Exploring Redundancy in Sensor Deployment to.pdf

9
Exploring Redundancy in Sensor Deployment to Maximize Network Lifetime and Coverage Wei Shen Faculty of Informatics & Electronics Zhejiang Sci-Tech University Hangzhou, 310018, China Email: [email protected] Qishi Wu Department of Computer Science University of Memphis Memphis, TN 38152, USA Email: [email protected]  Abstrac t—Energy efciency and fault tolerance are two impor- tant featu res requir ed for sustained and rel iable operat ions of wireless sensor networks deployed in unstructured environments. This paper investigates an approach to prolonging network life- time and ensur ing sensing reliab ility by orga nizi ng the sensors into several disjoint subsets, each of which takes shift to cover the entire region. This strategy is made possible by the enormous re- dundancy in large-scale sensor network applications where many small and inexp ensi ve sens ors are deploye d to achie ve quali ty thro ugh quanti ty . Howe ver , such ener gy sav ings through shift taking in time and fault tolerance via redundant coverage require an appr opria te network partition in space: each on-duty subset must (i) cover the entire region, (ii) maintain its own connectivity, and (iii) cove r ev er y poi nt wit h mul tiple sensors . Bas ed on a general se nsor net wor k model, we formu lat e thi s problem as an NP-co mplet e Conne cted  M -SET  k-Cov erag e prob lem. We rigorously derive a necessary and sufcient condition for checking the sensor coverage of a continuous two-dimensional space based on geometric reasoning, and analytically derive the upper bounds on both  M  and  k  for any gi ven sensor network. We fur the r propos e a heu ris tic approach to thi s pr obl em and ev alu ate its performance through extensive simulations.  Index Terms—Sensor deployment; energy efciency; fault tol- erance I. I NTRODUCTION Mul tip le sensor sys tems ha ve bee n the tar get of act iv e research since the early 90s due to their wid esp rea d use in many agricultural, civil, and military applications that involve environmental monitoring and situational assessment. An im- portant subclass of sensor network applications require the de- ployment of sensors in vast unstructured geographical areas for remote operations, where wireless networks are often the only means of communication among the sensors that are typically powe red by irrep lacea ble batte ries of limi ted energ y suppl y . Minimizing network-wide energy consumption and providing effective coverage within the region of interest are critical to ensuring sustained and reliable operations of Wireless Sensor Networks (WSNs) in these applications. Recent developments in Micro-Electro-Mechanical Systems (MEMS) ma ke it now pos si bl e to depl oy a la rge number of inex pensi ve and smal l sensors to achie ve quality through qua nti ty . Such red unda ncy in sen sor deployme nt ena ble s a The network is divided into 3 subsets of sensors represented by , , , respectively. Fig. 1. Network parti tio n in a sleep -wa ke schedul ing strat egy . sleep-wake scheduling strategy that organizes the sensors into a number of subsets, each of which takes turn to monitor the ent ire regi on whi le the rest are put in a sle epi ng mode for energy saving to prolong the network lifetime [1]–[3]. Ideally, this network partitioning and shift taking strategy could extend the network lifetime as many times as the number of subsets. Deter minin g network parti tions to implement the slee p-wak e scheduling policy was rst dened as the NP-complete SET  K - Cover problem [4]. As illustrated in Fig. 1, the sensor network is partitioned into three subsets of sensors, denoted by triangles, squar es, and circl es, respe cti vely , and one subs et of sensors are currently active covering the entire rectangular region of interest. Note that this partitioning approach is fundamentally different from the clustering process widely adopted in WSNs. Fault tolerance is another important performance requirement in WSNs, and is often associated with a  k -Coverage goal where ev ery point in the regi on needs to be cov ere d by at least  k sens ors. Finding a minimum subset that reaches  k-Coverage was dened as the  k-Co ver age proble m, whi ch is als o NP- complete [5], [6]. Each of the aforementioned problems has been well studied in a separated context in the literature [7], [8]. In this paper, we in ves ti gat e a hybrid approa ch to achie ving bot h ene rgy 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks 978-1-4577-0093-4/11/$26.00 ©2011 IEEE 557

Transcript of Exploring Redundancy in Sensor Deployment to.pdf

7/17/2019 Exploring Redundancy in Sensor Deployment to.pdf

http://slidepdf.com/reader/full/exploring-redundancy-in-sensor-deployment-topdf 1/9

Exploring Redundancy in Sensor Deployment to

Maximize Network Lifetime and Coverage

Wei ShenFaculty of Informatics & Electronics

Zhejiang Sci-Tech University

Hangzhou, 310018, China

Email: [email protected]

Qishi WuDepartment of Computer Science

University of Memphis

Memphis, TN 38152, USA

Email: [email protected]

 Abstract—Energy efficiency and fault tolerance are two impor-tant features required for sustained and reliable operations of wireless sensor networks deployed in unstructured environments.This paper investigates an approach to prolonging network life-time and ensuring sensing reliability by organizing the sensorsinto several disjoint subsets, each of which takes shift to cover theentire region. This strategy is made possible by the enormous re-dundancy in large-scale sensor network applications where manysmall and inexpensive sensors are deployed to achieve qualitythrough quantity. However, such energy savings through shifttaking in time and fault tolerance via redundant coverage requirean appropriate network partition in space: each on-duty subsetmust (i) cover the entire region, (ii) maintain its own connectivity,and (iii) cover every point with multiple sensors. Based on ageneral sensor network model, we formulate this problem asan NP-complete Connected   M -SET   k-Coverage problem. Werigorously derive a necessary and sufficient condition for checkingthe sensor coverage of a continuous two-dimensional space basedon geometric reasoning, and analytically derive the upper boundson both   M   and   k   for any given sensor network. We furtherpropose a heuristic approach to this problem and evaluate its

performance through extensive simulations. Index Terms—Sensor deployment; energy efficiency; fault tol-

erance

I. INTRODUCTION

Multiple sensor systems have been the target of active

research since the early 90s due to their widespread use in

many agricultural, civil, and military applications that involve

environmental monitoring and situational assessment. An im-

portant subclass of sensor network applications require the de-

ployment of sensors in vast unstructured geographical areas for

remote operations, where wireless networks are often the only

means of communication among the sensors that are typicallypowered by irreplaceable batteries of limited energy supply.

Minimizing network-wide energy consumption and providing

effective coverage within the region of interest are critical to

ensuring sustained and reliable operations of Wireless Sensor

Networks (WSNs) in these applications.

Recent developments in Micro-Electro-Mechanical Systems

(MEMS) make it now possible to deploy a large number

of inexpensive and small sensors to achieve quality through

quantity. Such redundancy in sensor deployment enables a

The network is divided into 3 subsets of sensors

represented by , , , respectively.

Fig. 1. Network partition in a sleep-wake scheduling strategy.

sleep-wake scheduling strategy that organizes the sensors into

a number of subsets, each of which takes turn to monitor the

entire region while the rest are put in a sleeping mode for

energy saving to prolong the network lifetime [1]–[3]. Ideally,

this network partitioning and shift taking strategy could extend

the network lifetime as many times as the number of subsets.

Determining network partitions to implement the sleep-wake

scheduling policy was first defined as the NP-complete SET  K -Cover problem [4]. As illustrated in Fig. 1, the sensor network 

is partitioned into three subsets of sensors, denoted by triangles,

squares, and circles, respectively, and one subset of sensors

are currently active covering the entire rectangular region of 

interest. Note that this partitioning approach is fundamentally

different from the clustering process widely adopted in WSNs.

Fault tolerance is another important performance requirement

in WSNs, and is often associated with a  k-Coverage goal where

every point in the region needs to be covered by at least   ksensors. Finding a minimum subset that reaches   k-Coverage

was defined as the   k-Coverage problem, which is also NP-

complete [5], [6].

Each of the aforementioned problems has been well studied

in a separated context in the literature [7], [8]. In this paper,

we investigate a hybrid approach to achieving both energy

2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks

978-1-4577-0093-4/11/$26.00 ©2011 IEEE 557

7/17/2019 Exploring Redundancy in Sensor Deployment to.pdf

http://slidepdf.com/reader/full/exploring-redundancy-in-sensor-deployment-topdf 2/9

savings through shift taking in time and fault tolerance via

multiple sensor coverage by exploring the redundancy in sensor

deployment. We formulate this problem as an NP-complete

Connected M -Set k-Coverage (CMSKC) problem, whose goal

is to partition the network appropriately into   M   subsets in

space such that each subset (i) covers the entire region, (ii)

maintains its own connectivity, and (iii) covers every point with

at least   k   sensors in the subset. Based on a general sensor

network model, we rigorously derive a necessary and sufficient

condition for checking the sensor coverage of a continuous two-

dimensional (2D) region based on geometric reasoning, and

analytically derive the upper bounds on both  M   and k  for any

given sensor network. We further propose a heuristic approach

to this problem and evaluate its performance through extensive

simulation-based experiments.

The rest of the paper is organized as follows. In Section II,

we conduct a broad survey on related work. In Section III,

we present the network model and formulate the problem.

We derive the region coverage check condition and design the

partition algorithms in Section IV. We provide simulation-based

performance evaluation in Section V. We conclude our work and discuss future research in Section VI.

I I . RELATED WORK

There have been a significant amount of research efforts

devoted to maximizing the lifetime of WSNs by organizing

the network in different structures. Clustering is one of the

most commonly employed hierarchical organization strategies

to reduce energy consumption in large-scale WSNs. Note that a

cluster is a partial organization that monitors only a subregion

and all (or most) of the clusters must work simultaneously to

achieve a full coverage of the entire region.

In a sleep-wake scheduling approach, the sensors are also

organized into a number of subsets, but each of them takes turnto cover the entire region. Providing a full coverage of the entire

region using each subset of sensors in a round-robin manner

is feasible when there exits a superfluous redundancy in sensor

deployment [9], [10], and it has the potential to increase the net-

work lifetime by multiple folds. In [4], Slijepcevic  et al. studied

the SET K -Cover problem, which is proved to be NP-complete

by reducing from the Minimum Cover problem. The SET  K -Cover problem in [4] attempts to maximize the value of   K such that each subset covers the entire region. We would like

to point out that the coverage check algorithm proposed in [4]

examines discrete points in the region under a finite resolution,

therefore the accuracy and complexity of the algorithm not

only depend on the number of sensor nodes, but also theresolution and area of the region. Gallais  et al. [11] presented a

decentralized algorithm to solve the   k-area-coverage problem,

which is similar to the CONNECTED SET  K -Cover problem.

Their algorithm checks the grid point coverage to obtain the

value of K , and attempts to organize the sensors into K  subsets,

each of which can cover the entire region. A variant of this

problem, where the requirement that each subset covers the

entire region is relaxed, was tackled using one randomized and

two deterministic greedy approximation algorithms [12].

The k-Coverage problem in WSNs has also been extensively

studied in the literature and most efforts along this line consider

a discrete target model. Gupta   et al.   proposed the minimal

connected cover set (MCCS) problem [13] whose goal is to

find a minimal subset of nodes that are connected and cover the

entire region. In their solution, the coverage area of a sensor is

approximated by a set of square units, resulting in a resolution-

dependent complexity. The MCCS problem has been shown

to be NP-complete [13], [14], and is a special case of the

Connected   M -Set   k-Coverage problem with   M   = 1,   k   = 1,

and discrete targets. Closely related to our problem is the one

investigated by Zhou   et al.   in [15] where they proposed an

approximation algorithm and derived the upper bound of the

size of the resultant subset. However, their discrete treatment

on the target or query region remains the same as [13], and the

computational complexity is not given.

The k-Coverage problem was further considered by Hefeeda

in [6] and Yang   et al.   in [5] where they attempted to find a

minimal subset of sensors to cover all the target objects that

are made of discrete points. The computational complexity

of the algorithm in [5] is   O(n3

), where   n   is the number of sensors. Kumar  et al. used a virtual grid to represent the target

region such that the target region was covered if all grid points

were covered [16], and they also derived the conditions for

1-coverage and   k-coverage in three different types of sensor

deployment.

Funke   et al.   developed a solution to the Connected 1-

Coverage problem using grid placement algorithms [17], where

a simple grid-based approach was first employed in place of 

the greedy algorithm to improve the performance without the

guarantee for full coverage. To overcome this limitation, they

also proposed a fine grid algorithm that divides coarse grids

into many small grids based on the intersection of sensing disks

until each small grid is covered by some sensors. Obviously,

the number of small grids is the key to the performance.

Simon   et al.   [18] designed centralized and distributed algo-

rithms to determine the appropriate number of sensors that

are sufficient to reach  k-coverage in the region where sensors

can sleep during most of their lifetime. Zhang   et al.   [19]

presented an algorithm, referred to as Optimal Geographical

Density Control (OGDC), to maintain coverage as well as

connectivity using a minimum number of sensor nodes. The

problem in [19] is similar to the  k -Coverage problem, and the

OGDC algorithm can guarantee almost full coverage, which,

however, is still based on grid points, leading to resolution-

dependent performance.So   et al.   [20] presented several theorems and algorithms

for a similar problem based on the Voronoi diagram. They

investigated two problems: one is to check if every point in

a target region is  k-covered by all sensors and the other is to

determine the largest k  such that every point in the target region

is  k-covered by all sensors, which they referred to as Max-k-

Coverage problem. They proved that the first problem can be

solved in O(n log n + nk2), where n  is the number of sensors.

Furthermore, they proved that Max-k-Coverage problem can be

558

7/17/2019 Exploring Redundancy in Sensor Deployment to.pdf

http://slidepdf.com/reader/full/exploring-redundancy-in-sensor-deployment-topdf 3/9

Fig. 2. A counterexample that shows SET  K -Cover  =  k -Coverage.

solved in   O(n3). Huang   et al.   designed a novel algorithm to

determine whether a WSN is  k-covered based on the perimeter

coverage of the sensor’s sensing range [21] with complexity

of   O(nd log d), where   n   is the number of sensors and   d   is

the maximum number of sensors whose sensing ranges may

intersect a sensor’s sensing range. Note that the above work on

Max-k-Coverage and   k-Coverage determination considers the

entire set of sensors, not a subset.

If a WSN is SET   K -Covered, it satisfies the requirement

of  k

-coverage, but the reverse is not necessarily true. This can

be illustrated by a counterexample shown in Fig. 2, where the

rectangular target region located at the center is 2-covered, but

these three circles are not able to form two subsets, each of 

which covers the target region. Obviously, the SET  K -Cover

and  k -Coverage problems are equivalent when  K  = k  = 1.

Our work on CMSKC differs from the aforementioned

efforts [4]–[6], [13], [15]–[17] in the following aspects: (i)

we investigate the Connected   M -SET   k-Coverage problem

in a continuous two-dimensional space; (ii) our solution is

completely independent of the grid resolution and region size;

(iii) the SET   K   Cover and   k-Coverage problems are special

cases of our problem where  k  = 1   and  M   = 1, respectively.

CMSKC is a generalization of the individual work on energyefficiency and fault tolerance in [7], [8]. Our work is also

beyond the Max-k-Coverage problem [20] and the k-Coverage

determination problem [21] in that we wish to find  M  minimal

subsets of sensors, each of which is connected and achieves

k-coverage.

III. NETWORK M ODEL  A ND  P ROBLEM F ORMULATION

We consider an ad-hoc homogeneous WSN deployed in a

two-dimensional continuous region A with width W  and height

H . Each sensor  v   is equipped with an isotropic sensing device

that covers a disk-shaped sensing area of radius r, an isotropic

wireless transceiver that covers a disk-shaped communication

area of radius R, a processor of low computing capacity, and abattery with limited energy supply. We assume that the width

and height of the region monitored by the sensor network 

are much larger than the sensing radius   r, i.e.   H   ≫   r, and

W   ≫   r. Since sensors are densely deployed in the region

with high redundancy to cover the entire region and typically

R > r, we assume that the initial network is connected. We

also assume that the sensor locations are distinct and can

be acquired through some range-based or range-free sensor

location discovery approaches [22]. We further assume that

most of the energy on a sensor node is spent on sensing or

communication, which is independent of the sensing or radio

distance, and the energy consumption of a sensor in idle or

sleeping mode is considered negligible.

Based on this general WSN model, we formulate the   Con-

nected   M -SET   k-Coverage   (CMSKC) problem as follows:

Given an ad-hoc connected WSN with an arbitrary topology

represented as graph  G(V, E )  deployed in a two-dimensional

continuous rectangular region  A, where  V   denotes the set of 

N   sensor nodes and  E   denotes the set of wireless links, the

deployment coordinates  (x, y)  and a disk-shaped sensing area

S (v)   of sensor  v   (v   ∈  V ), and two positive integers M   and

k, does there exist   M   disjoint subsets   V 1, V 2, . . . , V  M   ⊂   V ,such that for each point   p   ∈   A, there exists at least   ksensor nodes  vi1, vi2, . . . , vik  ∈ V i,   i = 1, 2, . . . , M  , such that

 p  ∈k

j=1

S (vij)? We assume that the disk-shaped sensing area

S (v)  of sensor  v ∈ V    includes the circular rim (circle) of the

disk, which is denoted as  S (v). Similarly, we denote the border

of region A  as  A. We also define the distance of a simple path

in the network as the number of sensor nodes on the path.The SET   K   Cover problem has been proved to be NP-

complete by reducing from the Minimum Cover problem [4],

[23] and the   k-Coverage problem that selects a minimum

number of sensors to achieve k-coverage has also been proved

to be NP-hard by a reduction from the minimum dominating

set problem in [5]. These two problems are special cases of 

CMSKC that restricts problem instances to those where (i)

M   = 1   and   k   = 1, (ii) the target points are limited to the

sensor locations, and (iii) the network is fully connected (any

subnetwork of a fully connected network is automatically con-

nected). The validity of NP-completeness proof by restriction

is established in [23], where “restriction” constrains the given

(i.e. target points and network topology), not the question of aproblem. Since the SET K  Cover problem and the k-Coverage

problem are NP-complete, so is the CMSKC problem in a

continuous 2D region, whose solution is obviously verifiable

in polynomial time.

IV. TECHNICAL A PPROACHES

 A. Definitions and Theorems

When multiple sensors are deployed, their sensing disks

intersect and divide the region into a certain number of parts,

which we refer to as   divisions, as defined below:

 Definition 1:   A  division is a minimum enclosed area within

which all points are covered by the same subset of   V . I f aboundary of a division is an arc, i.e. a part of sensing rim, the

boundary is called a   basic arc. If the chord of a basic arc of 

a division is inside the division, the arc is a  convex arc  of the

division; otherwise, the arc is a  concave arc  of the division.

Obviously, how to evaluate the coverage of each division is

the key to the CMSKC problem. A general approach is to find

some points that can represent the divisions in region   A. To

facilitate the explanation of our approach, we define below two

key terms,   intersection point  and   neighborhood .

559

7/17/2019 Exploring Redundancy in Sensor Deployment to.pdf

http://slidepdf.com/reader/full/exploring-redundancy-in-sensor-deployment-topdf 4/9

 Definition 2:   An   intersection point   p   is either an internal

point (inside region  A) intersected by two or more circles, i.e.

circular rims of disk-shaped sensing areas, or a border point

intersected by the border of region  A  and one or more circles.

