Local Event Boundary Detection with Unreliable Sensors: Analysis of the Majority Vote Scheme
In this paper we study the identification of an event region X within a larger region Y, in which the sensors are distributed by a Poisson process of density λ to detect this event region, i.e., its boundary. The model of sensor is a 0-1 sensor that decides whether it lies in X or not, and which might be incorrect with probability p. It also collects information on the 0-1 values of the neighbors within some distance r and revises its decision by the majority vote of these neighbors. In the most general setting, we analyze this simple majority vote scheme and derive some upper and lower bounds on the expected number of misclassified sensors. These bounds depend on several sensing parameters of p, r, and some geometric parameters of the event region X. By making some assumptions on the shape of X, we prove a significantly improved upper bound on the expected number of misclassified sensors; especially for convex regions with sufficiently round boundary.
KeywordsMajority Vote Curve Segment Simple Majority Rule Neighboring Sensor Curvature Constraint
Unable to display preview. Download preview PDF.
- 3.Blaschke, W.: Kreis und Kugel. Zweite Auflage, Walter de Gruyter AG, Berlin (1956)Google Scholar
- 4.Brass, P., Na, H.-S., Shin, C.-S.: Local Event Boundary Detection with Unreliable Sensors: Analysis of the Majority Vote Scheme. CoRR abs/1311.3149 (2013)Google Scholar
- 7.Ding, M., Cheng, X.: Robust Event Boundary Detection in Sensor Networks–A Mixture Model Approach. In: Proc. IEEE INFOCOM 2009, pp. 2991–2995 (2009)Google Scholar
- 9.Jin, G., Nittel, S.: NED: An Efficient Noise-Tolerant Event and Event Boundary Detection Algorithm in Wireless Sensor Networks. In: Proc. 7th Int. IEEE Conference on Mobile Data Management, vol. 153 (2006)Google Scholar
- 15.Matousek, J., Vondrak, J.: Lecture Notes: The Probabilistic Method, pp. 1–71 (2008)Google Scholar
- 21.Wang, Y., Gao, J., Mitchell, J.S.B.: Boundary Recognition in Sensor Networks by Topological Methods. In: Proc. 12th International Conference on Mobile Computing and Networking, pp. 122–133 (2006)Google Scholar