Skip to main content
Erschienen in: EURASIP Journal on Wireless Communications and Networking 1/2010

Open Access 01.12.2010 | Research Article

Characterizing the Path Coverage of Random Wireless Sensor Networks

verfasst von: Moslem Noori, Sahar Movaghati, Masoud Ardakani

Erschienen in: EURASIP Journal on Wireless Communications and Networking | Ausgabe 1/2010

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless sensor networks are widely used in security monitoring applications to sense and report specific activities in a field. In path coverage, for example, the network is in charge of monitoring a path and discovering any intruder trying to cross it. In this paper, we investigate the path coverage properties of a randomly deployed wireless sensor network when the number of sensors and also the length of the path are finite. As a consequence, Boolean model, which has been widely used previously, is not applicable. Using results from geometric probability, we determine the probability of full path coverage, distribution of the number of uncovered gaps over the path, and the probability of having no uncovered gaps larger than a specific size. We also find the cumulative distribution function (cdf) of the covered part of the path. Based on our results on the probability of full path coverage, we derive a tight upper bound for the number of nodes guaranteeing the full path coverage with a desired reliability. Through computer simulations, it is verified that for networks with nonasymptotic size, our analysis is accurate where the Boolean model can be inaccurate.

1. Introduction

Wireless sensor networks (WSNs) have many applications in security monitoring. In such applications, since it is essential to keep track of all activities within the field, network coverage is of great importance and must be considered in the network design stage.
Path coverage is one of the monitoring examples, where WSNs are deployed to sense a specific path and report possible efforts made by intruders to cross it. In a manual network deployment, the desired level of the path coverage can be achieved by proper placement of the sensors over the area. When it is not possible to deploy the network manually, random deployment, for example, dropping sensors from an aircraft, is used. Due to the randomness of the sensors location, network coverage expresses a stochastic behavior and the desired (full) path coverage is not guaranteed. Thus, a detailed analysis of the random network coverage can be ultimately useful in the network design stage to determine the node density for achieving the desired area/path coverage.
Path coverage by a random network (or barrier coverage which is a relaxed version of the path coverage) has been the focus of some previous work [16]. In [1], assuming that a random network is deployed over an infinite area with nodes following a Poisson distribution, authors investigate the path coverage of the network. They first study the path coverage over an infinite straight line when the sensor has a random sensing range. Then, they show that in the asymptotic situation, where the sensing range of the sensors tends to 0 and the node density approaches infinity, the results are extendible to finite linear and curvilinear paths. Further, a path coverage analysis is proposed for a high-density Poisson-distributed network in [2] where sensors have a fixed sensing range. The path coverage analysis of [1, 2] is based on the Boolean model of [7], where a Poisson point process is justified.
Kumar et al. study https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq1_HTML.gif -barrier coverage provided by a random WSN in [3]. To this end, they develop a theoretical model revealing the behavior of the network coverage over a long narrow belt. It is assumed that the sensors are spread over the belt according to a Poisson distribution. The authors propose an algorithm determining whether an area is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq2_HTML.gif -barrier covered or not. Also, they introduce the concepts of weak and strong barrier coverage over the belt and derive the condition on the sensors density guaranteeing the weak barrier coverage.
The focus of [4] is on the strong barrier coverage. First, authors present a condition insuring the strong barrier coverage over a strip where the sensors locations follow a Poisson point process. Then, by considering asymptotic situation (on the network size and number of nodes) and using Percolation theory [8], they determine, with a probability approaching 1, whether the network has a strong barrier coverage or not. Then, they use their analysis to devise a distributed algorithm to build strong barrier coverage over the strip.
In this work, unlike most existing studies which focus on asymptotic setups, we study the path coverage of a finite random network (in terms of both network size and the number of nodes). As a result, the Boolean model is not accurate. Alternatively, the methodology of this work is based on some results from geometric probability. Our focus is on the path coverage for a circle, but extension to other path shapes is briefly discussed.
In the ideal case, all sensors are located exactly on the path. This, however, is not a practical assumption for randomly deployed networks. To consider the inaccuracy of the sensors locations, we assume that sensors are inside a ring containing the circular path. As a result, the portion of the path covered by any given sensor is not deterministic. Moreover, other factors may affect the sensing range of a sensor. Thus, our analysis is not based on a fixed sensing range. Indeed, we first develop a random model for the covered segment of the path by each sensor. Then, we study the distribution of the number of uncovered gaps on the path. The full path coverage is a special case where the number of gaps is zero. This is used to determine a tight bound on the number of active sensors assuring the full path coverage with a desired reliability. Also, we find the probability of having all possible gaps smaller than a given size. This probability reflects the reliability of detecting an intruding object with a known size.
In addition to studying the number of gaps, we present a simplified analysis for deriving the cumulative distribution function (cdf) of the covered part of the path. This simplified analysis is based on using the expected value of the covered part of the path by a sensor instead of considering the precise random model. We observe that the simplified analysis can provide a fairly accurate approximation of the path coverage.
Since our analysis studies the effect of the number of nodes on the path coverage of a finite size network, it can readily be used in the design of practical networks. In fact, using our results, one can determine the number of nodes in the network to satisfy a desired level of coverage. An example is provided.
The paper is organized as follows. Section 2 introduces the network model and defines the problem. Our coverage analysis is presented in Section 3. Section 4 includes computer simulations verifying our analysis. Finally, Section 5 concludes the paper.

2. Preliminary

2.1. Network Model

We consider https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq3_HTML.gif sensors monitoring a circular path with unit circumference, called https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq4_HTML.gif . In an ideal case, the sensors are precisely located on the circular path, but this is not usually true for a randomly deployed network. In order to take this fact into account, we assume that sensors are randomly spread over a ring containing https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq5_HTML.gif (See Figure 1). We assume a symmetric distribution for sensors, that is, the sensor density does not depend on the polar angle and is determined only by the distance from the center. It is generally desired to have more sensors in the vicinity of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq6_HTML.gif Thus, distributions with larger values close to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq7_HTML.gif are preferred. When no effort is made to put the sensor as close as possible to the path ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq8_HTML.gif sensors are spread totally randomly), the uniform distribution is obtained. Hence, in the sense of placement efforts, uniform distribution reflects the worst case. We consider uniform distribution to verify our analysis by computer simulation in Section 4. Our analysis, however, is presented for any given symmetric distribution. Also, notice that since the number of sensors is finite and known, Poisson distribution, which has been the focus of existing asymptotic analysis, is not applicable.
We also assume that sensors sensing range may vary from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq9_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq10_HTML.gif . Obviously, for a fixed sensing range, model https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq11_HTML.gif . Without loss of generality, it is assumed that the width of the ring is smaller than or equal to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq12_HTML.gif and the desired circular path is located at the middle of the ring. Since the sensors farther than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq13_HTML.gif to the path do not contribute to the path coverage, our assumption on the ring width does not hurt the generality of the analysis.

2.2. Motivation and Problem Definition

Our goal in this work is to investigate the quality of the path coverage by the network. To this end, we study the following features of the path coverage which provide us with a concrete insight to the performance of the network.
(i)
Distribution of the number of gaps. Due to the randomness of the network implementation, sensors may not cover the whole path. In this case, one or more gaps appear. Assume that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq14_HTML.gif represents the number of gaps on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq15_HTML.gif . We are interested to find the probability of having https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq16_HTML.gif gaps, shown by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq17_HTML.gif .
 
(ii)
Full path coverage. It is desired to provide a complete coverage of the path. Since the full path coverage is identical to having no gaps, one can equivalently find https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq18_HTML.gif . This can simply be found from the derived distribution of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq19_HTML.gif .
 
(iii)
Reliability of the network in detecting objects. It is important to investigate whether the network is able to detect an object, while the path is not fully covered and there may exist some gaps. Basically, we need to consider the size of the gaps in addition to their number. If one knows the size of the intruders beforehand, it is not necessary to provide the full path coverage. Instead, it is possible to deploy a network such that while the path is not fully covered, the size of the possible gaps is smaller than the intruders. Clearly, implementing a network with possible small gaps requires fewer number of nodes and consequently is less expensive. To this end, we find the probability of having all gaps smaller than a given length https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq20_HTML.gif , denoted by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq21_HTML.gif .
 
(iv)
Distribution of the covered part of the path. The covered part of the path, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq22_HTML.gif , has a stochastic nature and its distribution provides a general view of the entire path coverage. In fact, the covered part of the network reflects the combined effect of the number of gaps and their sizes. We derive the cdf of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq23_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq24_HTML.gif .
 

3. Path Coverage Analysis

In this section, we present our analysis of the path coverage. For this purpose, we take advantage of existing results in geometric probability and extend them to our case. After the exact coverage analysis, a less complex approximate analysis is also presented.
An arbitrary point on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq25_HTML.gif is covered if it is within the sensing range of at least one sensor. Here, we assume that the sensing area of sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq26_HTML.gif is a circle denoted by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq27_HTML.gif . The covered part of the path by each https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq28_HTML.gif is its intersection with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq29_HTML.gif which is an arc, called https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq30_HTML.gif . Thus, the total covered part of the path is
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ1_HTML.gif
(1)
Notice that the length of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq31_HTML.gif 's depends on the location of the sensor within the ring-shaped network area and its sensing range. Considering an arbitrary point as the origin on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq32_HTML.gif and choosing the clockwise direction as the positive direction, each https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq33_HTML.gif starts from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq34_HTML.gif and continues (clockwise) until https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq35_HTML.gif , (Figure 2). In other words, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq36_HTML.gif determines the most left point of the arc and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq37_HTML.gif specifies the most right point of the arc. There are two noteworthy issues here. First, the size of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq38_HTML.gif 's and their positions are random because of the random placement of the sensors over the ring. Second, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq39_HTML.gif is not necessarily connected and there may exist several uncovered gaps on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq40_HTML.gif . The number of uncovered gaps on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq41_HTML.gif and their size can reflect the possible opportunities for intruders to pass https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq42_HTML.gif without being detected by the sensors. If https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq43_HTML.gif is fully covered.
The problem of covering a circle with random arcs has been studied in geometric probability [915]. In some cases, it is assumed that the arcs have a fixed length [9, 12, 13, 15] or the analysis is conducted in the asymptotic situation [10, 14]. Asymptotic analysis is suitable for the situation where the sizes of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq45_HTML.gif 's are significantly smaller than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq46_HTML.gif . In the following, we initially use the result of [11] on the coverage of a circle with random arcs of random sizes. This helps us to provide an exact explanation of the path coverage. Then, we use the mean value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq47_HTML.gif 's to provide a simplified approximate analysis based on the fixed-length random arc placement over the circle [12].