The set of internal intersection points is defined as:

Type 1 :N 

i,j=1i=j S (vi) ∩  S (vj) ∩ A

, vi  ∈  V, vj  ∈ V,

and the set of border intersection points is defined as:

Type 2 :

N i=1

S (vi) ∩  A

, vi ∈  V.

We denote the set of all intersection points as   P . If point

 p ∈  P  ∩  S (vi), we say that the circle (i.e. circular rim)  S (vi)of sensor  vi  marginally covers point  p.

 Definition 3:   A   neighborhood   of point  p, denoted as   δ ( p),

is a disk-shaped area (including the rim) centered at  p  with an

arbitrarily small radius  ε > 0.

Based on the above definitions, we derive the necessary and

sufficient conditions to check whether or not region   A   canbe fully covered by a given WSN, which is essentially the

1-Coverage problem.

Theorem 1:   Region   A   can be fully covered by a given

WSN, iff the following two conditions are satisfied:

1)   P   = ∅;

2) for ∀ p ∈  P , there exists a neighborhood  δ ( p)   with radius

ε > 0, and for an arbitrary point  a  ∈  δ ( p)∩ A, there exists

a sensor  v  ∈  V   such that  a  ∈  S (v).

Proof.   In Theorem 1, Condition 1) requires that there exists at

least one intersection point and Condition 2) requires that the

neighborhood of any intersection point is covered.

We first prove the necessity of these conditions in this

theorem. Suppose that region A  with height  H  ≫ r  and width

W   ≫ r   is fully covered by the WSN. Since one single sensor

is not able to cover the entire region, there must exist multiple

sensors with intersection points. For each intersection point  p,

we define an arbitrary neighborhood δ ( p). Obviously, any point

a  ∈   δ ( p) ∩ A   must be covered by some  S (v),   v   ∈  V , if the

region is fully covered by the WSN.

We use reduction to absurdity to prove the sufficiency of the

conditions in Theorem 1. Suppose that those two conditions are

satisfied but region  A   is not fully covered by the WSN. There

must exist a circle, denoted as  S (v∗), v∗ ∈ V , which has at least

one intersection point and splits the region into some covered

and uncovered zones; otherwise, we can conclude that everycircle is isolated from each other and does not intersect with

the border  A, which conflicts with Condition 1) in Theorem 1.

Let  p   be an intersection point on  S (v∗)   that falls on a basic

arc splitting between a covered zone and an uncovered zone.

Obviously, there must exist a neighborhood δ ( p) of point p  that

contains some points in the uncovered zone, which conflicts

with Condition 2) in Theorem 1. This concludes the proof.

We define a few more terms below that will be used in the

rest of the derivation and analysis.

1

2

Fig. 3. Illustration of the rim intersection point in Definition 6.

 Definition 4:   An   interior intersection point   p   of sensor   v,

v   ∈   V , is an intersection point that is located inside the

coverage area  S (v)  of  v , i.e. there exists a neighborhood δ ( p)with radius  ε > 0  such that  δ ( p) ∩ A ⊂  S (v).

 Definition 5:   If   p   is an intersection point and falls within

the sensing range of each sensor   v   ∈   V ′,   V ′ ⊂   V , i.e.   p   is

an interior intersection point of each sensor  v   ∈  V ′, then the

interior degree of  p, denoted by I ( p), is defined as the number

|V ′|  of sensors in  V ′, where  V  ′ is the maximum subset of  V  .

 Definition 6:   Let  p  be an intersection point. If there exist a

subset of sensors V ′ ⊆ V, |V ′| ≥  3, such that { p} = v∈V   ′

S (v),

then p   is a  rim intersection point  of  V  ′.

An example of the concept of rim intersection point in

Definition 6 is illustrated in Fig. 3, where there are two rim

intersection points p1   and  p2. However, these two intersection

points differ in the following aspect: (i) for  p1, there exists a

neighborhood of  p1   marked as a dotted circle, which is fully

covered by those 3 circles intersecting at  p1, while (ii) for  p2,

there does not exist any neighborhood of   p2, which is fully

covered by those 3 circles intersecting at  p2. We propose the

concept of  rim degree   to describe the difference between these

two types of rim intersection points.

 Definition 7:   Suppose that   p   is a rim intersection point of 

V ′ ⊂  V  ,  d1, d2, . . . , dn  are the divisions intersected by  S (v),

v ∈ V  ′ with common border point  p, and  ci   is the number of 

sensors in  V ′ that cover division  di,   i  = 1, 2, . . . , n. The   rim

degree  of intersection point  p , denoted by  R( p), is defined as

mini=1,2,...,n

(ci). If intersection point  p   is not a rim intersection

point, then  R( p) = 0.

An example of the concept of rim degree in Definition 7 is

illustrated in Fig. 4, where there are 11 divisions d1, d2, . . . , d11created by 6 sensors   v1, v2, . . . , v6   surrounding the common

border point p. Since divisions d1,  d5   and d9   are each covered

by a minimum set of 2 sensors,  R( p)   is 2. Definition 8:   The  degree, denoted by  D( p), of an intersec-

tion point p  is defined as the sum of the interior degree and the

rim degree of  p, i.e.  D( p) =  I ( p) + R( p).

We have the following lemma to determine if two non-

intersection points are located in the same division.

 Lemma 1:   For ∀a, b ∈  A,  a,b /∈ v∈V  

S (v), both a  and  b  are

located in the same division iff  a ∈  S (v)   ⇐⇒   b ∈  S (v), for

∀v ∈  V .

560

7/17/2019 Exploring Redundancy in Sensor Deployment to.pdf

http://slidepdf.com/reader/full/exploring-redundancy-in-sensor-deployment-topdf 5/9

1

2  3

4

56 

1

2

3

4

5

7 8

910

11

12

Fig. 4. Illustration of Definition 7 and Theorem 2.

The correctness of Lemma 1 is straightforward. It simply

means that if two non-intersection points   a   and   b   are in the

same division, they must be the interior points of the same set

of sensor coverage disks, and vice versa.

 Lemma 2:   If  p   is an interior intersection point of sensor  v,

then any division with border point  p  is covered by  v .Proof.   Because  p   is an interior intersection point of  v, there

must exist a neighborhood δ ( p)  with certain radius ε > 0, such

that   δ ( p) ∩ A  ⊂  S (v), and  δ ( p)  intersects with each division

with border point  p. It follows that, in  δ ( p), there exist some

interior points of each division with border point  p. Based on

the Lemma 1, those divisions must be covered by  v .

We provide Theorem 2 that describes the relation between

the degree of intersection points and divisions.

Theorem 2:   Suppose that an intersection point   p   is the

common border point of divisions d1, d2, . . . , dn. Let  ci  be the

number of sensors in  V   that cover division di,  i  = 1, 2, . . . , n.

We obtain the degree of  p

 as D( p) = mini=1,2,...,n(ci)

.

Proof.  Based on the definition of degree:  D( p) = I ( p)+R( p),

we know that there exist  I ( p)  sensors, denoted as set  V 0, each

of which covers   p   as an interior point, and there also exist

some sensors, denoted as set  V 1, such that  { p}  =

v∈V  1

S (v),

and V 0∩V 1  =  ∅. Based on Lemma 2, we know that each v  ∈  V 0covers divisions d1, d2, . . . , dn. Suppose that  mi  is the number

of sensors in V 1  covering division di, i = 1, 2, . . . , n. It follows

that ci =  I ( p) + mi, i  = 1, 2, . . . , n. Based on Definition 7, we

have  D( p) =  I ( p) + mini=1,2,...,n

(mi) = mini=1,2,...,n

(ci).

Calculating I ( p)  is trivial. We design Algorithm 1 to calcu-

late   R( p). Suppose that   p1, p2, . . . , pk  are intersection points

created by  n  sensors  v1, v2, . . . , vn, which intersect at a com-

mon rim intersection point  p, i.e  { p} =ni=1

S (vi).

In Algorithm 1, lines 2 and 3 create a small circle that

intersects with all the divisions having  p  as a common border

point. Line 5 calculates the radial tangents that intersect with

those divisions with concave arc(s). Obviously, the number of 

sensors covering a division without a concave arc is not the

minimum one. Since  p  is intersected by the sensing rims of  nsensors, there exist  2n   basic arcs with end point  p. For each

Algorithm 1   Calculate   R( p), Input:   v1, v2, . . . , vn,   p,

 p1, p2, . . . , pk, Output:  R( p)

1:   Sort  v1, v2, . . . , vn   in anti-clock order;2:   Calculate  r ′ =   1

2  mini=1,2,...,k

(| pi p|);

3:   Create circle  X   centered at  p  with radius  r′;4:   Create circle  Y    centered at  p   through  v1, v2, . . . , vn;5:   Calculate the radial tangent of each basic arc with end point  p;6:   for all  radial tangent   ti, i = 1, 2, . . . , 2n   do

7:   Calculate the intersection point a   between   ti   and  X ;8:   Calculate two points a1, a2   on  Y  , such that |a1a| =  |a2a| =

r;9:   Calculate the number  ni   of sensors on the minor arc a1a2;

10:   R( p) = mini=1,2,...,2n

(ni).

tangent, line 7 determines an interior point  a   inside a division

with concave arc(s). Lines 8 and 9 obtain a set of sensors that

cover a. Based on Lemma 1, these sensors cover the division

with interior point a. After checking all tangents from point  p,

Algorithm 1 obtains R( p).

An example of Algorithm 1 is illustrated in Fig. 5. All

sensors marked as small gray squares having  p  as a commonrim intersection point are located on the rim of circle   Y centered at  p  with radius r , which is marked as a dotted circle

going through all sensors. There exist some other intersection

points   p1, p2, . . ., among which   p2   is the closest intersection

point to  p. Circle  X  denotes a small dotted circle centered at

 p  (created by lines 2 and 3). Obviously, circle  X  with a radius

smaller than | pp2| intersects with all the divisions with common

border point  p. Here, for simplicity of calculation, we set the

radius of circle  X   to be   1

2| pp2|. We draw a radial tangent  pa

from  p   that intersects circle  X   at point  a. Two points  a1   and

a2  on circle Y  are then determined such that the length of line

segments a1a  and  a2a  is the sensing radius  r .

Sorting all sensors takes time of  O(n log n), and determiningeach ni requires finding certain v  in sorted v1, v2, . . . , vn twice,

each of which is of  O(log n)   complexity. Therefore, the total

complexity of Algorithm 1 is of   O(n log n  + 2n log n), or

O(n log n).

1

2

1  2

34

5

7    8

910

Fig. 5. Illustration of Algorithm 1 for calculating  R( p).

Theorem 2 depicts the relation between the degree of in-

tersection points and the coverage of the region because the

intersection points can be used to represent the entire set

561

7/17/2019 Exploring Redundancy in Sensor Deployment to.pdf

http://slidepdf.com/reader/full/exploring-redundancy-in-sensor-deployment-topdf 6/9

of points in the region for checking region coverage. Based

on Definition 8 and Theorem 2, we obtain Theorem 3 and

Corollaries 1 and 2 as follows.

Theorem 3:   Region   A   is fully   k-covered by a WSN iff 

D( p) ≥  k, for all intersection points  p  ∈  P .Corollary 1:   The maximum value of   k   in the   k-Coverage

problem is upper-bounded by  min p∈P 

(D( p)).

Corollary 2:  The maximum value of  K  in the SET K  Coverproblem is upper-bounded by  min

 p∈P (D( p)).

Theorem 3 provides an efficient way to find a subset of 

sensors that  k-cover region  A. Corollary 1 provides the exact

maximum value of  k  and solves the Max-k-Coverage problem

in [20]. Corollary 2 defines the upper bound of   K   in the

SET K  Cover problem, which provides a comparison base for

evaluating the performance of our network partition heuristics.

 B. Algorithm Design

We first consider a special case where   R   ≥   2r   and then

extend our solution to a general case without this constraint.

1) When R  ≥  2r:  We first design an algorithm for the CM-SKC problem with constraint R ≥  2r  as shown in Algorithm 2.

When  R ≥  2r, a subset of sensors that fully cover the region

are automatically guaranteed to be connected.

Algorithm 2   Connected  M -SET  k-Coverage where  R  ≥  2r,

Input:  V ,  k , Output:  V i, M 

1:   Calculate the intersection points on  S (vi),   i  = 1, 2, . . . , N  , andgenerate  P ;

2:   for all  p ∈  P   do3:   Calculate  D( p);4:   if  D( p) < k   then5:   return ∅;6:   i = 1;7:   while  (∀ p ∈  P ,  D ( p) >  0   and  P   = ∅)   do8:   V  i  =  V  ;  V    = ∅;  IP   = ∅;9:   while  (T RUE  )  do

10:   if   there exists  v  ∈  V  i, where  D( p)  > k   for  ∀ p ∈  P    inS (v)  then

11:   for all p ∈  P   created by   v  intersecting with othersensors in  V    do

12:   P   = P  − { p};13:   for all p  ∈  P   in  S (v)   or on  S (v)  do14:   Update  D( p);15:   V  i  =  V  i − {v}; V    = V    + {v};16:   IP   = I P  + { p| p   is created by  v  intersecting with

other sensors in  V  };17:   for all p  ∈  I P   in  S (v)  or on  S (v)   do18:   Update  D( p);

19:   else20:   break.21:   i =  i + 1;  P   = I P ;22:   M  = i.

We create a new region  A′ with the same size as the given

region A  and take the following procedure to find a subset with

k-coverage:

1) move a sensor in   A   covering an intersection point with

degree larger than  k   into the new region A′;

(a) (b)

(c) (d)

Fig. 6. Procedure of Algorithm 3. (a): original V   ′i

  , (b): some nodes are addedinto  V   ′

i , (c): end of the while loop, (d): delete the redundant nodes.

2) update the intersection points and their degrees in both

regions.

When Step 1 finishes, the remaining sensors form a subset with

k-coverage. These steps are repeated until all subsets are found.

In Algorithm 2, the first   for   loop (starting from line 2)calculates D( p)   for all  p   ∈  P   and calculates the value of   k.

Each iteration of the outer  while   loop (starting from line 7 to

line 21) calculates a subset with  k -coverage and each iteration

of the inner  while  loop (starting from line 9 to line 20) moves

a sensor to the new region and updates the intersection points

and their degrees in both regions.

Suppose that the maximum number of overlapped circles is

d. We consider the worst case of Algorithm 2 to compute

the upper bound of its time complexity. In the worst case,

the complexity of generating   P    (line 1) is no more than

O(2N d) ∼  O(N d). Since calculating each  D( p)  has complex-

ity no more than  O(d log d), in the worst case, calculating all

D( p) has complexity of O(2N d2

log d) ∼  O(N d2

log d). In theworst case, every sensor is traversed and all intersection points

in its sensing area (including those on the sensing circular

rim) are also traversed. Hence, the sensing area of a sensor

covers no more than   d2 intersection points and creates no

more than   2d   intersection points with other   d  −  1   sensors.

The complexity of the outer   while   loop is no more than

O(N   · d2 + N   · 2d) ∼  O(N d2). Therefore, in the worst case,

the complexity of Algorithm 2 is no more than  O(N d2 log d).

2) A general case:   Now we develop a solution to the

CMSKC problem without the constraint   R   ≥   2r. Suppose

that   V R1   =   {V 1, V 2, . . . , V  M }   is the result produced by

Algorithm 2, and the set of remaining sensors  L  =  V  −M 

i=1

V i.

We define a function F (V i, L)  as follows:

F (V i, L) =

  C, C  ⊆  L, V i + C   is connected,  C   is minimal,

∅, C  does not exists.

Here, we consider the minimal  C , which means that none

of the subsets of  C  is connected after combining with  V i. We

design an algorithm to calculate  F (V i, L)  in Algorithm 3.

The procedure of Algorithm 3 is illustrated in Fig. 6. Each

connected component in  V i   is shrunk to a virtual black node,

562

7/17/2019 Exploring Redundancy in Sensor Deployment to.pdf

http://slidepdf.com/reader/full/exploring-redundancy-in-sensor-deployment-topdf 7/9

       

 

                              

(a)

100 150 200 250 300 350 400100

200

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

The sensor countDetection radius (point)

   K  p  e  r  c  e  n   t  a  g  e

(b)

100 150 200 250 300 350 400100200

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

The sensor countDetection radius (point)

   K  p  e  r  c  e  n   t  a  g  e

(c)

Fig. 7. Simulation-based performance comparison between our algorithm marked by asterisks and the algorithm in [4] marked by circles: (a) time costcomparison, (b)  K   percentage comparison, and (c) connected  K  percentage.

Algorithm 3  Calculate F (V i, L), Input:V i, L, Output:C 

1:   Generate  V  ′i , each  v  ∈  V  ′i  corresponds to a connected componentin  V  i;

2:   Generate  G′

i(V  ′i , E ′i), where  E ′i  = ∅;

3:   C  =  ∅,  V S  =  V  i,  LS  =  L,   Found =  false;4:   Mark all nodes in  V  ′i , V S   as black;5:   while  L  = ∅  do6:   Choose an arbitrary  c ∈  L, and mark  c  as white;7:   V  ′i   = V  ′i   + {c},  V S  =  V S  + {c},  L =  L − {c};8:   if  {(c, v)|(c, v) ∈  E , v ∈  V S } = ∅  then9:   E ′i  =  E ′i + {(c, v′)}, where  v ′ ∈  V  ′i   is the virtual node

corresponding to  v ∈  V S ;10:   while there exists a path between two black nodes in  V  ′i

do11:   Mark white c ∈  V  ′i  on the path as black;12:   Mark those c ∈  V S   as black;13:   Update   G′

i(V  ′i , E ′i), shrink all black nodes in aconnected component to a virtual node;

14:   if  |{v|v ∈  V  ′i , color of  v   is black }| = 1  then15:   Found =  true;16:   Break;17:   if   Found  then18:   L =  L + {v|v ∈  V S , color of  v   is white};19:   C  = LS  − L;20:   else21:   C  = ∅;

as shown in Fig. 6(a). The nodes in L  are added into V ′i  one by

one, represented by white squares (lines 6 and 7), as shown in

Fig. 6(b). If an added node is connected to an original node, an

edge is added to  E ′i. If there exists a path between two virtual

black nodes, the white squares on the path are also marked

black (lines 11 and 12), and then all black nodes are shrunk toa virtual node. When there is only one virtual black node in

V ′i   including all added or original black nodes, we find all the

sensors in  C . Note that each added black node is essential to

the connectivity of  V  ′i   for a minimal  C .Suppose that |V i| =  n,  |E i| =  m,  |L| =  l, where n > m,  V i

may not be connected, and  E i   is the set of edges. Generating

all connected components is of  O(n). In the worst case, each

node in L  has some edges with nodes in  V i. Adding each node

is of  O(n). Therefore, calculating  F (V i, L)   is of  O(nl).

The algorithm for the CMSKC problem without constraint

R   ≥   2r   is shown in Algorithm 4. Suppose that the result

of Algorithm 2 contains  M   subsets. Since in the worst case,

calculating F (V i, L) is of  O(N 2), and the second  for loop runs

no more than   M   times, the complexity of Algorithm 4 is of O(N 2M ).

Algorithm 4   Extended algorithm without constraint  R  ≥  2r,

Input:V R1, L, Output:V R2

1:   V R2  =  ∅;2:   for all  V  i  ∈  V R1   do3:   Calculate all connected components in  V  i;4:   while  V R1  = ∅   do5:   for all V  i  ∈  V R1   do6:   Calculate  F (V  i, L);7:   if  F (V  i, L) = ∅  then8:   V  i  =  V  i + F (V  i, L);9:   L =  L − F (V  i, L);

10:   V R1  =  V R1 − {V  i};11:   V R2  =  V R2 + {V  i};12:   Choose   V  i ∈  V R1  having maximal number of nodes;13:   V R1  =  V R1 − {V  i};14:   L =  L + V  i;

V. PERFORMANCE EVALUATION

We evaluate the performance of the proposed algorithms

in solving the Connected  M -Set  k-Coverage problem using a

large set of simulated sensor networks. The simulations were

conducted on an Intel T5500 laptop running Windows XP

Professional with 3 GBytes of RAM. We randomly place   N 

sensor nodes in a 500×500 region. In each test case, a differentrandom seed is used. The number   N   of nodes varies from

100 to 500. We use a pair of   (R   = 200,   r   = 100)   and

another pair of  (R = 200,  r  = 200)  to evaluate Algorithms 2

and 4, respectively. Every measurement point plotted in the

performance figures is the average of 100 test cases.

We compare the performance of our algorithm with that of 

the algorithm in [4]. Fig 7(a) shows the comparison of the time

cost of these two algorithms running on the same computer to

find   K -COVER subsets in the designated square region, i.e.

563

7/17/2019 Exploring Redundancy in Sensor Deployment to.pdf

http://slidepdf.com/reader/full/exploring-redundancy-in-sensor-deployment-topdf 8/9

0

5

10

15 0

5

10

0

20

40

60

80

100

120

140

160

 

k MinDegree

   N  u  m   b  e  r  o   f  s  e  n  s  o  r  s

   i  n   t   h  e  s  u   b  s  e   t

100 sensors

200 sensors

300 sensors

400 sensors

500 sensors

(a)

05

1015 0

5

100

50

100

150

200

 

k MinDegree 

   N  u  m   b  e  r  o   f  s  e  n  s  o  r  s

   i  n   t   h  e  s  u   b  s  e   t

100 sensors

200 sensors

300 sensors

400 sensors

500 sensors

(b)

Fig. 8. The results with M   = 1  and different  k  values in sensor networks of different sizes and topologies: (a) Algorithm 2; and (b) Algorithm 4.

k   = 1   in our problem. We observed that our algorithm (the

curve marked by asterisks) uses significantly less time than

the algorithm in [4] (the curve marked by circles) because the

complexity of our algorithm is completely independent of theresolution of the region. A resolution-dependent algorithm does

not scale well as the resolution increases. Fig. 7(b) shows the

comparison of the  K  percentage, which is defined as the ratio

of the average   K , i.e. the average   M   when   k   = 1   to the

average analytical upper bound of   K . We observed that our

algorithm consistently finds more subsets than the algorithm

in [4] and approaches the theoretical upper bound. We would

also like to point out that our algorithm satisfies the connectivity

requirement of each subset while the algorithm in [4] does not.

Fig. 7(c) plots the ratio of the connected  M  value to the average

analytical upper bound of  M   when  k   = 1, which shows that

our algorithm is able to find most of the connected subsets.

Figs. 8(a) and 8(b) show the sizes of the resultant subsetscalculated by Algorithms 2 and 4, respectively, with M  = 1 and

different k  values in networks of different sizes and topologies.

We define  MinDegree as the value of  min p∈P 

(D( p)). We observed

that, for a given  k   value and  M  = 1, if  k <   min p∈IP 

(D( p)), our

algorithms obtain a similar subset size, indicating the robustness

of our algorithms in different k-Coverage problem instances. As

shown in Fig. 8, our algorithms exhibit very stable optimization

performance in all the cases we studied.

1 2 3 4 5 6 7 8 9 101

2

3

4

5

6

7

8

9

10

Mindegree

   k   *   A  v  g   (   M   )

k*Avg(M)

Fig. 11. The changing trend of  Avg(M ) · k  as MinDegree increases.

Figs. 9 and 10 show the comparison of the average M  value

and the average MinDegree with   r   = 100   and   r   = 200,

respectively. Fig. 9(a) shows that when  k  = 1, the average  M value obtained by our algorithms is very close to the average

MinDegree. Fig. 9(b) shows that when  k  = 2, the average  M approaches half of the average MinDegree, and Fig. 9(c) shows

about one third when  k   = 3. We observed qualitatively verysimilar results in Fig. 10 with  r  = 200.

We plot in Fig. 11 the changing trend of   Avg(M ) ·  k   as

MinDegree increases, which represents the property of a sensor

network that can be partitioned into subsets with  k-coverage.

We hoped that   Avg(M )   ·  k   could be consistently close to

MinDegree. However, the curves show that  Avg(M ) · k  departs

from MinDegree as MinDegree increases. This phenomena is

significant when MinDegree is a prime number. We believe that

this is a reasonable observation because the value of  k  changes

during the calculation of  M , and if  k   is not a factor of Min-

Degree, the difference between M  and MinDegree is relatively

large, which is even more significant when MinDegree is a

prime number. Fig. 11 illustrates the stability of our algorithms

from a different perspective.

VI . CONCLUSION

This paper generalized and investigated the Connected  M -Set  k-Coverage (CMSKC) problem. We derived the necessary

and sufficient condition for checking the coverage of a 2D

continuous region, based on which, we derived the upper

bounds of both M   and k. The time complexity of the proposed

solution to network partitioning is completely independent of 

the resolution of the region. The simulation results show that

our approach consistently outperforms other methods in search

of the best values of  M   and  k .The trade-off between   M   and   k   is essentially the trade-

off between energy efficiency and fault tolerance, which is an

important performance consideration in many sensor network 

applications. We will explore this trade-off and extend the

CMSKC problem to 3D space in our future work.

ACKNOWLEDGMENTS

This research is sponsored by National Science Foundation

under Grant No. CNS-0721980 with University of Memphis.

564

7/17/2019 Exploring Redundancy in Sensor Deployment to.pdf

http://slidepdf.com/reader/full/exploring-redundancy-in-sensor-deployment-topdf 9/9

100 150 200 250 300 350 4000

2

4

6

8

10

12

sensor count

   M   a

  n   d   M   i  n   d  e  g  r  e  e

Average M and Mindegree value while k=1and r=100

(a)

100 150 200 250 300 350 4000

2

4

6

8

10

12

sensor count

   M   a

  n   d   M   i  n   d  e  g  r  e  e

Average M and Mindegree value while k=2 and r=100

(b)

100 150 200 250 300 350 4000

2

4

6

8

10

12

sensor count

   M   a

  n   d   M   i  n   d  e  g  r  e  e

Average M and Mindegree value while k=3 and r=100

(c)

Fig. 9. Comparison of  M   (curves marked by circles) and MinDegree (curves marked by asterisks): (a)  k  = 1  and  r  = 100, (b)  k  = 2  and  r  = 100, and (c)k = 3  and  r  = 100.

100 150 200 250 300 350 4000

10

20

30

40

50

sensor count

   M

   a  n   d   M   i  n   d  e  g  r  e  e

Average M and Mindegree value while k=4 and r=200

(a)

100 150 200 250 300 350 4000

10

20

30

40

50

sensor count

   M

   a  n   d   M   i  n   d  e  g  r  e  e

Average M and Mindegree value while k=5 and r=200

(b)

100 150 200 250 300 350 4000

10

20

30

40

50

sensor count

   M

   a  n   d   M   i  n   d  e  g  r  e  e

Average M and Mindegree value while k=6 and r=200

(c)

Fig. 10. Comparison of  M   (curves marked by circles) and MinDegree (curves marked by asterisks): (a)  k  = 4   and   r  = 200, (b)  k  = 5  and   r  = 200, (c)k = 6  and  r  = 200.

REFERENCES

[1] S. Al-Omari and W. Shi, “Redundancy-aware topology management inwireless sensor networks,” in  Proc. of the 2nd Int. Conf. on Collaborative

Computing, (Atlanta, Georgia), Nov. 2006.[2] R. Iyengar, K. Kar, and S. Banerjee, “Low-coordination topologies for

redundancy in sensor networks,” in  Proc. of MobiHoc, pp. 332–42, 2005.

[3] H. Han, T. Gu, and S. Lu, “Data redundancy aware topology controlinwireless sensor networks,” in  Proc. of Mobiquitous, (Philadelphia, PA),Aug. 6-10 2007.

[4] S. Slijepcevic and M. Potkonjak, “Power efficient organization of wirelesssensor networks,” in Proc. of the IEEE Int. Conf. on Comm. , pp. 472–476,2001.

[5] S. Yang, F. Dai, M. Cardei, J. Wu, and F. Patterson, “On connectedmultiple point coverage in wireless sensor networks,”   Int. J. of Wireless

 Info. Networks, vol. 13, no. 4, pp. 289–301, 2006.

[6] M. Hefeeda, “Randomized k-coverage algorithms for dense sensor net-works,” in   Proc. of INFOCOM Minisymp., pp. 2376–2380, 2007.

[7] W. Shen, Q. Wu, and Y. Lin, “Exploring redundancy in sensor deploymentto prolong network lifetime,” in   Proc. of the 18th Int. Conf. on Comp.

Comm. and Net., (San Francisco, CA), Aug. 2-6 2009.[8] W. Shen and Q. Wu, “Exploring redundancy in sensor deployment toimprove fault tolerance,” in Proc. of the 1st Int. Conf. on Sensor Networksand Applications, (San Francisco, CA), Nov. 4-6 2009.

[9] S. Chachra and M. Marefat, “Distributed algorithms for sleep schedulingin wireless sensor networks,” in  Proc. of IEEE Int. Conf. on Robotics and 

 Automation, pp. 3101–3107, May 15-19 2006.

[10] C. Hsin and M. Liu, “Network coverage using low duty-cycled sensors:Random & coordinated sleep algorithms,” in  Proc. of the 3rd Int. Symp.on Info. Proc. in Sensor Networks, pp. 433–442, 2004.

[11] A. Gallais and J. Carle, “An adaptive localized algorithm for multiplesensor area coverage,”   Ad Hoc and Sensor Wireless Networks, vol. 4,no. 3, pp. 271–288, 2007.

[12] Z. Abrams, A. Goel, and S. Plotkin, “Set k-cover algorithms for energyefficient monitoring in wireless sensor networks,” in   Proc. of Info. Proc.in Sensor Net., pp. 424–432, 2004.

[13] H. Gupta, S. R. Das, and Q. Gu, “Connected sensor cover: self-

organization of sensor networks for efficient query execution,” in   Proc.of the ACM MobiHoc, pp. 189–200, 2003.

[14] V. Anil, S. Arya, and H. Ramesh, “Hardness of set cover with intersection1,” in   Proc. of 27th Int. Colloq. Auto. Lang. Prog., pp. 624–635, 2000.

[15] Z. Zhou, S. Das, and H. Gupta, “Connected k-coverage problem in sensornetworks,” in   Proc. of Int. Conf. on Computer Communications and 

 Networks, pp. 373–378, 2004.[16] S. Kumar, T. Lai, and J. Balogh, “On k-coverage in a mostly sleeping

sensor network,” in   Proc. of ACM MobiCom, pp. 144–158, 2004.[17] S. Funke, A. Kesselman, Z. Lotker, and M. Segal, “Improved approxima-

tion algorithms for connected sensor cover,”   Wirel. Netw., vol. 13, no. 2,pp. 153–164, 2007.

[18] G. Simon, M. Molnar, L. Gonczy, and B. Cousin, “Dependable k-coveragealgorithms for sensor networks,” in   Proc. of Instr. and Measure. Tech.Conf., 2007.

[19] H. Zhang and J. Hou, “Maintaining sensing coverage and connectivityin large sensor networks,”  Ad Hoc and Sensor Wireless Networks , vol. 1,

no. 1-2, pp. 89–124, 2005.[20] A. So and Y. Ye, “On solving coverage problems in a wireless sensor

network using voronoi diagrams,” in   Proc. of Workshop on Internet and  Network Economics, (Hong Kong), 2005.

[21] C. Huang and Y. Tseng, “The coverage problem in a wireless sensornetwork,” in Proc. of the 2nd ACM Int. Conf. on WSN and App. , pp. 115–121, 2003.

[22] A. Savvides, C. Han, and M. Strivastava, “Dynamic fine-grained localiza-tion in ad-hoc networks of sensors,” in  Proc. of ACM MobiCom, pp. 166–179, 2001.

[23] M. Garey and D. Johnson,  Computers and Intractability: A Guide to theTheory of NP-completeness. San Francisco: W.H. Freeman and Company,1979.