37
Shibo He Jiming Chen Xu Li , Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China Department of Electrical and Computer Engineering, University of Waterloo, Canada INRIA Lille - Nord Europe, Univ Lille Nord de France IEEE INFOCOM 2012 ost-Effective Barrier Coverage by Mobile Sensor Networks 1

Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

Embed Size (px)

Citation preview

Page 1: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

1

Shibo He 、 Jiming Chen 、 Xu Li 、 , Xuemin (Sherman) Shen and Youxian SunState Key Laboratory of Industrial Control Technology, Zhejiang University,

China 、 Department of Electrical and Computer Engineering, University of Waterloo, Canada

INRIA Lille - Nord Europe, Univ Lille Nord de France

IEEE INFOCOM 2012

Cost-Effective Barrier Coverage by Mobile Sensor Networks

Page 2: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

2

Outline Introduction Goal Assumption Problem formulation Periodic Monitoring Scheduling algorithm Coordinated Sensor Patrolling algorithm Distributed CSP Simulation Conclusion

Page 3: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

Introduction Wireless sensor networks have received a lot of attention

due to their potential applications in various areas Environmental monitoring

The placement of sensors related to coverage issues is intensively studied in the literature, and can be divided into three categories. Target coverage Full coverage Barrier coverage

3

Page 4: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

Introduction The target coverage problem (Points of Interest, PoI)

aims at monitoring specific points in the field of interest.

Museum Campus Military

4

Page 5: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

Introduction The full coverage problem (Areas of Interest, AoI)

aims at covering the whole area. Sensors are deployed to maximize the covered area.

5

Page 6: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

Introduction The barrier coverage problem

Aim at detecting intrusion on a given area. Sensors have to form a dense barrier in order to detect each

event that crosses the barrier.

USA

Intruder

6

Page 7: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

7

Introduction Existing solutions to barrier coverage in mobile sensor

networks implicitly assume the availability of sufficient sensors. K-barrier One-barrier

K-Barrier One-Barrier

Page 8: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

8

Introduction These solutions will fail to work when sensor scarcity and

budget limitation. the performance of detecting intruder decreasing

K-Barrier One-Barrier

Page 9: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

9

Goal In the case of sensor scarcity, this paper proposed two

algorithms to Improve the probability of detecting intruder Decrease sensor’s moving distance

Page 10: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

10

Assumption The belt region of interest Ω with two long parallel

boundaries. m sensors are needed to guarantee full barrier coverage

but there are only n mobile sensors available (n < m).

l

Ω

Page 11: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

11

Problem formulation max γ while min L

Average intruder detection probability

Average sensor moving distance

: the state of intruder arrivaltia

tiu : the state of sensor presence

at point i

t

t

0 0 1 1

1

0 0 1 1

0 0 1 0 0 0 1

0 0

1 0

tjL the distance that sensor j moves

in time t

Page 12: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

12

Patrolling algorithms Periodic Monitoring Scheduling Coordinated Sensor Patrolling

Page 13: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

13

Periodic Monitoring Scheduling The basic idea of PMS is to let the sensors monitor each point

periodically. there are m points, but only have n (n<m)mobile sensors to

monitor. sensor at point j moves to point mod(j + n, m) and sensing the point

for T time slots.

0 1 2 3 4

A B C

A

A

A

A

B

B

B

B

C

C

C

C

t0

t1

t2

t3

t4

0 1 2 3 4

0 1 2 3 4

0 1 2 3 4

0 1 2 3 4

1T B

2 mod(2+3,5)=0mod(0+3,5)=3 mod(3+3,5)=1 mod(1+3,5)=4

Page 14: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

14

Periodic Monitoring Scheduling The basic idea of PMS is to let the sensors monitor each point

periodically. Presenting PMS algorithm to solve barrier coverage problem

formulated Average intruder detection probability

Average sensor moving distance

m

n

Tm

nnnmmnrsL

'

)'2''(2

Page 15: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

15

Periodic Monitoring Scheduling Average intruder detection probability

m

n

m

n

pm

pn

:proof

the steady-state probability of intruder arrival at each slot

Page 16: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

16

Periodic Monitoring Scheduling Average sensor moving distance

Tm

nnnmmnrsL

'

)'2''(2

proof :

the minimum scheduling period

),gcd('

nm

mm

),gcd('

nm

nn : How many time slots that each point is monitored by

sensors

: How many time slots in the monitoring period

sensor’s moving distance when j+n > m

sensor’s moving distance when j+n <= m

Page 17: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

17

Patrolling algorithms Periodic Monitoring Scheduling Coordinated Sensor Patrolling

Page 18: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

18

Coordinated Sensor Patrolling A centralized coordinated sensor patrolling algorithm.

Exploiting the temporal correlation of intruder arrival times to improve average intruder detection probability γ.

Page 19: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

Coordinated Sensor Patrolling Intruder arrival analysis

t=1 11 pq

t=22

122 ppq

τ τ+1 τ+2

one intruder arrives at slot τ +2

two intruders arrive,one at slot τ +1 and the other is τ +2

the probability that the next intruder arrival is at slot τ +t given the last intruder arrival time is τ.

)(

1)( ),1()(x

t exFtFtFp

Cumulative Distribution Function

19

Page 20: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

20

Coordinated Sensor Patrolling Intruder arrival analysis

After an intruder arrives at a point, the probability that an intruder will arrive again at the same point in the next few time slots is very small.

Page 21: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

21

Coordinated Sensor Patrolling Point selection step Coordinated movement step

Page 22: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

22

Coordinated Sensor Patrolling Point selection step

Three principles A sensor should move to another point if it detects an intruder at the point

in the previous time slot. A sensor should not leave its current point until it detects an intruder.

0 1 2 3 4

A A Available

sensors availble ofnumber :n

B

B Unavailable

Page 23: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

23

Coordinated Sensor Patrolling Point selection step

Three principles A sensor should move to another point if it detects an intruder at the point

in the previous time slot. A sensor should not leave its current point until it detects an intruder The points with highest qt should be selected if a sensor wants to find a

point to monitor.

jI : the number of time slots that there is no sensor at point j

2jI jIq &

Page 24: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

24

Coordinated Sensor Patrolling Coordinated movement step

In order to reduce the total moving unavailable sensors do not necessarily stay at their previous points distance of each sensor.

jIq

n

C

'C t0

0 1 2 3 4

0 1 2 3 4t1

Page 25: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

25

Distributed CSP Distributed variants

Simple DCSP

Page 26: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

26

Distributed CSP Simple DCSP

Initialization phase Dynamic movement phase

Page 27: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

27

Simple DCSP Initialization phase

The leader Indicating how the sensor likes to monitor the points. distribute the preference level of each sensor among the points. Assign a preference level to points

0 1 2 3 4

A B CA

1 ,m

1j

ji

ji plpl

m

nplpl

n

i

ji

j 1

Page 28: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

28

Simple DCSP Initialization phase

0 1 2 3 4

1 ,m

1j

ji

ji plpl

m

nplpl

n

i

ji

j 1

A

m=5,n=3

1ˆ AlpA B C1ˆ Blp 1ˆ Clp

5

2ˆ Alp

5

3

m

n

},min{, ji

ji

j plm

nplpl

m

npl

0 0jpl1 2 3 4

A

5

3}0

5

3,1min{,0 00 Aplpl

0

A 1

5

2}0

5

3,

5

2min{,0 11 Aplpl

0ˆ Alp

Page 29: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

29

Simple DCSP

0,5

2,

5

3 43210 AAAAA plplplplpl

0,5

1,

5

3,

5

1 40321 CCBBB plplplplpl

0,5

3,

5

2 21043 CCCCC plplplplpl

Initialization phase

}1,0{AMS

}3,2,1{BMS

}4,3{CMS0 1 2 3 4

A B CA

B

B

C

Page 30: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

30

Simple DCSP Dynamic movement phase

A sensor should not leave its current point until it detects an intruder.

Sensor moves to the new point with high Each sensor moves between points in MSi

Collision problem

ijIj

i qpl *

}1,0{AMS }3,2,1{BMS }4,3{CMS

Page 31: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

31

Simple DCSP Dynamic movement phase

Collision problem it will set Iij= 0 and recalculate

Sensor i and sensor i+1 generate random number from

and exchange their number

}1,0{AMS }3,2,1{BMS }4,3{CMS

0 1 2 3 4

B CA

ijIq

A

j

ij

i

ji

ji

ji

ji

plpl

pl

plpl

pl

1

1

1

,0,,0

Page 32: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

32

Simulation Using MATLAB to perform the simulation The network operation time is divided into time slots,

each with 1 unit simulated time.

Page 33: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

33

Simulation Performance of PMS

Average intruder detection probability v.s. T slots

Page 34: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

34

Simulation Performance of CSP

Average intruder detection probability v.s. number of sensor

Performance γ for different n and m when β = 4.

Page 35: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

35

Simulation Average intruder detection probability v.s. number of sensor

when β = 2 when β = 6

Page 36: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

36

Conclusion In the case of sensor scarcity , this paper proposed

Periodic monitoring scheduling algorithm Coordinated sensor patrolling algorithm

reduce the application budget. provides a new cost-effective approach to achieve barrier coverage in

large-scale mobile sensor networks.

Page 37: Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China

37

Thank you