Skip to main content

Barrier Coverage: Foundations and Design

  • Chapter
  • First Online:
The Art of Wireless Sensor Networks

Part of the book series: Signals and Communication Technology ((SCT))

Abstract

The coverage of a wireless sensor network (WSN) characterizes the quality of surveillance that the WSN can provide. A deep understanding of the coverage is of great importance for the deployment, design, and planning of wireless sensor networks. Barrier coverage measures the capability of a wireless sensor network to detect intruders that attempt to cross the deployed region. The goal is to prevent intruders from sneaking through the network undetected. It is a critical issue for many military and homeland security applications. In this chapter we provide a comprehensive survey on the barrier coverage of wireless sensor networks. The main topics include the critical conditions and construction of barrier coverage in a 2-dimensional WSN, the barrier coverage under a line-based sensor deployment scheme, the effect of sensor mobility on barrier coverage, and the barrier coverage for a 3-dimensional underwater sensor network. For each topic we discuss the challenges, fundamental limits, and the solution for the construction of sensor barriers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. B. Liu, O. Dousse, J. Wang, A. Saipulla, Strong barrier coverage of wireless sensor networks, in Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) (2008)

    Google Scholar 

  2. U. Berkeley, M. Co., Tracking vehicles with a uav-delivered sensor network. http://www-bsac.eecs.berkeley.edu/~pister/29Palms0103/

  3. A. Saipulla, B. Liu, J. Wang, Barrier coverage with airdropped sensors, in Proceedings of IEEE MilCom (2008)

    Google Scholar 

  4. A. Saipulla, C. Westphal, B. Liu, J. Wang, Barrier coverage of line-based deployed wireless sensor networks, in Proceedings of the IEEE Conference on Computer Communications (INFOCOM) (2009)

    Google Scholar 

  5. K. Dantu, M. Rahimi, H. Shah, S. Babel, A. Dhariwal, G.S. Sukhatme, Robomote: enabling mobility in sensor networks, in Proceedings of the IEEE International Conference in Infomation Processing in Sensor Network (IPSN) (2005)

    Google Scholar 

  6. Khepera robots. http://www.k-team.com

  7. A. Saipulla, B. Liu, G. Xing, X. Fu, J. Wang, Barrier coverage with sensors of limited mobility. in Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) (2010)

    Google Scholar 

  8. A. Saipulla, B. Liu, J. Wang, Finding and mending barrier gaps in wireless sensor networks, in Proceedings of IEEE Globecom (2010)

    Google Scholar 

  9. S. Barr, J. Wang, B. Liu, An efficient method for constructing underwater sensor barriers. J. Commun. 6(5), 370–383 (2011)

    Google Scholar 

  10. S. Meguerdichian, F. Koushanfar, M. Potkonjak, M.B. Srivastava, Coverage problems in wireless ad-hoc sensor networks, in Proceedings of IEEE Infocom, pp. 1380–1387 (2001)

    Google Scholar 

  11. K. Chakrabarty, S.S. Lyengar, H. Qi, E. Cho, Grid coverage for surveillance and target location in distributed sensor networks. IEEE Trans. Comput. 51, 1448–1453 (2002)

    Article  MathSciNet  Google Scholar 

  12. S. Shakkottai, R. Srikant, N. Shroff, Unreliable sensor grids: coverage, connectivity and diameter, in Proceedings of IEEE Infocom (2003)

    Google Scholar 

  13. X.Y. Li, P.J. Wan, O. Frieder, Coverage in wireless ad-hoc sensor networks. IEEE Trans. Comput. 52(6), 753–763 (2003)

    Article  Google Scholar 

  14. Y. Zou, K. Chakrabarty, Uncertainty-aware and coverage-oriented deployment for sensor networks. J. Parallel Distrib. Comput. 64, 788–798 (2004)

    Article  Google Scholar 

  15. M. Cardei, J. Wu, Energy-efficient coverage problems in wireless ad hoc sensor networks. J. Comput. Commun. 29(4), 413–420 (2006)

    Google Scholar 

  16. Y. Zou, K. Chakrabarty, Distributed mobility management for target tracking in mobile sensor networks. IEEE Trans. Mobile Comput. (TMC) 6(8), 872–887 (2007)

