ArticlePDF Available

Strong -Barrier Coverage for One-Way Intruders Detection in Wireless Sensor Networks

Wiley
International Journal of Distributed Sensor Networks
Authors:

Abstract and Figures

Intruders detection is one of the very important applications in Wireless Sensor Networks (WSNs). Sometimes detecting intruders is not sufficient; distinguishing whether an intruder is legal or illegal is necessary. Since k -barrier coverage is widely used in detecting intruders, a barrier construction algorithm is needed, which can not only detect an intruder but also judge an illegal intruder. An intruder is defined as illegal if and only if it crosses straightly through the monitored region from the special side to another side. On the contrary, it is a legal intruder. To detect an intruder and distinguish whether the intruder is legal or illegal, a strong k -barrier coverage algorithm is proposed. The strong k -barrier coverage is a local barrier constructing algorithm and can detect any intruder crossing the k -barrier with a full probability. The strong k -barrier coverage detects all intruders penetrating the annular region for k times. What is more, the proposed strong k -barrier algorithm can provide a reliable judgement on whether an intruder is legal or illegal, and the constructed k -barrier coverage is different from the traditional one-way barrier coverage using binary barriers that are intersected but not overlapped. Some simulation tests show that the proposed algorithm can construct strong k -barrier coverage very well.
Content may be subject to copyright.
Research Article
Strong 𝑘-Barrier Coverage for One-Way Intruders
Detection in Wireless Sensor Networks
Junhai Luo and Shihua Zou
University of Electronic Science and Technology of China, Chengdu, Sichuan 611731, China
Correspondence should be addressed to Junhai Luo; junhai luo@uestc.edu.cn
Received  January ; Revised  April ; Accepted  May 
Academic Editor: Isaac Agudo
Copyright ©  J. Luo and S. Zou. is is an open access article distributed under the Creative Commons Attribution License,
which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Intruders detection is one of the very important applications in Wireless Sensor Networks (WSNs). Sometimes detecting intruders
is not sucient; distinguishing whether an intruder is legal or illegal is necessary. Since -barrier coverage is widely used in detecting
intruders, a barrier construction algorithm is needed, which can not only detect an intruder but also judge an illegal intruder. An
intruder is dened as illegal if and only if it crosses straightly through the monitored region from the special side to another side.
On the contrary, it is a legal intruder. To detect an intruder and distinguish whether the intruder is legal or illegal, a strong -barrier
coverage algorithm is proposed. e strong -barrier coverage is a local barrier constructing algorithm and can detect any intruder
crossing the -barrier with a full probability. e strong -barrier coverage detects all intruders penetrating the annular region for
times. What is more, the proposed strong -barrier algorithm can provide a reliable judgement on whether an intruder is legal
or illegal, and the constructed -barrier coverage is dierent from the traditional one-way barrier coverage using binary barriers
that are intersected but not overlapped. Some simulation tests show that the proposed algorithm can construct strong -barrier
coverage very well.
1. Introduction
Wireless Sensor Networks (WSNs) have been studied for
years, which have many important applications for their
particular capabilities in monitoring environment, such as
in a battleeld or in an international border; all these
circumstances need a comprehensive monitoring. Barriers in
WSNs for intruders detection have been studied a lot, which
can assure that all intruders crossing a belt annular can be
detected. In some applications, only one direction crossing
the region is illegal. For example, people can leave a theater
without their movie tickets being detected, whereas they are
not allowed to see a movie without tickets. In the above
applications, it is not appropriate to use the traditional barrier
coverage models since they cannot distinguish the legal and
illegal intrusion behaviors.
In most previous works, researchers only considered
whether or not WSNs can form barrier coverage or whether
WSNs provide -barrier coverage. e theoretical basis of
designing barriers of WSNs is studied in []. In one barrier
coverage, intruders may cross the barrier from the gap with-
out being detected. Since one barrier coverage cannot meet
the requirements of intrusion detection in many applications,
high degree of coverage must be taken into account, and
the reasons of requiring -barrier rather than  barrier are
discussed in []. A weekly -barrier coverage has been studied
in many literatures, such as []. For some applications of
WSNs, weekly -barrier coverage is not enough; thus the
strong -barrier coverage is needed, for example, a WSN with
a really high detecting probability. Detecting intruders with
highly probability relies on a strong barrier coverage.
In the study of barrier coverage, construction algorithms
for barrier have been researched much. Generally speaking,
there are two kinds of research directions, local barrier
construction and the global barrier construction algorithms.
ough global barrier coverage, such as the one in [],
which requires much fewer sensors than full coverage, is a
betting model of coverage for intrusion detection, it also has
limitations. en a local barrier coverage algorithm is studied
intensively in [–].
Hindawi Publishing Corporation
International Journal of Distributed Sensor Networks
Volume 2016, Article ID 3807824, 16 pages
http://dx.doi.org/10.1155/2016/3807824
International Journal of Distributed Sensor Networks
Our contributions in this paper are as follows:
() We nd that traditional one-barrier coverage model
is not suitable for some applications of WSNs in
intruders detection, especially in one-way intruders
detection.
() Comparing the previously binary barriers models, we
consider using a - (more than ) barrier model to
achieve the one-way intruders detection, which does
not need to satisfy the conditions in binary barrier
model.
() We propose a -barrier coverage algorithm, which
can easily construct barriers in monitored areas;
then we use the formed -barrier coverage model
to realize the goal of one-way intruders detection
without satisfying the limitations of binary barriers
coverage.
e remainder of the paper is organized as follows. Section 
introducestherelatedwork.enthesystemmodel,thebar-
rier construction algorithm, and the barrier mending model
are presented in Section . Section  shows an important
application of our model. e simulation results are presented
in Section . Finally, conclusion of this paper is presented in
Section .
2. Related Work
e authors in [] research the mathematical conditions of
building a weak barrier coverage in randomly deployment
WSNs and devise a centralized algorithm to determine
whether a region is -barrier covered. In literatures [–],
the authors study barrier coverage intensively. e authors
intheliterature[]supposethesituationofonebarrier,
and they study an energy-ecient border intrusion detection
algorithm, with measuring and guaranteeing the coverage
quality of WSNs.
In [], the authors introduce a weak -barrier coverage
problem by at least sensors in a belt region and propose
a simple algorithm to determine whether a belt region is
weakly -barrier covered. e strong barrier coverage of
WSNs is introduced in [], which is a model with a really
high probability to detect intruders. e authors in []
describe the worst- and best-case coverage calculation for
homogeneous isotropic of WSNs, in which they combine the
Voronoi diagram and graph search algorithm. In literatures
[, ], the authors present a fundamental geometric data
structure of the Voronoi diagram, which present us with a
preliminary knowledge of the Voronoi diagram. Sometimes it
is not sucient for weak -barrier coverage. In the literatures
[–], the strong barrier coverage has been researched
deeply. And the authors propose the minimum and maxi-
mum exposure path algorithms, respectively. e minimal
exposure path is thought to be the worst-case coverage of
WSNs, which is a weak barrier coverage. On the contrary, the
maximum exposure is best-case coverage of WSNs.
e authors in [–] consider that the sensors cannot
locally determine whether the sensor deployment provides
global barrier coverage. So the authors present a localized
sleep-wake-up algorithm for maximizing the network life-
time. Barriers in the above literatures are all presented in
one-dimensional space. In the literatures [, ], a -barrier
scheduling for the intruder detection in -dimensional space
isintroduced.eauthorsproposeadistributedscheme
whose target is providing low detection delay and low energy.
Considering that the detection delay and low energy at the
same time are a challenge, it is essential to consider them in
multidimensional space. Besides, a new concept of one-way
barrier coverage with wireless sensors has been introduced
in [–], and the authors propose the concept of one-
way barrier and establish a necessary condition for WSNs
to provide a one-way barrier coverage, which requires that
WSNs report illegal intruders but ignore the legal ones.
However, the two barriers, which are intersected but not
overlapped,arelimitedinbinarybarriers.
Motivatedbyworksoftheaboveliteratures,weproposeto
use -barrier coverage of WSNs to replace the previous binary
barriers to achieve the one-way detection while achieving
thesamegoalintheliteratures[].Astrong-barrier
coverage algorithm is proposed, which is a local barrier
algorithm and can detect any intruders crossing the -barrier
with a full probability, assuring that all intruders penetrating
the annular region can be detected times. Furthermore, the
proposed -barrier model can make a reliable judgement on
whether an intruder is legal or illegal, which is dierent from
the traditional one-way barrier coverage. When compared
with the algorithm proposed in [] and another sensor
deployment, the number of sensors is much less.
3. System Model
3.1. Network Model. is paper assumes that sensors are
deployed in an annular region to detect intruders which
try to cross straightly through the monitored region and to
report the illegal intruders. An illegal intruder is an intruder
crossing through the monitored area from the special side to
the other side. If not, it is a legal intruder on opposite moving
direction. In this section, we give some basic denitions for
the annular region. e annular region is a special case of
a belt region whose two le and right boundaries coincide
with each other while its two upper and lower boundaries are
parallel, as shown in Figure . In addition, some denitions
about -barrier coverage are given. In Figure , we can see
that it is combined with two concentric rings, with the radius
of outer ring being 𝑂and inner ring being 𝐼,respectively.
e center of the area is marked as ,anditscoordinateis
known as (𝑂,𝑂).
e sensors are deployed following the Gaussian deploy-
ment, and the total number of sensors is . Each sensor
has an identical sensing radius 𝑠,andthecoveragemodel
of a sensor is called a disk model. When an intruder is in
the sensor’s sensing range, the intruders can be detected
with full probability. On the contrary, the intruders cannot
be detected. e disk model usually adopts the Voronoi
diagram to evaluate the detection possibility. In the literatures
[, ], the Voronoi diagram has been well studied. Besides,
thenumberofsensorsineachsingleringisdierent,and
International Journal of Distributed Sensor Networks
O
RI
RO
F : e initial wireless sensor network; sensors are distributed
as the Gaussian distribution.
the number of sensors deployed in each ring increases in
proportion to the circumference of each ring, which is shown
in (). e locations of sensors or their coordinates can be
obtained by GPS. Sensors can communicate with each other
while the distance between them is in the communication
radius 𝑐.𝑐≥2𝑠,where𝑠is the sensing radius of a sensor.
Denition 1 (annular belt region). A region bounded with
two up and down parallel curves and two overlapping right
and le boundary curves is called an annular belt region.
Denition 2 (barrier). A barrier is a sensor group with
sensing area overlap to form a belt coverage region starting
fromtheleboundarytotheright.eremightbemorethan
one barrier in belt region.
Denition 3 (-barrier coverage). A circular region is
referred to as -barrier coverage if and only if any intruders
crossing through the region can be detected times by the
WSNs.
Denition 4 (traditional -barrier coverage model). It is a
model with two barriers whose lower boundary of one barrier
and upper boundary of the other barrier overlap.
Denition 5 (global and local barriers). Global barrier means
that sensors can know a global knowledge of WSNs to build
a barrier; on the contrary, local barrier is dened as a barrier;
the constructing sensors of the barrier only know a local
background of WSNs.
Denition 6 (strong barrier coverage and weak barrier cover-
age). A weak barrier has at least one gas and a strong barrier
hasnogap,sothatnointruderscancrossthemonitored
area without being detected no matter what crossing paths
intruders would choose, but there is at least one safety path
A
BC O
k
RI
RO
.
.
.
1
F : e loop dividing gure, where the blue lines are the
dividing line, and the black lines are the two borders, and is preset
in our opinion, and ≥2.
that intruders could cross the monitored area without being
detected.
Denition 7 (alarm line). An alarm line is the bottom line
(or curve) of the innermost barrier, which will report an
alarm when an intruder crosses the alarm line from the other
barriers to the inner of region but does not report any alarm
whenever an intruder crosses the line from the inner region
to the outer region.
Denition 8 (one-way barrier coverage). A circular region
over which sensors are deployed is dened as one-way barrier
covered if and only if whenever an intruder crosses the
monitored region from the outer ring to the inner ring, and
at least one sensor reports an alarm; otherwise, there is not
any.
In this paper, we consider a belt region with its two
approximate vertical boundaries being overlapped, that is,
a circular region in Figure . e network model shown in
Figure  describes the loop dividing, and the monitored area
is divided into equal concentric loops, which can be
expressed as
𝑤=𝑂−𝐼
,()
where is the required parameter predesigned. Assume that
all sensors know their local coordinates, and the coordinate
of the center point is known. Each sensor can communicate
with its neighbor sensors within its communication range.
Considering a sensor 𝑢,whosecoordinateis(𝑢,𝑢),aset
of its neighbor sensors is marked as () = {1,2,...,𝑡},
0<<. As shown in Figure , the blue rings represent
the inner and outer rings, and the black rings represent the
divided virtual rings.
3.2. Strong -Barrier Construction Algorithm. In this section,
we propose an algorithm to achieve -barrier coverage, which
needs much less sensors in building barriers. As mentioned
International Journal of Distributed Sensor Networks
the part of network model, the monitored area is a circular
area, which is divided into equal parts. In addition, the
way of building every barrier is identical in each part. e
construction of one barrier is introduced as follows, such as
the innermost circular loop, and others do the same.
ere are two steps in the barrier construction algorithm.
e rst step is to assign some basic information to sensors
and let them know the information of their neighbors
locations. en the other step is to nd the remaining sensors
used in building a barrier.
3.2.1. Information Assignment. In this step, we divide the
into equalparts,and,ineverypart,abarrierisgoingto
be designed, as shown in Figure . Since the total number
of sensors is , we suppose that the number of sensors in
the innermost ring is , and the number of other circular
rings increases according to the circumference of each ring.
Suppose that circumference of the innermost ring is 𝑖,and
the circumference of adjacent outer ring is 𝑖+1,andtheradii
of sensors are 𝑖and 𝑖+1,respectively.entherelationship
oftheradiiisgivenby
𝑖+1 =𝑖+𝑤,()
where 𝑤is described in (). ese variables get the following
formulation:
𝑖
𝑖+1 =𝑖
𝑖+1 =2𝑖
2𝑖+1=𝑖
𝑖+1 ,()
where 𝑖and 𝑖+1 are the numbers of sensors deployed in two
adjacent circular rings deployed as the Gaussian distribution.
Moreover there is
1+2+⋅⋅⋅+𝑘=. ()
Previous sections have mentioned that the coordinates of sen-
sors are known, which are marked as ((1,1),...,(𝑛,𝑛)).
One of the limitations is the Euclidean distance between two
adjacent critical sensors; that is,
1,2=1−22+1−22.()
Anditmustsatisfythefollowingcondition:
1,2≤2𝑠,()
where 2𝑠is the critical condition for building an eective
barrier; the ultimate goal of our paper is to detect foreign
invaders. If (1,2)>2𝑠,therewillbeagapinthebarrier;
then it has to miss some invaders. 2𝑠≤
𝑐is to keep the
WSNs connecting and to ensure that adjacent sensors can
communicate with each other.
3.2.2. Barrier Construction Algorithm. e last step is specic
to constructing the barrier. Firstly, we randomly nd a
starting sensor and search the next satisfying sensor in turn.
In order to simplify the operation, we do the search along
the clockwise. Equation () describes the distance limitation
A1
rs
rs
dw
2rs
Nm+1
Nm
RiΔ𝜃 O
Nz
F : Graph of the next sensor in the maximum polar angle.
𝑠is the sensing radius of sensors, 𝑖is the innermost radius of the
circular ring, and is the same in each single circular rings.
of two adjoining sensors, but it cannot help us nd the
ideal candidate sensor. en at least one more condition is
really needed, which is the angular restriction. Noting that,
we consider the polar coordinates of sensors. e specic
expression of a sensor 𝑢is as follows:
𝑢=𝑢cos 𝑢
𝑢=𝑢sin 𝑢,()
where 𝑢is the polar radius and 𝑢is the polar angle. Since
the coordinate (𝑢,𝑢)of a sensor is known, the center point
is supposed as the pole, whose rectangular coordinate is
described as (𝑂,𝑂), and we can transform the rectangular
coordinate to the pole coordinate.
When nding the next sensor, it is not necessary to search
it in global scope because we have to construct strong
barriers, which has no gap between two adjoining sensors.
To satisfy the distance limitation, that is, (), it must be in the
polar angle interval, which is a constant value. As shown
in Figure , the maximum polar angle to nd the candidate
sensor is described in detail. ere are two tangent disks along
clockwise, whose centers are 𝑚and 𝑚+1,respectively.
Since radius of is big enough for the radii of sensors, the
length of arc between 𝑚and 𝑚+1 is as approximate as the
Euclidean distance 2𝑠.
In the triangle (𝑚𝑧),𝑧is the intersection of
the center line 𝑚𝑚+1 and circle 𝑚+1, and rectangular
coordinate is known as (𝑧,𝑧). = 4/()/𝑠is the
approximate maximum polar angle interval, which can be
obtained by using the Cosine theorem; that is,
cos = 2
𝑁𝑚𝑂+2
𝑁𝑧𝑂−2
𝑁𝑚𝑁𝑧
2𝑁𝑚𝑂𝑁𝑧𝑂.()
International Journal of Distributed Sensor Networks
en we can get as follows:
max =arccos 2
𝑁𝑚𝑂+2
𝑁𝑧𝑂−2
𝑁𝑚𝑁𝑧
2𝑁𝑚𝑂𝑁𝑧𝑂,()
where 𝑁𝑚𝑁𝑧=3
𝑠and 𝑁𝑚,𝑁2𝑂canbecalculatedby
using (), and in every circular ring is a constant value,
which is just dierent from the polar radius. Equation ()
is another condition to nd the next candidate. e angle
interval diagram is shown in Figure . en the remaining
sensors can be found to construct barriers in the same way
as before. At the same time, we will implement this method
in other rings. But while constructing the barrier, there may
be a situation that such a satisfying candidate sensor cannot
be found regardless of any eorts, so we have to dissolve this
barrier.
In our -barrier coverage algorithm, we can calculate
the minimal amount of nodes that can be used to create
a-barrier deployment. It is a variable changing with the
perimeter of ideal barriers and the sensing radius of sensor
nodes. Let us take min as the minimal amount of nodes, and
()is the radius of the ideal barriers, =1,2,...,; then the
formulaisasfollows:
min =⋅()
𝑠. ()
And the degree of redundancy of deployed nodes in each
circular is at least six times of the minimal amount of
nodes. When the degree is larger than six, our algorithm
can construct -barrier coverage more easily. e number of
sensors nodes deployed in each single circular rings is marked
as 𝑖,𝑖=6⋅min ,=1,2,...,. e six times is not literally
designed; it is achieved by many times of simulation.
e computational complexity of the proposed algorithm
is marked as (()),whichisrelativewith,and 𝑍.
is the maximal times of each searching in theory; 𝑍is the
actual searching number:
()= 𝑘
𝑚=1 1+52+33+𝑍
𝑝=1 6+𝑋
𝑞=𝑚+1 41+12+93+26+3⋅7+28+9. ()
1,2,3are variables satisfying some conditions. 1repre-
sents an identity matrix. 2represents a variable assignment.
3represents a constant assignment. 4represents a compari-
son. 5represents a multiplication. 6represents a addition. 7
represents a square root. 8means taking the absolute value.
e details of our -barrier are shown in Algorithm .
3.3. Barrier Mending Model
3.3.1. Energy Model. Aer running for a certain time, nodes
failure may be an unavoidable problem by running out of
energy or by some physical damage. In previous works, most
of them consider the remaining energy of an individual
sensor,whichcanbeagoodwaytodecidewhetherabarrier
needs to be mended. As one sensor fails, the barrier will
be destroyed. In this paper, we consider a strong -barrier
coverage, which should detect all intruders permeating the
monitored area almost being detected times. Once a hole
appears in a barrier, intruders may pass through the barrier
without being detected. Gap is the crack without any barrier
detecting an intruder’s incursion.
To maintain the monitoring quality, a barrier mend-
ing model is required. We can get the remaining energy
(described as 𝑟) of sensors as follows:
𝑟=𝑛𝑖
𝑖=1,𝑗=1,𝑖 ̸=𝑗𝑖−𝑅
𝑖+𝑇
𝑖⋅𝑅
𝑖𝑗 −𝑆⋅𝑖, ()
where 𝑅
𝑖and 𝑇
𝑖are energy for receiving and transmitting one
unit data, respectively; they all decline with the distance 𝑖𝑗
between two adjacent sensors and ,,=1,2,...,.And
is the parameters of signal decline. 𝑆is energy required
forsensingoneunitdata.𝑖is the initial energy reserve of
sensor𝑖.𝑖is the network lifetime of barrier𝑖;when()is
equal to zero, the network lifetime of barrier is achieving the
upper bound. We can get the distance of two neighboring
sensors by the GPS. We quote () from the literature [].
We can use () to calculate the lifetime of a single barrier.
Andthelifetimeofabarrierisrelatedtoboththenumberof
overlapping sensors (𝑖) in a barrier and the coverage ratio
(𝑖) of a barrier:
work time of barrier𝑖=𝑖⋅𝑖.
𝑖=the number of overlap sensor𝑖
the total number in barrier𝑖.
𝑖=a certain barrier coverage area
maximum coverage area .
()
en we can get relationship between network lifetime
andcoverageratio.Assumingthatistheworktimeof
network, we can get the relationship as follows:
𝑖=𝑖⋅𝑖
𝑘
𝑖=1 𝑖⋅𝑖⋅. ()
Once the remaining energy of a sensor is equal to zero,
it means that the sensor is dead. Two neighboring sensors
around the sensor in the same barrier can detect its failure.
e two neighboring sensors can transmit information to
each other. e previous sensor before the dead one in the
barrier has to nd another sensor to replace the dead one.
Atthesametime,thereplacementsensorconnectingwith
the latter sensor of the dead sensor in the barrier mending
International Journal of Distributed Sensor Networks
Require:𝑠=thesensingradiusofasensor;𝑐= the communication radius between two adjacent nodes; 𝑖=thenumber
of sensors deployed following the Gaussian deployment in the th circular ring; 𝑂=theouterradius;𝐼= the inner
radius; (𝑖,𝑗)= the Euclidean distance between sensor 𝑖and 𝑗;= the searching radius, which is a positive
discrete number; = the barrier number.
Ensure:1is the number of sensors deployed in rst circular ring according to the Gaussian distribution, set as
=(1,2,...,𝑚1)
while =1do
1is the starting sensor, its polar coordinates is
(1,1), 1=()cos 𝑚,
1=()sin 𝑚.=1,2,...,,()(()+/2,delta),𝑚=
𝑖(0,2), ()=+(1), =(𝑂−𝐼)/.
end while
repeat
search the next satisfying sensor, 𝑧∈
until ≤1,max (𝑧−1𝑧)≤2𝑠,max,
= 4
()/𝑠
if (𝑧𝑧+1)≥2𝑠,ormax4/()/𝑠then
break, fail to nd sensor 𝑧
end if
if max 4/()/𝑠, 1then
turn to next step
if 21≤2𝑠then
successfully nd the next sensor
end if
end if
go back to repeat to nd the next valid sensor;
while the number of sensors 𝑠in one barrier is equal to
the minimal number min =2()/2() do
if 𝑛min𝑛1≤2𝑠,then
succeed in building a barrier, break;
else 𝑛min𝑛1≥2𝑠, continue to nd the next valid senor, then
go back to step before two steps;
end if
end while
A : A strong k-barrier construction algorithm.
model must satisfy some requirements. In other words, the
new barrier can monitor one line of the eld and no intruders
can pass through the line without being detected. In other
words, the new barrier can monitor one line of the eld
andnointrudercanpassthroughthelinewithoutbeing
detected. ere are some limitations needing to be satised.
e limitations are the Euclidean distance between the dead
sensor and the replacement sensor and the distance between
the replacement sensor and the latter sensor. ese distances
all must be shorter than two times the sensing range, whereas
the Euclidean distance between the dead sensor and the latter
sensor should be shorter than the communication range 𝑐.
e mathematical expressions are N2N3≤(2
𝑠),N3N5
(2𝑠),N2N5≤𝑐,𝑐=2𝑠.AsshowninFigure,sensorsN,
N, N, N, N, and N belong to the same barrier, and these
sensors monitor one of the circular rings of the interested
area. Suppose that sensor N is dead, and both sensors N and
N can detect its failure. Since N is the previous sensor, it is
responsible for nding the replacement sensor N according
to the following rules. en N sends N a ag message, tells
N the remaining energy of N, and judges whether it should
ABON0
N1
N2
N3
N4
N5N9
N11
N12
k1
F : An example of barrier reconstruction.
wake up immediately or later. If yes, the sensor N sets the
ag =  and sends it to senor N. If no, the sensor N sets
ag = , and it keeps sleeping. Aer N and N receive the
message ag = , they will know that the replacement sensor
will join the barrier to keep it working eectively. e new
barrier becomes N, N, N, N, N, and N.
International Journal of Distributed Sensor Networks
Since the remaining energy of each sensor can be cal-
culated according to (), there is 𝑟=
𝑖,whereis
a small mathematical variable less than , and it can be
calculated at every working time. change with the time
being spent on communication with the neighbor sensors is
worth discussion. As our barrier constructing algorithm is
a real-time communicating algorithm, the communication
time can really be ignored; then canbesetaszeroornearing
zero.
e procedure of nding a replacement sensor should
satisfy the following rules.
Rule 1. e previous sensor should select the replacement one
among the nearest neighborhoods in its ring, while they are
free to use.
Rule 2. If such a suitable sensor is not found, we can borrow
asuitablereplacementonetoformtheotherrings.
Rule 3. If no sensor can be found based on the above two
rules, the current barrier cannot be mended; then we release
the remaining sensors, which become redundant sensors and
arefreetohelpotherbarriersincasesomesensorsfail.
3.3.2. A Barrier Health System. e remaining energy of the
dying sensor𝑖is 𝑟𝑖; when it satises the condition that 𝑟𝑖=
⋅𝑖, its neighbor nodes need to search an alternative node
for it. is a least coecient of the initial energy reserve
of sensor𝑖, which is relative with the distance (𝑖𝑗) between
two neighbor nodes, and the speed of data transmission. e
Euclidean distance between two neighbors can be calculated
according to their coordinates, and the coordinates can be
obtained by GPRS.
Suppose that the speed of data transmission is equal,
marked as V. en the time of data transmission between the
dying node and its neighbor nodes is 𝑖𝑗.𝑖𝑗 =(
𝑖𝑗/V)𝑗𝑘 =
𝑗𝑘/V; they describe the time of date transmitting from two
neighboring nodes ,,and,.Andsensorrepresents the
dying sensor node:
min =𝑅
𝑖+𝑇
𝑖⋅𝑖𝑗 −𝑆⋅𝑖𝑗 +𝑗𝑘
𝑖.()
e remaining energy of the dying node is at least min
times the initial energy of sensor𝑖; its neighbor sensor nodes
need to nd its alternative node. Only, in this way, we may
ensure that the neighbors can nd an alternative node before
the dying node dies.
And an actual protocol that can be used to send the
alerts to the base station is in reference []. In [], nodes in
a cooperative node group will be considered as opponents
to each other; therefore, each node will maintain a -value
whichreectsthepayothatwouldhavebeenreceivedifthat
node selects one action and the other nodes jointly selected
the other action. Aer that, the node with the highest total
payo will be elected to forward the data packet to the next
cooperative node group towards the sink node.
Clockwise
Ak1
k2
kkO
s3
s1s2
̇
E
F : Application of one-way barrier in detecting dierent
intruders. s and s are the trajectories of crossing straight through
the monitored area and s is the trajectories of incompletely crossing
line.
4. Practical Application
is part presents the application of our WSNs in one-
way intruders detection. By using the barrier construction
algorithm proposed in this paper, a -barrier coverage can be
nally achieved as an ideal situation, as shown in Figure .
Sincethesensorsinournetworkaredistributedfollowing
the Gaussian distribution when =0,=1,wecan
construct the preset -barrier coverage very well by using
our algorithm. In the former section, it shows that the
barriers are almost constructed in the center of every circular
ring. Aer -barrier bridges being constructed perfectly, they
will be ultimately used in a practical application which is
called one-way barrier coverage. at is to say every single
intruder crossing straightly through the monitored area can
be detected to be legal or illegal.
Previous works using barriers to provide one-way barrier
coverage have been studied a lot. A new coverage model
called one-way barrier was rstly proposed in []. It proposed
the concept of neighboring barriers and designed dierent
protocols to provide one-way barrier coverage for dierent
sensor models based on neighboring barriers. In addition, a
one-way barrier coverage has been proposed in [], and the
single intruder has been considered in []. But when used to
detect multiple intruders, it is not so eective.
In this section, the model is used to detect the illegal
and legal intrusion. We also need to set an alarm line like
in [, , ]. But there is little dierent between the alarm
line in this paper and in literatures [, , ] because the
barriers in [, , ] are two neighboring barriers which
have a continuous overlapping region. ere are two special
barriers. However, in our WSNs, the above limitations are not
necessary conditions. is is an improvement we have made.
Our detection system is shown in Figure . In the monitored
International Journal of Distributed Sensor Networks
Intruder a
Intruder b
k1k2kkOA
Clockwise
.
.
.
(a) Invasion way  of multiple intruders
Intruder a
Intruder b
k1k2kkO
O
A
Clockwise .
.
.
(b) Invasion way  of multiple intruders
Intruder a
Intruder b
k1k2kkOA
Clockwise
.
.
.
(c) Invasion way  of multiple intruders
F : ree kinds of invasion ways.
area, it has formed -barrier coverage being described by the
black rings with arrows. is situation is the ideal situation
and the direction of arrows is the direction of building
barriers. In fact, it does not matter how -barrier coverage
is constructed by using our algorithm; has to be more
than two. When isequaltotwo,ouralgorithmisjustthe
neighboring barriers proposed in [, , ]. at is to say, it is
a special situation of our model.
4.1. One Intruder. Obviously, WSNs with only one barrier
cannot furnish one-way barrier coverage. As mentioned
before, two barriers can provide one-direction barrier cov-
erage, but it must follows some special assumptions, such as
the limitations mentioned in literatures [–]. is paper
concentrates on using -barrier coverage to achieve the same
goal. Here we suppose that there is only one intruder crossing
the annual region. As shown in Figure , there are three
possible paths that one intruder may follow. For example, the
three red dotted lines with arrows are some possible invasion
paths of the intruders in Figure , described as s, s, and s,
respectively.
We assume that intruders penetrating straightly through
the circular monitored area from outside to inner region
are illegal intruders, which need to be detected. In practical
situation the circular monitoring area is like an isolation
belt, and only the intruders thoroughly penetrating the area
from outside to inside need to be broadcast, such as s.
On the contrary, intruders not thoroughly penetrating the
monitoring area or penetrating the area from the inside to
International Journal of Distributed Sensor Networks
0 20 40 60 80 100 120 140
0
10
20
30
40
50
60
70
80
90
100
(a) Wireless Sensor Networks in rectangular area
0 20 40 60 80 100 120 140
0
10
20
30
40
50
60
70
80
90
100
(b) 𝑘-barrier coverage constructed by our algorithm with sensors
following Gaussian deployment, 𝑘=4
F : Extended application in rectangular area.
outside are thought to be legal, like the paths s and s in
Figure . In order to distinguish the illegal intruders, we quote
the notion of alarm line in literature []. And the alarm line
in [] is a little dierent from to the one in this paper. An
alarmlinehereisalineorcurvealongthebeltwiththe
following property: the network reports an alarm whenever
an intruder crosses the alarm line from outside to inside, but
it does not report any alarm when an intruder crosses the
line from inside to outside. e bottom line of the innermost
barrier of WSNs is chosen as the alarm line.
Here we take -barrier as an example. When an intruder
thoroughly penetrates the monitoring area and enters into
the protected region, the intruder will be detected times
and will trigger the alarm line. It is illegal that the intruder is
detected times at rst and then triggers the alarm line. On
the contrary, it is legal. For example, the path s in Figure 
is illegal, and the path s is legal, which will not report any
alarm. When the alarm is reported, we can easily distinguish
the illegal one. Since some intruders are not going to enter the
inner region of our monitored area, such as the path s shown
in Figure , an intruder enters into the monitoring area and is
detected several times being less than the maximum number
of barriers constructed in our model, but does not trigger the
alarm line; then the intruder is also thought to be legal. It is
obvious to see that our model can eectively detect the illegal
intruders, and it does not require two neighboring barriers,
and it can be used more widely. Above all, there are some
common situations most likely happened in our monitored
area.
4.2. Multiple Intruders. When considering more than one
intruderatthesametime,our-barrier coverage can provide
one-way barrier coverage if the intruders cross straight
through the region satisfying some constrains. AS shown
in Figures (a), (b), and (c), there are three possible
penetrating paths of intruders.
When intruders cross the circular area along the same
direction, such as in Figures (a) and (b), intruders and
either penetrate the circular rings from the outer boundary to
the inner boundary or from the inner boundary to the outer
boundary. In this case, intruders are detected −1times rst;
then they trigger the alarm line or trigger the alarm line rst;
then they will be detected −1times. Obviously, when there
are multiple intruders, we can detect the illegal intruders
depending on the order of triggering the alarm line rst or
being detected −1times rst. ere is no eect on each
intruder when intruders cross the circular rings with dierent
directions, as shown in Figure (c). ere exits a situation that
intruder triggersthealarmlinewhileintruderpenetrates
the circular rings and triggers the alarm line at the same; then
the detecting system may ignore the behavior of intruder .So
our -barrier coverage cannot detect multiple intruders well
under this circumstance.
5. Extended Application
In previous sections, we studied -barrier coverage of WSNs
in a circular area; here we are talking about its extended
application used in more generalized environment, for exam-
ple, with rectangular area. As seen in Figures (a) and (b),
the length is  m, and width is  m. In Figure (a), the
rectangular area has been divided into four width parts
equally, and sensors are deployed in the middle line of each
part following Gaussian deployment (=1,=+).
When sensors are deployed randomly in monitored area,
there are risks of sensors being deployed in some place with
high density; on the country, some places are with very few
sensors. Since the strong -barriers mean that no intruders
can penetrate the monitored area without being detected,
no gaps are allowed in barriers. To make sure of building
strong -barriers in WSNs with sensors randomly deployed,
we should deploy more than enough sensors in monitored
area.
e minimal amount of nodes in each barrier calculated
according to formula () is 5,5,5,5.Andwecanseein
Figure (b), which costs 6,6,6,6sensors in practical, our -
barriercoveragecanbeusedwellinrectangulararea,since
the error can be ignored in terms of the whole WSNs. Above
all, the proposed -barrier algorithm can not only be use in
a circular area, but also can be used in a more generalized
environment where the upper and lower boundaries are
parallel.
 International Journal of Distributed Sensor Networks
−100 −80 −60 −40 −20 0 20 40 60 80 100
−100
−80
−60
−40
−20
0
20
40
60
80
100
Gaussian
F : Initial Gaussian deployment of sensors with =0,=1,𝑠=10m, and 𝑐=10m.
6. Performance Evaluation
6.1. Simulation Methodology. e simulation results are
obtained in MATLAB. e objectives of the evaluation are
threefold: () testing the feasibility and eectiveness of our
algorithm in constructing -barrier coverage; () testing our
sensor network in detecting whether an intruder is legal or
illegal; and () studying the performance of our algorithm
under dierent system parameters, such as dierent sensing
radii of sensors, dierent barrier constructing models, and
dierent sensor distributions.
In the simulations, deploy  nodes in an annular
region. e distribution of sensors follows the Gaussian
distribution and radius of the annual region ranges from
 m to  m. e sensing radii of all sensors are identical.
Intruders try to cross the region from one ring to the other
ring. Here the annular region is divided into four parts
with equal width. Without loss of generality, we assume that
the intruders’ always move from any of the two edges of
the annular region. We study dierent inuence of sensor
sensing radius in constructing our barriers. en we study the
impact of system parameters and intruders characteristics.
e sensing range is set as m and the communication range
issetasm.enumberofisassumedtobeinadvance.
Since the sensors are deployed as the Gaussian deployment,
the real value of may not exactly be . e number of sensors
in each part of the four annular regions is , , , ,
respectively, which are calculated according to the perimeter
of each ring.
6.2. Construction of the WSNs. To t e st the fe a s i b i l i t y and
eectiveness of our algorithm, Figure  shows the initial
Gaussian deployment diagram, and we take =4.e
initial number of sensors is set as , , ,  from the
innermost circular ring to the outermost, respectively. e
sensors are almost deployed around the middle virtual line.
Here we take =0,=1.
Figure  shows the simulation results of our algorithm.
We take s=8m, 𝑐=2
𝑠=16m, and =0,and
=1.Figure(a)showsthebarriersformedinthemodel
in Figure . We can see that there are four barriers in our
annular region. We do  times in MATLAB, and we get four
barriers more than  times. But there is also the situation
like in Figure (b) and there is only three barriers in our
monitored region, and the number of is smaller than the
preset value. But it just appears about  times in the 
times simulations. In Figures (a) and (b), the blue smooth
circular rings are our detected annular region and the red
dotted line is our generated barrier. Moreover, the points are
marked as sensors. In Figure , it is just shown the sensors
constructing barriers in each annular ring.
In the innermost circular ring of Figure (a), there is an
incomplete dotted line, which does not construct a complete
barrier, and the incomplete barrier is enlarged in Figure (b).
It shows that the barrier cannot nd a next suitable sensor
under our constraints. Such a barrier is not needed, then we
will dissolve it. And the sensors in the incomplete barrier can
go to sleep until they are waken up.
6.3. Impact of Sensing Radius. To e v aluate the i mp a c t o f s e n s -
ing radius on the performance of our barrier constructing
algorithm, we set the initial numbers of sensors as , , ,
 from the innermost annular ring to the outermost one,
and sensors are deployed following the Gaussian deployment
in every annular ring. In addition, if we can build one barrier,
the number of sensors is enough. e sensing radii of sensors
are set to be  m and  m for each evaluation, respectively.
Dierent sensing radii are shown in Figure . In Figure ,
we can see that the larger the sensing radius is, the less the
sensorsareneededtobuildabarrierinthesamesituation.For
example, when 𝑠=8m,itneeds,,,sensorsinevery
barrier from the innermost to the outermost like Figure (c),
butitonlyneeds,,,sensors,when𝑠=10m. If we
International Journal of Distributed Sensor Networks 
−100 −80 −60 −40 −20 0 20 40 60 80 100
−100
−80
−60
−40
−20
0
20
40
60
80
100
Gaussian
(a) Perfect 𝑘-barrier with Gaussian distribution, 𝑘=4
−100 −80 −60 −40 −20 0 20 40 60 80 100
−100
−80
−60
−40
−20
0
20
40
60
80
100
Gaussian
(b) Unsuccessful 𝑘-barrier coverage, 𝑘=3
−60 −40 −20 0 20 40 60
−60
−40
−20
0
20
40
60
(c) Amplication of the dissolved barrier, 𝑘=3
F : -barrier constructing model with =0,=1,𝑠=8m, and 𝑐=16m.
want to build a barrier to cover the same region, we would
better choose the sensors with larger sensing radius.
6.4. Comparison with Another Model. As the purpose of our
-barrier coverage in WSNs is to detect intruder invasion, we
can compare it with [], which uses a two-neighbor barrier
coverage to detect one-way intruders. We construct such a
two-neighbor barrier coverage using our -barrier coverage
algorithm. As shown in Figure (a), in Figure (b), it is
a -barrier coverage constructed by our -barrier coverage
algorithm, where =2. ey are dierent in nature. e
two neighboring barriers in Figure (a) are continuously
intersected but not anastomosed. But the -barrier coverage
in Figure (b) is separate. And the circular area is decided
into two width parts. e environment of these two situations
is the same. Sensor nodes are deployed following Gaussian
deployment in the middle line of each circular ring. When
the total number of sensor nodes deployed in the monitored
area is identical, we can see from Figure (c) that the number
of sensor nodes used in building two barriers between Figures
(a) and (b) is basically the same because the error is
negligible in terms of the whole WSNs. e comparison on
the number of sensor nodes used in building two barriers
between Figures (a) and (b) shows that our -barrier
algorithm can achieve a good performance when realizing the
same purpose.
6.5. Impact of Sensor Distribution. To evaluate the impact
of sensor distribution on the performance of our algorithm,
we adopt the Gaussian development model in Figure 
and calculate the number of sensors needed to build a
barrier in Figure (a). Here we discuss another sensor
 International Journal of Distributed Sensor Networks
60 80 100 120 140 160 180 200 220 240 260
10
15
20
25
30
35
40
45
Number of deployed sensors
Number of sensors constructing barrier
rs=8
rs=10
F : Number of sensors constructing -barrier with 𝑠=8mand𝑠=10m, =4,=0,and=1.
−100 −50 0 50 100
−100
−80
−60
−40
−20
0
20
40
60
80
100
Gaussian
(a) e two neighboring barriers
−100 −80 −60 −40 −20 0 20 40 60 80 100
−100
−80
−60
−40
−20
0
20
40
60
80
100
Gaussian
(b) Two-barrier coverage
156 182 208 234 260
0
10
20
30
40
50
60
70
Number of sensors deployed
Number of sensors used in barriers
k-barrier coverage algorithm
Two-neighbor barrier algorithm
50 47 47 45 45 42 46 46 44 45
(c) e comparison on the number of sensor nodes used in building
two barriers between (a) and (b)
F : Relevant comparison with our -barrier coverage.
International Journal of Distributed Sensor Networks 
−100 −80 −60 −40 −20 0 20 40 60 80 100
−100
−80
−60
−40
−20
0
20
40
60
80
100
Random
(a) Initial random deployment of sensors; the number of sensors in
every circular ring is the same as in Figure , 𝑟𝑠=10m
−100 −80 −60 −40 −20 0 20 40 60 80 100
−100
−80
−60
−40
−20
0
20
40
60
80
100 Random
(b) 𝑘-barrier constructed by using our algorithm with random
deployment; the total number of sensors using in building 𝑘-barrier
is , more then the Gaussian deployment
40 60 80 100 120 140 160 180 200 220
10
15
20
25
30
35
40
45
Number of deployed sensors
Number of sensors constructing barrier
Gaussian, rs=10, sum = 87
Random, rs=10, sum = 96
(c) e number of sensors for building barriers; the blue dotted one is
random deployment; the total number of sensors is ; the red dotted
one is Gaussian deployment; the total number of sensors is ; the radius
of each sensor is 𝑟𝑠=10m, no matter sensors are deployed by Gaussian
or random
F : Comparing our sensor distribution with random deployment.
distribution, which is the Uniform distribution, and com-
pare the sensor number used in building barriers with the
Gaussian deployment model. e reason why we choose
the Uniform distribution is that it is widely used in past
researches. e result is shown in Figures (a), (b), and
(c). Figure (a) shows the Uniform distribution generated
in MATLAB, and we can see that sensors are deployed
randomly and with no rules in the monitored region. To
compare the inuence of sensor distribution with Gaussian
distribution, the number of sensors distributed in ever y single
annularregionisthesameasthenumberinFigure.
Tobuildthebarriersbyusingthealgorithmproposed
in our paper, it is obvious that more sensors are required.
Figure (b) is a simulation result, and there are also four
barriers in the annular region. e sensing radius, the range
of our annular region, and the simulation times are the
same as the previous Figure . Comparing Figure (b) with
Figure (b), it is easy to see that it takes more sensors to
build barriers. In Figure (b), it shows  barriers constructed
by using sensors with the Uniform distribution. Figure (c)
shows the contrast gure of the Gaussian distribution and
Uniform distribution, which plots the number of sensors
 International Journal of Distributed Sensor Networks
6 7 8 9
0
5
10
15
20
25
30
35
Redundancy of sensors deployed
Percentage of sensors used in constructing
barriers (%)
Barrier 1
Barrier 2
Barrier 3
Barrier 4
30.2
28.1
23.7
24.5
20.9
21.1
19.2
16.7
18.3
18.4
17.3
12.7
17.1
29.5
15.8
14.5
F : e relationship between the percentage of nodes utilization and nodes redundancy.
in every barrier. In Figure , we can see more about the
relationship between randomly deployed sensor redundancy
and the number of strong -barrier coverage. Since sensors
are deployed following random deployment, it is more hard
to construct barriers than Gaussian deployment. In our -
barrier coverage algorithm, we can calculate the minimal
amountofnodesthatcanbeusedtobuilda-barrier
deployment according to formula ().
e degree of redundancy changes from six times to nine
times the minimal amount of sensor nodes in every barrier.
As can be seen in Figure , the higher the redundancy, the
lower the utilization rate of the nodes. It means that the
number of sensor nodes used in building barriers is inverse
to the nodes redundancy. When the degree is lower than six,
it is very dicult to complete -barrier coverage.
6.6. Impact of Delta Value (i.e., ). In this part, we evaluate
the impact of parameter on the performance of our
algorithm. As seen in simulations, varies from  to . e
results are shown in Figures (a) and (b). Aer -time
simulations, we note that the number of sensors used in
building barriers is related to the delta value .Whenis
getting bigger, the performance is getting worse. And when
is big enough, the Gaussian distribution tends to be Uniform
distribution. In Figure (a), it is shown that there are almost
four overlapped lines, and when isequalto,,,,
respectively, the number of sensors used in building barriers
is nearly equal. As shown in Figure (b), the total number of
the sensors used to build the barriers is dierent. It is shown
that when =1, the performance is the best because the
number of sensors used in building -barrier coverage is the
least. In addition, when is smaller than , their performance
is similar to each other. erefore the bigger the is, the more
the total number of sensors is needed. For example, when
is more than , it is hard to get -barrier coverage, since
sensors are always developed outside the annular region, as
seen in Figure (c). At this time, the distribution of sensors
approximates the Uniform distribution adopted in Figure .
7. Conclusion
In this paper, we propose a barrier constructing algorithm in
WSNs for intruder detection, which constructs -barrier in a
circular area, and apply our algorithm in one-way intruders
detecting. When an intruder is detected times at rst, and it
is broadcasted at last, it is an illegal intruder. On the contrary,
if it is broadcasted at rst, then it will be detected at least one
time; it is a legal intruder. e goal of detecting whether an
intruder is legal or illegal is achieved well. On one hand, the
simulation results prove that our protocol can build -barrier
very well. On the other hand, the simulation results prove
that the total number of sensors used in building -barrier
is small. erefore the Gaussian distribution with low is a
good choice.
Competing Interests
e authors declare that they have no competing interests.
Acknowledgments
is work was supported in part by the Program for Science
and Technology Innovative Research Team for Young Schol-
ars in Sichuan Province, China (Grant no. TD),
National Natural Science Foundation of China (Grant no.
), the Fundamental Research Funds for the Cen-
tral Universities (Grant no. ZYGXX), the Overseas
Academic Training Funds, University of Electronic Sci-
ence and Technology of China (OATF, UESTC) (Grant no.
), and the Program for Science and Technology
Support in Sichuan Province (Grant nos. GZ and
GZ).
International Journal of Distributed Sensor Networks 
40 60 80 100 120 140 160 180 200 220 240 260
10
15
20
25
30
35
Number of deployed sensors
Number of sensors constructing barrier
Delta = 1
Delta = 2
Delta = 3
Delta = 4
(a) Number of sensors for building barriers with dierent delta (i.e., 𝜇=
0,delta)
1 2 3 4 5 6 7 8
0
10
20
30
40
50
60
70
80
90
100
Dierent delta values
e total number of sensors building barriers
Gaussian distribution with dierent delta
(b) Comparing the total number of sensors with dierent delta (i.e., 𝜇=
0,delta)
−100 −80 −60 −40 −20 0 20 40 60 80 100
−100
−80
−60
−40
−20
0
20
40
60
80
100
Gaussian
(c) e Gaussian deployment of sensors with high delta (i.e., 𝜇=0,
delta =8), and the number of sensors deployed in the monitored region
isthesameasinFigure
F : Comparing with dierent delta (i.e., =0,delta).
References
[] S. Kumar, T. H. Lai, and A. Arora, “Barrier coverage with
wireless sensors,” in Proceedings of the 11th Annual International
Conference on Mobile Computing and Networking (MobiCom
’05),ACM,Cologne,Germany,August.
[] L.Li,B.Zhang,X.Shen,J.Zheng,andZ.Yao,“Astudyonthe
weak barrier coverage problem in wireless sensor networks,
Computer Networks, vol. , no. , pp. –, .
[] D. Tao, S. Tang, H. Zhang, X. Mao, and H. Ma, “Strong
barrier coverage in directional sensor networks,Computer
Communications, vol. , no. , pp. –, .
[] H. M. Ammari and S. K. Das, “Centralized and clustered k-
coverage protocols for wireless sensor networks,IEEE Trans-
actions on Computers, vol. , no. , pp. –, .
[] S.Kumar,T.H.Lai,M.E.Posner,andP.Sinha,“Optimalsleep-
wakeup algorithms for barriers of wireless sensors,” in Pro-
ceedings of the Fourth International Conference on Broadband
Communications, Networks and Systems (BROADNETS ’07),
Raleigh, NC, USA, September .
[] A. Chen, S. Kumar, and T. H. Lai, “Designing localized algo-
rithms for barrier coverage,” in Proceedings of the ACM Annual
International Conference on Mobile Computing and Networking
(MobiCom ’07), pp. –, Montreal, Canada, .
 International Journal of Distributed Sensor Networks
[]A.Chen,S.Kumar,andT.H.Lai,“Localbarriercoverage
in wireless sensor networks,IEEE Transactions on Mobile
Computing,vol.,no.,pp.,.
[]S.Kumar,T.H.Lai,andA.Arora,“Barriercoveragewith
wireless sensors,Wireless Networks,vol.,no.,pp.,
.
[]B.Liu,O.Dousse,J.Wang,andA.Saipulla,“Strongbarrier
coverage of wireless sensor networks,” in Proceedings of the 9th
ACM International Symposium on Mobile Ad Hoc Networking
and Computing (MobiHoc ’08), pp. –, ACM, Hong Kong,
May .
[] A.Chen,T.H.Lai,andD.Xuan,“Measuringandguaranteeing
quality of barrier-coverage in wireless sensor networks,” in
Proceedings of the 9th ACM International Symposium on Mobile
Ad Hoc Networking and Computing (MobiHoc ’08), Hong Kong,
May .
[] A. Saipulla, C. Westphal, B. Liu, and J. Wang, “Barrier coverage
of line-based deployed wireless sensor networks,” in Proceedings
of the IEEE 28th Conference on Computer Communications
(INFOCOM ’09),pp.,April.
[] T. Yang, D. Mu, and W. Hu, “Energy-ecient coverage quality
guaranteed in wireless sensors network,” Applied Mathematics
and Information Sciences, vol. , no. , pp. –, .
[] S. Megerian, F. Koushanfar, M. Potkonjak, and M. B. Srivastava,
“Worst and best-case coverage in sensor networks,” IEEE
Transactions on Mobile Computing,vol.,no.,pp.,.
[] F. Aurenhammer, “Voronoi diagrams—a survey of a fundamen-
tal geometric data structure,ACM Computing Surveys,vol.,
no. , pp. –, .
[] K. Mulmuley, Computational Geometry: An Introduction
throughRandomizedAlgorithms, Prentice-Hall, Upper Saddle
River, NJ, USA, .
[] L. Zhang, J. Tang, and W. Zhang, “Strong barrier coverage
with directional sensors,” in Proceedings of the IEEE Global
Telecommunications Conference (IEEE GLOBECOM ’09),pp.
, Honolulu, Hawaii, USA, November .
[] V. Giacomino, Q. Huang, G. Qu, and M. Potkonjak, “Minimal
and maximal exposure path algorithms for wireless embedded
sensor networks,” in Proceedings of the 1st International Confer-
ence on Embedded Networked Sensor Systems (SenSys ’03),Los
Angeles, Calif, USA, November .
[] A.Chen,T.H.Lai,andD.Xuan,“Measuringandguaranteeing
quality of barrier-coverage in wireless sensor networks,” in
Proceedings of the 9th ACM International Symposium on Mobile
Ad Hoc Networking and Computing (MobiHoc ’08),pp.,
May .
[] J. Tian, W. Zhang, and G. Wang, “Duty-cycle scheduling for
intruder detection in wireless sensor networks,” in Proceedings
of the 24th IASTED International Conference on Parallel and
Distributed Computing and Systems (PDCS ’12),pp.,
November .
[]J.Tian,W.Zhang,G.Wang,andX.Gao,“Dk-barrier
duty-cycle scheduling for intruder detection in wireless sensor
networks,Computer Communications,vol.,pp.,.
[] A. Chen, Z. Li, T. H. Lai, and C. Liu, “One-way barrier coverage
with wireless sensors,” in Proceedings of the IEEE INFOCOM,
pp. –, IEEE, Shanghai, China, April .
[] G. Yang and D. Qiao, “Barrier information coverage with
wireless sensors,” in Proceedings of the IEEE 28th Conference on
Computer Communications (INFOCOM ’09), pp. –, April
.
[] A.Chen,Y.Zhu,Z.Li,T.H.Lai,andC.Liu,“Isone-waybarrier
coverage achievable using comprehensive sensors?” Computer
Communications,vol.,pp.,.
[] T. Yang, D. Mu, W. Hu, and H. Zhang, “Energy-ecient border
intrusion detection using wireless sensors network,EURASIP
Journal on Wireless Communications and Networking,vol.,
article , .
International Journal of
Aerospace
Engineering
Hindawi Publishing Corporation
http://www.hindawi.com Volume 2014
Robotics
Journal of
Hindawi Publishing Corporation
http://www.hindawi.com Volume 2014
Hindawi Publishing Corporation
http://www.hindawi.com Volume 2014
Active and Passive
Electronic Components
Control Science
and Engineering
Journal of
Hindawi Publishing Corporation
http://www.hindawi.com Volume 2014
International Journal of
Rotating
Machinery
Hindawi Publishing Corporation
http://www.hindawi.com Volume 2014
Hindawi Publishing Corporation
http://www.hindawi.com
Journal of
Engineering
Volume 2014
Submit your manuscripts at
http://www.hindawi.com
VLSI Design
Hindawi Publishing Corporation
http://www.hindawi.com Volume 2014
Hindawi Publishing Corporation
http://www.hindawi.com Volume 2014
Shock and Vibration
Hindawi Publishing Corporation
http://www.hindawi.com Volume 2014
Civil Engineering
Advances in
Acoustics and Vibration
Advances in
Hindawi Publishing Corporation
http://www.hindawi.com Volume 2014
Hindawi Publishing Corporation
http://www.hindawi.com Volume 2014
Electrical and Computer
Engineering
Journal of
Advances in
OptoElectronics
Hindawi Publishing Corporation
http://www.hindawi.com
Volume 2014
The Scientic
World Journal
Hindawi Publishing Corporation
http://www.hindawi.com Volume 2014
Sensors
Journal of
Hindawi Publishing Corporation
http://www.hindawi.com Volume 2014
Modelling &
Simulation
in Engineering
Hindawi Publishing Corporation
http://www.hindawi.com Volume 2014
Hindawi Publishing Corporation
http://www.hindawi.com Volume 2014
Chemical Engineering
International Journal of
Antennas and
Propagation
International Journal of
Hindawi Publishing Corporation
http://www.hindawi.com Volume 2014
Hindawi Publishing Corporation
http://www.hindawi.com Volume 2014
Navigation and
Observation
International Journal of
Hindawi Publishing Corporation
http://www.hindawi.com Volume 2014
Distributed
Sensor Networks
International Journal of
... In [24], authors presented a localized sleep-wakeup algorithm to compute one-dimensional barrier coverage with maximum lifetime. Junhai Luo et al. [25] proposed a kbarrier coverage algorithm to detect intruders crossing the barrier k times. Wang et al. [26] investigated coverage problem in a k-Gaussian deployment of sensor nodes. ...
... This work considers a strong barrier coverage with a primary and a secondary barrier. In order to ensure that both the barriers have a maximum lifetime, we consider remaining energy of sensors denoted as E r as follows [25]: ...
... A reliable data transfer protocol is used to ensure no packet losses. The The paper evaluates and compares the improvement in lifetime of EEBCA with the lifetime of LABC [18] and 2barrier [25]. The results are given in Figure 2. Two important observations are evident in Figure 2. Firstly, the lifetime of barriers improves with an increase in the number of nodes as barriers tend to more have nodes with better remaining energy. ...
... Fig. 1 shows such a scenario, where sensors form 2-barrier coverage for all the possible paths from the point of intrusion to the centre of the circular RoI. Earlier researchers have employed WSNs for surveillance and intrusion detection purposes and found that WSNs are very effective and render a cost-effective solution for intrusion detection and prevention [9][10][11][12][13][14]. In Keung et al. [15], the authors have developed an analytical framework using mobile sensor networks for intrusion detection and surveillance at border regions. ...
... Furthermore, they found that the same -barrier coverage performance can be achieved by using fewer mobile sensors than static sensors. In Luo and Zou [9], authors have proposed a barrier constructing algorithm for intrusion detection using WSNs. The proposed algorithm is capable of identifying an illegal as well as a legal intruder in a circular region. ...
Article
Ensuring fast and efficient Intrusion Detection and Prevention (IDP) at international borders is crucial for maintaining security and safeguarding nations. In this study, we propose an innovative approach that harnesses the power of machine learning and Wireless Sensor Networks (WSNs) to achieve faster and more accurate IDP. Our novel Fuzzy fed Teaching Learning Based Optimisation regression algorithm (F-TLBO-ID) revolutionises the prediction of the required number of k-barriers for rapid IDP. To develop and validate our approach, we synthetically generated pertinent features using Monte-Carlo simulations. These features encompass essential parameters such as the concerned region’s area, effective transmission range, effective sensing range, number of sensor nodes, and the fading parameter. Training the F-TLBO-ID algorithm with these features yielded exceptional results, accurately predicting the required number of k-barriers with an impressive correlation coefficient (R = 0.99), minimal Root Mean Square Error (RMSE = 11.32), and negligible bias (−3.66). To benchmark the performance of our F-TLBO-ID algorithm, we conducted comprehensive comparisons with fine-tuned benchmark algorithms, including AutoML, GPR, GRNN, RF, RNN, SVM, and ANN. Additionally, we evaluated the algorithm against 11 different variants of nature-inspired algorithms. Remarkably, our F-TLBO-ID algorithm outperformed all these methods in terms of accuracy, firmly establishing its superiority. Finally, we validated the performance of the F-TLBO-ID algorithm using publicly available datasets. The results were highly satisfactory, exhibiting a strong correlation coefficient (R = 0.84), acceptable RMSE (36.24), and minimal bias (−7.17). This study offers a robust and reliable algorithm to predict the required barriers for fast IDP, surpassing the accuracy of existing benchmark algorithms. By implementing our proposed algorithm, the efficiency of IDP systems at international borders can be significantly improved, ultimately enhancing security and facilitating smooth border operations.
... Now, we classify the coverage into three categories namely, area coverage, 2 target coverage, 3 and barrier coverage. 4,5 The degrees of sensing coverage varies according to the application, for example, in a given region some applications need only one sensor to track a position, while other applications require a higher number of sensors to track the location. 6,7 The main aim of target coverage 8 is to track a series of targets continuously with the use of a subset of sensors. ...
Article
Full-text available
Sensing coverage with fault‐tolerant connectivity is considered as a recent research challenge, which measures the Quality of Service (QoS) in wireless sensor networks. QoS is determined based on the set of deployed sensor nodes that monitor all available discrete targets lying at the given point of interest and at the same time have to retain reliable connectivity with the base station. In this article, we focus on two phases namely, monitoring targets in the given sensing area by splitting the sensor network into set covers, which is considered as a nondeterministic polynomial‐time complete problem and optimal deployment of intelligent nodes. At first, achieving full coverage with deployed sensors by covering all discrete targets to prolong the network lifetime. On the other hand, a novel S² (sensors‐spine) node approach was used to place an optimal number of intelligent nodes using a nature‐inspired algorithm named moth flame optimization to overcome the fault among the disjoints sets such that the entire network was fully connected and ensure that sensed data from each target points are collected by the sink node. To evaluate our proposed design, extensive simulations were conducted to demonstrate the efficacy of our proposed mechanism that outperforms other existing techniques found in the literature in terms of prolonged network lifetime and there is no failure in the transmission path during data transmission to the sink node at every t s, such that the entire network was fully connected.
... There are some solutions for barrier coverage problem based on the classical theories: based on the divide and conquer theory, Wen et al. [15] proposed an efficient algorithm to construct k-barrier; based on the Dijkstra algorithm, Liu et al. [16] realized the minimum full-view coverage for mobile CSNs. And there are some algorithms for meeting special requirements in barrier coverage problem: the sensor interference issue was solved in the algorithm for k-barrier coverage in [17]; the one-way k -barrier algorithm was proposed in [18] to avoid one-way Wireless Communications and Mobile Computing invasion; the strategy for filling barrier coverage holes was designed to realize the goal of minimizing the energy consumption [19]. Considering the robustness guarantee, we focus on the strong barrier coverage problem with the goal of lifetime maximization and we will design two heuristics for CSNs with homogeneous networks and heterogeneous ones. ...
Article
Full-text available
Camera sensor networks (CSNs) have advantages on providing the precise and multimedia information for plenty of applications. The high coverage quality of CSNs especially satisfies the monitoring requirements of barrier coverage. In three-dimensional (3D) application scenarios, the tracking of the potential intruder in the monitored irregular spaces brings more difficulties and challenges on strong barrier coverage for CSNs. In this paper, we consider the strong barrier coverage problem in 3D CSNs and focus on the objective of monitoring the intruder with high resolution and maximizing the network lifetime. We firstly introduce the definition and hardness proof for the problem based on the irregular space model and the network model, which adopts the Region of Interest (ROI) sensing model with high effective resolution. Secondly, we design two sleep-and-awake scheduling algorithms for the problem in homogeneous and heterogeneous networks, respectively, which are based on the auxiliary graph transformation and the disjoint flows construction. To evaluate these algorithms’ performance on the lifetime maximization, we conduct extensive simulation experiments and analyze their results on their advantages and applicable scenarios.
... The problem of strong k-barrier coverage for one-way intruder detection is also studied. 17 As seen from the above discussion, most existing related works focus on the following aspects: (1) how to judge whether an ROI is barrier covered (k-barrier covered) or how to derive the critical condition for barrier coverage (k-barrier coverage); (2) how to construct a barrier to cover an ROI; and (3) some optimization problems for barrier coverage (k-barrier coverage). No existing work, to the best of our knowledge, has addressed the issue of evaluating the reliability of constructed k-barrier coverage. ...
Article
Full-text available
The reliability of k-barrier coverage for wireless sensor networks is evaluated in this article. We construct a two-dimensional k-within-consecutive-r × s-out-of-m × n:F system to describe the k-barrier coverage problem and propose the definition of the k-barrier coverage reliability. If the sensing radius r of each sensor is equal to half of the horizontal distance d between two adjacent sensors, then the formula for calculating the k-barrier coverage reliability can be derived directly. If r is a positive integer multiple of d, then a recursive algorithm is applied to calculate the coverage reliability. The effects of the probability that sensors are active, the number of rows of deployed sensors and the number of sensors in each row on the coverage reliability are also analyzed using some illustrative examples. The results show that, if r = d/2, the reliability of a barrier decreases with an increase in the length of the barrier; if r = t × d (t is a positive integer), the reliability of a barrier hardly decreases with an increase in the length of the barrier.
Preprint
Full-text available
This paper Various studies cited in the literature deal with the classic problem of obstacle coverage, where the deployment environment, sensor nodes, and base stations have characteristics that are considered perfect but suffer from various flaws in the real world. This paper presents other barrier coverage types ranked in a new classification based on linear and nonlinear barrier coverage according to deterministic and insecure environments, and enumerates some of the different current and future challenges of these coverage types and connectivity in WSNs.
Article
Full-text available
This paper Various studies cited in the literature deal with the classic problem of obstacle coverage, where the deployment environment, sensor nodes, and base stations have characteristics that are considered perfect but suffer from various flaws in the real world. This paper presents other barrier coverage types ranked in a new classification based on linear and nonlinear barrier coverage according to deterministic and insecure environments, and enumerates some of the different current and future challenges of these coverage types and connectivity in WSNs.
Conference Paper
Full-text available
The various surveys are quoted in the literature address the classical barrier coverage problems where the deployment environment, the sensor nodes and the base station(s) have features, assumed to be perfect, but the real world is tainted by all types of imperfection. This paper presents others barrier coverage types in new linear and non-linear coverage based classification in deterministic and uncertain environments. The paper quotes some various current and future challenges of those coverage types’ problems and the connectivity in WSNs
Article
In wireless sensor networks (WSNs), the barrier coverage’s sensing belt can be open or closed. A closed belt is more difficult to construct than an open belt, as it has higher requirements, especially for the directional sensor networks (DSNs) with rotatable sensors. A target-barrier is a closed annular belt around a target with anti-intrusion and surveillance protection functions for both the inside and outside of the belt. Thus, a target-barrier is well suited to many applications including ecological reserve monitoring and contamination monitoring. In this paper, we employ the Virtual Target-barrier Construction (VTBC) method to facilitate its construction. First, we define and calculate a virtual barrier curve in order to convert the complicated target-barrier construction problem in a rotatable DSN into a much simpler optimization problem. Then, a distributed particle swarm optimization (D-PSO) algorithm is designed to achieve a near optimal coverage of the closed virtual barrier curve. Finally, simulations are presented to prove that VTBC has a better performance than other approaches.
Article
Full-text available
Monitoring the illegal movement across national border effectively is a challenging problem. The emerging technology of wireless sensor network (WSN) is expected to provide a new way to realize energy-efficient border intrusion detection. We propose a scheme to measure and guarantee the coverage quality of WSN. We also design a new coverage model for detecting one-direction path. The simulation results shows that the new coverage model could not only detect the intrusion in border area well, but also extend the network lifetime in an efficient way.
Article
Full-text available
Intruder detection is an important application in wireless sensor networks (WSNs). Barrier coverage, which requires much fewer sensors than full coverage, is broadly known as an appropriate model of coverage for such an application. However, previous works all focus on providing 1D barrier coverage on a thin belt region based on global network information. In this paper, we introduce the concept of 2D k-barrier, and investigate establishing 2D barriers on a square region only with sensors’ local neighbor information. To provide 2D k-barrier coverage in the field, a distributed scheme is proposed. The scheme targets on providing low detection delay and low energy consumption. The barriers constructed in both horizontal and vertical directions guarantee the detection of any intruder whose crossing path can be in any of the two directions. Extensive performance evaluation based on ns2 simulator shows that the proposed scheme outperforms existing mechanism in terms of both detection delay and energy consumption.
Conference Paper
Full-text available
The barrier coverage model was proposed for applications in which sensors are deployed for intrusion detection. In this paper, we study a strong barrier coverage problem in wireless sensor networks with directional sensors. First, we introduce the directional coverage graph to model barrier coverage with directional sensors. Based on this graph model, we present an integer linear programming formulation for the barrier coverage problem, which can be used to provide optimal solutions. Moreover, we present efficient centralized algorithms and a distributed algorithm to solve the problem. It has been shown by simulation results that the proposed algorithms provide close-to-optimal solutions and consistently outperform a simple greedy algorithm.
Conference Paper
Full-text available
Constructing sensor barriers to detect intruders crossing a randomly-deployed sensor network is an important problem. Early results have shown how to construct sensor barriers to detect intruders moving along restricted crossing paths in rectangular areas. We present a complete solution to this problem for sensors that are distributed according to a Poisson point process. In particular, we present an efficient distributed algorithm to construct sensor barriers on long strip areas of irregular shape without any constraint on crossing paths. Our approach is as follows: We first show that in a rectangular area of width w and length l with w = Ω(log l), if the sensor density reaches a certain value, then there exist, with high probability, multiple disjoint sensor barriers across the entire length of the area such that intruders cannot cross the area undetected. On the other hand, if w = o(log l), then with high probability there is a crossing path not covered by any sensor regardless of the sensor density. We then devise, based on this result, an efficient distributed algorithm to construct multiple disjoint barriers in a large sensor network to cover a long boundary area of an irregular shape. Our algorithm approximates the area by dividing it into horizontal rectangular segments interleaved by vertical thin strips. Each segment and vertical strip independently computes the barriers in its own area. Constructing "horizontal" barriers in each segment connected by "vertical" barriers in neighboring vertical strips, we achieve continuous barrier coverage for the whole region. Our approach significantly reduces delay, communication overhead, and computation costs compared to centralized approaches. Finally, we implement our algorithm and carry out a number of experiments to demonstrate the effectiveness of constructing barrier coverage.
Article
Wireless sensor network is always deployed randomly in specific area for intrusion detection and environmental monitoring. Due to the hostile environment, the sensor nodes could not be replaced easily. The efficient energy consumption scheme is known to be more and more important. Meanwhile, saving the energy could not impact the coverage quality. Connecting proper sensors adaptively as a barrier for monitoring is a good solution for both maximizing network lifetime and providing predetermined coverage ratio. The simulation results demonstrate that the algorithms can effectively reduce the energy consumption of the wireless sensor network and also keep the coverage quality on a high level.
Article
Barrier coverage in wireless sensor networks has been studied extensively in recent years, which aims at detecting any movement crossing a given belt, regardless of the direction of movement. For many intrusion detection applications, only the intruders from one side of the belt are illegal such as border guarding. Therefore, we introduce a new coverage model called one-way barrier coverage in this article, which requires that the network reports illegal intruders while ignores legal ones. An appropriate definition for one-way barrier coverage is proposed. However, one-way barrier coverage is much more challenging than conventional barrier coverage since it needs to identify illegal intruders from normal targets.
Article
Barrier coverage is an important problem for sensor networks to fulfill some given sensing tasks. Barrier coverage guarantees the detection of events happened crossing a barrier of sensors. In majority study of barrier coverage using sensor networks, sensors are assumed to have an isotropic sensing model. However, in many applications such as monitoring an area using video camera, the sensors have directional sensing model. In this paper, we investigate strong barrier coverage using directional sensors, where sensors have arbitrarily tunable orientations to provide good coverage. We investigate the problem of finding appropriate orientations of directional sensors such that they can provide strong barrier coverage. We start with one-dimension strong barrier coverage problem, and propose a polynomial time algorithm to achieve strong barrier coverage with minimum number of required directional sensors. We further investigate the strong barrier coverage problem under two-dimensional setting, by exploiting geographical relations among directional sensors and deployment region boundaries in two-dimension plane, we introduce the concept of virtual node to reduce the solution space from continuous domain to discrete domain. Particularly, we construct a directional barrier graph (DBG) to model this barrier coverage problem such that we can quickly answer whether there exist directional sensors’ orientations that can provide strong barrier coverage over a given belt region. If such orientations exist, we then develop energy-efficient solutions that will approximately minimize (1) the total and (2) the maximum rotation angles of all directional sensors. Extensive simulations are conducted to verify the effectiveness of our solution.
Article
When a sensor network is deployed to detect objects penetrating a protected region, it is not necessary to have every point in the deployment region covered by a sensor. It is enough if the penetrating objects are detected at some point in their trajectory. If a sensor network guarantees that every penetrating object will be detected by at least k distinct sensors before it crosses the barrier of wireless sensors, we say the network provides k-barrier coverage. In this paper, we develop theoretical foundations for k-barrier coverage. We propose efficient algorithms using which one can quickly determine, after deploying the sensors, whether the deployment region is k-barrier covered. Next, we establish the optimal deployment pattern to achieve k-barrier coverage when deploying sensors deterministically. Finally, we consider barrier coverage with high probability when sensors are deployed randomly. The major challenge, when dealing with probabilistic barrier coverage, is to derive critical conditions using which one can compute the minimum number of sensors needed to ensure barrier coverage with high probability. Deriving critical conditions for k-barrier coverage is, however, still an open problem. We derive critical conditions for a weaker notion of barrier coverage, called weak k-barrier coverage.
Conference Paper
Barrier coverage of wireless sensor networks has been studied intensively in recent years under the assumption that sensors are deployed uniformly at random in a large area (Poisson point process model). However, when sensors are deployed along a line (e.g., sensors are dropped from an aircraft along a given path), they would be distributed along the line with random offsets due to wind and other environmental factors. It is important to study the barrier coverage of such line- based deployment strategy as it represents a more realistic sensor placement model than the Poisson point process model. This paper presents the first set of results in this direction. In particular, we establish a tight lower-bound for the existence of barrier coverage under line-based deployments. Our results show that the barrier coverage of the line-based deployments significantly outperforms that of the Poisson model when the random offsets are relatively small compared to the sensor's sensing range. We then study sensor deployments along multiple lines and show how barrier coverage is affected by the distance between adjacent lines and the random offsets of sensors. These results demonstrate that sensor deployment strategies have direct impact on the barrier coverage of wireless sensor networks. Different deployment strategies may result in significantly different barrier coverage. Therefore, in the planning and deployment of wireless sensor networks, the coverage goal and possible sensor deployment strategies must be carefully and jointly considered. The results obtained in this paper will provide important guidelines to the deployment and performance of wireless sensor networks for barrier coverage.
Conference Paper
One of the extensively studied coverage models in wireless sensor networks is barrier coverage, which guarantees that any movement crossing the given belt must be detected, while the direction of the movement is not required. For some intrusion detection applications, it may be the case that only one direction of crossing (the belt) is illegal such as border guarding. Therefore, we introduce a new coverage model called one-way barrier coverage, which requires that the network reports illegal intruders while ignores legal intruders. We propose an appropriate definition for one-way barrier coverage. We deeply investigate one-way barrier coverage with binary sensors. Our research illustrates that it is not straightforward to provide one- way barrier coverage even though there is only one intruder. When there are multiple intruders, we introduce the concept of neighboring barriers and design different protocols to provide one-way barrier coverage for different sensor models based on neighboring barriers.