Proceedings of the 11th Annual International Conference on Mobile Computing and Networking 2005
DOI: 10.1145/1080829.1080859
|View full text |Cite
|
Sign up to set email alerts
|

Barrier coverage with wireless sensors

Abstract: When a sensor network is deployed to detect objects penetrating a protected region, it is not necessary to have every point in the deployment region covered by a sensor. It is enough if the penetrating objects are detected at some point in their trajectory. If a sensor network guarantees that every penetrating object will be detected by at least £ distinct sensors before it crosses the barrier of wireless sensors, we say the network provides £-barrier coverage.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
257
0
1

Year Published

2009
2009
2020
2020

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 489 publications
(264 citation statements)
references
References 20 publications
1
257
0
1
Order By: Relevance
“…Similar to [4]- [7], we define a barrier as a curve in region such that any intrusion path intersects with the curve. We use the following concept as the coverage metric of a barrier.…”
Section: A Optimality Condition For Shortest-barrier-based Placementmentioning
confidence: 99%
See 1 more Smart Citation
“…Similar to [4]- [7], we define a barrier as a curve in region such that any intrusion path intersects with the curve. We use the following concept as the coverage metric of a barrier.…”
Section: A Optimality Condition For Shortest-barrier-based Placementmentioning
confidence: 99%
“…Barrier coverage has recently emerged as an efficient coverage strategy for numerous sensor network applications centered around intruder detection, such as border monitoring and drug interdiction, and has drawn a surge of research interest [4]- [7]. Despite tremendous research efforts on coverage problems for sensor networks [8], those pertaining to radar sensors remain largely unexplored, and this is the main subject of this paper.…”
mentioning
confidence: 99%
“…In fact, it is a very useful approach for intrusion detection. The idea is that sensors need to be deployed to cover only a path that completely crosses the width or height of the monitored field, in order to detect the crossing of a moving object [44]. When planning the expected level of availability, we can define that the network is available as long as the barrier is maintained, even if some visual sensors become faulty.…”
Section: Availability Evaluationmentioning
confidence: 99%
“…Barrier monitoring can be classified in weak and strong [44]. In weak barrier coverage, sensors must detect an object that is moving along congruent paths, while strong barrier coverage would detect any type of movement behavior.…”
Section: Availability Evaluationmentioning
confidence: 99%
“…k-coverage problem has been formulated based on this requirement. In addition, k-barrier coverage [63] is used to detect an object, that penetrates the protected region. In this case, the sensor network would detect each penetrating object by at least k distinct sensors before it crosses the barrier of wireless sensors.…”
Section: Target-based Coverage Solutionsmentioning
confidence: 99%