The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - January (2008 vol.19)
pp: 106-120
ABSTRACT
It has been discussed in the literature that the mobility of a mobile sensor network (MSN) can be used to improve its sensing coverage. How to efficiently manage the mobility towards a better coverage, however, remains unanswered. In this paper, motivated by classical dynamics that studies the movement of objects, we propose the concept of network dynamics and define the associated potential functions that capture the operational goals as well as the environment of a MSN. We find that, in managing the mobility of a MSN, Newton’s laws of motion in classical dynamics are insufficient for they introduce oscillations into the movement of sensor nodes. Instead, in network dynamics, the laws of motion are formulated using the steepest descent method in optimization. Based on the network dynamics model, we first devise a parallel and distributed algorithm (PDND) that runs on each sensor node to guide its movement. PDND then turns sensor nodes into autonomous entities capable of adjusting their locations according to the operational goals and environmental changes. After that, we formally prove the convergence of PDND. Finally, we apply PDND in three applications to demonstrate its effectiveness.
INDEX TERMS
Mobile sensor networks, coverage, potential fields, jamming attack
CITATION
Ke Ma, Yanyong Zhang, Wade Trappe, "Managing the Mobility of a Mobile Sensor Network Using Network Dynamics", IEEE Transactions on Parallel & Distributed Systems, vol.19, no. 1, pp. 106-120, January 2008, doi:10.1109/TPDS.2007.1113
REFERENCES
[1] Adaptive Sampling and Prediction, http://engineering.princeton. edu/gallery/ asapindex.htm, 2006.
[2] O. Khatib, “Real-Time Obstacle Avoidance for Manipulators and Mobile Robots,” Proc. IEEE Int'l Conf. Robotics and Automation (ICRA '85), pp. 500-505, 1985.
[3] B.Q. Nguyen, Y.-L. Chuang, D. Tung, C. Hsieh, Z. Jin, L. Shi, D. Marthaler, A. Bertozzi, and R.M. Murray, “Virtual Attractive-Repulsive Potentials for Cooperative Control of Second Order dynamic Vehicles on the Caltech MVWT,” Proc. 2005 Am. Control Conf. (ACC '05), pp. 1084-1089, 2005.
[4] Y. Zou and K. Chakrabarty, “Sensor Deployment and Target Localization Based on Virtual Forces,” Proc. IEEE INFOCOM '03, pp. 1293-1303, Mar. 2003.
[5] A. Howard, M. Mataric, and G. Sukhatme, “Mobile Sensor Network Deployment Using Potential Fields: A Distributed, Scalable Solution to the Area Coverage Problem,” Proc. Sixth Int'l Symp. Distributed Autonomous Robotics Systems (DARS '02), June 2002.
[6] S. Poduri and G.S. Sukhatme, “Constrained Coverage for Mobile Sensor Networks,” Proc. IEEE Int'l Conf. Robotics and Automation (ICRA '04), pp. 165-171, 2004.
[7] P. Ögren, E. Fiorelli, and N.E. Leonard, “Cooperative Control of Mobile Sensor Networks: Adaptive Gradient Climbing in a Distributed Environment,” IEEE Trans. Automatic Control, vol. 49, no. 8, pp. 1292-1302, 2004.
[8] N.E. Leonard and E. Fiorelli, “Virtual Leaders, Artificial Potentials and Coordinated Control of Groups,” Proc. 40th IEEE Conf. Decision and Control (CDC '01), pp. 2968-2973, 2001.
[9] J. Tan and O.M. Lozano, “A Distributed Graph Model for the Coordination and Formation of Multi-Robot Systems,” Int'l J.Robotics Research, to be published.
[10] J. Tan and N. Xi, “Peer-to-Peer Model for the Area Coverage and Cooperative Control of Mobile Sensor Networks,” Proc. SPIE Symp. Defense and Security, pp. 439-450, 2004.
[11] N. Heo and P.K. Varshney, “Energy-Efficient Deployment of Intelligent Mobile Sensor Networks,” IEEE Trans. Systems, Man and Cybernetics, vol. 35, no. 1, pp. 78-92, 2005.
[12] G. Wang, G. Cao, and T. Porta, “Movement-Assisted Sensor Deployment,” Proc. IEEE INFOCOM '04, pp. 2469-2479, Mar. 2004.
[13] J. Cortés, S. Martínez, T. Karatas, and F. Bullo, “Coverage Control for Mobile Sensing Networks,” IEEE Trans. Robotics and Automation, vol. 20, no. 2, pp. 243-255, 2004.
[14] P.G. Fernandes, P. Stevenson, A.S. Brierley, F. Armstrong, and E.J. Simmonds, “Autonomous Underwater Vehicles: Future Platforms for Fisheries Acoustics,” ICES J. Marine Science, vol. 60, no. 3, pp.684-691, 2003.
[15] R.P. Feynman, Feynman Lectures on Physics. Addison Wesley, 1970.
[16] C.G. Gray and K.E. Gubbins, The Theory of Molecular Fluids 1: Fundamentals. Clarence Press, 1984.
[17] P. Enge and P. Misra, Global Positioning System: Signals, Measurements and Performance. Ganga-Jamuna Pr, 2001.
[18] K. Langendoen and N. Reijers, “Distributed Localization in Wireless Sensor Networks: A Quantitative Comparison,” Computer Networks, vol. 43, no. 4, pp. 499-518, 2003.
[19] D.P. Bertsekas and J.N. Tsitsiklis, Parallel and Distributed Computation: Numerical Methods. Athena Scientific, 1997.
[20] A. Ghosh, “Estimating Coverage Holes and Enhancing Coverage in Mixed Sensor Networks,” Proc. 29th Ann. IEEE Int'l Conf. Local Computer Networks (LCN '04), pp. 68-76, 2004.
[21] T. Liu, C.M. Sadler, P. Zhang, and M. Martonosi, “Implementing Software on Resource-Constrained Mobile Sensors: Experiences with Impala and Zebranet,” Proc. Second Int'l Conf. Mobile Systems, Applications, and Services (MobiSys '04), pp. 256-269, June 2004.
[22] A. Wood, J. Stankovic, and S. Son, “JAM: A Jammed-Area Mapping Service for Sensor Networks,” Proc. 24th IEEE Real-Time Systems Symp. (RTSS '03), pp. 286-297, 2003.
[23] A. Wood and J. Stankovic, “Denial of Service in Sensor Networks,” Computer, vol. 35, no. 10, pp. 54-62, Oct. 2002.
[24] G. Noubir and G. Lin, “Low-Power DoS Attacks in Data Wireless LANs and Countermeasures,” ACM SIGMOBILE Mobile Computing and Comm. Rev., vol. 7, no. 3, pp. 29-30, 2003.
[25] W. Xu, T. Wood, W. Trappe, and Y. Zhang, “Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service,” Proc. 2004 ACM Workshop Wireless Security (WiSe '04), pp. 80-89, 2004.
[26] W. Xu, W. Trappe, Y. Zhang, and T. Wood, “The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks,” Proc. ACM MobiHoc '05, pp. 46-57, 2005.
[27] M. Grossglauser and D. Tse, “Mobility Increases the Capacity of Ad Hoc Wireless Networks,” Proc. IEEE INFOCOM '01, pp. 1360-1369, Mar. 2001.
[28] D. Goldenberg, J. Lin, and A. Morse, “Towards Mobility as a Network Control Primitive,” Proc. ACM MobiHoc '04, pp. 163-174, May 2004.
[29] G. Wang, G. Cao, T. Porta, and W. Zhang, “Sensor Relocation in Mobile Sensor Networks,” Proc. IEEE INFOCOM '05, pp. 2302-2312, Mar. 2005.
[30] S. Ganeriwal, A. Kansal, and M.B. Srivastava, “Self-Aware Actuation for Fault Repair in Sensor Networks,” Proc. IEEE Int'l Conf. Robotics and Automation (ICRA '04), pp. 5244-5249, Apr. 2004.
[31] A. Howard, M. Mataric, and G. Sukhatme, “An Incremental Deployment Algorithm for Mobile Robot Teams,” Proc. IEEE/RSJ Int'l Conf. Intelligent Robots and Systems (IROS '02), pp. 2849-2854, Sept. 2002.
26 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool