Barrier coverage with sensors of limited mobility

  • Authors:
  • Anwar Saipulla;Benyuan Liu;Guoliang Xing;Xinwen Fu;Jie Wang

  • Affiliations:
  • University of Massachusetts Lowell, Lowell, MA, USA;University of Massachusetts Lowell, Lowell, MA, USA;Michigan State University, East Lansing, MI, USA;University of Massachusetts Lowell, Lowell, MA, USA;University of Massachusetts Lowell, Lowell, MA, USA

  • Venue:
  • Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Barrier coverage is a critical issue in wireless sensor networks for various battlefield and homeland security applications. The goal is to effectively detect intruders that attempt to penetrate the region of interest. A sensor barrier is formed by a connected sensor cluster across the entire deployed region, acting as a "trip wire" to detect any crossing intruders. In this paper we study how to efficiently improve barrier coverage using mobile sensors with limited mobility. After the initial deployment, mobile sensors can move to desired locations and connect with other sensors in order to create new barriers. However, simply moving sensors to form a large local cluster does not necessarily yield a global barrier. This global nature of barrier coverage makes it a challenging task to devise effective sensor mobility schemes. Moreover, a good sensor mobility scheme should efficiently improve barrier coverage under the constraints of available mobile sensors and their moving range. We first explore the fundamental limits of sensor mobility on barrier coverage and present a sensor mobility scheme that constructs the maximum number of barriers with minimum sensor moving distance. We then present an efficient algorithm to compute the existence of barrier coverage with sensors of limited mobility, and examine the effects of the number of mobile sensors and their moving ranges on the barrier coverage improvement. Both the analytical results and performance of the algorithms are evaluated via extensive simulations.