Advertisement

An Efficient Algorithm for Constructing Underwater Sensor Barrier

  • Weiqiang Shen
  • Chuanlin Zhang
  • Min-Rong Chen
  • Jinglun Shi
  • Guo-Qiang Zeng
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 237)

Abstract

Most existing works on barrier coverage assume that sensors are deployed in a two-dimensional (2D) long thin belt region, where a barrier is a chain of sensors from one end of the region to the other end with overlapping sensing zones of adjacent sensors. However, 2D sensor barrier construction mechanism cannot be directly applied to three-dimensional (3D) sensor barrier construction problem, such as underwater sensor barrier construction, where sensors are finally distributed over a 3D space. In this paper, we investigate how to efficiently construct an underwater sensor barrier with minimum mobile sensors while reducing energy consumption. We first determine the minimum number of sensors needed for an underwater sensor barrier construction. Furthermore, we analyse the relationship between the initial locations of sensors and the optimal location of the underwater sensor barrier, based on which we derive the optimal final locations for all sensors. Finally, we propose an efficient algorithm to move sensors from their initial locations to final locations. Extensive simulations show that, compared with HungarianK approach, the proposed algorithm costs shorter running time and similar maximum movement distance of any one sensor.

Keywords

Underwater sensor barrier Wireless sensor network Deployment algorithm 

Notes

Acknowledgements

The authors would like to thank the referees whose insightful comments have helped improve the presentation of this paper significantly. This work was supported in part by Major Omnibus Reform Project (Information and Computing Science) of China under Grant No. 82616611, National Science Foundation of China under Grant Nos. 61373158 and 61671213, Guangzhou Key Lab of Body Data Science under Grant No. 201605030011, and Zhejiang Provincial Natural Science Foundation of China under Grant Nos. LY16F030011 and LZ16E050002.

References

  1. 1.
    Wang, B.: Coverage problems in sensor networks: a survey. ACM Comput. Surv. (CSUR) 43, 1–53 (2011)CrossRefGoogle Scholar
  2. 2.
    Wang, Z., Chen, H., Cao, Q., Qi, H., Wang, Z., Wang, Q.: Achieving location error tolerant barrier coverage for wireless sensor networks. Comput. Netw. 112, 314–328 (2017)CrossRefGoogle Scholar
  3. 3.
    Silvestri, S., Goss, K.: MobiBar: an autonomous deployment algorithm for barrier coverage with mobile sensors. Ad Hoc Netw. 54, 111–129 (2017)CrossRefGoogle Scholar
  4. 4.
    Paul, B., Béla, B., Amites, S.: Barrier coverage. Random Struct. Algorithms 49, 429–478 (2016)MathSciNetCrossRefzbMATHGoogle Scholar
  5. 5.
    Wu, F., Gui, Y., Wang, Z., Gao, X., Chen, G.: A survey on barrier coverage with sensors. Front. Comput. Sci. 10, 968–984 (2016)CrossRefGoogle Scholar
  6. 6.
    Fan, H., Li, M., Sun, X., Wan, P.J., Zhao, Y.: Barrier coverage by sensors with adjustable ranges. ACM Trans. Sens. Netw. (TOSN) 11, 1–20 (2014)CrossRefGoogle Scholar
  7. 7.
    Liu, B., Dousse, O., Wang, J., Saipulla, A.: Strong barrier coverage of wireless sensor networks. In: Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 411–420 (2008)Google Scholar
  8. 8.
    Wang, Z., Chen, H., Cao, Q., Qi, H., Wang, Z.: Fault tolerant barrier coverage for wireless sensor networks. In: INFOCOM, 2014 Proceedings IEEE, pp. 1869–1877 (2014)Google Scholar
  9. 9.
    Dobrev, S., et al.: Weak coverage of a rectangular barrier. In: Fotakis, D., Pagourtzis, A., Paschos, V.T. (eds.) CIAC 2017. LNCS, vol. 10236, pp. 196–208. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-57586-5_17CrossRefGoogle Scholar
  10. 10.
    He, S., Gong, X., Zhang, J., Chen, J., Sun, Y.: Barrier coverage in wireless sensor networks: from lined-based to curve-based deployment. In: 2013 Proceedings of the IEEE, INFOCOM, pp. 470–474 (2013)Google Scholar
  11. 11.
    Ban, D., Yang, W., Jiang, J., Wen, J., Dou, W.: Energy-efficient algorithms for k-barrier coverage in mobile sensor networks. Int. J. Comput. Commun. Control 5, 616–624 (2016)CrossRefGoogle Scholar
  12. 12.
    DeWitt, J., Shi, H.: Barrier coverage in energy harvesting sensor networks. Ad Hoc Netw. 56, 72–83 (2017)CrossRefGoogle Scholar
  13. 13.
    Marinet: Underwater Port Security System - Intrusion Detection Barrier. http://www.rbtec.com/products/Maritime-Underwater-Security/marinetunderwatersecuritynet
  14. 14.
    Barr, S.J., Wang, J., Liu, B.: An efficient method for constructing underwater sensor barriers. JCM 6, 370–383 (2011)CrossRefGoogle Scholar
  15. 15.
    Barr, S., Liu, B., Wang, J.: Barrier coverage for underwater sensor networks. In: Military Communications Conference MILCOM, pp. 429–478 (2008)Google Scholar
  16. 16.
    Kershner, R.: The number of circles covering a set. Am. J. Math. 61, 665–671 (1939)MathSciNetCrossRefzbMATHGoogle Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018

Authors and Affiliations

  • Weiqiang Shen
    • 1
  • Chuanlin Zhang
    • 1
  • Min-Rong Chen
    • 2
  • Jinglun Shi
    • 3
  • Guo-Qiang Zeng
    • 4
  1. 1.College of Information Science and TechnologyJinan UniversityGuangzhouChina
  2. 2.School of ComputerSouth China Normal UniversityGuangzhouChina
  3. 3.School of Electronic and Information EngineeringSouth China University of TechnologyGuangzhouChina
  4. 4.National-Local Joint Engineering Laboratory of Digitalize Electrical Design TechnologyWenzhou UniversityWenzhouChina

Personalised recommendations