Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Approximation algorithms for deployment of sensors for line segment coverage in wireless sensor networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

The coverage problem in wireless sensor networks deals with the problem of covering a region or parts of it with sensors. In this paper, we address the problem of covering a set of line segments with minimum number of sensors. A line segment ℓ is said to be 1-covered if it intersects the sensing region of at least one among the sensors distributed in a bounded rectangular region R. We assume that the sensing radius of each sensor is uniform. The problem of finding the minimum number of sensors needed to 1-cover each member in a given set of line segments in R is NP-hard. We propose two constant factor approximation algorithms and a PTAS (polynomial time approximation scheme) for the problem for 1-covering a set of axis-parallel line segments. We also show that a PTAS exists for 1-covering a set of arbitrarily oriented line segments in R where the lengths of the line segments are bounded within a constant factor of the sensing radius of each sensor. Finally, we propose a constant factor approximation algorithm for k-covering axis-parallel line segments such that sensors maintain a minimum separation among them.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Agnetis, A., Grande, E., Mirchandani, P. B., & Pacifici, A. (2009). Covering a line segment with variable radius discs. ACM Computers & Operations Research, 36(5), 1423–1436.

    Article  MathSciNet  MATH  Google Scholar 

  2. Bai, X., Kumar, S., Xuan, D., Yun, Z., & Lai, T. H. (2006). Deploying wireless sensors to achieve both coverage and connectivity. In ACM international symposium on mobile ad hoc networking and computing (pp. 131–142). Florence, Italy.

  3. Balister, P., Zheng, Z., Kumar, S., & Sinha, P. (2009). Trap coverage: Allowing coverage holes of bounded dimeter in wireless sensor network. In IEEE INFOCOM.

  4. Baumgartner, K., & Ferrari, S. (2008). A geometric transversal approach to analyzing track coverage in sensor networks. IEEE Transactions on Computers, 57(8), 1113–1128.

    Article  MathSciNet  Google Scholar 

  5. Carmi, P., Katz, M., & Lev-Tov, N. (2007). Covering points by unit disks of fixed location. In International Symposium on Algorithms and Computation. (pp. 644–655).

  6. Carmi, P., Katz, M. J., & Lev-Tov, N. (2008). Polynomial time approximation schemes for piercing and covering with applications in wireless networks. Computational Geometry: Theory and Applications, 39(3), 209–218.

    Article  MathSciNet  MATH  Google Scholar 

  7. Chakrabarty, K., Iyengar, S. S., Qi, H., & Cho, E. (2002). Grid coverage for surveillance and target location in distributed sensor networks. IEEE Transactions on Computers, 51(12), 1448–1453.

    Article  MathSciNet  Google Scholar 

  8. Chan, T. M. (2003). Polynomial-time approximation schemes for packing and piercing fat objects. Journal of Algorithms, 46(2), 178–189.

    Article  MathSciNet  MATH  Google Scholar 

  9. Chan, T. M., & Mahmood, A.-A. (2005). Approximating the piercing number for unit-height rectangles. In CCCG (pp. 15–18). Windsor, Ontario.

  10. Claude, F., Das, G. K., Dorrigiv, R., Durocher, S., Fraser, R., Lopez-Ortiz, A., Nickerson, B. G., & Salinger, A. (2010). An improved line-separable algorithm for discrete unit disk cover. Discrete Mathematics, Algorithms, and Applications, 2(1), 1–11.

    Article  MathSciNet  Google Scholar 

  11. Clouqueur, T., Phipatanasuphorn, V., Ramanathan, P., & Saluja, K. K. (2002). Sensor deployment strategy for target detection. In WSNA (pp. 42–48). Atlanta, GA.

  12. Dash, D., Bishnu, A., Gupta, A., & Nandy, S.C. (2010). Approximation algorithm for line segment coverage for wireless sensor network. CoRR, abs/1006.2955.

  13. de Berg, M., van Kreveld, M., Overmars, M., & Schwarzkopf, O. (2000). Computational geometry: Algorithms and applications, second edition. Berlin: Springer.

    Google Scholar 

  14. Fowler, R. J., Paterson, M. S., & Tanimoto, S. L. (1981). Optimal packing and covering in the plane are np-complete. Information Processing Letters, 12(3), 133–137.

    Article  MathSciNet  MATH  Google Scholar 

  15. Galota, M., Reith, C. G. S., & Vollmer, H. (2001). A polynomial-time approximation scheme for base station positioning in UMTS networks. In International workshop on discrete algorithms and methods for mobile computing and communications (pp. 52–60).

  16. Gonzalez T. F. (1991). Covering a set of points in multidimensional space. Information Processing Letters, 40, 181–188.

    Article  MathSciNet  MATH  Google Scholar 

  17. Liu, H., Wan, P., & Jia, X. (2006). Maximal lifetime scheduling for k to 1 sensor–target surveillance networks. Computer Networks, 50(15), 2839–2854.

    Google Scholar 

  18. Harada, J., Shioda, S., & Saito, H. (2009). Path coverage properties of randomly deployed sensors with finite data-transmission ranges. Computer Networks, 53(7), 1014–1026.

    Article  MATH  Google Scholar 

  19. Hochbaum, D., & Maass, W. (1985). Approximation schemes for covering and packing problems in image processing and vlsi. Journal ACM, 32(1), 130–136.

    Article  MathSciNet  MATH  Google Scholar 

  20. Huang, C., & Tseng, Y. (2005). The coverage problem in wireless sensor network. Mobile Network and Applications, 10(4), 519–528.

    Article  MathSciNet  Google Scholar 

  21. Kim, J.-E., Yoon, M.-K., Han, J., & Lee, C.-G. (2008). Sensor placement for 3-coverage with minimum separation requirements. In Proceedings of the 4th IEEE international conference on distributed computing in sensor systems, DCOSS ’08 (pp. 266–281). Berlin, Heidelberg: Springer.

  22. Kumar, S., Lai, T. H., & Arora, A. (2005). Barrier coverage with wireless sensors. In ACM MOBICOM (pp. 284–298). Cologne, Germany.

  23. Megerian, S., Koushanfar, F., Potkonjak, M., & Srivastava, M. B. (2005). Worst and best-case coverage in sensor networks. IEEE Transactions on Mobile Computing, 4(1), 753–763.

    Article  Google Scholar 

  24. Ram, S. S., Manjunath, D., Iyer, S. K., & Yogeshwaran, D. (2007). On the path coverage properties of random sensor networks. IEEE Transactions on Mobile Computing, 6(5), 446–458.

    Article  Google Scholar 

  25. Thai, M. T., Wang, F., & Du, D. (2008). Coverage problems in wireless sensor networks: Designs and analysis. ACM Journal of Sensor Network, 3(3), 191–200.

    Article  Google Scholar 

  26. Wu, C., Lee, K. C., & Chung, Y. (2007). A delaunay triangulation based method for wireless sensor network deployment. ACM Computer Communications, 30(14–15), 2744–2752.

    Article  Google Scholar 

  27. Xing, G., Wang, X., Zhang, Y., Lu, C., Pless, R., & Gill, C. (2005). Integrated coverage and connectivity configuration for energy conservation in sensor networks. ACM Transactions on Sensor Networks, 1(1), 36–72.

    Article  Google Scholar 

  28. Xu, X., & Sahni, S. (2007). Approximation algorithms for sensor deployment. IEEE Transactions on Computers, 56(12), 1681–1695.

    Google Scholar 

  29. Yick, J., Bharathidasan, A., Pasternack, G., Mukherjee, B., Ghosal, D. (2004). Optimizing placement of beacons and data loggers in a sensor network—a case study. In Wireless communications and networking conference (pp. 2486–2491) March 2004.

  30. Zhang, Z., & Du, D.-Z. (2011). Radar placement along banks of river. Journal of Global Optimization (pp. 1–13). doi:10.1007/s10898-011-9704-3.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arobinda Gupta.

Appendix: O(n log n) Time 8-approximation algorithm

Appendix: O(n log n) Time 8-approximation algorithm

We employ a plane sweep for finding the maximal independent set for the horizontal segments. A similar technique would be employed for the vertical segments.

A vertical line sweeps from left to right. There are two types of event points per line segment—the left endpoint and right endpoint. The endpoints are sorted from left to right and are stored in a list L. The top to bottom order (in terms of y-coordinates) of the line segments intersecting the vertical sweep line is maintained in a balanced binary search tree, T 1. Whenever the left endpoint of a line segment is encountered by the sweep line, the line segment is deleted from L and inserted into T 1 based on its y-coordinate. Whenever the sweep line encounters the right endpoint of a line segment ℓ, the line segment is deleted from T 1 and the following actions are performed. We need to also delete all other line segments which are at a distance 2 ρ from ℓ. Let the y-coordinate of ℓ be y(ℓ). We do an interval query on T 1 with the interval [y(ℓ) − 2ρ, y(ℓ) − 2ρ ] and delete all line segments that lie within this interval. There may be other line segments which are at a distance 2 ρ from ℓ. The left endpoints of such line segments lie within a half-circle of radius 2 ρ centered at the right endpoint of ℓ (see the half-circle \({{\mathcal C}}\) in Fig. 9a). As circular range queries are costly, we do it using rectangular range queries. Specifically, we keep a fractional cascading based range searching structure [13] T 2 on the endpoints of the line segments. T 2 needs O(n log n) space. We query T 2 with a query rectangle \({{\mathcal D}}\) (see Fig. 9(a)) of size \({4\rho \times 2 \rho;\, {\mathcal D}}\) is hinged at the right endpoint of ℓ. This reporting query takes O(log n + k) time where k is the number of points inside \({{\mathcal D}.}\) We test these k points for inclusion in \({{\mathcal C}.}\) Line segments whose left endpoints lie inside \({{\mathcal C}}\) are deleted from T 1 and L. The line segments whose left endpoints lie within the region \({{\mathcal D} \setminus {\mathcal C}}\) (see the shaded region in Fig. 9 and the line segments whose left endpoints lie in \({{\mathcal D} \setminus {\mathcal C}}\)) lie at a distance greater than 2 ρ from the right endpoint of ℓ and as such cannot be deleted. We call such a line segment as a false line. A line segment can be a false line if its left endpoint lies in \({{\mathcal D} \setminus {\mathcal C}}\) for a rectangular range query initiated on encountering a right endpoint of a line segment during the plane sweep. The following lemma shows that a line segment can be a false line at most twice.

Fig. 9
figure 9

(a) The query in the line sweep algorithm; \({{\mathcal C}}\) denotes the half-circle of radius \({2 \rho, \,{\mathcal D}}\) denotes the query rectangle of size 4 ρ × 2 ρ; line segments whose left endpoints are in \({{\mathcal D} \setminus {\mathcal C}}\) (the shaded region) are false lines; (b) an example showing that false reporting is O(1)

Lemma 12

A line segment can be a false line at most twice.

Proof

Consider a line segment ℓ′ that is a false line. ℓ′ can be reported as a false line by a rectangular range query initiated on encountering a right endpoint of a line segment that has to be at a distance greater than 2 ρ from the left endpoint of ℓ′ (and hence, outside the half-circle \({{\mathcal C}'}\) of radius 2 ρ as in Fig. 9(b)) but inside the query rectangle of size 4 ρ × 2ρ (and hence, inside \({{\mathcal D}'}\) of size 4 ρ × 2ρ as in Fig. 9(b)). Thus, ℓ′ can be a false line for line segments whose right endpoints lie inside the region \({{{\mathcal D}'} \setminus {{\mathcal C}'}. }\) As our algorithm deletes line segments within a vertical distance of 2 ρ, there can be only two such lines as shown in Fig. 9(b).\(\square\)

Theorem 8

The plane sweep algorithm for the 8-approximation algorithm takes O(n log n) time and space.

Proof

We focus on a line segment and try to find the time spent per line segment. As any line segment in L can be a false line at most twice (because of Lemma 12), the total time spent for all line segments in this regard is O(n). A line segment once deleted from L because of the range query never appears in the plane sweep. As deletion would take O(log n) time, the total time taken in this regard is O(n log n). Apart from these, the operations per line segment are—(1) insertion into T 1 and (2) a range query on T 2 and subsequent deletion of that line segment from T 1 and L. All these operations take O(log n) time per line segment. Thus, the total time taken is O(n log n). The space needed for L and T 1 is O(n), but T 2 takes O(n log n), thus making the space complexity also O(n log n). \(\square\)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Dash, D., Bishnu, A., Gupta, A. et al. Approximation algorithms for deployment of sensors for line segment coverage in wireless sensor networks. Wireless Netw 19, 857–870 (2013). https://doi.org/10.1007/s11276-012-0506-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-012-0506-4

Keywords

Navigation