Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Sensor deployment strategy for detection of targets traversing a region
Mobile Networks and Applications
Differentiated surveillance for sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Recent advances in mobility modeling for mobile ad hoc network research
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Towards radar-enabled sensor networks
Proceedings of the 5th international conference on Information processing in sensor networks
A survey on wireless multimedia sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
On the Path Coverage Properties of Random Sensor Networks
IEEE Transactions on Mobile Computing
Strong barrier coverage of wireless sensor networks
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
Connected K-target coverage problem in wireless sensor networks with different observation scenarios
Computer Networks: The International Journal of Computer and Telecommunications Networking
Wireless sensor network survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Convex Combination Approximation for the Min-Cost WSN Point Coverage Problem
WASA '08 Proceedings of the Third International Conference on Wireless Algorithms, Systems, and Applications
Analytic evaluation of target detection in heterogeneous wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Optimal placement of distributed sensors against moving targets
ACM Transactions on Sensor Networks (TOSN)
Local Barrier Coverage in Wireless Sensor Networks
IEEE Transactions on Mobile Computing
An environment-aware mobility model for wireless ad hoc network
Computer Networks: The International Journal of Computer and Telecommunications Networking
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.24 |
The performance of a surveillance wireless sensor network is generally measured with its detection capability within a monitored zone. This capability is affected by various parameters such as the sensor count, the sensor range, the area width and the target mobility model. In real life examples it is observed that intruders prefer some favorite regions because of their geographical advantages within a monitored border area. These regions, which bounds the randomly chosen trespassing paths, are generally in close vicinity. In this paper, we introduce the notion of trespassers' favorite paths (TFP) and provide a tool that can be used to forecast the detection probability of a surveillance network in such a network with TFPs. The detection probability is reduced to the geometric line intersection problem using bijection and the boundary conditions of intruder trajectories for the border area and the favorite region are determined. The line intersection problem is solved using tools from the integral geometry and geometric probability. The effect of the favorable region on the detection quality under different conditions is calculated using probabilistic models. The accuracy of the proposed quality metric is validated by both analytical methods and simulation results. Furthermore, the importance of the intrusion model on the network performance is presented using realistic scenarios. It is shown that the existence of favorite paths has significant impact on the detection quality of the network. The proposed detection quality metric provides analytical tools suitable for both real life and simulation scenarios to the network designers to forecast and optimize the expected detection performance, and is computationally inexpensive compared to both simulation based and distributed quality measurements.