Advertisement

Enhanced analysis of border surveillance using intruders’ crossing strategies

  • N. BhalajiEmail author
  • S. Venkatesh
Foundations
  • 16 Downloads

Abstract

External border surveillance has become one of the most trending topics of research today. The problem of automating the detection in a big and Hercules terrains using WSN is one way to do. In first half of the paper, we have focussed on the chess queen-crossing strategy adopted by the intruder in order to cross the international border. In the other half, we have used milky-way deployment strategy of sensors to automate the process of detection to a particular zone and then forwarding that detected information to the nearest base station using homogeneous zone routing protocol. The relationship between the sensor detection and energy balancing is that in our work, the focus is on shifting the load of the task of the sensor node equally thereby reducing the burden of the nodes the energy spent in sensing, detecting and communication of the information regarding the movement of the direction of the intruder to a certain region and the base station deployed in that region is responsible for alerting the border action team to crack down on the unauthorized intruders especially during the night. To achieve this objective, we have classified the monitoring zone called border region into three zones and allocating three base stations for each zones. The simulations of work show that HZR protocol performs better in terms of network lifetime for this application.

Keywords

Intruder Chess queen-crossing strategy Milky-way deployment Base station 

Notes

Compliance with ethical standards

Conflict of interest

The authors declare that they have no conflict of interest.

References

  1. Akyilidz IF, Stuntebeck EP (2006) Wireless Underground sensor networks: research challenges. Ad hoc Netw 4(2006):669–686CrossRefGoogle Scholar
  2. Alkhathami MH (2015) Overview of border control using wireless sensor network. Int J Sci Eng Res 6(3):768–771Google Scholar
  3. Alkhathami M, Alazzawi L, Elkateeb A (2015) Border surveillance and intrusion detection using wireless sensor networks. Int J Adv Eng Technol 8(2):17–29Google Scholar
  4. Bellazreg R, Boudriga N (2013) Border surveillance using sensor based thick-lines. In: IEEE explorer (ICOIN). University of Carthage TunisiaGoogle Scholar
  5. Cayirpunar O, Tavli B, Kadioglu-Urtis E, Uludag S (2017) Optimal mobility patterns of multiple base stations for wireless sensor network lifetime maximization. IEEE Sens J 17(21):7177–7188CrossRefGoogle Scholar
  6. Chakraborty S, Chakraborty S, Nandi S, Karmakar S (2015) Fault resilience in sensor networks: distributed node-disjoint multi-path multi-sink forwarding. J Netw Comput Appl 57:85–101CrossRefGoogle Scholar
  7. Cheng C-F, Wang C-W (2018) The target-barrier coverage problem in wireless sensor networks, ieee transactions on mobile computing. IEEE Trans Mob Comput 17(5):1216–1232CrossRefGoogle Scholar
  8. Ghosha A, Das SK (2008) Coverage and connectivity issues in wireless sensor networks: a survey. Pervasive Mob Comput 4:303–334CrossRefGoogle Scholar
  9. Guerriero F, Violi A, Natalizio E, Loscri V, Costanzo C (2011) Modelling and solving optimal placement problems in wireless sensor networks. Appl Math Model 35(1):230–241MathSciNetCrossRefzbMATHGoogle Scholar
  10. He J, Ji S, Pan Y, Li Y (2011) Reliable and energy efficient target coverage for wireless sensor networks. Tsinghua Sci Technol 16(5):464–474CrossRefGoogle Scholar
  11. Hochbaum DS, Mass W (1985) Approximation schemes for covering and packing problems in image processing and VLSI. ACM J 32(1):130–136MathSciNetCrossRefzbMATHGoogle Scholar
  12. Hung KS, Lui KS (2010) On perimeter coverage in wireless sensor networks. IEEE Trans Wirel Commun 9(7):2156–2164CrossRefGoogle Scholar
  13. Jin Y, Wang L, Jo J-Y, Kim Y, Yang M, Jiang Y (2009) EECCR: an energy-efficient m-coverage and n-connectivity routing algorithm under border effects in heterogeneous sensor networks. IEEE Trans Veh Technol 58(3):1429–1442CrossRefGoogle Scholar
  14. Kershner R (1939) The number of circles covering a set. Am J Math 61(3):665–671MathSciNetCrossRefzbMATHGoogle Scholar
  15. Lazos L, Poovendran R (2006) Stochastic coverage in heterogeneous sensor networks. ACM Trans Sens Netw 2(3):325–358CrossRefGoogle Scholar
  16. Lin J-W, Chen Y-T (2008) Improving the coverage of randomized scheduling in wireless sensor networks. IEEE Trans Wirel Commun 7(12):4807–4812CrossRefGoogle Scholar
  17. Melissen JBM, Schuur PC (1996) Improved coverings of a square with six and eight equal circles. Electron J Comb 3(1):32MathSciNetzbMATHGoogle Scholar
  18. Mostafaei H (2018) Border surveillance with WSN systems in a distributed manner. IEEE Sens J 99:1–10Google Scholar
  19. Mostafaei H, Meybodi MR (2013) Maximizing lifetime of target coverage in wireless sensor networks using learning automata. Wirel Pers Commun 71(2):1461–1477CrossRefGoogle Scholar
  20. Nurmela KJ, Ostergard PRJ (2006) Covering a square with up to 30 equal circles. Laboratory for Theoretical Computer science, Helsinki University of technology, Res Rep. A62, 2000Google Scholar
  21. Said O, Elnashar A (2015) Scaling of wireless sensor network intrusion detection probability: 3D intruders, 3D environments. EURASIP J Wirel Commun Netw 2015:46CrossRefGoogle Scholar
  22. Subir H, Amrita G, Sanjib S, Avishek D, Sipra D (2009) A lifetime enhancing node deployment strategy in WSN. Springer, Berlin, pp 295–397Google Scholar
  23. Tiegang F, Guifa T, Limin H (2014) Deployment strategy of WSN based on minimizing cost per unit area. Comput Commun 38(1):26–35CrossRefGoogle Scholar
  24. Wang Y, Wang X, Xie B, Wang D, Agrawal DP (2008) Intrusion detection in homogeneous and heterogeneous wireless sensor networks. IEEE Trans Mob Comput 7(6):698–711CrossRefGoogle Scholar
  25. Wang Y, Fu W, Agrawal DP (2013) Gaussian versus uniform distribution for intrusion detection in wireless sensor networks. IEEE Trans Parallel Distrib Syst 24(2):342–355CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2019

Authors and Affiliations

  1. 1.SSN College of EngineeringChennaiIndia
  2. 2.SRM Valliammai Engineering CollegeChennaiIndia

Personalised recommendations