- Open Access
Energy-efficient border intrusion detection using wireless sensors network
© Yang et al.; licensee Springer. 2014
- Received: 13 October 2013
- Accepted: 12 March 2014
- Published: 25 March 2014
Monitoring the illegal movement across national border effectively is a challenging problem. The emerging technology of wireless sensor network (WSN) is expected to provide a new way to realize energy-efficient border intrusion detection. We propose a scheme to measure and guarantee the coverage quality of WSN. We also design a new coverage model for detecting one-direction path. The simulation results shows that the new coverage model could not only detect the intrusion in border area well, but also extend the network lifetime in an efficient way.
- Wireless sensor network
- Barrier coverage
- Localized algorithm
Over the past few years, wireless sensor networks (WSNs) and their various applications is evolving quickly and known to be an important area of research. Wireless sensor networks have numerous applications such as in environmental, ecological, agricultural, military and medical treatment. Security has become the most important issue in worldwide nowadays.
Meanwhile, real-time detection of border intrusion is becoming a tough factor of any country. Monitoring borders requires large amount of equipments and labor power. So wireless sensor networks could be an intelligent manner to solve these problems. In the deployed region, the sensors could be organized as groups to construct a barrier. One important observation is the linearity of sensors’ energy consumption which means that the death of sensors could be predicted. So the research must pay more attention to the sink nodes to which indicate the weak zone. We actually discuss the methods to guarantee the quality of coverage and the new coverage model which could be more energy efficient.
If sensor failures cause the network to fall below a desired level of “quality” for barrier coverage, we want to know which parts of the network need repair. It will not be cost effective to redeploy the entire network if, for example, adding a few sensors to some “weak” parts will be sufficient. These considerations have motivated us to consider the following problem.
For border intrusion detection, the manager only concern the illegal intrusion, so it is not necessary to detect both bidirectional intrusion. This factor inspires us to define a new coverage model which is also energy efficient in this application.
Organization. The rest of this article is organized as follows. Section ‘Related work’ mentions some related work, and Section ‘Problem statement: energy efficiency and quality of the wireless sensor network’ defines the relationship between energy efficiency and coverage quality. Sections ‘Measuring the quality of the barrier coverage’ constitute the theoretical foundations of measuring quality of barrier coverage and repairing weak zones. A new coverage model, which is called one-direction barrier coverage, for some intrusion detection applications is introduced in Section ‘Intrusion detection’. Section ‘Conclusion’ concludes the work.
Border patrol has extensively been based on human involvement. Unmanned Aerial Vehicles (UAVs) for aerial surveillance have recently been used to automatically detect and track illegal border crossing [4–6].
In 2008, a “virtual fence” was built near Nogales and Arizona by Department of Homeland Security, which covered 28 miles stretch of the U.S.-Mexico border. But the project had to be delayed for at least three years due to some technical problems .
The wireless sensor network for surveillance in specific area is proposed in [8, 9]. After that, more and more researchers focus on putting the wireless sensor network into practice. Some paper discussed the problem in full coverage network mode [10–12]. The concept of barrier coverage was first introduced by Gage in the context of robot systems . An interesting algorithm to determine whether a network provides barrier coverage is provided in Kumar et al. . Some researchers interested in maximizing the lifetime of network. A centralized wakeup/sleep scheme for reaching the full coverage condition is proposed in . Ai designed a localized wakeup/sleep scheme to supplement the problem of activating sensors and it achieved a good performance .
Beside the coverage quality, a algorithm was introduced in  for measuring the quality of sensors’ k-connectivity. They added some moving robots in weak zone to keep the network with low redundancy. The new metric was proposed in  for coverage quality and it shared with a similar flavor to measure quality and repaired the zones that are not reach desire level.
Quality of surveillance (QoSv) in sensor networks has been addressed in the literature. The QoSv can be defined as the minimal and maximal exposure path within the covered field . The centralized and distributed algorithms are presented in Meguerdichian et al. , Megerian et al.  and Veltri et al. . Gui and Mohapatra defined the QoSv as the reciprocal value of the expected travel distance before mobile targets are first detected by any sensor, and presented the algorithm of calculating it if the nodes are independently and uniformly distributed . Jeong et al. defined the QoSv as the reciprocal value of the average detection time of mobile targets, and proposed an optimal scheduling algorithm that guarantees the required QoSv and at the same time minimizes the overall energy consumed by the sensor nodes . In some sense, all of these different metrics for QoSv can be considered the measure of quality of full coverage. However, they are not suitable as the measure of quality of barrier coverage in border patrol.
Meanwhile, Target tracking has long been an active topic in sensor network research [24–28]. Some researchers focus on single-target tracking while others are interested in multiple-target tracking. Many researchers believe that simple sensor models, such as the binary sensor model, are more realistic in sensor networks [29, 30]. Kalman filtering is often used for the classical tracking with Gaussian models for sensor readings. Recently, the use of Particle filters has become popular to handle more general observation models. Target tracking research addresses on how to track the whole trajectories of targets. Therefore, full coverage is normally necessary for target tracking.
Our research is based on the above results, we measure the barrier coverage for border detection and classify the different level of coverage quality. We also propose the method to improve the coverage quality and the network stability. Furthermore, we concentrate on identifying the direction of targets by using much less sensors.
The mainconstraint that makes WSNs different from traditional networks is the battery problem . It should be carefully taken into consideration in any algorithm or approach related to sensor network operations. This situation causes researchers to deal with network lifetime improvement in different aspects of networking.
Some researchers discuss the feasibility of deploying the wireless sensor network in some rough topography area. In fact, it is not necessary to cover the entire border. The terrain can be helpful in reducing cost since some areas will be inaccessible for human and hence sensor nodes need not be spread in these areas.
Another concern while considering the use of sensor nodes is how the nodes will be deployed. If sensors are air dropped then the number of sensors required will be much higher. This issue can be addressed by placing the sensors using a helicopter. In the terrain which is accessible, the nodes can be placed manually by traveling short distances in a helicopter (if roads are nonexistent). If the terrain is difficult to access, then air dropping is an option or more advanced techniques like using laser guns to shoot and place the sensors in the ground may also be used.
When the wireless sensor network is deployed in a region for monitoring, sensors may fail due to various reasons such as heat, damp or other extreme weather conditions. A common method to solve such problem of failures is to deploy more redundant sensors in the region. Once the sensors’ energy is completely exhausted, they will replace the failure sensors to construct a new barrier in the region. But after a period of time, the network will be more unstable. With the coverage area decreasing, the properties of coverage quality will fail below a desired level. Thus, more weak zones will be appear in the monitoring region. So we need to detect the properties of coverage quality at any time and have a scheme to repair the weak zone. This mechanism has Lower costs than redeploy the entire network. And it is good at obtaining the status of the whole network. In this paper we mainly considered above situations under barrier coverage. We are interested in measuring the quality of barrier coverage and proposing a suitable model for border intrusion detection.
2.Barrier: A barrier is a sensor group which starts from the left boundary to the right. There might have more than one barriers in a belt region.
We then introduce some quality notations as follow
Local barrier coverage quality
Notations for some metrics of the energy efficient barrier coverage
Sensing range of sensor i i=1 …n
The working time of sensor i i=1 …n
A o i j
Overlap area between sensor i and
Initial energy reserve of sensor i ,
D i j
Distance between sensor i and j
e S , e T , e R
Energy required for sensing,
transmitting,receiving one unit data
The belt-like sometimes are not really belt regions. As shown in Figure 6, the belt-like region is not a belt because there is no crossing line segment that is contained in the belt and contains the tip a (as well as any point near a). In fact, if the boundaries of a belt-like region are smooth without “barbs” or “hooks”, then the region is most likely to be a belt region. In applications, such barbs or hooks (as illustrated in Figure 6) should be avoided when planning on a belt region.
6.Proportional Segment: Let C1 and C2 be a belt-like region B’s top and bottom boundaries, respectively. For any points p1 ∈ C1 and p2 ∈ C2 such that g/G = g/G, the line segment is said to be a proportional segment for B.
7.Coordinated Segment and Its Coordinate, V l : Let C1 and C2 be a belt B’s top and bottom boundaries, respectively. Let S be the set of line segments mentioned in Definition 5. For any l = ∈ S, where p1 ∈ C1 and p2 ∈ C2, the coordinate of l is defined to be V l = (g + g)/2. (The notation g p was defined in the paragraph preceding Definition 6.) Each element in S is said to be a coordinated (line) segment relative to S. Coordinates relative to a set S are well defined in the preceding definition in the sense that different elements in S have different coordinates, as proved next.
8.Leftmost/Rightmost Coordinated Segment: Let S a be sensor node a’s sensing region. Define S a ’s leftmost coordinated segment, denoted by ll(a), to be the coordinated line segment that intersects Sa and has the smallest coordinate (V value) among all coordinated segments intersecting Sa. Sa’s rightmost coordinated segment is defined similarly and is denoted by rl(a).
9.Crossing Path. The crossing path is a path of an intruder, who pass through the belt region in the vertical direction.
10.Zone. A zone, Z i , is a slice of the belt region. Two of its edges coincide with the belt’s two horizonal boundaries, and the other two edges are coordinated segments l1 and l2. The length of a zone Z i , denoted by S Z , is defined as (which can be readily shown to equal the average length of the two horizonal boundaries of the zone).
The fundamental problem for guaranteeing the coverage quality is measuring it with a effectively function. Once the coverage quality condition could be quantified, we then have the method to identify all weak zones which indicate the lower quality condition area in the belt region. Finally we propose a scheme to repair them.
This section proposes a metric for measuring the quality of k-barrier coverage, shows how to measure it using that metric, and identifies all weak zones, if any, that need to be repaired.
12.Quality of k-barrier coverage Q k : The coverage quality of a deployed belt region, denoted by Q k , is related with the covered ratio, especially the covered ratio in horizontal direction. So Q k =1 which is equal to the full coverage situation. Q k = -1 iff the belt region contains an orthogonal break path that is not k-barrier covered. When Q k ≥0, the deployment provides the k-barrier coverage and the bigger value of Q k , the more redundancy sensors are in the belt. When Q k ≤0, the smaller value of Q k , the more break paths are existing in the belt.
We classify three different levels of the coverage quality, Q k =-1, Q k =0 or Q k =1. When Q k =-1, it means that there are orthogonal break paths in the belt region. When Q k =0, it means that the deployed sensors could provide one barrier coverage in the belt region. When Q k =1, it means that the belt region are whole covered, which denoted as full coverage in some literatures. We also define two status of the coverage quality. -1 <Q k ≤0 and 0 <Qk≤1. When Q k is between the -1 and 0, we should do some research on how to sliding the barriers to change the break paths in a rolling time to prevent the risk of an intruder following a fix one. When Q k is between the 0 and 1, a good sleep-wake up scheme should be proposed to prolong the lifetime of the whole network.We discuss these cases separately.
Q k =-1: In this situation, there are still many orthogonal break paths in the belt region, as shown in Figure 8. Since break paths are agglomerative in a certain area and the number of them is infinite. So we could not compute the number of break paths directly, then we use a new concept, overlap sensing boundary zone, in Figure 8, to solve the problem.
13. [Overlap Sensing Boundary Zone, Z n i ] Let B be a pair of one single sensors’ left and right sensing orthogonal boundaries. Let (l0, l1, …, l n ) be all the lines in B as ordered from left to right. We define Z as a overlap sensing boundary zone (1 ≤ i ≤n).
1. -1=Q k iff all overlap sensing boundary zones could not cover the whole horizontal direction in the belt region.
