A probabilistic signal-strength-based evaluation methodology for sensor network deployment

Sheng Po Kuo*, Yu-Chee Tseng, Fang Jing Wu, Chun Yu Lin

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

19 Scopus citations

Abstract

The deployment of senor networks have attracted a lot of attention recently. In essence this issue is concerned with how well a sensing field is monitored by sensors to achieve a particular coverage. In this paper, we propose a signal-strength-based approach to evaluate how well a sensing field is covered/monitored. We first formulate object tracking by a single sensor as a Gaussian-error model. Then we establish an error model on location estimation given that the location of an object is known. This leads to a model to evaluate a sensor network with given locations of sensors. We then apply the result to several applications, such as adding more sensor nodes for error reduction and scheduling power modes (awake or sleep) of sensors, and demonstrate our simulation results.

Original languageEnglish
Title of host publicationProceedings - 19th International Conference on Advanced Information Networking and Applications, AINA 2005
Pages319-321
Number of pages3
DOIs
StatePublished - 1 Dec 2005
Event19th International Conference on Advanced Information Networking and Applications, AINA 2005 - Taipei, Taiwan
Duration: 28 Mar 200530 Mar 2005

Publication series

NameProceedings - International Conference on Advanced Information Networking and Applications, AINA
Volume1
ISSN (Print)1550-445X

Conference

Conference19th International Conference on Advanced Information Networking and Applications, AINA 2005
CountryTaiwan
CityTaipei
Period28/03/0530/03/05

Keywords

  • Ad hoc network
  • Environment monitoring
  • Network deployment
  • Pervasive computing
  • Sensor network

Fingerprint Dive into the research topics of 'A probabilistic signal-strength-based evaluation methodology for sensor network deployment'. Together they form a unique fingerprint.

Cite this