Abstract
Intrusion detection is a typical application in wireless sensor networks. When mobile objects are entering into the boundary of a sensor field or are moving cross the sensor field, they should be detected by the deployed sensors. A mobile object may enter into the sensor field from any point on the field boundary, and its moving trajectory in the sensor field can take arbitrary shapes. Complete area coverage can guarantee that every point of the moving trajectory within the sensor field can be detected. However, providing complete area coverage normally requires a great number of sensors to be deployed. Sometimes, it might not be necessary to detect a moving object at every point on its trajectory. Instead, it might be enough if the object can be detected at least by k distinct sensors before it penetrates through the sensor field. This requires a sensor network to provide k -barrier coverage over a belt field such that any crossing path intersects with the sensing areas of k distinct sensors. A crossing path is a moving trajectory (a continuous curve with arbitrary shape) with the start point on one side of the sensor field and the end point on the opposite side. This chapter discusses the barrier coverage, and the following questions are addressed in this chapter:
What is k -barrier coverage and how to provide k -barrier coverage?
This chapter first summarizes the definition and properties of k-barrier coverage and then discusses the algorithms to provide k barriers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Balister, P., Bollobas, B., Sarkar, A., Kumar, S.: Reliable density estimates for coverage and connectivity in thin strips of finite length. In: ACM the 13th International Conference on Mobile Computing and Networking (MobiCom), pp. 75–86 (2007)
Bhattacharya, B., Burmester, B., Hu, Y., Kranakis, E., Shi, Q., Wiese, A.: Optimal movement of mobile sensors for barrier coverage of a planar region. In: The 2nd International Conference on Combinatorial Optimization and Applications (COCOA), also in LNCS, vol. 5165, pp. 103–115 (2008)
Chen, A., Kumar, S., Lai, T.H.: Designing localized algorithms for barrier coverage. In: ACM the 13th International Conference on Mobile Computing and Networking (MobiCom), pp. 63–74 (2007)
Chen, A., Lai, T.H., Xuan, D.: Measuring and guaranteeing quality of barrier-coverage in wireless sensor networks. In: ACM the 9th International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 421–430 (2008)
ExScal: Extreme scale wireless sensor networking. http://cast.cse.ohio-state.edu/exscal (2008)
Flocchinia, P., Prencipeb, G., Santoro, N.: Self-deployment of mobile sensors on a ring. Journal of Theoretical Computer Science (Elsevier) 402(1), 67–80 (2008)
Grimmett, G.: Percolation. Springer, Berlin (1999)
Jafari, M.A., Liu, J., Golmohammadi, D.: Network flow formulation of optimal perimeter sensory coverage problem. European Journal of Operational Research (Elsevier) 197(1), 77–83 (2009)
Kishimoto, W.: A method for obtaining the maximum multiroute flows in a network. Networks 27(4), 279–291 (1996)
Kumar, S., Lai, T.H., Arora, A.: Barrier coverage with wireless sensors. In: ACM International Conference on Mobile Computing and Networking (MobiCom), pp. 284–298 (2005)
Kumar, S., Lai, T.H., Arora, A.: Barrier coverage with wireless sensors. Wireless Networks 13(6), 817–834 (2007)
Kumar, S., Lai, T.H., Posner, M.E., Sinha, P.: Optimal sleep-wakeup algorithms for barriers of wireless sensors. In: IEEE the 4th International Conference on Broadband Communications, Networks, and Systems (Broadnets), pp. 1–10 (2007)
Liu, B., Dousse, O., Wang, J., Saipulla, A.: Strong barrier coverage of wireless sensor networks. In: ACM the 9th International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 411–419 (2008)
Saipulla, A., Westphal, C., Liu, B., Wang, J.: Barrier coverage of line-based deployed wireless sensor networks. In: IEEE Infocom, pp. 127–135 (2009)
Schrijver, A.: Combinatorial Optimization. Springer, Berlin (2003)
Shen, C., Cheng, W., Liao, X., Peng, S.: Barrier coverage with mobile sensors. In: IEEE International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN), pp. 99–104 (2008)
Yang, G., Qiao, D.: Barrier information coverage with wireless sensors. In: IEEE Infocom, pp. 918–926 (2009)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2010 Springer-Verlag London
About this chapter
Cite this chapter
Wang, B. (2010). Build Intrusion Barriers. In: Coverage Control in Sensor Networks. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-84996-059-5_9
Download citation
DOI: https://doi.org/10.1007/978-1-84996-059-5_9
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-84996-058-8
Online ISBN: 978-1-84996-059-5
eBook Packages: Computer ScienceComputer Science (R0)