TY - GEN
T1 - Three dimensional intrusion objects detection under randomized scheduling algorithm in sensor networks
AU - Zhang, Yanping
AU - Xiao, Yang
AU - Wu, Kui
AU - Du, Xiaojiang
AU - Sun, Bo
PY - 2008
Y1 - 2008
N2 - Wireless sensor networks are widely used for monitoring applications. The monitored area and the intrusion object are mostly three dimensional. In this paper, we are particularly interested in a sensor network used for monitoring afield to detect intrusion objects such as submarine in some sea area, or goods on shelves in warehouse. In these applications, sensors float in different depth of water or on different height of shelves in three dimensional situations. Since sensor nodes have limited energy supply, sensor networks may be configured to put some sensor nodes in sleep mode to save energy. This is a special case of a randomized scheduling algorithm. In this paper, we study the performance of several randomized scheduling algorithms in terms of intrusion coverage intensity when an intrusion object is considered to occupy a three dimensional space. We study the impact of the size of intrusion object on the sensor network's configuration.
AB - Wireless sensor networks are widely used for monitoring applications. The monitored area and the intrusion object are mostly three dimensional. In this paper, we are particularly interested in a sensor network used for monitoring afield to detect intrusion objects such as submarine in some sea area, or goods on shelves in warehouse. In these applications, sensors float in different depth of water or on different height of shelves in three dimensional situations. Since sensor nodes have limited energy supply, sensor networks may be configured to put some sensor nodes in sleep mode to save energy. This is a special case of a randomized scheduling algorithm. In this paper, we study the performance of several randomized scheduling algorithms in terms of intrusion coverage intensity when an intrusion object is considered to occupy a three dimensional space. We study the impact of the size of intrusion object on the sensor network's configuration.
UR - http://www.scopus.com/inward/record.url?scp=61749102700&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=61749102700&partnerID=8YFLogxK
U2 - 10.1109/MSN.2008.34
DO - 10.1109/MSN.2008.34
M3 - Conference contribution
AN - SCOPUS:61749102700
SN - 9780769534572
T3 - Proceedings - 4th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2008
SP - 16
EP - 22
BT - Proceedings - 4th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2008
T2 - 4th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2008
Y2 - 10 December 2008 through 12 December 2008
ER -