    Article  Google Scholar 

  17. H. Zhang, J. Hou, Maintaining sensing coverage and connectivity in sensor networks, in Proceedings of the Invited Paper in International Workshop on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless and Peer-to-Peer, Networks (2004)

    Google Scholar 

  18. G. Xing, X. Wang, Y. Zhang, C. Lu, R. Pless, C.D. Gill, Integrated coverage and connectivity configuration for energy conservation in sensor networks. ACM Trans. Sens. Netw. 1(1), 36–72 (2005)

    Google Scholar 

  19. H.M. Ammari, S.K. Das, Integrated coverage and connectivity in wireless sensor networks: a two-dimensional percolation problem. ACM Trans. Comput. 57(10), 1423–1434 (2008)

    MathSciNet  Google Scholar 

  20. D. Gage, Command control for many-robot systems, in Proceedings of the Nineteenth Annual AUVS Technical Symposium (AUVS-92) (1992)

    Google Scholar 

  21. B. Liu, D. Towsley, A study on the coverage of large-scale sensor networks, in The 1st IEEE International Conference on Mobile Ad-hoc and Sensor Systems (2004)

    Google Scholar 

  22. C. Shen, W. Cheng, X. Liao, S. Peng, Barrier coverage with mobile sensors, in Proceedings of IEEE the International Symposium on Parallel Architectures, Algorithms, and Networks (ISPAN) (2008)

    Google Scholar 

  23. S. He, J. Chen, X. Li, S. Shen, Y. Sun, Cost effective barrier coverage by mobile sensor networks, in Proceedings of IEEE Infocom (2012)

    Google Scholar 

  24. L. Kong, Y. Zhu, M.Y. Wu, W. Shu, Mobile barrier coverage for dynamic objects in wireless sensor networks, in Proceedings of IEEE MASS (2012)

    Google Scholar 

  25. S. Kumar, T.H. Lai, A. Arora, Barrier coverage with wireless sensors, in Proceedings of ACM Mobicom (2005)

    Google Scholar 

  26. G. Yang, D. Qiao, Barrier information coverage with wireless sensors, in Proceedings of IEEE Infocom (2009)

    Google Scholar 

  27. G. Yang, D. Qiao, Multi-round sensor deployment for guaranteed barrier coverage, in Proceedings of IEEE Infocom (2010)

    Google Scholar 

  28. Y. Wang, G. Cao, Barrier coverage in camera sensor networks, in Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) (2011)

    Google Scholar 

  29. H. Ma, M. Yang, D. Li, Minimum camera barrier coverage in wireless camera sensor networks, in Proceedings of IEEE Infocom (2012)

    Google Scholar 

  30. A. Chen, S. Kumar, T.H. Lai, Designing localized algorithms for barrier coverage. in Proceedings of ACM Mobicom (2007)

    Google Scholar 

  31. A. Chen, T.H. Lai, D. Xuan, Measuring and guaranteeing quality of barrier-coverage in wireless sensor networks, in Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) (2008)

    Google Scholar 

  32. L. Zhang, J. Tang, W. Zhang, Strong barrier coverage with directional sensors, in Proceedings of IEEE Globecom (2009)

    Google Scholar 

  33. M. Franceschetti, O. Dousse, D. Tse, P. Thiran, Closing the gap in the capacity of random wireless networks, in Proceedings of Information Theory Symposium (ISIT) (2004)

    Google Scholar 

  34. G.R. Grimmett, Percolation (Springer, Heidelberg, 1999)

    Google Scholar 

  35. A. Schrijver, Combinatorial Optimization (Springer, Heidelberg, 2003)

    Google Scholar 

  36. T.H. Cormen, C.E. Leiserson, R.L. Rivest, C. Stein, Introduction to Algorithms, 2nd edn. (MIT Press and McGraw-Hill, Cambridge, 2001)

    Google Scholar 

  37. Crossbow Technology INC. http://www.xbow.com/

  38. P. Balister, B. Bollobas, A. Sarkar, S. Kumar, Reliable density estimates for coverage and connectivity in thin strips of finite length, in Proceedings of ACM Mobicom (2007)

    Google Scholar 

  39. E. Gilbert, Random plane networks. J. SIAM 9, 533–543 (1961)

    MATH  Google Scholar 

  40. A.A. Somasundara, A. Ramamoorthy, M.B. Srivastava, Mobile element scheduling with dynamic deadlines. IEEE Trans. Mobile Comput. (TMC) 6(4), 1142–1157 (2007)

    Google Scholar 

  41. A. Howard, M. Mataric, G. Sukhatme, Mobile sensor network deployment using potential fields: a distributed, scalable solution to the area coverage problem, in DARS 02 (2002)

    Google Scholar 

  42. Y. Zou, K. Chakrabarty, Sensor deployment and target localization based on virtual forces, in Proceedings of IEEE Infocom (2003)

    Google Scholar 

  43. G. Wang, G. Cao, T.L. Porta, Movement-assisted sensor deployment, in Proceedings IEEE Infocom (2004)

    Google Scholar 

  44. S. Chellappan, W. Gu, X. Bai, D. Xuan, B. Ma, K. Zhang, Deploying wireless sensor networks under limited mobility constraints. IEEE Trans. Mobile Comput. (TMC) 6(10) 1142–1157 (2007)

    Google Scholar 

  45. B. Liu, P. Brass, O. Dousse, P. Nain, D. Towsley, Mobility improves coverage of sensor networks, in Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) (2005)

    Google Scholar 

  46. P. Shor, J. Yukich, Minimax grid matching and empirical measures. Ann. Probab. 19(3), 1338–1348 (1991)

    Article  MATH  MathSciNet  Google Scholar 

  47. Global submarine proliferation: emerging trends and problems (2008). http://www.nti.org/e_research/e3_74.html

  48. J. Forero, Drug traffic beneath the waves. In: Washington Post, p. A04 (February 6, 2008)

    Google Scholar 

  49. J. Kong, J. Hong Cui, D. Wu, M. Gerla, Building underwater ad-hoc networks and sensor networks for large scale real-time aquatic applications, in Proceedings of IEEE Military Communications Conference (MILCOM) (2005)

    Google Scholar 

  50. C. Gui, P. Mohapatra, Power conservation and quality of surveillance in target tracking sensor networks, in Proceedings of ACM Mobicom (2004)

    Google Scholar 

  51. H. Kühn, The Hungarian Method for the Assignment Problem. Naval Res. Logistics Q. 2, 83–97 (1955)

    Article  Google Scholar 

  52. D. Bertsekas, The auction algorithm: a distributed relaxation method for the assignment problem, vol. 14. (Springer, Heidelberg, 1988)

    Google Scholar 

  53. Encyclopedia britannica online: Surface area, volume, and average depth of oceans and seas (2008). http://www.britannica.com/eb/article-9116157/Surface-area-volume-and-average

  54. Seven miles down: the story of the bathyscaph trieste (2006). http://bjsonline.com/watches/articles/0022_3.shtml

  55. Russia685 (2008). http://www.globalsecurity.org/military/world/russia/685-specs.htm

  56. S. Kirkpatrick, C.D.G., M.P. Vecchi, Optimization by simulated annealing. Science (New Series) 220, 671–680 (1983)

    Google Scholar 

  57. J. Proakis, Digital Communications, 4th edn. (McGraw-Hill, New York, 2000)

    Google Scholar 

Download references

Acknowledgments

This research was supported in parts by the National Science Foundation under grants CNS-0953620 and CNS-1018303.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anwar Saipulla .

Editor information

Editors and Affiliations

Appendix

Appendix

1.1 Proof of Theorem 2

Proof

Consider the relative positions of nodes \(s_i\) and \(s_{i+1}\). Define \(z^x = s^x_{i+1}-s^x_i\) and \(z^y = s^y_{i+1}-s^y_i\). Then \(z^x = \zeta + \delta ^x_{i+1}-\delta ^x_i\) and \(z^y = \delta ^y_{i+1} - \delta ^y_i\). Since the \(\delta ^s\) are Normally distributed with variance \(\sigma ^2\), then \(\delta ^x_{i+1}-\delta ^x_i\) and \(\delta ^y_{i+1} - \delta ^y_i\) are both Normal random variable with variance \(2 \sigma ^2\), i.e., \(z^x \sim N(\zeta ,2\sigma ^2)\) and \(z^y \sim N(0,2\sigma ^2)\).

The distance between \(s_i\) and \(s_{i+1}\) is equal to:

$$\begin{aligned} d_i \mathop {=}\limits ^{\Delta } |s_{i+1}-s_i| = \sqrt{(z^x)^2 + (z^y)^2} \end{aligned}$$
(A.1)

This implies that \(d_i\) follows a Ricean distribution. Since the distribution is identical for all \(i\), we drop the index and denote the distance between two consecutive nodes as \(d\).

In particular, the probability that \(d < \rho \) is given by (see for instance [57], Chap. 2):

$$\begin{aligned} P(d < \rho ) = 1 - Q_1(\frac{\zeta }{\sqrt{2}\sigma },\frac{\rho }{\sqrt{2}\sigma }) \end{aligned}$$
(A.2)

where \(Q_1\) is the Marcum’s Q-function of the first order, defined by:

$$\begin{aligned} Q_1(\frac{\zeta }{\sqrt{2}\sigma },\frac{\rho }{\sqrt{2}\sigma }) = e^{-(\zeta ^2+\rho ^2)/4\sigma ^2} \sum _{k=0}^\infty \left( \frac{\zeta }{\rho }\right) ^k I_k\left( \frac{\zeta \rho }{2 \sigma ^2}\right) \end{aligned}$$
(A.3)

and \(I_k\) is the \(k\)th order modified Bessel function of the first kind.

Thus, two sensors \(s_i\) and \(s_{i+1}\) provide barrier coverage with probability \(P(d < \rho )\). If each pair of sensors \(s_i\) and \(s_{i+1}\) is within \(\rho \) of each other and within \(\rho \) of the boundary, then the sensor deployment provides barrier coverage over the all width of the area. For all \(1 \le i \le n-1\), denote by \(W_i\) the event that \(d_i < \rho \). Denote by \(W^b_0\) the event that \(s_1\) is within distance \(\rho \) of the boundary \(x=0\), and \(W^b_n\) that \(s_n\) is within distance \(\rho \) of the boundary \(x=l\). Since this is not the only configuration that provides barrier coverage, we have

$$\begin{aligned} P(\text {Barrier Coverage}) \ge P\left( W^b_0 \bigcap W^b_n \bigcap (\bigcap _{i=1}^{n-1} W_i)\right) . \end{aligned}$$
(A.4)

Assumption (1) allows us to consider \(W^b_0, W^b_n \text{ and } W_i\), \(1 \le i \le n-1\), as independent events and approximate \(P(W^b_0 \bigcap W^b_n \bigcap (\bigcap \nolimits _{i=1}^{n-1} W_i))\) with \(P(W_0^b)P(W_n^b)\) \((P(d < \rho ))^{(n-1)}\). Indeed, if assumption (1) was violated, and \(\rho \) was almost equal to \(\zeta \), then a perturbation which brings node \(s_i\) close to \(s_{i-1}\) would also create a gap between \(s_i\) and \(s_{i+1}\). \(W_i\) happening thus implies that \(W_{i+1}\) would not happen, and that both events are conditioned on each other, not independent. However, by choosing the right parameter \(\kappa \), the approximation by independent events is appropriate, as we confirm in the evaluation section.

We can also easily verify that \(P(W_0^b) > P(d<\rho )\) and symmetrically, \(P(W_n^b) > P(d<\rho )\), so that \(P(\text{ Barrier } \text{ Coverage }) \ge P(d<\rho )^{n+1}\).

Assumption (2) ensures that the gap between \(P(Barrier Coverage)\) and \(P(\bigcap _{i=0}^n W_i)\) stays limited, and that the most likely configuration to provide coverage is indeed by having each \(s_i\) and \(s_{i+1}\) within \(\rho \) of each other. Other configurations are possible, and a gap between \(s_i\) and \(s_{i+1}\) could be filled by having a third sensor out of position in the sequential ordering along the x-axis. However, assumption (2) ensures that such other configurations have a low likelihood. Simulation will show that, under assumption (2) the lower bound is actually tight.

Note that we do not put an explicit dependency of \(\zeta \) on \(n\), but as \(n \rightarrow \infty \), the probability of barrier coverage goes to 1 as \(\zeta \rightarrow 0\), all other parameters being constant. \(\square \)

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Saipulla, A., Cui, JH., Fu, X., Liu, B., Wang, J. (2014). Barrier Coverage: Foundations and Design. In: Ammari, H. (eds) The Art of Wireless Sensor Networks. Signals and Communication Technology. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40066-7_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40066-7_3

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40065-0

  • Online ISBN: 978-3-642-40066-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics