Coverage Optimization Strategy for WSN based on Energy-aware

Li Zhu, Chunxiao Fan, Zhigang Wen, Huarun Wu


In order to optimize the wireless sensor network coverage, this paper designs a coverage optimization strategy for wireless sensor network (EACS) based on energy-aware. Under the assumption that the geographic positions of sensor nodes are available, the proposed strategy consists of energy-aware and network coverage adjustment. It is restricted to conditions such as path loss, residual capacity and monitored area and according to awareness ability of sensors, it would adjust the monitored area, repair network hole and kick out the redundant coverage. The purpose is to balance the energy distribution of working nodes, reduce the number of “dead” nodes and balance network energy consumption. As a result, the network lifetime is expanded. Simulation results show that: EACS effectively reduces the number of working nodes, improves network coverage, lowers network energy consumption while ensuring the wireless sensor network coverage and connectivity, so as to balance network energy consumption.


WSN, coverage optimization, energy-aware, hole repair, sensing radius

Full Text:



Mohamadi H., Ismail A.S., Salleh S. (2014); Solving target coverage problem using cover sets n wireless sensor networks based on leraning automata. Wireless Personal Communications, 5(1): 447-463

He S.B. et al. (2013); Barrier coverage in wireless sensor networks: From lined-based to urve-based deployment, Marco A, ed. Proc. of the 32nd IEEE Int'l Conf. on Computer ommunications , 10(9): 470-474

Chen J.M., Li J.K., Lai T.H. (2013): Energy-Efficient intrusion detection with a barrier of robabilistic sensors: Global and local; IEEE Trans. on Wireless Communications, 12(9): 742-4755

Wu K., Gao Y., Li F., Xiao Y. (2005); Light weight deployment aware scheduling for wireless ensor network, ACM/Kluwer Mobile networks and Applications(MONET), 10(6):837-852.

Bulusu N., Heidemann J., Estrin D., Tran T. (2004); Self configuring Localization Systems: esign and Expermiental Evaluation, ACM Transac-tions on Embedded Computing Systems, (1): 24-60.

Khedr A.M., Osamy W. (2011); Minimum perimeter coverage ofquery regions in a heterogeneous ireless sensor network, Information Sciences, 181(15):3130-3142.

La GuilingWang, Guohong Cao T.P.(2006); Movement-assisted SensorDeployment, IEEE ransactions onMobile Computing, 5(6): 640-652.

Y. Yoon (2013); An efficient genetic algorithm for maximum coverage deployment in wireless ensor network, IEEE Transactions on Cybernerics, 45(5):1473-1483.

Giuseppe Anastasi et al(2009); Energy Conservation in Wireless Sensor Networks: A Survey, d Hoc Networks, 7(3) : 537-568.

Martins F.V.C. et al. (2011). A hybrid multiobjective evolutionary approach for improvingthe erformance of wireless sensor networks, IEEE Sensors Journal, 11(3): 545-554.

Wang D, Xie B, Agrawal DP (2008); Coverage and lifetime optimization of wireless sensor etworks with Gaussian distribution, IEEE Trans. on Mobile Computing, 7(12): 1444-1458

Amato G., Chessa S., Gennaro C., Vairo, C. (2011); Efficient detection of composite events n wireless sensor networks: Design and evaluation, Proc. of the IEEE Symp. on Computers nd Communications, 10(11):821-823.

Yourim Y., Yong H.K. (2013); An efficient genetic algorithm for maximum coverage deployment n wireless sensor network, IEEE Transactions on Cybernetics, 45(5): 1473-1483.

Hossain A., Chakrabarti S., Biswas P.K. (2012); Impact of sensing model on wireless network overage, IET Wireless Sensor Systems, 2(3): 272-281.

Mini S., Udgata S.K., Sabat S.L. (2014); Sensor deployment and scheduling for target overage problem in wireless sensor networks, IEEE Sensors Journal, 14(3): 636-644.


Copyright (c) 2017 Li Zhu, Chunxiao Fan, Zhigang Wen, Huarun Wu

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

CC-BY-NC  License for Website User

Articles published in IJCCC user license are protected by copyright.

Users can access, download, copy, translate the IJCCC articles for non-commercial purposes provided that users, but cannot redistribute, display or adapt:

  • Cite the article using an appropriate bibliographic citation: author(s), article title, journal, volume, issue, page numbers, year of publication, DOI, and the link to the definitive published version on IJCCC website;
  • Maintain the integrity of the IJCCC article;
  • Retain the copyright notices and links to these terms and conditions so it is clear to other users what can and what cannot be done with the  article;
  • Ensure that, for any content in the IJCCC article that is identified as belonging to a third party, any re-use complies with the copyright policies of that third party;
  • Any translations must prominently display the statement: "This is an unofficial translation of an article that appeared in IJCCC. Agora University  has not endorsed this translation."

This is a non commercial license where the use of published articles for commercial purposes is forbiden. 

Commercial purposes include: 

  • Copying or downloading IJCCC articles, or linking to such postings, for further redistribution, sale or licensing, for a fee;
  • Copying, downloading or posting by a site or service that incorporates advertising with such content;
  • The inclusion or incorporation of article content in other works or services (other than normal quotations with an appropriate citation) that is then available for sale or licensing, for a fee;
  • Use of IJCCC articles or article content (other than normal quotations with appropriate citation) by for-profit organizations for promotional purposes, whether for a fee or otherwise;
  • Use for the purposes of monetary reward by means of sale, resale, license, loan, transfer or other form of commercial exploitation;

    The licensor cannot revoke these freedoms as long as you follow the license terms.

[End of CC-BY-NC  License for Website User]

INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL (IJCCC), With Emphasis on the Integration of Three Technologies (C & C & C),  ISSN 1841-9836.

IJCCC was founded in 2006,  at Agora University, by  Ioan DZITAC (Editor-in-Chief),  Florin Gheorghe FILIP (Editor-in-Chief), and  Misu-Jan MANOLESCU (Managing Editor).

Ethics: This journal is a member of, and subscribes to the principles of, the Committee on Publication Ethics (COPE).

Ioan  DZITAC (Editor-in-Chief) at COPE European Seminar, Bruxelles, 2015:

IJCCC is covered/indexed/abstracted in Science Citation Index Expanded (since vol.1(S),  2006); JCR2018: IF=1.585..

IJCCC is indexed in Scopus from 2008 (CiteScore2018 = 1.56):

Nomination by Elsevier for Journal Excellence Award Romania 2015 (SNIP2014 = 1.029): Elsevier/ Scopus

IJCCC was nominated by Elsevier for Journal Excellence Award - "Scopus Awards Romania 2015" (SNIP2014 = 1.029).

IJCCC is in Top 3 of 157 Romanian journals indexed by Scopus (in all fields) and No.1 in Computer Science field by Elsevier/ Scopus.


 Impact Factor in JCR2018 (Clarivate Analytics/SCI Expanded/ISI Web of Science): IF=1.585 (Q3). Scopus: CiteScore2018=1.56 (Q2);

SCImago Journal & Country Rank

Editors-in-Chief: Ioan DZITAC & Florin Gheorghe FILIP.