Protecting with sensor networks: perimeters and axes

Sensors, in one form or another, have always been a component in physical security systems. Usually such sensors are configured on a perimeter, or perhaps on concentric perimeters. The work was motivated by the realization of the fact that the probability of detecting an intruder is a quality of service (QoS) parameter. This implies an interesting trade-off between the amount of resources that a defender can muster and the QoS (in terms of probability of detection) that they get. We study this trade-off for a family of structures with an axial design reminiscent of a snowflake. We show that such a structure presents interesting qualities. The relations geometrically deduced in the paper provide a form of sensitivity analysis. The cumulative nature of the detection is discussed and, in addition, a possible implementation in sensor networks is explored

[1]  Kenneth Baclawski,et al.  A core ontology for situation awareness , 2003, Sixth International Conference of Information Fusion, 2003. Proceedings of the.

[2]  Cynthia E. Irvine,et al.  Toward quality of security service in a resource management system benefit function , 2000, Proceedings 9th Heterogeneous Computing Workshop (HCW 2000) (Cat. No.PR00556).

[3]  J. O'Rourke Art gallery theorems and algorithms , 1987 .

[4]  Miodrag Potkonjak,et al.  Exposure in wireless Ad-Hoc sensor networks , 2001, MobiCom '01.

[5]  Miodrag Potkonjak,et al.  Localized algorithms in wireless ad-hoc networks: location discovery and sensor exposure , 2001, MobiHoc '01.

[6]  Krishnendu Chakrabarty,et al.  Sensor deployment and target localization based on virtual forces , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[7]  Aaron Strauss,et al.  Carnival Booth: An Algorithm for Defeating the Computer-Assisted Passenger Screening System , 2002, First Monday.

[8]  C. J. Tarr,et al.  Using CLASP to assess perimeter security , 1995, Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology.

[9]  Miodrag Potkonjak,et al.  Coverage problems in wireless ad-hoc sensor networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).