Algorithms for Finding Vulnerabilities and Deploying Additional Sensors in a Region with Obstacles
Abstract
:1. Introduction
- A general model, which encompasses most of the previously proposed models, is proposed for the minimum exposure problem.
- A new algorithm is proposed for the minimum exposure problem. For large n and m values, the proposed algorithm is a significant improvement over previous approaches.
- A new near-optimal algorithm is proposed for proper sensor deployment.
2. Related Work
2.1. Voronoi Diagram and Delaunay Triangulation
2.2. Effect of Multiple Sensors Along a Path
2.3. Sensor Deployment
3. Preliminaries
3.1. System Model
3.2. Discover and Exposure Functions
3.3. Feasible Paths and Areas
4. Solution and Analysis
4.1. Minimum Exposure Path
Algorithm 1: Algorithm proposed by Liu in 2009 [4]. |
|
Algorithm 2: An enhanced algorithm with segment trees. |
|
Algorithm 3: The proposed minimum exposure path algorithm. |
|
- Calculate edge values of ;
- Run the Dijkstra algorithm with and configure .
4.2. Deployment of Additional Sensors
Algorithm 4: The proposed algorithm for deployment of an additional sensor. |
|
5. Conclusions
Supplementary Materials
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Marengoni, M.; Draper, B.A.; Hanson, A.; Sitaraman, R. A system to place observers on a polyhedral terrain in polynomial time. Image Vis. Comput. 2000, 18, 773–780. [Google Scholar] [CrossRef]
- Meguerdichian, S.; Koushanfar, F.; Qu, G.; Potkonjak, M. Exposure in wireless ad-hoc sensor networks. In Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, Dallas, TX, USA, 25–30 July 2001; pp. 139–150. [Google Scholar]
- Megerian, S.; Koushanfar, F.; Qu, G.; Veltri, G.; Potkonjak, M. Exposure in wireless sensor networks: Theory and practical solutions. Wirel. Netw. 2002, 8, 443–454. [Google Scholar] [CrossRef]
- Liu, L.; Zhang, X.; Ma, H. Minimal exposure path algorithms for directional sensor networks. Wirel. Commun. Mob. Comput. 2014, 14, 979–994. [Google Scholar] [CrossRef]
- Wang, B.; Chua, K.C.; Wang, W.; Srinivasan, V. Worst and best information exposure paths in wireless sensor networks. In Proceedings of the International Conference on Mobile Ad-Hoc and Sensor Networks, Wuhan, China, 13–15 December 2005; pp. 52–62. [Google Scholar]
- Clouqueur, T.; Phipatanasuphorn, V.; Ramanathan, P.; Saluja, K.K. Sensor deployment strategy for target detection. In Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications, Atlanta, GA, USA, 28 September 2002; pp. 42–48. [Google Scholar]
- Phipatanasuphorn, V.; Ramanathan, P. Vulnerability of sensor networks to unauthorized traversal and monitoring. IEEE Trans. Comput. 2004, 53, 364–369. [Google Scholar] [CrossRef]
- Clouqueur, T.; Phipatanasuphorn, V.; Ramanathan, P.; Saluja, K.K. Sensor deployment strategy for detection of targets traversing a region. Mob. Netw. Appl. 2003, 8, 453–461. [Google Scholar] [CrossRef]
- Yupeng, L.; Peng, J.; Hongchao, L.; Jingqi, J. A virtual potential field based coverage-enhancing algorithm for 3D directional sensor networks. In Proceedings of the 2012 6th International Conference on New Trends in Information Science, Service Science and Data Mining (ISSDM2012), Taipei, Taiwan, 23–25 October 2012; pp. 225–230. [Google Scholar]
- Jing, Z.; Jian-Chao, Z. A virtual potential field based coverage algorithm for directional networks. In Proceedings of the 2009 Chinese Control and Decision Conference, Guilin, China, 17–19 June 2009; pp. 4590–4595. [Google Scholar]
- Xu, Y.C.; Lei, B.; Hendriks, E.A. Camera network coverage improving by particle swarm optimization. EURASIP J. Image Video Process. 2011, 2011, 1–10. [Google Scholar] [CrossRef] [Green Version]
