Survey PDF
Survey PDF
Ines Khoufi
INRIA, Rocquencourt,
78153 Le Chesnay Cedex, France,
Email: [email protected]
Pascale Minet
INRIA, Rocquencourt,
78153 Le Chesnay Cedex, France,
[email protected]
Anis Laouiti
TELECOM SudParis,
CNRS Samovar UMR 5157,
91011 Evry Cedex, France,
Email: [email protected]
Saoucene Mahfoudh
INRIA, Rocquencourt,
78153 Le Chesnay Cedex, France,
[email protected]
Abstract: Wireless Sensor Networks (WSNs) have many fields of application, including industrial,
environmental, military, health and home domains. Monitoring a given zone is one of the main
goals of this technology. This consists in deploying sensor nodes in order to detect any event
occurring in the zone of interest considered and report this event to the sink. The monitoring task
can vary depending on the application domain concerned. In the industrial domain, the fast and
easy deployment of wireless sensor nodes allows a better monitoring of the area of interest in
temporary worksites. This deployment must be able to cope with obstacles and be energy efficient
in order to maximize the network lifetime. If the deployment is made after a disaster, it will operate
in an unfriendly environment that is discovered dynamically. We present a survey that focuses on
two major issues in WSNs: coverage and connectivity. We motivate our study by giving different
use cases corresponding to different coverage, connectivity, latency and robustness requirements of
the applications considered. We present a general and detailed analysis of deployment problems,
while highlighting the impacting factors, the common assumptions and models adopted in the
literature, as well as performance criteria for evaluation purposes. Different deployment algorithms
for area, barrier, and points of interest are studied and classified according to their characteristics and
properties. Several recapitulative tables illustrate and summarize our study. The designer in charge of
setting up such a network will find some useful recommendations, as well as some pitfalls to avoid.
Before concluding, we look at current trends and discuss some open issues.
Keywords: area coverage, barrier coverage, coverage, deployment algorithms, full connectivity, grid,
intermittent connectivity, node activity scheduling, point of interest coverage, sensor deployment,
virtual forces, wireless sensors, WSN
Biographical notes: Ines Khoufi received her Computer Science Engineering and Master degrees
from the National College of Computer Science (ENSI) in 2010 and 2011 respectively. Currently,
she is a Ph.D. student in HIPERCOM2 research team at Inria. Her current research interest is on
wireless sensor networks deployment and progressive discovery of an unfriendly environment.
Pascale MINET works at the Inria research center of Rocquencourt, near Versailles. She is head of the
HIPERCOM (High Performance Communication) team. She got her qualification in advising PhD
students in 1998 from the University of Versailles. Previously she got her PhD diploma in Computer
Science, the University of Toulouse and her Engineer diploma in Computer Science in 1980 from
ENSEEIHT (Engineering school of Toulouse). Her research topics relate to wireless sensor networks
and mobile ad hoc networks and more particularly energy efficiency, routing, node activity
scheduling, multichannel communication, redeployment and quality of service in these networks.
She is co-author of the OLSR routing protocol standardized at IETF.
Anis Laouiti is an associate professor at Telecom SudParis since 2006. Before, he did his Phd
research work and worked as a research engineer within Hipercom team at Inria-Rocquencourt
where he participated to the OLSR routing protocol design (RFC3626). His research covers different
aspects in wireless ad hoc and mesh networks including protocol design, performance evaluation
and implementation testbed.
Saoucene MAHFOUDH received her Computer Science Engineering degree from ENSI in 2005
and her Master degree from the University of Paris 6 in 2006. She obtained her Ph D diploma in
2010 from the University of Paris 6. Her research topics deal with energy efficiency, cross-layering,
routing and redeployment in wireless sensor networks. After a post-doctoral fellow at Inria, she has
been working at King AbdelAziz University since 2013.
Usually, an initial deployment is provided. It can be UC4 monitoring of endangered wild species at some water
random (e.g. sensor nodes are dropped from a helicopter), all points: the idea is to compute statistics about the number
sensor nodes can be grouped together at an entry point, or they of individuals of this species from the number of
can form disconnected groups, each group consisting of a set individuals visiting the water point. A full or partial belt
of connected sensor nodes, etc. However, such a deployment of sensor nodes is built along the water point depending
usually fails to ensure the coverage and connectivity properties on its size. Intermittent connectivity is usually sufficient.
required by the application. For instance, some regions can
be highly covered whereas others are poorly covered and UC5 detection of intruders crossing a barrier (e.g. the border
may contain some coverage holes that are not monitored. of a country, a door or windows in an apartment). Such
Similarly, disconnected groups of sensors may fail to report applications require a barrier coverage with a permanent
the event detected to the sink. In both cases, the quality of connectivity. Depending on the application requirements,
data gathered is inappropriate, making, new a deployment one or several barriers are needed, the latter case being
necessary. called multiple barrier coverage.
To save energy and maximize network lifetime, it is UC6 air pollution monitoring in a smart city. Partial area
necessary after the final deployment to schedule node activity coverage is sufficient and intermittent connectivity can
to make nodes sleep (e.g. redundant nodes for full coverage, be compliant with the application requirements.
useless nodes for partial coverage) while meeting the
application requirements. Notice that node activity scheduling UC7 instantaneous snapshot of measures taken at locations
differs from sensor node deployment, because existing sensor predefined by the application. In precision agriculture,
nodes are only switched on or off but are not moved. the goal is to detect the appearance of diseases in the
crops. In a smart city, the goal is to track an air pollutant.
This paper is organized as follows. This section ends with a Such applications require the coverage of static points
description of representative use cases and the positioning of interest. Permanent connectivity may be not needed.
of our contribution with regard to other surveys. Section 2 Intermittent connectivity can be provided by mobile
defines the coverage and connectivity issues encountered robots (e.g. tractors for precision agriculture).
in wireless sensor networks, (WSNs). Section 3 deals
with analysis criteria for deployment algorithms, and more UC8 tracking of wild animals or a truck fleet with embedded
particularly presents factors impacting the deployment, sensors. In such a case, different technologies can
common assumptions and models adopted, as well as be used to track these mobile points of interest (e.g.
performance evaluation criteria. In Sections 4, 5 and 6, we Argos beacons for animals, 3G/4G systems for trucks).
focus on deployment algorithms ensuring coverage of area, Depending on the application requirements, connectivity
barrier and point of interest respectively. Section 7, explores may be intermittent (e.g. animals) or permanent (e.g a
some energy-efficient optimization of a deployment, based on truck fleet).
node activity scheduling. In Section 8, we provide guidelines
UC9 health monitoring of isolated workers, disabled people
to help the designer to select the deployment algorithm
or elderly. They are considered as mobile Points of
suitable for the application requirements. Finally, we discuss
interest that must be permanently covered. Permanent
some trends and open issues for deployment algorithms in
connectivity is required.
Section 9 before concluding in Section 10.
All these uses cases will enable us to classify the coverage
1.2 Representative use cases and connectivity problems encountered in the literature (see
Table 1), according to the criteria defined more precisely in
Depending on the application requirements, we can
Section 2.
distinguish the following use cases (UC) dealing with coverage
With the emergence of smart cities, different use cases can
and connectivity, and representative of most applications:
coexist simultaneously. For instance, air pollution monitoring,
UC1 monitoring of a temporary industrial worksite requires surveillance of parking lots, public lighting control, and
full area coverage, permanent network connectivity and pollutant tracking are examples of sensor deployments that
a uniform deployment of sensor nodes to reduce data will be very common in our cities in the near future.
gathering delays and provide a better balancing of node
energy. 1.3 Related work
UC2 forest fire detection requires full area coverage in dry
In this section, we position our work with regard to other
seasons and only 80% in rainy seasons. Permanent
existing surveys and highlight our contribution. Existing
connectivity is required in both cases to alert the
surveys (2; 3; 4; 5; 6; 7; 8) introduce basic concepts
firefighters.
related to coverage and connectivity. For instance, (2)
UC3 detecting and tracking of intruders in restricted areas. focuses on how to ensure area coverage and how to
Such applications require full area coverage; furthermore, deploy sensor nodes. (3) classifies coverage problems as
the most critical zones should be covered by more than coverage based on exposure and coverage exploiting mobility.
one sensor node (i.e. multiple coverage). Permanent Area coverage, point coverage and barrier coverage is
connectivity is also required. another classification proposed and detailed in (4) and (5).
4 I. Khoufi, P. Minet, A. Laouiti and S. Mahfoudh
In (6), the authors distinguish two coverage problems: Applications such as battlefield monitoring require full area
static coverage and dynamic coverage. They also propose coverage. In these applications, every location is covered by
a study of sleep scheduling mechanisms to reduce energy at least one sensor node (1-coverage) or by k > 1 sensor
consumption and analyze the relationship between coverage nodes (k-coverage). Deploying sensors over a large area while
and connectivity. An overview of existing centralized and ensuring full coverage and network connectivity may be
distributed deployment algorithms is given in (7). The authors expensive. However, full coverage with connectivity provides
in (8) discuss the different deployment algorithm strategies the best surveillance quality. In the following we detail one-
such as forces, computational geometry and pattern based coverage defined as simple coverage and k-coverage defined
deployment. These surveys are good references to have an as multiple coverage, depending on the degree of robustness
overall view of coverage and connectivity issues in WSNs. required by the application.
In this survey, we define the coverage and connectivity − Simple coverage
problems separately to provide a better understanding. The In WSNs, it is necessary to ensure full coverage of the area
originality of our approach lies in a different viewing considered while deploying the minimum number of sensor
angle. We provide comprehensive definitions of coverage and nodes. This can be satisfied by covering every location in the
connectivity with their possible variants. Indeed, these variants field using at least one sensor node. Then information detected
depend on the latency and robustness requirements that differ in this location should be reported to the sink. Many studies
in the applications considered, leading to representative use aim to minimize the number of nodes deployed while ensuring
cases. For each use case, we list some deployment algorithms coverage and connectivity. For instance, the triangular lattice
found in the literature. We give a global analysis of the deployment provides full coverage, connectivity and uniform
deployment problem by discussing the impacting factors, deployment using the minimum number of sensor nodes.
detailing the common assumptions and models adopted in the − Multiple coverage
literature. Moreover, we propose some performance criteria to Multiple coverage is defined as an extension of simple
evaluate deployment algorithms. In order to help the designer coverage and is denoted by k-coverage. It is specific to
to choose the most suitable deployment algorithms, we applications such as distributed detection, mobility tracking,
dedicate an entire section to questions and recommendations monitoring in high security areas and military intelligence in a
regarding coverage and connectivity problems. We also battlefield. Since the failure of a single node may result in the
provide a section summarizing current trends and discuss open loss or corruption of important data, one degree of coverage
issues for deployment algorithms. is not sufficient for these applications. Such applications
require highly accurate information in order to provide fault
tolerance and allow good decisions to be made. The k-
coverage deployment is defined as a sensor deployment pattern
2 Coverage and connectivity problems in WSNs
where each point in the area is covered by at least k deployed
sensor nodes. Then, k-coverage tolerates at least k − 1 node
2.1 Coverage failures while maintaining coverage.
deployment algorithm should ensure that by moving, the intermittent connectivity by using a mobile sink that moves
sensor nodes will detect an intruder trying to cross the barrier, and collects information from disconnected nodes. There are
with a probability that is higher than a given threshold. two types of intermittent connectivity: the first one uses only
one or several mobile sinks and the second uses a mobile sink
2.2 Connectivity and multiple throwboxes (Cluster heads).
• Isolated nodes
Two sensor nodes are said to be connected if and only
if they can communicate directly (one-hop connectivity) or When the radio range is less than the sensing range,
indirectly (multi-hop connectivity). In WSNs, the network full coverage can be achieved but without maintaining
is considered to be connected if there is at least one path connectivity between neighboring nodes. Consequently, these
between the sink and each sensor node in the considered area. nodes will be isolated. One solution to collect the detected
information from isolated nodes is to use one or several mobile
To monitor a specific area it is not enough to ensure coverage sinks. One or several nodes are in charge of visiting any sensor
without considering connectivity. When an event is detected, node that is not connected to the sink.
it should be reported to a sink. Consequently, it is necessary to • Connected components
ensure the connectivity between the sensor nodes and the sink
in order to guarantee the transfer of information to the sink. In any connected component, all sensor nodes of this
There are two types of network connectivity: full connectivity component are connected to each other. However, they are
and intermittent connectivity. disconnected from nodes in another connected component
and they can also be disconnected from the sink. To take
2.2.1 Full connectivity advantage of the connectivity within a connected component,
a throwbox, illustrated in Figure 5 by green nodes, can be
As connectivity is essential to guarantee the transfer of assigned to each connected component. A throwbox has the
information, it cannot be neglected and should have the same task of collecting the information of each node belonging to its
degree of importance as coverage. Thus, to efficiently monitor component. Then, a mobile sink (blue node in Figure 5) will
a given area, many applications require not only full coverage not collect information from each node in the network but just
but also full connectivity in order to collect information and take information from throwboxes. One or several nodes are in
report it. charge of visiting the throwbox of each connected component.
As we saw in the previous section dealing with full
coverage, full network connectivity can also be either simple
(1-connectivity) or multiple (k-connectivity). In addition,
full connectivity can be maintained during the deployment
procedure or it can be provided only when sensors have been
deployed in the area. In the following, we use connectivity to
represent full connectivity.
• Simple/Multiple connectivity
Full connectivity is said to be simple if there is a single path
from any sensor node to the sink.
Full connectivity is termed multiple if there are multiple
Figure 5: Intermittent connectivity using a mobile sink and
disjoint paths between any sensor node and the sink.
throwbox.
• Preserved connectivity
Considering only initial sensor deployments where all the
nodes are connected to each other and to the sink, this
connectivity is maintained during the deployment procedure. 2.3 Classification with regard to coverage and
This means that at any time during the deployment, there is a connectivity problems
path connecting every sensor node to the sink.
Table 2 provides a classification of the deployment algorithms
• Connectivity at the end of the algorithm
studied in this survey. For each of them we give the coverage
During the deployment process connectivity can be lost. and connectivity problem addressed. Notice that we use the
However, at the end of its execution, the deployment algorithm same classification criteria as in Table 1 of Section 1.2.
should guarantee full connectivity.
In some applications, it is not necessary to ensure full In this section, we analyze the different factors which have
connectivity in the area considered. It is sufficient to guarantee a positive or negative impact on the deployment. We discuss
Coverage and Connectivity Issues and Challenges in WSN 7
the common assumptions and models found in the literature deployment algorithm is chosen, this algorithm should include
before focusing on the relationship between the sensing range, a neighborhood discovery phase as well as a spreading phase
r, and the communication range, R, which highly impact the to allow sensor nodes to quickly discover other connected
behavior of the deployment algorithm. Moreover, we define components.
performance criteria for evaluation purposes. We end this • The energy of sensor nodes is difficult or impossible
section by highlighting the salient features of representative to renew, and this fact is of great importance. In the
deployment algorithms. deployment phase, the main reason for energy consumption
is the movement of the nodes, whereas in the data gathering
phase it is communication between the nodes. In both phases,
3.1 Factors impacting the deployment
energy-efficient techniques must be used.
Several factors impact the deployment provided and determine • The presence of obstacles makes the deployment more
how satisfactory the application is. They concern: complex: no sensor node should be placed within an obstacle.
• The assumptions and models used concerning r the Hence, the obstacles must be detected and a strategy must be
sensing range and R the communication range. Such used by the deployment algorithm to get around the obstacles.
assumptions and models are discussed in the next section. Furthermore, if the shape of the entity monitored is complex
The discrepancy between these oversimplified models and with irregular borders, some extensions to the deployment
reality may explain why the results obtained are not those algorithm will be needed.
which might be expected. The values of r and R determine • The quality of the data gathering required by the
the minimum number of sensors needed to fully cover the application may lead to a uniform and regular deployment.
entity monitored (i.e. area, barrier or PoI). The deployment Such a deployment provides smaller data gathering delays (9),
algorithms that use exactly this number are said to be optimal. a better time and space consistency of the data gathered, which
Depending on the relationship between r and R, detailed in leads to a more accurate snapshot of the measures taken.
Section 3.3, some algorithms either work or not. Others are • The positioning system may introduce some inaccuracy
valid whatever the relationship between r and R, but are not, in the position of the nodes; such a positioning error is very
however, optimal in all cases. common with GPS. To meet the application requirements, the
• The number of sensor nodes available for the deployment deployment algorithm should not accumulate the positioning
and the dimensions of the entity monitored will determine errors during the deployment.
whether this number is sufficient to fully cover the entity
monitored. It is usually assumed that this entity has a regular 3.2 Common assumptions and models
shape (e.g. rectangle, disk, etc). However, the reality is often
more complex with irregular borders. The common assumptions and models found in the literature
• The sensor nodes’ ability to move is a determining concern:
factor. If sensor nodes are unable to move, the only possible • Communication:
deployment is an assisted one, where a mobile robot for
example is in charge of placing the static sensor nodes at their − A unit disk graph model is generally adopted, where
final location. Otherwise, self-deployment is done, where each any two nodes whose Euclidean distance from each other
sensor node is autonomous and able to move. Notice that in is less than or equal to the communication range R, have a
such a case, the sensor nodes’ movement will consume more communication link: they are able to communicate in both
energy than communication during the deployment. directions. This binary model is, however, too simple and does
• The initial topology may require some extensions to the not match the real world. Some authors have introduced more
deployment algorithm. For instance, if the initial topology complex models where the probability of success falls less
comprises several disconnected components and a centralized abruptly when the distance increases up to R (10).
deployment algorithm is used, a mobile robot should be − A consequence of the unit disk graph model is that
used to collect the initial positions of the nodes needed by any wireless link is assumed to be symmetric. This assumption
the centralized deployment algorithm to compute the final is not always true in the real world.
positions of these nodes and this information should be − A frequent assumption is that all sensor nodes have
disseminated to them. If on the other hand, a distributed the same communication range. Sensor nodes may differ
8 I. Khoufi, P. Minet, A. Laouiti and S. Mahfoudh
in their age, their manufacturer, and their communication 3.3.1 Sensor deployment algorithms based on the
capacity. Hence some sensor nodes may have a higher relationship between R and r
transmission range than others.
− The initial topology considered in centralized
deployment algorithms is usually connected with the sink. • Case R ≥ 2r: Full coverage implies connectivity
This may not be the case in the real world (see the discussion in
In (11) and (12), the authors prove that when R ≥ 2r the full
Section 3.1). In distributed deployment algorithms, the initial
coverage of a convex area implies full network connectivity.
topology is generally random, as it facilitates the spreading
This result is extended to k-coverage and k-connectivity in
of nodes, leading to shorter convergence delays. For instance
(12). Then, using this assumption, it is sufficient to ensure full
Figure 6a depicts an initial topology where some sensor nodes
coverage, and connectivity will be a consequence.
are unable to communicate with the sink. In addition, Figure 6b
√
depicts another initial topology where all the sensor nodes are • Case R ≥ 3r: Full coverage implies connectivity
grouped at an entry point but unable to communicate with the √
sink. In (13), it is proved that when R ≥ 3r, ensuring full coverage
implies full connectivity. Moreover, the number of sensors
needed is optimal, when the triangular lattice is used as a
deployment pattern. For instance, in (22), the authors propose
a deployment algorithm where each sensor node should √ be
placed in a vertex of an equilateral triangle of edge 3r.
• Case R = r
3.3 Relationship between coverage and connectivity In (27), the authors propose an algorithm that aims
at preserving network connectivity while maximizing area
Some deployment algorithms only work when a given coverage. Starting with an initial deployment where all sensor
relationship exists between the radio range R and the sensing nodes are connected to the sink, a virtual force algorithm
range r. For instance, if R ≥ 2r, it is sufficient to ensure full is applied in order to redeploy sensor nodes in the area
coverage, and connectivity will be provided as a consequence. considered. As the sensing
√ and radio ranges do not meet
In the following, we study the different cases considered in the assumption R ≥ 3r, when sensor nodes move to their
the literature. Furthermore, we recall some results concerning new positions they check whether they are still connected
optimal deployments based on regular patterns. to the sink. If they are not, they move towards the sink
Coverage and Connectivity Issues and Challenges in WSN 9
nodes. That is why the total distance traveled by the nodes must 4 Area coverage and connectivity algorithms
be measured, as this measure reflects the energy consumed.
Obviously, minimizing the total distance traveled leads to 4.1 Full coverage
savings in energy. Notice that the convergence and stability
performance has a strong impact on the distance traveled and Many deployment algorithms aim to ensure full coverage of
the energy consumed. Once the deployment has been carried the area considered. These algorithms are classified into three
out and the nodes are stationary, the data gathering takes strategies. We distinguish the forces-based strategy, the grid-
place. The main cause of energy consumption in this phase is based strategy and the computational geometry-based strategy.
communication. To maximize network lifetime, node activity
scheduling can be used to make nodes sleep when they are not
needed for the data gathering. 4.1.1 Forces-based strategy
• communication overhead: comes from the control
messages exchanged between the nodes to organize the The forces-based strategy is known by its simple deployment
deployment and the data gathering. In the case of contention- principle. This principle is based on virtual forces that can
based medium access, collisions imply retransmission and be attractive, repulsive or null. In this strategy, a sensor node
increase the overall bandwidth and energy consumption. The should maintain a fixed threshold distance called Dth with
aim is to reduce this overhead. its 1-hop neighbors. Then, if the distance separating two
• uniformity, regularity and optimality of the deployment: neighboring nodes is greater than Dth , an attractive force is
if the space consistency of measures taken is expected, a exerted, whereas if this distance is less than Dth , a repulsive
uniform deployment is needed: all the nodes (except the border force is exerted. Otherwise, the force is null since the distance
ones) should have the same number of neighbors. Similarly, separating neighboring sensor nodes is equal to Dth , the
if the measures should be taken at equidistant positions, a required distance. This principle is illustrated in Figure 9,
−→
uniform and regular deployment is needed. Usually, such where Fij denotes the force exerted by sensor node j on sensor
a deployment reproduces the same geometric pattern (e.g. node i.
triangle, hexagon, square , etc). Depending on the relationship
between r and R, some patterns are optimal. This optimality is
useful because it requires the smallest number of sensor nodes
to meet the application requirements. A uniform and regular
deployment is also mandatory when the application requires
time and space consistency of the data gathered.
Area coverage
Protocol Coverage problem Connectivity problem Strategy Cent/Dist Specific assumptions
VFA (21) Full coverage Permanent connectivity Forces based Centralized
R R
Extended VFA(24) Full coverage Permanent connectivity Forces based Distributed r > 2.5 and r < 2.5
IVFA (25) Full coverage Permanent connectivity Forces based Distributed
EVFA (25) Full coverage Permanent connectivity Forces based Distributed √
DVFA (22) (23) Full and uniform coverage Permanent connectivity Forces based Distributed R ≥ 3r
CPVF (27) Maximized coverage Permanent connectivity Forces based Distributed arbitrary R and r
Push&Pull (28) Maximized coverage Permanent connectivity Forces based Distributed Triangular lattice
Forces based Square√grid
VFCSO(26) Full coverage Full connectivity Grid based Centralized R ≥ 5r
Node activity scheduling
(29) Full coverage Permanent connectivity Grid based Distributed
Multiple Multiple
(30) Full coverage Permanent connectivity Grid based Distributed
Multiple Multiple
HGSDA(32) Full coverage Permanent connectivity Grid based Centralized Triangular
√ lattice
R ≥ 3r
C 2 (34) Full coverage Permanent connectivity Grid based Distributed Triangular lattice
Energy saving
(33) Full coverage Permanent connectivity Grid based Distributed Square pattern
Square pattern
(35) Full coverage Permanent connectivity Grid based Distributed Static node
Assisted by robot
(56) Partial coverage Permanent connectivity Grid based Cent/Dist
VEC, VOR and Maximized coverage Permanent connectivity Computational Distributed Voronoi diagram
Minimax (40) geometry based
(43) Full coverage Permanent connectivity Computational Centralized Delaunay triangulation
geometrie based Obstacles
(41) Full coverage Permanent connectivity Computational Centralized Static nodes
geometry based
Robot collector
(54) Full coverage Intermittent connectivity Random Centralized Cluster head
Energy saving
(55) Full coverage Intermittent connectivity Random Centralized Ferries
(15) Full coverage Permanent connectivity Random Distributed Node activity scheduling
(17) Full coverage Permanent connectivity Random Centralized Node activity scheduling
Connected graph based
(12) Full coverage Permanent connectivity Random Distributed R ≥ 2r
Simple-Multiple Node activity scheduling
(19) Full coverage Permanent connectivity Random Distributed Arbitrary R and r
Node activity scheduling
(57) Partial coverage Permanent connectivity Random Dist/Cent Node activity scheduling
Barrier coverage
Protocol Coverage problem Connectivity problem Strategy Cent/Dist Specific assumptions
(49) Full coverage Permanent connectivity Grid based Distributed Mobile sensors
Simple-Multiple
(50) Full coverage Permanent connectivity Random Centralized Random offset < r
(51) Full coverage Permanent connectivity Random Centralized
MBC (52) Full coverage Permanent connectivity Deterministic Distributed R ≥ 2r
Simple-Multiple Dynamic object
CSP (53) Partial coverage Intermittent connectivity Probabilistic Centralized
PMS (53) Partial coverage Intermittent connectivity Probabilistic Centralized
(59) Full coverage Permanent connectivity Random Centralized Node activity scheduling
The virtual forces algorithm (VFA) is proposed in (21) certain threshold. In this way, energy consumption is reduced
as a centralized redeployment algorithm to enhance an initial during the deployment which provides a fast convergence to
random deployment. In the initial deployment, any sensor a coverage rate close to 100%. DVFA is also used in (23) to
node is able to communicate with the sink in a one-hop or cope with obstacles of different shapes. By using the virtual
multi-hop manner. Then, the sink computes the appropriate forces principle and a method to avoid the obstacles, full area
new position of each sensor node based on the coverage coverage is ensured even when an obstacle has a confined
requirements and using the virtual forces mechanism. In shape.
this work, obstacles exert a repulsive force and an area of
preferential coverage exerts an attractive force on sensor Usually, the virtual forces strategy is used to ensure full
nodes. During the execution of the virtual forces algorithm, area coverage as the attractive and repulsive forces spread
sensor nodes do not change their positions. It is only when sensor nodes over the whole area and consequently achieve a
they receive their final positions from the sink that they move high coverage rate rapidly. Furthermore, this strategy is used
directly to them. VFA is a centralized algorithm that offers a in (27) with the goal of preserving network connectivity. This
good coverage rate of the area considered while maintaining deployment algorithm, called CPVF, Connectivity-Preserved
network connectivity. However, a central entity must know Virtual Force, is used to monitor an unknown area with
the initial positions of all sensor nodes, compute their final an arbitrary ratio Rr . To achieve that, a sink periodically
positions and disseminate the positions to all sensor nodes. broadcasts a message to neighboring sensors which in turn
This principle is problematic when network connectivity flood the message to all connecting nodes. A sensor node is
is not initially ensured. Furthermore, when the network is considered to be disconnected from the network if it does not
very dense, this algorithm has a poor performance due to the receive the flooding message. Then, it moves toward the sink
gathering of the initial positions of sensor nodes. in order to reconnect. This algorithm induces a high overhead
To cope with the scalability problem, distributed versions in terms of messages broadcast in the network to check the
of VFA are proposed in the literature. For instance, the connectivity of the nodes with the sink. This paper also
extended virtual forces-based approach proposed in (24) proposes a floor-based scheme to improve the global network
copes with two drawbacks of the virtual forces algorithm: coverage by reducing overlapping. This scheme is based on
the connectivity maintenance and nodes stacking problems the division of the area into equidistant floors (distant of
(i.e. two or more sensor nodes occupy the same position). 2r) and encourages sensors to stay in the floor lines. Sensor
The connectivity maintenance problem occurs when the nodes are added in a column between floor lines to ensure
communication range is low, Rr < 2.5. Thus, the authors connectivity. Although this work aims at preserving network
propose adding an orientation force which is exerted only if connectivity when the ratio Rr is arbitrary, it requires a high
the node has fewer than 6 neighbors. This force aims to keep number of sensor nodes, as illustrated in Figure 10, because
the angle formed by one node and its two neighbors equal to the inter-floor distance is fixed to 2r for any value of R and r.
π
3 in order to provide a reliable connectivity and eliminate
coverage holes. Notice that these authors observe a stacking
problem, where several nodes are located in almost the same
position. This is because the coefficient of the attractive
forces is not well tuned. As a solution, the authors propose
an exponential force model to adjust the distance between a
node and its distant neighbors. However, the threshold value
of Rr = 2.5 is not explained and the maintained connectivity
is not proved in the paper. Furthermore, the additional
orientation force may induce node oscillations.
IVFA, Improved Virtual Force Algorithm, and EVFA,
Exponential Virtual Force Algorithm are two distributed Figure 10: Floor based deployment.
deployment algorithms proposed in (25). EVFA aims
at speeding up convergence because forces increase
exponentially with the distance between sensors. IVFA limits
the scope of virtual forces: only nodes in radio range of a
given node exert virtual forces on it. Furthermore, the stacking
4.1.2 Grid-based Strategy
problem is solved by using a very small attractive force with
regard to the repulsive force. IVFA converges to a steady The grid-based strategy provides a deterministic deployment
state faster than the basic virtual forces algorithm, and defines where the position of the sensor nodes is fixed according to a
a maximum movement in each iteration to reduce useless special grid pattern such as a triangular lattice, a square grid
moves and save energy. or a hexagonal grid (see Figures 11b, 12 and 13 respectively).
DVFA, proposed in (22), is another example of the distributed Then, the area is divided into virtual cells and depending on the
algorithm that uses the virtual forces to spread sensor nodes deployment algorithm used, sensor nodes are located either in
until the entire area is covered. The main drawback of this cell vertices or at the cell center.
algorithm is node oscillations. To deal with this problem, the The grid deployment is also a regular deployment pattern
authors of DVFA limit the distance sensor nodes move to a as all the generated grid cells have the same shape and
Coverage and Connectivity Issues and Challenges in WSN 13
move to cover it, such that if new empty cells appear, they will of partitioning the area into a number of polygons based
be around the sink. Redundant nodes should move toward the on distances to a specific discrete set of nodes. Each node
sink in order to cover empty cells that can occur along the occupies only one polygon and is closer to any point in this
path to the sink. polygon than any other node in the neighboring polygons.
These polygons can be obtained by drawing the mediator of
A grid-based approach is also used for robot-assisted sensor each two neighboring nodes. Consequently, the edges of the
deployment. As an example in (35), a robot places sensor polygons are equidistant from neighboring nodes. Delaunay
nodes at the vertices of a square cell. Then, each deployed triangulation is the dual graph of the Voronoi diagram. It can
sensor node colors itself white if it is adjacent to an empty be constructed by connecting each two neighboring points
cell and black otherwise. Neighboring sensor nodes exchange in the Voronoi diagram whose polygons share a common
hello messages to inform each other about white nodes edge. Voronoi diagram and Delaunay triangulation are used in
(empty cells) and maintain a back pointer corresponding WSNs to deal with coverage hole problems. The occurrence
to the nearest empty cell along the backward path of the of coverage holes after the deployment of sensor nodes in a
robot. Then, the robot backtracks this back pointer to drop given area can be considered as a cause of a low coverage
sensor node in the empty cell. This algorithm guarantees full rate. By detecting and healing these holes, the coverage rate
coverage in a failure free environment using a mobile robot can be maximized.
in a square grid.
It is assumed that the robot carries enough sensors to heal
any coverage hole (i.e. empty cell) that is detected. Such Deployment algorithms based on Voronoi diagram
strategies are used when the sensor nodes are static, and a
mobile robot is used to ensure coverage by repairing any Some schemes proposed are based on Voronoi diagram to
coverage hole detected by the sensor nodes. The new problem detect coverage holes. Sensor nodes are able to construct their
is that of detecting coverage holes and optimizing the robot Voronoi polygons based on location information received
movements. from their neighbors. Due to these Voronoi polygons, nodes
can determine coverage holes. Then, they move in order
to reduce or eliminate these holes while maximizing the
coverage rate of the area considered.
In (40), three distributed moving algorithms are proposed:
VEC, VOR and Minimax algorithms. The VECtor
based algorithm (VEC) is inspired by the behavior of
electromagnetic particles. When two electromagnetic particles
are too close to each other, an expelling force pushes them
a Sensors in the cell b Sensor in cell vertice. apart. VEC pushes sensor nodes away from a densely covered
centers. area. In contrast to the VEC algorithm, the VORonoi based
algorithm (VOR) pulls sensor nodes to the sparsely covered
Figure 12: Grid Based Strategy. area. The Minimax algorithm is similar to VOR. It fixes
coverage holes by moving sensor nodes closer to the furthest
Voronoi vertex. However, it does not go as far as VOR
to avoid situations in which a vertex that was originally
closer now becomes the furthest. Minimax chooses the
node target position as the point inside the Voronoi polygon
whose distance to the furthest Voronoi vertex is minimized.
Minimax and Vor do not ensure uniform coverage of the
final deployment since the algorithm stops as soon as full
coverage is obtained. Moreover, if the number of sensors is
not sufficient to cover the whole area, node oscillations may
occur.
Figure 13: Hexagonal pattern.
4.1.3 Computational geometry based Strategy In (43), a centralized algorithm is proposed to cope with the
boundaries and obstacles coverage problem. In their paper,
The computational geometry strategy is used to solve the authors propose a deterministic sensor node placement
problems based on geometrical objects: points, polygons, line to ensure full coverage of an area containing obstacles of
segments, etc. Voronoi diagram and Delaunay triangulation arbitrary shapes. Sensor nodes are deployed in a triangular
are two computational geometry methods used in WSNs lattice over the whole area as if there were no obstacles.
to solve static problems. The Voronoi diagram is a method Then, sensor nodes inside the obstacles are eliminated and
Coverage and Connectivity Issues and Challenges in WSN 15
a Line ferry. b Path ferry c Two annular • With the enhancements brought by many authors ((22),
ferries. (24) and (25) for instance), maximum coverage is reached
faster.
Figure 17: Different Ferry trajectories.
Nevertheless, some issues remain unsolved, like the node
oscillations mentioned previously and the detection of the
Mobile sink with multiple cluster heads (throwboxes): end of the distributed algorithm.
In (54), a large number of sensor nodes are randomly dispersed
in a square area. Those sensor nodes are grouped into clusters The grid-based strategy has the following advantages:
and a cluster head is elected for each one. Obviously, sensor • It provides a regular deployment with deterministic
nodes are connected to their cluster head in order to report positions of sensor nodes (e.g. a triangular lattice, square
the detected information to it. The cluster head has the role pattern, etc), if a virtual grid is used.
of storing this information and waiting for the mobile sink.
A moving strategy for the mobile sink is proposed to collect • It requires a minimum number of sensor nodes to achieve
the information detected in the whole area while saving the the required coverage. The optimal deployment pattern
energy consumption. The mobile sink starts from a fixed (i.e. the pattern requiring the minimum number of sensor
point, follows a specific trajectory to visit each cluster head nodes) varies according to the relationship between R
and gathers information, and finally it returns to its starting and r.
point. Intermittent connectivity is provided using a mobile sink
communicating with cluster heads and coverage is maximized. • It can easily achieve k-coverage and connectivity.
an appropriate model for such applications. A deployment of 5.1.2 Mobile sensor nodes
sensor nodes along a barrier is necessary to detect an intruder
crossing, for example, an international border. Depending A deployment strategy to ensure (simple or multiple) barrier
on the application requirements and the number of sensor coverage using mobile sensor nodes is proposed in (49). This
nodes provided, this deployment can ensure either full barrier strategy consists in dividing the area into virtual lines (i.e.
coverage or partial barrier coverage. barriers) where the number of virtual lines matches the desired
robustness of barrier coverage. In each line, sensor nodes
should occupy grid points at a distance of 2r. Starting from a
5.1 Full barrier coverage random deployment in a rectangular area, mobile sensor nodes
should execute two phases to reach their final positions. In the
Full barrier coverage can be either simple or multiple. It is
first phase, each sensor node moves vertically to reach a line.
simple, if there is just one barrier that is fully covered by
Then, in the second phase, it moves horizontally along the line
sensor nodes. The barrier coverage is multiple if there are k
to a predetermined grid point position. When each grid point
successive barriers of sensor nodes.
is occupied by a sensor node, full barrier coverage is provided.
The authors in (48) are the first to address the problem of
providing the minimum number of deployed sensor nodes
to ensure simple or multiple barrier coverage. They define
a simple barrier coverage by a belt of successive sensor
nodes such that their sensing areas overlap. A multiple barrier
coverage is defined by the fact that every two successive
barriers have two overlapping sensor nodes, as depicted in
Figure 19: LNRO barrier deployment.
Figure 18b. Based on a theoretical study, the authors prove
that the optimal number of sensor nodes deployed along a
l
barrier is 2r , where l is the length of the barrier and r the
sensing range. Then, every two successive sensor nodes are (51) focuses on finding and healing barrier holes using
at a distance of 2r in order to optimize the overlapping (see mobile sensor nodes. This work is an extension of (50).
Figure 18a). To ensure full barrier coverage, two types of After the deployment, sensor nodes may fail due to many
deployment algorithms can be used, depending on whether factors, such as battery depletion, environmental conditions
sensor nodes are static or mobile. or malfunctioning. Then, a redeployment is needed to heal
coverage holes. The proposed algorithm proceeds in two
phases. In the first phase, it scans the network from the
beginning to the end of the barrier to check coverage holes. The
second phase consists in computing which sensor nodes should
move to which position such that the total distance traveled
by the nodes is minimized. This algorithm takes advantage of
the LNRO distribution as all sensor nodes are concentrated
a Optimal 1-barrier b The above zone is along a line, as depicted in Figure 19, allowing quick and easy
coverage. 2-barrier covered. replacement of failed nodes.
Figure 18: Barrier coverage.
total distance traveled under the constraint that the number of is not always met. In such a case, strategies to ensure
barriers is maximized at any time. Sensor nodes are placed connectivity should be provided.
around the dynamic object, neighboring sensors are at a Sensor nodes may be dropped randomly, trying to follow a
distance less than or equal to 2r forming a belt around the barrier line (e.g. (50)). In this case, coverage can be improved
dynamic object without any coverage holes. The authors by a centralized algorithm, as in (51) in charge of detecting and
assume that R ≥ 2r, in order to ensure full connectivity. A healing holes in barrier coverage. However, when coverage
dynamic belt region provides k-mobile barrier coverage if and holes are present, the central entity may fail to collect all sensor
only if there are k vertex disjoint belts in its coverage graph. nodes’ positions since these holes may produce disconnected
The maximum number of barriers k changes in response to components.
changes of the dynamic object, k becomes smaller when the
dynamic object becomes larger, as illustrated in Figure 20.
6 Point coverage and connectivity algorithms
5.2 Partial barrier coverage
The last type of coverage is given by the coverage of Points of
In the barrier coverage problem, the optimal number of nodes Interest (PoI). Examples of applications include the detection
(denoted m points) required to fully cover the barrier, can be of some static or moving target, using the smallest number of
determined based on the sensors’ sensing range and the barrier sensors. We distinguish between static PoIs and dynamic PoIs.
length. However, if the number of available nodes is less than
optimal, the barrier coverage problem will be formulated as 6.1 Static PoI
how to move n mobile sensor nodes to monitor n points among
the m points so as to maximize the average intruder detection In (47), the authors are interested in the deployment of
while minimizing the average sensor movement distance. To mobile sensors to cover predefined PoIs, while preserving
solve this problem, two algorithms PMS and CSP are proposed connectivity with the sink. The sink has the task of
in (53). PMS, periodic monitoring scheduling, lets sensor disseminating information about the PoI locations to the
nodes monitor each point of the barrier periodically, regardless sensors as well as collecting the information reported from
of any arrival by an intruder and without any coordination the sensors about the events happening at the PoI. The basic
between sensors. Each sensor moves to the point j and stays idea of this deployment algorithm for PoI coverage is as
there for T time slots. Then, it moves to point mod(j + n, m) follows: initially all the sensors are within radio range of the
and stays there, also for T time slots. This is repeated until sink. All the sensors run the same algorithm but the motion
all the sensors run out of energy. CSP, Coordinated Sensor decision is taken individually by each sensor node. The sensors
patrolling, is a centralized algorithm that uses the temporal move toward one predefined point that could be the PoI or
correlation of intruder arrival times. CSP runs in two steps. the barycenter of the PoIs. Then they form straight lines
Firstly, it selects the point with the highest priority of intruder between the PoI and the sink. The distance the sensors move
arrival to be monitored at the current time. Then, it determines is bounded in order to maintain connectivity. Finally a sensor
how to move sensors to the selected point while minimizing stops moving, when it covers the PoI (i.e. the PoI is in the
the total distance traveled, using the information collected in sensing range of the sensor). The strategy of this deployment
the past time slot. It has been shown that the CSP algorithm algorithm minimizes the number of sensors used to maintain
outperforms PMS. connectivity by using the RNG graph (Relative Neighborhood
Graph).
5.3 Summary If multiple PoIs exist in the area considered, two
approaches can be adopted:
Generally, the barrier coverage problem refers to critical
applications such as intruder detection which require special • Random PoI deployment: the sensor chooses one of the
attention. The high degree of robustness (multiple barrier PoI at random;
coverage) is generally chosen for critical applications to prove • Barycenter PoI deployment: Every sensor calculates the
the efficiency and reliability of the monitoring task. barycenter of all the PoIs and the sink to cover it. Then
Furthermore, the zone monitored, such as a battlefield or any sensor chooses a PoI at random and covers it.
country borders very often includes obstacles and is not always
flat in these applications. Many environment constraints In (44), a distributed deployment scheme is proposed
may occur, such as in a battlefield or international borders. where mobile sensors nodes move following concentric
Obstacles can also occur in the monitoring barrier. The circular paths (ferries with annular trajectories) that cover
solutions proposed in the literature do not take into account static PoIs (See Figure 21). The goal of this work is to ensure
these constraints which have a negative impact on the PoI coverage and that events are reported to the sink. This sink
deployment algorithm. is located at the barycenter. Two neighboring circular paths
The issue of connectivity is very important in critical are at a distance of R. The authors assume that R ≥ 2r and
applications since it allows information to be reported to mobile sensors have no global knowledge of the PoIs in the
the sink. All the papers cited in this section, assume that area considered. This work combines three aspects which are:
connectivity between neighboring nodes and with the sink is PoI discovery, PoI coverage and connectivity with the sink.
ensured: R ≥ 2r. However, in real deployments, this condition To achieve these three aspects, a mobile sensor should move
Coverage and Connectivity Issues and Challenges in WSN 19
constantly to execute the PoI discovery task. Then, it should 6.2 Mobile PoIs
adjust its movement velocity with sensors in the neighboring
circular paths to satisfy the constraints regarding coverage and In the case of mobile PoIs, the authors of (47) propose three
connectivity with the sink in order to report the information strategies to reach the mobile PoI:
about the PoIs. • In the first strategy, sensor nodes move back to the
sink before deploying toward the new location of the
PoI. This strategy provides a high coverage quality but
increases the deployment duration and the amount of
energy consumed.
• In the second strategy, sensors try to move directly toward
the new location of the PoI without going back to the
sink. This strategy reduces the time needed to cover the
new PoI but also reduces the coverage quality as it needs
a greater number of sensors to maintain connectivity.
• In the third strategy, a sensor moves toward the straight
line between the sink and the new location of PoI, then
Figure 21: PoI coverage using annular ferries. it moves toward the PoI. This strategy provides a higher
coverage quality and reduces the time needed to cover
the PoI.
In the following we discuss various ways to answer these assisted in their deployment by a mobile robot.
questions. − The sensing range r, the communication range R and
I Definition of the coverage and connectivity problem that the associated models: for more details see Section 3.2.
must be solved: Furthermore, the relationship between r and R will be
used to select the appropriate deployment algorithms in
• Coverage Table 3.
− If the goal is to monitor an area, then the problem − The number of sensor nodes must be sufficient to meet
concerns area coverage, which may be full or partial. the application requirements, otherwise the problem is
If it is to detect barrier crossing, the problem is barrier impossible to solve.
coverage, which, again, may be full or partial. − Energy: if sensor nodes are equipped with a battery,
If the goal is to track/monitor a target, the problem deals the deployment algorithm must be energy efficient.
with point of interest (PoI) coverage. The PoI may be
static or mobile. • The sink
− If coverage must be full and the degree of robustness It is in charge of collecting the data generated by the
required by the application is high, multiple coverage is sensor nodes deployed. It can be static or mobile. If the
needed, otherwise simple coverage is sufficient. sink is static, either it is connected to sensor nodes, or
− If long delays to detect an event are tolerated by the a mobile robot visits the disconnected sensor nodes to
application, the coverage of any point can be temporary. collect their data and report them to the sink. If the sink
Otherwise, it is permanent. is mobile, it moves to collect data.
• Connectivity I Recommendations:
− If short delays to report detected events to the sink
are required by the application, permanent connectivity • Coverage problem
must be ensured. Otherwise, intermittent connectivity is Depending on the application needs, the problem is an
sufficient. area, barrier or PoI (Point of interest) coverage problem.
− If the application needs a high degree of robustness,
multiple paths to the sink should be maintained. • Relationship between the transmission range R and the
Otherwise, a simple path sensing range r
The relationship between R and r influences
√ the choice
• Type of deployment of the solution. If for instance R ≥ 3r, it is sufficient
− depending on the application requirements, a uniform to solve the coverage problem to obtain connectivity as
and regular deployment should be provided, based on a a consequence of coverage. If the transmission range R
pattern (see Section 3.3). is strictly less than the sensing range r, a distributed
deployment would require a smaller target distance
I Assumptions and constraints
between sensor nodes than that required by full coverage
In most cases, the designer will be faced with multiple
of the area. Hence, a higher number of sensor nodes is
assumptions and constraints that must be taken into account
used, leading to a more expensive solution. If the designer
when selecting the appropriate deployment algorithm. These
has a small budget, he/she will prefer a centralized
include:
solution with a mobile robot/agent to deploy the sensor
• Environment nodes to their final position, and to collect data from
− The dimensions and position of the area, barrier or these nodes in the data gathering phase. Similarly, such a
PoI to cover should be provided in order to compute solution is also preferred when the application tolerates
the minimum number of sensor nodes required. If this delays (e.g. delay tolerant networks, ferries). In contrast,
number is large, the deployment algorithm must be a permanent path must exist from any sensor node to the
scalable. The initial topology influences the deployment sink. Additional sensor nodes are required to ensure this
algorithm, specially when some sensor nodes are permanent connectivity.
disconnected, or when they are all grouped together at an
entry point (see the discussion in Section 3.1). • Centralized versus Distributed solution
− The choice of the radio propagation model must Depending on the area/barrier size, a centralized
be compliant with the environment (e.g. free space or /distributed solution will be preferable. Indeed, if
confined) which may suffer from perturbations caused by the monitoring requires a high number of sensors,
other wireless networks (e.g. WiFi) or electronic devices a distributed solution is chosen because of its better
(e.g. microwaves), and may also contain obstacles. scalability, provided that the energy constraints are taken
− In the presence of obstacles, detection and get around into account, as discussed below. A centralized solution
techniques should be provided. requires that the central entity in charge of the deployment
computation has perfect knowledge of the positions of all
• Sensor nodes the sensor nodes. If the initial topology is disconnected,
− Mobility: sensor nodes may be mobile and a mobile robot is needed to collect the initial positions of
autonomous, and this condition is necessary for self- all disconnected nodes to compute the final deployment.
deployment. On the other hand, static nodes should be If all sensor nodes are static, the centralized solution is
22 I. Khoufi, P. Minet, A. Laouiti and S. Mahfoudh
the only possible one. A mobile robot is needed to deploy objects communicate through wired or wireless networks that
the sensor nodes to their final position. tend to use common internet protocols (e.g. IP).
The deployment algorithms presented in this survey deal only
• Energy constraints with 2D. With new applications in smart cities, sensors will
When sensor nodes are equipped with a battery of limited be deployed in 3D. For instance, sensors can be fixed on the
capacity, energy efficient techniques should be used. ground, as well as at different heights on buildings to form a
Special care must be given to node activity scheduling network.
that allows nodes to sleep for energy saving purposes. The radio propagation models are different and new
Another advantage of node activity scheduling is to deployment algorithms should be designed. With the
make the deployment adaptive to varying coverage introduction of UAVs (Unmanned Aerial Vehicles) and
requirements, ranging from full to partial. However, the MUAVs, (Micro UAVs), swarms of flying and communicating
energy consumed by nodes movements is considerable UAVs and MUAVs will be used in monitoring applications.
and should be limited. For instance, nodes oscillations The main characteristics of such networks are the coordinated
occurring in some distributed solutions should be moves to deploy and redeploy in a 3D space to meet the
avoided. If the designer wants to keep the energy of sensor application requirements. Similarly to 3D deployments in the
nodes for data gathering, a mobile robot/agent should be air, exist 3D underwater deployments based on ultrasound
used to deploy the sensor nodes to their final position. communication. Both 2D and 3D deployment algorithms
• Uniform and regular deployment have to cope with positioning errors, which are common in
A uniform and regular deployment reduces the energy positioning systems like GPS. Few algorithms take this issue
consumed during the data gathering phase and minimizes into account.
the data gathering delay. Moreover, it provides better time Security is an important issue in deployment algorithms, but is
and space consistency of the measures reported to the usually not addressed. An intruder could harm the deployment
sink. process and corrupt the data gathering.
We expect that wireless sensor network technologies will be
• Obstacles mature very soon and will be widely deployed in a large variety
An area/barrier with obstacles needs mechanisms to of industrial applications requiring multihop communications
detect obstacles and strategies to get around them, as well and needing tight constraints. In these applications, specific
as ensuring the required coverage. attention should be paid to robustness. The deployment
algorithms should be able to tolerate some message losses
and some failed sensor nodes. Furthermore, the deployment
9 Trends and open issues for deployment algorithms algorithms should be able to adapt to the dynamic changes of
the application requirements during the monitoring task.
Deployment is a fundamental issue in WSNs. Many challenges Deployment algorithms need to be smarter in adapting
have been studied and published in the literature. In this survey, themselves to changes in the environment or the application
we have discussed and classified some of them according to requirements that could be more frequent.
their main characteristics with a special focus on coverage and
connectivity.
Nevertheless, several issues are still unresolved or under 10 Conclusion
study to achieve an optimized deployment that can be
adapted to different situations and emerging technologies. We In this survey, we studied two major challenges in
believe that the sensors’ devices will become more powerful WSNs: coverage and connectivity, while bearing in mind
with enhanced capacities, like more sophisticated processing, the importance of energy issue. We provided indications
greater sensing range, fully equipped with positioning system for analyzing deployment algorithms and evaluating their
and integrating more and more various sensing components performances. We distinguish two types of deployment
as well as actuators. Some of them could even embed several algorithms depending on the mobility of sensor nodes:
communication technologies (802.15.4, WiFi, 3G, 4G). self deployment for mobile sensor nodes and assisted
In short, sensor devices are becoming faster, more intelligent deployment for static sensor nodes deployed by mobile
and heterogeneous. However, their autonomy is still limited robots. Deployment algorithms are designed to meet the
by their embedded energy. Pushing back this boundary, energy application requirements such as coverage, connectivity,
harvesting and renewable energy are promising techniques to latency and robustness. We established a classification of
extend the lifetime of a battery and hence make them more deployment algorithms based on these requirements. We
autonomous. provide several recapitulative tables to help the reader gain a
Since sensor devices are becoming cheaper, they can be better understanding of the advantages and shortcomings of
deployed on a large scale to build more complex wireless the problems and algorithms studied. In fact, the deployment
networks offering more functionalities. To provide scalability, of sensor nodes and sinks can be considered as the first
distributed algorithms are more suitable than the centralized step in the design of a data gathering application. As a
ones. second step, node activity scheduling is used to optimize
These trends will increase with the emergence of the Internet energy consumption by switching off redundant nodes to
of Things, where sensors and actuators embedded in physical maximize network lifetime, while ensuring the coverage and
Coverage and Connectivity Issues and Challenges in WSN 23
connectivity required by the application. It should be noted [12] X. Wang, Y. Zhang, C. Lu, R. Pless and C. Gill (2003) ’Integred
that the deployment provided determines the consumption of Coverage and Connectivity Configuration in Wireless Sensor
energy and bandwidth during the data gathering. The reader Networks’, SenSys, Embedded networked sensor systems, p. 28-
will find useful guidelines to select the deployment algorithms, 39.
that are best-suited to his/her needs. The deployment of [13] X. Bai, S. Kumar, D. Xuan, Z. Yun and T.H. Lai (2006)
wireless sensor nodes to monitor a temporary worksite is ’Deploying Wireless Sensors to Achieve Both Coverage and
Connectivity’, MobiHoc, Mobile ad hoc networking and
a typical use case representative of industrial applications
computing, p. 131-142.
where full coverage and full connectivity are required.
[14] B. Chen, K. Jamieson, H. Balakrishnan and R. Morris
In precision farming, for instance, partial coverage with
(2001) ’Span: An Energy Efficient Coordination Algorithm for
intermittent connectivity are sufficient to meet the application Topology Maintenance in Ad Hoc Wireless Networks’, ACM
requirements. The reader is also given an overview of Wireless Networks Journal.
current trends and some interesting open issues. We strongly [15] R. Lyengar, K. Kar and S. Banerjee (2005) ’Low-coordination
believe that the deployment algorithms will undergo extensive Topologies for Redundancy In Sensor Networks’, Mobihoc.
development with the rapid emergence of the Internet of [16] K. Kar and S. Banerjee (2003) ’Node Placement for
Things. Connected Coverage in Sensor Networks’, WiOpt Modeling and
Optimization in Mobile, Ad Hoc and Wireless Networks.
[17] J. Carle and D. Simplot Ryl (2004) ’Energy-Efficient Area
Acknowledgment Monitoring for Sensor Networks’, IEEE Computer Society.
[18] A. Gallais, J. Carle, D. Simplot Ryl and I. Stojmenovic (2008)
This work has been partially funded by the Cluster Connexion ’Localized Sensor Area Coverage with Low Communication
Overhead’, IEEE Transaction on mobile computing, vol. 7, no.
project. For more details see http://www.cluster-connexion.fr/
5.
We would like to thank Richard James for his help to improve
[19] J. P. Sheu, S. C. Tu and C. H. Yu (2007) ’A Distributed
the quality of this survey.
Query Protocol in Wireless Sensor Networks’, Wireless Personal
Communication, p. 449-464.
[20] Y. C. Wang, C. C. Hu and Y. C. Tseng (2005) ’Efficient
References Deployment Algorithms for Ensuring Coverage and connectivity
of Wireless Sensor Networks’, WICON.
[1] Y. Miao (2005) ’Applications of sensor networks’, Seminar [21] Y. Zou and K. Chakrabarty (2003) ’Sensor Deployment and
Wireless Self-Organization Networks. Target Localization Based on Virtual Forces’ IEEE INFOCOM.
[2] R. Mulligan and H. M. Ammari (2010) ’Coverage in [22] K. Mougou, S. Mahfoudh, P. Minet and A. Laouiti (2012)
Wireless Sensor Networks: A Survey’, Networks protocols and ’Redeployment of Randomly Deployed Wireless Mobile Sensor
algorithms, vol. 2, no. 2. Nodes’ IEEE VTC, Quebec, Canada.
[3] A. Ghosh and S. K. Das (2008) ’Coverage and Connectivity [23] S. Mahfoudh, I. Khoufi P. Minet and A. Laouiti (2013)
Issues in Wireless Sensor Networks: A survey’, Pervasive and ’Relocation of Mobile Wireless Sensors in the Presence of
Mobile Computing, vol. 4, I. 3, p. 303-334. Obstacles’, ICT, CasaBlanca, Marroco.
[24] J. Li, B. Zhang, L. Cui and S. Chai, (2012) ’An Extended
[4] G. Fan and S. Jin (2010) ’Coverage Problem in Wireless Sensor
Virtual Force-Based Approach to Distributed Self-Deployment in
Networks: A Survey’, Journal of networks, vol. 5, no 9.
Mobile Sensor Networks’, International Journal of Distributed
[5] B. Wang (2011) ’Coverage Problem in Sensor Networks: A Sensor Networks.
Survey’, ACM Computing Surveys, vol. 43 no.4, article 32. [25] J. Chen, S. Li, and Y. Sun (2007) ’Novel Deployment Schemes
[6] C. Zhu, C. Zheng, L. Shu and G. Han (2012) ’A survey on for Mobile Sensor Networks’ Sensors, vol. 7, no. 11, pp. 2907-
coverage and connectivity issues in wireless sensor networks’, 2919.
Journal of Network and Computer Applications, p. 619-632. [26] Q. Xu and Q. Wang (2012) ’Coverage Optimization
[7] S. Mahfoudh, P. Minet and A. Laouiti (2012) ’Overview of Deployment Based on virtual Force Directed in Wireless Sensor
Deployment and Redeployment Algorithms for Mobile Wireless Networks’, IPCSIT, vol. 47, Singapore.
Sensor Networks’, Emerging Topic on Sensor Networks. [27] G. Tan, S. A. Jarvis, A. M. Kermarrec (2009) ’Connectivity-
[8] M. C. Akewar and N. V. Thkur (2012) "Study of Wireless Mobile Guaranteed and Obstacle-Adaptive Deployment Schemes for
Sensor Network Deployment" Internatioal Journal of Computer Mobile Sensor Networks’, IEEE Transactions on Mobile
and Wireless Communication, vol. 2, no 4. Computing.
[28] N. Bartolini, T. Calamoneri, E. G. Fusco, A. Massini and S.
[9] R. Soua, P. Minet, E. Livolant (2012) ’MODESA: an Optimized
Silvestri (2010) ’Autonomous deployment of mobile sensors for
Multichannel Slot Assignment for Raw Data Convergecast in
a complete coverage’, Journal Wireless Networks, vol. 16, I. 3,
Wireless Sensor Networks’, IPCCC 2012, the 31st IEEE
p. 607-625.
International Performance Computing and Communications
[29] Y. H. Kim, C. M. Kim, D. S. Yang, Y. J. Ohand Y. H. Han
Conference, Austin, Texas.
(2012) ’Regular Sensor Deployment Patterns for p-Coverage and
[10] H. Wang and W. Chung (2012) ’The generalized k-coverage q-Connectivity in Wireless Sensor Networks’, ICOIN.
under probabilistic sensing model in sensor network’ WCNC. [30] Z. Yun, X. Bai, D. Xuan, T. H. Lai and W. Jia (2010) ’Optimal
[11] H. Zhang and J. C. Hou (2005) ’Maintaining Sensing Coverage Deployment Patterns for Full Coverage and k-Connectivity (k ≤
and Connectivity in Large Sensor Networks’ Ad Hoc and Sensor 6) Wireless Sensor Networks’, IEEE Tansactions on Networking,
Wireless Networks, vol. 1, no. 1-2. vol. 18, no. 3.
24 I. Khoufi, P. Minet, A. Laouiti and S. Mahfoudh
[31] N. A. Ab. Aziz, K. Ab. Aziz, and W. Z. W. Ismail (2009) [48] S. Kumar, T. H. Lai and A. Arora (2005) ’Barrier Coverage with
’Coverage Strategies for Wireless Sensor Networks’, World Wireless Sensor’, MobiCom, Germany.
Academy of Science Engineering and Technology. [49] A. Saipulla, B. Liu, G. Xing and J. Wang (2010) ’Barrier
[32] S. Han, Y. Zhang and G. Xu (2010) ’Hexagonal grid- Coverage with sensor of limited mobility’, MobiHoc, USA.
based sensor deployment algorithm’, Control and Decision [50] A. Saipulla, C. Westphal, B. Liu, J. Wang (2009)
Conference, Chinese. ’Barrier Coverage of Line-Based Deployment Wireless Sensor
[33] P. Park, S. G. Min and Y. H. Han (2010) ’A Grid-based Self- Networks’, INFOCOM, Rio de Janeiro.
deployment Schemes in Mobile Sensor Networks’. [51] A. Saipulla, C. Westphal, B. Liu and J. Wang (2013) ’Barrier
[34] A. Mateska and L. Gavrilovska (2011) ’WSN Coverage and coverage with line-based deployed mobile sensors’ Journal Ad
Connectivity Improvement Utilizing Sensor Mobility’, European Hoc Network.
Wireless, Vienna, Austria. [52] L. Kong, Y. Zhu, M. Y. Wu and W. Shu (2012) ’Mobile Barrier
[35] L. Xu, A. Nayak and I. Stojmenovic (2010) ’Back Tracking Coverage for Dynamic Objects in Wireless Sensor Networks’,
based Sensor Deployment by a Robot Team’, Sensor Mesh and Mobile Adhoc and Sensor Systems MASS, Las Vegas, NV, USA.
Ad Hoc Communications and Networks, USA. [53] H. Shibo, C. Jiming, L. Xu, S. Xuemin and S. Youxian (2012)
[36] K. Chan-Myung, Y. Dong-Sun, O. Young-jun and H. Youn- ’Cost-Effective barrier coverage by mobile Sensor Network’,
Hee (2012) ’Regular Sensor Deployment Patterns for p-coverage IEEE INFOCOM.
and q-connectivity in Wireless Sensor Network’,Information [54] E. M. Saad, M. H. Awadalla and R. R. Darwish (2008) ’A Data
Networking ICOIN, 2012. Gathering Algorithm for a Mobile Sink in Large-Scale Sensor
[37] Y. C. Wang and Y. C. Tseng (2007) ’Distributed Deployment Networks’, Wireless and Mobile Communications, ICWMC,
Schemes for Mobile Wireless Sensor Networks to Ensure Multi- Athens.
level Coverage’ IEEE Transactions On Parallel And Distributed [55] V. Kavitha and E. Altman (2010) ’Analysis and Design of
Systems. Message Ferry Routes in Sensor Networks using Polling Models’
[38] A. Raha, S. Maity, M. K. Naskar, O. Alfandi and D. Hogrefe Modeling and Optimization in Mobile, Ad Hoc and Wireless
(2012) ’An Optimal Sensor Deployment Scheme to Ensure Multi Networks (WiOpt), Avignon.
Level Coverage and Connectivity in Wireless Sensor Networks’, [56] Y. Liu and W. Liang (2005) ’Approximate coverage in
Wireless Communications and Mobile Computing Conference wireless sensor networks’, IEEE Conference on Local Computer
IWCMC, Limassol. Networks, Sydney.
[39] J. Beaudaux, A. Gallais and T. Razafindralambo (2010) [57] Y. Wu, C. Ai, S. Gao, and Y. Li (2008) ’p-Percent Coverage in
’Multiple Coverage with Controlled Connectivity in Wireless Wireless Sensor Networks’, WASA, Berlin.
Sensor Networks’, ACM workshop on Performance evaluation [58] M. Hefeeda and M. Bagheri (2007) ’Wireless Sensor Networks
of wireless ad hoc sensor and ubiquitous networks. for Early Detection of Forest Fires’, Mobile Adhoc and Sensor
[40] G. Wang, G. Cao and T. F. La Porta (2006) ’Movement Assisted Systems, Pisa.
Sensor Deployment’, IEEE Transactions on Mobile Computing, [59] Y. Wang and G. Cao (2011) ’Barrier Coverage in Camera Sensor
vol 5, no 6. Networks’, MobiHoc, Paris.
[41] S. Babaie and S. S. Pirahesh (2012) (Hole Detection
Fore Increasing Coverage in Wireless Sensor Network Using
Triangular Structure’, International Journal of Computer Science
Issues IJCSI, vol. 9, I. 1, no 2.
[42] M.E. Keskin, I. K. Altmel, N. Aras, C. Ersoy (2013)
’Optimal Deployment, Scheduling and Routing for Maximizing
the Lifetime of a Wireless Sensor Networks With Multiple
Mobile Sinks’, Technical Report FBE-IE-02/2013-02, Institute
of Graduate Science and Engineering, Bogazici University,
Istanbul.
[43] H. Tan, Y. Wang, X. Hao, Q. S. Hua and F. C.M. Lau (2010)
’Arbitrary obstacles constrained full coverage in wireless sensor
networks’ In Wireless Algorithms Systems and Applications,
Springer Berlin Heidelberg.
[44] M. Erdelj, E. Natalizio and T. Razafindralambo (2012) ’Multiple
Point of Interest Discovery and Coverage with Mobile Wireless
Sensors’ Computing Networking and Communications ICNC.
[45] W. Cheng, M. Li, K. Liu, Y. Liu, X. Li and X. Liao (2011)
’Sweep Coverage with Mobile Sensors’, Mobile Computing
IEEE transactions, vol. 10, I. 11, November 2011.
[46] X. Li, H. Frey, N. Santoro and I. Stojmenovic (2011)
’Strictly Localized Sensor Self-Deployment for Optimal Focused
Coverage’, IEEE Transactions on Mobile Computing, Vol. 10,
No. 11.
[47] M. Erdelj, T. Razafindralambo and D. Simplot Ryl (2013)
’Covering Points of Interest with Mobile Sensors’, IEEE
Transaction on Parallel and Distributed Systems, p. 32-43.