, the sensor.valid fields for sensors 2, 12 and
25 are set to false, and the sensor.pending fields for 2 and 12 take the value true. Observe that the
number of valid sensors has decreased by one.
8
IET Review Copy Only
Page 9 of 22 IET Wireless Sensor Systems
This article has been accepted for publication in a future issue of this journal, but has not been fully edited.
Content may change prior to final publication in an issue of the journal. To cite the paper please use the doi provided on the Digital Library page.
(u)
the segment joining ~si and ~si to a position where ~t remains within coverage. This segment can
(u)
be parametrized as ~si + β(~si − ~si ), where 0 ≤ β ≤ 1. For ~t to remain covered, we require that
f (β) < rs2 , where
2
(u)
f (β) =
~t − ~si + β ~si − ~si
, 0 ≤ β ≤ 1 (6)
f (β) = aβ 2 + bβ + c,
where
2
(u)
a =
(~si − ~si )
(u)
b = 2(~t − ~si ) · (~si − ~si )
2
c =
~t − ~si
If we let
rs2 − f (0)
βr =
f (1) − f (0)
it follows that
f (βr ) ≤ rs2
0
2
~ 2
(t − ~
s i
≤ rs
)
where
0 (u)
~si = ~si + βr (~si − ~si ). (7)
0
Thus ~si can be chosen as the corrected updated target position.
5. Experiments
9
IET Review Copy Only
IET Wireless Sensor Systems Page 10 of 22
This article has been accepted for publication in a future issue of this journal, but has not been fully edited.
Content may change prior to final publication in an issue of the journal. To cite the paper please use the doi provided on the Digital Library page.
250
200
Number of sensors
150
100
50
0
0 500 1000 1500 2000 2500
Iterations
a b
• nPlanet: 10
• K: rs2 /8
• Drag: 0.5
• Recombine probability: 0.25
• Grab probability: 0.5
• Explode probability: see (8)
Note that parameters used are not fully optimized, because the present paper is merely intended
to provide initial proof of concept. The explode probability is computed as follows:
1 waitP eriod 2
) × 500
× 10(−mod(numIter, 5 waitP eriod2
)
(8)
ncur
where ncur is the current number of sensors, and numIter the iteration number. The explosion
probability is designed so that short bursts of high explosion rate occur at regular intervals, which
gives the algorithm the opportunity to explore the solution spaces more thoroughly. The current
code is arranged so that at least 5 bursts occur during the wait period as shown in Fig. 3b.
10
IET Review Copy Only
Page 11 of 22 IET Wireless Sensor Systems
This article has been accepted for publication in a future issue of this journal, but has not been fully edited.
Content may change prior to final publication in an issue of the journal. To cite the paper please use the doi provided on the Digital Library page.
11
IET Review Copy Only
IET Wireless Sensor Systems Page 12 of 22
This article has been accepted for publication in a future issue of this journal, but has not been fully edited.
Content may change prior to final publication in an issue of the journal. To cite the paper please use the doi provided on the Digital Library page.
8000 in geometric progression with ratio 2. The region size was varied from 750 m to 24000 m in
geometric progression with ratio 2. For each test scenario, 10 random target location configurations
were generated using the given parameters, and the algorithm was run 10 times on each target
location configuration. For each run the final number of sensors, number of iterations and run time
were recorded.
In our second set of simulations, we used the GPS coordinates of 106 targets that represent
administrative centers, public centers, and crossroads of the city of Yaounde, Cameroon [33]. For
this test instance rs varies from 250 m to 1000 m in arithmetic sequence with increment 250.
The parameter γ can be interpreted as the mean number of targets per single sensor area for a
randomly-placed sensor in the region. From Fig.7a, we observe that the relative improvement
achieved by the algorithm depends on region size, target radius, and number of targets only through
the parameter γ. Thus for instance, if we quadruple the region area and number of targets while
holding sensor radius fixed, then the number of sensors in the cover will also roughly quadruple.
The fact that the relative improvement of our algorithm is independent of problem size shows that
the efficiency does not degrade for larger problems. We may also note from Fig.7a that the cover
size ratio is less than 1 when γ is less than 16: this shows that the algorithm is more efficient at
12
IET Review Copy Only
Page 13 of 22 IET Wireless Sensor Systems
This article has been accepted for publication in a future issue of this journal, but has not been fully edited.
Content may change prior to final publication in an issue of the journal. To cite the paper please use the doi provided on the Digital Library page.
1500
700
600
500 1000
Height(m)
Height(m)
400
300
500
200
100
0
0 100 200 300 400 500 600 700 0
0 500 1000 1500
Width(m) Width(m)
a b
3000 3000
2500 2500
2000 2000
Height(m)
Height(m)
1500 1500
1000 1000
500 500
0 0
0 500 1000 1500 2000 2500 3000 0 500 1000 1500 2000 2500 3000
Width(m) Width(m)
c d
covering randomly-distributed targets than hexagonal area coverage as long as the parameter γ is
16 or less. Thus for even for rather high target densities, we can still obtain improvements over
full-area coverage by using our algorithm.
For random target configurations with very low target densities, it is possible to compute the
13
IET Review Copy Only
IET Wireless Sensor Systems Page 14 of 22
This article has been accepted for publication in a future issue of this journal, but has not been fully edited.
Content may change prior to final publication in an issue of the journal. To cite the paper please use the doi provided on the Digital Library page.
smallest cover within a reasonable computation time by first identifying all pairs of targets that
are within 2rs of each other, and then finding (by exhaustion) all clusters of 3, 4, 5, 6, . . . sensors.
This method was used to estimate the mean cover size for random target configurations for several
different region sizes and target densities.
In Table 6, these results are compared with those obtained from the proposed algorithm. We
find that there is extremely close agreement between the theoretical best mean sensor per target
values and the sensor per target values obtained by our algorithm. This shows that our algorithm is
very close to optimal for random target distributions with low target densities.
The results we have described so far show that for both small and large densities, the number
of sensors required to cover a randomly-distributed set of targets is proportional to the number
of targets, and the constant of proportionality depends only on the parameter γ. The constant of
14
IET Review Copy Only
Page 15 of 22 IET Wireless Sensor Systems
This article has been accepted for publication in a future issue of this journal, but has not been fully edited.
Content may change prior to final publication in an issue of the journal. To cite the paper please use the doi provided on the Digital Library page.
15
IET Review Copy Only
IET Wireless Sensor Systems Page 16 of 22
This article has been accepted for publication in a future issue of this journal, but has not been fully edited.
Content may change prior to final publication in an issue of the journal. To cite the paper please use the doi provided on the Digital Library page.
11 11
10 10
9 9
8 8
7 7
Height(km)
Height(km)
6 6
5 5
4 4
3 3
2 2
1 1
0 0
0 5 10 15 0 5 10 15
Width(km) Width(km)
a b
11 11
10 10
9 9
8 8
7 7
Height(km)
Height(km)
6 6
5 5
4 4
3 3
2 2
1 1
0 0
0 5 10 15 0 5 10 15
Width(km) Width(km)
c d
Fig. 6. Sensor deployment of administrative centers, public centers, and crossroads of the city of
Yaounde, Cameroon with different sensor radii
a rs = 1000 m (23 sensor nodes)
b rs = 750 m (33 sensor node)
c rs = 500 m (50 sensor nodes)
d rs = 250 m (73 sensor nodes)
proportionality is graphed as a function of γ (in log scale) in Fig.7d. The curve resembles a logistics
curve, so we attempted a fit with the following functional form:
number of targets
number of sensors = (10)
(1 + (a × γ)b )
The least-squares best fit parameters were found to be a = 1.5 and b = 0.855. As shown in
the figure, the logistics curve with these parameters fits the data extremely well. This formula is
of considerable mathematical interest, because it estimates the expected number of circles of fixed
size that are required to cover a set of random points in the plane with a given density.
Besides efficiency, we are also interested in the computational complexity of the algorithm.
16
IET Review Copy Only
Page 17 of 22 IET Wireless Sensor Systems
This article has been accepted for publication in a future issue of this journal, but has not been fully edited.
Content may change prior to final publication in an issue of the journal. To cite the paper please use the doi provided on the Digital Library page.
a b
c d
Fig.7b shows the mean number of iterations per target as a function of problem size (number of
targets), for different values of the parameter γ. The graphs are downward sloping, which implies
that the number of iterations per target decreases as the number of targets increase, for fixed γ. This
shows that the number of iterations scales sub-linearly with the number of targets: so for example,
if the region size and the number of targets are doubled, the number of iterations will be less than
double. Thus our algorithm scales well. Note also that the number of iterations per target is largest
at intermediate densities, and is smaller at very low and very high densities.
Fig.7c shows the mean execution time as a function of problem size(represented by the number
of targets), for different values of the parameter γ. The irregularity of the graphics illustrates the
17
IET Review Copy Only
IET Wireless Sensor Systems Page 18 of 22
This article has been accepted for publication in a future issue of this journal, but has not been fully edited.
Content may change prior to final publication in an issue of the journal. To cite the paper please use the doi provided on the Digital Library page.
high variability in execution time. (If less variability in execution time is required, the user may
impose a maximum execution time with very little degradation in performance.) The curves are
more or less flat. This means that the execution time per target depends only on the target density
and not on the region size. For instance, if the region size and the number of targets are doubled
while keeping the sensor radius fixed, then the execution time roughly doubles. The figure also
indicates that lower target densities correspond to lower execution: this result is reasonable since
it should be easier to find the solution at low density. Note finally that in contrast to iteration num-
ber, execution time is highest for higher values of γ, indicating that large densities require more
computation time when the number of targets is fixed.
Table 3 summarizes the number of iterations and the running time of the proposed method for
the first set of simulations. The maximum running time returned by our method is 3117.74 seconds
(about an hour) for 8000 targets in a 3000 m × 3000 m region. This shows the capability of our
method to solve very large-scale problems in a comparatively short time. One factor that con-
tributes significantly to the reduction in computational effort is the construction of the mayMerge
list field. At the beginning of the algorithm, the mayMerge list is generated for each target i. This
list contains the indices of sensors > i that are sufficiently close to i to have some possibility of
merging. When the algorithm searches for possible merges for each sensor i, the search is re-
stricted to only those virtual sensors that are included in the mayMerge list of i and not the set of
all targets (virtual sensors). As a result, the search computation time is greatly reduced.
Table 4 shows the variation in results between configurations, and between different runs on the
same configuration. Columns 3 and 6 show the variation in mean sensor number between config-
uration and the variation between different runs on the same configuration, respectively. In both
cases, the variations are relatively small compared to the number of targets. For a fixed number of
targets, variation in sensor number between configurations tends to be larger for smaller densities,
while variations between runs for the same configuration tend to be larger for larger densities. On
the other hand, Table 4 shows that the variation in number of iterations is larger for larger densi-
ties both between configurations and among different runs on the same configuration. In general,
the variation in iteration number among runs on the same configuration dominates the variation
between random configurations of the same size and density. As far as execution times, variations
between configurations at the same size and density are of comparable magnitude to variations
among different runs on the same configuration.
18
IET Review Copy Only
Page 19 of 22 IET Wireless Sensor Systems
This article has been accepted for publication in a future issue of this journal, but has not been fully edited.
Content may change prior to final publication in an issue of the journal. To cite the paper please use the doi provided on the Digital Library page.
The smallest rectangle that contains the targets is 15 km by 10 km: and this information, together
with the number of targets and the sensor radius, is sufficient to determine the value of γ. Table 7
gives preliminary estimates of the cover size using Equation (10) and these computed values of γ.
The theoretical formula overestimates the actual number of sensors from 14 to 22 percent. An
overestimate is to be expected, because the targets are more clustered than would be obtained by a
uniform distribution, so fewer sensors are required to cover them. The fact that the overestimation
is less than 22 percent means that Equation (10) can provide a conservative but fairly close pre-
liminary estimate for the number of sensors required, even before the actual target distribution is
known. In practice, this can be useful for planning purposes.
Table 7 Predicted versus actual number of sensors, Yaounde
Sensor radius(km) 1 0.75 0.5 0.25
γ parameter 2.22 1.25 0.56 0.14
Predicted number of sensors 27.92 39.11 57.14 84.04
Actual number of sensors 23 33 50 73
Difference (%) 21 19 14 15
6. Conclusion
In this paper, we have presented a physics-based heuristic for the efficient placement of sensor
nodes for target coverage problem in wireless sensor networks. We analyzed the characteristics of
the problem and tried the best way to move and merge sensors in order to provide into a reasonable
time, a minimum number of sensors that covers all targets. To achieve this, we have introduced the
concept of virtual sensor and have designed three operators, namely the explosion, the grab and
the release. The explosion allowed exploring the solution space while grab and release contributed
to its exploitation. The performance of the proposed method has been proved through intensive
simulations whose statistical analyzes have shown the capacity and the efficiency of the proposed
approach to solve the problem raised. For future work, we will focus on the integration into the
present method a model of connectivity between sensors deployed.
7. References
[1] Aguiar, E.F.K., Roig, H.L., Mancini, L.H., et al.: ‘Low-cost sensors calibration for monitoring
air quality in the Federal District-Brazil’, Journal of Environmental Protection, 2015, 6, (2), pp
173–189.
[2] Sivaraman, V., Carrapetta, J., Hu, K., et al.: ‘Hazewatch: A participatory sensor system for
monitoring air pollution in Sydney’. Proc. 38th Annual IEEE Conference on Local Computer
Networks-Workshops, Sydney, Australia, 2013, pp. 56–64.
[3] Carrapetta, J.: ‘Haze watch: Design of a wireless sensor board for measuring air pollution’
(University of New South Wales, Sydney, Australia, 2010), pp. 1-67.
[4] Liu, X.: ‘A deployment strategy for multiple types of requirements in wireless sensor net-
works’, IEEE Trans. Cybernet., 2015, 45, (10), pp. 2364–2376.
[5] Wang, B.: ‘Coverage problems in sensor networks: Survey’, ACM Comput. Surveys, 2011,
43, (4), pp. 32:1–32:53.
19
IET Review Copy Only
IET Wireless Sensor Systems Page 20 of 22
This article has been accepted for publication in a future issue of this journal, but has not been fully edited.
Content may change prior to final publication in an issue of the journal. To cite the paper please use the doi provided on the Digital Library page.
[6] Deif, D.S., Gadallah, Y.: ‘Classication of wireless sensor networks deployment techniques’,
IEEE Commun. Surveys Tuts., 2014, 16, (2), pp. 834–855.
[7] Mini, S., Udgata, S.K., Sabat, S.L.: ‘Sensor deployment and scheduling for target coverage
problem in wireless sensor networks’, IEEE Sens. J., 2014, 14, (3), pp. 636–644.
[8] Erdelj, M., Mitton, N., Razafindralambo, T.: ‘Robust wireless sensor network deployment’,
Discrete Mathematics & Theoretical Computer Science, 2016, 17, (3), pp 105–130.
[9] Yoon, Y., Kim, Y.-H.: ‘An efficient genetic algorithm for maximum coverage deployment in
wireless sensor networks’, IEEE Trans. Cybern., 2013, 43, (5), pp. 1473–1483.
[10] Bartolini, N., Calamoneri, T., Fusco, E.G., et al.: ‘Push & pull: autonomous deployment of
mobile sensors for a complete coverage’, Wirel. Netw., 2010, 16, (3), pp. 607–625.
[11] Chang, C.-Y., Chang, C.-T., Chen, Y.-C., et al.: ‘Obstacle-resistant deployment algorithms
for wireless sensor networks’, IEEE Trans. Veh. Technol., 2009, 58, (6), pp. 2925–2941.
[12] Chaudhary, M., Pujari, A.K.: ‘Q-coverage problem in wireless sensor networks’. Proc. Int.
Conf. Distrib. Comput. Netw., India, Jan. 2009, pp. 325–330.
[13] Gu, Y., Liu, H., Zhao, B.: ‘Target coverage with QoS requirements in wireless sensor net-
works’. Proc. Intell. Pervas. Comput., Oct. 2007, pp. 35–38.
[14] Cardei, M., Thai, M.T., Li, Y., et al.: ‘Energy-efficient target coverage in wireless sensor
networks’. Proc. 24th Annu. Joint Conf. IEEE INFOCOM., Mar. 2005, pp. 1976–1984.
[15] Wu, Y., Cardei, M.: ‘Distributed algorithms for barrier coverage via sen-
sor rotation in wireless sensor networks, J. Comb. Opt., 2016, pp. 1–22,
http://link.springer.com/article/10.1007/s10878-016-0055-3, accessed 20 July 2016.
[16] Chen, J., Wang, B., Liu, W.: ‘Constructing perimeter barrier coverage with bistatic
radar sensors’, Journal of Network and Computer Applications, 2015, 57, pp 129–141,
http://dx.doi.org/10.1016/j.jnca.2015.07.015, accessed 13 June 2016.
[17] Deng, X., Wang, B., Wang, C., et al.: ‘Barrier coverage in wireless sensor networks with
adjustable sensing ranges’, Int.J.Ad Hoc and Ubiquitous Computing, 2014, 15, (1/2/3), pp.
121–132.
[18] Ke, W., Liu, B., Tsai, M.: ‘Constructing a wireless sensor network to fully cover critical grids
by deploying minimum sensors on grid points is np-complete’, IEEE Trans. Comput., 2007,
56, (5), pp. 710–715.
[19] Xu, H., Zhu, J., Wang, B.: ‘On the deployment of a connected sensor network for condent
information coverage’, Sensors(Basel), 2015, 15, (5), pp 11277–11294.
[20] Altnel, K., Aras, N., Gney, E., et al.: ‘Binary integer programming formulation and heuristics
for differentiated coverage in heterogeneous sensor networks’, Computer Networks, 2008, 52,
(12), pp 2419–2431.
[21] Xu, X., Sahni, S.: ‘Approximation algorithms for sensor deployment’, IEEE Trans. Comput.,
2007, 56, (12), pp. 1681–1695.
20
IET Review Copy Only
Page 21 of 22 IET Wireless Sensor Systems
This article has been accepted for publication in a future issue of this journal, but has not been fully edited.
Content may change prior to final publication in an issue of the journal. To cite the paper please use the doi provided on the Digital Library page.
[22] Chakrabarty, K., Iyengar, S., Qi, H., et al.: ‘Grid coverage for surveillance and target location
in distributed sensor networks’, IEEE Trans. Comput., 2002, 51, (12), pp. 1448–1453.
[23] Wang, J., Zhong, N.: ‘Efficient point coverage in wireless sensor networks’, J. Comb. Opt.,
2006, 11, (3), pp. 291–304.
[24] Dhillon, S.S., Chakrabarty, K.: ‘Sensor placement for effective coverage and surveillance in
distributed sensor networks’. Proc. IEEE Conf. Wireless Commun. Netw., New Orleans, LA,
USA, Mar. 2003, pp. 1609–1614.
[25] Lin, F., Chiu, P.: ‘A near-optimal sensor placement algorithm to achieve complete coverage-
discrimination in sensor networks’, IEEE Commun. Lett., 2005, 9, (1), pp. 43–45.
[26] Banimelhem, O., Mowafi, M., Aljoby, W.: ‘Genetic algorithm based node deployment in
hybrid wireless sensor networks’, Communications and Network, 2013, 5, (4), pp 273–279.
[27] Kalayci, T.E., Ugur, A.: ‘Genetic algorithm-based sensor deployment with area priority’,
Cybernetics and Systems, 2011, 42, (8), pp 605–620.
[28] Seo, J.-H., Kim, Y.-H., Ryou, H.-B., et al.: ‘Optimal sensor deployment for wireless surveil-
lance sensor networks by a hybrid steady-state genetic algorithm’, IEICE Trans. Commun.,
2008, E91-B, (11), pp. 3534–3543.
[29] Wu, Q., Rao, N.S.V., Du, X., et al.: ‘On efficient deployment of sensors on planar grid’,
Comput. Commun., 2007, 30, (14-15), pp. 2721–2734.
[30] Zhao, C., Yu, Z., Chen, P.: ‘Optimal deployment of nodes based on genetic algorithm in
heterogeneous sensor networks’. Proc. IEEE International Conference on Wireless Communi-
cations, Networking and Mobile Computing (WiCom), Sep. 2007, pp. 2743–2746.
[31] Jia, J., Chen, J., Chang, G., et al.: ‘Energy efficient coverage control in wireless sensor
networks based on multi-objective genetic algorithm, Computers and Mathematics with Ap-
plications’, 2009, 57, (11-12), pp 1756–1766.
[32] Welzl, E.: ‘Smallest enclosing disks (balls and ellipsoids)’, in Maurer, H. (Ed.): ‘New Results
and New Trends in Computer Sciences’, 1991, 555, pp. 359–370.
[33] Tonye, E., Tsague, W., Bateki, R.: ‘Réalisation dd’un capteur de pollution et rapatriement des
donnes vers un SIG web’ (University of Yaounde I, National Advanced School of Engineering,
Yaounde, Cameroon, 2015), pp. 1-75.
[34] Contreras, W., Ziavras, S.: ‘Wireless sensor network-based pattern matching technique for the
circumvention of environmental and stimuli-related variability in structural health monitoring’,
IET Wirel. Sens. Syst., 2016, 6, (1), pp 26–33.
[35] Zonouz, E.A., Xing, L., Vokkarane, M.V., et al.: ‘Hybrid wireless sensor networks: a relia-
bility, cost and energy-aware approach’, IET Wirel. Sens. Syst., 2016, 6, (2), pp 42–48.
[36] Ali, A., Ikpehai, A., Adebisi, B., et al.: ‘Location prediction optimisation in WSNs using
Kriging interpolation’, IET Wirel. Sens. Syst., 2016, 6, (3), pp 74–81.
[37] Zou, Yi., Chakrabarty K.: ‘Sensor Deployment and Target Localization Based on Virtual
Forces’. Proc. IEEE Infocom Conference, Mar. 2007, pp. 1293–1303.
21
IET Review Copy Only
IET Wireless Sensor Systems Page 22 of 22
This article has been accepted for publication in a future issue of this journal, but has not been fully edited.
Content may change prior to final publication in an issue of the journal. To cite the paper please use the doi provided on the Digital Library page.
[38] Kershner, R.: ‘The Number of Circles Covering a Set’, American Journal of Mathematics,
Jul. 1939, 61, (3), pp 665–671.
[39] Weisstein, E. W. ‘Fractal Dimension’, http://mathworld.wolfram.com/FractalDimension.html,
accessed 05 December 2016
22
IET Review Copy Only