5,855 research outputs found

    A study of sensor movement and selection strategies for strong barrier coverage

    Get PDF
    Intruder detection and border surveillance are some of the many applications of sensor networks. In these applications, sensors are deployed along the perimeter of a protected area such that no intruder can cross the perimeter without being detected. The arrangement of sensors for this purpose is referred to as the barrier coverage problem in sensor networks. A primary question centering such a problem is: How to achieve barrier coverage? On the other hand, sensor nodes are usually battery-powered and have limited energy. It is critical to design energy-efficient barrier construction schemes while satisfying the coverage requirement. First, we studied how to achieve strong barrier coverage with mobile sensors. We leverage the mobility of sensors and relocate them to designated destinations to form a strong horizontal barrier after the random deployment. Algorithms were proposed to calculate the optimal relocating destinations such that the maximum moving distance of sensors is minimized. Depending on the number of sensors on the final barrier, two problems were investigated: (1) constructing a barrier with the minimum number of sensors on the final barrier, and (2) constructing a barrier with any number of sensors on the final barrier. For both problems, we optimized the barrier location instead of fixing it a priori as other works. We proposed algorithms which first identify a set of discrete candidates for the barrier location, then check the candidates iteratively. Both problems could be solved in polynomial time. Second, we investigated how to achieve strong barrier coverage by selectively activating randomly deployed static sensors. We aimed to select the minimum number of sensors to be active to achieve barrier coverage under a practical probabilistic model. The system false alarm probability and detection probability were jointly considered, and a (P_D^{min}, P_F^{max})-barrier coverage was defined where P_D^{min} is the minimum system detection probability and P_F^{max} is the maximum system false alarm probability. Our analysis showed that with the constraint on the system false alarm probability, the number of active sensors affects the detection capability of sensors, which would bring new challenges to the min-num sensor selection problem. We proposed an iterative framework to solve the sensor selection problem under the probabilistic model. Depending on whether the decision fusion was applied, different detection capability evaluation methods were used in the iterative framework. Finally, we studied how to achieve strong barrier coverage in a hybrid network with a mix of mobile and static sensors. A two-step deployment strategy was adopted where static sensors are first randomly deployed, and then mobile sensors are deployed to merge the coverage gap left by the static sensors. We aimed to find the proper coverage gaps to deploy mobile sensors such that (P_D^{min}, P_F^{max})-barrier coverage is achieved, and the total cost of the barrier is minimized. Under the probabilistic model, we solved the problem by iteratively trying multiple assumptions of the number of active sensors, and obtained the min-cost deployment strategy with the help of graph algorithms

    Belt-Barrier Construction Algorithm for WVSNs

    Get PDF
    [[abstract]]Previous research of barrier coverage did not consider breadth of coverage in Wireless Visual Sensor Networks (WVSNs). In this paper, we consider breadth to increase the Quality of Monitor (QoM) of WVSNs. The proposed algorithm is called Distributed β-Breadth Belt-Barrier construction algorithm (D-TriB). D-TriB constructs a belt-barrier with β breadth to offer β level of QoM, we call β-QoM. D-TriB can not only reduce the number of camera sensors required to construct a barrier but also ensure that any barrier with β-QoM in the network can be identified. Finally, the successful rate of the proposed algorithm is evaluated through simulations.[[incitationindex]]EI[[conferencetype]]國際[[conferencedate]]20120401~20120404[[booktype]]電子版[[iscallforpapers]]Y[[conferencelocation]]Shanghai, Chin

    Barrier Coverage in Wireless Sensor Networks

    Get PDF
    Barrier coverage is a critical issue in wireless sensor networks (WSNs) for security applications, which aims to detect intruders attempting to penetrate protected areas. However, it is difficult to achieve desired barrier coverage after initial random deployment of sensors because their locations cannot be controlled or predicted. In this dissertation, we explore how to leverage the mobility capacity of mobile sensors to improve the quality of barrier coverage. We first study the 1-barrier coverage formation problem in heterogeneous sensor networks and explore how to efficiently use different types of mobile sensors to form a barrier with pre-deployed different types of stationary sensors. We introduce a novel directional barrier graph model and prove that the minimum cost of mobile sensors required to form a barrier with stationary sensors is the length of the shortest path from the source node to the destination node on the graph. In addition, we formulate the problem of minimizing the cost of moving mobile sensors to fill in the gaps on the shortest path as a minimum cost bipartite assignment problem and solve it in polynomial time using the Hungarian algorithm. We further study the k-barrier coverage formation problem in sensor networks. We introduce a novel weighted barrier graph model and prove that determining the minimum number of mobile sensors required to form k-barrier coverage is related with but not equal to finding k vertex-disjoint paths with the minimum total length on the WBG. With this observation, we propose an optimal algorithm and a faster greedy algorithm to find the minimum number of mobile sensors required to form k-barrier coverage. Finally, we study the barrier coverage formation problem when sensors have location errors. We derive the minimum number of mobile sensors needed to fill in a gap with a guarantee when location errors exist and propose a progressive method for mobile sensor deployment. Furthermore, we propose a fault tolerant weighted barrier graph to find the minimum number of mobile sensors needed to form barrier coverage with a guarantee. Both analytical and experimental studies demonstrated the effectiveness of our proposed algorithms

    Achieving Crossed Strong Barrier Coverage in Wireless Sensor Network

    Get PDF
    Barrier coverage has been widely used to detect intrusions in wireless sensor networks (WSNs). It can fulfill the monitoring task while extending the lifetime of the network. Though barrier coverage in WSNs has been intensively studied in recent years, previous research failed to consider the problem of intrusion in transversal directions. If an intruder knows the deployment configuration of sensor nodes, then there is a high probability that it may traverse the whole target region from particular directions, without being detected. In this paper, we introduce the concept of crossed barrier coverage that can overcome this defect. We prove that the problem of finding the maximum number of crossed barriers is NP-hard and integer linear programming (ILP) is used to formulate the optimization problem. The branch-and-bound algorithm is adopted to determine the maximum number of crossed barriers. In addition, we also propose a multi-round shortest path algorithm (MSPA) to solve the optimization problem, which works heuristically to guarantee efficiency while maintaining near-optimal solutions. Several conventional algorithms for finding the maximum number of disjoint strong barriers are also modified to solve the crossed barrier problem and for the purpose of comparison. Extensive simulation studies demonstrate the effectiveness of MSPA

    Comparative Analysis of QoS-Aware Routing Protocols for Wireless Sensor Networks

    Get PDF
    The main ability of wireless sensor networks (WSNs) is communicating and sensing between nodes, which are deployed in a wide area with a large number of nodes. Wireless sensor networks are composed of a large number of sensor nodes with limited energy resources. One critical issue in wireless sensor networks is how to gather sensed information in an energy efficient way, since their energy is limited. The limiting factors of the sensor nodes, such as their finite energy supplies and their moderate processing abilities, as well as the unreliable wireless medium restrict the performance of wireless sensor networks While contemporary best-effort routing approaches address unconstrained traffic, QoS routing is usually performed through resource reservation in a connection-oriented communication in order to meet the QoS requirements for each individual connection. This article surveys a sample of existing QoS-Aware Routing Protocols for Wireless Sensor Networks and highlights their key features, including merits and limitations. Keywords: Wireless sensor networks, Routing protocols, QoS-Aware Routing Protocols

    Data Gathering with Tour Length-Constrained

    Get PDF
    In this paper, given a single mobile element and a time deadline, we investigate the problem of designing the mobile element tour to visit subset of nodes, such that the length of this tour is bounded by the time deadline and the communication cost between nodes outside and inside the tour is minimized. The nodes that the mobile element tour visits, works as cache points that store the data of the other nodes. Several algorithms in the literature have tackled this problem by separating two phases; the construction of the mobile element tour from the computation of the forwarding trees to the cache points. In this paper, we propose algorithmic solutions that alternate between these phases and iteratively improves the outcome of each phase based on the result of the other. We compare the resulting performance of our solutions with that of previous work

    Enforcement and Spectrum Sharing: Case Studies of Federal-Commercial Sharing

    Get PDF
    To promote economic growth and unleash the potential of wireless broadband, there is a need to introduce more spectrally efficient technologies and spectrum management regimes. That led to an environment where commercial wireless broadband need to share spectrum with the federal and non-federal operations. Implementing sharing regimes on a non-opportunistic basis means that sharing agreements must be implemented. To have meaning, those agreements must be enforceable.\ud \ud With the significant exception of license-free wireless systems, commercial wireless services are based on exclusive use. With the policy change facilitating spectrum sharing, it becomes necessary to consider how sharing might take place in practice. Beyond the technical aspects of sharing, that must be resolved lie questions about how usage rights are appropriately determined and enforced. This paper is reasoning about enforcement in a particular spectrum bands (1695-1710 MHz and 3.5 GHz) that are currently being proposed for sharing between commercial services and incumbent spectrum users in the US. We examine three enforcement approaches, exclusion zones, protection zones and pure ex post and consider their implications in terms of cost elements, opportunity cost, and their adaptability
    corecore