The Minimal Exposure Path in Mobile Wireless Sensor Network

Lili Zhang, Xiaoqiang Chen, Jianxi Fan, Dajin Wang, Cheng Kuan Lin

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

10 Scopus citations

Abstract

Target traversing is an important research topic in wireless sensor networks. Most works in this area consider the coverage issues of the target's moving paths. The minimal exposure path problem is to find a path among sensors so that the target's total exposure to the sensors is minimized. Most existing traversal algorithms ensure the target to stay as far as possible from static sensors. In this paper, we take into account the situation where there are moving sensors as well. We propose an effective algorithm based on tangent to not only stay as far as possible from static sensors, but also avoid mobile sensors. Simulations show that the proposed algorithms can solve the traversal path with mobile sensors' patrolling in wireless sensor networks.

Original languageEnglish
Title of host publicationProceedings - 7th International Symposium on Parallel Architectures, Algorithms, and Programming, PAAP 2015
EditorsHong Shen, Hong Shen, Yingpeng Sang, Haiping Huang
PublisherIEEE Computer Society
Pages73-79
Number of pages7
ISBN (Electronic)9781467391177
DOIs
StatePublished - 19 Jan 2016
Event7th International Symposium on Parallel Architectures, Algorithms, and Programming, PAAP 2015 - Nanjing, China
Duration: 12 Dec 201514 Dec 2015

Publication series

NameProceedings - International Symposium on Parallel Architectures, Algorithms and Programming, PAAP
Volume2016-January
ISSN (Print)2168-3034
ISSN (Electronic)2168-3042

Other

Other7th International Symposium on Parallel Architectures, Algorithms, and Programming, PAAP 2015
Country/TerritoryChina
CityNanjing
Period12/12/1514/12/15

Keywords

  • Voronoi diagram
  • cautioning point
  • exposure
  • minimal exposure path

Fingerprint

Dive into the research topics of 'The Minimal Exposure Path in Mobile Wireless Sensor Network'. Together they form a unique fingerprint.

Cite this