Intrusion objects with shapes under randomized scheduling algorithm in sensor networks

Yang Xiao, Hui Chen, Yanping Zhang, Xiaojiang Du, Bo Sun, Kui Wu

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

Wireless sensor networks have many applications. In this paper, we are particularly interested in a sensor network which is used for monitoring a field to detect intrusion objects such as enemy tanks, enemy cars, etc. Since sensor nodes have limited energy supply, sensor networks may be configured to put some sensor nodes in sleep mode to save energy. This is a special case of a randomized scheduling algorithm. In this paper, we study the performance of the randomized scheduling algorithm via both analysis and simulation in terms of intrusion coverage intensity when an intrusion object occupies an area. We study the impact of the size of intrusion object on the sensor network's configuration.

Original languageEnglish
Title of host publicationProceedings - The 28th International Conference on Distributed Computing Systems Workshops, ICDCS Workshops 2008
Pages315-320
Number of pages6
DOIs
StatePublished - 2008
Event28th International Conference on Distributed Computing Systems Workshops, ICDCS Workshops 2008 - Beijing, China
Duration: 17 Jun 200820 Jun 2008

Publication series

NameProceedings - International Conference on Distributed Computing Systems

Conference

Conference28th International Conference on Distributed Computing Systems Workshops, ICDCS Workshops 2008
Country/TerritoryChina
CityBeijing
Period17/06/0820/06/08

Fingerprint

Dive into the research topics of 'Intrusion objects with shapes under randomized scheduling algorithm in sensor networks'. Together they form a unique fingerprint.

Cite this