A Self-Configurable Event Coverage Approach for Wireless Sensor Networks

Journal article


Ajay Kaushik, Yakkali, R. T., Indu, S., Ahmed, F., Gupta, D., Nayar, R. and Yadav, S. 2019. A Self-Configurable Event Coverage Approach for Wireless Sensor Networks. International Journal of Mobile Computing and Multimedia Communications. 10 (2), pp. 1-18. https://doi.org/10.4018/ijmcmc.2019040101
AuthorsAjay Kaushik, Yakkali, R. T., Indu, S., Ahmed, F., Gupta, D., Nayar, R. and Yadav, S.
Abstract

Sensing and data aggregation capabilities of wireless sensor networks (WSNs) depends on efficient deployment of sensor nodes (SNs) in an area. In a large surveillance space, there is a need for more SNs to cover important crucial events despite of the optimum coverage. The authors propose an event-based efficient deployment algorithm (EEDA) for relocation of redundant sensors to the event location to achieve full coverage. They divide the deployment region into small square cells that allows individual cells to be efficiently monitored, instead of considering the whole scenario as one unit. EEDA ensures efficient coverage of the entire deployment region and senses the occurrence of any static or dynamic event with an optimum number of sensors. EEDA with square cells performs better than existing hexagon cell algorithm by 39%. EEDA is validated by simulation as well as by experimental results.

Keywordswireless sensor networks (WSNs); event coverage ; simulation
Year2019
JournalInternational Journal of Mobile Computing and Multimedia Communications
Journal citation10 (2), pp. 1-18
PublisherIGI Global
ISSN1937-9412
1937-9404
Digital Object Identifier (DOI)https://doi.org/10.4018/ijmcmc.2019040101
Web address (URL)http://dx.doi.org/10.4018/ijmcmc.2019040101
Output statusPublished
Publication datesApr 2019
Publication process dates
Deposited10 Jul 2024
Permalink -

https://repository.derby.ac.uk/item/q742w/a-self-configurable-event-coverage-approach-for-wireless-sensor-networks

  • 14
    total views
  • 0
    total downloads
  • 4
    views this month
  • 0
    downloads this month

Export as

Related outputs

A Sign Language Recognition System Using Artificial Intelligence
Dahiya, R., Dwivedi, N., Singh Rathore, A., Kalra, M., Chauhan, P., Ajay Kaushik and Sharma, R. 2024. A Sign Language Recognition System Using Artificial Intelligence. ISBM: World Conference on Information Systems for Business Management. Springer. https://doi.org/10.1007/978-981-99-8612-5_7
Breast Tumor Prediction Using SVM with Rain Fall Optimisation Algorithm
Parashar, K., Ajay Kaushik, Sharma, R. and Aman 2024. Breast Tumor Prediction Using SVM with Rain Fall Optimisation Algorithm. in: So In, C., Londhe, N. D., Bhatt, N. and Kitsing, M. (ed.) Information Systems for Intelligent Systems: Proceedings of ISBM 2023 Singapore Springer. pp. 167-180
An Integrated Web Based and Application Programming Interfaces for Disease Prediction Through Self Diagnosis
Anil Tak, Sarthak Jain, B. N. V. Gnandeep, Mradul, Nikhil Kaushik, Yogendra, Ajay Kaushik, Ritu Sharma and Aman 2024. An Integrated Web Based and Application Programming Interfaces for Disease Prediction Through Self Diagnosis. World Conference on Information Systems for Business Management. Springer. https://doi.org/10.1007/978-981-99-8612-5_8
A novel intrusion detection system for internet of things devices and data
Kaushik, A. and Al-Raweshidy, H. 2023. A novel intrusion detection system for internet of things devices and data. Wireless Networks. 30, pp. 285-294. https://doi.org/10.1007/s11276-023-03435-0
A Hybrid Latency- and Power-Aware Approach for Beyond Fifth-Generation Internet-of-Things Edge Systems
Kaushik, A. and Al-Raweshidy, H. 2022. A Hybrid Latency- and Power-Aware Approach for Beyond Fifth-Generation Internet-of-Things Edge Systems. IEEE Access. 10, pp. 87974 - 87989. https://doi.org/10.1109/access.2022.3200035
Post Quantum Public and Private Key Cryptography Optimized for IoT Security
Ajay Kaushik, Lakshmi Sai Srikar Vadlamani, Mohammed Mohsin Hussain, Milind Sahay, Rahul Singh, Ananya Komal Singh, S. Indu, Puneet Goswami and Nalliyanna Goundar Veerappan Kousik 2022. Post Quantum Public and Private Key Cryptography Optimized for IoT Security. Wireless Personal Communications. 129, pp. 893-909. https://doi.org/10.1007/s11277-022-10162-w
A Real-Time Intrusion Detection System for Bio-Medical and Cyber-Physical Systems
Ajay Kaushik and Raj, S. V. 2022. A Real-Time Intrusion Detection System for Bio-Medical and Cyber-Physical Systems. The 5th International Conference on Research in Humanities. Diamond Scientific Publishing . https://doi.org/10.33422/5th.icrhconf.2022.08.200
Loki: A Lightweight LWE Method with Rogue Bits for Quantum Security in IoT Devices
Rahul Singh, Mohammed Mohsin Hussain, Milind Sahay, S. Indu, Ajay Kaushik and Alok Kumar Singh 2020. Loki: A Lightweight LWE Method with Rogue Bits for Quantum Security in IoT Devices. International Conference on Information and Communication Technology for Intelligent Systems. Springer. https://doi.org/10.1007/978-981-15-7062-9_54
A Binary PSO Approach for Improving the Performance of Wireless Sensor Networks
Ajay Kaushik, Goswami, M., Manuja, M., Sreedevi, I. and Gupta, D. 2020. A Binary PSO Approach for Improving the Performance of Wireless Sensor Networks. Wireless Personal Communications. 113, pp. 263-297. https://doi.org/10.1007/s11277-020-07188-3
A Grey Wolf Optimization Based Algorithm for Optimum Camera Placement
Kaushik, A., Indu, S. and Gupta, D. 2019. A Grey Wolf Optimization Based Algorithm for Optimum Camera Placement. Wireless Personal Communications. 105, pp. 1143-1167. https://doi.org/10.1007/s11277-019-06140-4
Adaptive Mobile Sink for Energy Efficient WSN Using Biogeography-Based Optimization
Ajay Kaushik, Indu, S. and Gupta, D. 2019. Adaptive Mobile Sink for Energy Efficient WSN Using Biogeography-Based Optimization. International Journal of Mobile Computing and Multimedia Communications. 10 (3), pp. 1-22. https://doi.org/10.4018/ijmcmc.2019070101
A Grey Wolf Optimization Approach for Improving the Performance of Wireless Sensor Networks
Kaushik, A., Indu, S. and Gupta, D. 2019. A Grey Wolf Optimization Approach for Improving the Performance of Wireless Sensor Networks. Wireless Personal Communications. 106, pp. 1429-1449. https://doi.org/10.1007/s11277-019-06223-2
Nature-Inspired Algorithms in Wireless Sensor Networks
Ajay Kaushik, Indu, S. and Gupta, D. 2019. Nature-Inspired Algorithms in Wireless Sensor Networks. in: Banati, H., Mehta, S. and Kaur, P. (ed.) Nature-Inspired Algorithms for Big Data Frameworks Hershey, Pennsylvania IGI Global. pp. 75-92
Optimizing and Enhancing the Lifetime of a Wireless Sensor Network Using Biogeography Based Optimization
Ajay Kaushik, Indu, S. and Gupta, D. 2018. Optimizing and Enhancing the Lifetime of a Wireless Sensor Network Using Biogeography Based Optimization. Applications of Computing and Communication Technologies First International Conference, ICACCT 2018. Springer. https://doi.org/10.1007/978-981-13-2035-4_23
A novel load balanced energy conservation approach in WSN using biogeography based optimization
Ajay Kaushik, Indu, S. and Gupta, D. 2017. A novel load balanced energy conservation approach in WSN using biogeography based optimization. THE 2ND INTERNATIONAL CONFERENCE ON ENERGY ENGINEERING AND SMART MATERIALS: ICEESM 2017. AIP Publishing. https://doi.org/10.1063/1.5002507
Technology transfer: enablers and barriers - a review
Ajay Kaushik, Kumar, S., Luthra, S. and Haleem, A. 2014. Technology transfer: enablers and barriers - a review. International Journal of Technology, Policy and Management. 14 (2), pp. 133-159. https://doi.org/10.1504/ijtpm.2014.060152