ABSTRACT
Barrier coverage is a critical issue in wireless sensor networks for various battlefield and homeland security applications. The goal is to effectively detect intruders that attempt to penetrate the region of interest. A sensor barrier is formed by a connected sensor cluster across the entire deployed region, acting as a "trip wire" to detect any crossing intruders. In this paper we study how to efficiently improve barrier coverage using mobile sensors with limited mobility. After the initial deployment, mobile sensors can move to desired locations and connect with other sensors in order to create new barriers. However, simply moving sensors to form a large local cluster does not necessarily yield a global barrier. This global nature of barrier coverage makes it a challenging task to devise effective sensor mobility schemes. Moreover, a good sensor mobility scheme should efficiently improve barrier coverage under the constraints of available mobile sensors and their moving range. We first explore the fundamental limits of sensor mobility on barrier coverage and present a sensor mobility scheme that constructs the maximum number of barriers with minimum sensor moving distance. We then present an efficient algorithm to compute the existence of barrier coverage with sensors of limited mobility, and examine the effects of the number of mobile sensors and their moving ranges on the barrier coverage improvement. Both the analytical results and performance of the algorithms are evaluated via extensive simulations.
- }}A. A. Somasundara, A. Ramamoorthy, and M. B. Srivastava, "Mobile element scheduling with dynamic deadlines," IEEE Transactions on Mobile Computing (TMC), vol. 6, no. 4, pp. 1142--1157, 2007. Google ScholarDigital Library
- }}K. Dantu, M. Rahimi, H. Shah, S. Babel, A. Dhariwal, and G. S. Sukhatme, "Robomote: enabling mobility in sensor networks," in Proc. IEEE International Conference in Infomation Processing in Sensor Network(IPSN), 2005. Google ScholarDigital Library
- }}"Khepera robots," http://www.k-team.com.Google Scholar
- }}B. Liu and D. Towsley, "A study on the coverage of large-scale sensor networks," in The 1st IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), 2004.Google Scholar
- }}S. Kumar, T. H. Lai, and A. Arora, "Barrier coverage with wireless sensors," in Proc. ACM International Conference on Mobile Computing and Networking (Mobicom), 2005. Google ScholarDigital Library
- }}B. Liu, O. Dousse, J. Wang, and A. Saipulla, "Strong barrier coverage of wireless sensor networks," in Proc. of The ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2008. Google ScholarDigital Library
- }}A. Chen, T. H. Lai, and D. Xuan, "Measuring and guaranteeing quality of barrier-coverage in wireless sensor networks," in Proc. of The ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2008. Google ScholarDigital Library
- }}A. Saipulla, C. Westphal, B. Liu, and J. Wang, "Barrier coverage of line-based deployed wireless sensor networks," in Proc. of IEEE Conference on Computer Communications (InfoCom), 2009.Google Scholar
- }}G. Yang and D. Qiao, "Barrier infomation coverage with wireless sensor," in Proc. of IEEE Conference on Computer Communications (InfoCom), 2009.Google Scholar
- }}A. Howard, M. Mataric, and G. Sukhatme, "Mobile sensor network deployment using potential fields: A distributed, scalable solution to the area coverage problem," in DARS 02, 2002.Google Scholar
- }}Y. Zou and K. Chakrabarty, "Sensor deployment and target localization based on virtual forces," in Proc. of IEEE Conference on Computer Communications (InfoCom), 2003.Google Scholar
- }}G. Wang, G. Cao, and T. L. Porta, "Movement-assisted sensor deployment," in Proc. of IEEE Conference on Computer Communications (InfoCom), 2004.Google Scholar
- }}S. Chellappan, W. Gu, X. Bai, D. Xuan, B. Ma, and K. Zhang, "Deploying wireless sensor networks under limited mobility constraints," IEEE Transactions on Mobile Computing (TMC), vol. 6, no. 10, pp. 1142--1157, 2007. Google ScholarDigital Library
- }}D. Gage, "Command control for many-robot systems," in Proc. of the Nineteenth Annual AUVS Technical Symposium (AUVS-92), 1992.Google Scholar
- }}S. Meguerdichian, F. Koushanfar, M. Potkonjak, and M. B. Srivastava, "Coverage problems in wireless ad-hoc sensor networks," in Proc. IEEE Conference on Computer Communications (Infocom), 2001, pp. 1380--1387.Google Scholar
- }}S. Meguerdichian, F. Koushanfar, G. Qu, and M. Potkonjak, "Exposure in wireless ad-hoc sensor networks," in ACM Mobile Computing and Networking, 2001, pp. 139--150. Google ScholarDigital Library
- }}X.-Y. Li, P.-J. Wan, and O. Frieder, "Coverage in wireless ad-hoc sensor networks," IEEE Transactions on Computers, vol. 52, no. 6, pp. 753--763, June 2003. Google ScholarDigital Library
- }}G. Veltri, Q. Huang, G. Qu, and M. Potkonjak, "Minimal and maximal exposure path algorithms for wireless embedded sensor networks," in Proc. of ACM Conference on Embedded Networked Sensor Systems (Sensys), 2003. Google ScholarDigital Library
- }}T. Clouqueur, V. Phipatanasuphorn, P. Ramanathan, and K. K. Saluja, "Sensor depolyment strategy for detection of targets traversing a region," ACM Mobile Networks and Applications, vol. 8, pp. 453--461, 2003. Google ScholarDigital Library
- }}H. M. Ammari and S. K. Das, "Coverage and connectivity in three-dimensional wireless sensor networks using percolation theory," IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 6, pp. 872--885, 2009. Google ScholarDigital Library
- }}S. Barr, B. Liu, and J. Wang, "Underwater barriers with sensor networks using auction algorithms," in Proc. of Intl. Conf. on Computer Communications and Networks (ICCCN), 2009.Google Scholar
- }}A. Chen, S. Kumar, and T.-H. Lai, "Designing localized algorithms for barrier coverage," in Proceedings of ACM International Conference on Mobile Computing and Networking (Mobicom), 2007. Google ScholarDigital Library
- }}G. Yang and D. Qiao, "Multi-round sensor deployment for guaranteed barrier coverage," in Proc. IEEE Infocom, 2010. Google ScholarDigital Library
- }}A. Saipulla, B. Liu, and J. Wang, "Barrier coverage with airdropped sensors," in Proc. of IEEE International Conference for Military Communications (MilCom), 2008.Google Scholar
- }}E. Amaldi, A. Capone, M. Cesana, and I. Filippini, "Coverage planning of wireless sensors for mobile target detection," in Proc. of IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), 2008.Google Scholar
- }}C. Shen, W. Cheng, X. Liao, and S. Peng, "Barrier coverage with mobile sensors," in Proc. of IEEE The International Symposium on Parallel Architectures, Algorithms, and Networks (ISPAN), 2008. Google ScholarDigital Library
- }}B. Liu, P. Brass, O. Dousse, P. Nain, and D. Towsley, "Mobility improves coverage of sensor networks," in Proc. of The ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2005. Google ScholarDigital Library
- }}G. Yang, W. Zhou, and D. Qiao, "Defending against barrier intrusions with mobile sensors," in Proc. of IEEE International Conference on Wireless Algorithms, Systems, and Applications (WASA), 2007. Google ScholarDigital Library
- }}R. Tan, G. Xing, J. Wang, and H. C. So, "Exploiting reactive mobility for collaborative target detection in wireless sensor networks," IEEE Transactions on Mobile Computing (TMC), vol. 9, no. 3, pp. 317--332, 2010. Google ScholarDigital Library
- }}G. Xing, J. Wang, Z. Yuan, R. Tan, L. Sun, Q. Huang, X. Jia, and H. C. So, "Mobility-assisted spatiotemporal detection in wireless sensor networks," IEEE Transactions on Parallel and Distributed Systems, preprint 2010. Google ScholarDigital Library
- }}G. Xing, X. Wang, Y. Zhang, C. Lu, R. Pless, and C. D. Gill, "Integrated coverage and connectivity configuration for energy conservation in sensor networks," ACM Transactions on Sensor Networks, no. 1, 2005. Google ScholarDigital Library
- }}P. Shor and J. Yukich, "Minimax grid matching and empirical measures," The Annals of Probability, vol. 19, no. 3, pp. 1338--1348, 1991.Google ScholarCross Ref
- }}T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to Algorithms (Second Edition). MIT Press and McGraw-Hill, 2001. Google ScholarDigital Library
- }}R. Meester and R. Roy, Continuum percolation. Cambridge University Press, 1996.Google ScholarCross Ref
Index Terms
- Barrier coverage with sensors of limited mobility
Recommendations
Barrier coverage with wireless sensors
MobiCom '05: Proceedings of the 11th annual international conference on Mobile computing and networkingIn old times, castles were surrounded by moats (deep trenches filled with water, and even alligators) to thwart or discourage intrusion attempts. One can now replace such barriers with stealthy and wireless sensors. In this paper, we develop theoretical ...
Limited mobility coverage and connectivity maintenance protocols for wireless sensor networks
Coverage and connectivity maintenance is an important research issue in wireless sensor networks, as sensors are deployed randomly over the monitoring region in large numbers. In the post deployment scenario, existing coverage or connectivity of the ...
Barrier coverage with line-based deployed mobile sensors
Barrier coverage of a wireless sensor network is a critical issue in military and homeland security applications, aiming to detect intruders that attempt to cross the deployed region. While a range of problems related to barrier coverage have been ...
Comments