Skip to main content
Top
Published in: Soft Computing 21/2019

05-04-2019 | Foundations

Enhanced analysis of border surveillance using intruders’ crossing strategies

Authors: N. Bhalaji, S. Venkatesh

Published in: Soft Computing | Issue 21/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

External border surveillance has become one of the most trending topics of research today. The problem of automating the detection in a big and Hercules terrains using WSN is one way to do. In first half of the paper, we have focussed on the chess queen-crossing strategy adopted by the intruder in order to cross the international border. In the other half, we have used milky-way deployment strategy of sensors to automate the process of detection to a particular zone and then forwarding that detected information to the nearest base station using homogeneous zone routing protocol. The relationship between the sensor detection and energy balancing is that in our work, the focus is on shifting the load of the task of the sensor node equally thereby reducing the burden of the nodes the energy spent in sensing, detecting and communication of the information regarding the movement of the direction of the intruder to a certain region and the base station deployed in that region is responsible for alerting the border action team to crack down on the unauthorized intruders especially during the night. To achieve this objective, we have classified the monitoring zone called border region into three zones and allocating three base stations for each zones. The simulations of work show that HZR protocol performs better in terms of network lifetime for this application.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Akyilidz IF, Stuntebeck EP (2006) Wireless Underground sensor networks: research challenges. Ad hoc Netw 4(2006):669–686CrossRef Akyilidz IF, Stuntebeck EP (2006) Wireless Underground sensor networks: research challenges. Ad hoc Netw 4(2006):669–686CrossRef
go back to reference Alkhathami MH (2015) Overview of border control using wireless sensor network. Int J Sci Eng Res 6(3):768–771 Alkhathami MH (2015) Overview of border control using wireless sensor network. Int J Sci Eng Res 6(3):768–771
go back to reference Alkhathami M, Alazzawi L, Elkateeb A (2015) Border surveillance and intrusion detection using wireless sensor networks. Int J Adv Eng Technol 8(2):17–29 Alkhathami M, Alazzawi L, Elkateeb A (2015) Border surveillance and intrusion detection using wireless sensor networks. Int J Adv Eng Technol 8(2):17–29
go back to reference Bellazreg R, Boudriga N (2013) Border surveillance using sensor based thick-lines. In: IEEE explorer (ICOIN). University of Carthage Tunisia Bellazreg R, Boudriga N (2013) Border surveillance using sensor based thick-lines. In: IEEE explorer (ICOIN). University of Carthage Tunisia
go back to reference Cayirpunar O, Tavli B, Kadioglu-Urtis E, Uludag S (2017) Optimal mobility patterns of multiple base stations for wireless sensor network lifetime maximization. IEEE Sens J 17(21):7177–7188CrossRef Cayirpunar O, Tavli B, Kadioglu-Urtis E, Uludag S (2017) Optimal mobility patterns of multiple base stations for wireless sensor network lifetime maximization. IEEE Sens J 17(21):7177–7188CrossRef
go back to reference Chakraborty S, Chakraborty S, Nandi S, Karmakar S (2015) Fault resilience in sensor networks: distributed node-disjoint multi-path multi-sink forwarding. J Netw Comput Appl 57:85–101CrossRef Chakraborty S, Chakraborty S, Nandi S, Karmakar S (2015) Fault resilience in sensor networks: distributed node-disjoint multi-path multi-sink forwarding. J Netw Comput Appl 57:85–101CrossRef
go back to reference Cheng C-F, Wang C-W (2018) The target-barrier coverage problem in wireless sensor networks, ieee transactions on mobile computing. IEEE Trans Mob Comput 17(5):1216–1232CrossRef Cheng C-F, Wang C-W (2018) The target-barrier coverage problem in wireless sensor networks, ieee transactions on mobile computing. IEEE Trans Mob Comput 17(5):1216–1232CrossRef
go back to reference Ghosha A, Das SK (2008) Coverage and connectivity issues in wireless sensor networks: a survey. Pervasive Mob Comput 4:303–334CrossRef Ghosha A, Das SK (2008) Coverage and connectivity issues in wireless sensor networks: a survey. Pervasive Mob Comput 4:303–334CrossRef
go back to reference Guerriero F, Violi A, Natalizio E, Loscri V, Costanzo C (2011) Modelling and solving optimal placement problems in wireless sensor networks. Appl Math Model 35(1):230–241MathSciNetCrossRef Guerriero F, Violi A, Natalizio E, Loscri V, Costanzo C (2011) Modelling and solving optimal placement problems in wireless sensor networks. Appl Math Model 35(1):230–241MathSciNetCrossRef
go back to reference He J, Ji S, Pan Y, Li Y (2011) Reliable and energy efficient target coverage for wireless sensor networks. Tsinghua Sci Technol 16(5):464–474CrossRef He J, Ji S, Pan Y, Li Y (2011) Reliable and energy efficient target coverage for wireless sensor networks. Tsinghua Sci Technol 16(5):464–474CrossRef
go back to reference Hochbaum DS, Mass W (1985) Approximation schemes for covering and packing problems in image processing and VLSI. ACM J 32(1):130–136MathSciNetCrossRef Hochbaum DS, Mass W (1985) Approximation schemes for covering and packing problems in image processing and VLSI. ACM J 32(1):130–136MathSciNetCrossRef
go back to reference Hung KS, Lui KS (2010) On perimeter coverage in wireless sensor networks. IEEE Trans Wirel Commun 9(7):2156–2164CrossRef Hung KS, Lui KS (2010) On perimeter coverage in wireless sensor networks. IEEE Trans Wirel Commun 9(7):2156–2164CrossRef
go back to reference Jin Y, Wang L, Jo J-Y, Kim Y, Yang M, Jiang Y (2009) EECCR: an energy-efficient m-coverage and n-connectivity routing algorithm under border effects in heterogeneous sensor networks. IEEE Trans Veh Technol 58(3):1429–1442CrossRef Jin Y, Wang L, Jo J-Y, Kim Y, Yang M, Jiang Y (2009) EECCR: an energy-efficient m-coverage and n-connectivity routing algorithm under border effects in heterogeneous sensor networks. IEEE Trans Veh Technol 58(3):1429–1442CrossRef
go back to reference Lazos L, Poovendran R (2006) Stochastic coverage in heterogeneous sensor networks. ACM Trans Sens Netw 2(3):325–358CrossRef Lazos L, Poovendran R (2006) Stochastic coverage in heterogeneous sensor networks. ACM Trans Sens Netw 2(3):325–358CrossRef
go back to reference Lin J-W, Chen Y-T (2008) Improving the coverage of randomized scheduling in wireless sensor networks. IEEE Trans Wirel Commun 7(12):4807–4812CrossRef Lin J-W, Chen Y-T (2008) Improving the coverage of randomized scheduling in wireless sensor networks. IEEE Trans Wirel Commun 7(12):4807–4812CrossRef
go back to reference Melissen JBM, Schuur PC (1996) Improved coverings of a square with six and eight equal circles. Electron J Comb 3(1):32MathSciNetMATH Melissen JBM, Schuur PC (1996) Improved coverings of a square with six and eight equal circles. Electron J Comb 3(1):32MathSciNetMATH
go back to reference Mostafaei H (2018) Border surveillance with WSN systems in a distributed manner. IEEE Sens J 99:1–10 Mostafaei H (2018) Border surveillance with WSN systems in a distributed manner. IEEE Sens J 99:1–10
go back to reference Mostafaei H, Meybodi MR (2013) Maximizing lifetime of target coverage in wireless sensor networks using learning automata. Wirel Pers Commun 71(2):1461–1477CrossRef Mostafaei H, Meybodi MR (2013) Maximizing lifetime of target coverage in wireless sensor networks using learning automata. Wirel Pers Commun 71(2):1461–1477CrossRef
go back to reference Nurmela KJ, Ostergard PRJ (2006) Covering a square with up to 30 equal circles. Laboratory for Theoretical Computer science, Helsinki University of technology, Res Rep. A62, 2000 Nurmela KJ, Ostergard PRJ (2006) Covering a square with up to 30 equal circles. Laboratory for Theoretical Computer science, Helsinki University of technology, Res Rep. A62, 2000
go back to reference Said O, Elnashar A (2015) Scaling of wireless sensor network intrusion detection probability: 3D intruders, 3D environments. EURASIP J Wirel Commun Netw 2015:46CrossRef Said O, Elnashar A (2015) Scaling of wireless sensor network intrusion detection probability: 3D intruders, 3D environments. EURASIP J Wirel Commun Netw 2015:46CrossRef
go back to reference Subir H, Amrita G, Sanjib S, Avishek D, Sipra D (2009) A lifetime enhancing node deployment strategy in WSN. Springer, Berlin, pp 295–397 Subir H, Amrita G, Sanjib S, Avishek D, Sipra D (2009) A lifetime enhancing node deployment strategy in WSN. Springer, Berlin, pp 295–397
go back to reference Tiegang F, Guifa T, Limin H (2014) Deployment strategy of WSN based on minimizing cost per unit area. Comput Commun 38(1):26–35CrossRef Tiegang F, Guifa T, Limin H (2014) Deployment strategy of WSN based on minimizing cost per unit area. Comput Commun 38(1):26–35CrossRef
go back to reference Wang Y, Wang X, Xie B, Wang D, Agrawal DP (2008) Intrusion detection in homogeneous and heterogeneous wireless sensor networks. IEEE Trans Mob Comput 7(6):698–711CrossRef Wang Y, Wang X, Xie B, Wang D, Agrawal DP (2008) Intrusion detection in homogeneous and heterogeneous wireless sensor networks. IEEE Trans Mob Comput 7(6):698–711CrossRef
go back to reference Wang Y, Fu W, Agrawal DP (2013) Gaussian versus uniform distribution for intrusion detection in wireless sensor networks. IEEE Trans Parallel Distrib Syst 24(2):342–355CrossRef Wang Y, Fu W, Agrawal DP (2013) Gaussian versus uniform distribution for intrusion detection in wireless sensor networks. IEEE Trans Parallel Distrib Syst 24(2):342–355CrossRef
Metadata
Title
Enhanced analysis of border surveillance using intruders’ crossing strategies
Authors
N. Bhalaji
S. Venkatesh
Publication date
05-04-2019
Publisher
Springer Berlin Heidelberg
Published in
Soft Computing / Issue 21/2019
Print ISSN: 1432-7643
Electronic ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-019-03962-z

Other articles of this Issue 21/2019

Soft Computing 21/2019 Go to the issue

Premium Partner