Next Article in Journal
Al2O3-Based a-IGZO Schottky Diodes for Temperature Sensing
Next Article in Special Issue
IB-MAC: Transmission Latency-Aware MAC for Electro-Magnetic Intra-Body Communications
Previous Article in Journal
Wearable Sensor Based Stooped Posture Estimation in Simulated Parkinson’s Disease Gaits
Previous Article in Special Issue
Dynamic Speed Control of Unmanned Aerial Vehicles for Data Collection under Internet of Things
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Minimum Cost Deployment of Bistatic Radar Sensor for Perimeter Barrier Coverage

1
School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou 310018, China
2
Department of Computer Science, RMIT University, Melbourne, VIC 3001, Australia
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(2), 225; https://doi.org/10.3390/s19020225
Submission received: 29 November 2018 / Revised: 17 December 2018 / Accepted: 22 December 2018 / Published: 9 January 2019
(This article belongs to the Special Issue Internet of Things and Ubiquitous Sensing)

Abstract

:
Perimeter barriers can provide intrusion detection for a closed area. It is efficient for practical applications, such as coastal shoreline monitoring and international boundary surveillance. Perimeter barrier coverage construction in some regions of interest with irregular boundaries can be represented by its minimum circumcircle and every point on the perimeter can be covered. This paper studies circle barrier coverage in Bistatic Radar Sensor Network (BRSN) which encircles a region of interest. To improve the coverage quality, it is required to construct a circle barrier with a predefined width. Firstly, we consider a BR deployment problem to constructing a single BR circular barrier with minimum threshold of detectability. We study the optimized BR placement patterns on the single circular ring. Then the unit costs of the BR sensor are taken into account to derive the minimum cost placement sequence. Secondly, we further consider a circular BR barrier with a predefined width, which is wider than the breadth of Cassini oval sensing area with minimum threshold of detectability. We propose two segment strategies to efficiently divide a circular barrier to several adjacent sub-ring with some appropriate width: Circular equipartition strategy and an adaptive segmentation strategy. Finally, we propose approximate optimization placement algorithms for minimum cost placement of BR sensor for circular barrier coverage with required width and detection threshold. We validate the effectiveness of the proposed algorithms through theory analysis and extensive simulation experiments.

1. Introduction

Barrier Coverage is an important sensor deployment issue in many industrial, consumer, and military applications, such as machine management, health care monitoring, battlefield surveillance [1], etc. Recent years have witnessed a trend that radar sensors have been increasingly deployed in guarding militarized zones, and monitoring hazards warehouse and frontier [2,3,4,5]. Traditional passive sensors typically leverage on a disk sensing model. In contrast, Bistatic Radar (BR) sensors use a Cassini oval sensing model [6]. The sensing region of a BR sensor depends on the locations of both the BR transmitter and receiver, and is characterized by a Cassini oval. Moreover, since a BR transmitter (or receiver) can potentially form multiple BRs with different BR transmitters (or receivers, respectively), the sensing regions of different BRs are coupled, making the coverage of a BR network (BRN) highly non-trivial.
Some recent works on BR sensor coverage are mainly focused on line barrier. In [7], a minimum cost placement algorithm was developed for line barrier coverage. To improve quality, a belt with a predefined breadth is considered and covered by several same lines. In [8], the authors studied both fault tolerance and energy-saving issues combining the minimum cost placement of BR sensors for belt barrier coverage. They focus only on the line-based barrier coverage that cannot be completely applied to other application scenarios, such as perimeter barrier which can encircle the whole protected region.
Perimeter barrier consisting of BR sensors can provide intrusion detection for a closed area. It is efficient for practical applications, such as coastal shorelines monitoring and international boundary surveillance. Perimeter barrier coverage construction in some regions of interest whose irregular boundary can be represented by its minimum circumcircle and bistatic radars are to be deployed on the circumcircle perimeter to construct a perimeter barrier coverage such that every point on the perimeter can be covered [6]. Given the characteristics of a Cassini oval model, it is challenging to optimize the radar sensors deployment in the circle perimeter barrier coverage. In addition, to improve coverage quality, we need to construct several circular BR barriers which form a circular ring with some width to achieve higher reliability of monitoring. Moreover, to efficiently construct a cost-efficient circle barrier, the unit costs of the BR transmitter and receiver also should be considered in the barrier optimization stage. These factors in the real applications affect the design of barrier coverage algorithms or models.
In this paper, we study a minimum cost BR sensor placement algorithm to construct a circular BR coverage with a predefined breadth, to improve coverage quality of perimeter monitoring for a protected area with minimum threshold of detectability. Firstly, we consider a BR deployment problem to constructing a single BR circular barrier with minimum threshold of detectability. We study and prove the optimized BR placement patterns on the single circular ring. Then the unit costs of the BR sensor are taken into account to derive the minimum cost placement sequence. Secondly, to enhance the coverage quality, we consider an annulus BR sensor barrier with a predefined breadth, which is wider than the breadth of Cassini oval sensing area with minimum threshold of detectability. In [7], the authors study the BR deployment scheme of line barrier and how to construct a belt coverage with predefined width. But how to efficiently segment an annulus ring to several adjacent sub-rings with some appropriate width so as to ensure the minimum cost annulus BR barrier coverage is also challenging. We propose two segment strategies: (1) A circular equipartition strategy such that the BR sensors deployed on a circle can form a barrier with some breadth, and one or more such circles can form an annulus barrier with the required breadth; and (2) an adaptive segmentation strategy such that multiple circle barriers with appropriate breadths can optimum form an annulus barrier with the required breadth. Finally, we propose optimization algorithm to optimize the segmentation of circular ring and BR placement pattern on each circle to minimize the total placement cost, and to achieve approximate optimal circular coverage with predefined width and detectability.
The proposed algorithms are validated by simulation results. To the best of our knowledge, this appears the first paper to investigate the minimum cost circle barrier coverage problem. The main contributions of our work are summarized as follows.
  • Firstly, we investigate the Cassini oval sensing models and discuss a variety of barrier coverage cases. We discover and prove the optimized BR placement patterns and sequence on a circular ring. Then the unit costs of the BR sensor are taken into accounts to derive the minimum cost placement sequence, which is then used to design an algorithm for any minimum cost placement in circle-based barrier construction.
  • Secondly, we further study the optimal BR placement on an circular barrier with a predefined breadth. We propose two division strategies, circular equipartition strategy and an adaptive segmentation strategy, to segment an annulus ring to several adjacent sub-ring with appropriate width so as to ensure the minimum cost annulus BR barrier coverage with required detection threshold.
  • Finally, we propose approximate optimization placement algorithms for minimum cost placement of BR sensor for annulus barrier coverage with required width and detection threshold. We validate the effectiveness of the proposed algorithms through extensive simulation experiments.
The rest of paper is organized as follows: Section 2 reviews the related work. Section 3 introduces the system model and problem description. Section 4 describes the optimal placement sequence on the single circle-based barrier and Section 5 provides the solution to the minimum placement cost problem and simulation experimente. Section 6 concludes the paper.

2. Related Work

Barrier coverage is an important issue in many wireless sensor network applications, such as border intrusion detection and environmental safety monitoring. We review the related work in barrier coverage based on the following three models—the disk cover model [9,10,11,12,13,14], the sector cover model [15,16,17,18], and the BR sensor cover model [6,19,20].
We first review the work leveraging on the disk cover model. In [9], the authors considered the barrier coverage problem of heterogeneous wireless sensor networks, and used Helly’s Theorem to solve the problem of k-coverage based on heterogeneous sensors and data acquisition. The authors in [10] described a new deployment method of probabilistic sensor to improve network coverage. In [11], the maximum life scheduling of target coverage and data collection was proposed. In [12], to address the problem of maximizing the life cycle of barrier coverage, the authors proposed two sleep-wake scheduling algorithms named Stint and Prahari, and then proposed three enhanced algorithms, i.e., Greedy-Cover-Eraser, Greedy-Edge-Eraser, and MaxFlow-Edge-Eraser. In [13], the authors firstly introduced the concept of strong and weak barrier coverage, and then deduced the critical conditions to construct weak barrier coverage. The authors in [14] introduced the concept of local barrier coverage nad proposed a local algorithm a protocol to maximize the life of barrier coverage. In [21], the authors introduced a heterogeneous barrier-coverage in which guarantees that any penetration variation of intruder is detected by at least one sensor with different sensing capabilities. The authors in [22] considered the problem of intrusion in transversal directions. They introduced the concept of crossed barrier coverage which can prevent an intruder from crossing the entire target area from a specific direction without being detected. In addition, they also proposed a multi-round shortest path algorithm (MSPA) to solve the optimization problem, which works heuristically to guarantee efficiency while maintaining near-optimal solutions. The authors in [23] introduced a new type of barrier, virtual emotion barrier, which is able to detect emotion by devices with wireless signal in Internet of Things (IoT) environment. They formally defined a problem whose objective is to construct virtual emotion barrier in the given area including IoT devices such that the detection accuracy of emotion by virtual emotion barrier is maximized. To solve the problem, they proposed a greedy-emotion-accuracy approach.
We now move to the studies leveraging on the sector cover model. The authors in [15] proposed a polynomial-time algorithm to determine the orientation of the sensors to build strong barrier coverage. In [16], the authors mainly adopted the sector coverage model and guaranteed the communication of the whole network by constructing connected dominating set. In [17], the authors proposed a distributed β -breadth belt-barrier construction algorithm without rotation (D-TriB) to improve the image quality in the wireless vision sensor network. In [18], the authors studied the exposure path prevention problem based on directional sensor network coverage, and mapped the exposure path problem into the sector-based percolation model, and then deployed the critical density boundary of the directional sensors according to the two-dimensional Poisson process.
Some recent work considers the problem of mobile sensor coverage. For example, in [24], the authors deployed a sensor network which consists of both mobile and static sensors, and the mobile sensors can move from a dense area to a sparse area to improve coverage rate. In [25], the authors proposed a distributed algorithm for building k-coverage based on mobile sensors. In [26], a fully distributed algorithm based on virtual force and convex analysis is developed for the objective to relocate the sensors from the original positions to uniformly distribute on the convex hull of the region to building the barrier. In [6], the authors discussed how to construct a barrier on the smallest circumcircle of the area which is protected to minimize the cost. At the same time, the minimum matching algorithm is given to calculate the minimum total moving distance of the barrier formed by mobile sensors. In [27], the authors introduced a new architecture of barrier, event-driven partial barrier, which is able to monitor any movements of objects in the event-driven environment. Also, a resilient event-driven partial barrier is introduced to consider the case that the constructed barriers collapsed due to failures of some sensors consisting of those barriers. We know that existing works on barrier coverage typically assume that sensor nodes have accurate location information, which is not reasonable or practical for many real sensor networks. In [28], the authors studied the barrier coverage problem when sensor nodes have location errors and deploy mobile sensor nodes to improve barrier coverage if the network is not barrier-covered after initial deployment. They analyzed the effects of location errors for barrier coverage and propose a fault-tolerant weighted barrier graph to model the barrier coverage formation problem.
Recently, the technology of BR sensor began to receive wider attention. In [19], the authors considered the problem of deploying a network of BRs in a region to maximize the worst-case intrusion detectability, while minimizing the vulnerability of a barrier. In [20], the authors proposed a random Voronoi algorithm to calculate the optimal position of transmitters and receivers so that the maximum distance between all the points of interest in the area to their nearest sensor pair is minimized.
The general problem of barrier coverage does not require the coverage width of the barrier, but only needs to ensure that the behavior of the object across the boundary can be monitored. For example, in [6], to protect an irregular region, the author selected the boundary of the smallest circumscribed circle of the region to construct a barrier, and proposed a matching algorithm to calculate the minimum cost of resetting sensors under the condition of disrupting the sensor sequence. Since there is only one barrier, it has a great potential safety hazard for intruder invaders and emergencies. On the basis of this, in [7], the authors discussed the problem of straight-line barrier with a certain width and proposed a corresponding effective solution. Our work is motivated by the first two papers, but differs in several aspects. First, we focus on different background of the problem. We address the problem of annulus barrier coverage which in particular poses an unprecedented challenge compared to the traditional background of barrier coverage. Secondly, the calculation of the effective width and length will be more challenging than that in the straight barrier coverage, requiring an innovative solution to the boundary problem of the circle. In addition, we consider minimum cost coverage which is essential to real deployment. Our intuition is to divide the annulus barrier into a number of circles. Since each circle’s radius is different, it is difficult to achieve the complete coverage while minimizing cost.

