Skip to main content

Constructing Underwater Weak k-Barrier Coverage

  • Conference paper
  • First Online:
IoT as a Service (IoTaaS 2018)

Abstract

Most achievements on barrier coverage are based on an assumption that the sensors composing the barrier coverage are finally connected as a two-dimensional (2D) terrestrial wireless sensor network, where a barrier is a chain of sensors from one end of the deployment region to the other end with overlapping sensing zones of adjacent sensors. However, the 2D assumption cannot directly be applied in three-dimensional (3D) application scenarios, e.g., underwater wireless sensor networks, where sensors are finally distributed over 3D underwater environment. In this paper, we investigate weak k-barrier coverage problem in underwater wireless sensor networks. We first analyse how to construct 3D underwater weak k-barrier coverage with minimum sensors, then we propose a parallel movement manner, based on which an effective algorithm is proposed for constructing weak k-barrier coverage with minimum sensors while minimizing the total movement distance of all sensors in underwater wireless sensor networks. Extensive simulation results validate the correctness of our analysis, and show that the proposed algorithm outperforms the GreedyMatch algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Barr, S.J., Wang, J., Liu, B.: An efficient method for constructing underwater sensor barriers. J. Commun. 6(5), 370–383 (2011)

    Article  Google Scholar 

  2. Das, A.P., Thampi, S.M.: Fault-resilient localization for underwater sensor networks. Ad Hoc Netw. 55, 132–142 (2017)

    Article  Google Scholar 

  3. DeWitt, J., Shi, H.: Barrier coverage in energy harvesting sensor networks. Ad Hoc Netw. 56, 72–83 (2016)

    Google Scholar 

  4. Dobrev, S., et al.: Weak coverage of a rectangular barrier. CoRR abs/1701.07294 (2017). http://arxiv.org/abs/1701.07294

  5. Gage, D.W.: Command control for many-robot systems. Technical report, DTIC Document (1992)

    Google Scholar 

  6. He, S., Gong, X., Zhang, J., Chen, J., Sun, Y.: Barrier coverage in wireless sensor networks: from lined-based to curve-based deployment. In: Proceedings of the IEEE INFOCOM 2013, 4–19 April 2013, Turin, Italy, pp. 470–474 (2013). https://doi.org/10.1109/INFCOM.2013.6566817

  7. Isik, M.T., Akan, O.B.: A three dimensional localization algorithm for underwater acoustic sensor networks. IEEE Trans. Wirel. Commun. 8(9) (2009)

    Google Scholar 

  8. Kershner, R.: The number of circles covering a set. Am. J. Math. 61(3), 665–671 (1939)

    Article  MathSciNet  Google Scholar 

  9. Kuhn, H.W.: The Hungarian method for the assignment problem. Naval Res. Logistics Q. 2(1–2), 83–97 (1955)

    Article  MathSciNet  Google Scholar 

  10. Kumar, S., Lai, T., Arora, A.: Barrier coverage with wireless sensors. In: Proceedings of the 11th Annual International Conference on Mobile Computing and Networking, MOBICOM 2005, 28 August–2 September 2005, Cologne, Germany, pp. 284–298 (2005). https://doi.org/10.1145/1080829.1080859

  11. Li, L., Zhang, B., Shen, X., Zheng, J., Yao, Z.: A study on the weak barrier coverage problem in wireless sensor networks. Comput. Netw. 55(3), 711–721 (2011)

    Article  Google Scholar 

  12. Li, S., Shen, H.: Minimizing the maximum sensor movement for barrier coverage in the plane. In: 2015 IEEE Conference on Computer Communications, INFOCOM 2015, 26 April–1 May 2015, Kowloon, Hong Kong, pp. 244–252 (2015). https://doi.org/10.1109/INFOCOM.2015.7218388

  13. Li, S., Shen, H.: Minimizing the maximum sensor movement for barrier coverage in the plane. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 244–252. IEEE (2015)

    Google Scholar 

  14. Liu, B., Dousse, O., Wang, J., Saipulla, A.: Strong barrier coverage of wireless sensor networks. In: Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2008, 26–30 May 2008, Hong Kong, China, pp. 411–420 (2008). https://doi.org/10.1145/1374618.1374673

  15. Saipulla, A., Liu, B., Xing, G., Fu, X., Wang, J.: Barrier coverage with sensors of limited mobility. In: Proceedings of the 11th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2010, 20–24 September 2010, Chicago, IL, USA, pp. 201–210 (2010). https://doi.org/10.1145/1860093.1860121

  16. Silvestri, S., Goss, K.: Mobibar: an autonomous deployment algorithm for barrier coverage with mobile sensors. Ad Hoc Netw. 54, 111–129 (2017)

    Article  Google Scholar 

  17. Wang, Z., Chen, H., Cao, Q., Qi, H., Wang, Z., Wang, Q.: Achieving location error tolerant barrier coverage for wireless sensor networks. Comput. Netw. 112, 314–328 (2017)

    Article  Google Scholar 

  18. Yang, G., Qiao, D.: Multi-round sensor deployment for guaranteed barrier coverage. In: 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2010, 15–19 March 2010, San Diego, CA, USA, pp. 2462–2470 (2010). https://doi.org/10.1109/INFCOM.2010.5462074

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chuanlin Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shen, W., Zhang, C., Shi, J., Han, R. (2019). Constructing Underwater Weak k-Barrier Coverage. In: Li, B., Yang, M., Yuan, H., Yan, Z. (eds) IoT as a Service. IoTaaS 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 271. Springer, Cham. https://doi.org/10.1007/978-3-030-14657-3_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-14657-3_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-14656-6

  • Online ISBN: 978-3-030-14657-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics