6
Barrier Coverage with Mobile Sensors Changxiang Shen Weifang Cheng Xiangke Liao Shaoliang Peng National University of Defense Technology, China [email protected] Supported by Grant No. 2006AA01Z401 and 60673169. Abstract Barrier coverage, which guarantees that every movement crossing a barrier of sensors will be de- tected, is known to be an appropriate model of cover- age for moving detection and boundary guard. The related problems about barrier coverage with station- ary sensors are extensively studied. When sensors are randomly deployed, we require much more sensors to achieve barrier coverage than deterministic deploy- ment. In this paper we study barrier coverage with mobile sensors, in which the sensors can be relocated after deployment, and we are able to utilize much fewer mobile sensors than stationary sensors to achieve barrier coverage with random deployment. We study the energy-efficient relocation problem for bar- rier coverage, and propose a centralized barrier algo- rithm, which computes the relocated positions based on knowing the initial positions of all sensors. For practicability and scalability, we further design a dis- tributed barrier algorithm based on our proposed vir- tual force model. We conduct extensive simulations to study the effectiveness of the proposed algorithms. 1. Introduction There has been tremendous work done for different coverage problems in sensor networks [1-4], which is called as full coverage by Kumar et al. [5]. In full cov- erage, sensors deployed over the field monitor the en- tire area. Any point within the area is ensured to be covered by at least one or k sensors. A full coverage is required usually when users need to fully monitor the entire environment. Wireless sensor networks are also widely applied to many important applications involving boundary guard or movement detection, such as when deploying sen- sors along international borders to detect illegal intru- sion, around forests to detect the spread of forest fire, etc [6]. Barrier coverage, which guarantees that every movement crossing a barrier of sensors will be de- tected, is known to be an appropriate model of cover- age for such applications [5-8]. As shown by Balister et al. [8], when sensors are randomly deployed, we require much more sensors to achieve barrier coverage than deterministic deploy- ment. Unfortunately, deploying sensors deterministi- cally is an expensive undertaking in terms of time, effort, and money. When deploying sensors in inacces- sible terrain (e.g., forests, mountains, enemy regions), deterministic deployment may not even be an option. Figure 1 shows an example of randomly deployed sen- sors for barrier coverage. We can see that many sen- sors are redundant, leading to significant waste of sensors. Based on this observation, we study barrier cover- age with mobile sensors, in which sensors can be relo- cated after random deployment. Thus we are able to utilize much fewer mobile sensors to achieve barrier coverage than using stationary sensors. Figure 1. An example of randomly deployed sensors for barrier coverage In this work, we first formulate the problem of finding the best positions of relocated sensors to mini- mize the moving energy consumption, called as mini- mum-energy barrier-coverage or MEBC. To address the MEBC problem, we propose a centralized barrier algorithm, CBarrier, which computes the relocated positions for all sensors in a centralized way. In CBar- rier, the initial positions of all sensors are assumed to be known in advance. For practicability and scalability, we have to design a distributed barrier algorithm based The International Symposium on Parallel Architectures, Algorithms, and Networks 978-0-7695-3125-0/08 $25.00 © 2008 IEEE DOI 10.1109/I-SPAN.2008.8 99 The International Symposium on Parallel Architectures, Algorithms, and Networks 978-0-7695-3125-0/08 $25.00 © 2008 IEEE DOI 10.1109/I-SPAN.2008.8 99 The International Symposium on Parallel Architectures, Algorithms, and Networks 978-0-7695-3125-0/08 $25.00 © 2008 IEEE DOI 10.1109/I-SPAN.2008.8 99

[IEEE 2008 International Symposium on parallel Architectures, Algorighms and Networks I-SPAN - Sydney, Australia (2008.05.7-2008.05.9)] 2008 International Symposium on Parallel Architectures,

Embed Size (px)

Citation preview

Page 1: [IEEE 2008 International Symposium on parallel Architectures, Algorighms and Networks I-SPAN - Sydney, Australia (2008.05.7-2008.05.9)] 2008 International Symposium on Parallel Architectures,

Barrier Coverage with Mobile Sensors

Changxiang Shen Weifang Cheng Xiangke Liao Shaoliang Peng

National University of Defense Technology, China

[email protected]

Supported by Grant No. 2006AA01Z401 and 60673169.

Abstract

Barrier coverage, which guarantees that every

movement crossing a barrier of sensors will be de-

tected, is known to be an appropriate model of cover-

age for moving detection and boundary guard. The

related problems about barrier coverage with station-

ary sensors are extensively studied. When sensors are

randomly deployed, we require much more sensors to

achieve barrier coverage than deterministic deploy-

ment. In this paper we study barrier coverage with

mobile sensors, in which the sensors can be relocated

after deployment, and we are able to utilize much

fewer mobile sensors than stationary sensors to

achieve barrier coverage with random deployment. We

study the energy-efficient relocation problem for bar-

rier coverage, and propose a centralized barrier algo-

rithm, which computes the relocated positions based

on knowing the initial positions of all sensors. For

practicability and scalability, we further design a dis-

tributed barrier algorithm based on our proposed vir-

tual force model. We conduct extensive simulations to

study the effectiveness of the proposed algorithms.

1. Introduction

There has been tremendous work done for different

coverage problems in sensor networks [1-4], which is

called as full coverage by Kumar et al. [5]. In full cov-

erage, sensors deployed over the field monitor the en-

tire area. Any point within the area is ensured to be

covered by at least one or k sensors. A full coverage is

required usually when users need to fully monitor the

entire environment.

Wireless sensor networks are also widely applied to

many important applications involving boundary guard

or movement detection, such as when deploying sen-

sors along international borders to detect illegal intru-

sion, around forests to detect the spread of forest fire,

etc [6]. Barrier coverage, which guarantees that every

movement crossing a barrier of sensors will be de-

tected, is known to be an appropriate model of cover-

age for such applications [5-8].

As shown by Balister et al. [8], when sensors are

randomly deployed, we require much more sensors to

achieve barrier coverage than deterministic deploy-

ment. Unfortunately, deploying sensors deterministi-

cally is an expensive undertaking in terms of time,

effort, and money. When deploying sensors in inacces-

sible terrain (e.g., forests, mountains, enemy regions),

deterministic deployment may not even be an option.

Figure 1 shows an example of randomly deployed sen-

sors for barrier coverage. We can see that many sen-

sors are redundant, leading to significant waste of

sensors.

Based on this observation, we study barrier cover-

age with mobile sensors, in which sensors can be relo-

cated after random deployment. Thus we are able to

utilize much fewer mobile sensors to achieve barrier

coverage than using stationary sensors.

Figure 1. An example of randomly deployed sensors

for barrier coverage

In this work, we first formulate the problem of

finding the best positions of relocated sensors to mini-

mize the moving energy consumption, called as mini-

mum-energy barrier-coverage or MEBC. To address

the MEBC problem, we propose a centralized barrier

algorithm, CBarrier, which computes the relocated

positions for all sensors in a centralized way. In CBar-

rier, the initial positions of all sensors are assumed to

be known in advance. For practicability and scalability,

we have to design a distributed barrier algorithm based

The International Symposium on Parallel Architectures, Algorithms, and Networks

978-0-7695-3125-0/08 $25.00 © 2008 IEEEDOI 10.1109/I-SPAN.2008.8

99

The International Symposium on Parallel Architectures, Algorithms, and Networks

978-0-7695-3125-0/08 $25.00 © 2008 IEEEDOI 10.1109/I-SPAN.2008.8

99

The International Symposium on Parallel Architectures, Algorithms, and Networks

978-0-7695-3125-0/08 $25.00 © 2008 IEEEDOI 10.1109/I-SPAN.2008.8

99

Page 2: [IEEE 2008 International Symposium on parallel Architectures, Algorighms and Networks I-SPAN - Sydney, Australia (2008.05.7-2008.05.9)] 2008 International Symposium on Parallel Architectures,

on locally obtained information.

As any individual sensor cannot locally determine

whether the given area is barrier covered or not, it is

challenging to design a distributed algorithm. To ad-

dress the problem, we first propose a virtual force

model, in which a pair of sensors exerts repulsive force

on each other the on the orientation of X axes, while

they exert attractive forces on each other on the orien-

tation of Y axes. Based on this model, we propose a

distributed barrier algorithm, DBarrier, which utilize

the two types of forces to relocate deployed sensors

into a barrier crossing the given area. Our simulations

show the effectiveness of the proposed algorithms.

The rest of this paper is organized as follows. Sec-

tion 2 defines the problem and presents the centralized

barrier algorithm. Section 3 proposes the virtual force

model. And based on this model, the distributed barrier

algorithm is described in detail. Performance evalua-

tion of our algorithms is presented in Section 4, and we

conclude the work in Section 5.

2. MEBC problem

2.1 Preliminaries

Assume that N mobile sensors

1 2, , NS s s s

are randomly deployed to provide barrier coverage for

a rectangle strip on 2-D plane. Each sensor si has initial

coordinates (xi, yi), and the new coordinates is (xi’, yi’)

after relocating. The length of the rectangle is L and

the width is W. The left boundary is set to be x = 0, the

right boundary is x = L, the top boundary is y = W and

bottom is y = 0. The sensors are assumed to have a

disk sensing model and the sensing range is R.

For such given area, if we deploy mobile sensors

into a straight line, the minimum number of required

sensors is 2L R , as shown in Figure 2. In such case,

all mobile sensors are aligned to a straight line which

is parallel with the bottom side of the given area. Fur-

ther, 2L R is also the minimum number of sensors we

have to deploy for achieving barrier coverage. This is

obvious since reducing any one sensor will lead to the

failure of providing barrier coverage, regardless of any

deployment strategy.

Figure 2. The deployment with minimum sensors

Figure 3. The deployment with maximum sensors

For such straight-line deployment, the maximum

number of mobile sensors is 2 2

2L W R , as shown in

Figure 3. In such case, the sensors are aligned into a

diagonal of the given rectangle. It is easy to see that

the number of sensors required by straight-line de-

ployment is much fewer than random deployment for

achieving barrier coverage[8].

2.2 Problem formulation

Given randomly deployed mobile sensors, how to

deploy them to provide required barrier coverage is not

very hard, but another problem exists. Since the reloca-

tion of sensors will waste energy, we should design an

energy-efficient scheduling for energy-constrained

sensors. In order to save energy consumption of relo-

cation, we expect the moving trips of sensors are as

short as possible. In other words, a mobile sensor is

expected to relocate at a position close to its initial one

if possible. At the same time, all sensors form a barrier

after relocating. Unfortunately, how to find the best

barrier position is non-trivial. We call this problem as

min-energy barrier-coverage problem or MEBC. To

exactly explain MEBC problem, we present its mathe-

matical formulation as follows.

To simplify the description, we set x0 = 0 and xN+1

= L. And the distance of two relocated sensors is 2 2

' ' ' ', i j i jd i j x x y y .

Then the goal of MEBC is

2 2

' '

1

minN

i i i ii

x x y y (1)

Subject to: ' ' , 2 1j ij x x d i j R i N (2)

' ' , 2 1i jj x x d i j R i N (3)

'0 jj x R (4)

'

jj L R x L (5)

The objective function in (1) minimizes the sum of

the moving distance of all sensors. The constraint (2)

guarantees that each sensor has a left neighbor and

their sensing range overlaps with each other. Similarly,

the constraint (3) guarantees that each sensor has a

100100100

Page 3: [IEEE 2008 International Symposium on parallel Architectures, Algorighms and Networks I-SPAN - Sydney, Australia (2008.05.7-2008.05.9)] 2008 International Symposium on Parallel Architectures,

sensing-overlapped neighbor on the right side. The left

and right boundary coverage is restricted in the inequa-

tion (4) and (5) respectively. All the constraints make

the relocated sensors to form a barrier crossing the

given area.

2.3 CBarrier algorithm

In order to address the MEBC problem, we make

the following assumptions. We assume that the relo-

cated sensors are aligned into a straight line y = ax + b

and the distances between neighboring sensors are

identical. This implies that ' '

i iy ax b . And if we

order '

ix by sort ascending leading to

' ' '

1 2 Nx x x , we get x1’ = R, xN’ = L-R, and xi’ =

R + (i-1)(L-2R)/(N-1). Obviously the constraint (4) and

(5) are satisfied. Further, the distance between si and

si+1 is:

2 2' ' ' '

1 1

2

, 1

1 ( 2 ) ( 1)

i i i id i i x x y y

a L R N

.

As shown in Figure 3, if we relocate mobile sen-

sors into a straight line, the maximum number of re-

quired sensors is 2 2

2L W R . This implies that if

the relocated sensors are aligned into a straight line,

randomly deploying 2 2

2N L W R sensors are

enough for relocating to achieve barrier coverage. No-

tice that for a crossing line a W L , thus

, 1 2d i i R holds. Similarly, we can prove that

, 1 2d i i R holds. Therefore the constraints (2) and

(3) are satisfied.

Based on the above assumptions, we propose the

centralized barrier algorithm, CBarrier, as follows. As

we know, the key part of CBarrier is to compute the

relocated positions. Since the goal is to minimize the

sum of the moving distances of all sensors, we set 2 2

' '

1

,N

i i i ii

F a b x x y y

Then the goal in inequation (1) is equivalent to

minimize F(a,b). Based on extremum principle, we get:

0F F

a b,

which leads to

' '

1

'

1

2 0

2 0

N

i i ii

N

i ii

Fx y ax b

a

Fy ax b

b

.

We solve the above equations set, and get the fol-

lowing solution.

' ' '2 ' 2

1 1 1 1 1

'

1 1

( ) ( ( ) )N N N N N

i i i i i ii i i i i

N N

i ii i

a N x y x y N x x

b y N a x N

After getting the solution of a and b, we can com-

pute the new position for each sensor according to the

function ' '

i iy ax b . Further, sensor si is relocated

from (xi, yi) to (xi’, yi’), thus the given area is guaran-

teed to be 1-barrier covered.

3. Distributed barrier algorithm (DBarrier)

In this section, we propose a virtual force model to

move sensors in a distributed way. Based on the model,

we describe the design principle of DBarrier in detail

and address the above problems.

3.1 Virtual force model

To form a barrier with all sensors, we should let the

sensors to gather into certain positions nearby a line

crossing from the left boundary to the right boundary

of the given area. The X coordinates of sensors should

be distributed uniformly on [0, L], whereas the Y co-

ordinates values should be gathered closely. Thus, we

utilize repulsive and attractive forces individually for

X axes and Y axes to relocate sensors. On the orienta-

tion of X axes, a pair of sensors exerts repulsive force

on each other, while they exert attractive forces on

each other on the orientation of Y axes, as shown in

Figure 4.

In order to compute the virtual forces on a single

sensor itself in a distributed way, we only consider the

forces exerted by neighboring nodes. Given sensor si

with initial coordinates (xi, yi), the set of sensors which

are within the communication range of si are denoted

by Ni. Then the repulsive force between sensor si and sj

is computed as follows.

( ) ,,

0,

i j j i

R

j i

x x s NF i j

s N

Similarly, the attractive force between sensor si and

sj is computed as follows.

,,

0,

j i j i

A

j i

y y s NF i j

s N

The parameters and are positive constant value

utilized to normalize repulsive and attractive forces.

Further, repulsive forces are in inverse proportion to

the distances, while attractive forces are proportional

101101101

Page 4: [IEEE 2008 International Symposium on parallel Architectures, Algorighms and Networks I-SPAN - Sydney, Australia (2008.05.7-2008.05.9)] 2008 International Symposium on Parallel Architectures,

to distances. It is easy to understand since repulsive

forces are utilized to impulse sensors to uniform distri-

bution. On the other hand, attractive forces are utilized

to gather sensors into the same horizon.

When the sensor is close to the boundary, the

boundary also exerts forces on this sensor. The left or

right boundaries exert repulsive forces on a sensor if

the distance between this sensor and the boundary is

less than the communication range Rc. The repulsive

force on sensor si exerted by boundaries is computed as

follows:

0,

, 1 ,

1 ( ) ,

c i c

R i i c

i i c

R x L R

F i B x x R

x L x L R

.

Then the total repulsive force of sensor si on the

orientation of X axes is:

, ,j i

R R Rs N

F i F i j F i B .

And the total attractive force of sensor si on the ori-

entation of Y axes is:

,j i

A As N

F i F i j .

1,2A

F

1, 2RF

2,1RF

2,1A

F

2,RF B

Figure 4. Virtual forces with two sensors

To explain the virtual force model exactly, an ex-

ample of virtual forces with two sensors is shown in

Figure 4. The distance between s1 and s2 is less than

the communication range. Then sensor s1 exerts repul-

sive forces 2,1RF and attractive forces 2,1AF on s2.

At the same time, s2 exerts repulsive forces 1, 2RF and

attractive forces 1,2AF on s1. Furthermore, the left

boundary exerts repulsive forces 2,RF B on sensor s2,

since s2 is close to the left boundary.

3.2 DBarrier algorithm

In DBarrier algorithm, the required barrier cover-

age is achieved step by step through the fine tuning of

positions.As mentioned above, the repulsive force is

used to adjust the X coordinates, and the attractive

force to adjust the Y coordinates. In order to control

the accuracy of fine tuning and the convergence time,

virtual forces move sensors a constant distance for

each step. Specifically, a sensor moves left or right

with a distance x along X axes, and moves up or

down with a distance y along Y axes. If the total re-

pulsive forces exerted on sensor si points to the left, si

moves to the left; otherwise it moves to the right. On

the other hand, if the total attractive forces exerted on

sensor si points up, si moves up; otherwise, it moves

down. In conclusion, the adjusting rule is as follows.

1

1

i i R R

i i A A

x t x t x F i F i

y t y t y F i F i

Denotations xi(t) and yi(t) represent the coordinates

of sensor si at step t. After the delicate adjustment

based on the adjusting rule, sensor si moves to new

coordinates (xi(t+1), yi(t+1)). Thus, we can relocate

sensors step by step using the proposed virtual force

model.

Obviously it is not energy-efficient to move sensors

step by step, since the sensor mostly moves on a maze,

as shown in

Figure 5. Sensor s1 relocates itself from location A

to B, resulting in a wandering trip which is represented

by the real line. It is easy to understand that the wan-

dering trip is much longer than the straight dash line.

Based on this observation, we do not really move sen-

sors for each step. In DBarrier, each sensor stores the

new position instead of moving to this position, which

is called as virtual moving. At the same time sensors

take the new position as current ones for iteration. Af-

ter the sensor gets the final relocated position, it per-

forms one-time moving directly from the initial

position to the relocated location.

Figure 5. An example of wandering trip

As we can see, virtual moving can save much en-

ergy, whereas it results in another problem. Since sen-

sors do not really move to corresponding positions on

runtime, how does a sensor get the exact information

of its neighbors based on its new position? To address

this problem, the sensor collects the information of

two-hop neighbors on runtime, from which the one-

hop neighbors are picked based on new positions after

their virtual moving. Since a sensor performs delicate

adjustment leading to very small motion, the new

neighbors should also be the two-hop neighbors before

virtual moving. Thus sensors can get the exact

neighbor information while performing virtual moving.

The pseudocode of DBarrier is shown in Figure 6.

102102102

Page 5: [IEEE 2008 International Symposium on parallel Architectures, Algorighms and Networks I-SPAN - Sydney, Australia (2008.05.7-2008.05.9)] 2008 International Symposium on Parallel Architectures,

Figure 6. Pseudocode of DBarrier algorithm

4. Performance evaluation

We conduct simulation experiments using

MATLAB to test the performance of our algorithms.

We present the simulation results in this section.

For the following experiments, we set the sensing

range R = 4m and communication range Rc = 10m. We

evaluate the performance of DBarrier compared with

CBarrier, including the relocation effectiveness and the

average length of moving trip per sensor. Further, we

test the convergence time of DBarrier. In order to keep

the same iteration speed of X and Y coordinates, we

set x y L W .

To test the relocation effectiveness, 15 sensors are

randomly deployed on a15 60m m strip, i.e., W = 15m,

L = 60m, as shown in Figure 7. Figure 8 shows the

positions of relocated sensors after executing the

CBarrier algorithm. Obviously the relocated sensors

are aligned to a straight line to form a barrier crossing

the strip. In DBarrier, the moving unit 0.1x m .

Figure 9 shows the positions of relocated sensors after

executing the DBarrier algorithm. As we expect, relo-

cated sensors also forms a barrier for the given strip.

This implies that our algorithms are effective on relo-

cating sensors to provide barrier coverage.

The next group of simulations is used to compare

the average moving distance per sensor of CBarrier

and DBarrier. In DBarrier, the moving unit 0.1x m .

The width of the strip is fixed to be 15 meter, but the

length is multiplexed, so that the number of mobile

sensors is also multiplexed to provide the required bar-

rier coverage. This implies that we increase the net-

work scale. In Figure 10 we can see that CBarrier

always outperforms DBarrier. It is easy to understand

since CBarrier is a centralized algorithm and the global

information is known in advance. DBarrier, however,

is just based on locally obtained information. Further,

the average moving length per sensor does not change

much as the network scale increases in both CBarrier

and DBarrier. It implies that our algorithms can be

applicable to large scale networks.

Figure 11 and Figure 12 show the convergence

time of DBarrier. We set MAX_STEP = 100 and take

the average step in Figure 6 as the evaluation parame-

ter of convergence time. Varied network scale is tested

to evaluate its impact on the convergence time. The

width of the strip is fixed to be 15 meter, but the length

is multiplexed, so that the number of mobile sensors is

also multiplexed to provide the required barrier cover-

age. This implies that we increase the network scale.

The moving unit is fixed 0.1x m . Figure 11 shows

the convergence time does not change much with the

network scale. Thus DBarrier is practicable to large

scale networks.

In Figure 12, the varied moving unit is tested to

evaluate its impact on the convergence time. The

length of the strip is set to be 60m and 15 sensors are

randomly deployed. As we increase the moving unit,

the convergence time decreases quickly in the begin-

ning, but suddenly increases to 100 after the minimum

point. The main reason for above results is that when

the moving unit is below certain threshold, the DBar-

rier algorithm can converge and the convergence speed

is proportional to the moving unit; whereas it does not

converge when the moving unit is too large, since large

moving unit is inconsistent with the key idea fine-

tuning of DBarrier.

103103103

Page 6: [IEEE 2008 International Symposium on parallel Architectures, Algorighms and Networks I-SPAN - Sydney, Australia (2008.05.7-2008.05.9)] 2008 International Symposium on Parallel Architectures,

0 10 20 30 40 50 600

10

20

30

40

50

60

X coordinate

Y c

oord

inate

Figure 7: Initially deployed sensors for

barrier coverage

0 10 20 30 40 50 600

10

20

30

40

50

60

X coordinate

Y c

oord

inate

Figure 8: Relocated sensors for barrier

coverage by CBarrier

0 10 20 30 40 50 600

10

20

30

40

50

60

X coordinate

Y c

oo

rdin

ate

Figure 9: Relocated sensors for

barrier coverage by DBarrier

60 120 180 240 300 360 420 4803

3.5

4

4.5

5

5.5

6

Length of the strip (L)

Avera

ge length

of

movin

g t

rips CBarrier

DBarrier

Figure 10. Average length of moving

trips of all sensors

60 120 180 240 300 360 420 48020

25

30

35

40

45

50

Length of the strip (L)

Avera

ge s

teps o

f converg

ence

Figure 11. The convergence time of

DBarrier vs. length of the strip

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8

10

20

30

40

50

60

70

80

90

100

Length of the moving unit

Avera

ge s

teps o

f converg

ence

Figure 12. The convergence time

of DBarrier vs. length of moving

unit

5. Conclusion

We study barrier coverage with mobile sensors, in

which the sensors can be relocated for achieving bar-

rier coverage. We discuss the problem of relocating

sensors with minimum energy consumption. Then we

propose a centralized barrier algorithm, which com-

putes the relocated positions based on knowing the

initial positions of all sensors. We further design a

distributed barrier algorithm based on our proposed

virtual force model. In DBarrier, the sensors adjust

their positions according to the total repulsive and at-

tractive forces. In the future work we will design the

relocation algorithms for the k-barrier coverage.

References

[1] S. Kumar, T. H. Lai, J. Balogh. "On k-Coverage in a

Mostly Sleeping Sensor Network". in Proceedings of

MobiCom. 2004.

[2] C. F. Huang, Y. C. Tseng. "The Coverage Problem in a

Wireless Sensor Network". in Proceedings of ACM

WSNA. 2003.

[3] M. Cardei, J. Wu. Energy-Efficient Coverage Problems

in Wireless Ad Hoc Sensor Networks. Journal of Com-

puter Communications on Sensor Networks,

2005,29(4):413-420.

[4] S. Meguerdichian, F. Koushanfar, M. Potkonjak, M. B.

Srivastava. "Coverage Problems in Wireless Ad-hoc

Sensor Networks". in Proceedings of IEEE Infocom.

2001.

[5] S. Kumar, T. H. Lai, A. Arora. "Barrier Coverage With

Wireless Sensors". in Proceedings of MobiCom. 2005.

[6] A. Chen, S. Kumar, T. H. Lai. "Designing Localized

Algorithms for Barrier Coverage". in Proceedings of

ACM MobiCom. 2007.

[7] S. Kumar, T. H. Lai, M. E. Posner, P. Sinha. "Optimal

Sleep Wakeup Algorithms for Barriers of Wireless Sen-

sors". in Proceedings of IEEE BROADNETS. 2007.

[8] P. Balister, B. Bollobas, A. Sarkar, S. Kumar. "Reliable

Density Estimates for Achieving Coverage and Connec-

tivity in Thin Strips of Finite Length". in Proceedings of

ACM MobiCom. 2007.

104104104