Deployment Strategies in Wireless Sensor Network

The loss of nodes in the wireless sensor network occurs due to the physical damage or external attack causing multiple holes in the network affecting the network performance. The holes may be formed due to the initial random deployment of the nodes. Most of the approaches detects and recovers the holes using the property of node’s mobility. Construction of Voronoi diagrams is the conventional technique to discover the coverage hole. The commonly used movement assisted sensor deployment protocols are VECtor-based (VEC), VORonoi-based (VOR), and Minimax based on the notion of moving sensors from densely deployed areas to sparsely deployed areas. Moreover, HEAL is an effective technique that detects the coverage hole formed due to random deployment.

NS2 Solution

  • Each node in the network is configured with the specific sensing range and communication range with twice the sensing range.

  • Deterministic deployment can be done using the same overlapping distance between nodes

  • Random deployment can be done by placing the nodes in a random manner.

  • Holes can be discovered using the stuck node identification algorithm that eliminates border nodes based on coordinate values.

  • Mobility is given to the node located in the region of Hole Healing Area (HHA) that is identified using the radius of the hole to close the hole.

Related Titles:

  • “Localized Movement-Assisted Sensor Deployment Algorithm for Hole Detection and Healing”, IEEE transactions on parallel and distributed systems, 2013.

  • Guiling Wang, Guohong Cao, and Tom La Porta “Movement-Assisted Sensor Deployment” 2004 IEEE.