Proxy-based sensor deployment for mobile sensor networks

Gulling Wang, Guohong Cao, Tom La Porta

Research output: Chapter in Book/Report/Conference proceedingConference contribution

88 Scopus citations

Abstract

To provide satisfactory coverage is very important in many sensor network applications such as military surveillance. In order to obtain the required coverage in harsh environments, mobile sensors are helpful since they can move to cover the area not reachable by static sensors. Previous work on mobile sensor deployment is based on a round by round process, where sensors move iteratively until the maximum coverage is reached. Although these solutions can deploy mobile sensors in a distributed way, the mobile sensors may move in a zig-zag way and waste a lot of energy compared to moving directly to the final location. To address this problem, we propose a proxy-based sensor deployment protocol. Instead of moving iteratively, sensors calculate their target locations based on a distributed iterative algorithm, move logically, and exchange new logical locations with their new logical neighbors. Actual movement only occurs when sensors determine their final locations. Simulation results show that the proposed protocol can significantly reduce the energy consumption compared to previous work, while maintaining similar coverage.

Original languageEnglish (US)
Title of host publication2004 IEEE International Conference on Mobile Ad-Hoc and Sensor Systems
Pages493-502
Number of pages10
StatePublished - Dec 1 2004
Event2004 IEEE International Conference on Mobile Ad-Hoc and Sensor Systems - Fort Lauderdale, FL, United States
Duration: Oct 25 2004Oct 27 2004

Publication series

Name2004 IEEE International Conference on Mobile Ad-Hoc and Sensor Systems

Other

Other2004 IEEE International Conference on Mobile Ad-Hoc and Sensor Systems
CountryUnited States
CityFort Lauderdale, FL
Period10/25/0410/27/04

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Fingerprint Dive into the research topics of 'Proxy-based sensor deployment for mobile sensor networks'. Together they form a unique fingerprint.

Cite this