Next Article in Journal
Flow Control in Wells Turbines for Harnessing Maximum Wave Power
Previous Article in Journal
A Real-Time Wireless Sweat Rate Measurement System for Physical Activity Monitoring
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Achieving Crossed Strong Barrier Coverage in Wireless Sensor Network

1
School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, China
2
School of Electronic and Electrical Engineering, University of Leeds, Leeds LS2 9DX, UK
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(2), 534; https://doi.org/10.3390/s18020534
Submission received: 24 January 2018 / Revised: 4 February 2018 / Accepted: 5 February 2018 / Published: 10 February 2018
(This article belongs to the Section Sensor Networks)

Abstract

:
Barrier coverage has been widely used to detect intrusions in wireless sensor networks (WSNs). It can fulfill the monitoring task while extending the lifetime of the network. Though barrier coverage in WSNs has been intensively studied in recent years, previous research failed to consider the problem of intrusion in transversal directions. If an intruder knows the deployment configuration of sensor nodes, then there is a high probability that it may traverse the whole target region from particular directions, without being detected. In this paper, we introduce the concept of crossed barrier coverage that can overcome this defect. We prove that the problem of finding the maximum number of crossed barriers is NP-hard and integer linear programming (ILP) is used to formulate the optimization problem. The branch-and-bound algorithm is adopted to determine the maximum number of crossed barriers. In addition, we also propose a multi-round shortest path algorithm (MSPA) to solve the optimization problem, which works heuristically to guarantee efficiency while maintaining near-optimal solutions. Several conventional algorithms for finding the maximum number of disjoint strong barriers are also modified to solve the crossed barrier problem and for the purpose of comparison. Extensive simulation studies demonstrate the effectiveness of MSPA.

1. Introduction

Wireless sensor networks (WSNs), which have the outstanding advantages of easy configuration, flexibility in shrinking or expanding, strong fault-tolerance, and mobility, have played an important role in monitoring and analyzing dynamic, hostile, unfamiliar, and unexplored environments. In some monitoring and early warning applications, such as border protection, battlefield surveillance, and animal migration observation, the primary objective is to detect the intruders who penetrate the target regions with sensor nodes. In WSNs, a series of sensor nodes, whose sensing regions overlap, form a sensor barrier for intruders and can guarantee the detection of penetrating behavior in particular directions. Thus, designing strategies for forming sensor barriers has great importance and is often referred to as the barrier coverage problem [1,2,3,4].
In contrast to the full coverage presented in [5,6], which requires detecting intruders at every point in their trajectory, barrier coverage only ensures that the intrusion behavior is detected. The main concerns of the two coverage problems in coverage intensity and the movement of monitoring targets are different. Thus, with a lower number of sensor nodes, barrier coverage still achieves a satisfactory level of intruder detection.
Basically, barrier coverage can be classified into weak barrier coverage and strong barrier coverage [1]. In weak barrier coverage, the horizontal projections of sensing regions overlap, only guaranteeing to detect movements along vertical traversing paths, as illustrated by the dash lines in Figure 1a. Meanwhile, as shown in the same figure, if an intruder knows where the sensor nodes are, it may adopt a polygonal path, indicated by the solid line, without being detected. In contrast, strong barrier coverage, which provides continuous coverage, ensures that every intrusion is detected since any crossing path needs to traverse a barrier. As shown in Figure 1b, despite following a polygonal path, the intruder can be detected by the strong barrier on the top.
Additionally, based on the characteristics of barriers, barrier coverage can be classified in other ways: local barrier coverage and global barrier coverage, 1-barriers and k-barriers, coverage with mobile sensors and coverage with stationary sensors, etc. As illustrated by Figure 1c, if a sensor with mobility (indicated by the dark circle) is used and assigned to move to the position indicated by the dash lines, it would form a 2-barrier coverage in the hybrid WSN, which employs both mobile and stationary sensors. Moreover, with the rapid development of directional sensor networks (DSNs), barrier coverage with directional sensing models (shown in Figure 1d) has attracted a great deal of interest.
Unfortunately, although strong barrier coverage can detect intruders who traverse the target region vertically, a security vulnerability exists since a WSN cannot handle the traverse intrusion. For the application of observing animal migration or battlefields, it is also of great importance to detect traversing targets since it helps us to grasp the motion law of intruders and develop strategies to enhance the security level of a system.
When using previous research results to design and configure a sensor barrier, people are incapable of detecting intrusion behavior in both horizontal and vertical directions. Thus, we need to find a series of sensor nodes, whose sensing regions overlap and can form two continuous paths that link the boundaries of the horizontal and vertical directions. In this paper, that series of sensor nodes is referred to as a crossed strong barrier (crossed barrier for short). In brief, crossed barrier coverage can increase the possibility of detecting intrusion and thus improve system security.
Thus, we introduce the concept of crossed barrier coverage, which consists in the detection of both horizontal and vertical intrusions, to tackle the challenges mentioned above. Crossed barrier coverage applies to more complex situations where the conventional barrier cannot satisfy the security requirements of a system. Moreover, as argued in [1,7], scheduling sensor nodes to work in barriers leads to both savings in node numbers and extensions in network lifetime. The savings are achieved since redundant sensor nodes can go into sleep mode or be removed. Thus, we attempt to determine the maximum number of crossed barriers in order to extend the lifetime of a WSN. Note that maximizing the number of crossed barrier is not merely the superposition of finding and adding up the maximum barrier in individual directions. We demonstrate it through analysis and simulations in the following sections. The main contributions of our work are described as follows:
  • To the best of our knowledge, we are the first to introduce and study crossed barrier coverage in WSNs. We also show that the problem of finding the maximum number of crossed strong barriers is NP-hard.
  • We provide an integer linear programming (ILP) formulation to better describe the optimization problem of finding the maximum number of crossed barriers, and we use the branch-and-bound algorithm to obtain the optimal solution, which will serve as a benchmark for other algorithms.
  • We propose a heuristic algorithm called a multi-round shortest path algorithm (MSPA) to find the maximum number of crossed barriers. The MSPA can achieve near-optimal solutions in polynomial time.
  • We modified the algorithms used in the conventional barrier coverage problem to make them suitable for the new problem and conducted extensive simulations to evaluate their performance.
The remainder of this paper is organized as follows. We provide a brief discussion about related literature and work in Section 2. Section 3 introduces the system model and the problem statement. In Section 4, we present the ILP formulation for the optimization problem and solve it using the branch-and-bound algorithm. In Section 5, we present our MSPA method and several modified algorithms. Simulation work and numerical results are presented in Section 6, and we conclude the paper in Section 7.

2. Related Work

The concept of barrier coverage was originally proposed in the context of robotics sensors [8] and first introduced into WSNs in [1]. Since then, active research has been carried out in this area in the following aspects. Note that we summarized these research works not only to provide the preliminary knowledge about barrier coverage, but also to indicate further research directions for the crossed barrier coverage problem.
Sensing model: In conventional studies of the barrier coverage problem [9,10,11,12,13,14], the Boolean disc sensing model [15], which is expressed by an omni-directional circle, is widely used. In this model, a target inside or outside the sensing range of a sensor node is detected by the sensor with probability one or zero. Although it is simple for analysis, the model cannot fully characterize the sensor measurements, which are usually affected by noise and vary with the distance between the sensor and the target. Thus, the work in [16,17,18] assumed the probabilistic sensing model. Moreover, state-of-the-art research work considers more practical issues such as the utilization of the three-dimensional (3D) sensing model in camera sensor networks [19] and the joint probability model in the compound event barrier coverage problem [20]. However, we adopt the Boolean disc sensing model in our research since we are the first to study the crossed barrier coverage problem.
Deployment method: There are two main approaches to barrier coverage in WSN: random deployment and deterministic deployment [21]. The former involves scheduling randomly distributed sensor nodes in a WSN to build sensor barriers, while the latter aims at globally optimizing the locations of sensors to minimize the total number of sensors, while ensuring the performance of barrier coverage. For deterministic deployment, based on the geometric shape, the curve-based deployment and line-based deployment are respectively presented in [21,22,23,24]. We analyzed the scenario with random deployment since it is more common for large-scale WSNs.
Coverage intensity: Coverage intensity is measured by the barrier number, the continuity of barriers, and the probability of detecting a target. Based on the coverage intensity that a WSN provides, barrier coverage is categorized in the following ways: strong barrier coverage and weak barrier coverage, 1-barriers and k-barriers, and worst- and best-case coverage and exposure path coverage [15]. Here, strong barrier coverage is studied, and barrier number is adopted as the measurement of coverage intensity.
Sensor mobility: Deploying mobile sensors in a WSN can be extremely valuable in hostile environments and has recently attracted great interest. Barrier coverage with the consideration of sensor mobility [25,26,27,28,29] aims at efficiently improving barrier coverage under the constraints of the available mobile sensors and their moving range. For example, in [28,29], the authors tried to efficiently form barrier coverage by leveraging mobile sensors to fill in the gaps between pre-deployed stationary sensors, while ensuring that the number or the total moving cost of mobile sensors is at a minimum. Nonetheless, sensor mobility is not considered in this paper since we aim at solving the barrier coverage problem by making the most of stationary sensors.
Network lifetime: The initial aim of introducing barrier coverage was to maintain a certain intruder-detecting capacity and extend the lifetime of the whole WSN. In [7], a wakeup schedule for individual nodes was proposed to maximize network lifetime, utilizing the redundancy of sensors. In [30], the authors focus on the effect of the lifetime of sensor nodes and prove that the heterogeneity of sensor lifetime affects the barrier number. Thus, to achieve more efficient barrier coverage in practice, lifetime issues should be considered in future research.
As mentioned in the previous section, the traversal intrusion is a security vulnerability for strong barrier coverage. Based on the above-mentioned aspects, it can be seen as a coverage intensity problem. Meanwhile, maximizing the number of crossed barriers helps to extend the lifetime of the WSN. The following literature provides a rudimentary knowledge of the work related to ours.
In [1], Kumar et al. demonstrated how to use a centralized method to find disjoint barriers. The core idea is to use the maximum flow algorithm in graph theory, and this algorithm is widely used in research on the strong barrier coverage problem. In [31], the authors present heuristic ways to eliminate strong barriers that have conflicts, but the barrier coverage problem they solved is limited to the horizontal direction.
In [13], which inspires our research most, Liu et al. derived critical conditions for strong barrier coverage and devised an efficient distributed algorithm to construct disjoint barriers. In their algorithm, they constructed vertical barriers in vertical strips to connect the horizontal barriers in the adjacent segments. Vertical barriers help to prevent intruders from moving between segments, resulting in a more robust network. However, the authors did not provide further details on how to choose a single barrier by combining several local horizontal barriers. In [32,33], the authors proposed the concepts of an event-driven partial barrier and a reinforced barrier. These two kinds of barriers can detect movements in various directions, which enhances the monitoring capability of the conventional sensor barrier. The ideas of these barriers resemble ours in that we both intend to strengthen barrier coverage by building complex barriers with more than one pair of start and end points. Nevertheless, in this paper, we utilize and evaluate more methods of selecting appropriate sensor nodes in order to build the maximum number of crossed barriers.
Thus, inheriting the idea of using the barriers in both horizontal and vertical directions to reinforce the robustness of a network, we consider introducing crossed barriers as a substitute for conventional barriers to strengthen the monitoring capability of a single barrier. We will further explain the detailed models and problem formulations in the following sections.

3. Models and Problem Statement

We consider a WSN with n omni-directional sensors S = { s 1 , s 2 , , s n } randomly deployed to monitor a rectangular region B with length L x and width L y .
As shown in Figure 2, we represent a senor node with a sector denoted by a quadruple s i = P i , R , a , V i , where P i is the coordinate of the sensor in a two-dimensional monitoring plane; R is the maximum sensing radius and a is the sensing offset angle; V i is a unit vector, representing the sensing orientation of the node. The shaded sector shown in Figure 2 represents the field of view (FoV) of a sensor node. In addition, the Boolean sensing model [23] is used. In this model, all the space points within the FoV can be detected with possibility one and can be said to be covered by the sensor. The points outside the FoV have no possibility of being detected and cannot be said to be covered by the sensor.
The conventional omni-directional sensing model is a special case of the quadruple sensing model when a = π and V is an arbitrary unit vector. Note that we adopt this model since it can also be used in applications of DSNs where the directional sensor is modeled; however, in the following analysis and simulations, we continue to use the omni-directional sensing model for simplicity. Thus, we introduce some definitions here to better describe the problem.
Definition 1.
Strong barrier. A strong barrier is a continuous horizontal or vertical path that consists of a series of sensor nodes whose sensing regions overlap with adjacent ones and guarantee detection of intruding paths in both vertical and horizontal directions.
Definition 2.
Crossed barrier. A crossed barrier consists of both a vertical strong barrier and a horizontal one that do not share a common sensor, ensuring detection of any intruding path in both vertical and horizontal directions.
Definition 3.
Directional coverage graph G(V,E). A directional coverage graph of a wireless sensor network S is constructed as follows: G represents the graph made up by the sets of vertexes V and directed edges E. The set V consists of vertexes corresponding to the sensors in the network. In addition, V has four virtual nodes, s 1 , t 1 , s 2 and t 2 , that correspond to the left, right, upper, and lower boundaries, respectively. A directed edge exists between two nodes if their sensing regions overlap in the deployment region B. The direction of the edge is from the node that is closer to s 1 (or s 2 ) to the node closer to t 1 (or t 2 ). An edge exists between a vertex and a particular virtual node if the sensing region of the corresponding sensor overlaps with a boundary of the region.
An illustration of crossed barrier coverage and a directional coverage graph is presented in Figure 3. As shown in Figure 3a, the horizontal strong barrier, which connects the leftmost border s 1 and the rightmost border t 1 of the surveillance region, and the vertical one, which connects s 2 and t 2 , together constitute a crossed barrier. In Figure 3b, a directional coverage graph is given to model the network shown in Figure 3a. The dots represent sensor nodes or boundaries, while the directed edges with arrows show the overlapping relationship between sensor nodes. Since we always build barriers from particular sides of a network for convenience, we choose s 1 and s 2 as the start points of building horizontal and vertical barriers. The direction of an edge indicates the relative order of two connected nodes. The graph in the context of graph theory provides a clear description of network topology.
In the coverage graph of Figure 3b, if we can find two paths that link ( s 1 , t 1 ) and ( s 2 , t 2 ), respectively, and are disjoint with respect to each other, we can easily obtain a crossed barrier in Figure 3a. In fact, [7,14] provide a method for finding node-disjoint paths. However, since there are two pairs of virtual nodes in our problem, the previous method cannot be directly applied.
The main target of our research is to find the maximum number of crossed strong barriers, since scheduling the sensor barriers to work alternately can efficiently prolong network lifetime. Thus, we need to find more pairs of disjoint paths in the corresponding directional coverage graph. The following theorem is presented to analyze the computational complexity.
Theorem 1.
The problem of finding the maximum number of crossed barriers is NP-hard.
Proof of Theorem 1.
By definition, a crossed barrier is made up of two barriers that do not have common sensors and lie in perpendicular directions. From the directional coverage graph, we need to figure out the maximum pairs of disjoint horizontal and vertical paths. Thus, we turn the problem into a flow problem in graph theory to solve it.
We construct a new auxiliary graph to assist the proof. Every vertex v i (except for the four virtual nodes) in the directional graph is divided into two sub-vertexes v i i n and v i o u t . The inward edges go into v i i n and the outward ones come from v i o u t . There are inner edges linking the sub-vertexes with capacity set to one. The capacity of other edges is also set to one. The transformed directional coverage graph is equivalent to the previous one since every vertex should only be used once, as we have mentioned.
Assuming that the maximum number of crossed barriers is R c Z + , then the decision version of the problem can turn into the directed two-commodity integral flow problem in [34] with R 1 = R 2 = R c , where R 1 and R 2 are the flow from s 1 to t 1 and from s 2 to t 2 . Since the equivalent directed two-commodity integral flow problem is NP-complete, then the optimization version of our problem, which is finding the maximum number of crossed barriers, is NP-hard. ☐

4. ILP Formulation & the Branch-and-Bound Method

In this section, we present an integer linear programming formulation whose solution will serve as a benchmark, and we use the branch-and-bound algorithm to solve it.

4.1. ILP Formulation

Based on the directional coverage graph, we develop an ILP formulation for our problem. In the following formulation, f e i h o r and f e i v e r represent the flow on edge e i , where subscripts h o r and v e r indicate that a flow is a part of the horizontal or vertical paths; E v j i n and E v j o u t stand for the sets of inwards and outward edges of vertex v j in V.
max min ( e i E t 1 i n f e i h o r , e i E t 2 i n f e i v e r )
s.t.
e i E v j i n ( f e i h o r + f e i v e r ) = e i E v j o u t ( f e i h o r + f e i v e r ) , v j V { s 1 , t 1 , s 2 , t 2 }
e i E v j i n ( f e i h o r + f e i v e r ) 1 , v j V { s 1 , t 1 , s 2 , t 2 }
( f e i h o r + f e i v e r ) 1 , e i E
f e i h o r , f e i v e r = { 0 , 1 } .
To be specific, Equation (1) concerns finding the maximum number of crossed barriers. Since a crossed barrier constitutes barriers in two directions, the optimization target is maximizing the minimum value of the barrier numbers in horizontal and vertical directions, rather than maximizing the barrier number in a single direction. Equation (2) is a flow conservation equation, which arises from the fact that the flows on the inward edges of a vertex (except for s 1 , s 2 , t 1 and t 2 ) increases equally with those on the outward edges. Furthermore, with the requirement of getting disjoint paths in the directional coverage graph, Equation (3) guarantees that the maximum time a sensor node can be used are always bounded by one. Finally, Equations (4) and (5) ensures that the maximum time an edge can be used are less than one.
However, it seems that Equation (1) is not in the standard form of ILP, which means we cannot use general methods to analyze and solve it. Thus, some further work is done here to transform object function into a standard one. We introduce an integer f c Z + , which satisfies the following inequations:
f c e i E t 1 i n f e i h o r
f c e i E t 2 i n f e i v e r .
Then, Equation (1) can be replaced by the following function:
max f c .
Here, f c can be seen as the minimum value of the flows in two directions. Therefore, Equation (1) is replaced by Equation (8) with two extra conditions, Equations (6) and (7), added to guarantee that f c is not bigger than the flow value in any direction.

4.2. The Branch-and-Bound Method

Since finding the maximum number of crossed barriers is NP-hard, there is no algorithm that can obtain the optimal solutions in polynomial time. We have the ILP formulation for the problem, so a simple idea is to use brute-force enumeration, which involves systematically enumerating all possible solutions and checks whether each candidate satisfies the problem’s statement. However, the exponential growth of effort required to examine all possible candidates is unacceptable for a WSN with many nodes. Thus, we consider solving it using the branch-and-bound algorithm [35,36], which uses selective enumeration rather than complete enumeration.
For the branch-and-bound algorithm, there are two essential components: branching and bounding. Branching is the operation that divides a problem into two or more subproblems such that the solution of the original problem can be achieved from the solutions of the subproblems. For the above ILP, a simple branching operation is to pick a variable ( f e i v e r or f e i h o r ) and to replace the current problem with two subproblems. Thus, both subproblems will be copies of the current problem, where the variable ( f e i v e r or f e i h o r ) is set to 0 in one copy and set to 1 in the other. Since the variable ( f e i v e r or f e i h o r ) has to take either 0 or 1 in an optimal solution, the branching scheme guarantees that an optimal solution of the original problem will be an optimal solution of one of the two subproblems.
Bounding is a function that returns a bound on the optimal solution of the current subproblem. For the maximization problem, the returned value will be a number larger or equal to an optimal solution. For our problem, a simple choice is to remove the integrality constraints on the variables by replacing them with lower and upper bounds on the variables, and to transform the subproblem to a linear programming (LP) problem. This operation is called the LP relaxation of the subproblem, which is quite easy to solve. Since the feasible solutions of the ILP subproblem are all feasible for the LP problem, the optimal solution of the former will always be worse or equal to the optimal solution of the latter. Moreover, an additional use of the bound gained is that it is possible to discard subproblems that have a bound value worse than the value of the best currently known solution of the original problem.
Although the worst-case complexity of the branch-and-bound algorithm is still an exponential time algorithm, it can speed up the calculation for average cases.

5. Proposed Algorithms

In this section, we present a multi-round shortest path algorithm (MSPA), which works heuristically to guarantee efficiency while maintaining good solutions. Heuristic methods are widely used to solve different coverage problems, e.g., barrier coverage in [31] and target coverage in [37], to improve calculation efficiency. In addition, for the purpose of comparison, some conventional algorithms of finding maximum strong barriers are also modified here to adjust to the new problem.

5.1. The Multi-Round Shortest Path Algorithm (MSPA)

As mentioned before, the horizontal strong barrier should be vertex-disjoint or sensor-disjoint with a vertical one to constitute a crossed barrier. Thus, we propose choosing the sub-barrier alternately and removing nodes on a sub-barrier from the directional coverage graph G ( V , E ) once the sub-barrier is chosen. The pseudo code of MSPA is presented in Algorithm 1.
In the pseudo code, Dijkstra( G , v e r t e x 1 , v e r t e x 2 ) represents the function to calculate the shortest path from v e r t e x 1 to v e r t e x 2 in G using Dijkstra’s algorithm [38], and Remove( G , v e r t e x _ s e t ) is a function which removes the vertexes and edges related to the vertexes in v e r t e x _ s e t . Since the function Remove() is executed after a single-direction path is found, it ensures that all sub-barriers are node-disjoint with each other.
Dijkstra’s algorithm can find the shortest paths between nodes in a graph. In our algorithm, the length of a path is counted by the hop counts of sensor nodes on it. Since a path with the least hop counts may avoid using extra sensor nodes, we choose the horizontal and vertical barriers using the metric of hop counts.
The computational complexity of Dijkstra’s algorithm is O ( | V | * l o g ( | V | ) + | E | ) , where | V | and | E | are the number of vertexes and edges, respectively. Since | V | = n and | E | = n 2 at most, the worst-case time complexity of the MSPA is O ( n 2 ) , which is significantly lower than that of the branch-and-bound algorithm.
Algorithm 1: The Multi-Round Shortest Path Algorithm
Input: The directional coverage graph G of a WSN;
Output:
The maximum number of crossed barriers N m a x ;
The set of nodes on the i t h crossed barrier Q i ;
1 i 0 ; N m a x 0 ; Q h o r ; Q v e r ;
2while True do
3if there exist a path from s 1 to t 1 on G ( V , E ) then
4   Q h o r Dijkstra(G, s 1 , t 1 );
5   G Remove(G, Q h o r );
6else
7  break;
8end
9if there exist a path from s 2 to t 2 on G ( V , E ) then
10   Q v e r Dijkstra(G, s 2 , t 2 );
11   G Remove(G, Q v e r );
12else
13  break;
14end
15 N m a x N m a x + 1 ;
16 i i + 1 ; Q i Q h o r Q v e r ;
17end

5.2. Max-Flow-Least-Conflicts Algorithm and Max-Flow-Least-Counts Algorithm

The maximum flow algorithm such as the Edmonds–Karp algorithm [39] can calculate the maximum flow of a network in polynomial time, and it is chosen in many literatures to figure out the maximum node–disjoint barriers. Taking advantage of the maximum flow algorithm, we present the max-flow-least-conflicts algorithm and the max-flow-least-counts algorithm in this section.
As an auxiliary graph is constructed when proofing Theorem 1, we can obtain the maximum numbers of disjoint strong barriers on horizontal and vertical directions individually by using the maximum flow algorithms to the auxiliary graph. Moreover, the horizontal (or vertical) strong barriers are node-disjoint with each other since the capacities for all the inner edges in the auxiliary graph are set to 1, which restricts the maximum time that sensor nodes can be used.
For the max-flow-least-conflicts algorithm, we present a step-by-step heuristic method to combine the horizontal and vertical barriers to make crossed barriers. The pseudo code is presented in Algorithm 2.
In each step, a horizontal (or vertical) path, which conflicts with the fewest number of the other paths in the vertical (or horizontal) direction, is selected, and the conflicting paths and the path selected are removed from the auxiliary graph. In Lines 6 and 17 of the pseudo-code, M is a matrix showing the conflicting relations between horizontal flows and vertical flows. The columns represent the horizontal flows, while the rows represent the vertical flows. An element in the matrix M is set to 1 when the corresponding flows in the two directions have common nodes. By searching the matrix, we can quickly determine whether a path conflicts with others. The path selection procedure is executed alternately between horizontal and vertical directions, and a pair of these operations leads to a crossed barrier.
Algorithm 2: The Max-Flow-Least-Conflicts Algorithm
Input: The directional coverage graph G of a WSN;
Output:
The maximum number of crossed strong barriers N m a x ;
The set of nodes on the i t h crossed strong barrier Q i ;
1 Construct an auxiliary graph G of G;
2 Calculate the sets of horizontal flows F h o r through Maxflow( G s 1 t 1 ), and the sets of vertical flows F v e r through Maxflow( G s 2 t 2 );
3 i 0 ; N m a x 0 ; Q h o r ; Q v e r ;
4while True do
5if F h o r then
6  Calculate the conflicting matrix M, and pick a flow f i h o r in F h o r with least conflicts in M;
7   Q h o r f i h o r ; F c o n the flows that conflict with f i h o r ;
8  if F c o n then
9   Remove f i h o r from F h o r ;
10  else
11   Remove f i h o r from F h o r and F c o n from F v e r ;
12  end
13else
14  break;
15end
16if F v e r then
17  Update the conflicting matrix M, and pick a flow f i v e r in F v e r with least conflicts;
18   N m a x N m a x + 1 ; i i + 1 ; Q v e r f i v e r ; Q i Q h o r Q v e r ;
19   F c o n the flows that conflict with f i v e r ;
20  if F c o n then
21   Remove f i v e r from F v e r ;
22  else
23   Remove f i v e r from F v e r and F c o n from F h o r ;
24  end
25else
26  break;
27end
28end
The basic idea of the max-flow-least-counts algorithm is similar to that of the max-flow-least-conflicts algorithm. However, the path selection procedure is different. In Lines 6 and 17, the max-flow-least-counts algorithm will choose the flows with the least hop counts. The pseudo-code for the this algorithm is omitted to save space.
For a network with n sensor nodes, there are 2 n + 4 nodes in their auxiliary graph. The computational complexity of using the Edmonds-Karp algorithm is O ( | V | × | E | 2 ) , where | V | and | E | are the number of vertexes and edges, respectively. Thus, the worst-case computational complexity of getting the maximum flows by using the Edmonds-Karp algorithm is O ( n 3 ) . For the operation in calculating the conflicting matrix, the worst-case complexity is O ( ( 2 n + 4 ) × ( ( 2 n + 4 ) - 1 ) / 2 ) = O ( n 2 ) . Thus, the worst-case computational complexities for both the max-flow-least-conflicts algorithm and the max-flow-least-counts algorithm are O ( n 3 ) -slightly higher than that of the MSPA.
Overall, the idea of choosing the flows with the least conflicts or counts is similar to the work in [31]. However, we have modified their rules of choosing vertex-disjoint paths with a single source–sink pair so that the new ones can fit in with the crossed barrier problem, where paths from two path groups that have different sources and sinks need to be chosen.
Algorithm 3: The Max-Flow-Maximum-Independent-Set Algorithm
Input: The directional coverage graph G of a WSN;
Output:
The maximum number of crossed strong barriers N m a x ;
The set of crossed strong barrier Q;
1Construct an auxiliary graph G of G;
2 Calculate the sets of horizontal flows F h o r through Maxflow( G s 1 t 1 ), and the sets of vertical flows F v e r through Maxflow( G s 2 t 2 );
3 Calculate the conflicting matrix M for F h o r and F v e r ;
4 Combine the non-conflict barriers in F h o r and F v e r to obtain the set of potential crossed barriers F p o n ;
5 Construct an auxiliary graph G for F p o n ;
6Q ← MaxISalgorithm( G );
7 N m a x | Q | ;

5.3. The Max-Flow-Maximum-Independent-Set Algorithm

In the two algorithms above (Algorithms 2 and 3), barriers from the sets of horizontal and vertical barriers are chosen to build a crossed barrier on the basis of the number of conflicts or hop counts. In this section, we consider selecting proper sub-barriers by introducing the concept of a maximum independent set.
In graph theory, an independent set (IS) is a set of vertexes in a graph where no two vertexes are adjacent. To be specific, it is a set S v of vertexes such that, for every two vertexes in S v , there is no edge connecting them. A maximal independent set (MIS) is an independent set that is not a subset of any other independent set. In other words, there is no vertex outside the independent set that may be added, since it is maximal with respect to the independent set property. A maximum independent set (MaxIS) is a MIS with maximum cardinality in a graph.
Since we can obtain the maximum number of node-disjoint barriers in horizontal and vertical directions, we consider combining the non-conflict barriers to make potential crossed barriers and then utilize the algorithms of calculating the MaxIS to obtain a set of crossed barriers that has maximum cardinality and no conflict. We present a simple example in Figure 4 to illustrate how the max-flow-maximum-independent-set algorithm works.
In Figure 4, f 1 and f 2 are the node-disjoint barriers in the horizontal direction, which is calculated by the maximum flow algorithm, while f 3 and f 4 are those in the vertical direction. If f 2 conflicts with f 3 , which means that f 2 has one or more common nodes with f 3 , we can obtain the relations shown in Figure 4a, where the edges in the graph indicate that the barriers they have linked can be combined together to constitute a crossed barrier. Thus, we can obtain three potential crossed barriers: f 13 , f 14 and f 24 . An auxiliary graph as shown in Figure 4b is then constructed in which the vertexes represent potential crossed barriers and the edges indicate that there are conflicts between vertexes. For our example, since f 14 shares the barriers with f 13 and f 24 , by utilizing a heuristic algorithm [40], we can obtain the maximum independent set of the graph, which includes f 13 and f 24 . Consequently, we can obtain the crossed barriers f 13 and f 24 , and the maximum number of crossed barriers is two.
The core purpose of introducing the MaxIS is to model the conflicting relations in real world applications in a virtual graph and then use heuristic algorithms to handle it. In an auxiliary graph, two conflicting barriers can be mapped to two vertexes with an edge linking them. Thus, when using the algorithms for MaxIS, the two vertexes cannot be in an independent set at the same time with respect to the independent set property.
We present the pseudo-code for the max-flow-maximum-independent-set algorithm in Algorithm 3. In Step 6, MaxISalgorithm( G ) is a function to obtain the maximum independent set by using the heuristic algorithm called the vertex support algorithm (VSA) [40]. The time complexity for Steps 1 to 2 is O ( n 3 ) . For Steps 3, 4, and 5, the worst-case time complexity is O ( n 2 ) . Therefore, the time complexity of the max-flow-maximum-independent-set algorithm is O ( n 3 ) . The worst-case computational complexities for it are not as good as that of MSPA but still outperform those of the branch-and-bound algorithm.
Furthermore, the connectivity issue of sensor nodes is already taken into account in all these three algorithms, since, when barriers are built, adjacent nodes need to able to communicate and have overlapped sensing areas with each other.

6. Evaluation

In this section, we evaluate the performance of the proposed algorithms via extensive simulations in terms of the number of crossed barriers. The purpose of the simulations is twofold: to prove the effectiveness of the MSPA in comparison with other algorithms when considering both time complexity and solution accuracy, and to evaluate the effect of important parameters (such as the size of target region, the number of sensor nodes, the sensing radius, and the sensing offset angle) on the crossed barrier number. The following simulation experiments were performed on a laptop computer equipped with an Intel(R) Core(TM) i7-4700MQ processor, an 8-GB memory, and the 64-bit Windows 10 operating system. The simulation codes are based on the Matlab language.
Assume that, for definiteness and without loss of generality, omni-directional sensors are uniformly deployed in a square region with dimensions of 150 × 150 m. A didactic example is included in Scenario 1 to illustrate the algorithms.
In Scenario 1, R = 40 m and n = 120 . As shown in Figure 5, the deployment map shows the locations of sensor nodes in the square region. The areas in dark blue indicate that they are well monitored or covered by sensor nodes and that some sensors may be redundant. In order to achieve crossed barriers in the network, branch-and-bound, MSPA, and other proposed algorithms are executed to compare the maximum number of crossed barriers they can obtain.
First, one of the crossed barriers calculated by the MSPA is illustrated in Figure 5. The sensor nodes on the barrier, represented by the green circles, form two continuous strong barriers linking two pairs of boundaries that can further constitute a crossed barrier. Thus, our MSPA can identify crossed barriers correctly from the network.
Then, we present the crossed barrier numbers calculated by different algorithms. The branch-and-bound algorithm (B&B for short) can obtain 10 crossed barriers, which is optimal among these algorithms. For the MSPA, the max-flow-least-conflicts algorithm (least-conflicts, for short), the max-flow-least-counts algorithm (least-counts for short), and the max-flow-maximum-independent-set algorithm (MaxIS for short), the maximum numbers of crossed barriers are 6, 4, 4, and 5, respectively. Although B&B outperforms MSPA in the number of crossed barriers, the MSPA still achieves a good solution, with the worst-case time complexity being kept at a reasonable level. For a network with a substantial number of sensor nodes, time complexity needs to be taken into consideration. Using heuristic algorithms are important for balancing the precision of solutions and the computation complexity.
In the following scenarios, we mainly conduct simulations to evaluate the effects of node number (n), sensing radius (R), and sensing offset angle (a) on the maximum number of crossed barriers by setting them to different values. All simulations are done in two configurations, where the sizes of the target region are set to 150 × 150 m and 150 × 75 m, respectively, and the results are the statistical average of 100 simulations.
In Scenario 2, R = 20 m and n ranges from 50 to 350, with 50 as the increment. As can be observed in Figure 6, the crossed barrier numbers of all the algorithms increase monotonically and linearly with the increase in node number. This is because deploying more sensor nodes in a fixed-area region leads to a higher density for sensor nodes, which in turn helps to enhance the connectivity of sensor nodes and provides more paths for constructing crossed barriers. Additionally, the number of crossed barriers in Figure 6b is higher than that in Figure 6a with the same node number, which is also related to the density of the sensor nodes, rather than the size of the region.
B&B provides optimal solutions that will serve as benchmarks for other algorithms. The MSPA outperforms other proposed algorithms but achieves a sub-optimal solution. Considering, however, that B&B is an enumeration method while MSPA is a heuristic one, the performance of the MSPA is acceptable. Furthermore, the MSPA has better performance than the other three algorithms in which the maximum flow algorithm is used to calculate the sub-barriers. The MSPA identifies more crossed barriers with lower computational complexity. Thus, the operation of deciding the sub-barriers first may limit the maximum number of crossed barriers. In addition, the independent-set performs better than the least-conflicts and the least-counts, since, after determining the maximum flows, the independent-set provides more combinations of sub-barriers. Least-counts yields the worst results since the hop counts may be too simple to be a good indicator of which path should be chosen.
In Scenario 3, n = 200 and the sensing radius R is changed from 10 to 35 m with 5 m as the increment. Observing Figure 7, we can obtain the similar monotonically increasing trend as that in Scenario 2. However, in Figure 7b, the solutions of the MSPA, the least-conflicts, and the least-counts become closer as sensing radius increases. The reason for this phenomenon is that there are limitations to the solutions of all five algorithms when the sensing radius reaches a relatively high value. Considering an extreme case in which R reaches a value such that all the sensors can cover the whole region, then there is no use of increasing the maximum number of crossed barriers when increasing R. The solutions of all algorithms will approach their limit when R is high enough. Additionally, the MSPA has a better performance than other algorithms.
In Scenario 4, we consider changing the sensing offset angle a to evaluate its effect. Since there are many applications related to utilizing a directional sensing model instead of an omni-directional one, the simulations may attest to the effectiveness of algorithms using different sensing models.
In this scenario, n = 200 , R = 20 m, and a is changed from π to 0 with a decrement of 1 / 6 π . A random unit vector is assigned to each sensor node as the sensing orientation. As shown in Figure 8, all algorithms have a downward trend when decreasing the sensing offset angle. The reason for this is that, with the limitation in the sensing offset angle, the area that a sensor node can cover becomes smaller, which consequently leads to a lower chance for sensor nodes to have an overlapped sensing area and form barriers. We have noted that, in Figure 8a, when a is close to π or 0, the slopes of the curves are relatively gentle. The probability of two sensor nodes to have overlapped sensing regions becomes either too high or too low when a is close to π and 0. Thus, the curves in the figure have different slopes. In Figure 8b, the slope between 1 / 6 π and 0 is still substantial. The reason lies in the fact that a greater density of sensor nodes may slow down convergency. When deploying directional sensors to achieve crossed barriers, we may need to increase the number of sensor nodes to achieve an adequate number of crossed barriers.
Through the simulations above, we evaluated the effect of some important parameters on crossed barrier coverage. We found that all parameters have a direct effect on the coverage intensity of the entire region, which will further affect the maximum number of crossed barriers that can be found.

7. Conclusions

We herein studied the problem of achieving the maximum number of crossed barriers in a wireless sensor network. We first defined a crossed barrier, which can overcome the defect of traversal intrusion, and presented the problem of maximizing the number of crossed barrier. Then, we proved that the problem is NP-hard in computation complexity. We further developed the ILP formulation for the optimization problem and used the branch-and-bound algorithm to obtain an optimal solution. Moreover, we proposed an efficient MSPA algorithm along with some other heuristic algorithms. Through theoretical analysis and simulations, we found that the MSPA outperforms other algorithms in both the worst-case computational complexity and the maximum number of crossed barriers achieved.

Acknowledgments

This work was supported by the Key Projects of National Key Research and Development Program (2016YFC0801800), the Natural Science Foundation of China under Grant (51474015), and the National Science&Technology Pillar Program of China (2013BAK06B03).

Author Contributions

Ruisong Han proposed the idea of this paper and conducted the theoretical analysis and simulation work. Wei Yang and Li Zhang proposed many useful suggestions in the process of theoretical analysis. Ruisong Han wrote the paper, and Li Zhang revised it.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Kumar, S.; Lai, T.H.; Arora, A. Barrier coverage with wireless sensors. In Proceedings of the 11th Annual International Conference on Mobile Computing and Networking, Cologne, Germany, 28 August–2 September 2005; pp. 284–298. [Google Scholar]
  2. Chen, A.; Kumar, S.; Lai, T.H. Local barrier coverage in wireless sensor networks. IEEE Trans. Mobile Comput. 2010, 9, 491–504. [Google Scholar] [CrossRef]
  3. Tao, D.; Wu, T.-Y. A survey on barrier coverage problem in directional sensor networks. IEEE Sensors J. 2015, 15, 876–885. [Google Scholar]
  4. Zhu, C.; Zheng, C.; Shu, L.; Han, G. A survey on coverage and connectivity issues in wireless sensor networks. J. Netw. Comput. Appl. 2012, 35, 619–632. [Google Scholar] [CrossRef]
  5. Huang, C.-F.; Tseng, Y.-C. The coverage problem in a wireless sensor network. Mobile Netw. Appl. 2005, 10, 519–528. [Google Scholar] [CrossRef]
  6. Kumar, S.; Lai, T.H.; Balogh, J. On k-coverage in a mostly sleeping sensor network. In Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, Philadelphia, PA, USA, 26 September–1 October 2004; pp. 144–158. [Google Scholar]
  7. Kumar, S.; Lai, T.H.; Posner, M.E.; Sinha, P. Maximizing the lifetime of a barrier of wireless sensors. IEEE Trans. Mobile Comput. 2010, 9, 1161–1172. [Google Scholar] [CrossRef]
  8. Gage, D.W. Command control for many-robot systems. In Proceedings of the AUVS-92, Huntsville, AL, USA, 22–24 June 1992; pp. 22–24. [Google Scholar]
  9. Balister, P.; Bollobas, B.; Sarkar, A.; Kumar, S. Reliable density estimates for coverage and connectivity in thin strips of finite length. In Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking, Montréal, QC, Canada, 9–14 September 2007; pp. 75–86. [Google Scholar]
  10. Kumar, S.; Lai, T.H.; Posner, M.E.; Sinha, P. Optimal sleep-wakeup algorithms for barriers of wireless sensors. In Proceedings of the 4th International Conference on Broadband Communications, Networks and Systems, Raleigh, NC, USA, 10–14 September 2007; pp. 327–336. [Google Scholar]
  11. Chen, A.; Kumar, S.; Lai, T.H. Designing localized algorithms for barrier coverage. In Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking, Montréal, QC, Canada, 9–14 September 2007; pp. 63–74. [Google Scholar]
  12. Chen, A.; Lai, T.H.; Xuan, D. Measuring and guaranteeing quality of barrier-coverage in wireless sensor networks. In Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Hong Kong, China, 26–30 May 2008; pp. 421–430. [Google Scholar]
  13. Liu, B.; Dousse, O.; Wang, J.; Saipulla, A. Strong barrier coverage of wireless sensor networks. In Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Hong Kong, China, 26–30 May 2008; pp. 411–420. [Google Scholar]
  14. Li, L.; Zhang, B.; Shen, X.; Zheng, J.; Yao, Z. A study on the weak barrier coverage problem in wireless sensor networks. Comput. Netw. 2011, 55, 711–721. [Google Scholar] [CrossRef]
  15. Wang, B. Coverage problems in sensor networks: A survey. ACM Comput. Surveys 2011, 43, 31–53. [Google Scholar] [CrossRef]
  16. Meguerdichian, S.; Koushanfar, F.; Qu, G.; Potkonjak, M. Exposure in wireless ad-hoc sensor networks. In Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, Rome, Italy, 16–21 July 2001; pp. 139–150. [Google Scholar]
  17. Wu, Y.; Yin, J.; Li, M.; En, Z.; Xie, Z. Efficient algorithms for probabilistic k-coverage in directional sensor networks. In Proceedings of the 2008 International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP 2008), Sydney, NSW, Australia, 15–18 December 2008; pp. 587–592. [Google Scholar]
  18. Yang, G.; Qiao, D. Barrier information coverage with wireless sensors. In Proceedings of the IEEE INFOCOM 2009, Rio de Janeiro, Brazil, 19–25 April 2009; pp. 918–926. [Google Scholar]
  19. Si, P.; Wu, C.; Zhang, Y.; Jia, Z.; Ji, P.; Chu, H. Barrier coverage for 3d camera sensor networks. Sensors 2017, 17, 1771. [Google Scholar] [CrossRef] [PubMed]
  20. Zhuang, Y.; Wu, C.; Zhang, Y.; Jia, Z. Compound event barrier coverage in wireless sensor networks under multi-constraint conditions. Sensors 2017, 17, 25. [Google Scholar] [CrossRef] [PubMed]
  21. He, S.; Gong, X.; Zhang, J.; Chen, J.; Sun, Y. Curve-based deployment for barrier coverage in wireless sensor networks. IEEE Trans. on Wirel. Commun. 2014, 13, 724–735. [Google Scholar] [CrossRef]
  22. Saipulla, A.; Westphal, C.; Benyuan, L.; Jie, W. Barrier coverage of line-based deployed wireless sensor networks. In Proceedings of the IEEE INFOCOM 2009, Rio de Janeiro, Brazil, 19–25 April 2009; pp. 127–135. [Google Scholar]
  23. Wang, Y.; Cao, G. Barrier coverage in camera sensor networks. In Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing, Paris, France, 17–19 May 2011; pp. 1–10. [Google Scholar]
  24. He, S.; Chen, J.; Li, X.; Shen, X.; Sun, Y. Cost-effective barrier coverage by mobile sensor networks. In Proceedings of the 2012 IEEE INFOCOM, Orlando, FL, USA, 25–30 March 2012; pp. 819–827. [Google Scholar]
  25. Saipulla, A.; Liu, B.; Xing, G.; Fu, X.; Wang, J. Barrier coverage with sensors of limited mobility. In Proceedings of the Eleventh ACM International Symposium on Mobile Ad Hoc Networking and Computing, Chicago, IL, USA, 20–24 September 2010; pp. 201–210. [Google Scholar]
  26. Wang, Z.; Liao, J.; Cao, Q.; Qi, H.; Wang, Z. Achieving k-barrier coverage in hybrid directional sensor networks. IEEE Trans. Mobile Comput. 2014, 13, 1443–1455. [Google Scholar] [CrossRef]
  27. Kong, L.; Lin, S.; Xie, W.; Qiao, X.; Jin, X.; Zeng, P.; Ren, W.; Liu, X.Y. Adaptive barrier coverage using software defined sensor networks. IEEE Sensors J. 2016, 16, 7364–7372. [Google Scholar] [CrossRef]
  28. Wang, Z.; Cao, Q.; Qi, H.; Chen, H.; Wang, Q. Cost-effective barrier coverage formation in heterogeneous wireless sensor networks. Ad Hoc Netw. 2017, 64, 65–79. [Google Scholar] [CrossRef]
  29. Wang, Z.; Chen, H.; Cao, Q.; Qi, H.; Wang, Z.; Wang, Q. Achieving location error tolerant barrier coverage for wireless sensor networks. Comput. Netw. 2017, 112, 314–328. [Google Scholar] [CrossRef]
  30. Han, R.; Zhang, L.; Wei, Y. Maximizing strong barriers in lifetime-heterogeneous directional sensor network. In Proceedings of the 13th International Symposium on Wireless Communication Systems (ISWCS 2016), Poznan, Poland, 20–23 September 2016; pp. 80–85. [Google Scholar]
  31. Li, Z.; Jian, T.; Weiyi, Z. Strong barrier coverage with directional sensors. In Proceedings of the IEEE Global Telecommunications Conference, 2009 (GLOBECOM 2009), Honolulu, HI, USA, 30 November–1 December 2009; pp. 1–6. [Google Scholar]
  32. Kim, H.; Oh, H.; Bellavista, P.; Ben-Othman, J. Constructing event-driven partial barriers with resilience in wireless mobile sensor networks. J. Netw. Comput. Appl. 2017, 82, 77–92. [Google Scholar] [CrossRef]
  33. Kim, H.; Ben-Othman, J. Heterbar: Construction of heterogeneous reinforced barrier in wireless sensor networks. IEEE Commun. Lett. 2017, 21, 1859–1862. [Google Scholar] [CrossRef]
  34. Garey, M.R.; Johnson, D.S. Computers and intractability: A guide to the theory of np-completeness. W. H. Freeman and Company: New York, NY, USA, 1990; p. 338. [Google Scholar]
  35. Land, A.H.; Doig, A.G. An automatic method of solving discrete programming problems. Econometrica 1960, 28, 497–520. [Google Scholar] [CrossRef]
  36. Clausen, J. Branch and bound algorithms-principles and examples. Parallel Comput. Optimizat. 1997. Available online: http://janders.eecg.toronto.edu/1387/readings/b_and_b.pdf (accessed on 4 February 2018).
  37. Mohamadi, H.; Salleh, S.; Norsyarizad Razali, M. Heuristic methods to maximize network lifetime in directional sensor networks with adjustable sensing ranges. J. Netw. Comput. Appl. 2014, 46, 26–35. [Google Scholar] [CrossRef]
  38. Dijkstra, E.W. A note on two problems in connexion with graphs. Numerische Mathematik 1959, 1, 269–271. [Google Scholar] [CrossRef]
  39. Edmonds, J.; Karp, R.M. Theoretical improvements in algorithmic efficiency for network flow problems. J. ACM (JACM) 1972, 19, 248–264. [Google Scholar] [CrossRef]
  40. Balaji, S.; Swaminathan, V.; Kannan, K. A simple algorithm to optimize maximum independent set. Advanc. Model. Optim. 2010, 12, 107–118. [Google Scholar]
Figure 1. Various types of barrier coverage in wireless sensor networks (WSNs): (a) Weak barrier coverage. (b) Strong barrier coverage. (c) Hybrid barrier coverage. (d) Barrier coverage in directional sensor networks (DSNs).
Figure 1. Various types of barrier coverage in wireless sensor networks (WSNs): (a) Weak barrier coverage. (b) Strong barrier coverage. (c) Hybrid barrier coverage. (d) Barrier coverage in directional sensor networks (DSNs).
Sensors 18 00534 g001
Figure 2. The quadruple sensing model in a WSN.
Figure 2. The quadruple sensing model in a WSN.
Sensors 18 00534 g002
Figure 3. An illustrations of a crossed barrier and a directional coverage graph. (a) A crossed barrier. (b) The directional coverage graph showing the overlapping relation between nodes.
Figure 3. An illustrations of a crossed barrier and a directional coverage graph. (a) A crossed barrier. (b) The directional coverage graph showing the overlapping relation between nodes.
Sensors 18 00534 g003
Figure 4. The illustrations of the max-flow-maximum-independent-set algorithm. (a) The barriers in individual directions. (b) The maximum independent set (MaxIS) of the graph is calculated to obtain the maximum crossed barriers.
Figure 4. The illustrations of the max-flow-maximum-independent-set algorithm. (a) The barriers in individual directions. (b) The maximum independent set (MaxIS) of the graph is calculated to obtain the maximum crossed barriers.
Sensors 18 00534 g004
Figure 5. Scenario 1: The deployment map of a WSN and a crossed barrier calculated by the MSPA.
Figure 5. Scenario 1: The deployment map of a WSN and a crossed barrier calculated by the MSPA.
Sensors 18 00534 g005
Figure 6. Scenario 2: The effect of node number on crossed barrier number: (a) region size: 150 × 150 m; (b) region size: 150 × 75 m.
Figure 6. Scenario 2: The effect of node number on crossed barrier number: (a) region size: 150 × 150 m; (b) region size: 150 × 75 m.
Sensors 18 00534 g006
Figure 7. Scenario 3: The effect of sensing radius on crossed barrier number: (a) region size: 150 × 150 m; (b) region size: 150 × 75 m.
Figure 7. Scenario 3: The effect of sensing radius on crossed barrier number: (a) region size: 150 × 150 m; (b) region size: 150 × 75 m.
Sensors 18 00534 g007
Figure 8. Scenario 4: The effect of sensing offset angle on crossed barrier number: (a) region size: 150 × 150 m; (b) region size: 150 × 75 m.
Figure 8. Scenario 4: The effect of sensing offset angle on crossed barrier number: (a) region size: 150 × 150 m; (b) region size: 150 × 75 m.
Sensors 18 00534 g008

Share and Cite

MDPI and ACS Style

Han, R.; Yang, W.; Zhang, L. Achieving Crossed Strong Barrier Coverage in Wireless Sensor Network. Sensors 2018, 18, 534. https://doi.org/10.3390/s18020534

AMA Style

Han R, Yang W, Zhang L. Achieving Crossed Strong Barrier Coverage in Wireless Sensor Network. Sensors. 2018; 18(2):534. https://doi.org/10.3390/s18020534

Chicago/Turabian Style

Han, Ruisong, Wei Yang, and Li Zhang. 2018. "Achieving Crossed Strong Barrier Coverage in Wireless Sensor Network" Sensors 18, no. 2: 534. https://doi.org/10.3390/s18020534

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop