{"title":"使用Voronoi镶嵌的无线传感器网络的移动性和安全性模型","authors":"Manel Abdelkader, Mohamed Hamdi, N. Boudriga","doi":"10.5220/0002989501040113","DOIUrl":null,"url":null,"abstract":"Recent advances in integrated electronic devices motivated the use of wireless sensor networks in many applications including target surveillance and tracking. A number of sensor nodes are scattered within a sensitive region to detect the presence of intruders and forward subsequent events to the analysis center(s). Obviously, the sensor deployment should guarantee and optimal event detection rate. This paper proposes a high-level Voronoi-based technique to assess the area coverage based on information available locally for each sensor node. We show that the proposed technique can be used to implement a coverage-preserving mobility process to enhance the initial sensor deployment. We also highlight other potential applications of our approach.","PeriodicalId":165879,"journal":{"name":"2010 International Conference on Data Communication Networking (DCNET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Mobility and security models for wireless sensor networks using Voronoi tessellations\",\"authors\":\"Manel Abdelkader, Mohamed Hamdi, N. Boudriga\",\"doi\":\"10.5220/0002989501040113\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recent advances in integrated electronic devices motivated the use of wireless sensor networks in many applications including target surveillance and tracking. A number of sensor nodes are scattered within a sensitive region to detect the presence of intruders and forward subsequent events to the analysis center(s). Obviously, the sensor deployment should guarantee and optimal event detection rate. This paper proposes a high-level Voronoi-based technique to assess the area coverage based on information available locally for each sensor node. We show that the proposed technique can be used to implement a coverage-preserving mobility process to enhance the initial sensor deployment. We also highlight other potential applications of our approach.\",\"PeriodicalId\":165879,\"journal\":{\"name\":\"2010 International Conference on Data Communication Networking (DCNET)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-07-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Data Communication Networking (DCNET)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5220/0002989501040113\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Data Communication Networking (DCNET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5220/0002989501040113","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Mobility and security models for wireless sensor networks using Voronoi tessellations
Recent advances in integrated electronic devices motivated the use of wireless sensor networks in many applications including target surveillance and tracking. A number of sensor nodes are scattered within a sensitive region to detect the presence of intruders and forward subsequent events to the analysis center(s). Obviously, the sensor deployment should guarantee and optimal event detection rate. This paper proposes a high-level Voronoi-based technique to assess the area coverage based on information available locally for each sensor node. We show that the proposed technique can be used to implement a coverage-preserving mobility process to enhance the initial sensor deployment. We also highlight other potential applications of our approach.