Efficient algorithm for k-barrier coverage based on integer linear programming

Barrier coverage of wireless sensor networks is an important issue in the detection of intruders who are attempting to cross a region of interest. However, in certain applications, barrier coverage cannot be satisfied after random deployment. In this paper, we study how mobile sensors can be efficiently relocated to achieve k-barrier coverage. In particular, two problems are studied: relocation of sensors with minimum number of mobile sensors and formation of k-barrier coverage with minimum energy cost. These two problems were formulated as 0-1 integer linear programming (ILP). The formulation is computationally intractable because of integrality and complicated constraints. Therefore, we relax the integrality and complicated constraints of the formulation and construct a special model known as RELAX-RSMN with a totally unimodular constraint coefficient matrix to solve the relaxed 0-1 ILP rapidly through linear programming. Theoretical analysis and simulation were performed to verify the effectiveness of our approach.

[1]  Anish Arora,et al.  Barrier coverage with wireless sensors , 2005, MobiCom '05.

[2]  Thomas F. La Porta,et al.  Sensor relocation in mobile sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[3]  Lale Akarun,et al.  Surveillance Wireless Sensor Networks: Deployment Quality Analysis , 2007, IEEE Network.

[4]  Prasun Sinha,et al.  Optimal sleep-wakeup algorithms for barriers of wireless sensors , 2007, 2007 Fourth International Conference on Broadband Communications, Networks and Systems (BROADNETS '07).

[5]  Jie Wang,et al.  Strong barrier coverage of wireless sensor networks , 2008, MobiHoc '08.

[6]  M. Mohamed Sathik,et al.  Fire Detection Using Support Vector Machine in Wireless Sensor Network and Rescue Using Pervasive Devices , 2010 .

[7]  Deying Li,et al.  Energy efficient k-barrier coverage in limited mobile wireless sensor networks , 2012, Comput. Commun..

[8]  Hongchi Shi,et al.  Constructing sensor barriers with minimum cost in wireless sensor networks , 2012, J. Parallel Distributed Comput..

[9]  Jin Wang,et al.  A Variable Threshold-Value Authentication Architecture for Wireless Mesh Networks , 2014 .

[10]  Jian Shen,et al.  A Novel Routing Protocol Providing Good Transmission Reliability in Underwater Sensor Networks , 2015 .

[11]  Xingming Sun,et al.  Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..