Skip to main content

Advertisement

Log in

Enhanced analysis of border surveillance using intruders’ crossing strategies

  • Foundations
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

External border surveillance has become one of the most trending topics of research today. The problem of automating the detection in a big and Hercules terrains using WSN is one way to do. In first half of the paper, we have focussed on the chess queen-crossing strategy adopted by the intruder in order to cross the international border. In the other half, we have used milky-way deployment strategy of sensors to automate the process of detection to a particular zone and then forwarding that detected information to the nearest base station using homogeneous zone routing protocol. The relationship between the sensor detection and energy balancing is that in our work, the focus is on shifting the load of the task of the sensor node equally thereby reducing the burden of the nodes the energy spent in sensing, detecting and communication of the information regarding the movement of the direction of the intruder to a certain region and the base station deployed in that region is responsible for alerting the border action team to crack down on the unauthorized intruders especially during the night. To achieve this objective, we have classified the monitoring zone called border region into three zones and allocating three base stations for each zones. The simulations of work show that HZR protocol performs better in terms of network lifetime for this application.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  • Akyilidz IF, Stuntebeck EP (2006) Wireless Underground sensor networks: research challenges. Ad hoc Netw 4(2006):669–686

    Article  Google Scholar 

  • Alkhathami MH (2015) Overview of border control using wireless sensor network. Int J Sci Eng Res 6(3):768–771

    Google Scholar 

  • Alkhathami M, Alazzawi L, Elkateeb A (2015) Border surveillance and intrusion detection using wireless sensor networks. Int J Adv Eng Technol 8(2):17–29

    Google Scholar 

  • Bellazreg R, Boudriga N (2013) Border surveillance using sensor based thick-lines. In: IEEE explorer (ICOIN). University of Carthage Tunisia

  • Cayirpunar O, Tavli B, Kadioglu-Urtis E, Uludag S (2017) Optimal mobility patterns of multiple base stations for wireless sensor network lifetime maximization. IEEE Sens J 17(21):7177–7188

    Article  Google Scholar 

  • Chakraborty S, Chakraborty S, Nandi S, Karmakar S (2015) Fault resilience in sensor networks: distributed node-disjoint multi-path multi-sink forwarding. J Netw Comput Appl 57:85–101

    Article  Google Scholar 

  • Cheng C-F, Wang C-W (2018) The target-barrier coverage problem in wireless sensor networks, ieee transactions on mobile computing. IEEE Trans Mob Comput 17(5):1216–1232

    Article  Google Scholar 

  • Ghosha A, Das SK (2008) Coverage and connectivity issues in wireless sensor networks: a survey. Pervasive Mob Comput 4:303–334

    Article  Google Scholar 

  • Guerriero F, Violi A, Natalizio E, Loscri V, Costanzo C (2011) Modelling and solving optimal placement problems in wireless sensor networks. Appl Math Model 35(1):230–241

    Article  MathSciNet  Google Scholar 

  • He J, Ji S, Pan Y, Li Y (2011) Reliable and energy efficient target coverage for wireless sensor networks. Tsinghua Sci Technol 16(5):464–474

    Article  Google Scholar 

  • Hochbaum DS, Mass W (1985) Approximation schemes for covering and packing problems in image processing and VLSI. ACM J 32(1):130–136

    Article  MathSciNet  Google Scholar 

  • Hung KS, Lui KS (2010) On perimeter coverage in wireless sensor networks. IEEE Trans Wirel Commun 9(7):2156–2164

    Article  Google Scholar 

  • Jin Y, Wang L, Jo J-Y, Kim Y, Yang M, Jiang Y (2009) EECCR: an energy-efficient m-coverage and n-connectivity routing algorithm under border effects in heterogeneous sensor networks. IEEE Trans Veh Technol 58(3):1429–1442

    Article  Google Scholar 

  • Kershner R (1939) The number of circles covering a set. Am J Math 61(3):665–671

    Article  MathSciNet  Google Scholar 

  • Lazos L, Poovendran R (2006) Stochastic coverage in heterogeneous sensor networks. ACM Trans Sens Netw 2(3):325–358

    Article  Google Scholar 

  • Lin J-W, Chen Y-T (2008) Improving the coverage of randomized scheduling in wireless sensor networks. IEEE Trans Wirel Commun 7(12):4807–4812

    Article  Google Scholar 

  • Melissen JBM, Schuur PC (1996) Improved coverings of a square with six and eight equal circles. Electron J Comb 3(1):32

    MathSciNet  MATH  Google Scholar 

  • Mostafaei H (2018) Border surveillance with WSN systems in a distributed manner. IEEE Sens J 99:1–10

    Google Scholar 

  • Mostafaei H, Meybodi MR (2013) Maximizing lifetime of target coverage in wireless sensor networks using learning automata. Wirel Pers Commun 71(2):1461–1477

    Article  Google Scholar 

  • Nurmela KJ, Ostergard PRJ (2006) Covering a square with up to 30 equal circles. Laboratory for Theoretical Computer science, Helsinki University of technology, Res Rep. A62, 2000

  • Said O, Elnashar A (2015) Scaling of wireless sensor network intrusion detection probability: 3D intruders, 3D environments. EURASIP J Wirel Commun Netw 2015:46

    Article  Google Scholar 

  • Subir H, Amrita G, Sanjib S, Avishek D, Sipra D (2009) A lifetime enhancing node deployment strategy in WSN. Springer, Berlin, pp 295–397

    Google Scholar 

  • Tiegang F, Guifa T, Limin H (2014) Deployment strategy of WSN based on minimizing cost per unit area. Comput Commun 38(1):26–35

    Article  Google Scholar 

  • Wang Y, Wang X, Xie B, Wang D, Agrawal DP (2008) Intrusion detection in homogeneous and heterogeneous wireless sensor networks. IEEE Trans Mob Comput 7(6):698–711

    Article  Google Scholar 

  • Wang Y, Fu W, Agrawal DP (2013) Gaussian versus uniform distribution for intrusion detection in wireless sensor networks. IEEE Trans Parallel Distrib Syst 24(2):342–355

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Bhalaji.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Communicated by A. Di Nola.

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bhalaji, N., Venkatesh, S. Enhanced analysis of border surveillance using intruders’ crossing strategies. Soft Comput 23, 10623–10634 (2019). https://doi.org/10.1007/s00500-019-03962-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-019-03962-z

Keywords

Navigation