Abstract
Wireless sensor networks consist of a large number of sensors and have been broadly used for intrusion detection in surveillance systems. To guarantee detection quality, such networks are usually over-engineered, i.e., more than required sensors are deployed and remain active in order to cover each point in the monitored field with a high probability at any time instance. Existing sensor scheduling schemes based on the point coverage model tightly weave a sensor net' that is unnecessarily dense. Intuitively, when the size and the shape of intrusion objects are considered, any net with holes no smaller than the size of the intrusion object would work fine. With this design philosophy in mind, we build a new mathematical model to investigate the impact of size and shape of intrusion objects on network configuration. We derive analytical results that provide practitioners with insights on how to weave an effective sensor "net" for intrusion object detection with minimum number of active sensors. © 2010 IEEE.
| Original language | English |
|---|---|
| Article number | 5441357 |
| Pages (from-to) | 1360-1369 |
| Journal | IEEE Transactions on Wireless Communications |
| Volume | 9 |
| Issue number | 4 |
| DOIs | |
| Publication status | Published - Apr 2010 |
| Externally published | Yes |
Bibliographical note
Publication details (e.g. title, author(s), publication statuses and dates) are captured on an “AS IS” and “AS AVAILABLE” basis at the time of record harvesting from the data source. Suggestions for further amendments or supplementary information can be sent to [email protected]</aResearch Keywords
- Energy saving
- Intrusion objects
- Intrusions
- Optimization
- Sensor networks
Fingerprint
Dive into the research topics of 'Weaving a proper net to catch large objects in wireless sensor networks'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver