On the vulnerabilities of Voronoi-based approaches to mobile sensor deployment
On the vulnerabilities of Voronoi-based approaches to mobile sensor deployment Abstract Mobile sensor networks are the most promising solution to cover an Area of Interest (AoI) in safety critical scenarios. Mobile devices can coordinate with each other according to a distributed deploymentalgorithm, without resorting to human supervision for device positioning and network configuration. In this paper, we focus on the vulnerabilities of the deployment algorithms based on Voronoi diagrams tocoordinate mobile sensors and guide their movements. We give […]