{"title":"Anti-detection: how does a target traverse a sensing field","authors":"Wenzhe Zhang, Minglu Li","doi":"10.1109/ICESS.2005.31","DOIUrl":null,"url":null,"abstract":"Most sensor networks are deployed to monitor a region of interest for any potential target. An intelligent target looks for the best path to traverse the sensing field. In this paper, we model this anti-detection problem, propose a number of path-finding algorithms, and evaluate these algorithms. Different from previous works which assume complete information of the sensing field, we assume that the target only can detect part of the deployment of sensor network. This makes the proposed method more practical. Experimental results manifest the effectiveness of the path-finding algorithms.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Second International Conference on Embedded Software and Systems (ICESS'05)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICESS.2005.31","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Most sensor networks are deployed to monitor a region of interest for any potential target. An intelligent target looks for the best path to traverse the sensing field. In this paper, we model this anti-detection problem, propose a number of path-finding algorithms, and evaluate these algorithms. Different from previous works which assume complete information of the sensing field, we assume that the target only can detect part of the deployment of sensor network. This makes the proposed method more practical. Experimental results manifest the effectiveness of the path-finding algorithms.