Evasion paths in mobile sensor networks

被引:25
|
作者
Adams, Henry [1 ]
Carlsson, Gunnar [2 ]
机构
[1] Duke Univ, Durham, NC 27708 USA
[2] Stanford Univ, Stanford, CA 94305 USA
来源
基金
美国国家科学基金会; 美国国家卫生研究院;
关键词
Mobile sensor networks; coverage; pursuit-evasion; homology; zigzag persistence; fibrewise embeddings; COVERAGE; TARGET;
D O I
10.1177/0278364914548051
中图分类号
TP24 [机器人技术];
学科分类号
080202 ; 1405 ;
摘要
Suppose that ball-shaped sensors wander in a bounded domain. A sensor does not know its location but does know when it overlaps a nearby sensor. We say that an evasion path exists in this sensor network if a moving intruder can avoid detection. In Coordinate-free coverage in sensor networks with controlled boundaries via homology', Vin de Silva and Robert Ghrist give a necessary condition, depending only on the time-varying connectivity data of the sensors, for an evasion path to exist. Using zigzag persistent homology, we provide an equivalent condition that moreover can be computed in a streaming fashion. However, no method with time-varying connectivity data as input can give necessary and sufficient conditions for the existence of an evasion path. Indeed, we show that the existence of an evasion path depends not only on the fibrewise homotopy type of the region covered by sensors but also on its embedding in spacetime. For planar sensors that also measure weak rotation and distance information, we provide necessary and sufficient conditions for the existence of an evasion path.
引用
收藏
页码:90 / 104
页数:15
相关论文
共 50 条
  • [1] Mobile Data Collection Paths for Node Cooperative Underwater Acoustic Sensor Networks
    Chen Yougan
    Jin Xiaoting
    Xu Xiaomei
    OCEANS 2016 - SHANGHAI, 2016,
  • [2] Intrusion Detection in Mobile Sensor Networks: A Case Study for Different Intrusion Paths
    Sharma, Sandeep
    Nagar, Jaiprakash
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 115 (03) : 2569 - 2589
  • [3] Intrusion Detection in Mobile Sensor Networks: A Case Study for Different Intrusion Paths
    Sandeep Sharma
    Jaiprakash Nagar
    Wireless Personal Communications, 2020, 115 : 2569 - 2589
  • [4] State estimation and control of mobile robots in pursuit-evasion problem based on wireless sensor networks
    Guo, Lixin
    Zhao, Leiping
    Zhang, Yimin
    Wen, Bangchun
    Cui, Jiachao
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 4, 2008, : 796 - 801
  • [5] Designing energy efficient traveling paths for multiple mobile chargers in wireless rechargeable sensor networks
    Tomar, Abhinav
    Jana, Prasanta K.
    2017 TENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2017, : 277 - 282
  • [6] Sensor relocation in mobile sensor networks
    Wang, GL
    Cao, GH
    La Porta, T
    Zhang, WS
    IEEE INFOCOM 2005: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2005, : 2302 - 2312
  • [7] Sensor networks with mobile agents
    Tong, L
    Zhao, Q
    Adireddy, S
    MILCOM 2003 - 2003 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2003, : 688 - 693
  • [8] Blocking Vulnerable Paths of Wireless Sensor Networks
    Zhou, Shu
    Wu, Min-You
    Shu, Wei
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [9] Coverage and exposure paths in wireless sensor networks
    Huang, Liu-Sheng
    Xu, Hong-Li
    Wang, Yang
    Wu, Jun-Min
    Li, Hong
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2006, 21 (04) : 490 - 495
  • [10] Coverage and Exposure Paths in Wireless Sensor Networks
    Liu-Sheng Huang
    Hong-Li Xu
    Yang Wang
    Jun-Min Wu
    Hong Li
    Journal of Computer Science and Technology, 2006, 21 : 490 - 495