A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKSEditor IJMTER
The document summarizes a novel approach to detect target movement in wireless sensor networks. It proposes a prediction-based target tracking and sleep scheduling protocol (PPSS) to improve energy efficiency. The protocol reduces actively awakened nodes and controls their active time. It uses a related neighborhood graph to divide the area into non-overlapping faces for target tracking. An edge detection algorithm identifies polygon locations and wakes nodes before a target crosses to continuously monitor mobile targets. The approach achieves high tracking accuracy while reducing energy costs in wireless sensor networks.
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...ijwmn
A selective forwarding attack in mobile wireless sensor networks is an attack that selectively drops or delivers event packets as the compromised node moves. In such an attack, it is difficult to detect the compromised node compared with the selective forwarding attack occurring in the wireless sensor network
because all sensor nodes move. In order to detect selective forwarding attacks in mobile wireless sensor networks, a fog computing-based system for a selective forwarding detection scheme has been proposed. However, since the proposed detection scheme uses a single path, the energy consumption of the sensor node for route discovery when the sensor node moves is large. To solve this problem, this paper uses fuzzy
logic to determine the number of multi-paths needed to improve the energy efficiency of sensor networks. Experimental results show that the energy efficiency of the sensor network is improved by 9.5737% compared with that of the existing scheme after 200 seconds when using the proposed scheme
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
An optimal algorithm for coverage hole healingmarwaeng
This document presents an algorithm for optimally healing coverage holes in hybrid sensor networks. The algorithm:
1. Models the problem as finding a maximum matching on a bipartite graph representing sensors and holes, where edge weights indicate remaining energy.
2. Modifies the graph to allow "cascaded movements" of active sensors to further optimize energy.
3. Works in two steps: first, it determines the minimum possible remaining energy Rmin among moving sensors; second, it finds the maximum matching on the graph after removing edges with weight less than Rmin.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
The document summarizes research on detecting node replication attacks in mobile sensor networks. It discusses challenges in applying existing witness-finding strategies from static networks to mobile ones due to nodes' changing locations over time. Existing velocity-exceeding detection methods rely on centralized processing at the base station, incurring single point of failure issues. The paper then proposes localized detection algorithms that can effectively detect node replication in a distributed manner without requiring network-wide synchronization or revocation. The algorithms aim to overcome limitations of prior work in efficiently detecting replicas in mobile sensor networks.
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
Optimal sensor deployment is necessary condition in homogeneous and heterogeneous wireless sensor
network. Effective deployment of sensor nodes is a major point of concern as performance and lifetime of any
WSN. Proposed sensor deployment in WSN explore every sensor node sends its data to the nearest sink node
of the WSN. In addition to that system proposes a hexagonal cell based sensor deployment which leads to
optimal sensor deployment for both homogeneous and heterogeneous sensor deployment. Wireless sensor
networks are receiving significant concentration due to their potential applications ranging from surveillance
to tracking domains. In limited communication range, a WSN is divided into several disconnected sub-graphs
under certain conditions. We deploy sensor nodes at random locations so that it improves performance of the
network.This paper aims to study, discuss and analyze various node deployment strategies and coverage
problems for Homogeneous and Heterogeneous WSN.
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKSpharmaindexing
This document discusses location verification in wireless sensor networks. It describes two categories of location verification: on-spot verification and in-region verification. On-spot verification checks if a sensor's estimated location matches its true location, while in-region verification checks if a sensor is located within an application-specific region. The document proposes two lightweight algorithms, GFM and GFT, for on-spot verification using neighborhood observations. It also describes a probabilistic algorithm to compute the confidence that a sensor is inside the verification region for in-region verification. The proposed verification system can effectively verify sensor locations without relying on specialized hardware or deployment knowledge, making it suitable for low-cost wireless sensor networks.
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKSEditor IJMTER
The document summarizes a novel approach to detect target movement in wireless sensor networks. It proposes a prediction-based target tracking and sleep scheduling protocol (PPSS) to improve energy efficiency. The protocol reduces actively awakened nodes and controls their active time. It uses a related neighborhood graph to divide the area into non-overlapping faces for target tracking. An edge detection algorithm identifies polygon locations and wakes nodes before a target crosses to continuously monitor mobile targets. The approach achieves high tracking accuracy while reducing energy costs in wireless sensor networks.
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...ijwmn
A selective forwarding attack in mobile wireless sensor networks is an attack that selectively drops or delivers event packets as the compromised node moves. In such an attack, it is difficult to detect the compromised node compared with the selective forwarding attack occurring in the wireless sensor network
because all sensor nodes move. In order to detect selective forwarding attacks in mobile wireless sensor networks, a fog computing-based system for a selective forwarding detection scheme has been proposed. However, since the proposed detection scheme uses a single path, the energy consumption of the sensor node for route discovery when the sensor node moves is large. To solve this problem, this paper uses fuzzy
logic to determine the number of multi-paths needed to improve the energy efficiency of sensor networks. Experimental results show that the energy efficiency of the sensor network is improved by 9.5737% compared with that of the existing scheme after 200 seconds when using the proposed scheme
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
An optimal algorithm for coverage hole healingmarwaeng
This document presents an algorithm for optimally healing coverage holes in hybrid sensor networks. The algorithm:
1. Models the problem as finding a maximum matching on a bipartite graph representing sensors and holes, where edge weights indicate remaining energy.
2. Modifies the graph to allow "cascaded movements" of active sensors to further optimize energy.
3. Works in two steps: first, it determines the minimum possible remaining energy Rmin among moving sensors; second, it finds the maximum matching on the graph after removing edges with weight less than Rmin.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
The document summarizes research on detecting node replication attacks in mobile sensor networks. It discusses challenges in applying existing witness-finding strategies from static networks to mobile ones due to nodes' changing locations over time. Existing velocity-exceeding detection methods rely on centralized processing at the base station, incurring single point of failure issues. The paper then proposes localized detection algorithms that can effectively detect node replication in a distributed manner without requiring network-wide synchronization or revocation. The algorithms aim to overcome limitations of prior work in efficiently detecting replicas in mobile sensor networks.
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
Optimal sensor deployment is necessary condition in homogeneous and heterogeneous wireless sensor
network. Effective deployment of sensor nodes is a major point of concern as performance and lifetime of any
WSN. Proposed sensor deployment in WSN explore every sensor node sends its data to the nearest sink node
of the WSN. In addition to that system proposes a hexagonal cell based sensor deployment which leads to
optimal sensor deployment for both homogeneous and heterogeneous sensor deployment. Wireless sensor
networks are receiving significant concentration due to their potential applications ranging from surveillance
to tracking domains. In limited communication range, a WSN is divided into several disconnected sub-graphs
under certain conditions. We deploy sensor nodes at random locations so that it improves performance of the
network.This paper aims to study, discuss and analyze various node deployment strategies and coverage
problems for Homogeneous and Heterogeneous WSN.
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKSpharmaindexing
This document discusses location verification in wireless sensor networks. It describes two categories of location verification: on-spot verification and in-region verification. On-spot verification checks if a sensor's estimated location matches its true location, while in-region verification checks if a sensor is located within an application-specific region. The document proposes two lightweight algorithms, GFM and GFT, for on-spot verification using neighborhood observations. It also describes a probabilistic algorithm to compute the confidence that a sensor is inside the verification region for in-region verification. The proposed verification system can effectively verify sensor locations without relying on specialized hardware or deployment knowledge, making it suitable for low-cost wireless sensor networks.
This document presents a thesis on developing an intrusion detection system for wireless sensor networks using k-barrier coverage. The thesis is supervised by Mr. Sandeep Sharma and presented by Jaiprakash Nagar. It introduces wireless sensor networks and the problem of intrusion detection. It then outlines the network and mobility model, sensing model, and measurements used for coverage. The document mathematically models the average relative speed of mobile sensors, sensor coverage rate, and probability of k-barrier coverage. Results are analyzed on the effects of different parameters on k-barrier coverage probability. The conclusions discuss the performance of mobile sensor networks for intrusion detection based on k-barrier coverage.
This document summarizes research on coverage problems in wireless sensor networks in the presence of obstacles. It begins with definitions of key concepts related to sensor network coverage, including different types of coverage problems (point, area, barrier), deployment strategies (deterministic, random), coverage degrees, sensing models, and obstacles. It then reviews several approaches that have been proposed to address coverage problems when obstacles are present in the sensor field, including using computational geometry concepts to handle obstacles. The document concludes by noting that more work is still needed to fully address coverage problems in realistic environments with obstacles.
Node detection technique for node replication attack in mobile sensor networkRamesh Patriotic
This document proposes a new technique for detecting node replication attacks in mobile sensor networks. It summarizes existing detection methods and their limitations. The proposed method divides the network into clusters monitored by cluster heads. When a node enters a cluster, the cluster head checks its identity and velocity, which is encrypted and stored in the node. If another node in the cluster has the same identity but different velocity, it is identified as a replica. The technique aims to improve energy efficiency, detection accuracy, and reduce packet drops compared to existing centralized and distributed detection methods.
ER Publication,
IJETR, IJMCTR,
Journals,
International Journals,
High Impact Journals,
Monthly Journal,
Good quality Journals,
Research,
Research Papers,
Research Article,
Free Journals, Open access Journals,
erpublication.org,
Engineering Journal,
Science Journals,
The document analyzes the likelihood of intruder detection in wireless sensor networks (WSNs) distributed uniformly, Gaussianly, and cohesively. It finds that cohesive networks have the highest detection likelihood as sensing range increases, followed by Gaussian and uniform distributions. The detection probability is calculated for single and multiple sensor detection models under varying parameters like sensing range, number of sensors, and intrusion distance. Clustering sensors improves energy efficiency without impacting intruder detection performance.
This document summarizes research on algorithms for proximity estimation in sensor networks. It discusses using sensor networks to detect events observed by nodes within a certain distance of each other. It proposes an algorithm that utilizes a distributed routing index maintained by nodes in the network to process multiple proximity queries involving different event types. The document reviews several related works on localization algorithms, data-centric sensor networks, geographic routing protocols, and node localization techniques. It evaluates different wireless sensor network simulators and deployment schemes.
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Ant Colony Optimization for Wireless Sensor Network: A Reviewiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document provides an overview of wireless sensor networks (WSNs), including their technologies, applications, standards, design features, and evolutions. WSNs enable new applications through spatially distributed sensors that monitor physical conditions and wirelessly transmit data to a central location. They require a balance between communication and processing capabilities given constraints like low power and complexity. The IEEE 802.15.4 standard enables many WSN applications. Performance depends on network size and data type. Sensors are key network components that detect physical properties and convert them to signals. Common sensor types include thermal, electromagnetic, mechanical, and motion sensors. WSNs face unique challenges from ad hoc deployment and constrained node resources.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
This document summarizes research on detecting sensor node failures and proposing a node scheduling scheme in wireless sensor networks. It first introduces wireless sensor networks and discusses common node failures that can occur. It then proposes three algorithms: 1) using neighborhood keys and testing procedures to detect node failures, 2) implementing a security-aware routing protocol to provide security, and 3) developing an adaptive node scheduling method to maintain sensing levels when nodes fail. The document evaluates these approaches and concludes they can help address problems of node failure detection, security, and maintaining network functionality.
3D Localization Algorithms for Wireless Sensor NetworksIOSR Journals
This document discusses localization algorithms for 3D wireless sensor networks. It begins by explaining that localization in 3D spaces poses unique challenges compared to 2D, as strategies used in 2D do not directly extend to 3D. It then reviews common range-based localization methods like received signal strength and time-based methods, as well as range-free methods like centroid and DV-HOP algorithms. The document aims to address the problem of localization for sensor networks deployed in 3D surfaces.
Wireless sensor networks are nowadays widely popular and has become an integral part in the military
applications for human monitoring, thermal detection etc. Security of Wireless sensor network (WSN)
becomes a very important issue with the rapid development of WSN that is vulnerable to a wide range of
attacks such as sinkhole attacks due to deployment in the hostile environment and having limited resources.
Intrusion detection system is one of the major and efficient defensive methods against attacks in WSN. One
such detection technique is black listing technology. But using only Black listing technology is not suitable
for a mobile intruder since it was designed considering only a static intruding node in a WSN. So it is
necessary to build an energy efficient Intrusion detection system for sinkhole attack by a mobile intruder in
WSN. We are intended to design an energy efficient system for detection of sinkhole and elimination of a
mobile intruder from WSN nodes using a technology called greylisting. This technology uses pre alarm
packets to warn the neighboring nodes about the intruder and the energy consumed by the pre alarm
packets for making an alarm is much lesser than that of the packets used in black listing technology. Thus
this method will serve as the solution for the dilemma in providing the security for WSN in sinkhole attack.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...ijasuc
Localization of sensor nodes is important in many aspects in wireless sensor networks. The known
location of sensor node helps in determining the event of interest. A mobile sink is introduced to track the
event driven sensor nodes in the path of the event, thus conserving energy and time. We present a novel
range based localization algorithm which helps the mobile sink to compute the location of the sensor
nodes efficiently. The data transfer from the mobile sink and the sensor nodes is used to estimate the
sensor location. The sensor nodes do not need to spend energy on neighbouring interaction for
localization. The localization mechanism has been implemented in TOSSIM. The simulation results show
that our scheme performed better than other range-based schemes.
A Survey on Localization of Wireless SensorsKarthik Mohan
The document summarizes localization techniques for wireless sensor nodes. It discusses several common localization methods including known location-based using GPS, proximity-based using signal strength, angle-based using angle of arrival, and range-based using time of arrival or time difference of arrival. It also covers some challenges with each approach like accuracy limitations and environmental factors. Finally, it provides a brief comparison of the localization techniques and their typical accuracy ranges from 1-15 meters depending on the method.
This document summarizes a technical seminar report on wireless sensor networks submitted by two students, Kapil Dev Dwivedi and Shusma Sandey, to their professor Ravi Ranjan Mishra. The 5-page report includes an abstract, introduction to wireless sensor networks covering their technology, history and architecture, sensor technology, features of WSNs, applications of WSNs including environmental monitoring and health monitoring, standardization, and references.
Protocols for detection of node replication attack on wireless sensor networkIOSR Journals
This document summarizes two techniques for detecting node replication attacks in wireless sensor networks: centralized detection and distributed detection. Centralized detection involves nodes reporting information to a base station, which can detect replication by identifying conflicting location claims for the same node ID. Distributed detection techniques like witness-based strategies and deployment knowledge allow nodes to detect replication locally without a base station through methods like node broadcasting claims to witness nodes. The document analyzes the advantages and limitations of each approach.
A self localization scheme for mobile wireless sensor networksambitlick
This document describes a self-localization scheme for mobile wireless sensor networks. The scheme selects optimal relay nodes to transmit location information from anchor nodes to sensor nodes beyond one-hop range. The relay nodes are selected based on maintaining proximity to anchor nodes as they move. This allows accurate tracking of anchor node positions while reducing energy consumption by activating only selected relay nodes. Sensor nodes then use the location data from three relay nodes to triangulate their own position. The scheme enables energy-efficient self-localization of mobile sensor nodes in wireless networks.
This document provides 4 links to technical papers related to wireless sensor networks. The papers discuss topics such as secure data distribution in wireless sensor networks, optimizing watchdog systems for more energy efficient trust systems, using game theory to analyze defeating jamming attacks through strategic use of silence, and the design of a cost-aware secure routing protocol for wireless sensor networks called CASER.
This document discusses the challenges of building a network infrastructure to support big data applications. Large amounts of data are being generated every day from a variety of sources and need to be aggregated and processed in powerful data centers. However, networks must be optimized to efficiently gather data from distributed sources, transport it to data centers over the Internet backbone, and distribute results. The unique demands of big data in terms of volume, variety and velocity are testing whether current networks can keep up. The document examines each segment of the required network from access networks to inter-data center networks and the challenges in supporting big data applications.
Deepam Hospitals operates 4 hospitals in Chennai, India providing healthcare services. The hospitals are located in Pallavaram, West Tambaram, Chromepet, and Tambaram. Contact information including addresses and telephone numbers are provided for each of Deepam Hospitals' 4 locations in Chennai.
The document describes 5 database tables with their field names and data types:
1) The User table stores user registration information like ID, username, password, location.
2) The Support table tracks support requests with fields for description, file name and location.
3) The Search Log table logs search activities with fields for search ID, username, keywords, URLs and count.
4) The Primary Key table contains a primary ID, description, file name and location fields.
5) The Main DB table stores a file name and location.
This document presents a thesis on developing an intrusion detection system for wireless sensor networks using k-barrier coverage. The thesis is supervised by Mr. Sandeep Sharma and presented by Jaiprakash Nagar. It introduces wireless sensor networks and the problem of intrusion detection. It then outlines the network and mobility model, sensing model, and measurements used for coverage. The document mathematically models the average relative speed of mobile sensors, sensor coverage rate, and probability of k-barrier coverage. Results are analyzed on the effects of different parameters on k-barrier coverage probability. The conclusions discuss the performance of mobile sensor networks for intrusion detection based on k-barrier coverage.
This document summarizes research on coverage problems in wireless sensor networks in the presence of obstacles. It begins with definitions of key concepts related to sensor network coverage, including different types of coverage problems (point, area, barrier), deployment strategies (deterministic, random), coverage degrees, sensing models, and obstacles. It then reviews several approaches that have been proposed to address coverage problems when obstacles are present in the sensor field, including using computational geometry concepts to handle obstacles. The document concludes by noting that more work is still needed to fully address coverage problems in realistic environments with obstacles.
Node detection technique for node replication attack in mobile sensor networkRamesh Patriotic
This document proposes a new technique for detecting node replication attacks in mobile sensor networks. It summarizes existing detection methods and their limitations. The proposed method divides the network into clusters monitored by cluster heads. When a node enters a cluster, the cluster head checks its identity and velocity, which is encrypted and stored in the node. If another node in the cluster has the same identity but different velocity, it is identified as a replica. The technique aims to improve energy efficiency, detection accuracy, and reduce packet drops compared to existing centralized and distributed detection methods.
ER Publication,
IJETR, IJMCTR,
Journals,
International Journals,
High Impact Journals,
Monthly Journal,
Good quality Journals,
Research,
Research Papers,
Research Article,
Free Journals, Open access Journals,
erpublication.org,
Engineering Journal,
Science Journals,
The document analyzes the likelihood of intruder detection in wireless sensor networks (WSNs) distributed uniformly, Gaussianly, and cohesively. It finds that cohesive networks have the highest detection likelihood as sensing range increases, followed by Gaussian and uniform distributions. The detection probability is calculated for single and multiple sensor detection models under varying parameters like sensing range, number of sensors, and intrusion distance. Clustering sensors improves energy efficiency without impacting intruder detection performance.
This document summarizes research on algorithms for proximity estimation in sensor networks. It discusses using sensor networks to detect events observed by nodes within a certain distance of each other. It proposes an algorithm that utilizes a distributed routing index maintained by nodes in the network to process multiple proximity queries involving different event types. The document reviews several related works on localization algorithms, data-centric sensor networks, geographic routing protocols, and node localization techniques. It evaluates different wireless sensor network simulators and deployment schemes.
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Ant Colony Optimization for Wireless Sensor Network: A Reviewiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document provides an overview of wireless sensor networks (WSNs), including their technologies, applications, standards, design features, and evolutions. WSNs enable new applications through spatially distributed sensors that monitor physical conditions and wirelessly transmit data to a central location. They require a balance between communication and processing capabilities given constraints like low power and complexity. The IEEE 802.15.4 standard enables many WSN applications. Performance depends on network size and data type. Sensors are key network components that detect physical properties and convert them to signals. Common sensor types include thermal, electromagnetic, mechanical, and motion sensors. WSNs face unique challenges from ad hoc deployment and constrained node resources.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
This document summarizes research on detecting sensor node failures and proposing a node scheduling scheme in wireless sensor networks. It first introduces wireless sensor networks and discusses common node failures that can occur. It then proposes three algorithms: 1) using neighborhood keys and testing procedures to detect node failures, 2) implementing a security-aware routing protocol to provide security, and 3) developing an adaptive node scheduling method to maintain sensing levels when nodes fail. The document evaluates these approaches and concludes they can help address problems of node failure detection, security, and maintaining network functionality.
3D Localization Algorithms for Wireless Sensor NetworksIOSR Journals
This document discusses localization algorithms for 3D wireless sensor networks. It begins by explaining that localization in 3D spaces poses unique challenges compared to 2D, as strategies used in 2D do not directly extend to 3D. It then reviews common range-based localization methods like received signal strength and time-based methods, as well as range-free methods like centroid and DV-HOP algorithms. The document aims to address the problem of localization for sensor networks deployed in 3D surfaces.
Wireless sensor networks are nowadays widely popular and has become an integral part in the military
applications for human monitoring, thermal detection etc. Security of Wireless sensor network (WSN)
becomes a very important issue with the rapid development of WSN that is vulnerable to a wide range of
attacks such as sinkhole attacks due to deployment in the hostile environment and having limited resources.
Intrusion detection system is one of the major and efficient defensive methods against attacks in WSN. One
such detection technique is black listing technology. But using only Black listing technology is not suitable
for a mobile intruder since it was designed considering only a static intruding node in a WSN. So it is
necessary to build an energy efficient Intrusion detection system for sinkhole attack by a mobile intruder in
WSN. We are intended to design an energy efficient system for detection of sinkhole and elimination of a
mobile intruder from WSN nodes using a technology called greylisting. This technology uses pre alarm
packets to warn the neighboring nodes about the intruder and the energy consumed by the pre alarm
packets for making an alarm is much lesser than that of the packets used in black listing technology. Thus
this method will serve as the solution for the dilemma in providing the security for WSN in sinkhole attack.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...ijasuc
Localization of sensor nodes is important in many aspects in wireless sensor networks. The known
location of sensor node helps in determining the event of interest. A mobile sink is introduced to track the
event driven sensor nodes in the path of the event, thus conserving energy and time. We present a novel
range based localization algorithm which helps the mobile sink to compute the location of the sensor
nodes efficiently. The data transfer from the mobile sink and the sensor nodes is used to estimate the
sensor location. The sensor nodes do not need to spend energy on neighbouring interaction for
localization. The localization mechanism has been implemented in TOSSIM. The simulation results show
that our scheme performed better than other range-based schemes.
A Survey on Localization of Wireless SensorsKarthik Mohan
The document summarizes localization techniques for wireless sensor nodes. It discusses several common localization methods including known location-based using GPS, proximity-based using signal strength, angle-based using angle of arrival, and range-based using time of arrival or time difference of arrival. It also covers some challenges with each approach like accuracy limitations and environmental factors. Finally, it provides a brief comparison of the localization techniques and their typical accuracy ranges from 1-15 meters depending on the method.
This document summarizes a technical seminar report on wireless sensor networks submitted by two students, Kapil Dev Dwivedi and Shusma Sandey, to their professor Ravi Ranjan Mishra. The 5-page report includes an abstract, introduction to wireless sensor networks covering their technology, history and architecture, sensor technology, features of WSNs, applications of WSNs including environmental monitoring and health monitoring, standardization, and references.
Protocols for detection of node replication attack on wireless sensor networkIOSR Journals
This document summarizes two techniques for detecting node replication attacks in wireless sensor networks: centralized detection and distributed detection. Centralized detection involves nodes reporting information to a base station, which can detect replication by identifying conflicting location claims for the same node ID. Distributed detection techniques like witness-based strategies and deployment knowledge allow nodes to detect replication locally without a base station through methods like node broadcasting claims to witness nodes. The document analyzes the advantages and limitations of each approach.
A self localization scheme for mobile wireless sensor networksambitlick
This document describes a self-localization scheme for mobile wireless sensor networks. The scheme selects optimal relay nodes to transmit location information from anchor nodes to sensor nodes beyond one-hop range. The relay nodes are selected based on maintaining proximity to anchor nodes as they move. This allows accurate tracking of anchor node positions while reducing energy consumption by activating only selected relay nodes. Sensor nodes then use the location data from three relay nodes to triangulate their own position. The scheme enables energy-efficient self-localization of mobile sensor nodes in wireless networks.
This document provides 4 links to technical papers related to wireless sensor networks. The papers discuss topics such as secure data distribution in wireless sensor networks, optimizing watchdog systems for more energy efficient trust systems, using game theory to analyze defeating jamming attacks through strategic use of silence, and the design of a cost-aware secure routing protocol for wireless sensor networks called CASER.
This document discusses the challenges of building a network infrastructure to support big data applications. Large amounts of data are being generated every day from a variety of sources and need to be aggregated and processed in powerful data centers. However, networks must be optimized to efficiently gather data from distributed sources, transport it to data centers over the Internet backbone, and distribute results. The unique demands of big data in terms of volume, variety and velocity are testing whether current networks can keep up. The document examines each segment of the required network from access networks to inter-data center networks and the challenges in supporting big data applications.
Deepam Hospitals operates 4 hospitals in Chennai, India providing healthcare services. The hospitals are located in Pallavaram, West Tambaram, Chromepet, and Tambaram. Contact information including addresses and telephone numbers are provided for each of Deepam Hospitals' 4 locations in Chennai.
The document describes 5 database tables with their field names and data types:
1) The User table stores user registration information like ID, username, password, location.
2) The Support table tracks support requests with fields for description, file name and location.
3) The Search Log table logs search activities with fields for search ID, username, keywords, URLs and count.
4) The Primary Key table contains a primary ID, description, file name and location fields.
5) The Main DB table stores a file name and location.
The document lists 9 academic papers related to android computing from 2015. The papers cover topics such as android malware detection using decompiled source code, the impact of API changes on user ratings of android apps, analyzing permission leakage between android apps, using smartphones to crowdsource image sensing, secure barcode-based visible light communication for smartphones, recommending friends in social networks semantically, analyzing obfuscated smartphone malware, controlling photo sharing on social networks, and continuous user identity verification for secure internet services.
The document lists 7 articles related to optical fiber networks and technologies. The articles cover topics such as backhaul-aware user association in FiWi enhanced LTE-A heterogeneous networks, cellular underwater wireless optical CDMA networks, compressed-domain ship detection on spaceborne optical images using deep neural networks and extreme learning machines, dynamic access network reorganization for the depopulation age, broadcasting control of intelligent air conditioners using power-line-carrier technology, airborne internet access through submarine optical fiber cables, and quantitative and qualitative monitoring systems for switchgear with full electrical isolation using fiber-optic technology. Contact information is provided for any queries.
Congestion control, routing, and scheduling 2015parry prabhu
This document summarizes a research paper about congestion control, routing, and scheduling in wireless networks with interference cancellation capabilities. It discusses using successive interference cancellation (SIC) to allow multiple concurrent transmissions and increase network capacity. The paper formulates the joint congestion control, routing, and scheduling problem and solves it in a distributed manner using dual decomposition. It develops a decentralized algorithm for link scheduling under the physical SINR interference model that coordinates local transmissions and achieves similar results to centralized greedy maximal scheduling. The paper evaluates the performance gains from SIC and shows that network flows can achieve up to twice their rates compared to networks without interference cancellation.
The document lists 10 cloud computing topics related to privacy and security, including shared authentication protocols, denial of service strategies, privacy-preserving keyword search, attribute-based encryption, and mechanisms for secure data sharing in cloud storage.
This document presents a theoretical method for analyzing the performance of wireless body sensors in terms of channel capacity and bit error rate when experiencing slow and fast fading effects. Analytical expressions are developed for channel capacity and BER for different propagation scenarios, including implant-to-implant, implant-to-body surface, and body-surface-to-body-surface. Numerical results using realistic channel models indicate high outage probability and degraded capacity due to complex propagation on body surfaces and inside the body. Communication links must be optimized with fade mitigation techniques to achieve high quality-of-service requirements for biomedical systems. The results provide insight into how the propagation channel affects performance and allow evaluating technical feasibility for different scenarios.
This document contains details of 70 engineering colleges in Tamil Nadu, India. It lists the college name, address, contact details like email, phone, and website. It also mentions the courses offered by each college like computer science, electronics, mechanical, electrical engineering etc. The colleges are spread across different districts of Tamil Nadu like Chennai, Kancheepuram, Vellore, Tiruvallur and others. The document acts as a reference list for engineering colleges and courses offered in the state of Tamil Nadu.
The document lists 9 academic papers related to android computing from 2015. The papers cover topics such as android malware detection using decompiled source code, the impact of API changes on user ratings of android apps, analyzing permission leakage between android apps, using smartphones to crowdsource image sensing, secure barcode-based visible light communication for smartphones, recommending friends in social networks semantically, analyzing obfuscated smartphone malware, controlling photo sharing on social networks, and continuous user identity verification for secure internet services.
This document outlines the hardware and software configuration for a system, including a Pentium processor running at 1.1 GHz with 256 MB RAM and 20 GB hard disk as the hardware configuration, and Windows 95/98/2000/XP as the operating system with vm ware, Hadoop and Mongo DB as the software configuration.
Vector sparse representation of color image using quaternion matrix analysisparry prabhu
The document proposes a vector sparse representation model for color images using quaternion matrix analysis. It represents color images as quaternion matrices, where a quaternion dictionary learning algorithm uses K-quaternion SVD to select sparse bases in quaternion space. This preserves inherent color structures during reconstruction while being more efficient than current sparse models. Experimental results show it avoids hue bias issues and has potential in color image analysis and processing. Future work may explore using the real part of quaternions for four-channel color spaces and improving algorithm convergence.
Brown bread is healthier than white bread for several reasons. White bread contains highly refined carbohydrates that cause blood sugar and insulin levels to spike, which can lead to fat storage. It also contains synthetic additives. Brown bread, on the other hand, is made from whole wheat and contains more fiber, vitamins, and minerals. It has a lower glycemic index, which prevents sharp rises in blood sugar. Brown bread is also less processed and does not have synthetic additives removed during production like white bread. Overall, brown bread is the healthier choice due to its nutritional composition and lower impact on blood sugar levels.
This document provides installation instructions for Card Recovery software. It instructs the user to unpack a zip file, open and activate the older version using a serial number text file, then open the newer unactivated version to enjoy the software.
This document proposes a real-time big data analytical architecture for remote sensing applications to address scalability issues in handling huge amounts of data. The architecture includes a remote sensing data acquisition unit to collect raw data, a data processing unit to filter and load balance the useful data, and a data analytics decision unit to compile results and generate decisions. It also describes algorithms for filtration and load balancing, processing and calculation, aggregation and compilation, and decision making.
Hasbe a hierarchical attribute based solution for flexible and scalable acces...parry prabhu
The document proposes a Hierarchical Attribute-Set-Based Encryption (HASBE) scheme to provide scalable and flexible access control for outsourced data in cloud computing. HASBE extends Ciphertext-Policy Attribute-Set-Based Encryption with a hierarchical user structure for scalability. It also supports compound attributes for flexibility and fine-grained access control. HASBE employs multiple expiration times to more efficiently revoke users compared to existing schemes. The security of HASBE is formally proven based on CP-ABE security. The scheme is implemented and experiments show it efficiently and flexibly handles access control for outsourced cloud data.
system requirement for network simulator projectsparry prabhu
This document outlines the system requirements for hardware including a processor over 500 MHz, 128MB of RAM, 10GB of hard disk space, and 650MB of compact disk space. It also lists the software requirements including an operating system of Windows 2000/XP or Fedora 8.0, the TCL coding++ programming package, and the VMware Workstation tools.
Intrusion detection in homogeneous and heterogeneous wireless sensor networksHarshal Ladhe
This document summarizes a research paper about intrusion detection in homogeneous and heterogeneous wireless sensor networks. It discusses analyzing intrusion detection under two scenarios: single-sensor detection, where one sensor can detect an intruder, and multiple-sensor detection, where collaboration is needed. The paper analyzes detection probability with respect to intrusion distance and network parameters like node density and sensor ranges. Simulation results show heterogeneous networks with sensors of varying ranges increase detection probability over homogeneous networks.
Final Year IEEE Projects, Final Year Projects, Academic Final Year Projects, Academic Final Year IEEE Projects, Academic Final Year IEEE Projects 2013, Academic Final Year IEEE Projects 2014, IEEE JAVA, .NET Projects, 2013 IEEE JAVA, .NET Projects, 2013 IEEE JAVA, .NET Projects in Chennai, 2013 IEEE JAVA, .NET Projects in Trichy, 2013 IEEE JAVA, .NET Projects in Karur, 2013 IEEE JAVA, .NET Projects in Erode, 2013 IEEE JAVA, .NET Projects in Madurai, 2013 IEEE JAVA, .NET Projects in Salem, 2013 IEEE JAVA, .NET Projects in Coimbatore, 2013 IEEE JAVA, .NET Projects in Tirupur, 2013 IEEE JAVA, .NET Projects in Bangalore, 2013 IEEE JAVA, .NET Projects in Hydrabad, 2013 IEEE JAVA, .NET Projects in Kerala, 2013 IEEE JAVA, .NET Projects in Namakkal, IEEE JAVA, .NET Image Processing, IEEE JAVA, .NET Face Recognition, IEEE JAVA, .NET Face Detection, IEEE JAVA, .NET Brain Tumour, IEEE JAVA, .NET Iris Recognition, IEEE JAVA, .NET Image Segmentation, Final Year JAVA, .NET Projects in Pondichery, Final Year JAVA, .NET Projects in Tamilnadu, Final Year JAVA, .NET Projects in Chennai, Final Year JAVA, .NET Projects in Trichy, Final Year JAVA, .NET Projects in Erode, Final Year JAVA, .NET Projects in Karur, Final Year JAVA, .NET Projects in Coimbatore, Final Year JAVA, .NET Projects in Tirunelveli, Final Year JAVA, .NET Projects in Madurai, Final Year JAVA, .NET Projects in Salem, Final Year JAVA, .NET Projects in Tirupur, Final Year JAVA, .NET Projects in Namakkal, Final Year JAVA, .NET Projects in Tanjore, Final Year JAVA, .NET Projects in Coimbatore, Final Year JAVA, .NET Projects in Bangalore, Final Year JAVA, .NET Projects in Hydrabad, Final Year JAVA, .NET Projects in Kerala, Final Year JAVA, .NET IEEE Projects in Pondichery, Final Year JAVA, .NET IEEE Projects in Tamilnadu, Final Year JAVA, .NET IEEE Projects in Chennai, Final Year JAVA, .NET IEEE Projects in Trichy, Final Year JAVA, .NET IEEE Projects in Erode, Final Year JAVA, .NET IEEE Projects in Karur, Final Year JAVA, .NET IEEE Projects in Coimbatore, Final Year JAVA, .NET IEEE Projects in Tirunelveli, Final Year JAVA, .NET IEEE Projects in Madurai, Final Year JAVA, .NET IEEE Projects in Salem, Final Year JAVA, .NET IEEE Projects in Tirupur, Final Year JAVA, .NET IEEE Projects in Namakkal, Final Year JAVA, .NET IEEE Projects in Tanjore, Final Year JAVA, .NET IEEE Projects in Coimbatore, Final Year JAVA, .NET IEEE Projects in Bangalore, Final Year JAVA, .NET IEEE Projects in Hydrabad, Final Year JAVA, .NET IEEE Projects in Kerala, Final Year IEEE MATLAB Projects, Final Year Projects, Academic Final Year Projects, Academic Final Year IEEE MATLAB Projects, Academic Final Year IEEE MATLAB Projects 2013, Academic Final Year IEEE MATLAB Projects 2014, IEEE MATLAB Projects, 2013 IEEE MATLAB Projects, 2013 IEEE MATLAB Projects in Chennai, 2013 IEEE MATLAB Projects in Trichy, 2013 IEEE MATLAB Projects in Karur, 2013 IEEE MATLAB Projects in Erode, 2013 IEEE MATLAB Projects in Madurai, 2013 IEEE MATLAB
Java dynamic coverage of mobile sensor networksecwayerode
This document summarizes research on the dynamic coverage of mobile sensor networks. It finds that while sensor mobility improves coverage over time by covering locations an stationary sensors could not, it also means locations are only covered intermittently as sensors move. The time for a sensor network to detect a random intruder is shown to be exponentially distributed. For mobile intruders and sensors, a game theoretic approach finds the optimal strategy is for sensors to choose movement directions randomly, while intruders remain stationary as part of a Nash equilibrium.
This document summarizes a research paper on defending against replication node attacks in wireless sensor networks. The paper proposes using a "Black Roll" technique to detect and block compromised nodes. It uses Sequential Probability Ratio Testing (SPRT) to detect if a node's speed exceeds the maximum, indicating replication. If detected, the node's IP is added to a blacklist table secured with RSA encryption. A tool called Protowall then blocks the IP address on the blacklist to prevent network access. The paper claims this Black Roll technique improves detection of replication node attacks compared to existing approaches.
Range Free Localization using Expected Hop Progress in Wireless Sensor NetworkAM Publications
Wireless sensor network (WSN) combines the concept of wireless network with sensors. Wireless Sensor Networks
have been proposed for a multitude of location-dependent applications. Localization (location estimation) capability is
essential in most wireless sensor network applications. In environmental monitoring applications such as animal habitat
monitoring, bush fire surveillance, water quality monitoring and precision agriculture, the measurement data are
meaningless without an accurate knowledge of the location from where the data are obtained. Finding position without the
aid of GPS in each node of an ad hoc network is important in cases where GPS is either not accessible, or not practical to use
due to power, form factor or line of sight conditions. So here we are going to used DV-Hop algorithm, i.e. distance vector
routing algorithm for finding the position of sensor. Here we summarizes the performance evaluation criteria of the
wireless sensor network and algorithms, classification methods, and highlights the principles and characteristics of the
algorithm and system representative of the field in recent years, and several algorithms simulation and analysis.
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
The wireless sensor node is a tiny device that is used to capture environment information.
Sensor devices are used to capture temperature and pressure details from the environment. The
sensor devices are used in hospitals, home and production plants. The main components of a sensor
node are microcontroller, transceiver, external memory and power source. A wireless sensor network
(WSN) is a wireless network consisting of spatially distributed autonomous devices. Sensors are
used to cooperatively monitor physical or environmental conditions. Sensor network is equipped
with a radio transceiver or other wireless communications device. The sensor networks are deployed
with consideration of sensing and transmission coverage factors.
Sensor network security protocols provide confidentiality for the messages. Object location and data
sink information are the sensitive elements in the sensor network. Two techniques are used to
provide location privacy to monitored objects. They are Source-location privacy and Sink-location
privacy. Periodic collection and Source simulation models are used in Source-location privacy
technique. Sink simulation and backbone flooding models are used in Sink-location privacy
technique. Communication cost and latency factors are consider in the privacy protection model.
Source and destination location details are protected in the privacy model.
The proposed system integrates the location privacy and data security process for the wireless sensor
network. Region based query model is used to improve location privacy. Confidentiality and
integrity techniques are used for the security process. Rivest Cipher (RC4) algorithm and Secure
Hashing Algorithms (SHA) are used for the data security.
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...Mumbai Academisc
This document discusses intrusion detection in homogeneous and heterogeneous wireless sensor networks. It proposes analyzing intrusion detection under two models: single-sensing detection using a single sensor and multiple-sensing detection using multiple collaborating sensors. The document finds that a heterogeneous wireless sensor network with sensors having different capabilities increases detection probability compared to a homogeneous network. It analyzes network connectivity and broadcast reachability, which are important for ensuring detection probability in wireless sensor networks.
COMPRESSIVE DATA GATHERING TECHNIQUE BY AVOIDING CORRELATED DATA IN WSNpharmaindexing
This document proposes a technique for compressive data gathering in wireless sensor networks using mobile data collectors. It involves identifying correlated sensor data within clusters near polling points and defining a tour plan for mobile collectors that avoids visiting these correlated sensors. This is done using a spatial correlation method. The goal is to identify new optimal polling points by avoiding correlated sensors, which reduces the tour length of mobile collectors and the number of polling points needed. This extends the lifetime of the wireless sensor network. The document provides background on related work using mobile data collectors and discusses how the proposed approach improves upon prior methods.
This document summarizes research on using wireless sensor networks to detect mobile targets. It discusses two optimization problems: 1) maximizing the exposure of the least exposed path within a sensor budget, and 2) minimizing sensor installation costs while ensuring all paths have exposure above a threshold. It proposes using tabu search heuristics to provide near-optimal solutions. The research also addresses extending the models to consider wireless connectivity, heterogeneous sensors, and intrusion detection using a game theory approach. Experimental results show the proposed mobile replica detection scheme can rapidly detect replicas with no false positives or negatives.
1) The document discusses implementing mobile target detection in wireless sensor networks. It focuses on using techniques like Tabu Search heuristics and Sequential Probability Ratio Tests to detect mobile targets and replicas.
2) A key challenge discussed is detecting when a mobile node has been replicated, which the proposed approach attempts to do using SPRT to analyze node speeds and determine if two nodes with the same identity are present.
3) The paper also examines using game theory approaches to maximize network lifetime and weighted intrusion detection in wireless sensor networks for mobile target detection. Experimental results show the SPRT-based replica detection works rapidly with no false positives or negatives.
Wireless sensor networks consist of hundreds or thousands of sensor nodes that are distributed to monitor various environmental conditions through sensing, processing, and communicating with each other and a base station. These sensor nodes have limitations in terms of power, memory, and processing capabilities compared to other networks. Wireless sensor networks have a wide range of applications including military surveillance, environmental monitoring, smart homes/buildings, and healthcare.
1 Object tracking using sensor network Orla SahiSilvaGraf83
1
Object tracking using sensor network
Orla Sahithi Reddy, email:[email protected]
Abstract—With the help of sensor networks we can keep
track on the events using low and tiny powered devices.
In the paper, we are going to analyze and compare
multiple object tracking methods. Instead of using a
single sensor we use multiple sensors and space them, so
it gives us information. Wireless sensor networks has
node with sensor capabilities and place in object
proximity for detecting them. Sensor networks are
applicable in many fields. Depending on the object
tracking in sensor network ranging from defense and
military applications to earth sciences and
environmental, habitat monitoring, traffic monitoring,
surveillance and military reconnaissance and cross-
border which involves habitat monitoring, infiltration
and other commercial applications.
Index Terms—energy efficient object tracking, object
tracking, quality of tracking, wireless sensor networks,
multi target tracking, routing
I. INTRODUCTION
We Need to have a gathering of frameworks which
cooperate to follow an item rather than a solitary
sensor. Due to this strength, ability and productivity of
the arrangement. Various sensors mitigate the issue of
single purpose of disappointment. A Single costly
sensor expands the danger of disappointment over the
zone of intrigue. Every sensor hub has a sensor ready,
a processor and a remote handset. Normally, a
following application research can be ordered in two
different ways. In recent years, Wireless sensor
network is one of the rapidly growing area[1]. To
begin with, the issue of precisely evaluating the area
of article and second being in organize information
preparing and information conglomeration model for
following item. Article can be situated out commonly
by two activities; by update from the sensors or
questioning the sensor for information to find the item.
Checking of articles would require less time than
following of new item.
Regularly, a remote sensor organize comprises of
enormous number of sensor hubs and is wanted to find
an item in the sensor arrange by playing out a routine
occasionally. This included following the article and
assembling data.
This is a term paper submitted for course requirement fulfillment of
“Advanced Wireless Networks”.
Sahithi Reddy Orla is current student in Wright State University
Computer Science and Engineering Department, Fairborn, OH
45324, USA (e-mail: [email protected], UID: U00916256).
We have to have a particular calculation to process or
track the area of the article with the assistance of
information There are different sorts of item following
strategies which can be looked at and broke down. In
remote sensor systems we have sensor hubs to find an
item in the system. This procedure is done
occasionally including gathering information from
sensor hubs.
There are two sign ...
An enhancing security for mobile sinks by providing location privacy in wsneSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
This document discusses improving the performance of mobility patterns in mobile ad-hoc sensor networks using Qualnet 5.0 simulation software. It proposes two models - a non-mobility model and a mobility model, and compares their performance. It then designs a mobility model with improved antenna frequency to transmit signals, called the design mobility model. The performance of the non-mobility, mobility, and design mobility models are analyzed and compared through simulations in Qualnet 5.0. The document reviews several existing mobility models and discusses the architecture and mobility model strategies for wireless sensor networks.
This document summarizes a research paper that proposes a capacitive proximity sensing scheme to detect human motion for applications like monitoring elderly patients. The system uses capacitive sensors embedded in rectangular mats underneath carpets on the floor. Changes in capacitance from a person's proximity are converted to frequency changes using an oscillator. The frequencies are transmitted to a base station that processes the data to determine the person's location. The simple, low-cost approach could allow wide area monitoring without compromising privacy.
1. Occupancy and motion sensors use technologies like ultrasonic, microwave, capacitive, visible light, and infrared to detect movement or occupancy.
2. Microwave sensors emit and receive reflected waves to detect movement, while ultrasonic sensors use echo location like bats.
3. Capacitive sensors detect changes in capacitance from nearby objects, and passive infrared sensors detect changes in infrared emissions.
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkIOSR Journals
This document discusses an efficient approach for outlier detection in wireless sensor networks. It proposes a fault-tolerant data aggregation (FTDA) scheme that uses locality sensitive hashing (LSH) for outlier detection in a distributed manner. The FTDA scheme reduces communication overhead by eliminating redundant data transmission. The document also applies kernel density estimation to sensor data from Intel labs to estimate density and detect outliers. Experiments show FTDA achieves high precision and recall for outlier detection, demonstrating the effectiveness of the proposed approach. Future work will explore other density estimation methods like wavelet transforms for multi-attribute sensor data.
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...Alexander Decker
This document discusses localization techniques for wireless sensor networks. It begins by defining localization as identifying a sensor node's position and explains how accuracy is important. It then describes two main categories of localization techniques: range-based and range-free. Range-based uses distance or angle measurements between nodes for higher accuracy but requires expensive hardware. Range-free relies on information from nearby nodes and is less accurate but cheaper. The document reviews several specific localization algorithms from previous research and their limitations. It concludes by stating that energy efficiency is critical for wireless sensor networks due to limited battery life.
5.a robust frame of wsn utilizing localization technique 36-46Alexander Decker
This document discusses localization techniques for wireless sensor networks. It begins by defining localization as identifying a sensor node's position and explains that localization is a fundamental challenge for wireless sensor networks. It then describes two main categories of localization techniques: range-based and range-free. Range-based techniques use distance or angle measurements between nodes to determine positions but require expensive hardware. Range-free techniques estimate positions based on neighboring node information and are less expensive but less accurate. The document reviews several specific localization algorithms from previous research and discusses their advantages and limitations.
MULTI-ROBOT SENSOR RELOCATION TO ENHANCE CONNECTIVITY IN A WSN ijasuc
Ensuring connectivity in Wireless Sensor Networks (WSN) is a challenging issue, especially in hazardous
areas (like battlefield). Many applications of WSN require an important level of connectivity in the network
to detect a given event (like detection Intrusion) and forward it to the ”sink” node in order to alert users.
For these risky areas the deterministic deployment is not usually guaranteed and the network is composed
by a set of disconnected Islands. We present in our work two strategies to relocate sensors in order to
improve the connectivity using mobile Robots. These two solutions are called Multi-Robot Island-based
Relocation (MRIBR) and Multi-Robot Grid-Based Island-based Relocation (MRGIR). Through several
simulations, we show that MRGIR outperforms MRIBR. Our study can be used especially to make a tradeoff between the number of deployed sensors and the numbers of the used mobile robots, according to the
quality needed for the application.
Similar to wireless sensor network,mobile networking (20)
The American Academy of Neurology now recommends injections of botulinum toxin (Botox) to treat chronic migraines, based on new studies showing a small 15% reduction in migraine frequency. Specifically, the AAN endorses injections of onabotulinumtoxin A. This recommendation comes six years after the FDA approved Botox for migraines, when the AAN previously said evidence was insufficient. Botox is a purified toxin that reduces muscle contractions and pain when used in small amounts.
k-means clustering aims to partition n observations into k clusters in which each observation belongs to the cluster with the nearest mean, serving as a prototype of the cluster. This results in a partitioning of the data space into Voronoi cells.
Privacy preserving public auditing for regenerating-code-based cloud storageparry prabhu
This document proposes a public auditing scheme for cloud storage using regenerating codes to provide fault tolerance. It introduces a proxy that is authorized to regenerate authenticators in the absence of data owners, solving the regeneration problem. The scheme uses a novel public verifiable authenticator generated by keys that allows regeneration using partial keys, removing the need for data owners to stay online. It also randomizes encoding coefficients with a pseudorandom function to preserve data privacy.
This project document outlines a student project that was implemented based on a referenced paper. It includes sections on the project objective, abstract, literature survey of several relevant papers, a description of the proposed system, advantages of the proposed system, and references. The student's name, registration number, and guidance are listed at the top.
Java requirements include a Pentium IV 2.4 GHz processor, 40GB hard disk, 15" VGA color monitor, and 256MB RAM for hardware. The software requirements are Windows XP for the operating system, JSP for the front end, and SQL Server for the back end database.
system requirements for android projectsparry prabhu
The system requirements document outlines the minimum hardware and software specifications. The hardware requires an Intel Pentium 4 CPU clocked at 3.0 GHz or higher, 512 MB of RAM, a 40 GB hard drive, a 15-inch color monitor, and an internet keyboard. The software requires the Android operating system and an Android SDK version 2.3 or higher to develop applications for an Android mobile device.
How to Create User Notification in Odoo 17Celine George
This slide will represent how to create user notification in Odoo 17. Odoo allows us to create and send custom notifications on some events or actions. We have different types of notification such as sticky notification, rainbow man effect, alert and raise exception warning or validation.
8+8+8 Rule Of Time Management For Better ProductivityRuchiRathor2
This is a great way to be more productive but a few things to
Keep in mind:
- The 8+8+8 rule offers a general guideline. You may need to adjust the schedule depending on your individual needs and commitments.
- Some days may require more work or less sleep, demanding flexibility in your approach.
- The key is to be mindful of your time allocation and strive for a healthy balance across the three categories.
Artificial Intelligence (AI) has revolutionized the creation of images and videos, enabling the generation of highly realistic and imaginative visual content. Utilizing advanced techniques like Generative Adversarial Networks (GANs) and neural style transfer, AI can transform simple sketches into detailed artwork or blend various styles into unique visual masterpieces. GANs, in particular, function by pitting two neural networks against each other, resulting in the production of remarkably lifelike images. AI's ability to analyze and learn from vast datasets allows it to create visuals that not only mimic human creativity but also push the boundaries of artistic expression, making it a powerful tool in digital media and entertainment industries.
Brand Guideline of Bashundhara A4 Paper - 2024khabri85
It outlines the basic identity elements such as symbol, logotype, colors, and typefaces. It provides examples of applying the identity to materials like letterhead, business cards, reports, folders, and websites.
Post init hook in the odoo 17 ERP ModuleCeline George
In Odoo, hooks are functions that are presented as a string in the __init__ file of a module. They are the functions that can execute before and after the existing code.
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapitolTechU
Slides from a Capitol Technology University webinar held June 20, 2024. The webinar featured Dr. Donovan Wright, presenting on the Department of Defense Digital Transformation.
Cross-Cultural Leadership and CommunicationMattVassar1
Business is done in many different ways across the world. How you connect with colleagues and communicate feedback constructively differs tremendously depending on where a person comes from. Drawing on the culture map from the cultural anthropologist, Erin Meyer, this class discusses how best to manage effectively across the invisible lines of culture.
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
wireless sensor network,mobile networking
1. Dynamic Coverage of Mobile Sensor Networks
Benyuan Liu, Member, IEEE, Olivier Dousse, Member, IEEE,
Philippe Nain, and Don Towsley, Fellow, IEEE
Abstract—We study the dynamic aspects of the coverage of a mobile sensor network resulting from continuous movement of sensors.
As sensors move around, initially uncovered locations may be covered at a later time, and intruders that might never be detected in a
stationary sensor network can now be detected by moving sensors. However, this improvement in coverage is achieved at the cost
that a location is covered only part of the time, alternating between covered and not covered. We characterize area coverage at
specific time instants and during time intervals, as well as the time durations that a location is covered and uncovered. We further
consider the time it takes to detect a randomly located intruder and prove that the detection time is exponentially distributed with
parameter 2rvs where represents the sensor density, r represents the sensor’s sensing range, and vs denotes the average sensor
speed. For mobile intruders, we take a game theoretic approach and derive optimal mobility strategies for both sensors and intruders.
We prove that the optimal sensor strategy is to choose their directions uniformly at random between ½0; 2Þ. The optimal intruder
strategy is to remain stationary. This solution represents a mixed strategy which is a Nash equilibrium of the zero-sum game between
mobile sensors and intruders.
Index Terms—Wireless sensor networks, coverage, detection time, mobility
Ç
1 INTRODUCTION
COVERAGE is a critical issue for the deployment and
performance of a wireless sensor network, representing
the quality of surveillance that the network can provide, for
example, how well a region of interest is monitored by
sensors, and how effectively a sensor network can detect
intruders. It is important to understand how the coverage of
a sensor network depends on various network parameters
in order to better design and use sensor networks in
different application scenarios.
In many applications, sensors are not mobile and remain
stationary after their initial deployment. The coverage of
such a stationary sensor network is determined by the
initial network configuration. Once the deployment strategy
and sensing characteristics of the sensors are known,
network coverage can be computed and remains un-
changed over time.
Recently, there has been increasing interest on building
mobile sensor networks. Potential applications abound.
Sensors can be mounted on mobile platforms such as
mobile robots and move to desired areas [1], [2], [3], [4].
Such mobile sensor networks are extremely valuable in
situations where traditional deployment mechanisms fail or
are not suitable, for example, a hostile environment where
sensors cannot be manually deployed or air-dropped.
Mobile sensor networks can also play a vital role in
homeland security. Sensors can be mounted on vehicles
(e.g., subway trains, taxis, police cars, fire trucks, boats, etc.)
or carried by people (e.g., policemen, fire fighters, etc.).
These sensors will move with their carriers, dynamically
patrolling and monitoring the environment (e.g., chemical,
biological, or radiological agents). In other application,
scenarios such as atmosphere and underwater environment
monitoring, airborne or underwater sensors may move with
the surrounding air or water currents. The coverage of a
mobile sensor network now depends not only on the initial
network configurations, but also on the mobility behavior of
the sensors.
While the coverage of a sensor network with stationary
sensors has been extensively explored and is relatively well
understood, researchers have only recently started to study
the coverage of mobile sensor networks. Most of this work
focuses on algorithms to relocate sensors in desired
positions in order to repair or enhance network coverage
[5], [6], [7], [8], [9], [10], [11]. More specifically, these
proposed algorithms strive to spread sensors to desired
locations to improve coverage. The main differences among
these works are how exactly the desired positions of sensors
are computed. Although the algorithms can adapt to
changing environments and recompute the sensor locations
accordingly, sensor mobility is exploited essentially to
obtain a new stationary configuration that improves cover-
age after the sensors move to their desired locations.
In this paper, we study the coverage of a mobile sensor
network from a different perspective. Instead of trying to
achieve an improved stationary network configuration as
the end result of sensor movement, we are interested in the
dynamic aspects of network coverage resulting from the
continuous movement of sensors. In a stationary sensor
network, the covered areas are determined by the initial
configuration and do not change over time. In a mobile
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 2, FEBRUARY 2013 301
. B. Liu is with the Department of Computer Science, University of
Massachusetts Lowell, One University Avenue, Lowell, MA 01886.
E-mail: bliu@cs.uml.edu.
. O. Dousse is with the Nokia Research Center, Innovation Square Building
J, 1015 Lausanne, Switzerland.
E-mail: olivier.dousse@nokia.com, odousse@mac.com.
. P. Nain is with the INRIA, 2004 route des Lucioles, BP 93, 06902 Sophia
Antipolis Cedex, France. E-mail: Philippe.Nain@inria.fr.
. D. Towsley is with the Department of Computer Science, University of
Massachusetts Amherst, Amherst, MA 01003.
E-mail: towsley@cs.umass.edu.
Manuscript received 13 Sept. 2011; revised 19 Mar. 2012; accepted 21 April
2012; published online 5 May 2012.
Recommended for acceptance by W. Jia.
For information on obtaining reprints of this article, please send e-mail to:
tpds@computer.org, and reference IEEECS Log Number TPDS-2011-09-0625.
Digital Object Identifier no. 10.1109/TPDS.2012.141.
1045-9219/13/$31.00 ß 2013 IEEE Published by the IEEE Computer Society
2. sensor network, previously uncovered areas become cov-
ered as sensors move through them and covered areas
become uncovered as sensors move away. As a result, the
areas covered by sensors change over time, and more areas
will be covered at least once as time continues. The
coverage status of a location also changes with time,
alternating between being covered and not being covered.
In this work, we assume that sensors are initially randomly
and uniformly deployed and move independently in
randomly chosen directions. Based on this model, we
characterize the fraction of area covered at a given time
instant, the fraction of area ever covered during a time
interval, as well as the time durations that a location is
covered and not covered.
Intrusion detection is an important task in many sensor
network applications. We measure the intrusion detection
capability of a mobile sensor network by the detection time
of a randomly located intruder, which is defined to be the
time elapsed before the intruder is first detected by a sensor.
In a stationary sensor network, an initially undetected
intruder will never be detected if it remains stationary or
moves along an uncovered path. In a mobile sensor network,
however, such an intruder may be detected as the mobile
sensors patrol the field. This can significantly improve the
intrusion detection capability of a sensor network. In this
paper, we characterize the detection time of a randomly
located intruder. The results suggest that sensor mobility
can be exploited to effectively reduce the detection time of a
stationary intruder when the number of sensors is limited.
We further present a lower bound on the distribution of the
detection time of a randomly located intruder, and show
that it can be minimized if sensors move in straight lines.
In some applications, for example, radiation, chemical,
and biological agents detections, there is a sensing time
requirement before an intruder is detected. We find in this
case that too much mobility can be harmful if the sensor
speed is above a threshold. Intuitively, if a sensor moves
faster, it will cover an area more quickly and detect some
intruders sooner, however, at the same time, it will miss
some intruders due to the sensing time requirement. To this
end, we find there is an optimal sensor speed that minimizes
the detection time of a randomly located intruder.
For a mobile intruder, the detection time depends on the
mobility strategies of both sensors and intruder. We take a
game theoretic approach and study the optimal mobility
strategies of sensors and intruder. Given the sensor
mobility pattern, we assume that an intruder can choose
its mobility strategy so as to maximize its detection time
(its lifetime before being detected). On the other hand,
sensors choose a mobility strategy that minimizes the
maximum detection time resulting from the intruder’s
mobility strategy. This can be viewed as a zero-sum
minimax game between the collection of mobile sensors
and the intruder. We prove that the optimal sensor
mobility strategy is for sensors to choose their directions
uniformly at random between ½0; 2Þ. The corresponding
intruder mobility strategy is to remain stationary to
maximize its detection time. This solution represents a
mixed strategy which is a Nash equilibrium of the game
between mobile sensors and intruders. If sensors choose to
move in any fixed direction (a pure strategy), it can be
exploited by an intruder by moving in the same direction
as sensors to maximize its detection time. The optimal
sensor strategy is to choose a mixture of available pure
strategies (move in a fixed direction between ½0; 2Þ). The
proportion of the mix should be such that the intruder
cannot exploit the choice by pursuing any particular pure
strategy (move in the same direction as sensors), resulting
in a uniformly random distribution for sensor’s movement.
When sensors and intruders follow their respective optimal
strategies, neither side can achieve better performance by
deviating from this behavior.
The remainder of the paper is structured as follows: In
Section 2, we review related work on the coverage of sensor
networks. The network model and coverage measures are
defined in Section 3. In Section 4, we derive the fraction of
the area being covered at specific time instants and during a
time interval. The detection time for both stationary and
mobile intruders is studied in Sections 5 and 6, respectively.
In Section 6, we also derive the optimal mobility strategies
for sensors and intruders from a game theoretic perspective.
Finally, we summarize the paper in Section 7.
2 RELATED WORK
Recently, sensor deployment and coverage related topics
have become an active research area. In this section, we
present a brief overview of the previous work on the
coverage of both stationary and mobile sensor networks that
is most relevant to our study. A more thorough survey of the
sensor network coverage problems can be found in [12].
Many previous studies have focused on characterizing
various coverage measures for stationary sensor networks.
In [13], the authors considered a grid-based sensor network
and derived the conditions for the sensing range and failure
rate of sensors to ensure that an area is fully covered. In
[14], the authors proposed several algorithms to find paths
that are most or least likely to be detected by sensors in a
sensor network. Path exposure of moving objects in sensor
networks was formally defined and studied in [15], where
the authors proposed an algorithm to find minimum
exposure paths, along which the probability of a moving
object being detected is minimized. The path exposure
problem is further explored in [16], [17], [18]. In [19], [20],
[21], the k-coverage problem where each point is covered by
at least k sensors was investigated. In [22], the authors
defined and derived several important coverage measures
for a large-scale stationary sensor network, namely, area
coverage, detection coverage, and node coverage, under a
Boolean sensing model and a general sensing model. Other
coverage measures have also been studied. In [23], [24], the
authors studied a metric of quality of surveillance which is
defined to be the average distance that an intruder can
move before being detected, and proposed a virtual patrol
model for surveillance operations in sensor networks. In
[25], the authors studied a novel sensor self-deployment
problem and introduced an F-coverage evaluation metric,
coverage radius, which reflects the need to maximize the
distance from F to uncovered areas. The relationship
between area coverage and network connectivity is inves-
tigated in [26], [27], [28].
While the coverage of stationary sensor networks has
been extensively studied and relatively well understood,
researchers have started to explore the coverage of mobile
sensor networks only recently. In [5], [8], [29], virtual-force
302 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 2, FEBRUARY 2013
3. based algorithms are used to repel nodes from each other
and obstacles to maximize coverage area. In [9], algorithms
are proposed to identify existing coverage holes in the
network and compute the desired target positions where
sensors should move in order to increase the coverage. In
[30], a distributed control and coordination algorithm is
proposed to compute the optimal sensor deployment for a
class of utility functions which encode optimal coverage
and sensing policies. In [31], mobility is used for sensor
density control such that the resultant sensor density
follows the spatial variation of a scalar field in the
environment. In [32], the authors considered the carrier-
based sensor placement problem and proposed a novel
localized algorithm in which mobile robots carry static
sensors and drop them at visited empty vertices of a virtual
grid for full coverage. In [33], an autonomous planning
process is developed to compute the deployment positions
of sensors and leader waypoints for navigationally chal-
lenged sensor nodes. In [34], the authors investigated the
problem of self-deploying a network of mobile sensors with
simultaneous consideration to fault tolerance (biconnectiv-
ity), coverage, diameter, and quantity of movement
required to complete the deployment. In [35], the authors
formulated the distance-sensitive service discovery problem
for wireless sensor and actor networks, and proposed a
novel localized algorithm (iMesh) that guarantees nearby
(closest) service selection with a very high probability. The
deployment of wireless sensor networks under mobility
constraints and the tradeoff between mobility and sensor
density for coverage are studied in [36], [37].
Many of these proposed algorithms strive to spread
sensors to desired positions in order to obtain a stationary
configuration such that the coverage is optimized. The main
difference is how the desired sensor positions are com-
puted. In this work, we study the coverage of a mobile
sensor network from a very different perspective. Instead of
trying to achieve an improved stationary network config-
uration as an end result of sensor movement, we focus on
the dynamic coverage properties resulting from the con-
tinuous movement of the sensors.
Intrusion detection problem in mobile sensor networks
has been considered in a few recent studies, e.g., [38], [39],
[40], [41], [42], [43]. In our work, we take a stochastic
geometry-based approach to derive closed-form expres-
sions for the detection time under different network,
mobility, and sensing models. In [44], Chin et al. proposed
and studied a similar game theoretic problem formulation
for a different network and mobility model.
3 NETWORK AND MOBILITY MODELS
In this section, we describe the network and mobility model,
and introduce three coverage measures for a mobile sensor
network used in this study.
3.1 Sensing Model
We assume that each sensor has a sensing radius, r. A
sensor can only sense the environment and detect intruders
within its sensing area, which is the disk of radius r
centered at the sensor. A point is said to be covered by
a sensor if it is located in the sensing area of the sensor. The
sensor network is thus partitioned into two regions, the
covered region, which is the region covered by at least
one sensor, and the uncovered region, which is the
complement of the covered region. An intruder is said to
be detected if it lies within the covered region.
In reality, the sensing area of a sensor is usually not of
disk shape due to hardware and environment factors.
Nevertheless, the disk model can be used to approximate
the real sensing area and provide bounds for the real case.
For example, the irregular sensing area of a sensor can be
lower and upper bounded by its maximum inscribed and
minimum circumscribed circles, respectively.
3.2 Location and Mobility Model
We consider a sensor network consisting of a large number
of sensors placed in a 2D infinite plane. This is used to model
a large 2D geographical region. For the initial configuration,
we assume that, at time t ¼ 0, the locations of these sensors
are uniformly and independently distributed in the region.
Such a random initial deployment is desirable in scenarios
where prior knowledge of the region of interest is not
available; it can also result from certain deployment
strategies. Under this assumption, the sensor locations can
be modeled by a stationary two-dimensional Poisson point
process. Denote the density of the underlying Poisson point
process as . The number of sensors located in a region R,
NðRÞ, follows a Poisson distribution with parameter kRk,
where kRk represents the area of the region.
Since each sensor covers a disk of radius r, the initial
configuration of the sensor network can be described by a
Poisson Boolean model Bð; rÞ. In a stationary sensor
network, sensors do not move after being deployed and
network coverage remains the same as that of the initial
configuration. In a mobile sensor network, depending on the
mobile platform and application scenario, sensors can
choose from a wide variety of mobility strategies, from
passive movement to highly coordinated and complicated
motion. For example, sensors deployed in the air or water
may move passively according to external forces such as air
or water currents; simple robots may have a limited set of
mobility patterns, and advanced robots can navigate in more
complicated fashions; sensors mounted on vehicles and
people move with their carriers, which may move randomly
and independently or perform highly coordinated search.
In this work, we consider the following sensor mobility
model. Sensors follow arbitrary random curves indepen-
dently of each other without coordination among them-
selves. In some cases, when it helps to yield closed-form
results and provide insights, we will make the model more
specific by limiting sensor movement to straight lines. In
this model, the movement of a sensor is characterized by
its speed and direction. A sensor randomly chooses a
direction  2 ½0; 2Þ according to some distribution with a
probability density function of fÂðÞ. The speed of the
sensor, Vs, is randomly chosen from a finite range ½0; vmax
s Š,
according to a distribution density function of fVs
ðvÞ. The
sensor speed and direction are independently chosen from
their respective distributions.
The above models make simplified assumptions for real
network scenarios. Our purpose is to obtain analytical
results based on the simplified assumptions and provide
insight and guideline to the deployment and performance
of mobile sensor networks. The Poisson distribution and
LIU ET AL.: DYNAMIC COVERAGE OF MOBILE SENSOR NETWORKS 303
4. unit disk model have been widely used in the studies of
wireless networks (e.g., coverage and capacity problems) to
obtain analytical results. The Poisson spatial distribution is
a good approximation for large networks where nodes are
randomly and uniformly distributed. For the mobility
model, we consider the scenarios where nodes move
independently of each other. For example, sensors can be
carried by people or mounted on people’s vehicles, boats, or
animals, etc. These carriers are likely to move indepen-
dently according to their own activity patterns without
much coordination. This is similar to the uncoordinated
mobility model used in [39]. Note that in some scenarios
(e.g., sensors mounted on robots) mobile sensors can
communicate with each other and coordinate their moves.
In that case, the sensors can optimize their movement
patterns and provide more efficient coverage than the
independent mobility case. In this paper, we will focus on
the independent mobility model.
Throughout the rest of this paper, we will refer to the
initial sensor network configuration as random sensor network
Bð; rÞ, the first mobility model where sensors move in
arbitrary curves as random mobility model, and the more
specific mobility model where all sensors move in straight
lines as straight-line mobility model. The shorthand X $
expðÞ stands for IPðX xÞ ¼ 1 À expðÀxÞ, i.e., random
variable X is exponentially distributed with parameter .
3.3 Coverage Measures
To study the dynamic coverage properties of a mobile
sensor network, we define the following three coverage
measures.
Definition 1 (Area coverage). The area coverage of a sensor
network at time t, faðtÞ, is the probability that a given point
xx 2 IR2
is covered by one or more sensors at time t.
Definition 2 (Time interval area coverage). The area
coverage of a sensor network during time interval ½s; tÞ with
s t, fiðs; tÞ, is the probability that given a point x 2 IR2
,
there exists u 2 ½s; tÞ such that x is covered by at least one
sensor at time u.
Definition 3 (Detection time). Suppose that an intruder has a
trajectory xðtÞ and that xð0Þ is uncovered at time t ¼ 0. The
detection time of the intruder is the smallest t 0 such that
xðtÞ is covered by at least one sensor at time t.
All three coverage measures depend not only on static
properties of the sensor network (initial sensor distribu-
tion, sensor density, and sensing range), but also on sensor
movements. The characterization of area coverage at
specific time instants is important for applications that
require parts of the whole network be covered at any
given time instant. The time interval area coverage is
relevant for applications that do not require or cannot
afford simultaneous coverage of all locations at specific
time instants, but prefer to cover the network within some
time interval. The detection time is important for intrusion
detection applications, measuring how quickly a sensor
network can detect a randomly located intruder.
4 AREA COVERAGE
In this section, we study and compare the area coverage
of both stationary and mobile sensor networks. We first
analytically characterize the area coverage. We then
discuss the implications of our results on network
planning and show that sensor mobility can be exploited
to compensate for the lack of sensors to increase the area
being covered during a time interval. However, we point
out, due to the sensor mobility, a point is only covered
part of the time; we further characterize this effect by
determining the fraction of time that a point is covered.
Finally, we discuss the optimal moving strategies that
maximize the area coverage during a time interval.
In a stationary sensor network, a location always remains
either covered or not covered. The area coverage does not
change over time. The effect of sensor mobility on area
coverage is illustrated in Fig. 1. The union of the solid disks
constitutes the area coverage at given time instants. As
sensors move around, exact locations that are covered at
different time instants change over time. The area that has
been covered during time interval ½0; tÞ is depicted as the
union of the shaded region and the solid disks. As can be
observed, more area is covered during the time interval
than the initial covered area. The following theorem
characterizes the effect of sensor mobility on area coverage.
Theorem 1. Consider a sensor network Bð; rÞ at time t ¼ 0,
with sensors moving according to the random mobility model
1. At any time instant t, the fraction of area being
covered is
faðtÞ ¼ 1 À eÀr2
; 8t ! 0: ð1Þ
2. The fraction of area that has been covered at least once
during time interval ½s; tÞ is
fiðs; tÞ ¼ 1 À eÀIEððs;tÞÞ
; ð2Þ
where IEððs; tÞÞ is the expected area covered by a
sensor during time interval ½s; tÞ. When all sensors
move in straight lines, we have
fiðs; tÞ ¼ 1 À eÀðr2
þ2rvsðtÀsÞÞ
; ð3Þ
where vs is the average sensor speed.
3. The fraction of the time a point is covered is
ft ¼ 1 À eÀr2
: ð4Þ
304 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 2, FEBRUARY 2013
Fig. 1. Coverage of mobile sensor network: the left figure depicts the
initial network configuration at time 0 and the right figure illustrates the
effect of sensor mobility during time interval ½0; tÞ. The solid disks
constitutes the area being covered at the given time instant, and the
union of the shaded region and the solid disks represents the area being
covered during the time interval.
5. Due to the space limit, the proof of the theorem is
provided in the supplemental material, which can be found
on the Computer Society Digital Library at http://
doi.ieeecomputersociety.org/10.1109/TPDS.2012.141, of
the paper.
At any specific time instant, the fraction of the area
being covered by the mobile sensor network described
above is the same as in a stationary sensor network. This is
because at any time instant, the positions of the sensors
still form a Poisson point process with the same para-
meters as in the initial configuration. However, unlike in a
stationary sensor network, covered locations change over
time; areas initially not covered will be covered as sensors
move around. Consequently, intruders in the initially
uncovered areas can be detected by the moving sensors.
When sensors all move in straight lines, the fraction of
the area that has ever been covered increases and
approaches one as time proceeds. Later in this section, we
will prove that, among all possible curves, straight line
movement is an optimal strategy that maximizes the area
being covered during a time interval. The rate at which the
covered area increases over time depends on the expected
sensor speed. The faster sensors move, the more quickly the
deployed region is covered. Therefore, sensor mobility can
be exploited to compensate for the lack of sensors to
improve the area coverage over an interval of time. This is
useful for applications that do not require or cannot afford
simultaneous coverage of all locations at any given time,
but need to cover a region within a given time interval.
Note that the area coverage during a time interval does not
depend on the distribution of sensors movement direction.
Based on (3), we can compute the expected sensor speed
required to have a certain fraction of the area (f0) covered
within a time interval of length t0
vs ¼ À
r2
þ logð1 À f0Þ
2rt0
; for f0 ! 1 À er2
:
However, the benefit of a greater area being covered at
least once during a time interval comes with a price. In a
stationary sensor network, a location is either always
covered or not covered, as determined by its initial
configuration. In a mobile sensor network, as a result of
sensor mobility, a location is only covered part of the time,
alternating between covered and not covered. The fraction
of time that a location is covered corresponds to the
probability that it is covered, as shown in (4). Note that
this probability is determined by the static properties of
the network configuration (density and sensing range of the
sensors), and does not depend on sensor mobility. In
the next section, we will further characterize the duration of
the time intervals that a location is covered and uncovered.
From the proof of Theorem 1, it is easy to see that area
coverage during a time interval is maximized when sensors
move in straight lines. This is because, among all possible
curves, the area covered by a sensor during time interval
½s; tÞ, ðs; tÞ, is maximized when the sensor moves in a
straight line. Based on (2), we have the following theorem.
Theorem 2. In a sensor network Bð; rÞ with sensors moving
according to the random mobility model, the fraction of area
covered during any time interval ½s; tÞ is maximized when
sensors all move in straight lines.
It is important to point out that straight line movement is
not the only optimal strategy that maximizes the area
coverage during a time interval. There is a family of optimal
movement patterns that maximize the coverage. We
conjecture that the optimal movement patterns have the
following properties: 1) the local radius of curvature is
greater than the sensing range r everywhere along the
oriented trajectory; 2) if the euclidean distance between two
points of the curve is less than 2r, then the distance between
them along the curve is less than r. When these two
properties are satisfied, the sensing disk of a sensor does
not overlap with its previously covered areas, and a point
will not be covered redundantly by the same sensor. The
covering efficiency is thus maximized.
5 DETECTION TIME OF STATIONARY INTRUDER
The time it takes to detect an intruder is of great importance
in many military and security-related applications. In this
section, we study the detection time of a randomly located
stationary intruder. Detection time for a mobile intruder is
investigated in the next section. To facilitate the analysis and
illustrate the effect of sensor mobility on detection time, we
consider the scenario where all sensors move at a constant
speed vs. More general sensor speed distribution scenarios
can be approximated using the results of this analysis.
We assume that intruders do not initially fall into the
coverage area of any sensor, and an intruder will be
immediately detected when it falls into the sensing range of
mobile sensors. Obviously, these intruders will never be
detected in a stationary sensor network. In a mobile sensor
network, however, an intruder can be detected by sensors
passing within a distance r of it, where r is the common
sensing range of the sensors. The detection time charac-
terizes how quickly the mobile sensors can detect a
randomly located intruder previously not detected. We
will first derive the detection time when sensors all move in
straight lines. We will then consider the case when sensors
move according to arbitrary curves.
Theorem 3. Consider a sensor network Bð; rÞ with sensors
moving according to the straight-line random mobility model
and a static intruder. The sequence of times at which new
sensors detect the intruder forms a Poisson process of intensity
2rvs, where vs denotes the average sensor speed. As a
consequence, the time before the first detection of the intruder
is exponentially distributed with the same parameter.
Due to the space limit, the proof of the theorem is
provided in the supplemental material, available online, of
the paper.
Compared to the case of stationary sensors where an
undetected intruder always remains undetected, the prob-
ability that the intruder is not detected in a mobile sensor
network decreases exponentially over time
PðX ! tÞ ¼ eÀ2rvst
;
where X represents the detection time of the intruder.
The expected detection time of a randomly located
intruder is E½XŠ ¼ 1
2rvs
, which is inversely proportional to
the density of the sensors (), the sensing range of each
LIU ET AL.: DYNAMIC COVERAGE OF MOBILE SENSOR NETWORKS 305
6. sensor (r), and the speed of sensors (vs). Note that the
expected intruder detection time is independent of the
sensor movement direction distribution density function,
fs
ÂðÞ. Therefore, in order to quickly detect a stationary
intruder, one can add more sensors, use sensors with larger
sensing ranges, or increase the speed of the mobile sensors.
To guarantee that the expected time to detect a randomly
located stationary intruder be smaller than a specific value
T0, we have
1
2rvs
T0;
or equivalently,
vs !
1
2rT0
:
If the sensing range of each sensor is fixed, the above
formula presents the tradeoff between sensor density and
sensor mobility to ensure given expected intruder detection
time requirement. The product of the sensor density and
sensor speed should be larger than a constant. Therefore,
sensor mobility can be exploited to compensate for the lack
of sensors, and vice versa.
In the proof of Theorem 1, we pointed out that a location
alternates between being covered and not being covered,
and then derived the fraction of time that a point is covered.
While the time average characterization shows, to a certain
extent, how well a point is covered, it does not reveal the
duration of the time that a point is covered and uncovered.
The time scales of such time durations are also very
important for network planning; they present the time
granularity of the intrusion detection capability that a
mobile sensor network can provide. Theorem 3 now allows
us to characterize the time durations of a point being
covered and not being covered.
Corollary 1. Consider a random sensor network Bð; rÞ at time
t ¼ 0, with sensors moving according to the straight-line
random mobility model. A point alternates between being
covered and not being covered. Denote the time duration that a
point is covered as Tc, and the time duration that a point is not
covered as Tn, we have
Tn $ expð2rvsÞ ð5Þ
E½TcŠ ¼
er2
À 1
2rvs
: ð6Þ
Proof. In the proof of Theorem 3 (see supplemental
material, available online), we know that the sequence
of times at which a new sensor hits a given point forms a
Poisson process of intensity 2rvs. After each sensor hits
the point, it immediately covers the point until it moves
out of range. There is no constraint on the number of
sensors that cover the point. Therefore, the covered/
uncovered sequence experienced by the point can be
seen as a M=G=1 queuing process, where the service
time of an sensor is the time duration that the sensor
covers the point before moving out of range. The idle
periods of M=G=1 queue corresponds to the time
duration that the point is not covered. It is known that
idle periods in such queues have exponentially distrib-
uted durations. Therefore, we have Tn $ expð2rvsÞ.
Since a point alternates between being covered and not
being covered, the fraction of time a point is covered is
ft ¼
E½TcŠ
E½TcŠ þ E½TnŠ
¼ 1 À eÀr2
:
The last equality in the above equation is given in (4).
Solving for E½TcŠ, we obtain (6).
Let T denote the period of a point being covered and
not being covered, i.e., T ¼ Tc þ Tn. The expected value
of the period is
E½TŠ ¼ E½TcŠ þ E½TnŠ ¼ er2
=2rvs:
tu
Above we obtain the detection time of a stationary
intruder when sensors all move in straight lines. In practice,
mobile sensors do not always move in straight lines; they
may make turns and move in different curves, as depicted
in Fig. 2. Next, we establish the optimal sensor moving
strategy to minimize the detection time of a stationary
intruder.
Theorem 4. Consider a sensor network Bð; rÞ at time t ¼ 0,
with sensors moving according to the random mobility model
at a fixed speed vs. The detection time of a randomly located
stationary intruder, X, is minimized in probability if sensors
all move in straight lines.
Proof. From the proof of Theorem 3 (see supplemental
material, available online), we know that the number of
sensors detecting the intruder during the interval ½0; tŠ
is Poisson distributed with mean IEðkAð0; tÞkÞ. Thus,
we have
IP X tð Þ ¼ IP cardðÈð0; tÞÞ ! 1ð Þ ¼ 1 À expðÀIE kAð0; tÞkð ÞÞ;
which is a increasing function of IEðkAð0; tÞkÞ. As
IEðkAð0; tÞkÞ is maximized when sensors move along
straight lines, the probability of detecting the intruder is
also maximized.
tu
Similar to the arguments on the optimal strategies for area
coverage in Section 4, straight line movement is not the only
optimal strategy that minimizes the detection time. There is
a family of moving patterns that can minimize the detection
time, where straight line movement is one of them.
In this work, we focus on the sensing model where each
sensor covers a disk area of radius r. It is of practical interest
306 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 2, FEBRUARY 2013
Fig. 2. Mobile sensor network with sensors moving along arbitrary
curves.
7. to consider the scenario where the probability that an
intruder is detected by a sensor depends on the distance
between the two. In the supplemental file, available online,
we consider the sensing model where each sensor senses its
surroundings with a certain intensity which vanishes with
distance, and examine the detection time under this model.
In this paper, we have assumed that an intruder is
immediately detected when it is hit by the perimeter of a
sensor, regardless of the time duration (ts) it stays in the
sensing range of the sensor. In many intrusion detection
applications, for example, radiation, chemical, and biologi-
cal threats, due to the probabilistic nature of the phenom-
enon and the sensing mechanisms, an intruder will not be
immediately detected once it enters the sensing range of a
sensor. Instead, it will take a certain amount of time to
detect the intruder. If the sensing time is too short, an
intruder may escape undetected. To account for this sensing
time requirement, we define td to be the minimum sensing
time in order for a sensor to detect an intruder. Obviously, it
is only interesting when 0 td 2r=vs. Otherwise, the
sensing time of an intruder by a sensor will be smaller than
the minimum requirement td, and the intruder will never be
detected. In order to yield closed-form results and provide
insights, we will consider the straight-line random mobility
model as follows.
Theorem 5. Consider a sensor network Bð; rÞ at time t ¼ 0,
with sensors moving according to the straight-line random
mobility model at a fixed speed vs. An intruder is detected iff
the sensing time ts is at least td, i.e., ts ! td. Let Y be the
detection time of a randomly located stationary intruder
initially not located in the sensing area of any sensor, we have
Y ¼ td þ T ð7Þ
where
T $ expð2reffvsÞ ð8Þ
reff ¼
ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
r2 À
v2
st2
d
4
r
: ð9Þ
Proof. We assume without loss of generality that the
intruder is located at the origin. We observe first that a
sensor covers the intruder for a time longer than td if
and only if the distance between its trajectory and the
origin is less than reff (see Fig. 3). We call such sensors
valid sensors.
Similarly as in Theorem 1, we define a thinned
Poisson process Èeffð0; tÞ by selecting the sensors that
will detect the intruder during the interval ½0; tŠ. To do so,
we define the effective covered area Aeffð0; tÞ of a sensor as
the area covered by the disk of radius reff centered on it.
Then, the probability that a sensor initially located at xx
detects the intruder during the interval ½0; tŠ is
IPðÀxx 2 Aeffð0; tÞÞ. From the proof of Theorem 3 (see
supplemental material, available online), we find that the
expected number of points in Èeffð0; tÞ is IEðkAeffð0 ;
tÞkÞ ¼ 2reffvs. Denoting by T the time before a valid
sensor covers the intruder, we get
IP T tð Þ ¼ IPðcardðÈeffð0; tÞÞ ! 1Þ ¼ 1 À expðÀ2reffvsÞ:
Then, the intruder is finally detected by the system after
a time T þ td. tu
In (7), the detection time has two terms, namely, a
constant term td and an exponentially distributed random
variable with mean E½TŠ ¼ 1=ð2reffvsÞ. The first term td is a
direct consequence of the minimum sensing time require-
ment. After the perimeter of a sensor hits an intruder, it takes
a minimum sensing time of td to detect the intruder, and
hence the constant delay. By Theorem 3, the second term
corresponds to the detection time in the case where there is
no minimum sensing time requirement but sensors have a
reduced sensing radius of reff. This is again a consequence of
the minimum sensing time requirement and the effect is
illustrated in Fig. 3. An intruder will only be detected by a
mobile sensor if the trajectory of the sensor falls within reff
from the intruder. The above two effects of minimum
sensing time requirement result in an increased expected
detection time compared to the case without minimum
sensing time requirement. Since td 0 and reff r, we have
E½Y Š ¼ td þ 1=ð2reffvsÞ 1=ð2rvsÞ ¼ E½XŠ:
Sensor speed has two opposite effects on an intruder’s
detection time:
. On one hand, as sensors move faster, uncovered
areas will be covered more quickly and this tends to
speed up the detection of intruders.
. On the other hand, the effective sensing radius reff
decreases as sensors increase their speed due to the
sensing time requirement, making intruders less
likely to be detected.
In the following, we present the optimal sensor speed
that minimizes the expected detection time. Excess mobility
will be harmful when the sensor speed is larger than the
optimal value.
Theorem 6. Under the scenario in Theorem 5, the optimal sensor
speed minimizing the expected detection time of a randomly
located intruder is
vÃ
s ¼
ffiffiffi
2
p
r=td: ð10Þ
Proof. Let dY =dvs ¼ 0, we have vÃ
s ¼
ffiffiffi
2
p
r=td, and the second
order derivative d2
Y
dv2
s
jvÃ
s
0. The corresponding minimum
expected detection time is
E½Y Ã
Š ¼ ð1 þ 2r2
Þtd=2r2
:
tu
LIU ET AL.: DYNAMIC COVERAGE OF MOBILE SENSOR NETWORKS 307
Fig. 3. Effective radius of a mobile sensor.
8. In real-world applications, the minimum required sen-
sing time depends on a number of components: sensing
mechanism (underlying physical, chemical, biological pro-
cesses), hardware (CPU, ADC, memory, clock rate, etc.) and
software (operating systems) configurations. While the
response time of some sensors is small (e.g., accelerometer
MMA73x0L by Freescale Semiconductor, Inc., has a response
time of less than 1 ms) and the effect on the detection time is
negligible, other sensors (e.g., certain optical biosensors,
chemical sensors) have a response time of several seconds or
longer [45], [46], [47]. In this case, the effect of the minimum
required sensing time on detection time of intruders cannot
be ignored. In a real sensor network system, one will need to
measure the minimum required sensing time for the
application and determine if the effect is negligible.
6 DETECTION TIME OF MOBILE INTRUDER
In this section, we consider the detection time of a mobile
intruder, which depends not only on the mobility behavior
of the sensors but also on the movement of the intruder
itself. Intruders can adopt a wide variety of movement
patterns. In this work, we will not consider specific intruder
movement patterns. Rather, we approach the problem from
a game theoretic standpoint and study the optimal mobility
strategies of the intruders and sensors.
For simplicity, we assume that an intruder will be
immediately detected when it falls into the sensing range of
mobile sensors. Note that the analysis and results of the
detection time requirement presented in the previous
section can be readily adapted in this part of the study.
From Theorem 4, the detection time of a stationary sensor
intruder is minimized when sensors all move in straight
lines. This result can be easily extended to a mobile intruder
using similar arguments in the reference framework where
the intruder is stationary. From the perspective of an
intruder, since it only knows the mobility strategy of the
sensors (sensor direction distribution density function) and
does not know the locations and directions of the sensors,
changing direction and speed will not help prolong its
detection time. In the following, we will only consider the
case where sensors and intruders move in straight lines.
Given the mobility model of the sensors, fÂðÞ, an
intruder chooses the mobility strategy that maximizes its
expected detection time. More specifically, an intruder
chooses its speed vt 2 ½0; vmax
t Þ and direction t 2 ½0; 2Þ so
as to maximize the expected detection time. The expected
detection time is a function of the sensor direction
distribution density, intruder speed, and intruder moving
direction. Denote the resulting expected detection time as
maxvt;t
E½XðfÂðÞ; t; vtÞŠ; the sensors then choose the
mobility strategy (over all possible direction distributions)
that minimizes the maximum expected detection time. This
can be viewed as a zero-sum minimax game between the
collection of mobile sensors and the intruder, where the
payoffs for the mobile sensors and intruder are ÀE½Xðf ;
t; vtÞŠ and E½XðfÂ; t; vtÞŠ, respectively.
To find the optimal mobility strategies for mobile sensors
and the intruder, we consider the following minimax
optimization problem:
min
fÂ
max
t;vt
E½XðfÂ; t; vtÞŠ: ð11Þ
To solve the minimax optimization problem, we first
characterize the detection time of an intruder moving at a
constant speed in a particular direction.
Theorem 7. Consider a sensor network Bð; rÞ at time t ¼ 0,
with sensors moving according to the straight-line random
mobility model at a fixed speed vs. Let X be the detection time
of an intruder moving at speed vt along direction t. Denote
c ¼ vt=vs; ^c ¼ 1 þ c
wðuÞ ¼
ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
1 À
4c
^c2
cos2
u
2
r
vs ¼ vs^c
Z 2
0
wð À tÞfÂðÞd:
We have
X $ expð2rvsÞ: ð12Þ
Proof. To prove this theorem, we put ourselves in the frame
of reference of the intruder and look at the speeds of the
sensors. Thus, if a sensor has an absolute speed vector vs,
its speed vector in the new frame of reference is simply
vs À vt, where vt denotes the intruder’s absolute speed
vector.Let s denote the direction of vs and t the
direction of vt.
In the new frame of reference, the intruder is static.
Denote c ¼ vt=vs , ^c ¼ 1 þ c, and wðuÞ ¼
ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
1 À 4c
^c2 cos2 u
2
q
.
Using the Law of Cosines, the relative speed of the
sensor can be computed as
kvs À vtk ¼
ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
v2
s þ v2
t À 2vsvtcosðs À tÞ
q
¼ vs^cwðs À tÞ:
We know from the proof of Theorem 3 (see supple-
mental material, available online) that
IP X tð Þ ¼ IPðcardðÈð0; tÞÞ ! 1Þ
¼ 1 À expðÀIEðkAð0; tÞkÞ:
Therefore, if IEðkAð0; tÞkÞ is a linear function of t, then X
is exponentially distributed. We get
kAð0; tÞk ¼ 2rkvs À vtkt ¼ 2rtwðs À tÞ;
so that
IEðkAð0; tÞkÞ ¼ 2rt
Z 2
0
wð À tÞfÂðÞd
¼ 2rtvs;
where vs ¼ vs^c
R2
0 wð À tÞfÂðÞd, which can be
viewed as the average effective sensor speed in the
reference framework where the intruder is stationary.
Therefore, the detection time is exponentially distributed
with rate 2rvs. tu
From Theorems 3 and 7, it can be noted that the detection
times of both stationary and mobile intruders follow
exponential distributions, and that the parameters are of
the same form, except that the sensor speed is now replaced
by the effective sensor speed for the mobile intruder case.
Assuming that the sensor density and sensing range
are fixed, since the intruder detection time follows an
308 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 2, FEBRUARY 2013
9. exponential distribution with mean 1=ð2rvsÞ, maximizing
the expected detection time corresponds to minimizing
the effective sensor speed vs. In the following, we derive the
optimal intruder mobility strategies for two special sensor
mobility models.
Sensors move in the same direction s: fÂðÞ ¼ ð À sÞ.
Using the fundamental property of the delta functionR1
À1 fðxÞðx À aÞdx ¼ fðaÞ, we have
vs ¼ vs^c
Z 2
0
wð À tÞð À sÞd
¼ vs^cwðs À tÞ:
We need to choose a proper t and vt that minimizes the
above effective sensor speed vs. First, it is easy to see that
we require t ¼ s. Now, we have
vs ¼ vs^c
ffiffiffiffiffiffiffiffiffiffiffiffiffi
1 À
4c
^c2
r
¼ jvt À vsj
and vs is minimized when
vt ¼
vs if vmax
t ! vs
vmax
t otherwise:
The above results show, quite intuitively, that the intruder
should move in the same direction as the sensors at a speed
closest matching the sensor speed. If the maximum intruder
speed is larger than the sensor speed, the intruder will not be
detected since it chooses to move at the same speed and in
the same direction as the sensors. In this case, the detection
time is infinity. Otherwise, if the maximum intruder speed is
smaller than the sensor speed, the intruder should move at
the maximum speed in the same direction of the sensors. The
expected detection time is 1
2rðvsÀvmax
t Þ .
Sensors move in uniformly random directions:
fÂðÞ ¼ 1
2 .
Fig. 4 plots the normalized effective sensor speed vs=vs as
a function of c ¼ vt=vs, the ratio of the intruder speed to the
sensor speed. The effective sensor speed is an increasing
function of c, and is minimized when c ¼ 0, or vt ¼ 0.
Therefore, if each sensor uniformly chooses its moving
direction from 0 to 2, the maximum expected detection
time is achieved when the intruder does not move. The
corresponding expected detection time is 1
2rvs
. The optimal
intruder mobility strategy in this case can be intuitively
explained as follows: Since sensors move in all directions
with equal probability, the movement of the intruder in any
direction will result in a larger relative speed and thus a
smaller first hit time in that particular direction. Conse-
quently, the minimum of the first hit times in all directions
(detection time) will become smaller.
We now present the solution to the minimax game
between the collection of mobile sensors and the intruder in
the following theorem.
Theorem 8. Consider a sensor network Bð; rÞ at time t ¼ 0,
with sensors moving according to the random mobility model
at a fixed speed vs. For the game between the collection of
mobile sensors and the mobile intruder, the optimal sensor
strategy is for each sensor to choose a direction according to a
uniform distribution, i.e., fÂðÞ ¼ 1
2 . The optimal mobility
strategy of the intruder is to stay stationary. This solution
constitutes a Nash equilibrium of the game.
Due to the space limit, the proof of the theorem is
provided in the supplemental material, available online, of
the paper.
This result suggests that in order to minimize the
expected detection time of an intruder, sensors should
choose their directions uniformly at random between ½0; 2Þ.
The corresponding optimal mobility strategy of the intruder
is to stay stationary. The uniformly random sensor move-
ment represents a mixed strategy which is a Nash
equilibrium of the game between mobile sensors and
intruders. If sensors choose to move in any fixed direction
(pure strategy), it can be exploited by an intruder by moving
in the same direction as sensors to maximize its detection
time. The optimal sensor strategy is to choose a mixture of
available pure strategies (move in a fixed direction between
½0; 2Þ). The proportion of the mix should be such that the
intruder cannot exploit the choice by pursuing any
particular pure strategy (move in the same direction as
sensors), resulting in a uniformly random distribution for
sensor’s movement. When sensors and intruders follow
their respective optimal strategies, neither side can achieve
better performance by deviating from this behavior.
In this study, we assume that the goal of the mobile
intruder is to maximize the expected detection so that it can
stay undetected as long as possible. This is a desirable goal
in some applications such as intruder intelligence gathering.
In other applications, the intruder may want to pass through
a region monitored by sensors ( e.g., [22], [48]) or to visit a set
of particular locations without being detected. In these cases,
the objective of the intruder is different and the correspond-
ing optimal strategy would be different. In general, for a
specific application, we will need to first identify the
objective of the intruder and then study the corresponding
game between the intruder and mobile sensors.
7 SUMMARY
In this paper, we study the dynamic aspects of the coverage
of a mobile sensor network resulting from the continuous
movement of sensors. Specifically, we studied the coverage
measures related to the area coverage and intrusion
detection capability of a mobile sensor network.
LIU ET AL.: DYNAMIC COVERAGE OF MOBILE SENSOR NETWORKS 309
Fig. 4. Normalized effective relative sensor speed vs=vs as a function of
c ¼ vt=vs.
10. For the random initial deployment and the random
sensor mobility model under consideration, we showed that
while the area coverage at any given time instants remains
unchanged, more area will be covered at least once during a
time interval. This is important for applications that do not
require or cannot afford simultaneous coverage of all
locations but want to cover the deployed region within a
certain time interval. The cost is that a location is only
covered part of the time, alternating between covered and
not covered. To this end, we characterized the durations and
fraction of time that a location is covered and not covered.
As sensors move around, intruders that will never be
detected in a stationary sensor network can be detected by
moving sensors. We characterized the detection time of a
randomly located stationary intruder. The results suggest
that sensor mobility can be exploited to effectively reduce
the detection time of an intruder when the number of
sensors is limited. We further considered a more realistic
sensing model where a minimum sensing time is required
to detect an intruder. We find that there is an optimal sensor
speed that minimizes the expected detection time. Beyond
the optimal speed, excess mobility will be harmful to the
intrusion detection performance. Moreover, we discussed
the optimal mobility strategies that maximize the area
coverage during a time interval and minimize the detection
time of intruders.
For mobile intruders, the intruder detection time
depends on the mobility strategies of the sensors as well
as the intruders. We took a game theoretic approach and
obtained the optimal mobility strategy for sensors and
intruders. We showed that the optimal sensor mobility
strategy is that each sensor chooses its direction uniformly
at random in all directions. By maximizing the entropy of
the sensor direction distribution, the amount of prior
information on sensor mobility strategy revealed to an
intruder is minimized. The corresponding intruder mobility
strategy is to stay stationary in order to maximize its
detection time. This solution represents a Nash equilibrium
of the game between mobile sensors and intruders. Neither
side can achieve better performance by deviating from their
respective optimal strategies.
8 ACKNOWLEDGMENTS
Benyuan Liu was supported in part by the US National
Science Foundation (NSF) under grants CNS-0953620 and
CNS-1018303. Don Towsley was supported in part by the
US National Science Foundation (NSF) under grant CNS-
1018464 and ARO MURI under grant W911NF-08-1-0233.
REFERENCES
[1] L.E. Navarro-Serment, R. Grabowski, C.J. Paredis, and P.K.
Khosla, “Millibots: The Development of a Framework and
Algorithms for a Distributed Heterogeneous Robot Team,” IEEE
Robotics and Automation Magazine, vol. 9, no. 4, pp. 31-40, Dec.
2002.
[2] S. Bergbreiter and K. Pister, “Cotsbots: An Off-the-Shelf Platform
for Distributed Robotics,” Proc. IEEE/RSJ Int’l Conf. Intelligent
Robots and Systems, 2003.
[3] G.T. Sibley, M.H. Rahimi, and G.S. Sukhatme, “Robomote: A Tiny
Mobile Robot Platform for Large-Scale Sensor Networks,” Proc.
IEEE Int’l Conf. Robotics and Automation (ICRA), 2002.
[4] M.A. Batalin and G.S. Sukhatme, “Coverage, Exploration and
Deployment by a Mobile Robot and Communication Network,”
Telecomm. Systems J., Special Issue on Wireless Sensor Networks,
vol. 26, no. 2, pp. 181-196, 2004.
[5] A. Howard, M. Mataric, and G. Sukhatme, “Mobile Sensor
Network Deployment Using Potential Fields: A Distributed,
Scalable Solution to the Area Coverage Problem,” Proc. Int’l Symp.
Distributed Autonomous Robotics Systems (DARS ’02), 2002.
[6] M. Batalin and G. Sukhatme, “Spreading Out: A Local Approach
to Multi-Robot Coverage,” Proc. Sixth Int’l Conf. Distributed
Autonomous Robotic Systems (DARS ’02), 2002.
[7] J. Pearce, P. Rybski, S. Stoeter, and N. Papanikolopoulous,
“Dispersion Behaviors for a Team of Multiple Miniature Robots,”
Proc. IEEE Int’l Conf. Robotics and Automation, 2003.
[8] Y. Zou and K. Chakrabarty, “Sensor Deployment and Target
Localization Based on Virtual Forces,” Proc. IEEE INFOCOM,
2003.
[9] G. Wang, G. Cao, and T.L. Porta, “Movement-Assisted Sensor
Deployment,” Proc. IEEE INFOCOM, 2004.
[10] G. Fletcher, X. Li, A. Nayak, and I. Stojmenovic, “Randomized
Robot-Assisted Relocation of Sensors for Coverage Repair in
Wireless Sensor Networks,” Proc. IEEE 72nd Vehicular Technology
Conf. (VTC), 2010.
[11] R. Falcon, X. Li, A. Nayak, and I. Stojmenovic, “The One-
Commodity Traveling Salesman Problem with Selective Pickup
and Delivery: An Ant Colony Approach,” Proc. IEEE Congress on
Evolutionary Computation (CEC), 2010.
[12] X. Li, A. Nayak, D. Simplot-Ryl, and I. Stojmenovic, “Sensor
Placement in Sensor and Actuator Networks,” Wireless Sensor and
Actuator Networks: Algorithms and Protocols for Scalable Coordination
and Data Communication, Wiley, 2010.
[13] S. Shakkottai, R. Srikant, and N. Shroff, “Unreliable Sensor Grids:
Coverage, Connectivity and Diameter,” Proc. IEEE INFOCOM,
2003.
[14] S. Meguerdichian, F. Koushanfar, M. Potkonjak, and M.B.
Srivastava, “Coverage Problems in Wireless Ad-Hoc Sensor
Networks,” Proc. IEEE INFOCOM, pp. 1380-1387, 2001.
[15] S. Meguerdichian, F. Koushanfar, G. Qu, and M. Potkonjak,
“Exposure in Wireless Ad-Hoc Sensor Networks,” Proc. ACM
MobiCom, pp. 139-150, 2001.
[16] X.-Y. Li, P.-J. Wan, and O. Frieder, “Coverage Problems in
Wireless Ad-Hoc Sensor Networks,” IEEE Trans. Computers,
vol. 52, no. 6, pp. 753-763, June 2003.
[17] G. Veltri, Q. Huang, G. Qu, and M. Potkonjak, “Minimal and
Maximal Exposure Path Algorithms for Wireless Embedded
Sensor Networks,” Proc. ACM Int’l Conf. Embedded Networked
Sensor Systems (Sensys), 2003.
[18] T.-L. Chin, P. Ramanathan, K.K. Saluja, and K.-C. Wang,
“Exposure for Collaborative Detection Using Mobile Sensor
Networks,” Proc. First IEEE Int’l Conf. Mobile Adhoc and Sensor
Systems, 2005.
[19] C. Huang and Y. Tseng, “The Coverage Problem in a Wireless
Sensor Network,” Proc. ACM Int’l Workshop Wireless Sensor
Networks and Applications (WSNA), pp. 115-121, 2003.
[20] Z. Zhou, S. Das, and H. Gupta, “Connected k-Coverage Problem
in Sensor Networks,” Proc. Int’l Conf. Computer Comm. and
Networks (ICCCN), 2004.
[21] S. Kumar, T. Lai, and J. Balogh, “On k-Coverage in a Mostly
Sleeping Sensor Network,” Proc. ACM Mobicom, 2004.
[22] B. Liu and D. Towsley, “A Study on the Coverage of Large-Scale
Sensor Networks,” Proc. First IEEE Int’l Conf. Mobile Ad-hoc and
Sensor Systems, 2004.
[23] C. Gui and P. Mohapatra, “Power Conservation and Quality of
Surveillance in Target Tracking Sensor Networks,” Proc. ACM
Mobicom, 2004.
[24] C. Gui and P. Mohapatra, “Virtual Patrol: A New Power
Conservation Design for Surveillance Using Sensor Networks,”
Proc. Int’l Workshop Information Processing in Sensor Networks
(IPSN), 2005.
[25] X. Li, H. Frey, N. Santoro, and I. Stojmenovic, “Strictly Localized
Sensor Self-Deployment for Optimal Focused Coverage,” IEEE
Trans. Mobile Computing, vol. 10, no. 11, pp. 1520-1533, Nov. 2011.
[26] X. Wang, G. Xing, Y. Zhang, C. Lu, R. Pless, and C. Gill,
“Integrated Coverage and Connectivity Configuration in Wireless
Sensor Networks,” Proc. ACM Conf. Embedded Networked Sensor
Systems (SenSys ’03), 2003.
310 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 2, FEBRUARY 2013
11. [27] H. Zhang and J. Hou, “Maintaining Sensing Coverage and
Connectivity in Sensor Networks,” Proc. Int’l Workshop Theoretical
and Algorithmic Aspects of Sensor, Ad Hoc Wireless and Peer-to-Peer
Networks, 2004.
[28] X. Bai, S. Kumar, Z. Yun, D. Xuan, and T.-H. Lai, “Deploying
Wireless Sensors to Achieve both Coverage and Connectivity,”
Proc. ACM MobiHoc, 2006.
[29] S. Poduri and G.S. Sukhatme, “Constrained Coverage for Mobile
Sensor Networks,” Proc. IEEE Int’l Conf. Robotics and Automation,
2004.
[30] J. Cortes, S. Martinez, T. Karatas, and F. Bullo, “Coverage Control
for Mobile Sensing Networks,” IEEE Trans. Robotics and Automa-
tion, vol. 20, no. 2, pp. 243-255, Apr. 2004.
[31] B. Zhang and G.S. Sukhatme, “Controlling Sensor Density Using
Mobility,” Proc. Second IEEE Workshop Embedded Networked Sensors,
pp. 141-149, 2005.
[32] G. Fletcher, X. Li, A. Nayak, and I. Stojmenovic, “Back-Tracking
Based Sensor Deployment by a Robot Team,” Proc. Seventh IEEE
Comm. Soc. Conf. Sensor, Mesh and Ad Hoc Comm. and Networks
(SECON), pp. 385-393, 2010.
[33] Y. Tang, B. Birch, and L.E. Parker, “Planning Mobile Sensor Net
Deployment for Navigationally-Challenged Sensor Nodes,” Proc.
IEEE Int’l Conf. Robotics and Automation, 2004.
[34] A. Casteigts, J. Albert, S. Chaumette, A. Nayak, and I. Stojmenovic,
“Biconnecting a Network of Mobile Robots Using Virtual Angular
Forces,” Computer Comm., vol. 35, pp. 1038-1046, 2012.
[35] X. Li, N. Santoro, and I. Stojmenovic, “Localized Distance-
Sensitive Service Discovery in Wireless Sensor and Actor Net-
works,” IEEE Trans. Computers, vol. 58, no. 9, pp. 1275-1288, Sept.
2009.
[36] S. Chellappan, W. Gu, X. Bai, D. Xuan, B. Ma, and K. Zhang,
“Deploying Wireless Sensor Networks under Limited Mobility
Constraints,” IEEE Trans. Mobile Computing, vol. 6, no. 10,
pp. 1142-1157, Oct. 2007.
[37] W. Wang, V. Srinivasan, and K.-C. Chua, “Trade-Offs between
Mobility and Density for Coverage in Wireless Sensor Networks,”
Proc. ACM Mobicom, 2007.
[38] B. Liu, P. Brass, O. Dousse, P. Nain, and D. Towsley, “Mobility
Improves Coverage of Sensor Networks,” Proc. ACM MobiHoc,
2005.
[39] T.-L. Chin, P. Ramanathan, and K. Saluja, “Analytic Modeling of
Detection Latency in Mobile Sensor Networks,” Proc. Int’l Work-
shop Information Processing in Sensor Networks (IPSN), 2006.
[40] O. Dousse, C. Tavoularis, and P. Thiran, “Delay of Intrusion
Detection in Wireless Sensor Networks,” Proc. ACM MobiHoc,
2006.
[41] G. Yang, W. Zhou, and D. Qiao, “Defending against Barrier
Intrusion with Mobile Sensors,” Proc. Int’l Conf. Wireless Algo-
rithms, Systems and Applications (WASA), 2007.
[42] Y. Keung, B. Li, and Q. Zhang, “The Intrusion Detection in Mobile
Sensor Network,” Proc. ACM MobiHoc, 2010.
[43] Y. Peres, A. Sinclair, P. Sousi, and A. Stauffer, “Mobile Geometric
Graphs: Detection, Coverage and Percolation,” Proc. Ann. ACM-
SIAM Symp. Discrete Algorithms, 2011.
[44] J.-C. Chin, Y. Dong, W.-K. Hon, C.Y.T. Ma, and D.K.Y. Yau,
“Detection of Intelligent Mobile Target in a Mobile Sensor
Network,” IEEE/ACM Trans. Networking, vol. 18, no. 1, pp. 41-52,
Feb. 2010.
[45] A. Hierlemann and R. Gutierrez-Osuna, “Higher-Order Chemical
Sensing,” Chemical Rev., vol. 108, pp. 563-613, 2008.
[46] S.M. Borisov and O.S. Wolfbeis, “Optical Biosensors,” Chemical
Rev., vol. 108, pp. 423-661, 2008.
[47] X. Li, J.H. Cho, P. Kurup, and Z. Gu, “Novel Sensor Array Based
on Doped Tin Oxide Nanowires for Organic Vapor Detection,”
Sensors and Actuators B, vol. 162, pp. 251-258, 2012.
[48] B. Liu, O. Dousse, J. Wang, and A. Saipulla, “Strong Barrier
Coverage of Wireless Sensor Networks,” Proc. ACM MobiHoc,
2008.
Benyuan Liu received the BS degree in physics
from the University of Science and Technology of
China (USTC) in 1994, the MS degree in physics
from Yale University in 1998, and the PhD degree
in computer science from the University of
Massachusetts, Amherst in 2003. He is currently
an associate professor of computer science at the
University of Massachusetts Lowell. His main
research interests include the protocol design
and performance modeling of wireless ad hoc and
sensor networks. He served as the technical program co-chair of the
International Conference on Wireless Algorithms, Systems, and Applica-
tions (WASA) in 2009, the technical program co-chair of the Cross-layer
Design and Optimization Track of IEEE International Conference on
Computer Communication Networks (ICCCN) in 2008, and technical
program committee member of numerous computer networking confer-
ences. He was the US National Science Foundation (NSF) CAREER
Award recipient in 2010. He is a member of the IEEE.
Olivier Dousse (S’02-M’05) received the MSc
degree in physics from the Swiss Federal
Institute of Technology at Lausanne, Switzer-
land (EPFL) in 2000, and the PhD degree in
communication systems from the same institu-
tion in 2005. From 2006 to 2008, he was with the
Deutsche Telekom Laboratories in Berlin. He is
currently a principal member of Research Staff
at the Nokia Research Center in Lausanne. His
research interests are in stochastic models for
communication networks. He received the honorable mention of the
2005 ACM Doctoral Dissertation Competition and was runner up for the
IEEE-Infocom Best Paper Award in 2003. He served as a guest editor of
the IEEE Journal on Selected Areas in Communications in 2008 and is
serving as an associate editor of the IEEE Transactions on Mobile
Computing since 2011. He is a member of the IEEE.
Philippe Nain received the PhD degree in
applied mathematics in 1981 from the University
of Paris XI, Orsay, France. He is a research
director at INRIA (France), where he has been
the scientific leader of the MAESTRO research
group devoted to the modeling of computer
systems and telecommunications networks
since 1998. His research interests include
modeling and performance evaluation of com-
munication networks. He is editor-in-chief of
Performance Evaluation. He is past associate editor of IEEE/ACM
Transactions on Networking, IEEE Transactions on Automatic Control,
Performance Evaluation, and Operations Research Letters. Dr. Nain
was a coprogram chair of the ACM Sigmetrics 2000 conference and the
general chair of the IFIP Performance 2005 conference.
Don Towsley received the BA degree in physics
in 1971 and the PhD degree in computer science
in 1975 from the University of Texas. He is
currently a distinguished professor at the De-
partment of Computer Science, University of
Massachusetts. He has held visiting positions at
numerous universities and research labs. His
research interests include networks and perfor-
mance evaluation. He currently serves on the
editorial board of IEEE Journal on Selected
Areas in Communications and previously served as editor-in-chief of
IEEE/ACM Transactions on Networking and on numerous other editorial
boards. He has served as a program co-chair of several conferences
including INFOCOM 2009. He is a member of ACM and ORSA. He has
received several achievement awards including the 2007 IEEE Koji
Kobayashi Award and the 2011 INFOCOM Achievement Award. He has
received numerous paper awards including a 2008 SIGCOMM Test-of-
Time Paper Award and the 1998 IEEE Communications Society William
Bennett Best Paper Award. He is a fellow of the IEEE and the ACM.
. For more information on this or any other computing topic,
please visit our Digital Library at www.computer.org/publications/dlib.
LIU ET AL.: DYNAMIC COVERAGE OF MOBILE SENSOR NETWORKS 311