skip to main content
10.1145/1860093.1860121acmconferencesArticle/Chapter ViewAbstractPublication PagesmobihocConference Proceedingsconference-collections
research-article

Barrier coverage with sensors of limited mobility

Authors Info & Claims
Published:20 September 2010Publication History

ABSTRACT

Barrier coverage is a critical issue in wireless sensor networks for various battlefield and homeland security applications. The goal is to effectively detect intruders that attempt to penetrate the region of interest. A sensor barrier is formed by a connected sensor cluster across the entire deployed region, acting as a "trip wire" to detect any crossing intruders. In this paper we study how to efficiently improve barrier coverage using mobile sensors with limited mobility. After the initial deployment, mobile sensors can move to desired locations and connect with other sensors in order to create new barriers. However, simply moving sensors to form a large local cluster does not necessarily yield a global barrier. This global nature of barrier coverage makes it a challenging task to devise effective sensor mobility schemes. Moreover, a good sensor mobility scheme should efficiently improve barrier coverage under the constraints of available mobile sensors and their moving range. We first explore the fundamental limits of sensor mobility on barrier coverage and present a sensor mobility scheme that constructs the maximum number of barriers with minimum sensor moving distance. We then present an efficient algorithm to compute the existence of barrier coverage with sensors of limited mobility, and examine the effects of the number of mobile sensors and their moving ranges on the barrier coverage improvement. Both the analytical results and performance of the algorithms are evaluated via extensive simulations.

References

  1. }}A. A. Somasundara, A. Ramamoorthy, and M. B. Srivastava, "Mobile element scheduling with dynamic deadlines," IEEE Transactions on Mobile Computing (TMC), vol. 6, no. 4, pp. 1142--1157, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. }}K. Dantu, M. Rahimi, H. Shah, S. Babel, A. Dhariwal, and G. S. Sukhatme, "Robomote: enabling mobility in sensor networks," in Proc. IEEE International Conference in Infomation Processing in Sensor Network(IPSN), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. }}"Khepera robots," http://www.k-team.com.Google ScholarGoogle Scholar
  4. }}B. Liu and D. Towsley, "A study on the coverage of large-scale sensor networks," in The 1st IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), 2004.Google ScholarGoogle Scholar
  5. }}S. Kumar, T. H. Lai, and A. Arora, "Barrier coverage with wireless sensors," in Proc. ACM International Conference on Mobile Computing and Networking (Mobicom), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. }}B. Liu, O. Dousse, J. Wang, and A. Saipulla, "Strong barrier coverage of wireless sensor networks," in Proc. of The ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. }}A. Chen, T. H. Lai, and D. Xuan, "Measuring and guaranteeing quality of barrier-coverage in wireless sensor networks," in Proc. of The ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. }}A. Saipulla, C. Westphal, B. Liu, and J. Wang, "Barrier coverage of line-based deployed wireless sensor networks," in Proc. of IEEE Conference on Computer Communications (InfoCom), 2009.Google ScholarGoogle Scholar
  9. }}G. Yang and D. Qiao, "Barrier infomation coverage with wireless sensor," in Proc. of IEEE Conference on Computer Communications (InfoCom), 2009.Google ScholarGoogle Scholar
  10. }}A. Howard, M. Mataric, and G. Sukhatme, "Mobile sensor network deployment using potential fields: A distributed, scalable solution to the area coverage problem," in DARS 02, 2002.Google ScholarGoogle Scholar
  11. }}Y. Zou and K. Chakrabarty, "Sensor deployment and target localization based on virtual forces," in Proc. of IEEE Conference on Computer Communications (InfoCom), 2003.Google ScholarGoogle Scholar
  12. }}G. Wang, G. Cao, and T. L. Porta, "Movement-assisted sensor deployment," in Proc. of IEEE Conference on Computer Communications (InfoCom), 2004.Google ScholarGoogle Scholar
  13. }}S. Chellappan, W. Gu, X. Bai, D. Xuan, B. Ma, and K. Zhang, "Deploying wireless sensor networks under limited mobility constraints," IEEE Transactions on Mobile Computing (TMC), vol. 6, no. 10, pp. 1142--1157, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. }}D. Gage, "Command control for many-robot systems," in Proc. of the Nineteenth Annual AUVS Technical Symposium (AUVS-92), 1992.Google ScholarGoogle Scholar
  15. }}S. Meguerdichian, F. Koushanfar, M. Potkonjak, and M. B. Srivastava, "Coverage problems in wireless ad-hoc sensor networks," in Proc. IEEE Conference on Computer Communications (Infocom), 2001, pp. 1380--1387.Google ScholarGoogle Scholar
  16. }}S. Meguerdichian, F. Koushanfar, G. Qu, and M. Potkonjak, "Exposure in wireless ad-hoc sensor networks," in ACM Mobile Computing and Networking, 2001, pp. 139--150. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. }}X.-Y. Li, P.-J. Wan, and O. Frieder, "Coverage in wireless ad-hoc sensor networks," IEEE Transactions on Computers, vol. 52, no. 6, pp. 753--763, June 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. }}G. Veltri, Q. Huang, G. Qu, and M. Potkonjak, "Minimal and maximal exposure path algorithms for wireless embedded sensor networks," in Proc. of ACM Conference on Embedded Networked Sensor Systems (Sensys), 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. }}T. Clouqueur, V. Phipatanasuphorn, P. Ramanathan, and K. K. Saluja, "Sensor depolyment strategy for detection of targets traversing a region," ACM Mobile Networks and Applications, vol. 8, pp. 453--461, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. }}H. M. Ammari and S. K. Das, "Coverage and connectivity in three-dimensional wireless sensor networks using percolation theory," IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 6, pp. 872--885, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. }}S. Barr, B. Liu, and J. Wang, "Underwater barriers with sensor networks using auction algorithms," in Proc. of Intl. Conf. on Computer Communications and Networks (ICCCN), 2009.Google ScholarGoogle Scholar
  22. }}A. Chen, S. Kumar, and T.-H. Lai, "Designing localized algorithms for barrier coverage," in Proceedings of ACM International Conference on Mobile Computing and Networking (Mobicom), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. }}G. Yang and D. Qiao, "Multi-round sensor deployment for guaranteed barrier coverage," in Proc. IEEE Infocom, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. }}A. Saipulla, B. Liu, and J. Wang, "Barrier coverage with airdropped sensors," in Proc. of IEEE International Conference for Military Communications (MilCom), 2008.Google ScholarGoogle Scholar
  25. }}E. Amaldi, A. Capone, M. Cesana, and I. Filippini, "Coverage planning of wireless sensors for mobile target detection," in Proc. of IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), 2008.Google ScholarGoogle Scholar
  26. }}C. Shen, W. Cheng, X. Liao, and S. Peng, "Barrier coverage with mobile sensors," in Proc. of IEEE The International Symposium on Parallel Architectures, Algorithms, and Networks (ISPAN), 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. }}B. Liu, P. Brass, O. Dousse, P. Nain, and D. Towsley, "Mobility improves coverage of sensor networks," in Proc. of The ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. }}G. Yang, W. Zhou, and D. Qiao, "Defending against barrier intrusions with mobile sensors," in Proc. of IEEE International Conference on Wireless Algorithms, Systems, and Applications (WASA), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. }}R. Tan, G. Xing, J. Wang, and H. C. So, "Exploiting reactive mobility for collaborative target detection in wireless sensor networks," IEEE Transactions on Mobile Computing (TMC), vol. 9, no. 3, pp. 317--332, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. }}G. Xing, J. Wang, Z. Yuan, R. Tan, L. Sun, Q. Huang, X. Jia, and H. C. So, "Mobility-assisted spatiotemporal detection in wireless sensor networks," IEEE Transactions on Parallel and Distributed Systems, preprint 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. }}G. Xing, X. Wang, Y. Zhang, C. Lu, R. Pless, and C. D. Gill, "Integrated coverage and connectivity configuration for energy conservation in sensor networks," ACM Transactions on Sensor Networks, no. 1, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. }}P. Shor and J. Yukich, "Minimax grid matching and empirical measures," The Annals of Probability, vol. 19, no. 3, pp. 1338--1348, 1991.Google ScholarGoogle ScholarCross RefCross Ref
  33. }}T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to Algorithms (Second Edition). MIT Press and McGraw-Hill, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. }}R. Meester and R. Roy, Continuum percolation. Cambridge University Press, 1996.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Barrier coverage with sensors of limited mobility

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MobiHoc '10: Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing
      September 2010
      272 pages
      ISBN:9781450301831
      DOI:10.1145/1860093

      Copyright © 2010 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 20 September 2010

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate296of1,843submissions,16%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader