Huynh Thi Thanh Binh, N. Binh, N. Hoang, Pham Anh Tu
{"title":"全向传感器无线传感器网络中最大突破路径的启发式算法","authors":"Huynh Thi Thanh Binh, N. Binh, N. Hoang, Pham Anh Tu","doi":"10.1109/R10-HTC.2016.7906861","DOIUrl":null,"url":null,"abstract":"Barrier coverage is one of the most crucial issues for quality of service in wireless sensor networks (WSN) and it has been recently emerged as a premier research topic. The barrier coverage can guarantee intrusion detection when mobile objects are entering into the boundary of a sensor field or penetrate into sensor field. There are several penetration paths such as breach, support, exposure and detection. This paper is interested in the maximal breach path, which is specific for a penetrating intruder's safety that corresponds to the worst case coverage. Having known the MBP, network designers could improve the coverage of the networks and maximize the effectiveness of the system. Moreover, MBP provides fundamental background to develop intrusive detection and border surveillance applications. Therefore, in this paper we presents an innovative polynomial time algorithm for computing the MBP for a given sensor network named DBS. The simulation results show that the aforementioned algorithm significantly outperforms an existed one named Megerian's in term of both computational time and consummation.","PeriodicalId":174678,"journal":{"name":"2016 IEEE Region 10 Humanitarian Technology Conference (R10-HTC)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Heuristic algorithm for finding maximal breach path in wireless sensor network with omnidirectional sensors\",\"authors\":\"Huynh Thi Thanh Binh, N. Binh, N. Hoang, Pham Anh Tu\",\"doi\":\"10.1109/R10-HTC.2016.7906861\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Barrier coverage is one of the most crucial issues for quality of service in wireless sensor networks (WSN) and it has been recently emerged as a premier research topic. The barrier coverage can guarantee intrusion detection when mobile objects are entering into the boundary of a sensor field or penetrate into sensor field. There are several penetration paths such as breach, support, exposure and detection. This paper is interested in the maximal breach path, which is specific for a penetrating intruder's safety that corresponds to the worst case coverage. Having known the MBP, network designers could improve the coverage of the networks and maximize the effectiveness of the system. Moreover, MBP provides fundamental background to develop intrusive detection and border surveillance applications. Therefore, in this paper we presents an innovative polynomial time algorithm for computing the MBP for a given sensor network named DBS. The simulation results show that the aforementioned algorithm significantly outperforms an existed one named Megerian's in term of both computational time and consummation.\",\"PeriodicalId\":174678,\"journal\":{\"name\":\"2016 IEEE Region 10 Humanitarian Technology Conference (R10-HTC)\",\"volume\":\"2015 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE Region 10 Humanitarian Technology Conference (R10-HTC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/R10-HTC.2016.7906861\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE Region 10 Humanitarian Technology Conference (R10-HTC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/R10-HTC.2016.7906861","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Heuristic algorithm for finding maximal breach path in wireless sensor network with omnidirectional sensors
Barrier coverage is one of the most crucial issues for quality of service in wireless sensor networks (WSN) and it has been recently emerged as a premier research topic. The barrier coverage can guarantee intrusion detection when mobile objects are entering into the boundary of a sensor field or penetrate into sensor field. There are several penetration paths such as breach, support, exposure and detection. This paper is interested in the maximal breach path, which is specific for a penetrating intruder's safety that corresponds to the worst case coverage. Having known the MBP, network designers could improve the coverage of the networks and maximize the effectiveness of the system. Moreover, MBP provides fundamental background to develop intrusive detection and border surveillance applications. Therefore, in this paper we presents an innovative polynomial time algorithm for computing the MBP for a given sensor network named DBS. The simulation results show that the aforementioned algorithm significantly outperforms an existed one named Megerian's in term of both computational time and consummation.