Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Design and Analysis of Protecting Strategies

against Border Crossing under Irregular Conditions

Imen Arfaoui Noureddine Boudriga Khalifa Trimeche


Communication Networks and Communication Networks and Faculty of Science of Tunis
Security Research lab, CNAS Security Research lab, CNAS University Tunis El Manar
University of Carthage University of Carthage Tunisia
Tunisia Tunisia Email:
Email: arf.imen@gmail.com Email: khalifa.trimeche@gmail.com
noure.boudriga2@gmail.com

Abstract—The use of wireless sensor networks (WSNs) based behaviors of intrusions which greatly impact the network
surveillance applications to detect intruders requires accurate behaviors. In the sense that sensor nodes will spend a
methods for monitoring, tracking the trajectories of intruders, significant amount of their energy if there are many intruders
and energy consumption of sensors. In this paper, we propose a crossing the area and if the intruders choose different strategies
model to formally define the monitoring WSN lifetime based on to cross the area. Thus, the irregular intrusions arrivals will
the intruder’s behavior. We address the problem of designing and accelerate the failure rate of the sensors preventing them to
analyzing of the crossing strategies of the border crossings with a perform their monitoring tasks. Furthermore, in realistic
priori knowledge of their arrival rate using WSN. We focus on situations, the sensors are often be deployed in harsh
two crossing strategies; namely, the orthogonal and progressive
environments with complex architecture making the recharge or
crossing strategy. Given a monitored area considered as the union
of multi-thick lines architecture, we propose a deployment scheme
replace of sensors batteries infeasible or undesirable. So, one of
of sensors to ensure good detection for both strategies and present the main design challenges in this work is maintaining the
a method to compute and compare their network lifetime upon. network lifetime as long as possible with the constraint of
Some numerical simulation results are collected to analyze the irregular behaviors of intrusions.
related performance. In this paper, we present methods to compute and compare
the network lifetime regarding different crossing paths. The
Keywords—Wireless Sensor Networks; Country border
objective of this work is to formally design and analyze
surveillance; network lifetime.
protecting strategies of border crossings based on WSN
I. INTRODUCTION surveillance systems. It consists in defining first the crossing
paths an intruder can follow. This description is written using
Wireless Sensor Networks (WSNs) are widely used in an appropriate formal definition.
environmental monitoring, disaster relief, health care,
surveillance and so on. A WSN consists of several spatially The rest of this paper is organized as follows. Section 2 lists
distributed autonomous devices. The main task of this network some related work. Section 3 introduces the network model and
is to achieve the goal of monitoring. Among these application, formulates the problem statement. A design of two protecting
one can mention the border surveillance applications which strategies is presented in Section 4. An application of the
consists at detecting or preventing any intruder trying to cross crossing strategies that analyzes and computes the monitored
the area of interest and reach the destination. area lifetime is depicted in Section 5. The performance of the
proposed methods are evaluated in Section 6. Finally, we
Intrusions detection performance using WSN is a critical concludes the paper in the last section.
task regarding the deployment, the energy and lifetime
constraints it faces. For this purpose, two major objectives have II. RELATED WORK
to be achieved. The first aims at providing a deployment
scheme capable of offering a maximum network lifetime. The
second aims at detecting any border crossings by analyzing In the literature, many recent works have addressed border
their crossing strategies and compare the lifetime. In fact, the surveillance applications using WSNs. Detecting border
arrival rate of intruders trying to cross the area is different in crossings presents a critical issue in the design of WSN. In fact,
time and space. Furthermore, the intruders crossing the area to sensors should be deployed in a good manner to monitor in real
monitor behave differently following different trajectories with time the area and should be able to preserve a network lifetime
different speeds. Such issues can be defined as irregular as long as possible. We discuss then in this section the related
work of the deployment algorithms and the lifetime

978-1-5090-6227-0/16/$31.00 ©2016 IEEE


maximization phenomenon in WSN based surveillance sea, ...), the weather condition, etc. For this purpose, we assume
applications. Several research works have proposed deployment that we have knowledge about the statistics of the intruders
strategies either with deterministic or random methods, [1,2,3]. arrivals rate which try to penetrate to the monitored area.
Authors in [4] provides a deployment method of WSN to detect
intrusions in border using Unmanned Aerial Vehicles. The main objective of this work is to have no intruder crossing
However, all these proposed methods are based only on the the monitored area without being detected, no matter what path
distribution of sensors and do take into account the impact of it would choose. Thus, the behavior of the border crossings to
the crossings entrance and the crossing paths. Furthermore, cross the area, which reflects how, how many and when they
most of the proposed schemes for border surveillance are line-
will cross the area should be considered to allow sensors
based WSN [5]. Although, this architecture presents significant
efficiently detect the intruders. The number of required sensors
results, a more generalized WSN architecture should be
provided. is determined then according to the intruders’ arrival rate and
the strategy they follow to cross the area.
On the other hand, once the sensors have been We propose then a deployment scheme of sensor nodes for
deployed, several studies have proposed various methods to intrusion detection whose trajectory could be predicted. We
increase the network lifetime [6] ranging from replacing failed then estimate the monitored area lifetime (or WSN)
sensors [7], designing protocols for energy consumption and surveillance MLT(N) and determine the minimum number of
scheduling [8]. Thus, the use of a multi-thick lines WSN the required sensors nsi,k in each subarea a(i,k) and then the
architecture and a proper deployment scheme while analyzing total deployed sensors in a path followed by an intruder
the intruders’ arrival and crossing paths with a proper ∑ , .
deployment method would help maximizing the network
lifetime.
III. BORDER CROSSINGS ON MULTI-THICK LINES
SYSTEM
In this section we will present the topology of the area to be
monitored by the deployed sensors and analyze the
characteristics and behaviors of the border crossings. Our aim is
to provide a surveillance of a border area against intruders with
a minimum working sensors while obtaining a network lifetime
as long as possible. For this, we consider a simple model where
the rectangular monitored area will be divided into multi-thick
lines. The length of the area is LA and the width is WA. The
number of thick-lines varies from 1 to m and where each thick-
line area is divided into p subareas containing the deployed
sensors as shown in Figure 1. First, the whole monitored area
is horizontally partitioned into m thick-lines each of width
Figure 1: Monitored multi-thick lines area
greater or equal to the sensor theoretical range. Then, each
thick-line is further vertically partitioned into p subareas. We
assume that in each subarea, there will be one active sensor IV. DESIGN OF PROTECTING STRATEGIES
and that the remaining sensors will be in sleep state where a
scheduling approach is handled to reduce energy consumption. In this section, we look at two different crossing strategies an
Since in each subarea there will be one deployed sensor intruder can follow. We assume in the following, for the sake
assumed to be in the center of the subarea, the range of the of simplicity, that the monitored area does not include any
sensor will be an information to partition the monitored area. obstacle. As mentioned above, an intruder can cross the
For this we suggest that the length of each subarea will be monitored area according to different crossing paths. However,
greater than or equal to the sensor theoretical range. modeling all possible crossing paths is too pessimistic since
On the other hand, intruders will cross the border from any there exists an infinite number of paths in the monitored area
place from lower (starting) to upper (exit) border according to an intruder can adapt. The use of all the paths will add then a
different crossing paths. The arrival of the intruders is variable complexity to the detection process of sensors and hence to the
from one position to another and from one time to another. For computation of the lifetime.
this, one can model the arrival rate of intruders in each subarea The objective is to define a crossing strategy which can be
a(i,k) (i varies from 1 to p subareas and k varies from 1 to m adopted by an intruder that reduces the number of paths. In our
thick-lines) until the time t by a non-homogeneous Poisson design, we consider two crossing strategies: the orthogonal
process with an intensity function αi,k(t). On the other hand, the crossing strategy and the progressive crossing strategy. These
intruder arrival pattern may be specified by the user since the strategies are defined follows.
information needed to determine the average number of
intruders can be determined using statistical data depending on Definition. An intruder using the orthogonal crossing strategy
the geographical place, the vegetation (open field, mountain, follows a path that crosses only the subareas a(i,j), for a fixed i
and j varying from 1 to k. The intruder using a progressive We provide then a novel definition of the network lifetime.
crossing strategy follows a path verifying the condition (c): if MLT(Np) is defined as the first time where all the subareas on
the path crosses a(i,j) then immediately it crosses one of the paths followed by an intruder became in failure
a(i,j+1),a(i+1,j), or a(i,j-1) state. The failure of a subarea is resulted from the depletion of
energy of the sensors deployed in that subarea.
The orthogonal crossing strategy is usually utilized in flat
Let π = {π 1, π 2, π 3,..., πn} be the set of all the crossing
areas and it corresponds to the shortest distance to cross the
border. The second strategy is typically followed by an paths an intruder can follow when crossing the monitored area.
intruder when the area contains obstacles. While the first Let
strategy is easy to model, the second can be modeled by E = {e(t, π1, N p1 ), e(t, π 2, N p 2 ), e(t, π 3, N p3 ),...,e(t, πn, N pn )}
assigning to each sub area a(i,j) a 3-tuple (p1,p2,p3) where
p1(resp. p2and p3) is the probability that an intruder in a(i,j) be the set of the remaining energy until the time t of the
will go to a(i+1,j) (resp. a(i,j+1) and a(i,j-1)). subareas belonging to a path πi ; i=1..n followed by an
Figure 2 gives an example of the path followed by the intruder when crossing the monitored area and containing Npi
intruders according to the orthogonal and progressive uniform sensors. MLT(Np) is expressed then by the following:
crossing strategy.
MLT ( N p ) = min{t > 0 / e(t , πi, N pi ) = 0 ; i = 1..n}

Once MLT(Np) is determined, one can compute the minimum


number of deployed sensors Npi in a path πi followed by an
n
intruder and hence in all the monitored area N =  N .
pi
i =1
On the other hand, having defined MLT(Np) in general case,
one can formally define and compute it according to both
crossing strategies. So, we provide the major mathematical
expressions of the energy consumed by sensors and determine
their depletion regarding the path followed by an intruder for
each crossing strategy.
Thus, the following two purposes should be conducted.
First, we determine the number of intruders Ii,k(t) in each
Figure 2: Orthogonal and Progressive crossing strategies. subarea i,k at any time t knowing that the average rate of
intruders arrival in the first thick-line is αi,1(t) until time t.
One can notice, however, that in this paper we only consider Second, we calculate the remaining energy Ei,k(t,nsi,k) of nsi,k
two crossing strategies, as illustrated above and that to provide sensors in each subarea i,k taking into consideration the
more quantitative analysis, further study can include others number of intruders Ii,k(t) crossing the subarea i,k and the
crossing strategies such as the random strategy which can be input energy level E0i,k of the deployed sensors in the subarea
easily added to our proposed model. i,k. It should be noted that the focus of this work is not on the
manner the energy will be consumed but on the consumed
energy value to detect an intruder we would need to determine
V. LIFETIME COMPUTATION the network lifetime.
To accomplish this task, several assumptions have been
The objective of this work is to maximize the network lifetime made. We assume, for the sake of simplicity, that the crossing
while deploying a minimum number of sensors. Thus, based is uniform and that the time an intruder will spend to cross a
on the two proposed crossing strategies, we aim in this section subarea is the same for all the subareas. We denote this time by
to compute the monitored area lifetime MLT(Np) according to TC. On the other hand, we assume that the intruders will
both strategies and hence deduce the required minimum penetrate to a subarea each duration of s time and that TC is
number of deployed sensors according to both strategies. Np is simply a fixed multiple of the unit time duration s. We assume
the vector containing the minimum number of deployed also that the average rate of intruders arrivals αi,1(t) is greater
sensors in each path corresponding to a crossing strategy. or equal to 3.
We begin by considering a monitored area devoid of
A. Lifetime Computation According to the Orthogonal
obstacles and thus having every subarea accessible for
Crossing Strategy
crossing. In fact, several WSN lifetime definitions can be
found in the literature. However, the main issue we are Let us now model the monitored area lifetime
interested in this work is how to formally model MLT(Np) MLTOS(Np,OS) according to the orthogonal crossing strategy.
based on the remaining energy of sensors for given paths The number of paths n in this strategy is obviously the number
followed by the intruders according to different crossing of subareas p in the thick line. A path πi presents the column i
strategies. composed of the set of subareas from subarea i,1 to subarea i,k
for each k varying from 1 to m. One can determine then the
remaining energy e(t , πi, N pi ) for each path πi until the time t. intruders crossing may occur. First, intruders crossing either
MLTOS(Np,os) can be expressed by the following relation: the first or the last subarea of thick line. In that case, 1 − P of
2
MLT OS ( N p ,os ) = min {t / e(t , πi, N pi ) = 0, i ≤ p} (2) the intruders will go directly to the upper subarea and P will
2
go to either the right or left upper subarea respectively.
where e(t , πi , N pi ) = 0 corresponds to Eri,k(t,nsi,k)=0 for all k=1 Second, intruders crossing any subarea i(i varies from 2 to p-
m
1). In that case, they will be uniformly divided into the left and
to m and N pi =  ns i , k . right paths according to probability P . The remaining
k =1 2
intruders will be in the upper path according to the probability
To calculate e(t , πi, N pi ) we should determine then the
1− P .
number of intruder Ii,k(t) in each subarea i,k belonging to the A path πi in that case corresponds to a combination of
path πi .To this end, we calculate first the number of intruders
subareas. One can deduce then the number of paths n
Ii,1(t) in the subarea i,1 crossing the first thick-line. according to the following strategy which is equal to
  t α i ,1 ( s ) 0 ≤ t ≤ TC n = ( p − 2) 3 + 4 . MLTPS(Np,ps) can be obtained by the
I i ,1 ( t ) =  ts =1 (3) following relation:
  s = t − TC +1 α i ,1 ( s ) t > TC
MLT PS ( N p , ps ) = min {t / e(t , πi, N pi ) = 0 i = 1..n} (8)
The intruder will start crossing the upper subarea i,2 only
after leaving the under subarea i,1 after TC. The number of To calculate the remaining energy for each path πi
intruders in each subarea i,2 corresponding to the second thick- followed by an intruder, we consider, for the sake of
line is given then by the following: simplicity, a monitored area reduced to two thick-lines. The
number of intruders Ii,1(t) in the first thick-line crossing the
 0 if 0 ≤ t ≤ TC subarea i,1 to the upper subareas is the same as equation (3).
 t Then the number of intruders Ii,2(t) in the subarea i,2 for each i
I i ,2 (t ) = s =TC+1α i,1 (s − TC) TC < t ≤ 2TC (4) in 2 to p-1will be equal to:

 s =t −TC+1α i,1 (s − TC) t > 2TC
t


 0 if 0 ≤ t ≤TC
 t P P
Ii,2 (t) =  s =TC+1
In the same way, the number of intruders in a subarea i,k is  ((1 − P)αi,1(s − TC) + αi −1,1(s − TC) + αi +1,1(s − TC))
2 2 (9)
given by:
 if TC < t ≤ 2TC
 t
 0 if t ≤(k −1)TC 
P P
((1 − P)αi,1((s − TC) + αi −1,1(s − TC) + αi +1,1(s − TC))
 t  s=t −TC+1 2 2
Ii,k (t) = s=TCαi,1 (s − TC) (k −1)TC < t ≤ kTC (5) if t > 2TC

 s=t −TC+1αi,1 (s − TC) t > kTC
t

Knowing the number of intruders in each subarea i,k


Therefore, knowing the number of intruders Ii,k(t) in each (k=1,2) until time t, one can deduce then the remaining energy
subarea i,k belonging to a path πi at any time t, one can Eri,k(t,nsi,k) given by Eq (7).
determine in a first step the consumed energy Eci,k(t) in the C. Lifetime Computation in an area with obstacles and with
subarea i,k which is given by the following: different subareas crossing times
Ec (t ) = I (t ).TC .e (6) Several assumptions have been made in the previous sections
i ,k i ,k I
to make the lifetime computation easy to understand.
where eI is the consumed energy by a sensor to detect a Assumptions have mainly included the obstacle free area and
crossing intruder. And then deduce in the second step the the same crossing time for each subarea. In the following, we
remaining energy Eri,k(t,nsi,k) in each subarea i,k taking into address the issue of lifetime computation under two
consideration the input energy level of each subarea i,k: hypotheses: monitored area with obstacles due to the irregular
area geography and various crossing times.
Eri ,k (t , ns i ,k ) = E 0 i ,k − Ec i ,k (t ) (7) In fact, obstacles such as grass, shrubs, big stone, big tree,
mountain, etc, exist in the outdoor environment. These
B. Lifetime Computation According to the Progressive obstacles significantly impact the crossing path of an intruder.
Crossing Strategy In that case, we distinguish two types of subareas, namely;
blocking subarea containing blocking obstacle preventing the
We model now the monitored area lifetime MLTPS(Np,ps)
intruder to follow its normal path and crossing subarea
according to the progressive uniform strategy. Two cases of
allowing the intruder to cross the area. For this, the two
crossing strategies should be adapted to take into account the A. Simulation Model
area geography. At first, we assume that the first thick-line
The characteristics of the simulation model are listed in the
does not contain any blocking subarea and that two adjacent
following. With no loss of generality, we only consider a
subareas are either crossing subareas or only one of them is
monitored area of 1000m x 100m reduced to 3 thick-lines.
blocking.
Each thick line is composed of 50 subareas. We consider two
For the orthogonal crossing strategy, if the intruder
cases of area, namely; with and without obstacles. Sensors will
encounters an upper blocking subarea, it will move to the right
be deployed in each subarea in order to track any crossing. The
upper subarea. On the other hand, for the progressive uniform
remaining energy in each subarea corresponds to the total
strategy, if the upper subarea is blocking, the intruder which
remaining energy of the deployed sensors in that subarea. We
will move to upper subarea will move to the left or right upper
will consider in the simulations the average rate of intruders’
subarea. Figure 3shows the new path followed by an intruder
arrival ARI varying in the interval [1,20] in each subarea since
in each crossing strategy.
the intruders arrive non-uniformly in each subarea and the
In addition, since the subareas have different nature and
average crossing time ACT of the subareas when the area
different importance with respect to the area geography, one
geography is variable. ACT is ranging from easy to hard
can define different crossing time TCi,k for each subarea
accessible subarea. The simulation time spans 10 TC. Each
referring to the difficulty of the area geography, the subarea
experiment is repeated many times.
size and the intruder average speed. Thus, it is easy to deduce
that if this time is small, sensors deployed in this subarea will B. Simulation Result
spend less energy to track an intruder.
1) Effect of the intruders arrival on the network lifetime in an
obstacle free area: In this simulation, we fixed the value of TC
to 5 and we consider an average rate of the intruders arrival in
each subarea in the interval [1, 20] and we vary the standard
deviation of the intruders arrival in time between 2 and 10 in
order to determine the monitored area lifetime with both
crossing strategies; the orthogonal and the progressive crossing
strategies as shown in Figure 4.
As expected, when the intruders’ standard deviation increases,
the monitored area lifetime decreases from10 to 3 for both
crossing strategies. One can notice also that the orthogonal
strategy performs better.

Figure 3: Orthogonal and Progressive crossing strategies of border crossings


in an area with obstacles

Having the new paths in each crossing strategy and the


crossing time of each subarea due to the presence of some
blocking subareas, the result achieved in the previous
subsections will be reformulated in terms of lifetime
computation.
To the best of our knowledge, that is the first effort to give a
general and formal analysis of the crossing strategies of Figure 4: Variation of the monitored area lifetime in relation to the standard
intruders trying to cross an area. Our proposed model is the deviation of average rate of intruders’ arrival
first one that uses the concept of irregular crossings to extend
the network lifetime. We state that there is no paper integrating
the obstacle based on these facts, one should mention that our 2) Effect of the crossing time on the network lifetime: In this
model could not be compared with similar works. simulation, we varied the average crossing time in the interval
[1,10] whereas we fixed the average rate of intruders arrival to
15 and we computed the monitored area lifetime shown in
VI. PERFORMANCE EVALUATION Figure 5.
It can be seen from Figure 5 that when the crossing time
In this section, we present the results of the simulations that we
become high, the lifetime decreases. This is because the more
have conducted.
intruder spent time in crossing a subarea, the more energy is
consumed by sensors to track that intruder for both crossing be crossed by more intruders leading to more consumed
strategies. energy.

Figure 5: Variation of the monitored area lifetime in relation to the average


crossing time Figure 7: Comparison of average number of deployed sensors in a subarea
with a lifetime greater than a duration D
3) Lifetime Computation in an area with obstacles: Figure 6
compares the monitored area lifetime in an area with and CONCLUSION
without obstacles. It can be observed that the lifetime
decreases as the intruders’ standard deviation increases for In this paper we formally modeled the crossing strategies of
both crossing strategies with and without obstacles. In border intruders in order to maximize the network lifetime of a
addition, in a case of an area with obstacles, the lifetime is multi-thick lines area. Mathematical expressions were used to
reduced as the intruders trying to cross the blocking subarea compute the lifetime. The results of the simulation show that
will be divided into others subareas leading to more consumed the irregular arrival rate of intruders and the different crossing
energy in those subareas. strategies can have a serious impact on the network lifetime
and the number of required sensors.

REFERENCES
[1] M. Brazil, C.J. Ras, and D.A. Thomas, “Deterministic deployment
of wireless sensor networks,” In World Congress on Engineering,
volume 1, 2009.
[2] D.S. Deif and Y. Gadallah, “Classification of wireless sensor
networks deployment techniques,” IEEE Comm. Surveys &
Tutorials, 16(2):834–855, 2013.
[3] Y. Kim, M. Yeo, D. Kim, and K. Chung, “A node deployment
strategy considering environmental factors and the number of
nodes in surveillance and reconnaissance sensor networks,”
International Journal of Distributed Sensor Networks, 2012, 11
pages.
[4] M. Alkhathami, L. Alazzawi and A. Elkateeb, “Border
Surveillance And Intrusion Detection Using Wireless Sensor
Networks,” International Journal of Advances in Engineering &
Technology, April 2015.
Figure 6: Comparison of the monitored area lifetime in an area with and
without obstacles
[5] G. Yang, D. Qiao, “Barrier Information Coverage with Wireless
Sensors,” INFOCOM 2009.
4) Number of deployed sensors in obstacle free area: In this [6] J. Saraswat, N.Rathi, and P. P. Bhattacharya, “Techniques to
simulation, we aim to determine the average number of enhance lifetime of wireless sensor networks: A survey,” Global
deployed sensors in a subarea for a given duration D of Journal of Computer Science and Technology Network, Web &
lifetime with both crossing strategies. It can be seen from Security, 12(14), 2012.
[7] A. Boudries, M. Aliouat, and P. Siarry, “Detection and
Figure 7 that the average number of required sensors increases replacement of a failing node in the wireless sensors networks,”
when the duration D increases. This is because, the more the Computers & Electrical Engineering, 40(2):421–432, 2014.
network is operational the more sensors are needed to track the [8] K. B. Amir, I. J. Tani, S. Sarwar, and K. M. A. Salam, “A
intruders. In addition, one can see that the progressive strategy scheduling method for multiple target coverage to prolong
requires more sensors to be deployed since some subareas will lifetime of wireless sensor networks,” In International Conference
on Advances in Electrical Engineering, ICAEE, Dhaka, 2013.

You might also like