2010
DOI: 10.1109/twc.2010.04.081098
|View full text |Cite
|
Sign up to set email alerts
|

Weaving a proper net to catch large objects in wireless sensor networks

Abstract: Wireless sensor networks consist of a large number of sensors and have been broadly used for intrusion detection in surveillance systems. To guarantee detection quality, such networks are usually over-engineered, i.e., more than required sensors are deployed and remain active in order to cover each point in the monitored field with a high probability at any time instance. Existing sensor scheduling schemes based on the point coverage model tightly weave a sensor "net" that is unnecessarily dense. Intuitively, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…In this regard, the higher-order-logic of the Gaussian random variable, developed in (Qasim et al, 2016), can be very helpful. Also, the current approach for the network lifetime would be very useful to investigate the formalization of the optimal detection probability in (Olteanu et al, 2010). Figure 1 The k-set randomized scheduling for (n = 8) nodes and (k = 2) subsets.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this regard, the higher-order-logic of the Gaussian random variable, developed in (Qasim et al, 2016), can be very helpful. Also, the current approach for the network lifetime would be very useful to investigate the formalization of the optimal detection probability in (Olteanu et al, 2010). Figure 1 The k-set randomized scheduling for (n = 8) nodes and (k = 2) subsets.…”
Section: Discussionmentioning
confidence: 99%
“…Few studies address the size and the shape of the intrusion object. For example, the work of (Olteanu et al, 2010) analytically considers the impact of the size and the shape of the intrusion object to analyze the optimal detection probability. More recently, (Wang et al, 2017) has proposed a mathematical framework, called E-HIPA, for an accurate target localization in the spatial domain.…”
Section: Related Workmentioning
confidence: 99%
“…However, the models developed in are based on the assumption that each individual is able to interact with only a few other individuals (generally three or four) in the same vicinity. There are other much related works .…”
Section: Related Workmentioning
confidence: 99%
“…For example, the sensors are assumed to be deployed randomly in the battlefield environment in order to detect the force distribution of opponent armies. Over the past few years, the deployment problem has been paid considerable research attention .…”
Section: Introductionmentioning
confidence: 99%