Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing 2008
DOI: 10.1145/1374618.1374673
|View full text |Cite
|
Sign up to set email alerts
|

Strong barrier coverage of wireless sensor networks

Abstract: Constructing sensor barriers to detect intruders crossing a randomly-deployed sensor network is an important problem. Early results have shown how to construct sensor barriers to detect intruders moving along restricted crossing paths in rectangular areas. We present a complete solution to this problem for sensors that are distributed according to a Poisson point process. In particular, we present an efficient distributed algorithm to construct sensor barriers on long strip areas of irregular shape without any… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
161
0
1

Year Published

2008
2008
2019
2019

Publication Types

Select...
4
4
2

Relationship

2
8

Authors

Journals

citations
Cited by 246 publications
(162 citation statements)
references
References 13 publications
0
161
0
1
Order By: Relevance
“…In trap coverage, coverage holes are allowed to exist as long as the diameters of the holes are bounded. Sensor density estimation for these coverage requirements are derived [14], [4], [16], [5]. The optimal deterministic deployment pattern for 1-coverage is based on triangle lattices, which has been proved in [13].…”
Section: Related Workmentioning
confidence: 99%
“…In trap coverage, coverage holes are allowed to exist as long as the diameters of the holes are bounded. Sensor density estimation for these coverage requirements are derived [14], [4], [16], [5]. The optimal deterministic deployment pattern for 1-coverage is based on triangle lattices, which has been proved in [13].…”
Section: Related Workmentioning
confidence: 99%
“…In this model the coverage operations take place in a way that if the penetration takes place from the width of the under coverage area, the sensors must diagnose them [10]. In barrier coverage the goals are controlled at least by one sensor and all existing goals in that area are under control of that area [11,12].…”
Section: Point Coveragementioning
confidence: 99%
“…Examination of an intruder's ability to navigate through a sensor field undetected is a well studied problem [18]- [22]. Determining if within a belt region an intruder would be detected by at least k sensors is known as the k-Barrier Coverage Problem [23], where the authors proposed algorithms to determine if a region is k-barrier covered, established deployment pattern to guarantee k-barrier coverage, and derived conditions of k-barrier coverage in a randomly deployed sensor network.…”
Section: Related Workmentioning
confidence: 99%