Performance analysis of stochastic network coverage with limited mobility

Chris Y.T. Ma, David K.Y. Yau, Nung Kwan Yip, Nageswara S.V. Rao, Jiming Chen

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

We analyze the ability of a stochastic coverage algorithm to achieve both accurate threat-based coverage and effective information capture. When mobile sensors are used to cover the region over time, the goal of threat-based coverage is to allocate the sensors' coverage time between the subregions in proportion to their threat levels. We show that, in contrast to prior results on mobile coverage for maximizing simple event capture, limiting mobility by strategically pausing the sensor is important for threat-based coverage ofphysical world monitoring. Besides being energy efficient, pausing has two desirable effects. First, it can improve the accuracy of the threat-based coverage, in particular, the accuracy increases monotonically with a pause time parameter, and a large enough parameter will ensure exact matching ofthe sensor's coverage profile with the region's threat profile. Second, diverse natural phenomena require a non-negligible sensing time to overcome statistical uncertainties posed by the random nature of the phenomena. Suitable pausing allows a subregion to be observed long enough for reliable results.

Original languageEnglish
Title of host publication2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, MASS '09
Pages496-505
Number of pages10
DOIs
StatePublished - 2009
Event2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, MASS '09 - Macau, China
Duration: Oct 12 2009Oct 15 2009

Publication series

Name2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, MASS '09

Conference

Conference2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, MASS '09
Country/TerritoryChina
CityMacau
Period10/12/0910/15/09

Fingerprint

Dive into the research topics of 'Performance analysis of stochastic network coverage with limited mobility'. Together they form a unique fingerprint.

Cite this