Mobility and Intruder Prior Information Improving the Barrier Coverage of Sparse Sensor Networks

被引:162
作者
He, Shibo [1 ,2 ]
Chen, Jiming [1 ]
Li, Xu [3 ]
Shen, Xuemin [4 ]
Sun, Youxian [1 ]
机构
[1] Zhejiang Univ, Dept Control Sci & Engn, State Key Lab Ind Control Technol, Hangzhou 310027, Zhejiang, Peoples R China
[2] Univ Waterloo, Waterloo, ON N2L 3G1, Canada
[3] Huawei Technol Canada, Kanata, ON K2K 3J1, Canada
[4] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
关键词
Mobile sensor networks; barrier coverage; periodic monitoring scheduling; coordination sensor patrolling; distributed algorithms; CAPTURE; WORST;
D O I
10.1109/TMC.2013.129
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The barrier coverage problem in emerging mobile sensor networks has been an interesting research issue due to many related real-life applications. Existing solutions are mainly concerned with deciding one-time movement for individual sensors to construct as many barriers as possible, which may not be suitable when there are no sufficient sensors to form a single barrier. In this paper, we aim to achieve barrier coverage in the sensor scarcity scenario by dynamic sensor patrolling. Specifically, we design a periodic monitoring scheduling (PMS) algorithm in which each point along the barrier line is monitored periodically by mobile sensors. Based on the insight from PMS, we then propose a coordinated sensor patrolling (CSP) algorithm to further improve the barrier coverage, where each sensor's current movement strategy is derived from the information of intruder arrivals in the past. By jointly exploiting sensor mobility and intruder arrival information, CSP is able to significantly enhance barrier coverage. We prove that the total distance that sensors move during each time slot in CSP is the minimum. Considering the decentralized nature of mobile sensor networks, we further introduce two distributed versions of CSP: S-DCSP and G-DCSP. We study the scenario where sensors are moving on two barriers and propose two heuristic algorithms to guide the movement of sensors. Finally, we generalize our results to work for different intruder arrival models. Through extensive simulations, we demonstrate that the proposed algorithms have desired barrier coverage performances.
引用
收藏
页码:1268 / 1282
页数:15
相关论文
共 33 条
[1]  
Amaldi E., 2008, P IEEE INT C MASS AT
[2]  
[Anonymous], P ACM INT WORKSH WIR
[3]  
[Anonymous], 2004, HDB SENSOR NETWORKS
[4]  
Bhattacharya B, 2008, LECT NOTES COMPUT SC, V5165, P103
[5]   Stochastic event capture using mobile sensors subject to a quality metric [J].
Bisnik, Nabhendra ;
Abouzeid, Alhussein A. ;
Isler, Volkan .
IEEE TRANSACTIONS ON ROBOTICS, 2007, 23 (04) :676-692
[6]  
Chen A., 2007, P INT C MOBICOM MONT
[7]  
Chen A., 2008, P ACM INT S MOBIHOC
[8]   Utility-Based Asynchronous Flow Control Algorithm for Wireless Sensor Networks [J].
Chen, Jiming ;
Xu, Weiqiang ;
He, Shibo ;
Sun, Youxian ;
Thulasiraman, Preetha ;
Shen, Xuemin .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2010, 28 (07) :1116-1126
[9]   On the Lifetime of Wireless Sensor Networks [J].
Dietrich, Isabel ;
Dressler, Falko .
ACM TRANSACTIONS ON SENSOR NETWORKS, 2009, 5 (01)
[10]   On Delivery Guarantees and Worst-Case Forwarding Bounds of Elementary Face Routing Components in Ad Hoc and Sensor Networks [J].
Frey, Hannes ;
Stojmenovic, Ivan .
IEEE TRANSACTIONS ON COMPUTERS, 2010, 59 (09) :1224-1238