3.1. Exact Analysis

We apply the following theorem from [11] to find the exact distribution of the number of gaps on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq48_HTML.gif .
Theorem 1.
Assume that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq49_HTML.gif arcs are distributed independently with a uniform distribution over a circle of circumference 1. If https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq50_HTML.gif shows the cdf of the arc length over https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq51_HTML.gif , the distribution of the number of uncovered gaps on the circle, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq52_HTML.gif , is
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ2_HTML.gif
(2)
where
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ3_HTML.gif
(3)
Proof.
See [11].
To apply Theorem 1 for finding the number of uncovered gaps on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq53_HTML.gif , we first prove the uniformity of the arc distribution over https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq54_HTML.gif in the following lemma.
Lemma 1.
For a symmetric distribution of the sensors over the path, the location of the intersection of the sensors sensing range and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq55_HTML.gif is uniformly distributed over https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq56_HTML.gif .
Proof.
We equivalently show that the center points of the arcs are uniformly distributed over the circle. For this purpose, consider a small element with length https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq57_HTML.gif on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq58_HTML.gif . Then, we build a sector of the ring based on this length element whose left and right sides pass the left and right ends of the length element (Figure 3). The center point of the arcs, resulted from the intersection of the sensing area of the nodes within the sector and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq59_HTML.gif falls within https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq60_HTML.gif . Due to the independence of the sensors distribution from the polar angle, all elements with length https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq61_HTML.gif on the circle have the same chance to include an arc center point. Therefore, the distribution of the arc centers, and consequently arc locations, is uniform on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq62_HTML.gif .
Following Lemma 1, in order to find the distribution of the number of gaps on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq63_HTML.gif we need https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq64_HTML.gif or in our case https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq65_HTML.gif the cdf of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq66_HTML.gif 's. Notice that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq67_HTML.gif 's are independent and identically distributed (i.i.d) random variables. We find https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq68_HTML.gif in the appendix for arbitrary distributions of sensor location and sensing range.
As a result of Theorem 1 and Lemma 1, we have the following corollary.
Corollary 1.
The probability of the full path coverage, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq69_HTML.gif , is
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ4_HTML.gif
(4)
Furthermore, one can show that the expected number of gaps on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq70_HTML.gif is [11]
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ5_HTML.gif
(5)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq71_HTML.gif is the mean of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq72_HTML.gif 's.
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq73_HTML.gif can be used to find an upper bound on the number of nodes in the network guaranteeing the full path coverage with a given reliability. This is presented below.
Corollary 2.
To guarantee a full path coverage with probability https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq74_HTML.gif , the following relation holds
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ6_HTML.gif
(6)
Proof.
Recall Markov's inequality for a positive random variable https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq75_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ7_HTML.gif
(7)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq76_HTML.gif . If we let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq77_HTML.gif be the random variable of the number of gaps https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq78_HTML.gif , and put https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq79_HTML.gif , we have
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ8_HTML.gif
(8)
Combining (5) and (8) results in (6).
Using (6), it is straightforward to find an upper bound on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq80_HTML.gif guaranteeing a desired level of coverage, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq81_HTML.gif . Later, our simulations show that this bound is in fact very tight.
Another feature of the path coverage that we like to study is the quality of the coverage in terms of the size of the gaps on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq82_HTML.gif . Assume that we like to guarantee detecting any object bigger than a particular size, say https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq83_HTML.gif . To assure detecting such objects, all of the gaps have to be smaller than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq84_HTML.gif . Hence, we like to find the probability of having no gaps larger than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq85_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq86_HTML.gif is the length of the largest gap on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq87_HTML.gif .
Corollary 3.
The probability of having no gaps larger than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq88_HTML.gif is
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ9_HTML.gif
(9)
Proof.
Consider a realization of the random placement of arcs on the path. Now, one can consider a scenario where the length of each arc is increased by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq89_HTML.gif . If there exists a gap smaller than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq90_HTML.gif in the first scenario, this gap will be covered in the second scenario since the arcs are https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq91_HTML.gif longer. On the other hand, a gap with any size in the second scenario will be a gap with length more than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq92_HTML.gif in the first scenario. Notice that the above discussion is valid for any realization of the network. Thus, instead of investigating the probability of having no gaps longer than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq93_HTML.gif in the first scenario, we look for the probability of the full coverage in the second scenario. Denoting the length of the arcs in the second scenario by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq94_HTML.gif , one can think of them as being drawn from the distribution https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq95_HTML.gif or equivalently
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ10_HTML.gif
(10)
This completes the proof.
Using the same approach taken for finding the upper bound on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq96_HTML.gif in (6), one can derive an upper bound on the number of nodes to guarantee having all gaps smaller than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq97_HTML.gif .
We also like to investigate https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq98_HTML.gif that is, the portion of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq99_HTML.gif which is covered by the nodes. To find https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq100_HTML.gif , we first reorder the arcs based on their starting points, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq101_HTML.gif 's. Thus https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq102_HTML.gif . Now, we divide https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq103_HTML.gif to arcs https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq104_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq105_HTML.gif is an arc starting from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq106_HTML.gif and ending at https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq107_HTML.gif . Finally, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq108_HTML.gif starts from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq109_HTML.gif and ends at https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq110_HTML.gif . Since we have https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq111_HTML.gif random arcs intersecting with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq112_HTML.gif , there exist https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq113_HTML.gif of such spacings on the circle. These https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq114_HTML.gif spacings may or may not be covered by the network. Adding the covered parts of the path together, we have
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ11_HTML.gif
(11)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq115_HTML.gif . Also, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq116_HTML.gif 's denotes the length of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq117_HTML.gif and
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ12_HTML.gif
(12)
Notice that in (12) we assume rotational indices for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq118_HTML.gif 's. It means that if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq119_HTML.gif we replace the index with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq120_HTML.gif . In (12), https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq121_HTML.gif is the length of the connected part of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq122_HTML.gif starting from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq123_HTML.gif and continuing clockwise. When https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq124_HTML.gif , the whole spacing https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq125_HTML.gif is covered and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq126_HTML.gif function should return https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq127_HTML.gif . When https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq128_HTML.gif , a portion of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq129_HTML.gif remains uncovered and there exists a gap at the right side of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq130_HTML.gif . Thus, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq131_HTML.gif function returns https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq132_HTML.gif . It is noteworthy that because of the problem symmetry, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq133_HTML.gif 's are identically distributed random variables. Thus, we use a single random variable https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq134_HTML.gif to refer to them.
The distribution of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq135_HTML.gif can be well approximated by a Gaussian distribution using central limit theorem (CLT) where the mean value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq136_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq137_HTML.gif , is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq138_HTML.gif . Here, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq139_HTML.gif denotes the mean value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq140_HTML.gif . Also, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq141_HTML.gif where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq142_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq143_HTML.gif represent the variance of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq144_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq145_HTML.gif , respectively. In reality, one can safely simplify (12) to
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ13_HTML.gif
(13)
This is because https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq146_HTML.gif 's are i.i.d. and thus it is very unlikely that, for example, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq147_HTML.gif .

3.2. Approximate Analysis

In the following, we present an approximate analysis simplifying our path coverage study. The idea of this approximate analysis is to consider a model where a set of fixed-length arcs are spread randomly over https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq148_HTML.gif instead of using the actual random-sized arcs. The length of these fixed arcs is equal to the mean value of the random-sized arcs in the original case. We denote the mean value of these random arcs with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq149_HTML.gif . In this case, it can be shown that the number of uncovered gaps on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq150_HTML.gif is distributed as follows [12]:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ14_HTML.gif
(14)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq151_HTML.gif . The same technique as before is applicable to find the probability of having no gaps larger than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq152_HTML.gif on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq153_HTML.gif . For this purpose, we just need to use https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq154_HTML.gif instead of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq155_HTML.gif in (14). In addition, the distribution of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq156_HTML.gif can be derived when the arc size is fixed [12]. In this case, we have
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ15_HTML.gif
(15)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq157_HTML.gif is the cdf of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq158_HTML.gif .
One can also calculate the expected value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq159_HTML.gif . To this aim, we first consider the uncovered part of the path, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq160_HTML.gif , and find its expected value, called https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq161_HTML.gif . Then https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq162_HTML.gif can be found using the fact https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq163_HTML.gif .
An arbitrary point https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq164_HTML.gif on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq165_HTML.gif remains uncovered when there is no https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq166_HTML.gif covering it. This is equivalent to having none of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq167_HTML.gif 's within an arc with length https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq168_HTML.gif whose right end point is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq169_HTML.gif . There are https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq170_HTML.gif sensors in the network, hence, the probability of having https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq171_HTML.gif uncovered, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq172_HTML.gif , is
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ16_HTML.gif
(16)
Consequently,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ17_HTML.gif
(17)

3.3. Some Remarks

Remark 1.
Our path coverage analysis is applicable to any closed path, for example, ellipse, with finite length when the location of the path segment covered by an arbitrary sensor is uniformly distributed over the path. For this purpose, we just need to have the distribution of the intersection of sensors sensing range and the path. Also, the analysis is applicable to linear path coverage. In fact, the problem of covering a circle with random arcs can be transformed to the problem of covering a piece of line, say the interval https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq173_HTML.gif , with random intervals. In this case, sensors are deployed randomly over a strip surrounding the linear path. It is notable that in the linear case, Torus convention [7] is applied. In Torus convention, it is assumed that if a part of the random interval goes out of the line segment, it comes in from the other side of the line piece. However, when the length of the random intervals is small compared to the line piece, one can remove the Torus convention and the analysis remains quite accurate.
Remark 2.
In many WSNs, the number of active sensors in the network changes with time. This can be due to, for example, sleep scheduling or death of some nodes. Since our analysis is provided for arbitrary https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq174_HTML.gif it can accommodate such situations, simply by replacing https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq175_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq176_HTML.gif in relevant equations. Consequently, the coverage can be studied as a function of time.

