Three-dimensional Voronoi Diagram–based Self-deployment Algorithm in IoT Sensor Networks

With the rapid development of 4G/5G technology and the Internet of Things (IoT), data security and privacy problems are becoming more serious. Wireless sensor networks (WSNs), as the main data source of IoT, are an important stage to ensure data availability and data privacy protection. In this paper, a novel deployment algorithm for 3D WSNs based on the Voronoi diagram is proposed. The algorithm uses the characteristics of adjacency and fast partition of the Voronoi diagram to realize fast division of the 3D monitoring area, calculates the center of each Voronoi area as the latest position of node, repeatedly builds the Voronoi diagram to maximize the coverage of the monitoring area, and maximizes the availability and integrity of data. At the same time, the 4G/5G communication technology is used to realize communication between nodes, and data encryption is used to improve data security. An improved algorithm is also proposed to adapt to different deployment conditions. In this paper, data and privacy security are protected from data sources, and the effectiveness of the algorithm is tested by computer simulation.

[1]  Marc Parizeau,et al.  Probabilistic Sensing Model for Sensor Placement Optimization Based on Line-of-Sight Coverage , 2013, IEEE Transactions on Instrumentation and Measurement.

[2]  Klaus Schöffmann,et al.  Learning laparoscopic video shot classification for gynecological surgery , 2018, Multimedia Tools and Applications.

[3]  Liehuang Zhu,et al.  Cross-cluster asymmetric group key agreement for wireless sensor networks , 2018, Science China Information Sciences.

[4]  Jin Li,et al.  Design and theoretical analysis of virtual machine placement algorithm based on peak workload characteristics , 2017, Soft Comput..

[5]  Tan Yu-An,et al.  An extra-parity energy saving data layout for video surveillance , 2018 .

[6]  Laurence T. Yang,et al.  Energy-Efficient Resource Allocation for D2D Communications Underlaying Cloud-RAN-Based LTE-A Networks , 2016, IEEE Internet of Things Journal.

[7]  Tisha Brown,et al.  On wireless video sensor network deployment for 3D indoor space coverage , 2016, SoutheastCon 2016.

[8]  Pascale Minet,et al.  Covering a 3D flat surface with autonomous and mobile wireless sensor nodes , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[9]  Chu-Sing Yang,et al.  Voronoi-based coverage improvement approach for wireless directional sensor networks , 2014, J. Netw. Comput. Appl..

[10]  Xiang Li,et al.  Deploying Three-Dimensional Mobile Sensor Networks Based on Virtual Forces Algorithm , 2012, CWSN.

[11]  Ting-Yu Lin,et al.  Enhanced Deployment Algorithms for Heterogeneous Directional Mobile Sensors in a Bounded Monitoring Area , 2017, IEEE Transactions on Mobile Computing.

[12]  Yu Zhang,et al.  A payload-dependent packet rearranging covert channel for mobile VoIP traffic , 2018, Inf. Sci..

[13]  Xianmin Wang,et al.  Building packet length covert channel over mobile VoIP traffics , 2018, J. Netw. Comput. Appl..

[14]  Sesh Commuri,et al.  Coverage issues in wireless sensor networks , 2006 .

[15]  Chen Liang,et al.  An optimized data hiding scheme for Deflate codes , 2018, Soft Comput..

[16]  Okyay Kaynak,et al.  On Deployment of Wireless Sensors on 3-D Terrains to Maximize Sensing Coverage by Utilizing Cat Swarm Optimization With Wavelet Transform , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[17]  Hui Wang,et al.  A new dynamic firefly algorithm for demand estimation of water resources , 2018, Inf. Sci..

[18]  Jean-Marie Bonnin,et al.  Wireless sensor networks: a survey on recent developments and potential synergies , 2013, The Journal of Supercomputing.

[19]  Chen Liang,et al.  A root privilege management scheme with revocable authorization for Android devices , 2018, J. Netw. Comput. Appl..

[20]  Chen Liang,et al.  Building covert timing channels by packet rearrangement over mobile networks , 2018, Inf. Sci..

[21]  Feng Li,et al.  Autonomous Deployment for Load Balancing $k$-Surface Coverage in Sensor Networks , 2015, IEEE Transactions on Wireless Communications.

[22]  Qing Wang,et al.  Distance metric optimization driven convolutional neural network for age invariant face recognition , 2018, Pattern Recognit..

[23]  Xiaojiang Du,et al.  Achieving Efficient and Secure Data Acquisition for Cloud-Supported Internet of Things in Smart Grid , 2017, IEEE Internet of Things Journal.

[24]  Yuanzhang Li,et al.  DPPDL: A Dynamic Partial-Parallel Data Layout for Green Video Surveillance Storage , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[25]  Chen Liang,et al.  An end-to-end covert channel via packet dropout for mobile networks , 2018, Int. J. Distributed Sens. Networks.

[26]  Murat Ermis,et al.  Positioning and Utilizing Sensors on a 3-D Terrain Part II—Solving With a Hybrid Evolutionary Algorithm , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[27]  Xiaojiang Du,et al.  Privacy-Preserving and Efficient Aggregation Based on Blockchain for Power Grid Communications in Smart Communities , 2018, IEEE Communications Magazine.

[28]  Hang Yang,et al.  A Novel Sensor Deployment Method Based on Image Processing and Wavelet Transform to Optimize the Surface Coverage in WSNs , 2016 .

[29]  Leïla Azouz Saïdane,et al.  Three dimensional mobile wireless sensor networks redeployment based on virtual forces , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).

[30]  Houfeng Wang,et al.  Model approach to grammatical evolution: theory and case study , 2016, Soft Comput..

[31]  George K. Karagiannidis,et al.  Secure Multiple Amplify-and-Forward Relaying With Cochannel Interference , 2016, IEEE Journal of Selected Topics in Signal Processing.

[32]  Weiwei Lin,et al.  An Ensemble Random Forest Algorithm for Insurance Big Data Analysis , 2017, IEEE Access.

[33]  Yung-Chih Chen,et al.  An Efficient Interpolation-Based Projected Sum of Product Decomposition via Genetic Algorithm , 2016, J. Multiple Valued Log. Soft Comput..

[34]  M. Winkler,et al.  Theoretical and practical aspects of military wireless sensor networks , 2023, Journal of Telecommunications and Information Technology.