Abstract
The coverage of a wireless sensor network (WSN) characterizes the quality of surveillance that the WSN can provide. A deep understanding of the coverage is of great importance for the deployment, design, and planning of wireless sensor networks. Barrier coverage measures the capability of a wireless sensor network to detect intruders that attempt to cross the deployed region. The goal is to prevent intruders from sneaking through the network undetected. It is a critical issue for many military and homeland security applications. In this chapter we provide a comprehensive survey on the barrier coverage of wireless sensor networks. The main topics include the critical conditions and construction of barrier coverage in a 2-dimensional WSN, the barrier coverage under a line-based sensor deployment scheme, the effect of sensor mobility on barrier coverage, and the barrier coverage for a 3-dimensional underwater sensor network. For each topic we discuss the challenges, fundamental limits, and the solution for the construction of sensor barriers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
B. Liu, O. Dousse, J. Wang, A. Saipulla, Strong barrier coverage of wireless sensor networks, in Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) (2008)
U. Berkeley, M. Co., Tracking vehicles with a uav-delivered sensor network. http://www-bsac.eecs.berkeley.edu/~pister/29Palms0103/
A. Saipulla, B. Liu, J. Wang, Barrier coverage with airdropped sensors, in Proceedings of IEEE MilCom (2008)
A. Saipulla, C. Westphal, B. Liu, J. Wang, Barrier coverage of line-based deployed wireless sensor networks, in Proceedings of the IEEE Conference on Computer Communications (INFOCOM) (2009)
K. Dantu, M. Rahimi, H. Shah, S. Babel, A. Dhariwal, G.S. Sukhatme, Robomote: enabling mobility in sensor networks, in Proceedings of the IEEE International Conference in Infomation Processing in Sensor Network (IPSN) (2005)
Khepera robots. http://www.k-team.com
A. Saipulla, B. Liu, G. Xing, X. Fu, J. Wang, Barrier coverage with sensors of limited mobility. in Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) (2010)
A. Saipulla, B. Liu, J. Wang, Finding and mending barrier gaps in wireless sensor networks, in Proceedings of IEEE Globecom (2010)
S. Barr, J. Wang, B. Liu, An efficient method for constructing underwater sensor barriers. J. Commun. 6(5), 370–383 (2011)
S. Meguerdichian, F. Koushanfar, M. Potkonjak, M.B. Srivastava, Coverage problems in wireless ad-hoc sensor networks, in Proceedings of IEEE Infocom, pp. 1380–1387 (2001)
K. Chakrabarty, S.S. Lyengar, H. Qi, E. Cho, Grid coverage for surveillance and target location in distributed sensor networks. IEEE Trans. Comput. 51, 1448–1453 (2002)
S. Shakkottai, R. Srikant, N. Shroff, Unreliable sensor grids: coverage, connectivity and diameter, in Proceedings of IEEE Infocom (2003)
X.Y. Li, P.J. Wan, O. Frieder, Coverage in wireless ad-hoc sensor networks. IEEE Trans. Comput. 52(6), 753–763 (2003)
Y. Zou, K. Chakrabarty, Uncertainty-aware and coverage-oriented deployment for sensor networks. J. Parallel Distrib. Comput. 64, 788–798 (2004)
M. Cardei, J. Wu, Energy-efficient coverage problems in wireless ad hoc sensor networks. J. Comput. Commun. 29(4), 413–420 (2006)
Y. Zou, K. Chakrabarty, Distributed mobility management for target tracking in mobile sensor networks. IEEE Trans. Mobile Comput. (TMC) 6(8), 872–887 (2007)
H. Zhang, J. Hou, Maintaining sensing coverage and connectivity in sensor networks, in Proceedings of the Invited Paper in International Workshop on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless and Peer-to-Peer, Networks (2004)
G. Xing, X. Wang, Y. Zhang, C. Lu, R. Pless, C.D. Gill, Integrated coverage and connectivity configuration for energy conservation in sensor networks. ACM Trans. Sens. Netw. 1(1), 36–72 (2005)
H.M. Ammari, S.K. Das, Integrated coverage and connectivity in wireless sensor networks: a two-dimensional percolation problem. ACM Trans. Comput. 57(10), 1423–1434 (2008)
D. Gage, Command control for many-robot systems, in Proceedings of the Nineteenth Annual AUVS Technical Symposium (AUVS-92) (1992)
B. Liu, D. Towsley, A study on the coverage of large-scale sensor networks, in The 1st IEEE International Conference on Mobile Ad-hoc and Sensor Systems (2004)
C. Shen, W. Cheng, X. Liao, S. Peng, Barrier coverage with mobile sensors, in Proceedings of IEEE the International Symposium on Parallel Architectures, Algorithms, and Networks (ISPAN) (2008)
S. He, J. Chen, X. Li, S. Shen, Y. Sun, Cost effective barrier coverage by mobile sensor networks, in Proceedings of IEEE Infocom (2012)
L. Kong, Y. Zhu, M.Y. Wu, W. Shu, Mobile barrier coverage for dynamic objects in wireless sensor networks, in Proceedings of IEEE MASS (2012)
S. Kumar, T.H. Lai, A. Arora, Barrier coverage with wireless sensors, in Proceedings of ACM Mobicom (2005)
G. Yang, D. Qiao, Barrier information coverage with wireless sensors, in Proceedings of IEEE Infocom (2009)
G. Yang, D. Qiao, Multi-round sensor deployment for guaranteed barrier coverage, in Proceedings of IEEE Infocom (2010)
Y. Wang, G. Cao, Barrier coverage in camera sensor networks, in Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) (2011)
H. Ma, M. Yang, D. Li, Minimum camera barrier coverage in wireless camera sensor networks, in Proceedings of IEEE Infocom (2012)
A. Chen, S. Kumar, T.H. Lai, Designing localized algorithms for barrier coverage. in Proceedings of ACM Mobicom (2007)
A. Chen, T.H. Lai, D. Xuan, Measuring and guaranteeing quality of barrier-coverage in wireless sensor networks, in Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) (2008)
L. Zhang, J. Tang, W. Zhang, Strong barrier coverage with directional sensors, in Proceedings of IEEE Globecom (2009)
M. Franceschetti, O. Dousse, D. Tse, P. Thiran, Closing the gap in the capacity of random wireless networks, in Proceedings of Information Theory Symposium (ISIT) (2004)
G.R. Grimmett, Percolation (Springer, Heidelberg, 1999)
A. Schrijver, Combinatorial Optimization (Springer, Heidelberg, 2003)
T.H. Cormen, C.E. Leiserson, R.L. Rivest, C. Stein, Introduction to Algorithms, 2nd edn. (MIT Press and McGraw-Hill, Cambridge, 2001)
Crossbow Technology INC. http://www.xbow.com/
P. Balister, B. Bollobas, A. Sarkar, S. Kumar, Reliable density estimates for coverage and connectivity in thin strips of finite length, in Proceedings of ACM Mobicom (2007)
E. Gilbert, Random plane networks. J. SIAM 9, 533–543 (1961)
A.A. Somasundara, A. Ramamoorthy, M.B. Srivastava, Mobile element scheduling with dynamic deadlines. IEEE Trans. Mobile Comput. (TMC) 6(4), 1142–1157 (2007)
A. Howard, M. Mataric, G. Sukhatme, Mobile sensor network deployment using potential fields: a distributed, scalable solution to the area coverage problem, in DARS 02 (2002)
Y. Zou, K. Chakrabarty, Sensor deployment and target localization based on virtual forces, in Proceedings of IEEE Infocom (2003)
G. Wang, G. Cao, T.L. Porta, Movement-assisted sensor deployment, in Proceedings IEEE Infocom (2004)
S. Chellappan, W. Gu, X. Bai, D. Xuan, B. Ma, K. Zhang, Deploying wireless sensor networks under limited mobility constraints. IEEE Trans. Mobile Comput. (TMC) 6(10) 1142–1157 (2007)
B. Liu, P. Brass, O. Dousse, P. Nain, D. Towsley, Mobility improves coverage of sensor networks, in Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) (2005)
P. Shor, J. Yukich, Minimax grid matching and empirical measures. Ann. Probab. 19(3), 1338–1348 (1991)
Global submarine proliferation: emerging trends and problems (2008). http://www.nti.org/e_research/e3_74.html
J. Forero, Drug traffic beneath the waves. In: Washington Post, p. A04 (February 6, 2008)
J. Kong, J. Hong Cui, D. Wu, M. Gerla, Building underwater ad-hoc networks and sensor networks for large scale real-time aquatic applications, in Proceedings of IEEE Military Communications Conference (MILCOM) (2005)
C. Gui, P. Mohapatra, Power conservation and quality of surveillance in target tracking sensor networks, in Proceedings of ACM Mobicom (2004)
H. Kühn, The Hungarian Method for the Assignment Problem. Naval Res. Logistics Q. 2, 83–97 (1955)
D. Bertsekas, The auction algorithm: a distributed relaxation method for the assignment problem, vol. 14. (Springer, Heidelberg, 1988)
Encyclopedia britannica online: Surface area, volume, and average depth of oceans and seas (2008). http://www.britannica.com/eb/article-9116157/Surface-area-volume-and-average
Seven miles down: the story of the bathyscaph trieste (2006). http://bjsonline.com/watches/articles/0022_3.shtml
Russia685 (2008). http://www.globalsecurity.org/military/world/russia/685-specs.htm
S. Kirkpatrick, C.D.G., M.P. Vecchi, Optimization by simulated annealing. Science (New Series) 220, 671–680 (1983)
J. Proakis, Digital Communications, 4th edn. (McGraw-Hill, New York, 2000)
Acknowledgments
This research was supported in parts by the National Science Foundation under grants CNS-0953620 and CNS-1018303.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendix
Appendix
1.1 Proof of Theorem 2
Proof
Consider the relative positions of nodes \(s_i\) and \(s_{i+1}\). Define \(z^x = s^x_{i+1}-s^x_i\) and \(z^y = s^y_{i+1}-s^y_i\). Then \(z^x = \zeta + \delta ^x_{i+1}-\delta ^x_i\) and \(z^y = \delta ^y_{i+1} - \delta ^y_i\). Since the \(\delta ^s\) are Normally distributed with variance \(\sigma ^2\), then \(\delta ^x_{i+1}-\delta ^x_i\) and \(\delta ^y_{i+1} - \delta ^y_i\) are both Normal random variable with variance \(2 \sigma ^2\), i.e., \(z^x \sim N(\zeta ,2\sigma ^2)\) and \(z^y \sim N(0,2\sigma ^2)\).
The distance between \(s_i\) and \(s_{i+1}\) is equal to:
This implies that \(d_i\) follows a Ricean distribution. Since the distribution is identical for all \(i\), we drop the index and denote the distance between two consecutive nodes as \(d\).
In particular, the probability that \(d < \rho \) is given by (see for instance [57], Chap. 2):
where \(Q_1\) is the Marcum’s Q-function of the first order, defined by:
and \(I_k\) is the \(k\)th order modified Bessel function of the first kind.
Thus, two sensors \(s_i\) and \(s_{i+1}\) provide barrier coverage with probability \(P(d < \rho )\). If each pair of sensors \(s_i\) and \(s_{i+1}\) is within \(\rho \) of each other and within \(\rho \) of the boundary, then the sensor deployment provides barrier coverage over the all width of the area. For all \(1 \le i \le n-1\), denote by \(W_i\) the event that \(d_i < \rho \). Denote by \(W^b_0\) the event that \(s_1\) is within distance \(\rho \) of the boundary \(x=0\), and \(W^b_n\) that \(s_n\) is within distance \(\rho \) of the boundary \(x=l\). Since this is not the only configuration that provides barrier coverage, we have
Assumption (1) allows us to consider \(W^b_0, W^b_n \text{ and } W_i\), \(1 \le i \le n-1\), as independent events and approximate \(P(W^b_0 \bigcap W^b_n \bigcap (\bigcap \nolimits _{i=1}^{n-1} W_i))\) with \(P(W_0^b)P(W_n^b)\) \((P(d < \rho ))^{(n-1)}\). Indeed, if assumption (1) was violated, and \(\rho \) was almost equal to \(\zeta \), then a perturbation which brings node \(s_i\) close to \(s_{i-1}\) would also create a gap between \(s_i\) and \(s_{i+1}\). \(W_i\) happening thus implies that \(W_{i+1}\) would not happen, and that both events are conditioned on each other, not independent. However, by choosing the right parameter \(\kappa \), the approximation by independent events is appropriate, as we confirm in the evaluation section.
We can also easily verify that \(P(W_0^b) > P(d<\rho )\) and symmetrically, \(P(W_n^b) > P(d<\rho )\), so that \(P(\text{ Barrier } \text{ Coverage }) \ge P(d<\rho )^{n+1}\).
Assumption (2) ensures that the gap between \(P(Barrier Coverage)\) and \(P(\bigcap _{i=0}^n W_i)\) stays limited, and that the most likely configuration to provide coverage is indeed by having each \(s_i\) and \(s_{i+1}\) within \(\rho \) of each other. Other configurations are possible, and a gap between \(s_i\) and \(s_{i+1}\) could be filled by having a third sensor out of position in the sequential ordering along the x-axis. However, assumption (2) ensures that such other configurations have a low likelihood. Simulation will show that, under assumption (2) the lower bound is actually tight.
Note that we do not put an explicit dependency of \(\zeta \) on \(n\), but as \(n \rightarrow \infty \), the probability of barrier coverage goes to 1 as \(\zeta \rightarrow 0\), all other parameters being constant. \(\square \)
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Saipulla, A., Cui, JH., Fu, X., Liu, B., Wang, J. (2014). Barrier Coverage: Foundations and Design. In: Ammari, H. (eds) The Art of Wireless Sensor Networks. Signals and Communication Technology. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40066-7_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-40066-7_3
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40065-0
Online ISBN: 978-3-642-40066-7
eBook Packages: EngineeringEngineering (R0)