Secure Scheduling for Barrier Coverage Ding-Zhu Du University of Texas at Dallas
Outline Background Our Research Future 1. Brief overview of social networks 2. How to build applications on top of the social network – Think about a social network being MS Windows, We can build applications on it.
Background
Sink Internet / Satellite Sensor network Sensing Area phenomenon User1 Sink Internet / Satellite Sensor network User2
Biological Systems
intruder Area of interest
Open belt Closed belt
Barrier Cover A barrier-cover is a set of sensors covering a curve connecting two open boundaries.
Homogeneous Sensor Network All sensors have the same size of sensing disks, the same size of communication disks, and the same lifetime, say unit time lifetime.
There may exist several barrier covers.
Sleep-wakeup scheduling may increase the lifetime of barrier coverage. But, there is a security problem!
There is a breach in scheduling (B2, B1)
There is a breach in scheduling (B2, B1) intruder a B2
There is a breach in scheduling (B2, B1) intruder
There is no breach in scheduling (B1, B2)
Both (B2, B1) and (B1,B2) contain a breach. Crossing is bad!
Donghyun Kim, Hyunbum Kim, Deying Li, Sung-Sik Kwon, Alade O Donghyun Kim, Hyunbum Kim, Deying Li, Sung-Sik Kwon, Alade O. Tokuta, and Jorge A. Cobb, "Maximum Lifetime Dependable Barrier-coverage in Wireless Sensor Networks," Ad Hoc Networks (ADHOC), vol. 36, issue P1, pp. 296-307, January 2016. This paper gave 3 approaches to removing crossing by delete some barrier-covers.
Our Research
Observation Removal crossing is sufficient, but not necessary! (B3,B2,B1) is a breach-free scheduling.
Starting with following Goals Goal 1: Find necessary and sufficient condition for a sleep-wakeup scheduling to be breach-free. Goal 2: Given a set of barrier-covers, find a maximum subset with breach-free scheduling. (complexity & Algorithm)
We completely reached goals 1 Give necessary and sufficient condition for a sleep-wakeup scheduling to be breach-free. 2 Given a set of barrier-covers, find a maximum subset with breach-free scheduling. (This problem is equivalent to the longest path problem in directed graph. ) 3 Heterogeneous sensor system
Necessary and Sufficient 1
Sleep-wakeup scheduling 2 How to find? Step 1. Using the necessary and sufficient condition, construct a breach-free digraph. Step 2. Find the longest path in the beach-free digraph.
B1 B2 B3 Breach Digraph Breach-free Digraph
(B3,B2,B1) is a breach-free scheduling.
Equivalence
Fig. 6
Corollary The longest path problem
Longest Path
Heterogeneous Sensors 3
Path Decomposition
sleep-wakeup scheduling The longest path problem
Node-weight edge weight
Recall Find max flow. Decompose flow into path-flows. Each path-flow gives a barrier-cover with lifetime (=flow value). Find a max-lifetime subset of barrier-covers with a breach-free scheduling.
Questions Is decomposition unique? If not, how to give the best decomposition? Does max flow give a solution with longest lifetime breach-free scheduling?
Thanks, End