An efficient broadcast authentication scheme in wireless sensor networks
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
On the robustness of grid-based deployment in wireless sensor networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
A Delaunay Triangulation based method for wireless sensor network deployment
Computer Communications
Relay sensor placement in wireless sensor networks
Wireless Networks
IEEE Transactions on Wireless Communications
On improved relay nodes placement in two-tiered wireless sensor networks
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Human animal machine interaction: animal behavior awareness and digital experience
Proceedings of the international conference on Multimedia
Heuristic algorithms for effective broker deployment
Information Technology and Management
Proceedings of the 14th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
Developing energy-efficient topologies and routing for wireless sensor networks
NPC'05 Proceedings of the 2005 IFIP international conference on Network and Parallel Computing
Fault-tolerant relay node placement in wireless sensor networks
COCOON'05 Proceedings of the 11th annual international conference on Computing and Combinatorics
On the deployment of wireless sensor networks with regular topology patterns
WISM'12 Proceedings of the 2012 international conference on Web Information Systems and Mining
Hi-index | 0.00 |
Sensors can be paired with radio units anddeployed to form a wireless ad-hoc sensornetwork. Actual deployments must consider thecoverage that can be achieved with a givennumber of sensors: this coverage varies with therange of the radios and the maximum allowabledistance between any point in the area and thenearest sensor. Deployments must also preserveconnectivity in spite of possible failure or energydepletion in a subset of the units. This paperpresents and analyzes a variety of regulardeployment topologies, including circular andstar deployments as well as deployments insquare, triangular, and hexagonal grids.