3. Sensor Model and Problem Description

We define some variables used in the paper in Table 1.

3.1. Sensor Model

In the BR sensor model, the transmitter and sensor can be placed in different positions. Let X Y ¯ denote the line segment between point X and point Y. X Y denotes the European distance of the line segment, and T i and R j denote transmitter T i and receiver R j , respectively.
According to [29], for a pair of BR sensor T i R j , the signal-to-noise ratio (SNR) of a monitocircular point can be computed as follows:
S N R ( A ) = K T i A 2 · R j A 2
Here, K is a constant determined by the physical properties of the BR sensor, such as the energy of sensor, the radar sensor cross section and the antenna’s power gain. T i A represents the European distance of the monitocircular point A to transmitter T i . R j A represents the European distance from the monitocircular point A to receiver R j .
In a Bistatic Radar Sensor Network (BRSN), we assume that all sensors operate at an orthogonal frequency [30,31] to avoid mutual interference between receivers. We also assume that all the transmitters and receivers have the same physical attributes. Because a transmitter can match multiple receivers, a receiver can also match multiple transmitters. In the fourth part, we only consider receiving the signal from the nearest two transmitters for a receiver. Consider circular the signal-to-noise ratio (SNR) of any monitocircular points A, according to [19,32], we can select the maximum SNR for this point as its SNR, as it can be monitored by many pairs of radar sensors. We define S N R A max as follows.
S N R A max = max ( T i , R j ) K T i A 2 · R j A 2
Thus, if a point of interest A can be monitored, then S N R A max ε should be satisfied, where ε is the given threshold of SNR. We set the SNR threshold of the barrier to ε .
For convenience in the paper, we introduce the concept of detectability where the detectability of a point A is described as follows.
l ( A ) = min ( T i , R j ) T i A · R j A
Consider the requirement of minimum threshold, we obatin the threshold of detectability as:
l max 2 = K ε
where ε is the given threshold ε of SNR. It is clear that we need to satisfy l ( A ) l max 2 to make the point of interest A be covered, which is equivalent to S N R A max ε .
Under the given threshold of SNR, according to [9], with change in the distance between transmitter and receiver sensor, the coverage area of the BR sensor model can be divided into four cases, as shown in Figure 1.
(a
d ( T , R ) > 2 l max , the coverage area is two disjointed parts;
(b
d ( T , R ) = 2 l max , the coverage area is surrounded by the Bernoulli double new line;
(c
2 l max < d ( T , R ) < 2 l max , the coverage area is surrounded by the waist closed curve;
(d
0 < d ( T , R ) < 2 l max , the coverage area is surrounded by the elliptical curve,
where d ( T , R ) represents the distance between the transmitter and the receiver.
For the particular problem we study in this paper, we need to consider three sensor coverage cases, i.e., (a), (c), and (d).

3.2. Problem Definition

To improve coverage quality for a particular protected region D, we aim to construct a BR circular barrier P with the breadth not smaller than a predefined width H, while the minimum detection SNR within the circular barrier coverage is not less than a threshold ε . Furthermore, the unit cost of a radar transmitter may be different from a receiver. Then the bistatic radar placement problem is to construct a circular barrier with the minimum total cost of all BR sensors deployed, as shown in Figure 2a. Besides, to satisfy H width circular coverage with predefined sensing threshold ε , the circular barrier may be composed of multiple adjacent sub-circles barrier, as shown in Figure 2b. Hence, it is highly non-trivial to optimize the segmentation of the whole circular barrier into multiple adjacent sub-circles barrier and placement of BR transmitters and receivers on the sub-circles.
Usually, the unit cost of transmitter is higher than that of receiver. We quantify their costs using λ = C T / C R > 1 , where C T represents the unit cost of transmitter and C R represents the unit cost of receiver. Given that we have M transmitters and N receivers, the minimum cost coverage problem can be then formulated as follows.
minimize M C T + N C R s . t . l ( A ) l max 2 A P
Here, l ( A ) l max 2 is equivalent to S N R A max ε . We must ensure that the detecting SNR of each point on the BR barrier is greater than or equal to ε .
Given the constraints of BR’s physical parameters and predefined width H of circular BR barrier, a single barrier is often insufficient to meet the circular coverage requirements. In belt barrier coverage, Ammari [9] divides the original belt barrier into several identical parallel sub-barriers, and uses the same sensor placement sequence on each sub-barrier. Comparing to the belt barrier, the division problem of circular barrier and BR’s placement problem of multiple sub-circles are more complex to solve. First, the circular barrier may be divided into multiple sub-circles with different width and different length, hence how to divide the circular barrier into multiple sub-circles and how to determine BR’s placement sequence for those sub-circles are non-trival issues. Second, the minimum number of sensors required for each sub-circle may be different, requiring each circle to be handled individually. We demonstrate a possible solution in Figure 2b where circle represents transmitter, triangle represents receiver, and the circular with width H is the barrier area we intend to build. We can see that BR sensors are placed with different sequences in different sub-circles, and the number of BR transmitters and receivers in each sub-circle is different.

3.3. Basic Deployment Pattern T i R n T i + 1

We consider placing sensors on a single circle. For convenience, we set transmitter T 1 as the first transmitter with coordinate ( r , 0 ) . Similar to [7], we use S to represent the placement sequence of sensors, for example, S 1 ( T 1 , R 1 , R 2 , T 2 ) , S 2 ( R 1 , T 1 , T 2 , R 2 ) , and etc. For two placement sequences ( T , R ) and ( R , T ) , they both have the same coverage effect according to the SNR Equation (1) and the characteristics of the Cassini oval line (Figure 1). We hence derive that ( T , R n ) and its mirror mode ( R , T n ) have the consistent coverage area. Without lossing generality, we focus on the following two placement sequences: S 1 = ( T i , R 1 , R 2 , R 3 , , R n , T i + 1 ) , S 2 = ( R i , T 1 , T 2 , T 3 , , T n , R i + 1 ) , where T i and T i + 1 represent the ith and the i + 1 th transmitter, respectively, and R i , R i + 1 , represent the ith and the i + 1 th receiver. The two sequences have the same coverage effect.
However, since the unit cost of transmitter is higher than that of receiver, sequence S 1 is selected. For convenience, we set the placement sequence as P i n = ( T i , R n , T i + 1 ) , where T i is shared by P i 1 n 1 and P i n 2 . The placement sequence of circular barrier coverage may be composed of several sequences P i n j , for example the sequences of sensors ( T 1 , R 1 , R 2 , R 3 , R 4 , T 2 ) , ( T 2 , R 5 , R 6 , R 7 , R 8 , T 3 ) , and ( T 3 , R 9 , T 1 ) , as shown in Figure 3.
Next, in Section 4, we focus on how to solve the barrier placement problem on a single sub-circle barrier of width h. Then, in Section 5, we propose two strategies to divide circular barrier into multiples sub-circles and solve the minimum cost placement problem of circular barrier with width H and predefined detection threshould.

4. Solution for Single Circle with Width h

In this section, we focus on the sensor optimized deployment on a single circle with width h. We need to use basic deployment pattern P i n = ( T i , R n , T i + 1 ) to complete the deployment. First, we will consider how to deploy the first pair of sensors T i R 1 . In Section 4.1, we determine how to choose the most suitable deployment model through detailed analysis. We mainly discuss the waist model (Section 4.1.1) and elliptical model (Section 4.1.2). Then, in Section 4.2.1, we determine the deployment location of other sensors in deployment pattern P i n through detailed mathematical calculation. The effective coverage width (Section 4.2.2) and effective coverage length (Section 4.2.3) of pattern P i n are calculated, and the coverage validity proof of pattern P i n is given (Section 4.2.2). Since a single circle may require multiple patterns P i n to complete deployment, we discuss the combination of multiple patterns P i n in Section 4.3 and give detailed mathematical proof. We know that a single circle may not be deployed in integer pattern P i n , so in Section 4.4, we discuss the coverage of the boundary part whose length is less than the coverage length of pattern P i n , and give a suitable coverage method through detailed mathematical calculation.

4.1. T i R 1 Coverage Model

We first determine the coverage model of the first pair of sensors T i R 1 in sequence P i n . As mentioned in Section 3.1 for several effective sensor coverage patterns, we discuss model ( c ) and ( d ) as follows.

4.1.1. Case of Waist

In this case, the sensor’s covecircular area exhibits the shape of a waist, as shown in Figure 1c. An intuition is to place sensors in the middle of the circle so that we can make rational use of the effective coverage area of each sensor, and also facilitate efficient processing and calculation.
We start placing sensors in a counterclockwise direction, i.e., the first transmitter T 1 ( r , 0 ) , followed by the first receiver, and etc.
Theorem 1.
For a pair of sensors T R , the vulnerability in the two points where the midnormal of line segment T R ¯ intersects with the covecircular area is the largest, and it is also the place where the signal-to-noise ratio is the smallest.
Proof of Theorem 1.
The proof of Theorem 1 is given in the Appendix A. □
We denote the two points in Theorem 1 as X 1 and X 1 , respectively. In Figure 4a, we only need to consider how to determine the location of these two points X 1 , X 1 . We divide the problem into three cases as follows.
1.1
Suppose that there is only one point between X 1 and X 1 at the inner and outer boundaries of the annulus, and we find that point X 1 at the outer boundary is better than point X 1 at the inner boundary, as shown in Figure 4a(1). Since point X 1 is on the inner boundary, T R cannot meet the coverage requirement, one of the cases is shown in Figure 4a(3).
1.2
Suppose that the two points X 1 and X 1 are not inside and outside the boundary of the annulus. To meet the coverage requirements, X 1 must be outside of the outer boundary and X 1 must be inside of the inner boundary, as shown in Figure 4a(2). However, it draws closer to the distance between T R , compared to the first case, the length of the cover is smaller.
1.3
Suppose that the two points X 1 and X 1 are in the inner and outer boundaries of the annulus separately, as shown in Figure 4a(1). In this case, X 1 is on the location of point A, but X 1 cannot be on the outer boundary of the annulus, hence it is not feasible.
Based on the above three cases, we conclude that the best solution is that point X 1 is on the outer boundary of the annulus, and point X 1 is inside the inner boundary of the annulus to meet the coverage requirements.

4.1.2. Case of Ellipse

The coverage area of the sensors is oval in this case, as shown in Figure 1d. We also denote two points as X 1 and X 1 . Similarly, we discuss three cases as follows.
2.1
Suppose that there is only one point between X 1 and X 1 inside and outside the boundary of the annulus. We find that when point X 1 on the outer boundary of the annulus, the covering area is tangent to the outer boundary of the annulus at point X 1 . It is obvious that it does not meet the coverage requirements, as shown in Figure 4b(1), and the same conclusion can be drawn when point X 1 is on the inner boundary, as shown in Figure 4b(2).
2.2
Assuming that the two points X 1 and X 1 are not inside and outside the boundary of the annulus, it is possible to satisfy the coverage condition at this point, but the coverage length is shorter than that of the waist model, as shown in Figure 4b(3).
2.3
Suppose that both points X 1 and X 1 are inside and outside the boundary of the annulus, similar to the case of the waist coverage. This case is not feasible.
To conclude the above cases we have discussed, we will focus on the waist coverage in the remaining of the paper.

4.2. Placement Pattern of P i n = ( T i , R n , T i + 1 )

In this section, we present the deployment scheme for sequence P i n , including determining the specific location of transmitters and receivers, proposing the method to compute the effective coverage width and length, and also providing the proof of the coverage reliability of sequence P i n . Here, the coverage area formed by the second receiver R 2 and transmitter T i may be a waist region or two separate regions, as shown in Figure 1a,c. For convenience, we choose the latter to discuss.

4.2.1. Determining Sensor Locations

Given sequence P i n = ( T i , R 1 , R 2 , , R n , T i + 1 ) , the arc is divided into several successive sub-arcs. We aim to determine the location of the radar sensors to cover the entire circular portion. We first introduce the concept of the central angle. For the arc of sequence P i n , we use ( 2 θ 1 , 2 θ 2 , , 2 θ n + 1 ) to represent the sequence of its central angle, where θ 1 = 1 2 T i O R 1 , θ 2 = 1 2 R 1 O R 2 , …, θ n = 1 2 R n 1 O R n , θ n + 1 = 1 2 R n O T i + 1 , as shown in Figure 5a. To determine the location of the corresponding sensors, we need to get the values of these central angles. We compute the central angles based on Theorem 2.
Theorem 2.
For a sequence P i n , the central angles can be calculated as follows: (1) If n is odd, then θ 1 = θ n + 1 , θ 2 = θ n , …, θ n + 1 2 = θ n + 1 2 + 1 , (2) if n is even, then θ 1 = θ n + 1 , θ 2 = θ n , …, θ n 2 = θ n 2 + 2 , θ n 2 + 1 = θ n 2 + 1 , where θ x is the central angle, x = 1 , 2 , , n + 1 2 , r is the length between the central position of the part of annulus and the center of the circle, R max is the length between the outer boundary of the annulus and the center of the circle.
θ x = arccos r 2 + R max 2 l max 2 2 r R max , x = 1 arccos ( R max 2 + r 2 ) cos i = 1 x 1 θ i ( R max + r ) 2 ( R max r ) 2 ( cos 2 i = 1 x 1 θ i 1 ) + l max 4 2 r R max i = 1 x 1 θ i , x > 1
Proof of Theorem 2.
The proof of Theorem 2 is given in the Appendix A. □
For the upper and lower bounds of n in Theorem 2, it is difficult to give the maximum value n max of n explicitly. We first determine the physical properties of the sensors and the inner and outer radius of the annulus are determined so that we can obtain the maximum central angle of sequence P i n . We then derive the maximum value of n under this condition, which is the maximum number of receivers in a single sequence P i n . Theorem 3 gives the computing equation.
Theorem 3.
For a sequence P i n , the largest circle angle can be covered by it is 2 θ max , the maximum number of receivers can be derived by the following equation: i = 1 n max + 1 2 θ i = 2 θ max , where θ max can be calculated as follows.
θ max = arccos ( R max 2 + r 2 ) · ( R max r ) 2 l max 4 2 r R max · ( R max r ) 2
Proof of Theorem 3.
The proof of Theorem 3 is given in the Appendix A. □

4.2.2. Effective Coverage Width of P i n = ( T i , R n , T i + 1 ) and Coverage Quality

We now discuss the coverage quality of sequence P i n , i.e., whether the minimum width of the coverage area is greater than the width of the circle.
We first discuss the effective coverage width of sequence P i n . In P i n , the coverage area of each pair of sensors T R is different. With the number of receivers increased, the width of the receiver which is farther away from the transmitter is smaller. Therefore, we only need to find out the minimum coverage width of sequence P i n when the number of receivers is determined, that is also the coverage width of the receiver in the middle of sequence P i n , i.e., the effective coverage width of sequence P i n .
As shown in Figure 5b, the value of n is four, the cover sequence is P i 4 . We observe that the middle position of sequence is where the line segment X 3 X 3 ¯ is in, and the width of the coverage is the length of line segment X 3 X 3 ¯ . It is obvious that the actual width of the coverage is greater than the width of the annulus, and this is in fact the effective coverage width.
For sequence P i n , the effective coverage width is the length of line segment X m i d X m i d ¯ , but the calculation of this value is very complicated. For convenience, to meet the coverage requirements, we introduce the concept of two times value. Assuming that the intersection point between line segment X m i d X m i d ¯ and the two nearest receivers is K m i d , we use 2 X m i d K m i d as an approximate value for the length of line segment X m i d X m i d ¯ . For example, in Figure 5b, we use 2 X 3 K 3 as an approximate value for the length of line segment X 3 X 3 ¯ . Please note that an analysis of the approximate method is given in the Appendix A. We hence obtain the equation to compute the effective coverage width of sequence P i n , which is given in Theorem 4.
Theorem 4.
For sequence P i n , to meet the coverage requirements, when n takes different values, the effective coverage area width is given as follows.
d n = 2 ( R max r · cos θ n 2 + 1 ) , 1 n n max
Proof of Theorem 4.
The proof of Theorem 4 is given in Appendix A. □
We have now obtained the effective coverage width of sequence P i n . To verify the reliability of the sequence coverage, we only need to compare the effective coverage width with the width of the circle, which is described in Theorem 5.
Theorem 5.
In sequence P i n , until the number of receivers n is taken to the upper bound, P i n always meets the requirements of coverage, i.e., the coverage of sequence P i n is reliable.
Proof of Theorem 5.
The proof of Theorem 5 is given in Appendix A. □

4.2.3. Effective Coverage Length of P i n = ( T i , R n , T i + 1 )

In Section 4.2.1 and Section 4.2.2, we give the location of sensors in sequence P i n , the method to compute the effective coverage width, and provide the proof of the sequence coverage quality. We now determine the effective coverage length of sequence P i n when the number of receivers n is determined.
We leverage the central angle to solve this problem. As shown in Figure 6a, we observe a pair of sensors T 1 R 1 intersect the circle at two points X 0 , X 0 . We need the line segments X 0 X 0 ¯ as the starting position to compute the effective coverage length, but this computation is very cumbersome, requiring simplifying. We consider that in real applications, it requires multiple sequences to complete the deployment of the barrier, and multiple sequences will be end to end. In Figure 6a, the coverage area of the last sequence at least needs to cross point X 0 , existing coverage areas overlap. We connect point X 0 to the center O, and it will intersect the circular at point X 0 and point P. Because the line segment X 0 P ¯ is still in the coverage of the sensors, we can consider line segment X 0 P ¯ as the starting position to compute the effective coverage length. By symmetry, we find that θ = θ 2 . Since the other angle has been given by the equation in Theorem 2, we can obtain the effective coverage length of sequences P i n by using the above conditions. Theorem 6 gives the computing equation.
Theorem 6.
For sequence P i n , when the number of receivers n takes different values, the length of the effective coverage area is calculated as follows, where n = 1 , 2 , , n max , n max represents the maximum number of receivers, hence meeting the coverage conditions.
L n = 2 r · ( 2 i = 1 n + 1 2 θ i + θ 2 ) , n is odd 2 r · ( 2 i = 1 n 2 θ i + θ n 2 + 1 + θ 2 ) , n is even
Proof of Theorem 6.
The proof of Theorem 6 is given in Appendix A. □

4.3. Optimal Placement Sequence on Single Circle with Width h

We have so far solved the deployment of a single sequence P i n j . We know that a circle may have multiple P i n j sequences. We use sequence Y = ( n 1 , n 2 , , n t ) to represent the coverage sequence on a single circle, denoted as ( P i n 1 , P i + 1 n 2 , , P t 1 n t ) . To addess this problem, we first need to find out the numerical relation between n 1 , n 2 , , n t in order to determine the optimal placement sequence. We formally formulate this problem as follows. Suppose we have M 1 transmitters and N 1 receivers, and we use sequence Y = ( n 1 , n 2 , , n t ) to form a barrier with width h, how do we maximize the length of this barrier?
Let us consider the general sequence S = ( T 1 , R n 1 , T 2 , R n 2 , T 3 ) , where n 1 , n 2 is the number of receivers. Assume that n 1 is odd, n 2 is even, and n 1 < n 2 . We can construct another sequence, it is S = ( T 1 , R n 1 + n 2 1 2 , T 2 , R n 1 + n 2 + 1 2 , T 3 ) , where n 1 + n 2 1 2 and n 1 + n 2 + 1 2 are odd or even. We define ψ 1 , ψ 2 represent the coverage angle of sequence S and S , respectively, we can compare the coverage length of the two sequence by comparing the value of the two parameters. We now have Theorem 7.
Theorem 7.
For sequences S and S , assuming that n 1 is odd, n 2 is even, and n 1 < n 2 , we have (1) If n 2 n 1 = 1 , then ψ 1 = ψ 2 ; (2) If n 2 n 1 > 1 , then ψ 1 < ψ 2 .
Proof of Theorem 7.
The proof of Theorem 7 is given in the Appendix A. □
When both n 1 and n 2 are even or odd, we can also use the proof of Theorem 7 to prove: If n 1 n 2 2 , then ψ 1 = ψ 2 ; if n 1 n 2 > 2 , then ψ 1 < ψ 2 . Therefore, we find that with M 1 transmitters and N 1 receivers, without considering the boundary problem, we can get the longest coverage barrier by using multiple same deployment sequences, and this deployment sequence is also known as the optimal deployment sequence. We therefore use this optimal deployment sequence in this paper.

4.4. Overlay Boundary Problem on Single Circle with Width h

In this section, we prove that the same sequence should be used as much as possible to complete the deployment. We first determine how many identical sequences are needed to complete the deployment and deal with the problem of the overlay boundary, as shown in Figure 6b.
Suppose the deployment sequence of a circle is S = A + B , where A = x P i n , representing x sequence P i n , and B is the remainder. We use C to represent the coverage angle of a single sequence P i n , use D to represent the angle of the overlapping part, and use L t to represent the angle of the remainder. We can get C = L n / r , L t = 2 π x · C + D , D = 2 ( x 1 ) · θ 2 . Because of L t C , it is only necessary to place the appropriate receivers in the remaining part. But we cannot directly compare L t = 2 π x · C + D with the angle of sequence P i n to determine the number of receivers due to the overlap of x optimal sequences, for example, if 2 θ 2 < L t < 0 , it still satisfies the coverage requirements. We hence get a reasonable range of the remaining angle, i.e., 2 θ 2 L t 2 a n 2 θ 2 , where a n is given in Theorem 8.
Theorem 8.
For the circle which is covered by sequence P i n , the number of receivers needed for the remaining arcs is computed as follows: (1) If 2 θ 2 L t 0 , there is no need for additional receivers; (2) if 0 < L t 2 a n 2 θ 2 , the number of receivers is determined by the following equation: if 2 a k 1 < L t + 2 θ 2 2 a k , then it needs k receivers, where 1 k n , L t represents the angle of the remaining part of arc, and a k can be calculated as follows.
a k = 0 , k = 0 2 i = 1 k + 1 2 θ i , k is odd 2 i = 1 k 2 θ i + θ k 2 + 1 , k is even and k 0
Proof of Theorem 8.
The proof of Theorem 8 is given in Appendix A. □
Up to this point, we have solved the problem of BR sensor deployment on a single circle. In the next section, we will discuss the minimum coverage cost of the whole circular barrier coverage with width H ( H > h ) .

5. Solution of Minimum Coverage Cost on the Whole Circular Barrier with Width H

We now discuss how to solve the minimum cost placement problem of BR sensors for the whole circular barrier coverage. Because the coverage area of bistatic radar sensors is variable and one transmitter (receiver) can form sensor pairs with multiple receivers (transmitters), it is very difficult to obtain the optimal solution of the minimum cost coverage problem. Therefore, we consider the approximate optimal solution of this problem. In Section 4, we discuss the optimal deployment method of a single circle with width h. On this basis, we discuss the approximate optimal deployment method of the whole circular barrier with width H ( H h ) . Since the width H of whole circular barrier exceeds the coverage width of single BR circle barrier, we need multiple adjacent sub-circle barrier to cover the whole circular areas in a cooperative way.
Consider that the width of the waist coverage model of BR sensor is variable, and each sub-circle of the circular barrier coverage may have different coverage length and width, and different BRs’ placement sequence. Hence we need to further investigate the optimal sub-circle’s division and BR placement algorithm to achieve minimum cost placement of BR sensors on the whole circular barrier with predefined coverage quality. We first design a width equalization division strategy and BR placement algorithm for circular barrier. We analyze and validate effectiveness of the width equalization division strategy and algorithm by simulation experiments. Secondly, by analyzing the results of the experiment, we further propose an adaptive division strategy and approximate optimization BR placement algorithm for circular barrier. By comparing with the width equalization strategy and algorithm in simulation experiments, we validate the effectiveness of the adaptive division strategy and minimum cost placement BR deployment algorithm on the whole circular barrier with Width H and required coverage quality.
In this paper, we mainly consider the calculation of the coverage cost of the sensors when C T > C R , where C T represents the unit cost of transmitter and C R represents the unit cost of receiver.

5.1. Equal Circle width Division Strategy and BR Sensors Placement Algorithm

5.1.1. Equal width Circle Division and Optimal Placement Algorithm

For ease of understanding, we give a detailed pattern diagram, as shown in Figure 7. This strategy divides the circular barrier into q circles, and each of them has the same width. Due to different radius of each circle, we cannot use the same deployment sequence for all the circles. We first divide each circle separately, and apply the same deployment idea to analyze and calculate the specific radius of the circle to get the minimum coverage cost of each circle. We finally obtain the total cost of coverage with all the costs.
We need to determine the number of circles, i.e., q, and obtain value n in sequence P i n , which is the number of receivers. For the two parameters q and n, if the two parameters have a certain relationship, we can easliy use one of them to determine the other. However, we find that the two parameters are not related. Therefore, for the number of circle q and n, we design an exhaustive algorithm to enumerate q and n. By comparison, we can get the minimum coverage cost under meeting the conditions.
We find that the width of the circle exists the upper and lower bounds, so the number of circles also has a certain range. We mainly use the waist shape covering model to maintain the waist shape of the sensor, and we need to satisfy the following conditions: 2 l max < d ( T , R ) < 2 l max , then we get the constraint condition of the circle’s width is 0 < h < 2 l max . For the number of circles q, we can first determine H 2 l max < q . For the upper bound of q, in practice, we find that when h is reduced to a certain width while q is taken to an upper bound. Then, with the number of circles q increases, the optimal number of sensors continues to increase, resulting in cost increase. We set up this upper bound as μ , so there is H 2 l max < q < μ . After determining the constraints of the two parameters, the exhaustive algorithm can be used to calculate the minimum coverage cost.
We increase the number of circles from q = H 2 l max to q = μ 1 , each time by 1 unit. For each circle, we enumerate n and calculate the minimum coverage cost on each circle, then sum up them to get the global minimum coverage cost. Finally, we compare the minimum coverage cost in all cases so as to get the optimal solution. Here, we set the global minimum coverage cost as C t o t a l * , the optimal number of circles as q * . The specific calculation process is given in Algorithms 1 and 2, respectively.
Algorithm 1 Find q * and C t o t a l * When C T > C R
 1: Initialization: σ = φ , τ = φ , υ = φ , C t o t a l = 0
 2: for q H 2 l max : μ do
 3: for t 1 : q do
 4:  for n 1 : Q t do
 5:    h H / q
 6:    C n C o m p u t e ( n , h )
 7:    σ σ C n
 8:  end for
 9:   C t o t a l C t o t a l + min ( σ )
10:   σ . c l e a r ( )
11: end for
12:  τ τ q
13:  υ υ C t o t a l
14:  C t o t a l 0
15: end for
16: C t o t a l * min ( υ )
17: i n d e x υ . i n d e x ( C t o t a l * )
18: q * τ ( i n d e x )
Algorithm 2 C o m p u t e ( n , h ) Compute Cost When n and h are determined
 1: Initialization : M = 0 , N = 0 , R T = 0 , R R = 0 , L t = 0 , C o s t = 0
 2: for x 1 : 3 · 2 π C do
 3:  L t 2 π x · C + D
 4: if 2 θ 2 L t 2 a n 2 θ 2 then
 5:  Compute M and N, Compute RT and RR
 6:   M M + R T , N N + R R
 7:  break
 8: end if
 9: end for
10: C o s t = C T · M + C R · N
11: return C o s t

5.1.2. Experimental Result of the Equal Circle Width Division Strategy

In the simulation experiments, we set up the parameters of BR sensor network, as show in Table 2. l max 2 denotes the detectability threshold of BR sensors, and h denotes the width range of sub-barrier. q denotes the number of sub-barriers, which is determined by the perimeter barrier width H and the maximum coverage width of the single pair BR sensor. R m denotes the minimum inner radius of the perimeter barrier. Then C T denotes the unit price of the transmitter and C R denotes the price of the receiver. And λ denotes the SNR threshold of the perimeter barrier. The simulation experiments are performed on 64-bit Windows 10 system; Programming language is C++ and Python. The algorithms are realized in C++ language. And the deployment visualization of deployment results is realized in Python language.
Firstly, we consider the influence of the annulus barrier width H on the optimal number of circles q * , the optimal circle width h, and the minimum coverage cost C o s t . We find that with the increase of H, the larger the λ , the greater the q * will be. The bigger the λ , the smaller the C o s t will be. Then the bigger the λ , the smaller the h will be.
We enumerate the width of the annulus barrier from 1 to 20, increasing the width of one unit at a time, to observe the impact process respectively. As shown in Figure 8, we can find that the number of optimal circles q * increases with width H. In the Figure 8, we give three different unit costs of a sensor, where λ = C T C R , we set λ = 2 , 10 , 50 , respectively. It is observed that when H 12 , the curve of λ = 2.0 is almost the same as the curve of λ = 10.0 . But when λ = 50.0 , the value of q * is more than or equal to the other two. When 13 H 18 , the curve of λ = 10.0 is almost the same as the curve of λ = 50.0 . But when λ = 2.0 , the value of q * is less than or equal to the other two. This explains that under the same width H, when ratio λ increases, the number of optimal circles also increases. This is because the increase of unit cost λ means that receiver becomes cheaper, resulting the number of sensors increases and the circle’s width becomes smaller.
We now evaluate the impact of the annulus barrier width H on the minimum cover cost.
As shown in Figure 9. We observe that when H 4 , for the unit price ratio of different sensors, there is little difference in the cost required to cover. But when H 5 , with the increase of the unit price ratio, the difference of coverage cost is becoming more and more obvious. We observe that when the width of annulus barrier is determined, a larger unit cost ratio λ of a sensor implies a cheaper coverage cost. This can be explained by the fact that the larger λ is used, the smaller the unit cost of receiver is required. As a result, we have more number of receivers and less number of transmitters required, and hence the overall coverage cost is reduced. From this result, we conclude that under certain conditions, choosing a larger cost ratio λ to cover the barrier can save the coverage cost.
We also evaluate the impact of the annulus barrier width H on the width h of the circle. As shown in Figure 10, we observe that for a single function curve which the value of λ is detemined, the value of h appears to fluctuate up and down, for example, when λ = 50.0 , as shown in the green curve in the picture, h fluctuates between [1.0,2.0], but with the increase of the annulus barrier width H, the function value tends to converge to a fixed value and stables near 1.7. At the same time, we found that with different values of λ , the three function curves are similar, and h gradually stabilizes in the range of [1.7,1.9]. We also observe that the larger the λ is used, the smaller the h is obtained. Because the receiver is cheap, the amount of the receiver is much more, which makes the width h of the circle smaller, which is consistent with the performance in Figure 8.
Secondly, we evaluate the impact of the unit cost ratio λ on other parameters. The results are shown in Figure 11, Figure 12 and Figure 13. In Figure 11, we observe that the speed of the minimum coverage cost decreases the fastest with the unit cost ratio λ between 0 and 10. The greater the annulus barrier width results in less effective coverage costs. From Figure 12, we observe that when the annulus barrier width is different, the number of optimal circles q * increases gradually and tends to be stable as the unit cost ratio λ increases. In addition, the greater the width H of the barrier, the greater the value q * . In Figure 13, we find that as the unit price ratio λ increases, the value h decreases gradually, and also tends to a stable value. At the same time, the larger the width H of the barrier, the greater the width of the corresponding optimal circle.

5.1.3. Algorithm Analysis of the Equal Circle Width Division Strategy

In order to determine the approximate degree of the algorithm, we need to determine the lower bound of the theoretical optimal solution N * and the upper bound of the algorithm’s solution N. But through specific analysis, we find it difficult to prove.
When the unit price ratio λ and the barrier width H are determined, we need to find the cheapest set of sensors that meet the coverage conditions. In order to find the lower bounds of the theoretical optimal solution, we assume that the sensors’ coverage area does not overlap, but because of the following problems, it is difficult to determine the lower bounds. First, the coverage area of the BR sensor is determined by the transmitter and receiver. Secondly, the size of the coverage area is affected by the distance between the sensors. When the distance between the sensors is different, the size of the coverage area is different. Therefore, it is difficult for us to determine the distance between sensors and how many transmitters and receivers are needed, so it is difficult to calculate the price and determine the lower bound of N * .
For the upper bound of the algorithm’s solution, we need to consider the worst case. But in this paper, when the unit price ratio λ and the barrier width H are determined, the only minimum cost can be obtained according to the algorithm proposed by us. Therefore, there is no worst-case statement.
At the same time, we have given other barrier coverage strategies in the following section, and have carried out detailed experiments to compare, proving that there is a better solution.

5.2. Adaptive Circle Width Division Strategy and BR Sensors Placement Algorithm

By observing the experimental results in the width equalization strategy, we find that given the sensor parameters and SNR thresholds, with the increase in the width H of the annulus barrier, the optimal width h of the circle will gradually stabilize in the range of [1.7,1.9] for different cost ratio λ . Therefore, we choose the width of the circle in this interval, then define a new barrier coverage strategy: For an annulus barrier with width H, the barrier can be segmented with h x ( 1.7 h x 1.9 ) as the division unit. If H is a multiplier of h x , it is exactly divided; Otherwise, a circle with the width less than h x is left. We also follow the same experimental environment and calculation methods.

5.3. Experiment Result Comparison of Equal Division vs. Adaptive Division Strategy

The experimental results of the two strategies mentioned above are shown in Figure 14. At this time, the unit price ratio is λ = C T C T C R CR = 50.
We know that the adaptive placement strategy is from the analysis of experimental results on the equipartition placement strategy. In the simulation experiment of the equipartition placement strategy, we find that when the sensor parameters and the SNR threshold are determined, the optimal width h of circle is in the interval [1.7,1.9]. In the adaptive placement strategy, we use h x ( 1.7 h x 1.9 ) as a division unit. In order to explore the effects of h x on the results of the experiment, we have also done a comparative experiment.
We take different values of h x to experiment in the interval [1.7,1.9], and compare with the result of the equipartition placement strategy. As shown in Figure 14, We find that when the annulus barrier width H 5 , for different h x , the experimental results are generally similar, and it is also similar to the equipartition placement strategy. However, as shown in Figure 15, with the increase of the annulus barrier width H, the influence of the h x on the effect of the experiment is good and bad, and there is no obvious rule. But it is better than the equipartition placement strategy.

6. Conclusions

In this paper, we studied the minimum cost BR sensor placement algorithm to construct a circular BR coverage with a predefined breadth and detection threshold. First, we investigate the Cassini oval sensing models and discuss a variety of barrier coverage cases. We discovered and proved the optimized BR placement patterns and sequence on a circular ring. Second, we further studied the optimal BR placement on a circular barrier with a predefined breadth. We proposed two division strategies, circular equipartition strategy and an adaptive segmentation strategy, to segment an annulus ring to several adjacent sub-rings with appropriate width so as to ensure the minimum cost annulus BR barrier coverage with required detection threshold. Finally, we proposed optimal placement algorithms for minimum cost placement of BR sensor for annulus barrier coverage with required width and detection threshold. We validated the effectiveness of the proposed algorithms through extensive simulation experiments.
In our paper, we proposed an approximate optimal solution that mainly adopts the circular transverse sensor deployment method. In the future works, we will further study more complex longitudinal sensor placement method to optimize the bistatic radar sensors deployment. Second, we will consider to investigating the deployment problems in the heterogeneous bistatic radar sensor network. Third, the fault-tolerant problem in perimeter barrier deployment is also worth to study for high reliable coverage.

Author Contributions

This paper was prepared through a collective effort of all of the authors. In particular: C.Z. has contributed the objective function definition, the constraints definition, performed the simulations, the analysis of the results, the preparation of the diagrams and figures and the preparation of the text; X.X. has contributed the concept of the research, the state-of-the-art and references, as well as the optimization algorithm concept; T.Y. and T.G. has contributed the interpretation of the simulation results, the description of the optimization algorithm, the formal definition of the optimization problem.

Funding

This work is supported by the Key Science-Technology Program of Zhejiang Province, China (2017C01065) and the National Natural Science Foundation of China (61370087).

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Proof of Theorem 1.
As shown in Figure A1, the coverage area of the BR sensor is surrounded by the Cassini oval line, and it is symmetrical. The perpendicular bisector of the line segment T R ¯ cross the regional boundary in point X and point X . We know that if a point A can be detected by sensors, it is necessary to satisfy the condition T A · R A l max 2 . The point X is on the border of the covering area, so there has T X · R X = l max 2 , equivalenting to K T X 2 · R X 2 = ε . In the same way, the point X also satisfies this condition. □
Figure A1. The schematic diagram of the Theorem 1.
Figure A1. The schematic diagram of the Theorem 1.
Sensors 19 00225 g0a1
Figure A2. The schematic diagram of θ 1 in Theorem 2.
Figure A2. The schematic diagram of θ 1 in Theorem 2.
Sensors 19 00225 g0a2
Figure A3. The schematic diagram of θ 2 in Theorem 2.
Figure A3. The schematic diagram of θ 2 in Theorem 2.
Sensors 19 00225 g0a3
Proof of Theorem 2.
For the sequence P i n , we are used ( 2 θ 1 , 2 θ 2 , , 2 θ n + 1 ) to represent the combination of its center angle, where θ 1 = 1 2 T i O R 1 , θ 2 = 1 2 R 1 O R 2 , …, θ n = 1 2 R n 1 O R n , θ n + 1 = 1 2 R n O T i + 1 . Here we define the angle sum of a single covering sequence as S u m = i = 1 n + 1 2 θ i . In the worst case, we only need to use a single covering sequence to cover the circle, so S u m = 2 π , but normally, S u m < 2 π . Therefore, i = 1 n + 1 2 θ i 2 π . Due to the particularity of circle and the Cassini oval, the sensors sequence P i n is symmetrical, on the axis symmetry of the center line of the circular arc ^ T i T i + 1 . As a result, there has the following properties: (1) if n is odd, then θ 1 = θ n + 1 , θ 2 = θ n , …, θ n + 1 2 = θ n + 1 2 + 1 ; (2) if n is even, then θ 1 = θ n + 1 , θ 2 = θ n , …, θ n 2 = θ n 2 + 2 , θ n 2 + 1 = θ n 2 + 1 . Next, we give the specific calculation of the angle θ i .
For θ 1 , as shown in Figure A2, we have proved that the covering model of waist shape can best meet our coverage requirements. Next, we will determine the angle θ 1 . We have got the detectability of the point X 1 , it is l max 2 . We know T 1 X 1 = R 1 X 1 , T 1 O X 1 = R 1 O X 1 = θ 1 , Δ T 1 O X 1 Δ R 1 O X 1 ( S S S ) , the signal-to-noise ratio of the point X 1 is ε , then we can list the equation K T 1 X 1 2 · R 1 X 1 2 = ε . Introducing the concept of the detectability, it can be reduced to:
T 1 X 1 · R 1 X 1 = T 1 X 1 2 = l max 2
then using the cosine equation we can obtain the following equation:
T 1 X 1 2 = T 1 O 2 + X 1 O 2 2 T 1 O · X 1 O cos θ 1
Jointing Equations (6) and (7), we can get: θ 1 = arccos r 2 + R max 2 l max 2 2 r R max . We guarantee that 0 r 2 + R max 2 l max 2 2 r R max < 1 , otherwise, the coverage will be meaningless.
For θ 2 , as shown in Figure A3, we found that the cover model which constituted by the second receiver R 2 and the transmitter T 1 can be the waist shaped or two separate parts, as shown in Figure 1a,c in the paper. In order not to lose the generality, we assume that the model T 1 R 2 is two separate parts. Then let’s give the location of the receiver R 2 .
As shown in Figure A3, the coverage area of the sensor T 1 R 1 intersects with the circle at point X 2 . In order to meet the coverage, the coverage area of the sensor T 1 R 2 should intersect with the former at the point X 2 . At this point, we can get the signal-to-noise ratio of X 2 is ε , the detectability is l max 2 , so we have the equation T 1 X 2 · R 1 X 2 = l max 2 , T 1 X 2 · R 2 X 2 = l max 2 , and we can get R 1 X 2 = R 2 X 2 . At the same time, we get Δ R 1 O X 2 Δ R 2 O X 2 ( S S S ) , R 1 O X 2 = R 2 O X 2 = θ 2 . We know that the detectability at the point X 2 is l max 2 , then get T 1 X 2 · R 1 X 2 = l max 2 , using the cosine theorem can get T 1 X 2 2 = r 2 + R max 2 2 r R max · cos ( 2 θ 1 + θ 2 ) , R 1 X 2 2 = r 2 + R max 2 2 r R max · cos θ 2 . Then taking the two equation into the upper, it can be reduced to:
4 r 2 R max 2 cos 2 ( θ 1 + θ 2 ) 4 r R · ( r 2 + R max 2 ) · cos θ 1 · cos ( θ 1 + θ 2 ) + 4 r 2 R max 2 ( cos 2 θ 1 1 ) + ( r 2 + R max 2 ) 2 l max 4 = 0
For solving this equation, at first, we assume that the left of the equation is two polynomial functions f, the independent variable is cos ( θ 1 + θ 2 ) . In the previous paper, we have got i = 1 n + 1 2 θ i 2 π , then i = 1 n + 1 θ i π . Because cos ( θ 1 + θ 2 ) monotonous decreasing in the interval [ 0 , π ] , the independent variable decreases monotonously in the interval [ 0 , π ] . We can get the symmetric axis of function f is x m = ( r 2 + R max 2 ) cos θ 1 2 r R max , and we can get x m > cos θ 1 , so there has x m > cos θ 1 > cos ( θ 1 + θ 2 ) , it is that in the solution of the equation f = 0 , the solution we need is on the left of the symmetric axis. Then combined with the Equation (8), we can get:
Δ = ( R max + r ) 2 ( R max r ) 2 ( cos 2 θ 1 1 ) + l 4
x 1 = ( R max 2 + r 2 ) cos θ 1 + ( R max + r ) 2 ( R max r ) 2 ( cos 2 θ 1 1 ) + l 4 2 r R max
x 2 = ( R max 2 + r 2 ) cos θ 1 ( R max + r ) 2 ( R max r ) 2 ( cos 2 θ 1 1 ) + l 4 2 r R max
We take x 2 = cos ( θ 1 + θ 2 ) . We ensure Δ > 0 , it is l max 4 > ( R max + r ) 2 · ( R max r ) 2 · ( 1 cos 2 θ 1 ) , at the same time, we ensure 1 < x 2 < 1 . In summary, we get:
θ 2 = arccos ( R max 2 + r 2 ) cos θ 1 ( R max + r ) 2 ( R max r ) 2 ( cos 2 θ 1 1 ) + l max 4 2 r R max θ 1
For θ 3 , at the same as θ 2 . We can get R 2 X 3 = R 3 X 3 , Δ R 2 O X 3 = Δ R 3 O X 3 ( S S S ) , R 2 O X 3 = R 3 O X 3 = θ 3 , the detectability of X 3 is l max 2 , T 1 X 3 · R 2 X 3 = l max 2 , joints all, we can get:
Δ = ( R max + r ) 2 ( R max r ) 2 [ cos 2 ( θ 1 + θ 2 ) 1 ] + l max 4
x 3 = ( R max 2 + r 2 ) cos ( θ 1 + θ 2 ) ( R max + r ) 2 ( R max r ) 2 [ cos 2 ( θ 1 + θ 2 ) 1 ] + l max 4 2 r R max
We ensure Δ > 0 , 1 < x 3 < 1 , so we get:
θ 3 = arccos ( R max 2 + r 2 ) cos ( θ 1 + θ 2 ) ( R max + r ) 2 ( R max r ) 2 [ cos 2 ( θ 1 + θ 2 ) 1 ] + l max 4 2 r R ( θ 1 + θ 2 )
In the same way, analogous, we can get from θ 4 to θ n .
By observing, we can draw the rule, so we get θ i , i > 1 , it is:
θ i = arccos ( R max 2 + r 2 ) cos i = 1 x 1 θ i ( R max + r ) 2 ( R max r ) 2 ( cos 2 i = 1 x 1 θ i 1 ) + l max 4 2 r R max i = 1 x 1 θ i , i > 1
To sum up, we give the calculation equation of the center angle θ . □
Proof of Theorem 3.
Figure A4 gives a partial schematic diagram of the sequence P i n . We assume point X as the intersection of the sensors’ coverage area and the circle boundary. We found that with the increase of the number of receivers, the coverage area of single sensor decreases continuously, and the point X is more and more close to the outside boundary of the circle. When n is taken to the maximum value n max , the coverage area of the sensors is tangent to the outer boundary of the circle at the point X, and the connection between the point O and the point X is over the point R n at this time. Assume that T 1 O X = θ max , it is obvious that the maximum center angle of the sequence P i n is 2 θ max .
At the same time, the detectability of the point X is l max 2 , so there has T 1 X · R n X = l max 2 . Using the cosine theorem, we can get T 1 X 2 = T 1 O 2 + X O 2 2 T 1 O · X O · cos θ max . Jointing all, we can get θ max = arccos ( R max 2 + r 2 ) · ( R max r ) 2 l max 4 2 r R max · ( R max r ) 2 . Theorem 2 gives the concept of the center angle of the circle, so we get i = 1 n max + 1 2 θ i = 2 θ max . We can calculate the angle θ i in turn, until the sum is equal to 2 θ max , then the n at this moment is the largest number of receivers n max . □
Figure A4. The schematic diagram of n max in Theorem 3.
Figure A4. The schematic diagram of n max in Theorem 3.
Sensors 19 00225 g0a4
Proof of Theorem 4.
In the paper, we use 2 X 3 K 3 as the approximation length of the line segment X 3 X 3 ¯ and as the effective coverage width. Here we extend the value n to n max , and give the calculation equation of effective coverage width.
For the sensor pair T 1 R 1 , as shown in Figure A5, we connect the point T 1 and the point R 1 . We have obtained T 1 O X 1 = R 1 O X 1 = θ 1 , so Δ T 1 O K 1 Δ R 1 O K 1 ( S A S ) . Therefore, there has R 1 K 1 O = T 1 K 1 O = 90 , R 1 K 1 = T 1 K 1 , so we can know that the line X 1 O is the perpendicular bisector of the line segment T 1 R 1 ¯ , and can get X 1 K 1 = R max r · cos θ 1 further. At the same time, we have T 1 X 1 · R 1 X 1 = l max 2 , T 1 X 1 · R 1 X 1 = l max 2 , T 1 X 1 = R 1 X 1 , T 1 X 1 = R 1 X 1 , so we can get T 1 X 1 = T 1 X 1 , and the quadrilateral T 1 X 1 R 1 X 1 is a diamond, so X 1 X 1 = 2 X 1 K 1 = d 1 = 2 ( R max r · cos θ 1 ) . Here, the two times value just equal to the actual coverage width, because there has X n X n 2 X n K n .
For the sensor pair T 1 R 2 , as shown in Figure A6, similarly, we can get that the line X 2 O is the perpendicular bisector of the line segment R 1 R 2 ¯ , then we prove the point X 2 is on the line X 2 O , that is X 2 , X 2 , O, three points are collinear. We know that the detectability of the point X 2 is l max 2 , so T 1 X 2 · R 1 X 2 = l max 2 , T 1 X 2 · R 2 X 2 = l max 2 . We get R 1 X 2 = R 2 X 2 , it is that the point X 2 is on the perpendicular bisector of the line segment R 1 R 2 ¯ . Because the line X 2 O is the perpendicular bisector of the line segment R 1 R 2 ¯ , the point X 2 is on the line X 2 O , the point X 2 , X 2 , O are collinear. At the same time, we can get T 1 X 2 > T 1 X 2 , also because of T 1 X 2 · R 1 X 2 = l max 2 , T 1 X 2 · R 1 X 2 = l max 2 , we can get R 1 X 2 < R 1 X 2 , K 2 X 2 > K 2 X 2 , X 2 X 2 > 2 X 2 K 2 = d 2 = 2 ( R max r · cos θ 2 ) .
In the same way, Calculating the d i in turn, we can get the induction d n = 2 ( R r · cos θ n 2 + 1 ) , 1 n n max . □
Figure A5. The width of T 1 R 1 in Theorem 4.
Figure A5. The width of T 1 R 1 in Theorem 4.
Sensors 19 00225 g0a5
Figure A6. The width of T 1 R 2 in Theorem 4.
Figure A6. The width of T 1 R 2 in Theorem 4.
Sensors 19 00225 g0a6
Proof of Theorem 5.
In Theorem 4, we have given the effective coverage width of the sequence P i n and get the actual coverage width X n X n 2 X n K n = d n . To prove the reliability of the coverage, we only need to prove d n > h , where h is the width of the circle.
We found that the expression of the two times value is d n = 2 ( R max r · cos θ n 2 + 1 ) , the width of the circle is h = 2 ( R max r ) , then there has d n h = 2 r · ( 1 cos θ n 2 + 1 ) > 0 , so we can get the two times value meets the requirements.
Proof of Theorem 6.
As shown in Figure A7, we connect the point O and the point X 0 , intersects the inner boundary of the circle at the point P. It is visible that the line segment X 0 P ¯ is in the circle, and we use this line segment as the starting position of the sum of the center angle.
For the sequence P i 1 , first of all, due to the symmetry of the covering area, we can get X 0 O T 1 = X 2 O R 1 = θ 2 , and the center angle X 0 O X 2 = 2 ( 2 θ 1 + θ 2 ) , it is that the coverage length is L 1 = 2 r · ( 2 θ 1 + θ 2 ) .
For the sequence P i 2 , we can also get the coverage length L 2 = 2 r · ( 2 θ 1 + θ 2 + θ 2 ) .
For the sequence P i 3 , the coverage length is L 3 = 2 r · ( 2 θ 1 + 2 θ 2 + θ 2 ) .
For the sequence P i 4 , the coverage length is L 4 = 2 r · ( 2 θ 1 + 2 θ 2 + θ 3 + θ 2 ) .
Calculate in turn.
For the sequence P i n , the coverage length can becalculated as Equation 9. □
Figure A7. The schematic diagram of the effective coverage length in Theorem 6.
Figure A7. The schematic diagram of the effective coverage length in Theorem 6.
Sensors 19 00225 g0a7
Proof of Theorem 7.
For the sequence S = ( T 1 , R n 1 , T 2 , R n 2 , T 3 ) in the paper, n 1 is odd, n 2 is even, and we can calculate the center angle of its coverage is
ψ 1 = 2 2 i = 1 n 1 + 1 2 θ i + 2 i = 1 n 2 2 θ i + θ n 2 2 + 1 + θ 2 = 2 4 i = 1 n 2 2 θ i + θ n 2 2 + 1 + θ 2 , n 2 n 1 = 1 2 4 i = 1 n 1 + 1 2 θ i + 2 i = n 1 + 1 2 + 1 n 2 2 θ i + θ n 2 2 + 1 + θ 2 , n 2 n 1 > 1 .
For the sequence S = ( T 1 , R n 1 + n 2 1 2 , T 2 , R n 1 + n 2 + 1 2 , T 3 ) , we categorize:
(1)
When n 2 n 1 = 1 , n 1 + n 2 1 2 is odd, n 1 + n 2 + 1 2 is even, we can get:
ψ 2 = 2 2 i = 1 n 1 + n 2 + 1 4 θ i + 2 i = 1 n 1 + n 2 + 1 4 θ i + θ n 1 + n 2 + 1 4 + 1 + θ 2 = 2 4 i = 1 n 1 + n 2 + 1 4 θ i + θ n 1 + n 2 + 1 4 + 1 + θ 2 = 2 4 i = 1 n 2 2 θ i + θ n 2 2 + 1 + θ 2
At this point, ψ 1 = ψ 2 .
(2)
When n 2 n 1 > 1 , n 1 + n 2 1 2 may be odd or even, so we continue to categorize.
a. If n 1 + n 2 1 2 is odd, n 1 + n 2 + 1 2 is even, then we can get
ψ 2 = 2 4 i = 1 n 1 + n 2 + 1 4 θ i + θ n 1 + n 2 + 5 4 + θ 2 .
And then we compare ψ 1 and ψ 2 :
ψ 2 ψ 1 = 2 4 i = 1 n 1 + n 2 + 1 4 θ i + θ n 1 + n 2 + 5 4 + θ 2 2 4 i = 1 n 1 + 1 2 θ i + 2 i = n 1 + 1 2 + 1 n 2 2 θ i + θ n 2 2 + 1 + θ 2 = 2 4 i = n 1 + 1 2 + 1 n 1 + n 2 + 1 4 θ i 2 i = n 1 + 1 2 + 1 n 2 2 θ i + θ n 1 + n 2 + 5 4 θ n 2 2 + 1 = 2 2 i = n 1 + 1 2 + 1 n 1 + n 2 + 1 4 θ i A 2 i = n 1 + n 2 + 5 4 n 2 2 θ i B + θ n 1 + n 2 + 5 4 C θ n 2 2 + 1 D
Because n 1 + 1 2 < n 1 + n 2 + 1 4 , so we get the second step, at the same time, n 1 + n 2 + 1 4 < n 2 2 , so, we get the last step. We see that in the last step, it contains A, B, C, D, four parts, only need to compare the size of the four parts can judge the size of ψ 1 and ψ 2 . We get n 1 + n 2 + 1 4 n 1 + 1 2 + 1 = n 2 n 1 5 4 , n 2 2 n 1 + n 2 + 5 4 = n 2 n 1 5 4 . Therefore, the A and B contain the same number of angles. At the same time, Theorem 2 gets the value of the angle θ i , and we can find that θ i decreases with i increase. Compared to the first angle of A and B, we get n 1 + 1 2 + 1 n 1 + n 2 + 5 4 = n 1 n 2 4 < 0 , that is θ n 1 + 1 2 + 1 > θ n 1 + n 2 + 5 4 . Compared to the last angle of A and B, we get n 1 + n 2 + 1 4 n 2 2 = n 1 n 2 + 1 4 < 0 , so A > B . We can also get n 1 + n 2 + 5 4 n 2 2 + 1 = n 1 n 2 + 1 4 < 0 , so C > D . In summary, ψ 2 > ψ 1 .
b. When n 1 + n 2 1 2 is even, n 1 + n 2 + 1 2 is odd, then we get
ψ 2 = 2 2 i = 1 n 1 + n 2 + 3 4 θ i + 2 i = 1 n 1 + n 2 1 4 θ i + θ n 1 + n 2 1 4 + 1 + θ 2 = 2 4 i = 1 n 1 + n 2 + 3 4 θ i θ n 1 + n 2 + 3 4 + θ 2
We also compare ψ 1 and ψ 2 :
ψ 2 ψ 1 = 2 4 i = 1 n 1 + n 2 + 3 4 θ i θ n 1 + n 2 + 3 4 + θ 2 2 4 i = 1 n 1 + 1 2 θ i + 2 i = n 1 + 1 2 + 1 n 2 2 θ i + θ n 2 2 + 1 + θ 2 = 2 4 i = n 1 + 1 2 + 1 n 1 + n 2 + 3 4 θ i θ n 1 + n 2 + 3 4 2 i = n 1 + 1 2 + 1 n 2 2 θ i θ n 2 2 + 1 = 2 4 i = n 1 + 1 2 + 1 n 1 + n 2 1 4 θ i + 3 θ n 1 + n 2 + 3 4 2 i = n 1 + 1 2 + 1 n 2 2 θ i θ n 2 2 + 1 = 2 2 i = n 1 + 1 2 + 1 n 1 + n 2 1 4 θ i + 3 θ n 1 + n 2 + 3 4 2 i = n 1 + n 2 4 + 3 n 2 2 θ i θ n 2 2 + 1 = 2 2 i = n 1 + 1 2 + 1 n 1 + n 2 1 4 θ i A 2 i = n 1 + n 2 + 3 4 + 1 n 2 2 θ i B + θ n 1 + n 2 + 3 4 C θ n 2 2 + 1 D
Similarly, because of n 1 + n 2 + 3 4 n 1 + 1 2 = n 1 n 1 + 1 4 > 0 , we get the second step, at the same time, because of n 1 + n 2 1 4 n 2 2 = n 1 n 2 1 4 < 0 , we get the fourth step. Also because of n 1 + n 2 1 4 n 1 + 1 2 + 1 = n 2 2 n 1 + n 2 + 3 4 + 1 , so A and B contain the same number of angles. Because of n 1 + 1 2 + 1 < n 1 + n 2 + 3 4 + 1 , n 1 + n 2 1 4 < n 2 2 , so A > B . Also because of n 1 + n 2 + 3 4 < n 2 2 + 1 , so C > D . In summary, ψ 2 > ψ 1 .
In summary, when n 2 n 1 > 1 , ψ 2 > ψ 1 . □
Proof of Theorem 8.
We consider the boundary problem, and we need to determine how many receivers are needed to assist the remainder of the circle. First, we need to calculate the size of the circle region which the sequence T i R k T i + 1 can cover. In theorem 6, we give the related calculation methods and formulae. Here we consider the overlap case of the coverage area, and give the results after simple calculation.
When k = 0 , a 0 = 0 ;
When k = 1 , a 1 = 2 θ 1 ;
When k = 2 , a 2 = 2 θ 1 + θ 2 ;
In turn, it can be concluded that the induction is as Equation (10).
Assume that the radian of the reminder arc is L t , we consider the case of overlapping and calculate the size of the circle region which the sequence T i R k T i + 1 can cover, it is a k . Then by comparison, the number of the receivers which are used to the boundary problems can be determined, that is (1) if 2 θ 2 L t 0 , it does not need the extra receiver; (2) if 0 < L t 2 a n 2 θ 2 , then the x sequences can not meet the coverage requirements, the remaining number of receivers are determined by the following equation: if 2 a k 1 < L t + 2 θ 2 2 a k , it needs k receivers. □

References

  1. Liu, B.; Dousse, O.; Wang, J.; Saipulla, A. Strong barrier coverage of wireless sensor networks. In Proceedings of the ACM Interational Symposium on Mobile Ad Hoc NETWORKING and Computing, MOBIHOC 2008, Hong Kong, China, 26–30 May 2008; pp. 411–420. [Google Scholar]
  2. Yildiz, E.; Akkaya, K.; Sisikoglu, E.; Sir, M.Y. Optimal Camera Placement for Providing Angular Coverage in Wireless Video Sensor Networks. IEEE Trans. Comput. 2014, 63, 1812–1825. [Google Scholar] [CrossRef]
  3. Ammari, H.M.; Das, S.K. Centralized and Clustered k-Coverage Protocols for Wireless Sensor Networks. IEEE Trans. Comput. 2011, 61, 118–133. [Google Scholar] [CrossRef]
  4. Wang, B.; Xu, H.; Liu, W.; Liang, H. A Novel Node Placement for Long Belt Coverage in Wireless Networks. IEEE Trans. Comput. 2013, 62, 2341–2353. [Google Scholar] [CrossRef]
  5. Saipulla, A.; Westphal, C.; Liu, B.; Wang, J. Barrier coverage with line-based deployed mobile sensors. Ad Hoc Netw. 2013, 11, 1381–1391. [Google Scholar] [CrossRef]
  6. Chen, J.; Wang, B.; Liu, W. Constructing Perimeter Barrier Coverage With Bistatic Radar Sensors. J. Network Comput. Appl. 2015, 57, 129–141. [Google Scholar] [CrossRef]
  7. Wang, B.; Chen, J.; Liu, W.; Yang, L.T. Minimum Cost Placement of Bistatic Radar Sensors for Belt Barrier Coverage. IEEE Trans. Comput. 2016, 65, 577–588. [Google Scholar] [CrossRef]
  8. Chang, H.Y.; Kao, L.; Chang, K.P.; Chen, C. Fault-Tolerance and Minimum Cost Placement of Bistatic Radar Sensors for Belt Barrier Coverage. In Proceedings of the International Conference on Network and Information Systems for Computers, Barcelona, Spain, 20–22 December 2017; pp. 1–7. [Google Scholar]
  9. Ammari, H.M. A Unified Framework for K-Coverage and Data Collection in Heterogeneous Wireless Sensor Networks. J. Parallel Distrib. Comput. 2016, 89, 37–49. [Google Scholar] [CrossRef]
  10. Rahman, M.O.; Razzaque, M.A.; Hong, C.S. Probabilistic Sensor Deployment in Wireless Sensor Network: A New Approach. In Proceedings of the International Conference on Advanced Communication Technology, Phoenix Park, Korea, 12–14 February 2007; pp. 1419–1422. [Google Scholar]
  11. Lu, Z.; Li, W.W.; Pan, M. Maximum Lifetime Scheduling for Target Coverage and Data Collection in Wireless Sensor Networks. IEEE Trans. Veh. Technol. 2015, 64, 714–727. [Google Scholar] [CrossRef]
  12. Kim, H.; Kim, D.; Li, D.; Kwon, S.S.; Tokuta, A.O.; Cobb, J.A. Maximum lifetime dependable barrier-coverage in wireless sensor networks. Ad Hoc Netw. 2016, 36, 296–307. [Google Scholar] [CrossRef]
  13. Kumar, S.; Lai, T.H.; Arora, A. Barrier Coverage with Wireless Sensors; Springer Inc.: New York, NY, USA, 2007; pp. 817–834. [Google Scholar]
  14. Chen, A.; Kumar, S.; Lai, T.H. Local Barrier Coverage in Wireless Sensor Networks. IEEE Trans. Mob. Comput. 2010, 9, 491–504. [Google Scholar] [CrossRef]
  15. Tao, D.; Tang, S.; Zhang, H.; Mao, X.; Ma, H. Strong barrier coverage in directional sensor networks. Comput. Commun. 2012, 35, 895–905. [Google Scholar] [CrossRef]
  16. Zorbas, D.; Razafindralambo, T. Prolonging network lifetime under probabilistic target coverage in wireless mobile sensor networks. Comput. Commun. 2013, 36, 1039–1053. [Google Scholar] [CrossRef]
  17. Cheng, C.F.; Tsai, K.T. Distributed Barrier Coverage in Wireless Visual Sensor Networks With β-QoM. IEEE Sens. J. 2012, 12, 1726–1735. [Google Scholar] [CrossRef]
  18. Liu, L.; Zhang, X.; Ma, H. Exposure-Path Prevention in Directional Sensor Networks Using Sector Model Based Percolation. In Proceedings of the IEEE International Conference on Communications, Dresden, Germany, 14–18 June 2009; pp. 1–5. [Google Scholar]
  19. Gong, X.; Zhang, J.; Cochran, D.; Xing, K. Barrier coverage in bistatic radar sensor networks: Cassini oval sensing and optimal placement. In Proceedings of the Fourteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, Bangalore, India, 29 July–1 August 2013; pp. 49–58. [Google Scholar]
  20. Tang, L.; Gong, X.; Wu, J.; Zhang, J. Target Detection in Bistatic Radar Networks: Node Placement and Repeated Security Game. IEEE Trans. Wirel. Commun. 2013, 12, 1279–1289. [Google Scholar] [CrossRef]
  21. Kim, H.; Ben-Othman, J. HeteRBar: Construction of Heterogeneous Reinforced Barrier in Wireless Sensor Networks. IEEE Commun. Lett. 2017, 21, 1859–1862. [Google Scholar] [CrossRef]
  22. Han, R.; Yang, W.; Zhang, L. Achieving Crossed Strong Barrier Coverage in Wireless Sensor Network. Sensors 2018, 18, 534. [Google Scholar] [CrossRef] [PubMed]
  23. Kim, H.; Ben-Othman, J.; Cho, S.; Mokdad, L. On Virtual Emotion Barrier in Internet of Things. In Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018; pp. 1–6. [Google Scholar]
  24. Wang, G.; Cao, G.; La Porta, T. A Bidding Protocol for Deploying Mobile Sensors. In Proceedings of the IEEE International Conference on Network Protocols, Atlanta, GA, USA, 4–7 November 2003; pp. 315–324. [Google Scholar]
  25. Silvestri, S. MobiBar: Barrier Coverage with Mobile Sensors. In Proceedings of the Global Telecommunications Conference, Kathmandu, Nepal, 5–9 December 2011; pp. 1–6. [Google Scholar]
  26. Kong, L.; Liu, X.; Li, Z.; Wu, M.Y. Automatic Barrier Coverage Formation with Mobile Sensor Networks. In Proceedings of the IEEE International Conference on Communications, Cape Town, South Africa, 23–27 May 2010; pp. 1–5. [Google Scholar]
  27. Kim, H.; Oh, H.; Bellavista, P.; Ben-Othman, J. Constructing Event-driven Partial Barriers with Resilience in Wireless Mobile Sensor Networks. J. Netw. Comput. Appl. 2017, 82, 77–92. [Google Scholar] [CrossRef]
  28. Wang, Z.; Chen, H.; Cao, Q.; Qi, H.; Wang, Z.; Wang, Q. Achieving location error tolerant barrier coverage for wireless sensor networks. Comput. Netw. Int. J. Comput. Telecommun. Netw. 2017, 112, 314–328. [Google Scholar] [CrossRef]
  29. Willis, N.J.; Griffiths, H.D. Advances in bistatic radar (Willis, N.J. and Griffiths, H.D., Eds.; 2007) [Book Review]. IEEE Aerosp. Electron. Syst. Mag. 2008, 23, 46. [Google Scholar] [CrossRef]
  30. Liang, J.; Liang, Q. Orthogonal Waveform Design and Performance Analysis in Radar Sensor Networks. In Proceedings of the Military Communications Conference, MILCOM, Washington, DC, USA, 23–25 October 2006; pp. 1–6. [Google Scholar]
  31. Ly, H.D.; Liang, Q. Collaborative Multi-Target Detection in Radar Sensor Networks. In Proceedings of the IEEE Military Communications Conference, MILCOM 2007, Orlando, FL, USA, 29–31 October 2007; pp. 1–7. [Google Scholar]
  32. Yang, Q.; He, S.; Chen, J. Energy-efficient area coverage in bistatic radar sensor networks. In Proceedings of the IEEE Global Communications Conference, London, UK, 8–12 June 2015; pp. 280–285. [Google Scholar]
Figure 1. (a) d ( T , R ) > 2 l max ; (b) d ( T , R ) = 2 l max ; (c) 2 l max < d ( T , R ) < 2 l max ; (d) 0 < d ( T , R ) < 2 l max .
Figure 1. (a) d ( T , R ) > 2 l max ; (b) d ( T , R ) = 2 l max ; (c) 2 l max < d ( T , R ) < 2 l max ; (d) 0 < d ( T , R ) < 2 l max .
Sensors 19 00225 g001
Figure 2. (a) The monitoring area D and the annulus barrier coverage P of width H; (b) A deployment scheme the monitoring area D, the annulus barrier coverage P, solid circle represents transmitter and triangle represents receiver.
Figure 2. (a) The monitoring area D and the annulus barrier coverage P of width H; (b) A deployment scheme the monitoring area D, the annulus barrier coverage P, solid circle represents transmitter and triangle represents receiver.
Sensors 19 00225 g002
Figure 3. A deployment scheme of circle: The monitoring area D, solid circle represents Bistatic Radar (BR) transmitter and triangle represents BR receiver.
Figure 3. A deployment scheme of circle: The monitoring area D, solid circle represents Bistatic Radar (BR) transmitter and triangle represents BR receiver.
Sensors 19 00225 g003
Figure 4. Solid circle represents BR transmitter and triangle represents BR receiver. (a) The sensor location schematic diagram (waist); (b) The sensor location schematic diagram (ellipse).
Figure 4. Solid circle represents BR transmitter and triangle represents BR receiver. (a) The sensor location schematic diagram (waist); (b) The sensor location schematic diagram (ellipse).
Sensors 19 00225 g004
Figure 5. The deployment scheme of T 1 R 4 T 2 : (a) The center angle; (b) The effective coverage width.
Figure 5. The deployment scheme of T 1 R 4 T 2 : (a) The center angle; (b) The effective coverage width.
Sensors 19 00225 g005
Figure 6. (a) The effective coverage length; (b) The overlay boundary.
Figure 6. (a) The effective coverage length; (b) The overlay boundary.
Sensors 19 00225 g006
Figure 7. The schematic diagram of the width equalization strategy: (1) The barrier consists of three sub-barriers; (2) The deployment patterns of each sub-barrier are T i R 4 T i + 1 , T i R 4 T i + 1 and T i R 3 T i + 1 , respectively; (3) Solid circle represents BR transmitter and triangle represents BR receiver.
Figure 7. The schematic diagram of the width equalization strategy: (1) The barrier consists of three sub-barriers; (2) The deployment patterns of each sub-barrier are T i R 4 T i + 1 , T i R 4 T i + 1 and T i R 3 T i + 1 , respectively; (3) Solid circle represents BR transmitter and triangle represents BR receiver.
Sensors 19 00225 g007
Figure 8. The influence of width H on the number of optimal circles q * .
Figure 8. The influence of width H on the number of optimal circles q * .
Sensors 19 00225 g008
Figure 9. The influence of width H on the minimum coverage cost.
Figure 9. The influence of width H on the minimum coverage cost.
Sensors 19 00225 g009
Figure 10. The influence of width H on the optimal width h of circle.
Figure 10. The influence of width H on the optimal width h of circle.
Sensors 19 00225 g010
Figure 11. The relationship between the unit price ratio λ and the minimum coverage cost.
Figure 11. The relationship between the unit price ratio λ and the minimum coverage cost.
Sensors 19 00225 g011
Figure 12. The relationship between the unit price ratio λ and the number of optimal circle q * .
Figure 12. The relationship between the unit price ratio λ and the number of optimal circle q * .
Sensors 19 00225 g012
Figure 13. The relationship between the unit price ratio λ and the optimal width h of circle.
Figure 13. The relationship between the unit price ratio λ and the optimal width h of circle.
Sensors 19 00225 g013
Figure 14. Comparison when 1 H 10 .
Figure 14. Comparison when 1 H 10 .
Sensors 19 00225 g014
Figure 15. Comparison when 10 H 20 .
Figure 15. Comparison when 10 H 20 .
Sensors 19 00225 g015
Table 1. Symbols and descriptions.
Table 1. Symbols and descriptions.
SymbolsDescriptions
T i ( R j ) The ith BR transmitter (jth receiver)
HThe width of circular barrier coverage
ε The detection threshold of SNR
l ( A ) The detectability of A
l max The maximum threshold
d ( T , R ) The distance between T and R
C T ( C R ) The unit price of BR transmitter(receiver)
M ( N ) The number of BR transmitter(receiver)
qThe number of circles
SThe deployment sequence of BR sensors
P i n The optimal deployment sequence of BRs
hThe width of circle
R min The inner radius of circle
R max The outer radius of circle
r R min + R max 2
θ i The center angle of a circle
θ max The maximum angle which the sequence P i n can cover
d n The effective coverage width of P i n
L n The effective coverage length of P i n
μ The upper bound of the number of circles
Table 2. Parameter setting.
Table 2. Parameter setting.
ParameterValue
l max 2 3
h(0, 2.4)
q[ H 2 l max , H 0.5 ]
R m 3
H[1, 20]
C T 50
C R 1, 5, 25
λ [1, 50]

Share and Cite

MDPI and ACS Style

Xu, X.; Zhao, C.; Ye, T.; Gu, T. Minimum Cost Deployment of Bistatic Radar Sensor for Perimeter Barrier Coverage. Sensors 2019, 19, 225. https://doi.org/10.3390/s19020225

AMA Style

Xu X, Zhao C, Ye T, Gu T. Minimum Cost Deployment of Bistatic Radar Sensor for Perimeter Barrier Coverage. Sensors. 2019; 19(2):225. https://doi.org/10.3390/s19020225

Chicago/Turabian Style

Xu, Xianghua, Chengwei Zhao, Tingcong Ye, and Tao Gu. 2019. "Minimum Cost Deployment of Bistatic Radar Sensor for Perimeter Barrier Coverage" Sensors 19, no. 2: 225. https://doi.org/10.3390/s19020225

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop