Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China.

Slides:



Advertisements
Similar presentations
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Advertisements

TASC: Topology Adaptive Spatial Clustering for Sensor Networks Reino Virrankoski, Dimitrios Lymberopoulos and Andreas Savvides Embedded Networks and Application.
Impact of Mobility and Heterogeneity on Coverage and Energy Consumption in Wireless Sensor Networks Xiao Wang, Xinbing Wang, Jun Zhao Department of Electronic.
1 Sensor Relocation in Mobile Sensor Networks Guiling Wang, Guohong Cao, Tom La Porta, and Wensheng Zhang Department of Computer Science & Engineering.
The Cat and The Mouse -- The Case of Mobile Sensors and Targets David K. Y. Yau Lab for Advanced Network Systems Dept of Computer Science Purdue University.
1 Mobility-assisted Spatiotemporal Detection in Wireless Sensor Networks Guoliang Xing 1 ; JianpingWang 1 ; Ke Shen 3 ; Qingfeng Huang 2 ; Xiaohua Jia.
Adaptive Data Collection Strategies for Lifetime-Constrained Wireless Sensor Networks Xueyan Tang Jianliang Xu Sch. of Comput. Eng., Nanyang Technol. Univ.,
Mobility Improves Coverage of Sensor Networks Benyuan Liu*, Peter Brass, Olivier Dousse, Philippe Nain, Don Towsley * Department of Computer Science University.
Deployment Strategies for Differentiated Detection in Wireless Sensor Network Jingbin Zhang, Ting Yan, and Sang H. Son University of Virginia From SECON.
Tracking a moving object with real-time obstacle avoidance Chung-Hao Chen, Chang Cheng, David Page, Andreas Koschan and Mongi Abidi Imaging, Robotics and.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
SMART: A Scan-based Movement- Assisted Sensor Deployment Method in Wireless Sensor Networks Jie Wu and Shuhui Yang Department of Computer Science and Engineering.
1 Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network Prof. Yu-Chee Tseng Department of Computer Science National Chiao-Tung University.
Exposure In Wireless Ad-Hoc Sensor Networks S. Megerian, F. Koushanfar, G. Qu, G. Veltri, M. Potkonjak ACM SIG MOBILE 2001 (Mobicom) Journal version: S.
An Energy-efficient Target Tracking Algorithm in Wireless Sensor Networks Wang Duoqiang, Lv Mingke, Qin Qi School of Computer Science and technology Huazhong.
CS 712 | Fall 2007 Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua. National University.
SOS: A Safe, Ordered, and Speedy Emergency Navigation Algorithm in Wireless Sensor Networks Andong Zhan ∗ †, Fan Wu ∗, Guihai Chen ∗ ∗ Shanghai Key Laboratory.
Using Rotatable and Directional (R&D) Sensors to Achieve Temporal Coverage of Objects and Its Surveillance Application You-Chiun Wang, Yung-Fu Chen, and.
Mobility Limited Flip-Based Sensor Networks Deployment Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic.
Lifetime and Coverage Guarantees Through Distributed Coordinate- Free Sensor Activation ACM MOBICOM 2009.
M-GEAR: Gateway-Based Energy-Aware Multi-Hop Routing Protocol
Miao Zhao, Ming Ma and Yuanyuan Yang
WMNL Sensors Deployment Enhancement by a Mobile Robot in Wireless Sensor Networks Ridha Soua, Leila Saidane, Pascale Minet 2010 IEEE Ninth International.
SoftCOM 2005: 13 th International Conference on Software, Telecommunications and Computer Networks September 15-17, 2005, Marina Frapa - Split, Croatia.
Network lifetime and stealth time of wireless video sensor intrusion detection systems under risk-based scheduling Prof. Congduc Pham
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
Preserving Area Coverage in Wireless Sensor Networks by using Surface Coverage Relay Dominating Sets Jean Carle, Antoine Gallais and David Simplot-Ryl.
The Chinese Univ. of Hong Kong Dept. of Computer Science & Engineering A Point-Distribution Index and Its Application to Sensor Grouping Problem Y. Zhou.
Prediction-based Object Tracking and Coverage in Visual Sensor Networks Tzung-Shi Chen Jiun-Jie Peng,De-Wei Lee Hua-Wen Tsai Dept. of Com. Sci. and Info.
Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Cardei, M.; Jie Wu; Mingming Lu; Pervaiz, M.O.; Wireless And Mobile.
On Energy-Efficient Trap Coverage in Wireless Sensor Networks Junkun Li, Jiming Chen, Shibo He, Tian He, Yu Gu, Youxian Sun Zhejiang University, China.
KAIS T A Bidding Protocol for Deploying Mobile Sensors 발표자 : 권 영 진 Guiling Wang, Guohong Cao, Tom LaPorta The Pennsylvania State University IEEE, ICNP.
Co-Grid: an Efficient Coverage Maintenance Protocol for Distributed Sensor Networks Guoliang Xing; Chenyang Lu; Robert Pless; Joseph A. O ’ Sullivan Department.
OFDMA Based Two-hop Cooperative Relay Network Resources Allocation Mohamad Khattar Awad, Xuemin (Sherman) Shen Student Member, IEEE Senior Member, IEEE.
Selection and Navigation of Mobile sensor Nodes Using a Sensor Network Atul Verma, Hemjit Sawant and Jindong Tan Department of Electrical and Computer.
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
1 Service Charge and Energy- Aware Vertical Handoff in Integrated IEEE e/ Networks Youngkyu Choi and Sunghyun Choi School of Electrical Engineering.
1 Probabilistic Coverage in Wireless Sensor Networks Nadeem Ahmed, Salil S. Kanhere and Sanjay Jha Computer Science and Engineering, University of New.
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Efficient k-Coverage Algorithms for Wireless Sensor Networks Mohamed Hefeeda.
Secure In-Network Aggregation for Wireless Sensor Networks
Barrier Coverage With Wireless Sensors
Ai Chen, Ten H. Lai, Dong Xuan Department of Computer Science and Engineering The Ohio State University Columbus Measuring and Guaranteeing Quality of.
MMAC: A Mobility- Adaptive, Collision-Free MAC Protocol for Wireless Sensor Networks Muneeb Ali, Tashfeen Suleman, and Zartash Afzal Uzmi IEEE Performance,
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
Covering Points of Interest with Mobile Sensors Milan Erdelj, Tahiry Razafindralambo and David Simplot-Ryl INRIA Lille - Nord Europe IEEE Transactions on.
Maximizing Lifetime per Unit Cost in Wireless Sensor Networks
A Wakeup Scheme for Sensor Networks: Achieving Balance between Energy Saving and End-to-end Delay Xue Yang, Nitin H.Vaidya Department of Electrical and.
Adaptive Tracking in Distributed Wireless Sensor Networks Lizhi Yang, Chuan Feng, Jerzy W. Rozenblit, Haiyan Qiao The University of Arizona Electrical.
Po-Yu Chen, Zan-Feng Kao, Wen-Tsuen Chen, Chi-Han Lin Department of Computer Science National Tsing Hua University IEEE ICPP 2011 A Distributed Flow-Based.
Barrier Coverage in Camera Sensor Networks ACM MobiHoc 2011 Yi Wang Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University.
U of Minnesota DIWANS'061 Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and.
CHANNEL ALLOCATION FOR SMOOTH VIDEO DELIVERY OVER COGNITIVE RADIO NETWORKS Globecom 2010, FL, USA 1 Sanying Li, Tom H. Luan, Xuemin (Sherman) Shen Department.
Outline Introduction Network model Two-phase algorithm Simulation
Fen Hou 、 Lin X. Cai, University of Waterloo Xuemin Shen, Rutgers University Jianwei Huang, Northwestern University IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY,
Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees IEEE ICDCSW, 2011 Pouya Ostovari Department of Computer and Information.
Scalable Video Multicast with Adaptive Modulation and Coding in Broadband Wireless Data Systems Peilong Li *, Honghai Zhang *, Baohua Zhao +, Sampath Rangarajan.
Selection and Navigation of Mobile Sensor Nodes Using a Sensor Network Atul Verma, Hemjit Sawant and Jindong Tan Department of Electrical and Computer.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
Younghwan Yoo† and Dharma P. Agrawal‡ † School of Computer Science and Engineering, Pusan National University, Busan, KOREA ‡ OBR Center for Distributed.
Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network You-Chiun Wang, Chun-Chi Hu, and Yu-Chee Tseng IEEE Transactions on Mobile Computing.
KAIS T Sensor Deployment Based on Virtual Forces Reference: Yi Zou and Krishnendu Chakarabarty, “Sensor Deployment and Target Localization Based on Virtual.
Optimal Relay Placement for Indoor Sensor Networks Cuiyao Xue †, Yanmin Zhu †, Lei Ni †, Minglu Li †, Bo Li ‡ † Shanghai Jiao Tong University ‡ HK University.
DOTS: A Propagation Delay-aware Opportunistic MAC Protocol for Underwater Sensor Networks IEEE ICNP 2010 (18.2%) Youngtae Noh, Mario Gerla (UCLA, CS) Paul.
Cooperative Resource Management in Cognitive WiMAX with Femto Cells Jin Jin, Baochun Li Department of Electrical and Computer Engineering University of.
I owa S tate U niversity Laboratory for Advanced Networks (LAN) Coverage and Connectivity Control of Wireless Sensor Networks under Mobility Qiang QiuAhmed.
Prof. Yu-Chee Tseng Department of Computer Science
IEEE Student Paper Contest
Barrier Coverage with Optimized Quality for Wireless Sensor Networks
A Near-Optimal Sensor Placement Algorithm to Achieve Complete Coverage/Discrimination in Sensor Networks Authors : Frank Y. S. Lin and P. L. Chiu, Student.
Presentation transcript:

Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China 、 Department of Electrical and Computer Engineering, University of Waterloo, Canada INRIA Lille - Nord Europe, Univ Lille Nord de France IEEE INFOCOM 2012 Cost-Effective Barrier Coverage by Mobile Sensor Networks 1

Outline  Introduction  Goal  Assumption  Problem formulation  Periodic Monitoring Scheduling algorithm  Coordinated Sensor Patrolling algorithm  Distributed CSP  Simulation  Conclusion 2

Introduction  Wireless sensor networks have received a lot of attention due to their potential applications in various areas  Environmental monitoring  The placement of sensors related to coverage issues is intensively studied in the literature, and can be divided into three categories.  Target coverage  Full coverage  Barrier coverage 3

Introduction  The target coverage problem (Points of Interest, PoI)  aims at monitoring specific points in the field of interest. MuseumCampusMilitary 4

Introduction  The full coverage problem (Areas of Interest, AoI)  aims at covering the whole area.  Sensors are deployed to maximize the covered area. 5

Introduction  The barrier coverage problem  Aim at detecting intrusion on a given area.  Sensors have to form a dense barrier in order to detect each event that crosses the barrier. USA Intruder 6

Introduction  Existing solutions to barrier coverage in mobile sensor networks implicitly assume the availability of sufficient sensors.  K-barrier  One-barrier K-BarrierOne-Barrier 7

Introduction  These solutions will fail to work when sensor scarcity and budget limitation.  the performance of detecting intruder decreasing K-BarrierOne-Barrier 8

Goal  In the case of sensor scarcity, this paper proposed two algorithms to  Improve the probability of detecting intruder  Decrease sensor’s moving distance 9

Assumption  The belt region of interest Ω with two long parallel boundaries.  m sensors are needed to guarantee full barrier coverage but there are only n mobile sensors available (n < m). l Ω 10

Problem formulation  max γ while min L  Average intruder detection probability  Average sensor moving distance : the state of intruder arrival : the state of sensor presence at point i t t the distance that sensor j moves in time t 11

Patrolling algorithms  Periodic Monitoring Scheduling  Coordinated Sensor Patrolling 12

Periodic Monitoring Scheduling  The basic idea of PMS is to let the sensors monitor each point periodically.  there are m points, but only have n (n<m)mobile sensors to monitor.  sensor at point j moves to point mod(j + n, m) and sensing the point for T time slots ABC A A A A B B B B C C C C t0t0 t1t1 t2t2 t3t3 t4t B 2  mod(2+3,5)=0  mod(0+3,5)=3  mod(3+3,5)=1  mod(1+3,5)=4

Periodic Monitoring Scheduling  The basic idea of PMS is to let the sensors monitor each point periodically.  Presenting PMS algorithm to solve barrier coverage problem formulated  Average intruder detection probability  Average sensor moving distance 14

Periodic Monitoring Scheduling  Average intruder detection probability the steady-state probability of intruder arrival at each slot 15

Periodic Monitoring Scheduling  Average sensor moving distance proof : the minimum scheduling period : How many time slots that each point is monitored by sensors : How many time slots in the monitoring period sensor’s moving distance when j+n > m sensor’s moving distance when j+n <= m 16

Patrolling algorithms  Periodic Monitoring Scheduling  Coordinated Sensor Patrolling 17

Coordinated Sensor Patrolling  A centralized coordinated sensor patrolling algorithm.  Exploiting the temporal correlation of intruder arrival times to improve average intruder detection probability γ. 18

Coordinated Sensor Patrolling  Intruder arrival analysis t=1 t=2 τ τ+1 τ+2 one intruder arrives at slot τ +2 two intruders arrive,one at slot τ +1 and the other is τ +2 the probability that the next intruder arrival is at slot τ +t given the last intruder arrival time is τ. Cumulative Distribution Function 19

Coordinated Sensor Patrolling  Intruder arrival analysis  After an intruder arrives at a point, the probability that an intruder will arrive again at the same point in the next few time slots is very small. 20

Coordinated Sensor Patrolling  Point selection step  Coordinated movement step 21

Coordinated Sensor Patrolling  Point selection step  Three principles  A sensor should move to another point if it detects an intruder at the point in the previous time slot.  A sensor should not leave its current point until it detects an intruder A A Available 22 B B Unavailable

Coordinated Sensor Patrolling  Point selection step  Three principles  A sensor should move to another point if it detects an intruder at the point in the previous time slot.  A sensor should not leave its current point until it detects an intruder  The points with highest q t should be selected if a sensor wants to find a point to monitor. 23 : the number of time slots that there is no sensor at point j &

Coordinated Sensor Patrolling  Coordinated movement step  In order to reduce the total moving unavailable sensors do not necessarily stay at their previous points distance of each sensor. 24 t0t t1t1

Distributed CSP  Distributed variants  Simple DCSP 25

Distributed CSP  Simple DCSP  Initialization phase  Dynamic movement phase 26

Simple DCSP  Initialization phase  The leader  Indicating how the sensor likes to monitor the points.  distribute the preference level of each sensor among the points.  Assign a preference level to points AB C A 27

Simple DCSP  Initialization phase A m=5,n=3 ABC A 0 A 1 28

Simple DCSP  Initialization phase A B C A B B C 29

Simple DCSP  Dynamic movement phase  A sensor should not leave its current point until it detects an intruder.  Sensor moves to the new point with high  Each sensor moves between points in MS i  Collision problem 30

Simple DCSP  Dynamic movement phase  Collision problem  it will set I ij = 0 and recalculate  Sensor i and sensor i+1 generate random number from and exchange their number B C A A 31

Simulation  Using MATLAB to perform the simulation  The network operation time is divided into time slots, each with 1 unit simulated time. 32

Simulation  Performance of PMS  Average intruder detection probability v.s. T slots 33

Simulation  Performance of CSP  Average intruder detection probability v.s. number of sensor 34 Performance γ for different n and m when β = 4.

Simulation  Average intruder detection probability v.s. number of sensor 35 when β = 2when β = 6

Conclusion  In the case of sensor scarcity, this paper proposed  Periodic monitoring scheduling algorithm  Coordinated sensor patrolling algorithm  reduce the application budget.  provides a new cost-effective approach to achieve barrier coverage in large-scale mobile sensor networks. 36

37 Thank you