Skip to main content

Fortifying Barrier-Coverage of Wireless Sensor Network with Mobile Sensor Nodes

  • Conference paper
Book cover Wireless Algorithms, Systems, and Applications (WASA 2014)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 8491))

Abstract

Recently, the barrier-coverage of wireless sensor network received huge attention thanks to the important applications such as border protection. In practice, sensor nodes are subject to intermittent failure to detect objects within its sensing range due to many reasons. Therefore, a barrier of sensor nodes may exhibit temporal loopholes. In this paper, we investigate the potential of mobile sensor nodes such as unmanned aerial vehicles and human patrols to fortify the barrier-coverage of static wireless sensors. We use a single variable first-order grey model, GM(1,1), based on the intruder detection history from the sensor nodes to determine which parts of the barrier is more vulnerable. Then, we relocate the available mobile sensor nodes to the identified vulnerable parts of the barrier in a timely manner. We show this relocation strategy is optimal in theory. By the simulations, we also evaluate the average performance of our algorithm.

This paper was jointly supported by National Natural Science Foundation of China under grant 91124001, the Fundamental Research Funds for the Central Universities, and the Research Funds of Renmin University of China 10XNJ032. This work was supported in part by US National Science Foundation (NSF) CREST No. HRD-1345219.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. He, S., Chen, J., Li, X., Shen, X., Sun, Y.: Cost-effective Barrier Coverage by Mobile Sensor Networks. In: Proc. of the 31th Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM (2012)

    Google Scholar 

  2. Chen, A., Kumar, S., Lai, T.H.: Designing Localized Algorithms for Barrier Coverage. In: Proc. of the 13th ACM Annual International Conference on Mobile Computing and Networking, Mobicom (2007)

    Google Scholar 

  3. Kumar, S., Lai, T., Arora, A.: Barrier Coverage with Wireless Sensors. In: Proc. of the 11th ACM Annual International Conference on Mobile Computing and Networking, Mobicom (2005)

    Google Scholar 

  4. Mao, M., Chirwa, E.C.: Application of Grey Model GM (1, 1) to Vehicle Fatality Risk Estimation. Technological Forecasting and Social Change 73(5), 588–605 (2006)

    Article  Google Scholar 

  5. Zhanfeng, Z.: Forecast Model of Logistics on Central Plains area Based on Gray System Theory. Industrial Technology Economy 27(3), 73–76 (2008)

    Google Scholar 

  6. Fang, X., Fang, J.: Human Motion Tracking Based on Adaptive Template Matching and GM (1,1). In: Proc. of 2009 International Workshop on Intelligent Systems and Applications, ISA (2009)

    Google Scholar 

  7. Xiao, L., Peng, X., Wang, Z., Xu, B., Hong, P.: Research on Traffic Monitoring Network and its Traffic Flow Forecast and Congestion Control Model Based on Wireless Sensor Networks. In: Proc. of the 3rd International Conference on Measuring Technology and Mechatronics Automation, ICMTMA (2009)

    Google Scholar 

  8. Soni, S.K., Chand, N., Singh, D.P.: Reducing the Data Transmission in WSNs using Time Series Prediction Model. In: Proc. of IEEE International Conference on Signal Processing, Computing and Control, ISPCC (2012)

    Google Scholar 

  9. Saipulla, A., Liu, B., Xing, G., Fu, X., Wang, J.: Barrier Coverage with Sensors of Limited Mobility. In: Proc. of the 11th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 201–210 (2010)

    Google Scholar 

  10. Zhang, H., Hou, J.C.: Maintaining Sensing Coverage and Connectivity in Large Sensor Networks. Ad Hoc Sensor Wireless Network 1(1-2), 89–124 (2005)

    Google Scholar 

  11. Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 2nd edn. MIT Press and McGraw-Hill (2001)

    Google Scholar 

  12. Cheng, S., Li, J., Cai, Z.: O(ε)-Approximation to Physical World by Sensor Networks. In: Proc. of the 32nd Annual IEEE International Conference on Computer Communications, IEEE INFOCOM (2013)

    Google Scholar 

  13. Cai, Z., Ji, S., Li, J.: Data Caching-based Query Processing in Multi-sink Wireless Sensor Networks. International Journal of Sensor Networks (IJSN) 11(2), 109–125 (2009)

    Article  Google Scholar 

  14. Li, J., Cheng, S., Gao, H., Cai, Z.: Approximate Physical World Reconstruction Algorithms in Sensor Networks. IEEE Transactions on Parallel and Distributed Systems, TPDS (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Xu, B., Kim, D., Li, D., Lee, J., Jiang, H., Tokuta, A.O. (2014). Fortifying Barrier-Coverage of Wireless Sensor Network with Mobile Sensor Nodes. In: Cai, Z., Wang, C., Cheng, S., Wang, H., Gao, H. (eds) Wireless Algorithms, Systems, and Applications. WASA 2014. Lecture Notes in Computer Science, vol 8491. Springer, Cham. https://doi.org/10.1007/978-3-319-07782-6_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07782-6_34

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07781-9

  • Online ISBN: 978-3-319-07782-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics