Annals of Telecommunications

, Volume 72, Issue 3–4, pp 221–232 | Cite as

Activities scheduling algorithms based on probabilistic coverage models for wireless sensor networks

  • Mohammed Boudali
  • Mustapha Reda Senouci
  • Mohamed Aissani
  • Walid-Khaled Hidouci


Area monitoring using Internet and barrier coverage is a typical application of wireless sensor networks. The main concerns in this type of applications are coverage efficiency and sensor energy conservation. For that, many activities scheduling algorithms are proposed in the literature. Unlike prior efforts based on an unrealistic binary sensor coverage model, this paper proposes three efficient activities scheduling algorithms based on realistic sensor coverage models. The first algorithm (C1L-PBC) is centralized and it is based on a coverage graph. The second algorithm (D1L-PBC) is distributed and it ensures 1-barrier coverage; whereas, the third one (D2L-PBC) is also distributed and it guarantees 2-barrier coverage. The obtained experimental results show that the proposed algorithms can effectively guarantee the barrier coverage and prolong the sensor network lifetime.


Wireless sensor networks Barrier coverage Intrusion detection Activities scheduling algorithms Network lifetime 


  1. 1.
    Mirsadeghi M, Mahani A (2015) Energy efficient fast predictor for WSN-based target tracking. Ann Telecommun 70(1–2):63–71CrossRefGoogle Scholar
  2. 2.
    Wang B (2010) Coverage control in sensor networks. Springer, LondonGoogle Scholar
  3. 3.
    Kumar S et al. (2007) Optimal sleep-wake-up algorithms for barriers of wireless sensors. in Broadband Communications, Networks and Systems, 2007. BROADNETS 2007. Fourth International Conference on. IEEEGoogle Scholar
  4. 4.
    Kumar S, Lai TH, Arora A (2005) Barrier coverage with wireless sensors. In Proceedings of the ACM 11th annual international conference on Mobile computing and networkingGoogle Scholar
  5. 5.
    Kumar S (2006) Foundations of coverage in wireless sensor networks. The Ohio State UniversityGoogle Scholar
  6. 6.
    Chen A, Kumar S, Lai TH (2007) Designing localized algorithms for barrier coverage. in Proceedings of the 13th annual ACM international conference on Mobile computing and networking. ACMGoogle Scholar
  7. 7.
    Shen C et al. (2008) Barrier coverage with mobile sensors. in Parallel Architectures, Algorithms, and Networks, 2008. I-SPAN 2008. International Symposium on. IEEEGoogle Scholar
  8. 8.
    Saipulla A, Liu B, Wang J (2008) Barrier coverage with airdropped wireless sensors. in Military Communications Conference, 2008. MILCOM 2008. IEEEGoogle Scholar
  9. 9.
    Bhattacharya B et al (2009) Optimal movement of mobile sensors for barrier coverage of a planar region. Theor Comput Sci 410(52):5515–5528MathSciNetCrossRefMATHGoogle Scholar
  10. 10.
    Ssu K-F et al (2009) K-barrier coverage with a directional sensing model. International Journal on Smart Sensing and Intelligent Systems 2(1):75–93Google Scholar
  11. 11.
    Ban D et al. (2011) Distributed scheduling algorithm for barrier coverage in wireless sensor networks. in Communications and Mobile Computing (CMC), 2011 Third International Conference on. IEEEGoogle Scholar
  12. 12.
    Yang T, Fan P, Mu D (2011) Sliding the barriers in wireless sensor networks. in Computing, Control and Industrial Engineering (CCIE), 2011 I.E. 2nd International Conference on. IEEEGoogle Scholar
  13. 13.
    Yamamoto K et al. (2011) Barrier Coverage Constructions for Border Security Systems Using Wireless Sensors. in Parallel Processing Workshops (ICPPW), 2011 40th International Conference on. IEEEGoogle Scholar
  14. 14.
    Tao D et al. (2011) Strong Barrier Coverage Using Directional Sensors with Arbitrarily Tunable Orientations. in Mobile Ad-hoc and Sensor Networks (MSN), 2011 Seventh International Conference on. IEEEGoogle Scholar
  15. 15.
    Cao Y et al. (2011) Local maximum lifetime algorithms for strong k-barrier coverage with coordinated sensors. in Communication Software and Networks (ICCSN), 2011 I.E. 3rd International Conference on. IEEEGoogle Scholar
  16. 16.
    Chen J, Li J, Lai TH (2013) Energy-efficient intrusion detection with a barrier of probabilistic sensors: global and local. Wireless Communications, IEEE Transactions on 12(9):4742–4755CrossRefGoogle Scholar
  17. 17.
    Du J et al (2013) Maximizing the lifetime of k-discrete barrier coverage using mobile sensors. Sensors Journal, IEEE 13(12):4690–4701CrossRefGoogle Scholar
  18. 18.
    Deng X et al. (2013) Mending barrier gaps via mobile sensor nodes with adjustable sensing ranges. in Wireless Communications and Networking Conference (WCNC), 2013 IEEE. IEEEGoogle Scholar
  19. 19.
    Wang Z et al (2014) Achieving k-barrier coverage in hybrid directional sensor networks. Mobile Computing, IEEE Transactions on 13(7):1443–1455CrossRefGoogle Scholar
  20. 20.
    Zhang X et al. (2015) Multi-objective Optimization of Barrier Coverage with Wireless Sensors. in Evolutionary Multi-Criterion Optimization. SpringerGoogle Scholar
  21. 21.
    Zhao L et al. (2015) Energy efficient barrier coverage in hybrid directional sensor networks. in Wireless Communications & Signal Processing (WCSP), 2015 International Conference on. IEEEGoogle Scholar
  22. 22.
    Yu Z et al. (2015) Local face-view barrier coverage in camera sensor networks. In Computer Communications (INFOCOM), 2015 I. E. Conference on. IEEE. doi: 10.1109/INFOCOM.2015.7218437
  23. 23.
    Senouci MR, Mellouk A, Oukhellou L, Aissani A (2012) An evidence-based sensor coverage model. IEEE Commun Lett 16(9):1462–1465Google Scholar
  24. 24.
    Senouci MR, Mellouk A, Senouci MA, Oukhellou L (2014) Belief functions in telecommunications and network technologies: an overview. Ann Telecommun 69(3–4):135–145Google Scholar
  25. 25.
    Levis P, Gay D (2009) TinyOS programming. Cambridge University PressGoogle Scholar
  26. 26.
    Levis P et al. (2003) TOSSIM: Accurate and scalable simulation of entire TinyOS applications. in Proceedings of the 1st international conference on Embedded networked sensor systems. ACMGoogle Scholar

Copyright information

© Institut Mines-Télécom and Springer-Verlag France 2017

Authors and Affiliations

  • Mohammed Boudali
    • 1
  • Mustapha Reda Senouci
    • 1
  • Mohamed Aissani
    • 1
  • Walid-Khaled Hidouci
    • 2
  1. 1.Ecole Militaire Polytechnique (EMP)AlgiersAlgeria
  2. 2.Ecole nationale Supérieure d’Informatique d’Alger (E.S.I)AlgiersAlgeria

Personalised recommendations