4. Simulation

In this section, we demonstrate the accuracy of our analysis via computer simulations. We have inspected two scenarios for the sensors sensing range. In the first scenario, we assume a network with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq177_HTML.gif sensors all having a fixed sensing range equal to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq178_HTML.gif . The sensors are uniformly deployed inside a ring around the circular path, where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq179_HTML.gif has unit circumference. In the second scenario, the sensors sensing range is also uniformly distributed between https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq180_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq181_HTML.gif . A zero sensing range can represent a dead sensor.
We evaluate random properties such as the full coverage, number of uncovered gaps, tightness of the bound presented in (6), the intruder detectability, and the portion of the covered path using simulation, and compare the results with our theoretical analysis.

4.1. Uncovered Gaps

Probability density of the number of uncovered gaps on the path, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq182_HTML.gif , was derived in Section 3.1. Figure 4 shows the probability mass function (pmf) of the number of uncovered gaps via simulation for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq183_HTML.gif . Here, we have assumed that the sensing range of all sensor nodes is fixed and is equal to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq184_HTML.gif . The theoretical results using (2) have also been sketched for comparison. It can be concluded that the formulation derived in Section 3.1 quite accurately describes the pmf of the number of uncovered gaps on the path. The third curve in Figure 4 is the result of approximation analysis in Section 3.2. Parameter https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq185_HTML.gif in (14) is set to be the expected value of random variable https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq186_HTML.gif , derived in the appendix.
It is clear from Figure 4 that the results from the approximate analysis are fairly close to the exact analysis and the simulations. Due to the complexity of the evaluation of exact analysis, we compare the rest of our simulation results with the approximate analysis presented in Section 3.2 to characterize the coverage properties of the network.
In the case of fixed sensing range, as the width of the ring becomes smaller, the variance of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq189_HTML.gif decreases and the arc lengths become closer to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq190_HTML.gif , making the approximate analysis more accurate. To study the worst case, in our analysis, we assume the ring width https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq191_HTML.gif is equal to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq192_HTML.gif . Notice that any node outside this ring does not contribute to the path coverage. For random sensing range, we choose https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq193_HTML.gif . Notice that since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq194_HTML.gif , there will be nodes in the ring that will not contribute to the path coverage.
Figures 5 and 6 demonstrate the probability of full coverage versus number of sensors deployed in the region. Figure 5 shows the results for the fixed sensing range scenario. https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq195_HTML.gif is estimated through simulation for different values of sensing range, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq196_HTML.gif , and is compared with the theoretical results using (14). As seen from the curves, our theoretical formulation can effectively predict probability of full path coverage. Figure 6 represents the results of variable sensing range scenario. The sensing range of sensor nodes is randomly selected from a uniform distribution between https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq197_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq198_HTML.gif . We have run the simulation based on three uniform distributions, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq199_HTML.gif , and compared with the theoretical results. For theoretical calculations, we have computed the average arc length for the case of random sensing range using (A.22) in the appendix, and then substituted the resulting https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq200_HTML.gif into the approximate formula (14). From Figure 6, we can see that the theoretical analysis in Section 3.2 can closely describe the probability of full coverage for random sensing range scenario.
We have also tested our analysis for full coverage of a straight line segment instead of a circle. Figure 7 depicts the coverage of a straight line segment of length https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq203_HTML.gif when sensing range is fixed and is equal to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq204_HTML.gif . The solid line is the result of Poisson assumption in [2] and the dashed line is the result of our formulation. It can be seen that specially for smaller number of sensor nodes, the Boolean model is not well applicable to describe the coverage of small networks.
The expected number of uncovered gaps, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq207_HTML.gif , after deploying https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq208_HTML.gif sensors in the ring is given by (5). In Figure 8, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq209_HTML.gif has been calculated versus https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq210_HTML.gif for three values of fixed sensing range, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq211_HTML.gif , using simulation as well as the analysis. The expected number of gaps for variable sensing ranges is shown in Figure 9. The sensors sensing range has been taken from the three uniform distributions used previously.
In Section 3.1, we used Markov's inequality to find a relation between the number of nodes and probability of full coverage over the path, presented in (6). The smallest number of nodes that satisfies (6) can efficiently be found by conducting a simple binary search. We denote the value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq212_HTML.gif found via search by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq213_HTML.gif . Table 1 shows the value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq214_HTML.gif calculated for probability of full coverage being equal to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq215_HTML.gif . The results found by inequality (6) and simulation are shown for comparison. For probability of full coverage closer to one (the region of interest in practice), https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq216_HTML.gif gets even closer to the value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq217_HTML.gif satisfying the desired reliability found via simulation. For example, for probability of full coverage equal to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq218_HTML.gif , we found https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq219_HTML.gif for various values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq220_HTML.gif It can be inferred that (6) provides a tight upper bound on the number of nodes needed for full path coverage.
Table 1
Upper bound on the number of sensors for guaranteeing full coverage with probability https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq221_HTML.gif .
 
Inequality (6)
Simulation
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq222_HTML.gif
73
72
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq223_HTML.gif
220
216
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq224_HTML.gif
494
489

4.2. Detectability of the Object

As discussed in Section 3.1, in real applications of sensor networks, we might not be interested in the full coverage of a path, yet we need to make sure that there are no uncovered gaps on the path, larger than a certain maximum length https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq225_HTML.gif . The probability of this kind of coverage, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq226_HTML.gif , was given by (9). We use simulation to find https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq227_HTML.gif for values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq228_HTML.gif equal to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq229_HTML.gif , when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq230_HTML.gif . Again, comparing simulation results with theoretical ones in Figure 10 verifies our formulation. Our study on the size of the gaps is useful for decreasing the cost of the network implementation. In fact, if we know the size of the intruders, instead of providing a full path coverage, we can design the network with less number of nodes to have all gaps smaller than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq231_HTML.gif .

4.3. Covered Part of the Path

The covered portion of the path, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq234_HTML.gif , is another important metric for path coverage in a WSN. Indeed, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq235_HTML.gif is a random variable whose cdf is approximated in Section 3.2. Figure 11 shows the cdf of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq236_HTML.gif , for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq237_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq238_HTML.gif . As it can be seen, our path coverage analysis is more accurate for larger values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq239_HTML.gif .
The formulation for expected covered part, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq241_HTML.gif , is derived in Section 3.2. Figure 12 shows simulation and theoretical results for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq242_HTML.gif versus https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq243_HTML.gif , when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq244_HTML.gif .

5. Conclusion

In this paper, we studied the path coverage of a random WSN when neither the area size nor the number of network nodes were infinite. Hence, the widely used Boolean model was no longer valid. Moreover, due to the randomness of the sensors placement over the area, network coverage was nondeterministic. Thus, a probabilistic solution was taken for determining the network coverage features. Our analysis considered the number of gaps, probability of full path coverage, probability of having all uncovered gaps smaller than a specific size, and the cdf of the covered length of the path. All these characteristics were found as a function of the number of sensors https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq246_HTML.gif We also proposed a tight upper bound on required https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq247_HTML.gif for full coverage. Through computer simulations, we verified the accuracy of our approach. Since our study was performed for finite https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq248_HTML.gif , using our results on various features of path coverage, one can find the necessary number of sensors for a certain quality of coverage.

Appendix

In the following, we find the cdf of the intersection between the sensing area of the sensors and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq249_HTML.gif , called https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq250_HTML.gif . First, we study the situation where sensors have a fixed sensing range https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq251_HTML.gif and they are uniformly distributed over the ring. Then, we investigate the general case where sensors can have a random sensing range varying from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq252_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq253_HTML.gif and have any symmetric distribution over the ring.
Let us first discuss the case where the sensors have a fixed sensing range. Figure 13 shows the ring-shaped network containing https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq254_HTML.gif . As mentioned previously, the circumference of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq255_HTML.gif is 1, hence, the radius of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq256_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq257_HTML.gif . It is also assumed that the ring width is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq258_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq259_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq260_HTML.gif is the sensing radius of the sensors. Notice that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq261_HTML.gif in Figure 13 shows the distance of a sensor from the center of the ring. Since the sensors are uniformly distributed over the area, it can be easily shown that the cdf of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq262_HTML.gif , is as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ18_HTML.gif
(A1)
We use https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq263_HTML.gif to derive https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq264_HTML.gif .In Figure 13, the intersection of the sensing area of an arbitrary sensor with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq265_HTML.gif is denoted by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq266_HTML.gif . By forming a triangle whose vertices are the center of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq267_HTML.gif , sensor location, and one of the points where the sensing circle of the sensor meets https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq268_HTML.gif , one can write
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ19_HTML.gif
(A2)
On the other hand, we have
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ20_HTML.gif
(A3)
Replacing https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq269_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq270_HTML.gif in (A.2) results in
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ21_HTML.gif
(A4)
Solving (A.4), we have
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ22_HTML.gif
(A5)
Equivalently,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ23_HTML.gif
(A6)
Now having the cdf of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq271_HTML.gif and using the relation between https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq272_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq273_HTML.gif in (A.5) and (A.6), we will derive https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq274_HTML.gif . To this end, one can state
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ24_HTML.gif
(A7)
Thus,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ25_HTML.gif
(A8)
Replacing https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq275_HTML.gif in (A.8) using (A.1), we obtain
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ26_HTML.gif
(A9)
where
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ27_HTML.gif
(A10)
Moreover, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq276_HTML.gif when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq277_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq278_HTML.gif when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq279_HTML.gif . We use (A.9) for our exact analysis in order to characterize the path coverage features of the network. Notice that when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq280_HTML.gif is small, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq281_HTML.gif can be approximated as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ28_HTML.gif
(A11)
In addition to the cdf of the arc length, we use the mean value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq282_HTML.gif for our approximate analysis. Recall that for an arbitrary random variable https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq283_HTML.gif distributed over https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq284_HTML.gif ,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ29_HTML.gif
(A12)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq285_HTML.gif is the mean value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq286_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq287_HTML.gif is the cdf of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq288_HTML.gif . Using (A.12), https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq289_HTML.gif can be found as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ30_HTML.gif
(A13)
Notice that when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq290_HTML.gif .Now assume that both sensing range and sensor location are random and we like to find https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq291_HTML.gif . Sensing range of the sensors, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq292_HTML.gif , varies over https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq293_HTML.gif with probability density function (pdf) https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq294_HTML.gif . Also, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq295_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq296_HTML.gif , because sensors located farther than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq297_HTML.gif from the path do not contribute in the path coverage. It is noteworthy that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq298_HTML.gif where
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ31_HTML.gif
(A14)
This can simply be justified using (A.6).To find https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq299_HTML.gif , we partition the problem to two separate cases. In the first case, sensing area of the sensor does not intersect with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq300_HTML.gif , that is, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq301_HTML.gif . This happens when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq302_HTML.gif or https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq303_HTML.gif . If https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq304_HTML.gif , this never happens and sensing area of the sensor always intersects with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq305_HTML.gif and consequently https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq306_HTML.gif . If https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq307_HTML.gif , we have
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ32_HTML.gif
(A15)
To evaluate two terms in the right side of the above equation, we use the joint distribution of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq308_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq309_HTML.gif . Notice that in the case where sensors sensing range is independent from their location, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq310_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq311_HTML.gif is the pdf of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq312_HTML.gif over https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq313_HTML.gif . To evaluate https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq314_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq315_HTML.gif , we simply have to integrate from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq316_HTML.gif over the area where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq317_HTML.gif or https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq318_HTML.gif . It can be shown that
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ33_HTML.gif
(A16)
Notice that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq319_HTML.gif states that the pdf of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq320_HTML.gif , has a Dirac delta function at https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq321_HTML.gif .When sensing area of a sensor intersects with path, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq322_HTML.gif . To find https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq323_HTML.gif in this case, we first find https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq324_HTML.gif . For this purpose, we apply Jacobian transformation to derive https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq325_HTML.gif , the joint distribution of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq326_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq327_HTML.gif , from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq328_HTML.gif . Using (A.6) and Jacobian transformation, one can show that
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ34_HTML.gif
(A17)
where
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ35_HTML.gif
(A18)
Having https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq329_HTML.gif is found by integration over https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq330_HTML.gif . To integrate over https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq331_HTML.gif , the region of integration has to be determined carefully. For any arbitrary value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq332_HTML.gif , there exist an infinite number of pairs https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq333_HTML.gif satisfying (A.6); however, to guarantee an intersection between the sensing range of the sensor and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq334_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq335_HTML.gif should fall within https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq336_HTML.gif where
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ36_HTML.gif
(A19)
In fact, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq337_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq338_HTML.gif are the desired integral bounds. Thus,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ37_HTML.gif
(A20)
Consequently,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ38_HTML.gif
(A21)
The mean value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_IEq339_HTML.gif , used in our approximate analysis, is also derived as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F716565/MediaObjects/13638_2009_Article_1999_Equ39_HTML.gif
(A22)

