2019
DOI: 10.1002/dac.3955
|View full text |Cite
|
Sign up to set email alerts
|

Optimal barrier coverage for critical area surveillance using wireless sensor networks

Abstract: Intrusion detection using barrier coverage is one of many applications existed in wireless sensor networks. The main purpose of using barrier coverage is to monitor the borders of a specific area against the intruders that are trying to penetrate this critical area by ensuring the total coverage with a low cost and extending the lifetime of the network, many solutions have been proposed in the literature in order to solve the coverage problem in wireless sensor networks, which became a vital field of research.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 34 publications
(39 reference statements)
0
8
0
Order By: Relevance
“…A similar approach that applies the same strategy for the construction of kbarriers is discussed in [180]. Unlike the approach mentioned above, a relabel-to-front algorithm is applied in the flow graph to generate k-barriers in [181]. In [182], the network is transformed into a bipartite graph and then subsequently to a flow graph.…”
Section: ) the Graph-based Approachesmentioning
confidence: 99%
“…A similar approach that applies the same strategy for the construction of kbarriers is discussed in [180]. Unlike the approach mentioned above, a relabel-to-front algorithm is applied in the flow graph to generate k-barriers in [181]. In [182], the network is transformed into a bipartite graph and then subsequently to a flow graph.…”
Section: ) the Graph-based Approachesmentioning
confidence: 99%
“…Benahmed et al [35] presented an optimal barrier coverage method that minimizes the number of sensor nodes and maximizes the coverage rate in homogeneous WSNs. This method can calculate the minimum number of sensor nodes that cover a 2D area completely.…”
Section: Related Workmentioning
confidence: 99%
“…Thus, as a benchmark, herein, our proposed strategy was compared against three common deployment methods: (a) uniform [82], (b) random [83,84], and (c) a 'ring of fire' type deployment, which is inspired by the expected topology in a border surveillance application, where search resources are arranged to form a single, air-tight, barrier around a point of interest (i.e., the LKP) [53][54][55][56].…”
Section: Comparative Study Against Standard Topologiesmentioning
confidence: 99%
“…Solutions to this problem, however, are not directly applicable to target detection since they assume that the target's initial position is an a priori known, which is not the case during target detection. In barrier coverage [53][54][55][56], the problems addressed are a subset of the preferential coverage problem, where sensors are deployed to create a barrier between two RoIs. However, these, typically, consider sensor deployment within a bounded RoI.…”
Section: Introductionmentioning
confidence: 99%