Proceedings of the 7th annual international conference on Mobile computing and networking
Topology management for sensor networks: exploiting latency and density
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Neural Networks for Pattern Recognition
Neural Networks for Pattern Recognition
A coverage-preserving node scheduling scheme for large wireless sensor networks
WSNA '02 Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications
Infrastructure tradeoffs for sensor networks
WSNA '02 Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications
PEAS: A Robust Energy Conserving Protocol for Long-lived Sensor Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
Connected sensor cover: self-organization of sensor networks for efficient query execution
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Integrated coverage and connectivity configuration in wireless sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Differentiated surveillance for sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems
Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems
Set k-cover algorithms for energy efficient monitoring in wireless sensor networks
Proceedings of the 3rd international symposium on Information processing in sensor networks
Network coverage using low duty-cycled sensors: random & coordinated sleep algorithms
Proceedings of the 3rd international symposium on Information processing in sensor networks
Naps: scalable, robust topology management in wireless ad hoc networks
Proceedings of the 3rd international symposium on Information processing in sensor networks
Energy-efficient surveillance system using wireless sensor networks
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Power conservation and quality of surveillance in target tracking sensor networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Delay of intrusion detection in wireless sensor networks
Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing
Random Coverage with Guaranteed Connectivity: Joint Scheduling for Wireless Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
A survey of energy-efficient scheduling mechanisms in sensor networks
Mobile Networks and Applications
Lightweight deployment-aware scheduling for wireless sensor networks
Mobile Networks and Applications
IEEE Transactions on Parallel and Distributed Systems
Dynamic priority scheduling-based MAC for wireless sensor networks
International Journal of Sensor Networks
Supporting mobile device communications in the presence of broadcast servers
International Journal of Sensor Networks
DKMS: distributed hierarchical access control for multimedia networks
International Journal of Security and Networks
UDC: a self-adaptive uneven clustering protocol for dynamic sensor networks
International Journal of Sensor Networks
International Journal of Sensor Networks
Some problems of directional sensor networks
International Journal of Sensor Networks
Data sampling control, compression and query in sensor networks
International Journal of Sensor Networks
A distributed energy efficient multicast routing algorithm for WANETs
International Journal of Sensor Networks
International Journal of Sensor Networks
Efficient and secure password authentication schemes for low-power devices
International Journal of Sensor Networks
Location verification using bidirectional one-way hash function in wireless sensor networks
International Journal of Sensor Networks
Emergency guiding and monitoring applications in indoor 3D environments by wireless sensor networks
International Journal of Sensor Networks
Single-path flooding chain routing in mobile wireless networks
International Journal of Sensor Networks
Area-based beaconless reliable broadcasting in sensor networks
International Journal of Sensor Networks
Real-time admission control in 802.15.4 sensor clusters
International Journal of Sensor Networks
Improving network lifetime using sensors with adjustable sensing ranges
International Journal of Sensor Networks
Efficient anonymity schemes for clustered wireless sensor networks
International Journal of Sensor Networks
Maximising α-lifetime for wireless sensor networks
International Journal of Sensor Networks
International Journal of Sensor Networks
Reliable data delivery in wireless sensor networks using distributed cluster monitoring
International Journal of Sensor Networks
On the hop count statistics for randomly deployed wireless sensor networks
International Journal of Sensor Networks
International Journal of Sensor Networks
RL-MAC: a reinforcement learning based MAC protocol for wireless sensor networks
International Journal of Sensor Networks
Energy-efficient medium access control with throughput optimisation for wireless sensor networks
International Journal of Sensor Networks
Medium access control with mobility-adaptive mechanisms for wireless sensor networks
International Journal of Sensor Networks
Design and analysis of distributed power scheduling for data aggregation in wireless sensor networks
International Journal of Sensor Networks
WEAR: a balanced, fault-tolerant, energy-aware routing protocol in WSNs
International Journal of Sensor Networks
Ordinal MDS-based localisation for wireless sensor networks
International Journal of Sensor Networks
International Journal of Sensor Networks
RICA: a ring-based information collection architecture in wireless sensor networks
International Journal of Sensor Networks
In-network aggregation trade-offs for data collection in wireless sensor networks
International Journal of Sensor Networks
TTS: a two-tiered scheduling mechanism for energy conservation in wireless sensor networks
International Journal of Sensor Networks
Efficient information compression in sensor networks
International Journal of Sensor Networks
Self-organisation of sensor networks using genetic algorithms
International Journal of Sensor Networks
Coverage and Detection of a Randomized Scheduling Algorithm in Wireless Sensor Networks
IEEE Transactions on Computers
Energy-quality tradeoffs for target tracking in wireless sensor networks
IPSN'03 Proceedings of the 2nd international conference on Information processing in sensor networks
IEEE Communications Magazine
Weaving a proper net to catch large objects in wireless sensor networks
IEEE Transactions on Wireless Communications
A hybrid optimisation algorithm for coverage enhancement in 3D directional sensor networks
International Journal of Sensor Networks
Hi-index | 0.00 |
We are interested in wireless sensor networks which are used to detect intrusion objects such as enemy tanks, cars, submarines, etc. Since sensor nodes have a limited energy supply, sensor networks are configured to put some sensor nodes in sleep mode to save energy. This is a special case of a randomized scheduling algorithm. Ignored by many studies, an intrusion object's size and shape are important factors that greatly affect the performance of sensor networks. For example, an extremely large object in a small sensor field can easily be detected by even one sensor node, no matter where the sensor node is deployed. The larger an intrusion object is, the fewer sensor nodes that are required for detection. Furthermore, using fewer sensor nodes can save resources and reduce the waste of dead sensor nodes in the environment. Therefore, studying coverage based on intrusion object's size is important. In this paper, we study the performance of the randomized scheduling algorithm via both analysis and simulation in terms of intrusion coverage intensity. In particular, we study cases where intrusion objects occupy areas in a two-dimensional plane and where intrusion objects occupy areas in a three-dimensional space, respectively. We also study the deployment of sensor nodes when intrusion objects are of different sizes and shapes. First, sensor nodes are deployed in a two-dimensional plane and a three-dimensional space with uniform distributions. Then, they are deployed in a two-dimensional plane and a three-dimensional space in two-dimensional and three-dimensional Gaussian distributions, respectively. Therefore, our study not only demonstrates the impact of the size and shape of intrusion objects on the performance of sensor networks, but also provides a guideline on how to configure sensor networks to meet a certain detecting capability in more realistic situations.