Professional Documents
Culture Documents
2016 !! Design and Analysis of Protecting Strategies
2016 !! Design and Analysis of Protecting Strategies
Abstract—The use of wireless sensor networks (WSNs) based behaviors of intrusions which greatly impact the network
surveillance applications to detect intruders requires accurate behaviors. In the sense that sensor nodes will spend a
methods for monitoring, tracking the trajectories of intruders, significant amount of their energy if there are many intruders
and energy consumption of sensors. In this paper, we propose a crossing the area and if the intruders choose different strategies
model to formally define the monitoring WSN lifetime based on to cross the area. Thus, the irregular intrusions arrivals will
the intruder’s behavior. We address the problem of designing and accelerate the failure rate of the sensors preventing them to
analyzing of the crossing strategies of the border crossings with a perform their monitoring tasks. Furthermore, in realistic
priori knowledge of their arrival rate using WSN. We focus on situations, the sensors are often be deployed in harsh
two crossing strategies; namely, the orthogonal and progressive
environments with complex architecture making the recharge or
crossing strategy. Given a monitored area considered as the union
of multi-thick lines architecture, we propose a deployment scheme
replace of sensors batteries infeasible or undesirable. So, one of
of sensors to ensure good detection for both strategies and present the main design challenges in this work is maintaining the
a method to compute and compare their network lifetime upon. network lifetime as long as possible with the constraint of
Some numerical simulation results are collected to analyze the irregular behaviors of intrusions.
related performance. In this paper, we present methods to compute and compare
the network lifetime regarding different crossing paths. The
Keywords—Wireless Sensor Networks; Country border
objective of this work is to formally design and analyze
surveillance; network lifetime.
protecting strategies of border crossings based on WSN
I. INTRODUCTION surveillance systems. It consists in defining first the crossing
paths an intruder can follow. This description is written using
Wireless Sensor Networks (WSNs) are widely used in an appropriate formal definition.
environmental monitoring, disaster relief, health care,
surveillance and so on. A WSN consists of several spatially The rest of this paper is organized as follows. Section 2 lists
distributed autonomous devices. The main task of this network some related work. Section 3 introduces the network model and
is to achieve the goal of monitoring. Among these application, formulates the problem statement. A design of two protecting
one can mention the border surveillance applications which strategies is presented in Section 4. An application of the
consists at detecting or preventing any intruder trying to cross crossing strategies that analyzes and computes the monitored
the area of interest and reach the destination. area lifetime is depicted in Section 5. The performance of the
proposed methods are evaluated in Section 6. Finally, we
Intrusions detection performance using WSN is a critical concludes the paper in the last section.
task regarding the deployment, the energy and lifetime
constraints it faces. For this purpose, two major objectives have II. RELATED WORK
to be achieved. The first aims at providing a deployment
scheme capable of offering a maximum network lifetime. The
second aims at detecting any border crossings by analyzing In the literature, many recent works have addressed border
their crossing strategies and compare the lifetime. In fact, the surveillance applications using WSNs. Detecting border
arrival rate of intruders trying to cross the area is different in crossings presents a critical issue in the design of WSN. In fact,
time and space. Furthermore, the intruders crossing the area to sensors should be deployed in a good manner to monitor in real
monitor behave differently following different trajectories with time the area and should be able to preserve a network lifetime
different speeds. Such issues can be defined as irregular as long as possible. We discuss then in this section the related
work of the deployment algorithms and the lifetime
0 if 0 ≤ t ≤TC
t P P
Ii,2 (t) = s =TC+1
In the same way, the number of intruders in a subarea i,k is ((1 − P)αi,1(s − TC) + αi −1,1(s − TC) + αi +1,1(s − TC))
2 2 (9)
given by:
if TC < t ≤ 2TC
t
0 if t ≤(k −1)TC
P P
((1 − P)αi,1((s − TC) + αi −1,1(s − TC) + αi +1,1(s − TC))
t s=t −TC+1 2 2
Ii,k (t) = s=TCαi,1 (s − TC) (k −1)TC < t ≤ kTC (5) if t > 2TC
s=t −TC+1αi,1 (s − TC) t > kTC
t
REFERENCES
[1] M. Brazil, C.J. Ras, and D.A. Thomas, “Deterministic deployment
of wireless sensor networks,” In World Congress on Engineering,
volume 1, 2009.
[2] D.S. Deif and Y. Gadallah, “Classification of wireless sensor
networks deployment techniques,” IEEE Comm. Surveys &
Tutorials, 16(2):834–855, 2013.
[3] Y. Kim, M. Yeo, D. Kim, and K. Chung, “A node deployment
strategy considering environmental factors and the number of
nodes in surveillance and reconnaissance sensor networks,”
International Journal of Distributed Sensor Networks, 2012, 11
pages.
[4] M. Alkhathami, L. Alazzawi and A. Elkateeb, “Border
Surveillance And Intrusion Detection Using Wireless Sensor
Networks,” International Journal of Advances in Engineering &
Technology, April 2015.
Figure 6: Comparison of the monitored area lifetime in an area with and
without obstacles
[5] G. Yang, D. Qiao, “Barrier Information Coverage with Wireless
Sensors,” INFOCOM 2009.
4) Number of deployed sensors in obstacle free area: In this [6] J. Saraswat, N.Rathi, and P. P. Bhattacharya, “Techniques to
simulation, we aim to determine the average number of enhance lifetime of wireless sensor networks: A survey,” Global
deployed sensors in a subarea for a given duration D of Journal of Computer Science and Technology Network, Web &
lifetime with both crossing strategies. It can be seen from Security, 12(14), 2012.
[7] A. Boudries, M. Aliouat, and P. Siarry, “Detection and
Figure 7 that the average number of required sensors increases replacement of a failing node in the wireless sensors networks,”
when the duration D increases. This is because, the more the Computers & Electrical Engineering, 40(2):421–432, 2014.
network is operational the more sensors are needed to track the [8] K. B. Amir, I. J. Tani, S. Sarwar, and K. M. A. Salam, “A
intruders. In addition, one can see that the progressive strategy scheduling method for multiple target coverage to prolong
requires more sensors to be deployed since some subareas will lifetime of wireless sensor networks,” In International Conference
on Advances in Electrical Engineering, ICAEE, Dhaka, 2013.