INTRUSION K-COVERAGE IN WIRELESS SENSOR NETWORKS

Amir Yahyavi, Laleh Roostapour, Roohollah Aslanzadeh, Mehdi Dehghan, Nasser Yazdani

Abstract

One of the main applications of Wireless Sensor Networks is surveillance and monitoring. Providing and maintaining the required coverage over the area of an intrusion (or other events of our choice) is of great importance. The network should be able to provide different levels of coverage based on application needs and reconfigure itself while ensuring energy efficiency. In this paper we present a dynamic approach to provide asymptotic k-coverage over the area of an intrusion. This is a probabilistic approach which creates full coverage over the surveillance zone and provides k-coverage over the area of an event. Our simulations show that this approach is able to provide the requested coverage while consuming less than a third of the static approaches. Also due to probabilistic nature of this approach communication overhead is much lower than deterministic methods.

References

  1. Akyildiz I.F., Su W., Sankarasubramaniam Y., and Cayirci E., 2002. "Wireless sensor networks: a survey," Computer Networks, vol. 38, pp. 393-422.
  2. Chen B., Jamieson K., Balakrishnan H., and Morris R., 2002, "Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks," Wireless Networks, vol. 8, pp. 481-494.
  3. Dam T.V., and Langendoen K., 2003. "An adaptive energy-efficient MAC protocol for wireless sensor networks," In Proceedings of the 1st international conference on Embedded networked sensor systems, Los Angeles, California, USA: ACM, pp. 171-180.
  4. Kumar S., Lai T.H., and Balogh J., October 2006. "On kcoverage in a mostly sleeping sensor network," Wireless Networks.
  5. Lu G., Sandagopan N., Krishnamachari B., and Goel A., "Delay efficient sleep scheduling in wireless sensor networks, 2005." INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE, vol. 4, pp. 2470-2481 vol. 4.
  6. Tian D. and Georganas N.D., 2002."A coveragepreserving node scheduling scheme for large wireless sensor networks," in Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications, Georgia, USA: ACM, pp. 32-41.
  7. Wang L. and Xiao Y., 2005. "Energy saving mechanisms in sensor networks," Broadband Networks, 2005 2nd International Conference on, pp. 777-785.
  8. Wang Rui et al., 2006. “Swarm Intelligence for the SelfOrganization of Wireless Sensor Network,” In IEEE congress on Evolutionary Computing, p. 838-842.
  9. Wang X., et al. 2003, "Integrated coverage and connectivity configuration in wireless sensor networks," Proceedings of the 1st international conference on Embedded networked sensor systems, pp. 28-39.
  10. Yahyavi A. et al., 2008. “DyKCo, Dynamic K-Coverage in Wireless Sensor Networks,” IEEE International Conference on Systems, Man, and Cybernetics, to appear.
  11. Ye F., Zhong G., Lu S., and Zhang L., 2002. "PEAS: a robust energy conserving protocol for long-lived sensor networks," Network Protocols, 2002. Proceedings. 10th IEEE International Conference on, pp. 200-201.
  12. Ye W., Heidemann J., and Estrin D., 2004. "Medium access control with coordinated adaptive sleeping for wireless sensor networks," IEEE/ACM Trans. Netw., vol. 12, pp. 493-506.
Download


Paper Citation


in Harvard Style

Yahyavi A., Roostapour L., Aslanzadeh R., Dehghan M. and Yazdani N. (2008). INTRUSION K-COVERAGE IN WIRELESS SENSOR NETWORKS . In Proceedings of the International Conference on Wireless Information Networks and Systems - Volume 1: WINSYS, (ICETE 2008) ISBN 978-989-8111-62-3, pages 41-46. DOI: 10.5220/0002024900410046


in Bibtex Style

@conference{winsys08,
author={Amir Yahyavi and Laleh Roostapour and Roohollah Aslanzadeh and Mehdi Dehghan and Nasser Yazdani},
title={INTRUSION K-COVERAGE IN WIRELESS SENSOR NETWORKS},
booktitle={Proceedings of the International Conference on Wireless Information Networks and Systems - Volume 1: WINSYS, (ICETE 2008)},
year={2008},
pages={41-46},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002024900410046},
isbn={978-989-8111-62-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Wireless Information Networks and Systems - Volume 1: WINSYS, (ICETE 2008)
TI - INTRUSION K-COVERAGE IN WIRELESS SENSOR NETWORKS
SN - 978-989-8111-62-3
AU - Yahyavi A.
AU - Roostapour L.
AU - Aslanzadeh R.
AU - Dehghan M.
AU - Yazdani N.
PY - 2008
SP - 41
EP - 46
DO - 10.5220/0002024900410046