A study on the weak barrier coverage problem in wireless sensor networks

Anti-intrusion is a typical application of wireless sensor networks (WSNs). It usually requires sensor nodes to be deployed in a long belt region. The coverage problem in this kind of applications is often referred to as barrier coverage, which is classified into weak barrier coverage and strong barrier coverage. A belt region is called weakly k-barrier covered (k?1) if an intruder traveling along any orthogonal crossing path can be detected by at least k sensors. For sensor deployment in a belt service region, an interesting and important question is "How many sensor nodes should be deployed to achieve weak k-barrier coverage with a given probability?" In this paper, we study the weak k-barrier coverage problem and attempt to answer this question by analyzing the probability of weak k-barrier coverage. We derive a lower bound for the probability of weak k-barrier coverage with and without considering the border effect, respectively. Moreover, we propose a simple but effective algorithm for accurately determining whether a deployed belt region is weakly k-barrier covered, and if not, what percentage of the region is not weakly k-barrier covered. Simulation results show that the derived lower bound is very close to the actual probability of weak k-barrier coverage, especially when k is small, and the border effect has a big impact on the probability of weak k-barrier coverage.

[1]  Prasun Sinha,et al.  Optimal sleep-wakeup algorithms for barriers of wireless sensors , 2007, 2007 Fourth International Conference on Broadband Communications, Networks and Systems (BROADNETS '07).

[2]  Xiangke Liao,et al.  Barrier Coverage with Mobile Sensors , 2008, 2008 International Symposium on Parallel Architectures, Algorithms, and Networks (i-span 2008).

[3]  Donald F. Towsley,et al.  A study of the coverage of large-scale sensor networks , 2004, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975).

[4]  Ronald L. Rivest,et al.  Introduction to Algorithms , 1990 .

[5]  Ravindra K. Ahuja,et al.  Network Flows: Theory, Algorithms, and Applications , 1993 .

[6]  Jie Wang,et al.  Strong barrier coverage of wireless sensor networks , 2008, MobiHoc '08.

[7]  M. Penrose The longest edge of the random minimal spanning tree , 1997 .

[8]  József Balogh,et al.  On k-coverage in a mostly sleeping sensor network , 2004, MobiCom '04.

[9]  Anish Arora,et al.  Barrier coverage with wireless sensors , 2005, MobiCom '05.

[10]  Daji Qiao,et al.  Barrier Information Coverage with Wireless Sensors , 2009, IEEE INFOCOM 2009.

[11]  B. Ripley,et al.  Introduction to the Theory of Coverage Processes. , 1989 .

[12]  Béla Bollobás,et al.  Reliable density estimates for coverage and connectivity in thin strips of finite length , 2007, MobiCom '07.

[13]  Ai Chen,et al.  Designing localized algorithms for barrier coverage , 2007, MobiCom '07.

[14]  Jie Wang,et al.  Barrier Coverage of Line-Based Deployed Wireless Sensor Networks , 2009, IEEE INFOCOM 2009.

[15]  Douglas W. Gage,et al.  Command Control for Many-Robot Systems , 1992 .

[16]  Christian Bettstetter,et al.  On the minimum node degree and connectivity of a wireless multihop network , 2002, MobiHoc '02.

[17]  Guo-Liang Chen,et al.  Double Barrier Coverage in Dense Sensor Networks , 2008, Journal of Computer Science and Technology.