Enhancing Smart Building Surveillance Systems in Thin Walls: An Efficient Barrier Design
Abstract
:1. Introduction
- First, we design an efficient barrier system for enhancing smart building surveillance in harsh environments with walls and infrastructure. The proposed system is designed to consider energy-efficient surveillance and optimal formations of system components;
- Then, this paper presents a formal definition of the research problem to minimize the number of nodes or system components, in order to ensure secure surveillance and communication among system components;
- To resolve the problem, we propose two different algorithms for the preemptive placement of nodes within thin walls and the adjacent spaces. These algorithms aim to minimize the number of nodes to an optimal level and to optimize their placement, striking a balance between system efficiency, cost effectiveness, and environmental sustainability;
- Instead of real circumstances, we utilize an ad hoc server for simulations with various scenarios and parameters. Then, the performances of the proposed algorithms are analyzed for obtained outcomes through those simulations using various settings and scenarios; as well, detailed discussions are provided for the obtained results.
2. Proposed Framework
2.1. System Overview and Assumptions
- The three-dimensional space is considered as the region of interest within the smart building as a whole. And the smart building contains thin walls, which are located everywhere within the building;
- The proposed system consists of a group of system members or components, including IoT devices, mobile robots, and sensors, where each component has equal detection or communication range and is equipped with wireless transmitters and receivers;
- The connection between two system members is created if there exists an overlapped space between the detection ranges of two neighbors.
2.2. Notations, Essential Terms, Problem Definition
3. Proposed Methods
3.1. Algorithm 1: Centralized Node Deployment
- The first step is to place the nodes in a row along the centerline of the thin wall. This centralized deployment ensures that nodes are evenly distributed along the length of the wall, which is important for maintaining consistent communication coverage;
- When nodes are placed inside thin walls, the algorithm randomly deploys nodes on both sides of adjacent walls. Randomness here means that nodes are placed at various points on adjacent walls, but within a defined range, to ensure effective signal transmission with nodes within thin walls. This step introduces a variation factor that reflects real-world conditions, in which nodes can be placed in various locations, depending on the specific requirements and constraints of the building;
- The final step is to form a communication barrier based on nodes placed inside the thin wall by [35]. This barrier overcomes communication interruptions caused by thin walls and enables effective data transfer between randomly placed nodes on either side of the wall. The formation of this communication barrier optimizes communication paths between nodes and improves data transmission within smart buildings. Then, we estimate the total number of current surveillance barriers and return it as the final outcome.
Algorithm 1 Centralized Node Deployment Inputs: S, M, r, t, q, Output: δ |
1: verify M with r within S; 2: recognize the walls in S; 3: set W ← ∅; 4: place nodes in centerline in the walls; 5: while q number of WalRecogSurv are not formed do 6: seek a new WalRecogSurv through the centerline in the walls with t and p; 7: if a new WalRecogSurv wk is found then 8: set ; 9: end if 10: end while 11: calculate ; 12: update to δ; 13: return δ; |
3.2. Algorithm 2: Adaptation Node Deployment
- The first step assumes that there is no wall and randomly deploys nodes in the entire space of the smart building. This random placement reflects the variability in and irregularity of node placement in the real world;
- This step creates a barrier based on the initial node placement by [35]. This barrier assumes that there is no wall and forms a communication flow between nodes; each node can transmit and receive data to and from adjacent nodes. After the barrier is created, it finds this flow to see how communication is formed;
- After finding the flow, it finds the point where the flow and the wall intersect. This intersection is an area where communication disconnection may occur, and additional nodes are placed at that point to resolve this. This keeps the communication flow through the wall smooth and enables data transfer to other areas within the smart building. Then, we measure the total number of current surveillance barriers and return it as final result.
Algorithm 2 Adaptation Node Deployment Inputs: S, M, r, t, q, Output: δ |
1: identify M with r within S; 2: detect the walls in S; 3: set W ← ∅; 4: while q number of flows are not generated do 5: seek a new flow between left border and right border with t and p; 6: if a new flow is found then 7: add it to W; 8: end if 9: end while 10: calculate ; 11: search for the points where the flow and the wall intersect; 12: add those points to ; 13: update to δ; 14: return δ; |
4. Performance Analysis
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
IoT | Internet of Things |
UAVs | Unmanned Aerial Vehicles |
WalRecogSurv | wall-recognition surveillance security barriers in smart buildings |
References
- Sha, Q.; Liu, X.; Ansari, N. Efficient Multiple Green Energy Base Stations Far-Field Wireless Charging for Mobile IoT Devices. IEEE Internet Things J. 2023, 10, 8734–8743. [Google Scholar] [CrossRef]
- Bugshan, N.; Khalil, I.; Rahman, M.S.; Atiquzzaman, M.; Yi, X.; Badsha, S. Toward trustworthy and privacy-preserving federated deep learning service framework for industrial internet of things. IEEE Trans. Ind. Inform. 2023, 19, 1535–1547. [Google Scholar] [CrossRef]
- Taha, A.M.; Elabd, A. IoT for certified sustainability in smart buildings. IEEE Netw. 2023, 35, 241–247. [Google Scholar] [CrossRef]
- Ko, H.; Pack, S.; Leung, V.C.M. Performance optimization of serverless computing for latency-guaranteed and energy-efficient task offloading in energy-harvesting industrial IoT. IEEE Internet Things J. 2023, 10, 1897–1907. [Google Scholar]
- Baek, H.; Ko, H.; Kim, J.; Jeon, Y.; Pack, S. Sensing quality-aware task allocation for multidimensional vehicular urban sensing. IEEE Internet Things J. 2023, 10, 9989–9998. [Google Scholar] [CrossRef]
- Zhang, Q.; Wu, J.; Zanella, M.; Yang, W.; Bashir, A.K.; Fornaciari, W. Sema-IIoVT: Emergent semantic-based trustworthy information-centric fog system and testbed for intelligent internet of vehicles. IEEE Consum. Electron. Mag. 2023, 12, 70–79. [Google Scholar] [CrossRef]
- Filali, A.; Mlika, Z.; Cherkaoui, S.; Kobbane, A. Dynamic SDN-based radio access network slicing with deep reinforcement learning for URLLC and eMBB Services. IEEE Trans. Netw. Sci. Eng. 2022, 9, 2174–2187. [Google Scholar] [CrossRef]
- Dao, N.; Kim, Y.; Jeong, S.; Park, M.; Cho, S. Achievable multi-security levels for lightweight IoT-enabled devices in infrastructureless peer-aware communications. IEEE Access 2017, 5, 26743–26753. [Google Scholar] [CrossRef]
- Xu, S.; Liu, J.; Kato, N.; Du, Y. Intelligent reflecting surface backscatter enabled multi-tier computing for 6G internet of things. IEEE J. Sel. Areas Commun. 2023, 41, 320–333. [Google Scholar] [CrossRef]
- Su, Y.; Gao, Z.; Du, X.; Guizani, M. User-centric base station clustering and resource allocation for cell-edge users in 6G ultra-dense networks. Future Gener. Comput. Syst. 2023, 141, 173–185. [Google Scholar] [CrossRef]
- Kim, J.; Lee, J.; Ko, H.; Kim, T.; Pack, S. Space mobile networks: Satellite as core and access networks for B5G. IEEE Commun. Mag. 2022, 60, 58–64. [Google Scholar] [CrossRef]
- Nguyen, D.C.; Ding, M.; Pathirana, P.N.; Seneviratne, A.; Li, J.; Niyato, D.; Dobre, O.A.; Poor, H.V. 6G Internet of Things: A comprehensive survey. IEEE Internet Things J. 2022, 9, 359–383. [Google Scholar] [CrossRef]
- Kovtun, V.; Izonin, I.; Gregus, M. Mathematical models of the information interaction process in 5G-IoT ecosystem: Different functional scenarios. ICT Express 2023, 9, 264–269. [Google Scholar] [CrossRef]
- Geraci, G.; García-Rodríguez, A.; Azari, M.M.; Lozano, A.; Mezzavilla, M.; Chatzinotas, S.; Chen, Y.; Rangan, S.; Renzo, M.D. What will the future of UAV cellular communications be? A flight from 5G to 6G. IEEE Commun. Surv. Tutorials 2022, 24, 1304–1335. [Google Scholar] [CrossRef]
- Dao, N.; Park, M.; Kim, J.; Paek, J.; Cho, S. Resource-aware relay selection for inter-cell interference avoidance in 5G heterogeneous network for Internet of Things systems. IEEE Commun. Surv. Tutorials 2019, 93, 877–887. [Google Scholar] [CrossRef]
- Yao, J.; Ansari, N. QoS-Aware Machine Learning Task Offloading and Power Control in Internet of Drones. IEEE Internet Things J. 2023, 10, 6100–6110. [Google Scholar] [CrossRef]
- Raja, G.; Senthivel, S.G.; Balaganesh, S.; Rajakumar, B.R.; Ravichandran, V.; Guizani, M. MLB-IoD: Multi Layered Blockchain Assisted 6G Internet of Drones Ecosystem. IEEE Trans. Veh. Technol. 2023, 72, 2511–2520. [Google Scholar] [CrossRef]
- Liu, L.; Xiong, K.; Cao, J.; Lu, Y.; Fan, P. Letaief, K.B. Average AoI minimization in UAV-assisted data collection with RF wireless power transfer: A deep reinforcement learning scheme. IEEE Internet Things J. 2022, 9, 5216–5228. [Google Scholar] [CrossRef]
- Cong, J.; Wang, X.; Yan, C.; Yang, L.T.; Dong, M.; Ota, K. CRB Weighted Source Localization Method Based on Deep Neural Networks in Multi-UAV Network. IEEE Internet Things J. 2023, 10, 5747–5759. [Google Scholar] [CrossRef]
- Kim, H.; Ben-Othman, J.; Mokdad, L.; Son, J.; Li, C. Research challenges and security threats to AI-driven 5G virtual emotion applications using autonomous vehicles, drones, and smart devices. IEEE Netw. 2020, 34, 288–294. [Google Scholar] [CrossRef]
- Memos, V.A.; Psannis, K.E. Optimized UAV-based data collection from MWSNs. ICT Express 2023, 9, 29–33. [Google Scholar] [CrossRef]
- Hendria, W.F.; Phan, Q.T.; Adzaka, F.; Jeong, C. Combining transformer and CNN for object detection in UAV imagery. ICT Express 2023, 9, 258–263. [Google Scholar] [CrossRef]
- Kumar, S.; Lai, T.H.; Posner, M.E.; Sinha, P. Maximizing the lifetime of a barrier of wireless sensors. IEEE Trans. Mob. Comput. 2010, 9, 1161–1172. [Google Scholar] [CrossRef]
- Carrabs, F.; Cerulli, R.; D’Ambrosio, C.; Raiconi, A. A hybrid exact approach for maximizing lifetime in sensor networks with complete and partial coverage constraints. J. Netw. Comput. Appl. 2015, 58, 12–22. [Google Scholar] [CrossRef]
- Vecchio, M.; Lopez-Valcarce, R. Improving area coverage of wireless sensor networks via controllable mobile nodes: A greedy approach. J. Netw. Comput. Appl. 2015, 48, 1–13. [Google Scholar] [CrossRef]
- Benahmed, T.; Benahmedm, K. Optimal barrier coverage for critical area surveillance using wireless sensor networks. Int. J. Commun. Syst. 2019, 32, 1–21. [Google Scholar] [CrossRef]
- Daniel, A.M.; Mirshak, R. Fault-tolerant design of barrier coverage for periodically repairable wireless sensor networks. IEEE Trans. Aerosp. Electron. Syst. 2023, 59, 5802–5822. [Google Scholar] [CrossRef]
- Chen, G.; Xiong, Y.; She, J. A k-barrier coverage enhancing scheme based on gaps repairing in visual sensor network. IEEE Sens. J. 2023, 23, 2865–2877. [Google Scholar] [CrossRef]
- Chang, J.; Shen, X.; Bai, W.; Li, W. Energy-efficient barrier coverage based on nodes alliance for intrusion detection in underwater sensor networks. IEEE Sens. J. 2022, 22, 3766–3776. [Google Scholar] [CrossRef]
- Wang, Z.; Chen, H.; Cao, Q.; Qi, H.; Wang, Z.; Wang, Q. Achieving location error tolerant barrier coverage for wireless sensor networks. Comput. Netw. 2017, 112, 314–328. [Google Scholar] [CrossRef]
- Kim, H.; Ben-Othman, J. Eco-friendly low resource security surveillance framework toward green AI digital twin. IEEE Commun. Lett. 2023, 27, 377–380. [Google Scholar] [CrossRef]
- Si, P.; Fu, Z.; Shu, L.; Yang, Y.; Huang, K.; Liu, Y. Target-barrier coverage improvement in an insecticidal lamps internet of UAVs. IEEE Trans. Veh. Technol. 2022, 71, 4373–4382. [Google Scholar] [CrossRef]
- Kim, H.; Ben-Othman, J.; Mokdad, L.; Bellavista, P. A virtual emotion detection architecture with two-way enabled delay bound toward evolutional emotion-based IoT services. IEEE Trans. Mob. Comput. 2022, 21, 1172–1181. [Google Scholar] [CrossRef]
- Li, W.; Zhang, W. Coverage hole and boundary nodes detection in wireless sensor networks. J. Netw. Comput. Appl. 2015, 48, 819–827. [Google Scholar] [CrossRef]
- Lammich, P.; Sefidgar, S.R. Formalizing the Edmonds-Karp algorithm. In Springer Lecture Notes in Computer Science (LNCS); Springer: Berlin/Heidelberg, Germany, 2016. [Google Scholar]
Notations | Descriptions |
---|---|
S | a 3D smart building surveillance space |
M | a set of system members |
W | a set of wall-recognition surveillance security barriers |
the number of system members | |
r | the detection range of system member |
t | the allowed number of connections through the wall |
p | the possible number of connections among system members |
q | the requested number of wall-recognition surveillance security barriers |
i | an identifier of a system member, where |
j | an identifier of a system member, where |
k | an identifier of a wall-recognition barrier, where |
Studies | Pros | Cons |
---|---|---|
[23] | - Initial work of barriers | - 2D environment |
- Sleep-wakeup scheduling | - Not practical product | |
- Homogeneous capability | - Biased theoretical analysis | |
- Heterogeneous capability | - Not expanded environment | |
[25] | - Controllable trajectories | - 2D environment |
- Static and mobile sensors | - Not practical product | |
- Bidding mechanism | - Biased theoretical analysis | |
- Deterministic countermeasures | - Not expanded environment | |
[33] | - Two-way-enabled barriers | - 2D environment |
- Slab dividing strategy | - Not practical product | |
- Perpendicular detection | - Biased simulation analysis | |
- Horizontal detection | - Not expanded environment | |
Our scheme | - 3D environment | - Sole thin wall |
- Smart building with thin wall | - Not practical product | |
- Green property | - Biased simulation analysis | |
- Deployment strategy with wall | - Not expanded environment |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Lee, T.; Kim, H. Enhancing Smart Building Surveillance Systems in Thin Walls: An Efficient Barrier Design. Sensors 2024, 24, 595. https://doi.org/10.3390/s24020595
Lee T, Kim H. Enhancing Smart Building Surveillance Systems in Thin Walls: An Efficient Barrier Design. Sensors. 2024; 24(2):595. https://doi.org/10.3390/s24020595
Chicago/Turabian StyleLee, Taewoo, and Hyunbum Kim. 2024. "Enhancing Smart Building Surveillance Systems in Thin Walls: An Efficient Barrier Design" Sensors 24, no. 2: 595. https://doi.org/10.3390/s24020595
APA StyleLee, T., & Kim, H. (2024). Enhancing Smart Building Surveillance Systems in Thin Walls: An Efficient Barrier Design. Sensors, 24(2), 595. https://doi.org/10.3390/s24020595