2006
DOI: 10.1007/s11276-006-9856-0
|View full text |Cite
|
Sign up to set email alerts
|

Barrier coverage with wireless sensors

Abstract: When a sensor network is deployed to detect objects penetrating a protected region, it is not necessary to have every point in the deployment region covered by a sensor. It is enough if the penetrating objects are detected at some point in their trajectory. If a sensor network guarantees that every penetrating object will be detected by at least k distinct sensors before it crosses the barrier of wireless sensors, we say the network provides k-barrier coverage. In this paper, we develop theoretical foundations… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

3
381
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 263 publications
(385 citation statements)
references
References 22 publications
3
381
0
Order By: Relevance
“…The problem studied in our paper is motivated by securing an area by ensuring its border surveillance and intruder detection with a wireless sensor system. [10] proposes efficient algorithms to determine, after sensor deployment, whether a region is barrier covered. It also establishes optimal deployment patterns to achieve barrier coverage when deploying sensors deterministically.…”
Section: Related Workmentioning
confidence: 99%
“…The problem studied in our paper is motivated by securing an area by ensuring its border surveillance and intruder detection with a wireless sensor system. [10] proposes efficient algorithms to determine, after sensor deployment, whether a region is barrier covered. It also establishes optimal deployment patterns to achieve barrier coverage when deploying sensors deterministically.…”
Section: Related Workmentioning
confidence: 99%
“…In [9] efficient algorithms are proposed to determine, after sensor deployment, whether a region is barrier covered. It also establishes optimal deployment patterns to achieve barrier coverage when deploying sensors deterministically.…”
Section: Related Workmentioning
confidence: 99%
“…As explained above, this is due to the fact that when R is a curve symmetry plays a significant role. Before ending this section, we observe that, in case the application scenario is border monitoring, the designer is in general interested at deploying a "barrier" of sensors [7], rather than covering a given (one-or two-dimensional) area. We have performed a set of experiments in which we fixed two points, s and d, as the starting and ending points of the border to monitor, and we built a coverage graph G in which two sensors are directly connected iff their covering circles intersect.…”
Section: Simulation Studymentioning
confidence: 99%
“…With this setting, we have investigated the probability of having s and d connected by a path in G when a certain number of sensors are dropped over the sd line segment. This problem is essentially that of 1-barrier covering an arbitrary, but sufficiently wide, belt region, i.e., a region in which the "east-west" bounding curves are distant enough from the line sd (see [7]). Here, however, we require that the connected path joins two well-defined points (s and d) rather than two arbitrary points along the "north-south" bounding curves of the belt region.…”
Section: Simulation Studymentioning
confidence: 99%