Abstract
K-coverage sensor deployment is an important issue in wireless sensor networks (WSNs) applications. This is because an efficient topology structure significantly affects the quality of service and lifetime of WSNs. In the present work, we study the sensor deployment problem and propose novel distributed decision schemes to guide sensor movement to achieve k-coverage deployment. In our schemes, the kth order Voronoi diagram is used to discover the regions that do not meet the k-coverage requirement. Two different movement strategies are designed to determine the optimal location of each mobile sensor through local topological information. Finally, simulation results validate the effectiveness and accuracy of the proposed schemes.
1. Introduction
Such features as reliability, low cost, and ease of deployment make wireless sensor networks (WSNs) [1–3] convenient for monitoring hostile environments, including battlefields and disaster areas. In these applications, sensors are randomly dropped from aircrafts or other kinds of moving vehicles because manual interference is impossible. However, random deployment cannot guarantee that the sensors are evenly scattered in the monitored region. Additionally, when sensors run out of power, the coverage performance of a WSN worsens even further. Therefore, to improve fault tolerance and accuracy of data collection, we consider the k-coverage problem, where each point within the field can be monitored by at least k sensors.
Previous studies on k-coverage deployment can be broadly categorized into two types: centralized schemes and distributed schemes. The problem of centralized deployment has been tackled in previous literature [4–6]. Generally, using centralized deployment algorithms is easier for both stationary targets and moving targets with known and static movement patterns to achieve more precise deployment results. However, for an unknown and changing environment, centralized algorithms are not flexible enough to adapt to these changes. In [7, 8], the authors proposed various distributed schemes to address the k-coverage problem. These distributed algorithms feature self-organized sensors that carry out network tasks, thereby reducing messaging cost while improving the sensors' adaptability to dynamic conditions. However, it is assumed in these schemes that a sufficient number of sensors are provided. Therefore, a distributed k-coverage decision scheme for system deployment with limited sensors is still needed.
Most of the traditional support decision techniques [9–12] are all designed in a centralized manner and cannot be applied to a decentralized system. In this paper, we propose a novel distributed algorithm to minimize the number of deployed sensors while maximizing k-coverage sensing performance. In our algorithm, the kth order Voronoi diagram is adopted by dividing the entire region into subregions to detect coverage holes in each iteration. After determining the target region, our distributed algorithm calculates the optimal locations for sensors using local topological information only. Finally, we conduct various experiments to validate the performance of the proposed schemes.
The rest of this paper is organized as follows. In Section 2, we review previous work related to ours. The relevant description about the definition of k-coverage and then properties of the kth Voronoi diagram are introduced in Section 3. The k-coverage deployment scheme is presented in Section 4. We evaluate our algorithm in Section 5, followed by conclusions in Section 6.
2. Related Work
Most of the previous studies on the k-coverage problem focus on determining the optimal set of active sensors and assume that sensor network is densely deployed. Hefeeda and Bagheri [4] proposed a centralized approximation algorithm to obtain the minimum number of active sensors. Motivated by the divide-and-conquer concept, a randomly ordered activation and layering protocol (ROAL) has been discussed in [8]. ROAL builds k layers for the network in a distributed manner to guarantee k-coverage, where each layer can individually provide 1-coverage by selecting a disjoint subset of sensors without using location information. In the literature, static sensors are also assumed to be randomly deployed in the monitored region. Hence, a densely deployed network is constructed with the desired coverage level. However, redundancy is inevitably confronted.
The problem of mobile sensor k-coverage deployment has been studied in recent years. Wang and Tseng [7] developed a practical method, which aims at determining the minimum set of sensors and their locations. In order to move the sensors to the designated positions, they proposed a dispatch scheme that can minimize the energy consumption caused by sensor movement. A novel algorithm based on the nonuniform grid has been proposed by Sheu et al. in [5]. The authors designed a greedy deployment scheme to improve the k-coverage performance by placing new sensors in their precalculated locations in each iteration. However, mobile sensors are assumed to be static after they move to their designated locations. Therefore, sensors cannot dynamically adjust the network topology to maintain coverage performance in case of sensor malfunction or battery depletion.
The authors of a previous work [6] proposed a centralized algorithm that can determine uncovered positions by constructing the kth order Voronoi diagram of sensors. They designed a scheme to obtain the maximum subset of the relocatable sensors to repair the uncovered region. However, this scheme only moves the redundant sensors, which goes against the requirement of even deployment.
Compared with these previous studies, our work has two major contributions: (1) it addresses the problem of maximizing the k-coverage in a network with a certain number of mobile sensors and (2) we propose two novel schemes that move the sensors in an autonomous and distributed manner. In our schemes, a sensor only considers the local topological information and then conducts the movement in the local area.
3. Preliminaries
In this section, we introduce the network model, problem statement, and definitions that we use throughout this paper. Some notations are also listed in Table 1.
Notations.
3.1. Network Model
Consider that n sensors with uniform sensing and communication radius are randomly deployed in region Ω, which is convex and obstacle-free. The coverage and communication of sensors are defined by both 0-1 binary models. Sensors are also aware of their locations, which can be obtained using some localization techniques, such as range-based and range-free location schemes [13, 14].
In this paper, we focus on maximizing k-coverage deployment, which can be divided into two steps, namely, k-coverage detection and k-coverage redeployment. The former aims to detect the coverage holes that are not covered at any point by at least k sensors, while the latter aims to determine the optimal locations for mobile sensors such that k-coverage deployment can be achieved.
3.2. Definitions
Definition 1 (1-coverage).
If each point p within Ω can be monitored by at least one sensor, this is called 1-coverage. In other words, the shortest Euclidean distance between point p and any sensor is no more than sensing radius
Definition 2 (k-coverage).
If each point p within Ω can be monitored by at least k sensors, this is called k-coverage. Similarly, the above description can be formulated as [4]
Definition 3 (Voronoi polygon).
The Voronoi polygon
Definition 4 (kth order Voronoi polygon).
The kth order Voronoi polygon
Definition 5 (kth farthest point of
).
Suppose
Definition 6 (Voronoi diagram).
The Voronoi diagram is a kind of decomposition of a given 2D space, consisting of a series of Voronoi polygons. Figure 1 shows two examples of the Voronoi diagram. These are given by

Voronoi diagrams.
4. Algorithm
In this section, we use the properties of the kth order Voronoi diagram to solve the coverage detection problem raised in Section 3. We also propose two different distributed self-deployment approaches to obtain the optimal locations for mobile sensors.
4.1. k-Coverage Detection
Most previous studies on the 1-coverage problem use the Voronoi diagram to detect a coverage hole and estimate its size [17, 18]. According to the property of the Voronoi diagram, each point within a Voronoi polygon is the closest to just one Voronoi site that lies within this polygon, as shown in Figure 1(a). Therefore, if the sensing disk of a sensor cannot cover its Voronoi polygon, a coverage hole exists in this polygon. As can be seen from Figures 1(a) and 1(b), the number of 2nd order Voronoi polygons is larger. Moreover, the number of polygons increases while the coverage degree increases. Second, in a higher coverage degree situation, it is hard to find the target sensors corresponding to the polygon and to check whether the sensing disks of sensors can cover the polygons. Due to the complexity of the k-coverage problem, it is difficult to accurately calculate the size of a coverage hole in Ω using the kth order Voronoi diagram; it is also difficult to detect all the coverage holes accurately. Definition 2 provides an approximate way to solve this problem. If the region Ω is k-covered, an arbitrary point within Ω is covered by at least k sensors. In other words, if there is a subset of points in Ω that cannot satisfy k-coverage requirement, the entire region Ω is thereby not k-covered. Moreover, it has been proved that the possibility of the farthest points that are not k-covered is higher than that of any other point, and the kth farthest points of the kth order Voronoi polygons are in the vertices set of these polygons [6]. Therefore, we select a particular point set that consists of vertices of all kth order Voronoi polygons and boundary intersections in order to check the coverage degree of each point within it. If any uncovered point exists, sensors decide the optimal locations to move in the k-coverage redeployment phase; otherwise, they evaluate the coverage rate. However, although the vertices of all Voronoi polygons are k-covered, some points within the polygons may still not be k-covered. Therefore, we propose an approach based on grid to evaluate the coverage rate, which is defined as the percentage of the grid monitored by at least k sensors [19].
In the coverage detection stage, each sensor first broadcasts its location and receives information from its neighbor sensors, based on which its local kth order Voronoi diagram can be constructed. In order to detect the uncovered point, the sensor calculates the coverage degree of each vertex of the kth order Voronoi polygons and the boundary intersection points, which is equal to the number of sensors that cover the referred point. The points with coverage degrees lower than k are selected to constitute the uncovered point set U.
In some cases, the local kth order Voronoi polygons of the sensors are well covered, since the local sensor density is high in initial deployment, resulting in the immobility of sensors located inside the clusters. However, there are still some subregions that cannot meet the coverage requirement. To deal with this problem, we propose a preprocessing scheme that only runs in the first round to scatter the sensors. To begin with, each sensor checks whether it is redundant. If a sensor is a redundant one, its uncovered point set is null. These uncovered points located in the sensor's sensing disk are k-covered. Thus, it will conduct a randomized process to select a random position within the monitor region as its destination.
4.2. k-Coverage Redeployment
For the following phase, we design two k-coverage redeployment algorithms to move sensors from the dense region to spare region to maximize the sensing coverage.
We design specific rules to guide the movement of the sensors. First, without decreasing the k-coverage rate of a currently monitored region, movements of the relocatable sensors are supposed to be toward an uncovered area. Second, when determining the target location, each sensor should avoid increasing the sensor density of the local area because of its movement. Considering these rules, movement strategies are proposed to address the k-coverage redeployment problem.
4.2.1. The Minimum Covered Circle Based Algorithm (MCCA)
Based on the concept of the smallest enclosing disk, we propose a novel distributed deployment algorithm that guides sensors to move closer toward uncovered points. This is called the minimum covered circle based algorithm (MCCA) and can determine the optimal location if the uncovered point is detected (see Algorithm 2). This location is at the center of the smallest circle, which can cover both uncovered points and those within the sensing disk of the sensor that are not k-covered. The distributed algorithm has four main steps described below.
Determine the target uncovered point of sensor Generate the point set M. Once sensor Calculate the optimal position for sensor Check the optimal location. Once the optimal location of sensor
(1) (2) (3) calculate the circle (4) (5) record it; (6) choose one with minimum radius and assign the value to (7) (8) (9) (10) (11) (12) (13) calculate the circumcircle (14) (15) record it; and (16) Choose one with minimum radius and assign the value to
(1) Generate the moving target point v; (2) Generate the point set M; (3) (4) calculate the minimum circle (5) (6) (7) (8) (9) Check the target location and determine the final location.
4.2.2. The Geometric Center-Based Algorithm (GCA)
Similar to MCCA, the geometric center-based algorithm (GCA) is another form of the movement strategy; it determines the optimal location by calculating the geometric center of the convex hull of the point set. The algorithm (Algorithm 3) also has four main steps as listed below.
Determine the target point of sensor Generate the point set M. This is also the same as that used in the MCCA. Calculate the optimal positions of sensors. After collecting the local topological information, sensors Check the optimal location. This is also the same as that used in the MCCA.
(1) Calculate the convex hull of the set anti-clock order; (2) Divide the convex hull with m sides into (3) Calculate the area and the center of gravity of these triangles (4) Calculate the center of gravity of the convex hull
5. Performance Evaluation
In this section, we chose the sensor coverage rate and the average moving distance as performance metrics in order to validate the previous analysis of the proposed algorithms. Coverage is a significant measurement used to evaluate the quality of a WSN. Furthermore, the objective of the sensor deployment scheme is to maximize the sensing coverage and minimize the number of sensors while maintaining a certain degree of sensing coverage. The cost of constructing a WSN contains the sensor cost and the energy consumption. During the deployment stage, sensor networks usually consume a large amount of energy due to the movements of mobile sensors. Thus, we also consider the average moving distance to validate the performance of our deployment schemes.
The performance evaluation parameters we consider include sensor density and coverage level. In the experiments, we randomly deploy different numbers of sensors in the monitored area under two coverage levels. Moreover, we also consider various field sizes to validate the availability of our algorithm. Without loss of generality, we execute our schemes under two different sensor deployment scenarios, namely, normal deployment and uneven deployment.
The region size is 100 m * 100 m, and the sensing radius and communication radius are 10 m and 20 m, respectively.
5.1. Coverage
We randomly deploy different numbers of sensors in the monitored region under the two coverage levels. The initial coverage of the sensor networks is shown in Figure 2. Compared with static sensor deployment, our distributed self-deployment algorithms can deploy less mobile sensors while achieving the same coverage requirement. In Figure 3(a), the initial coverage of the target area with 90 randomly deployed sensors is 73%, while the target area can reach 91% coverage using our algorithms. To reach the same coverage, about 155 static sensors are needed.

Coverage rate under different k-covered requirements.

Coverage rate under the 2-coverage level.
5.1.1. 2-Coverage Level
In this section, we randomly deploy 4 different numbers of sensors ranging from 90 to 120, in increments of 10 sensors under a coverage level

Moving distance under the 2-coverage level.
As can be seen from Figures 3(a) and 3(b), both MCCA and GCA perform better compared with the Shen and Wu algorithm under random deployment. This is because the Shen and Wu algorithm, which repairs the uncovered region by moving only the redundant sensors, can only evenly distribute a small number of redundant sensors. In addition, our algorithms exhibit similar performance under higher sensor densities, because the number of deployed sensors is close to the minimum number of sensors required in the monitored region.
In Figures 4(a) and 4(b), we can see that the average moving distance after ten rounds in the Shen and Wu algorithm gradually increases with the increase of sensor number. This is because the percentage of relocatable sensors increases under higher sensor density. In comparison, in our algorithms, the average moving distance under high density deployment is smaller than that of low density deployment. In addition, the average moving distance by GCA is mostly smaller than that of MCCA, because the geometric center calculated by GCA is always located inside the convex hull.
5.1.2. 3-Coverage Level
To evaluate the performance of our algorithms under the 3-coverage level, we consider the monitored region to be a 100 m * 100 m field. Motivated by k-layer coverage [8], we distribute 135, 150, 165, and 180 sensors in the monitored regions. The results are shown in Figures 5 and 6.

Coverage rate under the 3-coverage level.

Moving distance under the 3-coverage level.
Figures 5(a) and 5(b) represent a comparison for the coverage rates among the Shen and Wu algorithm and the GCA and MCCA under different node densities. We can see that our distributed algorithms provide better coverage than the Shen and Wu algorithm even in the deployment scenario. This is expected because our algorithms can fully utilize each mobile sensor in the network to maintain the uncovered region using local topological information.
As indicated in Figures 6(a) and 6(b), the Shen and Wu algorithm has much higher average moving distance under high sensor density; this is because more mobile sensors can move from the dense region to the spare region when the sensor density increases. In contrast, the moving distance in both GCA and MCCA declines with an increase in the amount of deployed sensors. This is mainly due to the fact that some sensors can decide their final locations at the initial stage under high density deployment.
5.2. Field Size
To demonstrate the validity of our distributed algorithm in terms of feasibility in a large-scale network, we varied the scale of the target field from 100 m * 100 m to 300 m * 300 m and considered the scenario in which 115 sensors are randomly deployed into each 100 m * 100 m subregion; each point within the area is monitored by at least 2 sensors. The results of different algorithms after ten rounds are shown in Table 2.
Different scales of the target field.
From Table 2, we can see that the scale of the network has little effect on the performance of our algorithms, because the sensors only communicate with their neighbor sensors and the movements are conducted within the local area. We also notice that the coverage rate shows an ascending trend with the increasing of the network scale. This is because the sensors near the boundary of the subregion have sensing disks that also largely cover what is outside the boundary. Thus, enlarging the network scale can decrease the ratio of sensors near the boundary.
5.3. Deployment
The simulation results in the previous sections demonstrate the availability and effectiveness of our algorithms in normal deployment. In this section, we measure the performance in an uneven deployment scenario, where 120 sensors are randomly distributed in the bottom left quarter area (50 m * 50 m) in region Ω. The coverage rate and average moving distance under different rounds are shown in Figure 7.

Uneven deployment.
Figure 7 indicates that our algorithms can deal efficiently with high-degree clustering in an uneven deployment scenario. The randomized process in the first round facilitates the even deployment of the clustered sensors throughout the entire region. In addition, we notice that in the Shen and Wu algorithm [6] the curve of the coverage is an S-shaped growth curve. This is because the increase in coverage is determined by the number of both the relocation positions and the relocatable sensors. Moreover, in light of the high-degree clustering, the number of relocation positions determined by the kth order Voronoi diagram is far less than that of the relocatable sensors in the first round. After several rounds, the number of relocatable sensors gradually decreases since the distribution of the sensors becomes more even.
6. Conclusion
In this paper, we studied the problem of k-coverage deployment in mobile WSNs. Based on the kth order Voronoi diagram, the target region which is not k-covered under random deployment was detected. We then proposed two distributed self-deployment algorithms to maximize sensing coverage. In simulations, the results validate the performance of the proposed schemes and demonstrate their effectiveness and availability.
In our network model, we assume that coverage and communication of the sensors use the binary model. However, the probabilistic sensing model of the sensors is more practical, thus deserving further study. Also, heterogeneous WSNs and hybrid networks, where both static and mobile sensors are distributed, are also worthy of further study.
Footnotes
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
Acknowledgments
This research is partially supported by research grants from the National Science Foundation of China under Grant nos. 71271148 and 71071105, a National Science Fund for Distinguished Young Scholars of China under Grant no. 70925005, and the Program for Changjiang Scholars and Innovative Research Team in the university (IRT1028).
