首页 | 本学科首页   官方微博 | 高级检索  
     


Two and three-dimensional intrusion object detection under randomized scheduling algorithms in sensor networks
Authors:Yang Xiao  Yanping Zhang  Miao Peng  Hui Chen  Xiaojiang Du  Bo Sun  Kui Wu
Affiliation:1. Dept. of Computer Science, Univ. of Alabama, United States;2. Dept. of Mathematics and Computer Science, Virginia State Univ., United States;3. Dept. of Computer and Information Sciences, Temple Univ., United States;4. Dept. of Computer Science, Lamar Univ., United States;5. Dept. of Computer Science, Univ. of Victoria, Canada;1. Colorado State University, Fort Collins, CO 80523, USA;2. U.S. Department of the Air Force, Roy, UT 84067, UT 84067, USA;3. Woodward, Inc., Fort Collins, CO 80525, USA;1. Faculty of Pharmaceutical Sciences, Hoshi University, 2-4-41 Ebara, Shinagawa-ku, Tokyo 142-8501, Japan;2. Division of Pharmacognosy, Phytochemistry and Narcotics, National Institute of Health Sciences, Ministry of Health, Labour and Welfare, 1-18-1 Kamiyoga, Setagaya-ku, Tokyo 158-8501, Japan;3. Faculty of Technology, Tokyo University of Agriculture and Technology, 2-24-16 Naka-cho, Koganei, Tokyo 184-8588, Japan;4. Iwate Biotechnology Research Center, 22-174-4 Narita, Kitakami, Iwate 024-0003, Japan;1. Hebei North University, He bei 075000, China;2. Institute of New Energy Science and Technology, Hebei North University, He bei 075000, China;3. Hezhou University, He zhou 542899, China;1. STS Defence Ltd, Mumby Road, Gosport, PO12 1AF, United Kingdom;2. Centre of Intelligent Data Solutions, 36-40 Middle Street, University of Portsmouth, Portsmouth, PO5 4BP, United Kingdom
Abstract:We are interested in wireless sensor networks which are used to detect intrusion objects such as enemy tanks, cars, submarines, etc. Since sensor nodes have a limited energy supply, sensor networks are configured to put some sensor nodes in sleep mode to save energy. This is a special case of a randomized scheduling algorithm. Ignored by many studies, an intrusion object’s size and shape are important factors that greatly affect the performance of sensor networks. For example, an extremely large object in a small sensor field can easily be detected by even one sensor node, no matter where the sensor node is deployed. The larger an intrusion object is, the fewer sensor nodes that are required for detection. Furthermore, using fewer sensor nodes can save resources and reduce the waste of dead sensor nodes in the environment. Therefore, studying coverage based on intrusion object’s size is important. In this paper, we study the performance of the randomized scheduling algorithm via both analysis and simulation in terms of intrusion coverage intensity. In particular, we study cases where intrusion objects occupy areas in a two-dimensional plane and where intrusion objects occupy areas in a three-dimensional space, respectively. We also study the deployment of sensor nodes when intrusion objects are of different sizes and shapes. First, sensor nodes are deployed in a two-dimensional plane and a three-dimensional space with uniform distributions. Then, they are deployed in a two-dimensional plane and a three-dimensional space in two-dimensional and three-dimensional Gaussian distributions, respectively. Therefore, our study not only demonstrates the impact of the size and shape of intrusion objects on the performance of sensor networks, but also provides a guideline on how to configure sensor networks to meet a certain detecting capability in more realistic situations.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号