From the definition 13 we could know that a overlap sensing boundary zone could provide at least 1-covered. If an area in the belt region are not in the the overlap sensing boundary zone, then there are no sensors in this area, which means this area are 0-covered. In practical, if li is the right sensing boundaries of Z n i , while l j is the left sensing boundaries of Z n j (i <j). If the location of Z n i is to the left of Z n j , then the horizontal direction in the belt region are not wholly covered by overlap sensing boundary zone (-1=Q k ). Accordingly, if the location of Z n i is to the right of Z n j , then there are no orthogonal break path in the belt region (-1 <Q k ). □
-1 <Q k ≤0: All the orthogonal crossing line in the belt region are k-barrier covered, but there are still some curvilinear break paths in the belt region, for example in Figure 9. Overlap sensing boundary zones could cover the belt region in horizontal direction but there are still interstice among the sensors.
Qk = 0: There are at least one barrier could cover the whole belt from left to right boundary. The SASCB algorithm is still suitable for this situation. Sensor selecting is the same as it when -1 <Qk≤0, while the principle of activating scheme is to active the barrier which cover the whole belt region in horizontal direction as long as possible.
0 <Qk≤1: In this situation, the deployed sensors could construct several barriers and all of them could provide 1- covered. So guaranteeing the coverage quality is not the primary task here. It is important to design a wakeup/sleep scheme to prolong the lifetime of the network.
Qk=1: The belt region is all covered when Qk=1. This deployment could provide high coverage quality and track the intruders’ movement with strong robustness.
Based on these consideration, we propose a new coverage, called one-direction barrier coverage, which has a great efficiency on directional detection. As shown in Figure 11, the deployed sensor network in this rectangular belt can easily provide 1-barrier coverage. However, it cannot provide one-direction barrier coverage since the network cannot differentiate the illegal intruders from the legal ones. Therefore, the theory, protocols and algorithms that work with barrier coverage may not work with one-direction barrier coverage, and we have to study new measurement, design new protocols and algorithms for one-direction barrier coverage.
The key problem is how to let a sensor network know an intruder’s direction if this intruder is an illegal intruder and how to let the network NOT identify a legal intruder’s direction as an illegal intruder’s direction. This problem is nontrivial since normally a sensor (e.g., binary sensor) individually cannot know an intruder’s movement direction when this intruder is in its sensing region. So, it requires sensors coordinate together to solve this problem.
Before our work, Ma and Liu analyzed the probability of full area coverage in a directional sensor network where each sensor is fixed to one direction . In , Ai and Abouzeid proposed centralized and distributed algorithms to find a minimal set of sensors that can cover the maximal number of targets in a sensor network, where a sensor is allowed to work in several directions. In , Cai et al. addressed to find a group of non-disjoint cover sets in each of which the sensors cover all the targets so as to maximize the network lifetime. These papers are not very related to our topics. Plarre and Kumar studied the problem of how to track objects using scattering directional sensors in a sensor network .
Target tracking has long been an active topic in sensor network research. Some researchers (e.g.,[36, 37]) focus on single-target tracking while others (e.g., [38, 39]) are interested in multiple-target tracking. Many researchers believe that simple sensor models, such as the binary sensor model, are more realistic in sensor networks. Kalman filtering is often used for the classical tracking with Gaussian models for sensor readings. Recently, the use of Particle filters has become popular to handle more general observation models (e.g. [40, 41]). Target tracking research addresses on how to track the whole trajectories of targets. Therefore, full coverage is normally necessary for target tracking. However, we are interested in the problem of how to identify the directions of targets by using much less sensors. This paper is the first research on measuring the coverage quality and the efficiency of one-direction barrier coverage.
Let the two neighboring barriers be b1 and b2, with b1 on the top. Use b1’s top boundary l as the alarm line. The network has two states: “Intruder In” and “Intruder Out”. The network is in the Intruder In state if at least one sensor is sensing the intruder; otherwise, it is in the Intruder Out state. When the network changes its state from Intruder Out to Intruder In, the network checks which barrier the intruder is entering. Note that the intruder cannot enter the two barriers simultaneously since there is no intersection between b1’s and b2’s boundaries. If the sensors that sense the intruder are in b1, then the intruder is crossing the alarm line from top to bottom and we let the network report an alarm. Otherwise, the network does not report any alarm. So, the network can provide one-way barrier coverage.
Suppose there is more than one intruder. Binary sensors can provide one-way barrier coverage if the intruders’ movements satisfy some constraints. Assume that two neighboring barriers are deployed and the top boundary l of the top barrier b1 is selected as the alarm line. When an intruder enters the sensing region of a sensor u in b1, this intruder is either from the outside of the two barriers or from u’s neighboring sensor’s sensing region. If it is from the outside of the two barriers, it must cross l to enter the sensing region of u, which means it is illegal. Therefore, the network can judge whether this intruder is legal or not by checking whether this intruder is from u’s neighboring sensor’s sensing region or not. So, if other intruders are not too close to the illegal intruder such that there are no intruders in the sensing regions of u’s neighboring sensors, u can correctly judge the illegal intruder.
The temporal series is very interesting and important in one direction barrier coverage. We can say that if an illegal intruder could enter the belt after a legal one and leave before a legal one, then he will not reveal his track. This is a very interesting event, cause the relationship of legal and illegal triggering series is a subtle issue.
Cooperative intrusion detection
If the sensors are deployed according to the strategies described before. The detection rate of intrusion can be controlled at a high level. However, it is difficult to distinguish between intrusions and nuisance warnings caused by environment elements. In conventional wireless sensor networks, the false alarm rate can be lowered by the joint-detection of multiple adjacent sensors. Specifically, since the belt region in front of the border is k-barrier covered by the sensors according to the deployment strategy, an intruder may be detected by multiple sensors as the intruder passes through the belt region.
Meanwhile, not only the binary sensors but also camera sensors and mobile sensors are needed for intrusion detection.To minimize the uncovered time, a joint analysis of the coordination between adjacent camera sensors are required to determine the initial phase of the camera directions and camera rotating velocity.
Therefore, the camera sensor and mobile sensor could be activated by binary sensor which are deployed in the belt region. The coordination among them should also be analyzed.
In this paper, we introduce the border intrusion detection. An energy efficient manner for border patrol to reduce the intensive human involvement and to improve the detection accuracy. In order to guarantee the detection accuracy, we mainly discuss the coverage quality and the method to enhance the quality of the detection. We proposed a method to identify all weak zones that need to be repaired. Once these zones are repaired, the network’s quality of barrier coverage will be restored to the desired level.
Target tracking is another important property of border intrusion detection. It is still a problem to illustrate which kind of coverage model is the most efficient one. We presented an one-directional coverage model for border intrusion detection. Specifically, we discussed both one intruder scene and multiple intruder scene. Furthermore we also proposed the possibility of heterogeneous sensors cooperative for intrusion detection. Energy efficiency is not only reflected in the barrier construction algorithm, but also the network coverage model. The experimental results shows that the proposed algorithm could be extend the lifetime of the wireless sensor network.
The one future research direction is to add some mobile sensors and consider their integrated movement strategy. Another future research direction is to realize the detection in reality, which will consider the network performance in 3D environment. The objective is not only to guarantee coverage quality but also to improve network lifetime, data report timeliness and reliability at the same time.
This work is supported by the Aeronautical Science Foundation of China (2011ZD53046), (2013ZC53034) and the Aerospace. Support Fund of China (2012-HT-XGD).
