Skip to main content
Erschienen in: Soft Computing 21/2019

05.04.2019 | Foundations

Enhanced analysis of border surveillance using intruders’ crossing strategies

verfasst von: N. Bhalaji, S. Venkatesh

Erschienen in: Soft Computing | Ausgabe 21/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

External border surveillance has become one of the most trending topics of research today. The problem of automating the detection in a big and Hercules terrains using WSN is one way to do. In first half of the paper, we have focussed on the chess queen-crossing strategy adopted by the intruder in order to cross the international border. In the other half, we have used milky-way deployment strategy of sensors to automate the process of detection to a particular zone and then forwarding that detected information to the nearest base station using homogeneous zone routing protocol. The relationship between the sensor detection and energy balancing is that in our work, the focus is on shifting the load of the task of the sensor node equally thereby reducing the burden of the nodes the energy spent in sensing, detecting and communication of the information regarding the movement of the direction of the intruder to a certain region and the base station deployed in that region is responsible for alerting the border action team to crack down on the unauthorized intruders especially during the night. To achieve this objective, we have classified the monitoring zone called border region into three zones and allocating three base stations for each zones. The simulations of work show that HZR protocol performs better in terms of network lifetime for this application.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Akyilidz IF, Stuntebeck EP (2006) Wireless Underground sensor networks: research challenges. Ad hoc Netw 4(2006):669–686CrossRef Akyilidz IF, Stuntebeck EP (2006) Wireless Underground sensor networks: research challenges. Ad hoc Netw 4(2006):669–686CrossRef
Zurück zum Zitat Alkhathami MH (2015) Overview of border control using wireless sensor network. Int J Sci Eng Res 6(3):768–771 Alkhathami MH (2015) Overview of border control using wireless sensor network. Int J Sci Eng Res 6(3):768–771
Zurück zum Zitat Alkhathami M, Alazzawi L, Elkateeb A (2015) Border surveillance and intrusion detection using wireless sensor networks. Int J Adv Eng Technol 8(2):17–29 Alkhathami M, Alazzawi L, Elkateeb A (2015) Border surveillance and intrusion detection using wireless sensor networks. Int J Adv Eng Technol 8(2):17–29
Zurück zum Zitat Bellazreg R, Boudriga N (2013) Border surveillance using sensor based thick-lines. In: IEEE explorer (ICOIN). University of Carthage Tunisia Bellazreg R, Boudriga N (2013) Border surveillance using sensor based thick-lines. In: IEEE explorer (ICOIN). University of Carthage Tunisia
Zurück zum Zitat Cayirpunar O, Tavli B, Kadioglu-Urtis E, Uludag S (2017) Optimal mobility patterns of multiple base stations for wireless sensor network lifetime maximization. IEEE Sens J 17(21):7177–7188CrossRef Cayirpunar O, Tavli B, Kadioglu-Urtis E, Uludag S (2017) Optimal mobility patterns of multiple base stations for wireless sensor network lifetime maximization. IEEE Sens J 17(21):7177–7188CrossRef
Zurück zum Zitat Chakraborty S, Chakraborty S, Nandi S, Karmakar S (2015) Fault resilience in sensor networks: distributed node-disjoint multi-path multi-sink forwarding. J Netw Comput Appl 57:85–101CrossRef Chakraborty S, Chakraborty S, Nandi S, Karmakar S (2015) Fault resilience in sensor networks: distributed node-disjoint multi-path multi-sink forwarding. J Netw Comput Appl 57:85–101CrossRef
Zurück zum Zitat Cheng C-F, Wang C-W (2018) The target-barrier coverage problem in wireless sensor networks, ieee transactions on mobile computing. IEEE Trans Mob Comput 17(5):1216–1232CrossRef Cheng C-F, Wang C-W (2018) The target-barrier coverage problem in wireless sensor networks, ieee transactions on mobile computing. IEEE Trans Mob Comput 17(5):1216–1232CrossRef
Zurück zum Zitat Ghosha A, Das SK (2008) Coverage and connectivity issues in wireless sensor networks: a survey. Pervasive Mob Comput 4:303–334CrossRef Ghosha A, Das SK (2008) Coverage and connectivity issues in wireless sensor networks: a survey. Pervasive Mob Comput 4:303–334CrossRef
Zurück zum Zitat Guerriero F, Violi A, Natalizio E, Loscri V, Costanzo C (2011) Modelling and solving optimal placement problems in wireless sensor networks. Appl Math Model 35(1):230–241MathSciNetCrossRef Guerriero F, Violi A, Natalizio E, Loscri V, Costanzo C (2011) Modelling and solving optimal placement problems in wireless sensor networks. Appl Math Model 35(1):230–241MathSciNetCrossRef
Zurück zum Zitat He J, Ji S, Pan Y, Li Y (2011) Reliable and energy efficient target coverage for wireless sensor networks. Tsinghua Sci Technol 16(5):464–474CrossRef He J, Ji S, Pan Y, Li Y (2011) Reliable and energy efficient target coverage for wireless sensor networks. Tsinghua Sci Technol 16(5):464–474CrossRef
Zurück zum Zitat Hochbaum DS, Mass W (1985) Approximation schemes for covering and packing problems in image processing and VLSI. ACM J 32(1):130–136MathSciNetCrossRef Hochbaum DS, Mass W (1985) Approximation schemes for covering and packing problems in image processing and VLSI. ACM J 32(1):130–136MathSciNetCrossRef
Zurück zum Zitat Hung KS, Lui KS (2010) On perimeter coverage in wireless sensor networks. IEEE Trans Wirel Commun 9(7):2156–2164CrossRef Hung KS, Lui KS (2010) On perimeter coverage in wireless sensor networks. IEEE Trans Wirel Commun 9(7):2156–2164CrossRef
Zurück zum Zitat Jin Y, Wang L, Jo J-Y, Kim Y, Yang M, Jiang Y (2009) EECCR: an energy-efficient m-coverage and n-connectivity routing algorithm under border effects in heterogeneous sensor networks. IEEE Trans Veh Technol 58(3):1429–1442CrossRef Jin Y, Wang L, Jo J-Y, Kim Y, Yang M, Jiang Y (2009) EECCR: an energy-efficient m-coverage and n-connectivity routing algorithm under border effects in heterogeneous sensor networks. IEEE Trans Veh Technol 58(3):1429–1442CrossRef
Zurück zum Zitat Lazos L, Poovendran R (2006) Stochastic coverage in heterogeneous sensor networks. ACM Trans Sens Netw 2(3):325–358CrossRef Lazos L, Poovendran R (2006) Stochastic coverage in heterogeneous sensor networks. ACM Trans Sens Netw 2(3):325–358CrossRef
Zurück zum Zitat Lin J-W, Chen Y-T (2008) Improving the coverage of randomized scheduling in wireless sensor networks. IEEE Trans Wirel Commun 7(12):4807–4812CrossRef Lin J-W, Chen Y-T (2008) Improving the coverage of randomized scheduling in wireless sensor networks. IEEE Trans Wirel Commun 7(12):4807–4812CrossRef
Zurück zum Zitat Melissen JBM, Schuur PC (1996) Improved coverings of a square with six and eight equal circles. Electron J Comb 3(1):32MathSciNetMATH Melissen JBM, Schuur PC (1996) Improved coverings of a square with six and eight equal circles. Electron J Comb 3(1):32MathSciNetMATH
Zurück zum Zitat Mostafaei H (2018) Border surveillance with WSN systems in a distributed manner. IEEE Sens J 99:1–10 Mostafaei H (2018) Border surveillance with WSN systems in a distributed manner. IEEE Sens J 99:1–10
Zurück zum Zitat Mostafaei H, Meybodi MR (2013) Maximizing lifetime of target coverage in wireless sensor networks using learning automata. Wirel Pers Commun 71(2):1461–1477CrossRef Mostafaei H, Meybodi MR (2013) Maximizing lifetime of target coverage in wireless sensor networks using learning automata. Wirel Pers Commun 71(2):1461–1477CrossRef
Zurück zum Zitat Nurmela KJ, Ostergard PRJ (2006) Covering a square with up to 30 equal circles. Laboratory for Theoretical Computer science, Helsinki University of technology, Res Rep. A62, 2000 Nurmela KJ, Ostergard PRJ (2006) Covering a square with up to 30 equal circles. Laboratory for Theoretical Computer science, Helsinki University of technology, Res Rep. A62, 2000
Zurück zum Zitat Said O, Elnashar A (2015) Scaling of wireless sensor network intrusion detection probability: 3D intruders, 3D environments. EURASIP J Wirel Commun Netw 2015:46CrossRef Said O, Elnashar A (2015) Scaling of wireless sensor network intrusion detection probability: 3D intruders, 3D environments. EURASIP J Wirel Commun Netw 2015:46CrossRef
Zurück zum Zitat Subir H, Amrita G, Sanjib S, Avishek D, Sipra D (2009) A lifetime enhancing node deployment strategy in WSN. Springer, Berlin, pp 295–397 Subir H, Amrita G, Sanjib S, Avishek D, Sipra D (2009) A lifetime enhancing node deployment strategy in WSN. Springer, Berlin, pp 295–397
Zurück zum Zitat Tiegang F, Guifa T, Limin H (2014) Deployment strategy of WSN based on minimizing cost per unit area. Comput Commun 38(1):26–35CrossRef Tiegang F, Guifa T, Limin H (2014) Deployment strategy of WSN based on minimizing cost per unit area. Comput Commun 38(1):26–35CrossRef
Zurück zum Zitat Wang Y, Wang X, Xie B, Wang D, Agrawal DP (2008) Intrusion detection in homogeneous and heterogeneous wireless sensor networks. IEEE Trans Mob Comput 7(6):698–711CrossRef Wang Y, Wang X, Xie B, Wang D, Agrawal DP (2008) Intrusion detection in homogeneous and heterogeneous wireless sensor networks. IEEE Trans Mob Comput 7(6):698–711CrossRef
Zurück zum Zitat Wang Y, Fu W, Agrawal DP (2013) Gaussian versus uniform distribution for intrusion detection in wireless sensor networks. IEEE Trans Parallel Distrib Syst 24(2):342–355CrossRef Wang Y, Fu W, Agrawal DP (2013) Gaussian versus uniform distribution for intrusion detection in wireless sensor networks. IEEE Trans Parallel Distrib Syst 24(2):342–355CrossRef
Metadaten
Titel
Enhanced analysis of border surveillance using intruders’ crossing strategies
verfasst von
N. Bhalaji
S. Venkatesh
Publikationsdatum
05.04.2019
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 21/2019
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-019-03962-z

Weitere Artikel der Ausgabe 21/2019

Soft Computing 21/2019 Zur Ausgabe