- Dargie, W.; Poellabauer, C. Fundamentals of Wireless Sensor Networks: Theory and Practice; John Wiley & Sons: Hoboken, NJ, USA, 2010. [Google Scholar]
- Meguerdichian, S.; Koushanfar, F.; Potkonjak, M.; Srivastava, M.B. Coverage problems in wireless ad-hoc sensor networks. In Proceedings of the IEEE INFOCOM 2001, Conference on Computer Communications, Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No. 01CH37213), Anchorage, AK, USA, 22–26 April 2001; Volume 3, pp. 1380–1387. [Google Scholar]
- Megerian, S.; Koushanfar, F.; Potkonjak, M.; Srivastava, M.B. Worst and best-case coverage in sensor networks. IEEE Trans. Mob. Comput. 2005, 4, 84–92. [Google Scholar]
- Li, X.Y.; Wan, P.J.; Frieder, O. Coverage in wireless ad hoc sensor networks. IEEE Trans. Comput. 2003, 52, 753–763. [Google Scholar] [CrossRef]
- Fredman, M.L.; Tarjan, R.E. Fibonacci heaps and their uses in improved network optimization algorithms. J. ACM (JACM) 1987, 34, 596–615. [Google Scholar] [CrossRef]
- Hou, Y.T.; Chen, C.M.; Jeng, B. An optimal new-node placement to enhance the coverage of wireless sensor networks. Wirel. Netw. 2010, 16, 1033–1043. [Google Scholar] [CrossRef]
- Mehta, D.P.; López, M.A.; Lin, L. Optimal coverage paths in ad-hoc sensor networks. In Proceedings of the IEEE International Conference on Communications (ICC’03), Anchorage, AK, USA, 11–15 May 2003; Volume 1, pp. 507–511. [Google Scholar]
- Tang, S.; Mao, X.; Li, X.Y. Optimal k-support coverage paths in wireless sensor networks. In Proceedings of the 2009 IEEE International Conference on Pervasive Computing and Communications, Galveston, TX, USA, 9–13 March 2009; pp. 1–6. [Google Scholar]
- Tang, S.; Mao, X.; Li, X.Y.; Dai, G. Evaluating coverage quality through best covered pathes in wireless sensor networks. In Proceedings of the 2011 IEEE Nineteenth IEEE International Workshop on Quality of Service, San Jose, CA, USA, 6–7 June 2011; pp. 1–9. [Google Scholar]
- Mao, X.; Liu, Y.; Tang, S.; Liu, H.; Han, J.; Li, X.Y. Finding best and worst k-coverage paths in multihop wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 2012, 24, 2396–2406. [Google Scholar] [CrossRef]
- Basu Roy, S.; Das, G.; Das, S.K. Algorithms for computing Best Coverage Path in the presence of obstacles in a sensor field. J. Discret. Algorithms 2012, 13, 86–97. [Google Scholar] [CrossRef] [Green Version]
- Wang, C.A.; Tsin, Y.H. Finding constrained and weighted Voronoi diagrams in the plane. Comput. Geom. 1998, 10, 89–104. [Google Scholar] [CrossRef] [Green Version]
- Galyaev, A.; Maslov, E. Optimization of a mobile object evasion laws from detection. J. Comput. Syst. Sci. Int. 2010, 49, 560. [Google Scholar] [CrossRef]
- Galyaev, A.; Maslov, E. Optimization of the law of moving object evasion from detection under constraints. Autom. Remote Control 2012, 73, 992–1004. [Google Scholar] [CrossRef]
- Abramyants, T.; Maslov, E.; Yakhno, V. Mobile object evasion from detection by a group of observers. Autom. Remote Control 2011, 72, 1527–1536. [Google Scholar] [CrossRef]
- Veltri, G.; Huang, Q.; Qu, G.; Potkonjak, M. Minimal and maximal exposure path algorithms for wireless embedded sensor networks. In Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, Los Angeles, CA, USA, 5–7 November 2003; pp. 40–50. [Google Scholar]
- Song, Y.; Liu, L.; Ma, H.; Vasilakos, A.V. Physarum optimization: A new heuristic algorithm to minimal exposure problem. In Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, Istanbul, Turkey, 22–26 August 2012; pp. 419–422. [Google Scholar]
- Meguerdichian, S.; Slijepcevic, S.; Karayan, V.; Potkonjak, M. Localized algorithms in wireless ad-hoc networks: Location discovery and sensor exposure. In Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing, Long Beach, CA, USA, 4–5 October 2001; pp. 106–116. [Google Scholar]
- Zhou, S.; Wu, M.Y.; Shu, W. Improving mobile target detection on randomly deployed sensor networks. Int. J. Sens. Netw. 2009, 6, 115–128. [Google Scholar] [CrossRef]
- Zou, Y.; Chakrabarty, K. Sensor deployment and target localization based on virtual forces. In Proceedings of the IEEE INFOCOM 2003, Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No. 03CH37428), San Francisco, CA, USA, 30 March–3 April 2003; Volume 2, pp. 1293–1303. [Google Scholar]
- Koyuncu, E. The tradeoff between coverage and computation in wireless networks. In Proceedings of the ICC 2020—2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; pp. 1–7. [Google Scholar]
- Nie, Z.; Du, H. An approximation algorithm for General Energy Restricted Sweep Coverage problem. Theor. Comput. Sci. 2021, 864, 70–79. [Google Scholar] [CrossRef]
- Ercan, A.Ö.; El Gamal, A.; Guibas, L. Camera Network Node Selection for Target Localization in the Presence of Occlusions. Stanford Education. 2021. Available online: http://isl.stanford.edu/groups/elgamal/papers/dsc06.pdf (accessed on 16 June 2021).
- Ercan, A.O.; El Gamal, A.; Guibas, L.J. Object tracking in the presence of occlusions via a camera network. In Proceedings of the 2007 6th International Symposium on Information Processing in Sensor Networks, Cambridge, MA, USA, 25–27 April 2007; pp. 509–518. [Google Scholar]
- Erdem, U.M.; Sclaroff, S. Optimal placement of cameras in floorplans to satisfy task requirements and cost constraints. In Proceedings of the OMNIVIS Workshop, Prague, Czech Republic, 16 May 2004; Volume 4. [Google Scholar]
- Hsieh, Y.C.; Lee, Y.C.; You, P.S.; Chen, T.C. An immune based two-phase approach for the multiple-type surveillance camera location problem. Expert Syst. Appl. 2009, 36, 10634–10639. [Google Scholar] [CrossRef]
- Gorain, B.; Mandal, P.S. Approximation algorithms for barrier sweep coverage. Int. J. Found. Comput. Sci. 2019, 30, 425–448. [Google Scholar] [CrossRef]
- Bonnah, E.; Ju, S.; Cai, W. Coverage Maximization in Wireless Sensor Networks Using Minimal Exposure Path and Particle Swarm Optimization. Sens. Imaging 2020, 21, 1–16. [Google Scholar] [CrossRef]
- Aravinth, S.; Senthilkumar, J.; Mohanraj, V.; Suresh, Y. A hybrid swarm intelligence based optimization approach for solving minimum exposure problem in wireless sensor networks. Concurr. Comput. Pract. Exp. 2021, 33, e5370. [Google Scholar] [CrossRef]
- Huang, C.F.; Tseng, Y.C. The coverage problem in a wireless sensor network. Mob. Netw. Appl. 2005, 10, 519–528. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kim, K.; Lee, S. Algorithms for Finding Vulnerabilities and Deploying Additional Sensors in a Region with Obstacles. Electronics 2021, 10, 1504. https://doi.org/10.3390/electronics10121504
Kim K, Lee S. Algorithms for Finding Vulnerabilities and Deploying Additional Sensors in a Region with Obstacles. Electronics. 2021; 10(12):1504. https://doi.org/10.3390/electronics10121504
Chicago/Turabian StyleKim, Kibeom, and Sunggu Lee. 2021. "Algorithms for Finding Vulnerabilities and Deploying Additional Sensors in a Region with Obstacles" Electronics 10, no. 12: 1504. https://doi.org/10.3390/electronics10121504
APA StyleKim, K., & Lee, S. (2021). Algorithms for Finding Vulnerabilities and Deploying Additional Sensors in a Region with Obstacles. Electronics, 10(12), 1504. https://doi.org/10.3390/electronics10121504