Skip to main content

Build Intrusion Barriers

  • Chapter
  • First Online:
Coverage Control in Sensor Networks

Part of the book series: Computer Communications and Networks ((CCN))

Abstract

Intrusion detection is a typical application in wireless sensor networks. When mobile objects are entering into the boundary of a sensor field or are moving cross the sensor field, they should be detected by the deployed sensors. A mobile object may enter into the sensor field from any point on the field boundary, and its moving trajectory in the sensor field can take arbitrary shapes. Complete area coverage can guarantee that every point of the moving trajectory within the sensor field can be detected. However, providing complete area coverage normally requires a great number of sensors to be deployed. Sometimes, it might not be necessary to detect a moving object at every point on its trajectory. Instead, it might be enough if the object can be detected at least by k distinct sensors before it penetrates through the sensor field. This requires a sensor network to provide k -barrier coverage over a belt field such that any crossing path intersects with the sensing areas of k distinct sensors. A crossing path is a moving trajectory (a continuous curve with arbitrary shape) with the start point on one side of the sensor field and the end point on the opposite side. This chapter discusses the barrier coverage, and the following questions are addressed in this chapter:

What is k -barrier coverage and how to provide k -barrier coverage?

This chapter first summarizes the definition and properties of k-barrier coverage and then discusses the algorithms to provide k barriers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Balister, P., Bollobas, B., Sarkar, A., Kumar, S.: Reliable density estimates for coverage and connectivity in thin strips of finite length. In: ACM the 13th International Conference on Mobile Computing and Networking (MobiCom), pp. 75–86 (2007)

    Google Scholar 

  2. Bhattacharya, B., Burmester, B., Hu, Y., Kranakis, E., Shi, Q., Wiese, A.: Optimal movement of mobile sensors for barrier coverage of a planar region. In: The 2nd International Conference on Combinatorial Optimization and Applications (COCOA), also in LNCS, vol. 5165, pp. 103–115 (2008)

    Google Scholar 

  3. Chen, A., Kumar, S., Lai, T.H.: Designing localized algorithms for barrier coverage. In: ACM the 13th International Conference on Mobile Computing and Networking (MobiCom), pp. 63–74 (2007)

    Google Scholar 

  4. Chen, A., Lai, T.H., Xuan, D.: Measuring and guaranteeing quality of barrier-coverage in wireless sensor networks. In: ACM the 9th International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 421–430 (2008)

    Google Scholar 

  5. ExScal: Extreme scale wireless sensor networking. http://cast.cse.ohio-state.edu/exscal (2008)

  6. Flocchinia, P., Prencipeb, G., Santoro, N.: Self-deployment of mobile sensors on a ring. Journal of Theoretical Computer Science (Elsevier) 402(1), 67–80 (2008)

    Article  Google Scholar 

  7. Grimmett, G.: Percolation. Springer, Berlin (1999)

    MATH  Google Scholar 

  8. Jafari, M.A., Liu, J., Golmohammadi, D.: Network flow formulation of optimal perimeter sensory coverage problem. European Journal of Operational Research (Elsevier) 197(1), 77–83 (2009)

    Article  MATH  Google Scholar 

  9. Kishimoto, W.: A method for obtaining the maximum multiroute flows in a network. Networks 27(4), 279–291 (1996)

    Article  MATH  MathSciNet  Google Scholar 

  10. Kumar, S., Lai, T.H., Arora, A.: Barrier coverage with wireless sensors. In: ACM International Conference on Mobile Computing and Networking (MobiCom), pp. 284–298 (2005)

    Google Scholar 

  11. Kumar, S., Lai, T.H., Arora, A.: Barrier coverage with wireless sensors. Wireless Networks 13(6), 817–834 (2007)

    Article  Google Scholar 

  12. Kumar, S., Lai, T.H., Posner, M.E., Sinha, P.: Optimal sleep-wakeup algorithms for barriers of wireless sensors. In: IEEE the 4th International Conference on Broadband Communications, Networks, and Systems (Broadnets), pp. 1–10 (2007)

    Google Scholar 

  13. Liu, B., Dousse, O., Wang, J., Saipulla, A.: Strong barrier coverage of wireless sensor networks. In: ACM the 9th International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 411–419 (2008)

    Google Scholar 

  14. Saipulla, A., Westphal, C., Liu, B., Wang, J.: Barrier coverage of line-based deployed wireless sensor networks. In: IEEE Infocom, pp. 127–135 (2009)

    Google Scholar 

  15. Schrijver, A.: Combinatorial Optimization. Springer, Berlin (2003)

    MATH  Google Scholar 

  16. Shen, C., Cheng, W., Liao, X., Peng, S.: Barrier coverage with mobile sensors. In: IEEE International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN), pp. 99–104 (2008)

    Google Scholar 

  17. Yang, G., Qiao, D.: Barrier information coverage with wireless sensors. In: IEEE Infocom, pp. 918–926 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bang Wang .

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag London

About this chapter

Cite this chapter

Wang, B. (2010). Build Intrusion Barriers. In: Coverage Control in Sensor Networks. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-84996-059-5_9

Download citation

  • DOI: https://doi.org/10.1007/978-1-84996-059-5_9

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84996-058-8

  • Online ISBN: 978-1-84996-059-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics