Abstract
The coverage problem in wireless sensor networks deals with the problem of covering a region or parts of it with sensors. In this paper, we address the problem of covering a set of line segments with minimum number of sensors. A line segment ℓ is said to be 1-covered if it intersects the sensing region of at least one among the sensors distributed in a bounded rectangular region R. We assume that the sensing radius of each sensor is uniform. The problem of finding the minimum number of sensors needed to 1-cover each member in a given set of line segments in R is NP-hard. We propose two constant factor approximation algorithms and a PTAS (polynomial time approximation scheme) for the problem for 1-covering a set of axis-parallel line segments. We also show that a PTAS exists for 1-covering a set of arbitrarily oriented line segments in R where the lengths of the line segments are bounded within a constant factor of the sensing radius of each sensor. Finally, we propose a constant factor approximation algorithm for k-covering axis-parallel line segments such that sensors maintain a minimum separation among them.
Similar content being viewed by others
References
Agnetis, A., Grande, E., Mirchandani, P. B., & Pacifici, A. (2009). Covering a line segment with variable radius discs. ACM Computers & Operations Research, 36(5), 1423–1436.
Bai, X., Kumar, S., Xuan, D., Yun, Z., & Lai, T. H. (2006). Deploying wireless sensors to achieve both coverage and connectivity. In ACM international symposium on mobile ad hoc networking and computing (pp. 131–142). Florence, Italy.
Balister, P., Zheng, Z., Kumar, S., & Sinha, P. (2009). Trap coverage: Allowing coverage holes of bounded dimeter in wireless sensor network. In IEEE INFOCOM.
Baumgartner, K., & Ferrari, S. (2008). A geometric transversal approach to analyzing track coverage in sensor networks. IEEE Transactions on Computers, 57(8), 1113–1128.
Carmi, P., Katz, M., & Lev-Tov, N. (2007). Covering points by unit disks of fixed location. In International Symposium on Algorithms and Computation. (pp. 644–655).
Carmi, P., Katz, M. J., & Lev-Tov, N. (2008). Polynomial time approximation schemes for piercing and covering with applications in wireless networks. Computational Geometry: Theory and Applications, 39(3), 209–218.
Chakrabarty, K., Iyengar, S. S., Qi, H., & Cho, E. (2002). Grid coverage for surveillance and target location in distributed sensor networks. IEEE Transactions on Computers, 51(12), 1448–1453.
Chan, T. M. (2003). Polynomial-time approximation schemes for packing and piercing fat objects. Journal of Algorithms, 46(2), 178–189.
Chan, T. M., & Mahmood, A.-A. (2005). Approximating the piercing number for unit-height rectangles. In CCCG (pp. 15–18). Windsor, Ontario.
Claude, F., Das, G. K., Dorrigiv, R., Durocher, S., Fraser, R., Lopez-Ortiz, A., Nickerson, B. G., & Salinger, A. (2010). An improved line-separable algorithm for discrete unit disk cover. Discrete Mathematics, Algorithms, and Applications, 2(1), 1–11.
Clouqueur, T., Phipatanasuphorn, V., Ramanathan, P., & Saluja, K. K. (2002). Sensor deployment strategy for target detection. In WSNA (pp. 42–48). Atlanta, GA.
Dash, D., Bishnu, A., Gupta, A., & Nandy, S.C. (2010). Approximation algorithm for line segment coverage for wireless sensor network. CoRR, abs/1006.2955.
de Berg, M., van Kreveld, M., Overmars, M., & Schwarzkopf, O. (2000). Computational geometry: Algorithms and applications, second edition. Berlin: Springer.
Fowler, R. J., Paterson, M. S., & Tanimoto, S. L. (1981). Optimal packing and covering in the plane are np-complete. Information Processing Letters, 12(3), 133–137.
Galota, M., Reith, C. G. S., & Vollmer, H. (2001). A polynomial-time approximation scheme for base station positioning in UMTS networks. In International workshop on discrete algorithms and methods for mobile computing and communications (pp. 52–60).
Gonzalez T. F. (1991). Covering a set of points in multidimensional space. Information Processing Letters, 40, 181–188.
Liu, H., Wan, P., & Jia, X. (2006). Maximal lifetime scheduling for k to 1 sensor–target surveillance networks. Computer Networks, 50(15), 2839–2854.
Harada, J., Shioda, S., & Saito, H. (2009). Path coverage properties of randomly deployed sensors with finite data-transmission ranges. Computer Networks, 53(7), 1014–1026.
Hochbaum, D., & Maass, W. (1985). Approximation schemes for covering and packing problems in image processing and vlsi. Journal ACM, 32(1), 130–136.
Huang, C., & Tseng, Y. (2005). The coverage problem in wireless sensor network. Mobile Network and Applications, 10(4), 519–528.
Kim, J.-E., Yoon, M.-K., Han, J., & Lee, C.-G. (2008). Sensor placement for 3-coverage with minimum separation requirements. In Proceedings of the 4th IEEE international conference on distributed computing in sensor systems, DCOSS ’08 (pp. 266–281). Berlin, Heidelberg: Springer.
Kumar, S., Lai, T. H., & Arora, A. (2005). Barrier coverage with wireless sensors. In ACM MOBICOM (pp. 284–298). Cologne, Germany.
Megerian, S., Koushanfar, F., Potkonjak, M., & Srivastava, M. B. (2005). Worst and best-case coverage in sensor networks. IEEE Transactions on Mobile Computing, 4(1), 753–763.
Ram, S. S., Manjunath, D., Iyer, S. K., & Yogeshwaran, D. (2007). On the path coverage properties of random sensor networks. IEEE Transactions on Mobile Computing, 6(5), 446–458.
Thai, M. T., Wang, F., & Du, D. (2008). Coverage problems in wireless sensor networks: Designs and analysis. ACM Journal of Sensor Network, 3(3), 191–200.
Wu, C., Lee, K. C., & Chung, Y. (2007). A delaunay triangulation based method for wireless sensor network deployment. ACM Computer Communications, 30(14–15), 2744–2752.
Xing, G., Wang, X., Zhang, Y., Lu, C., Pless, R., & Gill, C. (2005). Integrated coverage and connectivity configuration for energy conservation in sensor networks. ACM Transactions on Sensor Networks, 1(1), 36–72.
Xu, X., & Sahni, S. (2007). Approximation algorithms for sensor deployment. IEEE Transactions on Computers, 56(12), 1681–1695.
Yick, J., Bharathidasan, A., Pasternack, G., Mukherjee, B., Ghosal, D. (2004). Optimizing placement of beacons and data loggers in a sensor network—a case study. In Wireless communications and networking conference (pp. 2486–2491) March 2004.
Zhang, Z., & Du, D.-Z. (2011). Radar placement along banks of river. Journal of Global Optimization (pp. 1–13). doi:10.1007/s10898-011-9704-3.
Author information
Authors and Affiliations
Corresponding author
Appendix: O(n log n) Time 8-approximation algorithm
Appendix: O(n log n) Time 8-approximation algorithm
We employ a plane sweep for finding the maximal independent set for the horizontal segments. A similar technique would be employed for the vertical segments.
A vertical line sweeps from left to right. There are two types of event points per line segment—the left endpoint and right endpoint. The endpoints are sorted from left to right and are stored in a list L. The top to bottom order (in terms of y-coordinates) of the line segments intersecting the vertical sweep line is maintained in a balanced binary search tree, T 1. Whenever the left endpoint of a line segment is encountered by the sweep line, the line segment is deleted from L and inserted into T 1 based on its y-coordinate. Whenever the sweep line encounters the right endpoint of a line segment ℓ, the line segment is deleted from T 1 and the following actions are performed. We need to also delete all other line segments which are at a distance 2 ρ from ℓ. Let the y-coordinate of ℓ be y(ℓ). We do an interval query on T 1 with the interval [y(ℓ) − 2ρ, y(ℓ) − 2ρ ] and delete all line segments that lie within this interval. There may be other line segments which are at a distance 2 ρ from ℓ. The left endpoints of such line segments lie within a half-circle of radius 2 ρ centered at the right endpoint of ℓ (see the half-circle \({{\mathcal C}}\) in Fig. 9a). As circular range queries are costly, we do it using rectangular range queries. Specifically, we keep a fractional cascading based range searching structure [13] T 2 on the endpoints of the line segments. T 2 needs O(n log n) space. We query T 2 with a query rectangle \({{\mathcal D}}\) (see Fig. 9(a)) of size \({4\rho \times 2 \rho;\, {\mathcal D}}\) is hinged at the right endpoint of ℓ. This reporting query takes O(log n + k) time where k is the number of points inside \({{\mathcal D}.}\) We test these k points for inclusion in \({{\mathcal C}.}\) Line segments whose left endpoints lie inside \({{\mathcal C}}\) are deleted from T 1 and L. The line segments whose left endpoints lie within the region \({{\mathcal D} \setminus {\mathcal C}}\) (see the shaded region in Fig. 9 and the line segments whose left endpoints lie in \({{\mathcal D} \setminus {\mathcal C}}\)) lie at a distance greater than 2 ρ from the right endpoint of ℓ and as such cannot be deleted. We call such a line segment as a false line. A line segment can be a false line if its left endpoint lies in \({{\mathcal D} \setminus {\mathcal C}}\) for a rectangular range query initiated on encountering a right endpoint of a line segment during the plane sweep. The following lemma shows that a line segment can be a false line at most twice.
Lemma 12
A line segment can be a false line at most twice.
Proof
Consider a line segment ℓ′ that is a false line. ℓ′ can be reported as a false line by a rectangular range query initiated on encountering a right endpoint of a line segment that has to be at a distance greater than 2 ρ from the left endpoint of ℓ′ (and hence, outside the half-circle \({{\mathcal C}'}\) of radius 2 ρ as in Fig. 9(b)) but inside the query rectangle of size 4 ρ × 2ρ (and hence, inside \({{\mathcal D}'}\) of size 4 ρ × 2ρ as in Fig. 9(b)). Thus, ℓ′ can be a false line for line segments whose right endpoints lie inside the region \({{{\mathcal D}'} \setminus {{\mathcal C}'}. }\) As our algorithm deletes line segments within a vertical distance of 2 ρ, there can be only two such lines as shown in Fig. 9(b).\(\square\)
Theorem 8
The plane sweep algorithm for the 8-approximation algorithm takes O(n log n) time and space.
Proof
We focus on a line segment and try to find the time spent per line segment. As any line segment in L can be a false line at most twice (because of Lemma 12), the total time spent for all line segments in this regard is O(n). A line segment once deleted from L because of the range query never appears in the plane sweep. As deletion would take O(log n) time, the total time taken in this regard is O(n log n). Apart from these, the operations per line segment are—(1) insertion into T 1 and (2) a range query on T 2 and subsequent deletion of that line segment from T 1 and L. All these operations take O(log n) time per line segment. Thus, the total time taken is O(n log n). The space needed for L and T 1 is O(n), but T 2 takes O(n log n), thus making the space complexity also O(n log n). \(\square\)
Rights and permissions
About this article
Cite this article
Dash, D., Bishnu, A., Gupta, A. et al. Approximation algorithms for deployment of sensors for line segment coverage in wireless sensor networks. Wireless Netw 19, 857–870 (2013). https://doi.org/10.1007/s11276-012-0506-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-012-0506-4