- Saipulla A, Westphal C, Liu B, Wang J: Barrier coverage of line-based deployed wireless sensor networks. INFOCOM IEEE 2009, 127-135.Google Scholar
- Wang Y, Cao G: Barrier coverage in camera sensor networks. In Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing. ACM; 2011:12-12.Google Scholar
- Yang T, Fan PG, Mu DJ: Maximizing the lifetime of sliding wireless sensors in barrier coverage. Appl. Mech. Mater 2012, 157: 503-506.View ArticleGoogle Scholar
- Girard AR, Howell AS, Hedrick JK: Border patrol and surveillance missions using multiple unmanned air vehicles. In Proc. IEEE CDC’04. Atlantis, Paradise Island, Bahamas; December 2004.Google Scholar
- Haddal CC, Gertler J: Homeland security: unmanned aerial vehicles and border surveillance. CRS Report for Congress; July 2008.Google Scholar
- Marino A, Parker LE, Antonelli G, Caccavale F: Behavioral control for multi-robot perimeter patrol: a finite state automata approach. Proc. ICRA’09 May 2009.Google Scholar
- Virtual Fence Along Border To Be Delayed 2008.http://www.washingtonpost.com/wp-dyn/content/article/2008/02/27/AR2008022703747.html
- Viani F, Salucci M, Rocca P, Oliveri G, Massa A: A multi-sensor wsn backbone for museum monitoring and surveillance. In Antennas and Propagation (EUCAP), 2012 6th European Conference on. IEEE; 2012:51-52.View ArticleGoogle Scholar
- Lei CU, Seon JK, Shen Z, LokMan K, Hughes D, Kim Y: Building a laboratory surveillance system via a wireless sensor network. In Grid and Pervasive Computing. Berlin Heidelberg: Springer; 2013:707-714.View ArticleGoogle Scholar
- Megerian S, Koushanfar F, Potkonjak M, Srivastava M: Worst and best-case coverage in sensor networks. IEEE Trans. Mobile Comput 2005., 4(1):Google Scholar
- Bai X, Xuan D, Yun Z, Lai TH, Jia W: Complete Optimal Deployment Patterns for Full-Coverage and K-Connectivity (k6) Wireless Sensor Networks. ACM MobiHoc; 2008.Google Scholar
- Bai X, Zhang Ch, Xuan D, Jia W: Full-Coverage and k-Connectivity (k = 14,6) Three dimensional networks. In Proc. of INFOCOM’09. IEEE; 2009.Google Scholar
- Gage DW: Command control for many-robot systems. Proceedings of the 19th Annual AUVS’92 Technical Symposium 1992.Google Scholar
- Kumar S, Lai TH, Arora A: Barrier coverage with wireless sensors. Proceedings of the Annual ACM International Conference on Mobile Computing and Networking (Mobi- Com’05) 2005.Google Scholar
- Kumar S, Lai TH, Posner ME, Sinha P: Optimal sleep wakeup algorithms for barriers of wireless sensors. Proceedings of the IEEE BROADNETS’07 Conference 2007.Google Scholar
- Chen A, Kumar S: TH Lai Designing localized algorithms for barrier coverage. Proc. of ACM Mobicom’07 2007.Google Scholar
- Atay N, Bayazit B: Mobile wireless sensor network connectivity repair with K-redundancy. Technical report, Washington University in St. LouisGoogle Scholar
- Chen Ai, Lai TH, Xuan D: Measuring and guaranteeing quality of barrier-coverage in wireless sensor networks. Proc. of MobiHoc’08 2008.Google Scholar
- Meguerdichian S, Koushanfar F, Potkonjak M, Srivastava MB: Coverage problems in wireless ad-hoc sensor networks. Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (InfoCom’01) 2001.Google Scholar
- Megerian S, Koushanfar F, Qu G, Potkonjak M: Exposure in wireless sensor networks. Proceedings of the Annual ACM International Conference on Mobile Computing and Networking (MobiCom’01) 2001.Google Scholar
- Veltri G, Huang Q, Qu G, Potkonjak M: Minimal and maximal exposure path algorithms for wireless embedded sensor networks. Proceedings of the ACMSIGOPS International Conference on Embedded Networked Sensor Systems (SenSys’03) 2003.Google Scholar
- Gui C, Mohapatra P: Power conservation and quality of surveillance in target tracking sensor networks. Proceedings of the ACM Annual International Symposium on Mobile Computing and Networking (MobiCom’04) 2004, 129-143.Google Scholar
- Jeong J, Sharafkandi S, Du DH: Energy-aware scheduling with quality of surveillance guarantee in wireless sensor networks. Proceedings of the ACM Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks (DIWANS’06) 2006.Google Scholar
- Taylor C, Rahimi A, Bachrach J, Shrobe H, Grue A: Simultaneous localization, calibration, and tracking in an ad hoc sensor network. Proc. of IPSN’06 2006.Google Scholar
- Shrivastava N, Mudumbai R, Madhow U, Suri S: Target tracking with binary proximity sensors: fundamental limits, minimal descriptions, and algorithms. Proc. of SenSys’06 2006.Google Scholar
- Pahalawatta PV, Depalov D, Pappas TN, Katsaggelos AK: Detection, classification, and collaborative tracking of multiple targets using video sensors. Proc. of IPSN’03 2003.Google Scholar
- Ercan AO, Gamal AE, Guibas LJ: Object tracking in the presence of occlusions via a camera network. Proc. of IPSN’07 2007.Google Scholar
- Singh J, Madhow U, Kumar R, Suri S, Cagley R: Tracking multipletargets using binary proximity sensors. Proc. of IEEE IPSN’07 2007.Google Scholar
- Aslam J, Butler Z, Constantin F, Crespi V, Cybenko G, Rus D: Tracking a moving object with a binary sensor network. Proc. of SenSys 2003.Google Scholar
- Kim W, Mechitov K, Choi J-Y, Ham S: On target tracking with binary proximity sensors. Proc. of IPSN’05 2005.Google Scholar
- Tanenbaum AS, Gamage C, Crispo B: Taking sensor networks from the lab to the jungle. IEEE Comput 2006., 39(8): IEEE Computer SocietyGoogle Scholar
- Ma H, Liu Y: On coverage problems of directional sensor networks. Proc. of MSN 2005.Google Scholar
- Ai J, Abouzeid AA: Coverage by directional sensors in randomly deployed wireless sensor networks. J. Combin. Optim 2006, 11(1):21-41. 10.1007/s10878-006-5975-xMathSciNetView ArticleMATHGoogle Scholar
- Cai Y, Lou W, Li M, Li X-Y: Target-oriented scheduling in directional sensor networks. Proc. of IEEE Infocom’07 2007.Google Scholar
- Plarre K, Kumar PR: Object tracking by scattered directional sensors. Proc. of IEEE CDC-ECC’05 2005.Google Scholar
- Mechitov K, Sundresh S, Kwon Y, Agha G: Cooperative tracking with binary-detection sensor networks. Tech. Rep. UIUCDCSR- 2003–2379, University of Illinois at Urbana-Champaign, Sept. 2003Google Scholar
- Shrivastava N, Mudumbai R, Madhow U, Suri S: Target tracking with binary proximity sensors: fundamental limits, minimal descriptions, and algorithms. Proc. ACM SenSys 2006.Google Scholar
- Jing T, Hichem S, Cedric R: Binary variational filtering for target tracking in sensor networks. Proc. 14th IEEE/SP Workshop on Statistical Signal Processing 2007, 685-689.Google Scholar
- Kim W, Mechitov K, Choi J-Y, Ham S: On target tracking with binary proximity sensors. Proc. IPSN 2005.Google Scholar
- Ercan AO, Gamal AE, Guibas LJ: Object tracking in the presence of occlusions via a camera network. Proc. of IPSN’07 2007.Google Scholar
- Singh J, Madhow U, Kumar R, Suri S, Cagley R: Tracking multiple targets using binary proximity sensors. Proc. of IEEE IPSN’07 2007.Google Scholar
This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.