Coverage Control in Sensor Networks

By Bang Wang

Coverage Control in Sensor Networks Cover Image

Written with a tutorial style, this introduction presents three key types of coverage control problems: point, area and barrier coverage. The fundamentals are discussed in each category, as well as the most recent advances and techniques in the field today.

Full Description

  • ISBN13: 978-1-8499-6058-8
  • 228 Pages
  • User Level: Science
  • Publication Date: January 11, 2010
  • Available eBook Formats: PDF
  • eBook Price: $119.00
Buy eBook Buy Print Book Add to Wishlist
Full Description
This easy-to-read text focuses on challenges in coverage control in sensor networks, examines fundamental coverage problems, and presents the most recent advances and techniques in the field. Features: provides an introduction to sensors, sensor nodes, sensor networks, and sensor coverage models; supplies an informal definition and taxonomy for network-wide coverage control; explores the node placement optimization problem for coverage configuration before network deployment; investigates the coverage lifetime maximization problem by controlling coverage characteristics in a randomly deployed network; discusses the critical sensor-density problem for coverage configuration before network deployment; examines the sensor-activity scheduling problem of controlling network coverage characteristics in a randomly deployed network; introduces the node movement strategy problem for sensor networks containing mobile nodes; presents the challenges of building intrusion barriers and finding penetration paths.
Table of Contents

Table of Contents

  1. Part I: Introduction.
  2. Introduction.
  3. Sensor Coverage Model.
  4. Network Coverage Control.
  5. Part II Target Coverage Problems.
  6. Node Placement Optimization.
  7. Coverage Lifetime Maximization.
  8. Part III Area Coverage Problems.
  9. Critical Sensor Density.
  10. Sensor Activity Scheduling.
  11. Node Movement Strategy.
  12. Part IV Barrier Coverage Problems.
  13. Build Intrusion Barriers.
  14. Find Penetration Paths.
Errata

Please Login to submit errata.

No errata are currently published