An Optimal Sensor Network for Intrusion Detection
- 1 June 2009
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
Wireless sensor networks have been widely used in environment and habitat monitoring, as well as in military applications such as battlefield surveillance. In this paper, we focus on detecting intruders in such surveillance systems. Our goal is to optimize the network coverage when the network is deployed to detect an intrusion object with the shape of a disc or a rectangle. We study how the size and shape of the intrusion object influence the configuration of the sensor network. We prove many mathematical results related to detection probability and intrusion coverage intensity and study the asymptotic properties of these detection metrics. We also study the problem of maximizing network lifetime under some QoS constraints. We prove the existence of the solution and derive the explicit form of the solution under certain conditions.Keywords
This publication has 13 references indexed in Scilit:
- Intrusion Objects with Shapes under Randomized Scheduling Algorithm in Sensor NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Asymptotic Coverage and Detection in Randomized Scheduling Algorithm in Wireless Sensor NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Modeling Detection Metrics in Randomized Scheduling Algorithm in Wireless Sensor NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- WSN10-3: Maximizing Network Lifetime under QoS Constraints in Wireless Sensor NetworksIEEE Globecom 2006, 2006
- Random coverage with guaranteed connectivity: joint scheduling for wireless sensor networksIEEE Transactions on Parallel and Distributed Systems, 2006
- Lightweight Deployment-Aware Scheduling for Wireless Sensor NetworksMobile Networks and Applications, 2005
- Network coverage using low duty-cycled sensorsPublished by Association for Computing Machinery (ACM) ,2004
- Set k-cover algorithms for energy efficient monitoring in wireless sensor networksPublished by Association for Computing Machinery (ACM) ,2004
- Differentiated surveillance for sensor networksPublished by Association for Computing Machinery (ACM) ,2003
- Coverage problems in wireless ad-hoc sensor networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002