Geography-informed energy conservation for Ad Hoc routing
Proceedings of the 7th annual international conference on Mobile computing and networking
Proceedings of the 7th annual international conference on Mobile computing and networking
Grid Coverage for Surveillance and Target Location in Distributed Sensor Networks
IEEE Transactions on Computers
PEAS: A Robust Energy Conserving Protocol for Long-lived Sensor Networks
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Trajectory based forwarding and its applications
Proceedings of the 9th annual international conference on Mobile computing and networking
The coverage problem in a wireless sensor network
WSNA '03 Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications
Integrated coverage and connectivity configuration in wireless sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Differentiated surveillance for sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Network coverage using low duty-cycled sensors: random & coordinated sleep algorithms
Proceedings of the 3rd international symposium on Information processing in sensor networks
Latency of wireless sensor networks with uncoordinated power saving mechanisms
Proceedings of the 5th ACM international symposium on Mobile ad hoc networking and computing
On deriving the upper bound of α-lifetime for large sensor networks
Proceedings of the 5th ACM international symposium on Mobile ad hoc networking and computing
Power conservation and quality of surveillance in target tracking sensor networks
Proceedings of the 10th annual international conference on Mobile computing and networking
A study on object tracking quality under probabilistic coverage in sensor networks
ACM SIGMOBILE Mobile Computing and Communications Review
Stochastic event capture using mobile sensors subject to a quality metric
Proceedings of the 12th annual international conference on Mobile computing and networking
Analytical modeling and mitigation techniques for the energy hole problem in sensor networks
Pervasive and Mobile Computing
An efficient heuristic approach for security against multiple adversaries
Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems
Energy efficient intrusion detection in camera sensor networks
DCOSS'07 Proceedings of the 3rd IEEE international conference on Distributed computing in sensor systems
Hybrid intrusion detection system for wireless sensor networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Modeling latency—lifetime trade-off for target detection in mobile sensor networks
ACM Transactions on Sensor Networks (TOSN)
Energy efficient multi-object tracking in sensor networks
IEEE Transactions on Signal Processing
Path approximation for multi-hop wireless routing under application-based accuracy constraints
Computer Networks: The International Journal of Computer and Telecommunications Networking
Decentralized and energy-balanced algorithms for maintaining temporal full-coverage in mobile WSNs
Wireless Communications & Mobile Computing
International Journal of Ad Hoc and Ubiquitous Computing
Hi-index | 0.01 |
Surveillance has been a typical application of wireless sensor networks. To conduct surveillance of a given area in real life, one can use stationary watch towers, or can also use patrolling sentinels. Comparing them to solutions in sensor network surveillance, all current coverage based methods fall into the first category. In this paper, we propose and study patrol-based surveillance operations in sensor networks. Two patrol models are presented: the coverage-oriented patrol and the on-demand patrol. They achieve one of the following goals, respectively, i) to achieve surveillance of the entire field with low power drain but still bounded delay of detection; ii) to use an on-demand manner to achieve user initiated surveillance only to interested places.We propose the "SENSTROL" protocol to fulfill the patrol setup procedure for both models. With the implementation in the GloMoSim simulator, it is shown that patrol on arbitrary path can be set up in a network where each node follows a 98%-time-sleep-2%-time-wake power schedule.