Title :
Intrusion Objects with Shapes under Randomized Scheduling Algorithm in Sensor Networks
Author :
Xiao, Yang ; Chen, Hui ; Zhang, Yanping ; Du, Xiaojiang ; Sun, Bo ; Wu, Kui
Author_Institution :
Dept. of Comput. Sci., Alabama Univ., Tuscaloosa, AL
Abstract :
Wireless sensor networks have many applications. In this paper, we are particularly interested in a sensor network which is used for monitoring a field to detect intrusion objects such as enemy tanks, enemy cars, etc. Since sensor nodes have limited energy supply, sensor networks may be configured to put some sensor nodes in sleep mode to save energy. This is a special case of a randomized scheduling algorithm. In this paper, we study the performance of the randomized scheduling algorithm via both analysis and simulation in terms of intrusion coverage intensity when an intrusion object occupies an area. We study the impact of the size of intrusion object on the sensor networkpsilas configuration.
Keywords :
scheduling; telecommunication security; wireless sensor networks; intrusion objects; randomized scheduling algorithm; wireless sensor networks; Analytical models; Computer science; Intelligent sensors; Intrusion detection; Object detection; Performance analysis; Protocols; Scheduling algorithm; Shape; Wireless sensor networks; Intrusion Objects; Randomized Scheduling Algorithm; Sensor Networks; Shapes;
Conference_Titel :
Distributed Computing Systems Workshops, 2008. ICDCS '08. 28th International Conference on
Conference_Location :
Beijing
Print_ISBN :
978-0-7695-3173-1
Electronic_ISBN :
1545-0678
DOI :
10.1109/ICDCS.Workshops.2008.39