Acknowledgment

The authors would like to thank Natural Sciences and Engineering Research Council of Canada (NSERC) and Informatics Circle of Research Excellence (i CORE) for supporting our research.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://​creativecommons.​org/​licenses/​by/​2.​0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Literatur
1.
Zurück zum Zitat Ram SS, Manjunath D, Iyer SK, Yogeshwaran D: On the path coverage properties of random sensor networks. IEEE Transactions on Mobile Computing 2007, 6(5):446-458.CrossRef Ram SS, Manjunath D, Iyer SK, Yogeshwaran D: On the path coverage properties of random sensor networks. IEEE Transactions on Mobile Computing 2007, 6(5):446-458.CrossRef
2.
Zurück zum Zitat Harada J, Shioda S, Saito H: Path coverage property of randomly deployed sensor networks with finite communication ranges. Proceedings of IEEE International Conference on Communications (ICC '08), May 2008, Beijing, China 2221-2227. Harada J, Shioda S, Saito H: Path coverage property of randomly deployed sensor networks with finite communication ranges. Proceedings of IEEE International Conference on Communications (ICC '08), May 2008, Beijing, China 2221-2227.
3.
Zurück zum Zitat Kumar S, Lai TH, Arora A: Barrier coverage with wireless sensors. Proceedings of the 11th Annual International Conference on Mobile Computing and Networking (MOBICOM '05), August-September 2005, Cologne, Germany 284-298. Kumar S, Lai TH, Arora A: Barrier coverage with wireless sensors. Proceedings of the 11th Annual International Conference on Mobile Computing and Networking (MOBICOM '05), August-September 2005, Cologne, Germany 284-298.
4.
Zurück zum Zitat Liu B, Dousse O, Wang J, Saipulla A: Strong barrier coverage of wireless sensor networks. Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '08), May 2008, Hong Kong 411-419.CrossRef Liu B, Dousse O, Wang J, Saipulla A: Strong barrier coverage of wireless sensor networks. Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '08), May 2008, Hong Kong 411-419.CrossRef
5.
Zurück zum Zitat Chen A, Lai TH, Xuan D: Measuring and guaranteeing quality of barrier-coverage in wireless sensor networks. Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '08), May 2008, Hong Kong 421-430.CrossRef Chen A, Lai TH, Xuan D: Measuring and guaranteeing quality of barrier-coverage in wireless sensor networks. Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '08), May 2008, Hong Kong 421-430.CrossRef
6.
Zurück zum Zitat Chen A, Kumar S, Lai TH: Designing localized algorithms for barrier coverage. Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking (MOBICOM '07), September 2007, Montreal, Canada 63-74.CrossRef Chen A, Kumar S, Lai TH: Designing localized algorithms for barrier coverage. Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking (MOBICOM '07), September 2007, Montreal, Canada 63-74.CrossRef
7.
Zurück zum Zitat Hall P: Introduction to the Theory of Coverage Process. John Wiley & Sons, New York, NY, USA; 1988.MATH Hall P: Introduction to the Theory of Coverage Process. John Wiley & Sons, New York, NY, USA; 1988.MATH
8.
Zurück zum Zitat Stauffer D, Aharony A: Introduction to Percolation Theory. CRC Press, Boca Raton, Fla, USA; 1988.MATH Stauffer D, Aharony A: Introduction to Percolation Theory. CRC Press, Boca Raton, Fla, USA; 1988.MATH
9.
Zurück zum Zitat Dvoretzky A: On covering a circle by randomly placed arcs. Proceedings of the National Academy of Sciences of the United States of America 1956, 42(4):199-203. 10.1073/pnas.42.4.199MathSciNetCrossRefMATH Dvoretzky A: On covering a circle by randomly placed arcs. Proceedings of the National Academy of Sciences of the United States of America 1956, 42(4):199-203. 10.1073/pnas.42.4.199MathSciNetCrossRefMATH
10.
11.
Zurück zum Zitat Siegel AF, Holst L: Covering the circle with random arcs of random sizes. Journal of Applied Probability 1982, 19(2):373-381. 10.2307/3213488MathSciNetCrossRefMATH Siegel AF, Holst L: Covering the circle with random arcs of random sizes. Journal of Applied Probability 1982, 19(2):373-381. 10.2307/3213488MathSciNetCrossRefMATH
12.
Zurück zum Zitat Huillet T: Random covering of the circle: the size of the connected components. Advances in Applied Probability 2003, 35(3):563-582. 10.1239/aap/1059486818MathSciNetCrossRefMATH Huillet T: Random covering of the circle: the size of the connected components. Advances in Applied Probability 2003, 35(3):563-582. 10.1239/aap/1059486818MathSciNetCrossRefMATH
13.
Zurück zum Zitat Yadin M, Zacks S: Random coverage of a circle with application to a shadowing problem. Journal of Applied Probability 1982, 19(3):562-577. 10.2307/3213514MathSciNetCrossRefMATH Yadin M, Zacks S: Random coverage of a circle with application to a shadowing problem. Journal of Applied Probability 1982, 19(3):562-577. 10.2307/3213514MathSciNetCrossRefMATH
14.
Zurück zum Zitat Flatto L: A limit theorem for random coverings of a circle. Israel Journal of Mathematics 1973, 15(2):167-184. 10.1007/BF02764603MathSciNetCrossRefMATH Flatto L: A limit theorem for random coverings of a circle. Israel Journal of Mathematics 1973, 15(2):167-184. 10.1007/BF02764603MathSciNetCrossRefMATH
15.
Zurück zum Zitat Holst L: On convergence of the coverage by random arcs on a circle and the largest spacing. The Annals of Probability 1981, 9(4):648-655. 10.1214/aop/1176994370MathSciNetCrossRefMATH Holst L: On convergence of the coverage by random arcs on a circle and the largest spacing. The Annals of Probability 1981, 9(4):648-655. 10.1214/aop/1176994370MathSciNetCrossRefMATH
Metadaten
Titel
Characterizing the Path Coverage of Random Wireless Sensor Networks
verfasst von
Moslem Noori
Sahar Movaghati
Masoud Ardakani
Publikationsdatum
01.12.2010
Verlag
Springer International Publishing
DOI
https://doi.org/10.1155/2010/716565

Weitere Artikel der Ausgabe 1/2010

EURASIP Journal on Wireless Communications and Networking 1/2010 Zur Ausgabe