Huynh Thi Thanh Binh, N. Binh, N. Hoang, Pham Anh Tu
{"title":"Heuristic algorithm for finding maximal breach path in wireless sensor network with omnidirectional sensors","authors":"Huynh Thi Thanh Binh, N. Binh, N. Hoang, Pham Anh Tu","doi":"10.1109/R10-HTC.2016.7906861","DOIUrl":null,"url":null,"abstract":"Barrier coverage is one of the most crucial issues for quality of service in wireless sensor networks (WSN) and it has been recently emerged as a premier research topic. The barrier coverage can guarantee intrusion detection when mobile objects are entering into the boundary of a sensor field or penetrate into sensor field. There are several penetration paths such as breach, support, exposure and detection. This paper is interested in the maximal breach path, which is specific for a penetrating intruder's safety that corresponds to the worst case coverage. Having known the MBP, network designers could improve the coverage of the networks and maximize the effectiveness of the system. Moreover, MBP provides fundamental background to develop intrusive detection and border surveillance applications. Therefore, in this paper we presents an innovative polynomial time algorithm for computing the MBP for a given sensor network named DBS. The simulation results show that the aforementioned algorithm significantly outperforms an existed one named Megerian's in term of both computational time and consummation.","PeriodicalId":174678,"journal":{"name":"2016 IEEE Region 10 Humanitarian Technology Conference (R10-HTC)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE Region 10 Humanitarian Technology Conference (R10-HTC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/R10-HTC.2016.7906861","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Barrier coverage is one of the most crucial issues for quality of service in wireless sensor networks (WSN) and it has been recently emerged as a premier research topic. The barrier coverage can guarantee intrusion detection when mobile objects are entering into the boundary of a sensor field or penetrate into sensor field. There are several penetration paths such as breach, support, exposure and detection. This paper is interested in the maximal breach path, which is specific for a penetrating intruder's safety that corresponds to the worst case coverage. Having known the MBP, network designers could improve the coverage of the networks and maximize the effectiveness of the system. Moreover, MBP provides fundamental background to develop intrusive detection and border surveillance applications. Therefore, in this paper we presents an innovative polynomial time algorithm for computing the MBP for a given sensor network named DBS. The simulation results show that the aforementioned algorithm significantly outperforms an existed one named Megerian's in term of both computational time and consummation.