Anti-detection: how does a target traverse a sensing field

Most sensor networks are deployed to monitor a region of interest for any potential target. An intelligent target looks for the best path to traverse the sensing field. In this paper, we model this anti-detection problem, propose a number of path-finding algorithms, and evaluate these algorithms. Different from previous works which assume complete information of the sensing field, we assume that the target only can detect part of the deployment of sensor network. This makes the proposed method more practical. Experimental results manifest the effectiveness of the path-finding algorithms.

[1]  Parameswaran Ramanathan,et al.  Vulnerability of sensor networks to unauthorized traversal and monitoring , 2004, IEEE Transactions on Computers.

[2]  Parameswaran Ramanathan,et al.  Detecting unauthorized activities using a sensor network , 2004 .

[3]  Ketan Mulmuley,et al.  Computational geometry : an introduction through randomized algorithms , 1993 .

[4]  Miodrag Potkonjak,et al.  Exposure in wireless Ad-Hoc sensor networks , 2001, MobiCom '01.

[5]  Ivan Stojmenovic,et al.  Routing with Guaranteed Delivery in Ad Hoc Wireless Networks , 1999, DIALM '99.

[6]  John Anderson,et al.  Wireless sensor networks for habitat monitoring , 2002, WSNA '02.

[7]  Miodrag Potkonjak,et al.  Coverage problems in wireless ad-hoc sensor networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[8]  Ivan Stojmenovic,et al.  Loop-Free Hybrid Single-Path/Flooding Routing Algorithms with Guaranteed Delivery for Wireless Networks , 2001, IEEE Trans. Parallel Distributed Syst..

[9]  Franz Aurenhammer,et al.  Voronoi diagrams—a survey of a fundamental geometric data structure , 1991, CSUR.

[10]  Miodrag Potkonjak,et al.  Location Discovery in Ad-hoc Wireless Sensor Networks , 2004 .

[11]  Laurence T. Yang,et al.  Proceedings of the 3rd international conference on Embedded Software and Systems , 2007 .

[12]  Jorge Urrutia,et al.  Compass routing on geometric networks , 1999, CCCG.

[13]  P. Bose,et al.  Online routing in geometric graphs , 2001 .

[14]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[15]  Prosenjit Bose,et al.  Online Routing in Triangulations , 1999, SIAM J. Comput..