Skip to main navigation Skip to search Skip to main content

Weaving a proper net to catch large objects in wireless sensor networks

Alina Olteanu, Yang Xiao, Kui Wu, Xiaojiang Du

Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

Abstract

Wireless sensor networks consist of a large number of sensors and have been broadly used for intrusion detection in surveillance systems. To guarantee detection quality, such networks are usually over-engineered, i.e., more than required sensors are deployed and remain active in order to cover each point in the monitored field with a high probability at any time instance. Existing sensor scheduling schemes based on the point coverage model tightly weave a sensor net' that is unnecessarily dense. Intuitively, when the size and the shape of intrusion objects are considered, any net with holes no smaller than the size of the intrusion object would work fine. With this design philosophy in mind, we build a new mathematical model to investigate the impact of size and shape of intrusion objects on network configuration. We derive analytical results that provide practitioners with insights on how to weave an effective sensor "net" for intrusion object detection with minimum number of active sensors. © 2010 IEEE.
Original languageEnglish
Article number5441357
Pages (from-to)1360-1369
JournalIEEE Transactions on Wireless Communications
Volume9
Issue number4
DOIs
Publication statusPublished - Apr 2010
Externally publishedYes

Bibliographical note

Publication details (e.g. title, author(s), publication statuses and dates) are captured on an “AS IS” and “AS AVAILABLE” basis at the time of record harvesting from the data source. Suggestions for further amendments or supplementary information can be sent to [email protected]</a

Research Keywords

  • Energy saving
  • Intrusion objects
  • Intrusions
  • Optimization
  • Sensor networks

Fingerprint

Dive into the research topics of 'Weaving a proper net to catch large objects in wireless sensor networks'. Together they form a unique fingerprint.

Cite this