11
Dynamic Coverage of Mobile Sensor Networks Benyuan Liu, Member, IEEE, Olivier Dousse, Member, IEEE, Philippe Nain, and Don Towsley, Fellow, IEEE Abstract—We study the dynamic aspects of the coverage of a mobile sensor network resulting from continuous movement of sensors. As sensors move around, initially uncovered locations may be covered at a later time, and intruders that might never be detected in a stationary sensor network can now be detected by moving sensors. However, this improvement in coverage is achieved at the cost that a location is covered only part of the time, alternating between covered and not covered. We characterize area coverage at specific time instants and during time intervals, as well as the time durations that a location is covered and uncovered. We further consider the time it takes to detect a randomly located intruder and prove that the detection time is exponentially distributed with parameter 2!r v s where ! represents the sensor density, r represents the sensor’s sensing range, and v s denotes the average sensor speed. For mobile intruders, we take a game theoretic approach and derive optimal mobility strategies for both sensors and intruders. We prove that the optimal sensor strategy is to choose their directions uniformly at random between ½0; 2%Þ. The optimal intruder strategy is to remain stationary. This solution represents a mixed strategy which is a Nash equilibrium of the zero-sum game between mobile sensors and intruders. Index Terms—Wireless sensor networks, coverage, detection time, mobility Ç 1 INTRODUCTION C OVERAGE is a critical issue for the deployment and performance of a wireless sensor network, representing the quality of surveillance that the network can provide, for example, how well a region of interest is monitored by sensors, and how effectively a sensor network can detect intruders. It is important to understand how the coverage of a sensor network depends on various network parameters in order to better design and use sensor networks in different application scenarios. In many applications, sensors are not mobile and remain stationary after their initial deployment. The coverage of such a stationary sensor network is determined by the initial network configuration. Once the deployment strategy and sensing characteristics of the sensors are known, network coverage can be computed and remains un- changed over time. Recently, there has been increasing interest on building mobile sensor networks. Potential applications abound. Sensors can be mounted on mobile platforms such as mobile robots and move to desired areas [1], [2], [3], [4]. Such mobile sensor networks are extremely valuable in situations where traditional deployment mechanisms fail or are not suitable, for example, a hostile environment where sensors cannot be manually deployed or air-dropped. Mobile sensor networks can also play a vital role in homeland security. Sensors can be mounted on vehicles (e.g., subway trains, taxis, police cars, fire trucks, boats, etc.) or carried by people (e.g., policemen, fire fighters, etc.). These sensors will move with their carriers, dynamically patrolling and monitoring the environment (e.g., chemical, biological, or radiological agents). In other application, scenarios such as atmosphere and underwater environment monitoring, airborne or underwater sensors may move with the surrounding air or water currents. The coverage of a mobile sensor network now depends not only on the initial network configurations, but also on the mobility behavior of the sensors. While the coverage of a sensor network with stationary sensors has been extensively explored and is relatively well understood, researchers have only recently started to study the coverage of mobile sensor networks. Most of this work focuses on algorithms to relocate sensors in desired positions in order to repair or enhance network coverage [5], [6], [7], [8], [9], [10], [11]. More specifically, these proposed algorithms strive to spread sensors to desired locations to improve coverage. The main differences among these works are how exactly the desired positions of sensors are computed. Although the algorithms can adapt to changing environments and recompute the sensor locations accordingly, sensor mobility is exploited essentially to obtain a new stationary configuration that improves cover- age after the sensors move to their desired locations. In this paper, we study the coverage of a mobile sensor network from a different perspective. Instead of trying to achieve an improved stationary network configuration as the end result of sensor movement, we are interested in the dynamic aspects of network coverage resulting from the continuous movement of sensors. In a stationary sensor network, the covered areas are determined by the initial configuration and do not change over time. In a mobile IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 2, FEBRUARY 2013 301 . B. Liu is with the Department of Computer Science, University of Massachusetts Lowell, One University Avenue, Lowell, MA 01886. E-mail: [email protected]. . O. Dousse is with the Nokia Research Center, Innovation Square Building J, 1015 Lausanne, Switzerland. E-mail: [email protected], [email protected]. . P. Nain is with the INRIA, 2004 route des Lucioles, BP 93, 06902 Sophia Antipolis Cedex, France. E-mail: [email protected]. . D. Towsley is with the Department of Computer Science, University of Massachusetts Amherst, Amherst, MA 01003. E-mail: [email protected]. Manuscript received 13 Sept. 2011; revised 19 Mar. 2012; accepted 21 April 2012; published online 5 May 2012. Recommended for acceptance by W. Jia. For information on obtaining reprints of this article, please send e-mail to: [email protected], and reference IEEECS Log Number TPDS-2011-09-0625. Digital Object Identifier no. 10.1109/TPDS.2012.141. 1045-9219/13/$31.00 ß 2013 IEEE Published by the IEEE Computer Society

wireless sensor network,mobile networking

Embed Size (px)

Citation preview

Page 1: wireless sensor network,mobile networking

Dynamic Coverage of Mobile Sensor NetworksBenyuan Liu, Member, IEEE, Olivier Dousse, Member, IEEE,

Philippe Nain, and Don Towsley, Fellow, IEEE

Abstract—We study the dynamic aspects of the coverage of a mobile sensor network resulting from continuous movement of sensors.

As sensors move around, initially uncovered locations may be covered at a later time, and intruders that might never be detected in a

stationary sensor network can now be detected by moving sensors. However, this improvement in coverage is achieved at the cost

that a location is covered only part of the time, alternating between covered and not covered. We characterize area coverage at

specific time instants and during time intervals, as well as the time durations that a location is covered and uncovered. We further

consider the time it takes to detect a randomly located intruder and prove that the detection time is exponentially distributed with

parameter 2�r�vs where � represents the sensor density, r represents the sensor’s sensing range, and �vs denotes the average sensor

speed. For mobile intruders, we take a game theoretic approach and derive optimal mobility strategies for both sensors and intruders.

We prove that the optimal sensor strategy is to choose their directions uniformly at random between ½0; 2�Þ. The optimal intruder

strategy is to remain stationary. This solution represents a mixed strategy which is a Nash equilibrium of the zero-sum game between

mobile sensors and intruders.

Index Terms—Wireless sensor networks, coverage, detection time, mobility

Ç

1 INTRODUCTION

COVERAGE is a critical issue for the deployment andperformance of a wireless sensor network, representing

the quality of surveillance that the network can provide, forexample, how well a region of interest is monitored bysensors, and how effectively a sensor network can detectintruders. It is important to understand how the coverage ofa sensor network depends on various network parametersin order to better design and use sensor networks indifferent application scenarios.

In many applications, sensors are not mobile and remainstationary after their initial deployment. The coverage ofsuch a stationary sensor network is determined by theinitial network configuration. Once the deployment strategyand sensing characteristics of the sensors are known,network coverage can be computed and remains un-changed over time.

Recently, there has been increasing interest on buildingmobile sensor networks. Potential applications abound.Sensors can be mounted on mobile platforms such asmobile robots and move to desired areas [1], [2], [3], [4].Such mobile sensor networks are extremely valuable insituations where traditional deployment mechanisms fail or

are not suitable, for example, a hostile environment wheresensors cannot be manually deployed or air-dropped.Mobile sensor networks can also play a vital role inhomeland security. Sensors can be mounted on vehicles(e.g., subway trains, taxis, police cars, fire trucks, boats, etc.)or carried by people (e.g., policemen, fire fighters, etc.).These sensors will move with their carriers, dynamicallypatrolling and monitoring the environment (e.g., chemical,biological, or radiological agents). In other application,scenarios such as atmosphere and underwater environmentmonitoring, airborne or underwater sensors may move withthe surrounding air or water currents. The coverage of amobile sensor network now depends not only on the initialnetwork configurations, but also on the mobility behavior ofthe sensors.

While the coverage of a sensor network with stationarysensors has been extensively explored and is relatively wellunderstood, researchers have only recently started to studythe coverage of mobile sensor networks. Most of this workfocuses on algorithms to relocate sensors in desiredpositions in order to repair or enhance network coverage[5], [6], [7], [8], [9], [10], [11]. More specifically, theseproposed algorithms strive to spread sensors to desiredlocations to improve coverage. The main differences amongthese works are how exactly the desired positions of sensorsare computed. Although the algorithms can adapt tochanging environments and recompute the sensor locationsaccordingly, sensor mobility is exploited essentially toobtain a new stationary configuration that improves cover-age after the sensors move to their desired locations.

In this paper, we study the coverage of a mobile sensornetwork from a different perspective. Instead of trying toachieve an improved stationary network configuration asthe end result of sensor movement, we are interested in thedynamic aspects of network coverage resulting from thecontinuous movement of sensors. In a stationary sensornetwork, the covered areas are determined by the initialconfiguration and do not change over time. In a mobile

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 2, FEBRUARY 2013 301

. B. Liu is with the Department of Computer Science, University ofMassachusetts Lowell, One University Avenue, Lowell, MA 01886.E-mail: [email protected].

. O. Dousse is with the Nokia Research Center, Innovation Square BuildingJ, 1015 Lausanne, Switzerland.E-mail: [email protected], [email protected].

. P. Nain is with the INRIA, 2004 route des Lucioles, BP 93, 06902 SophiaAntipolis Cedex, France. E-mail: [email protected].

. D. Towsley is with the Department of Computer Science, University ofMassachusetts Amherst, Amherst, MA 01003.E-mail: [email protected].

Manuscript received 13 Sept. 2011; revised 19 Mar. 2012; accepted 21 April2012; published online 5 May 2012.Recommended for acceptance by W. Jia.For information on obtaining reprints of this article, please send e-mail to:[email protected], and reference IEEECS Log Number TPDS-2011-09-0625.Digital Object Identifier no. 10.1109/TPDS.2012.141.

1045-9219/13/$31.00 � 2013 IEEE Published by the IEEE Computer Society

Page 2: wireless sensor network,mobile networking

sensor network, previously uncovered areas become cov-ered as sensors move through them and covered areasbecome uncovered as sensors move away. As a result, theareas covered by sensors change over time, and more areaswill be covered at least once as time continues. Thecoverage status of a location also changes with time,alternating between being covered and not being covered.In this work, we assume that sensors are initially randomlyand uniformly deployed and move independently inrandomly chosen directions. Based on this model, wecharacterize the fraction of area covered at a given timeinstant, the fraction of area ever covered during a timeinterval, as well as the time durations that a location iscovered and not covered.

Intrusion detection is an important task in many sensornetwork applications. We measure the intrusion detectioncapability of a mobile sensor network by the detection timeof a randomly located intruder, which is defined to be thetime elapsed before the intruder is first detected by a sensor.In a stationary sensor network, an initially undetectedintruder will never be detected if it remains stationary ormoves along an uncovered path. In a mobile sensor network,however, such an intruder may be detected as the mobilesensors patrol the field. This can significantly improve theintrusion detection capability of a sensor network. In thispaper, we characterize the detection time of a randomlylocated intruder. The results suggest that sensor mobilitycan be exploited to effectively reduce the detection time of astationary intruder when the number of sensors is limited.We further present a lower bound on the distribution of thedetection time of a randomly located intruder, and showthat it can be minimized if sensors move in straight lines.

In some applications, for example, radiation, chemical,and biological agents detections, there is a sensing timerequirement before an intruder is detected. We find in thiscase that too much mobility can be harmful if the sensorspeed is above a threshold. Intuitively, if a sensor movesfaster, it will cover an area more quickly and detect someintruders sooner, however, at the same time, it will misssome intruders due to the sensing time requirement. To thisend, we find there is an optimal sensor speed that minimizesthe detection time of a randomly located intruder.

For a mobile intruder, the detection time depends on themobility strategies of both sensors and intruder. We take agame theoretic approach and study the optimal mobilitystrategies of sensors and intruder. Given the sensormobility pattern, we assume that an intruder can chooseits mobility strategy so as to maximize its detection time(its lifetime before being detected). On the other hand,sensors choose a mobility strategy that minimizes themaximum detection time resulting from the intruder’smobility strategy. This can be viewed as a zero-summinimax game between the collection of mobile sensorsand the intruder. We prove that the optimal sensormobility strategy is for sensors to choose their directionsuniformly at random between ½0; 2�Þ. The correspondingintruder mobility strategy is to remain stationary tomaximize its detection time. This solution represents amixed strategy which is a Nash equilibrium of the gamebetween mobile sensors and intruders. If sensors choose tomove in any fixed direction (a pure strategy), it can beexploited by an intruder by moving in the same direction

as sensors to maximize its detection time. The optimalsensor strategy is to choose a mixture of available purestrategies (move in a fixed direction between ½0; 2�Þ). Theproportion of the mix should be such that the intrudercannot exploit the choice by pursuing any particular purestrategy (move in the same direction as sensors), resultingin a uniformly random distribution for sensor’s movement.When sensors and intruders follow their respective optimalstrategies, neither side can achieve better performance bydeviating from this behavior.

The remainder of the paper is structured as follows: InSection 2, we review related work on the coverage of sensornetworks. The network model and coverage measures aredefined in Section 3. In Section 4, we derive the fraction ofthe area being covered at specific time instants and during atime interval. The detection time for both stationary andmobile intruders is studied in Sections 5 and 6, respectively.In Section 6, we also derive the optimal mobility strategiesfor sensors and intruders from a game theoretic perspective.Finally, we summarize the paper in Section 7.

2 RELATED WORK

Recently, sensor deployment and coverage related topicshave become an active research area. In this section, wepresent a brief overview of the previous work on thecoverage of both stationary and mobile sensor networks thatis most relevant to our study. A more thorough survey of thesensor network coverage problems can be found in [12].

Many previous studies have focused on characterizingvarious coverage measures for stationary sensor networks.In [13], the authors considered a grid-based sensor networkand derived the conditions for the sensing range and failurerate of sensors to ensure that an area is fully covered. In[14], the authors proposed several algorithms to find pathsthat are most or least likely to be detected by sensors in asensor network. Path exposure of moving objects in sensornetworks was formally defined and studied in [15], wherethe authors proposed an algorithm to find minimumexposure paths, along which the probability of a movingobject being detected is minimized. The path exposureproblem is further explored in [16], [17], [18]. In [19], [20],[21], the k-coverage problem where each point is covered byat least k sensors was investigated. In [22], the authorsdefined and derived several important coverage measuresfor a large-scale stationary sensor network, namely, areacoverage, detection coverage, and node coverage, under aBoolean sensing model and a general sensing model. Othercoverage measures have also been studied. In [23], [24], theauthors studied a metric of quality of surveillance which isdefined to be the average distance that an intruder canmove before being detected, and proposed a virtual patrolmodel for surveillance operations in sensor networks. In[25], the authors studied a novel sensor self-deploymentproblem and introduced an F-coverage evaluation metric,coverage radius, which reflects the need to maximize thedistance from F to uncovered areas. The relationshipbetween area coverage and network connectivity is inves-tigated in [26], [27], [28].

While the coverage of stationary sensor networks hasbeen extensively studied and relatively well understood,researchers have started to explore the coverage of mobilesensor networks only recently. In [5], [8], [29], virtual-force

302 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 2, FEBRUARY 2013

Page 3: wireless sensor network,mobile networking

based algorithms are used to repel nodes from each otherand obstacles to maximize coverage area. In [9], algorithmsare proposed to identify existing coverage holes in thenetwork and compute the desired target positions wheresensors should move in order to increase the coverage. In[30], a distributed control and coordination algorithm isproposed to compute the optimal sensor deployment for aclass of utility functions which encode optimal coverageand sensing policies. In [31], mobility is used for sensordensity control such that the resultant sensor densityfollows the spatial variation of a scalar field in theenvironment. In [32], the authors considered the carrier-based sensor placement problem and proposed a novellocalized algorithm in which mobile robots carry staticsensors and drop them at visited empty vertices of a virtualgrid for full coverage. In [33], an autonomous planningprocess is developed to compute the deployment positionsof sensors and leader waypoints for navigationally chal-lenged sensor nodes. In [34], the authors investigated theproblem of self-deploying a network of mobile sensors withsimultaneous consideration to fault tolerance (biconnectiv-ity), coverage, diameter, and quantity of movementrequired to complete the deployment. In [35], the authorsformulated the distance-sensitive service discovery problemfor wireless sensor and actor networks, and proposed anovel localized algorithm (iMesh) that guarantees nearby(closest) service selection with a very high probability. Thedeployment of wireless sensor networks under mobilityconstraints and the tradeoff between mobility and sensordensity for coverage are studied in [36], [37].

Many of these proposed algorithms strive to spreadsensors to desired positions in order to obtain a stationaryconfiguration such that the coverage is optimized. The maindifference is how the desired sensor positions are com-puted. In this work, we study the coverage of a mobilesensor network from a very different perspective. Instead oftrying to achieve an improved stationary network config-uration as an end result of sensor movement, we focus onthe dynamic coverage properties resulting from the con-tinuous movement of the sensors.

Intrusion detection problem in mobile sensor networkshas been considered in a few recent studies, e.g., [38], [39],[40], [41], [42], [43]. In our work, we take a stochasticgeometry-based approach to derive closed-form expres-sions for the detection time under different network,mobility, and sensing models. In [44], Chin et al. proposedand studied a similar game theoretic problem formulationfor a different network and mobility model.

3 NETWORK AND MOBILITY MODELS

In this section, we describe the network and mobility model,and introduce three coverage measures for a mobile sensornetwork used in this study.

3.1 Sensing Model

We assume that each sensor has a sensing radius, r. Asensor can only sense the environment and detect intruderswithin its sensing area, which is the disk of radius rcentered at the sensor. A point is said to be covered bya sensor if it is located in the sensing area of the sensor. Thesensor network is thus partitioned into two regions, the

covered region, which is the region covered by at leastone sensor, and the uncovered region, which is thecomplement of the covered region. An intruder is said tobe detected if it lies within the covered region.

In reality, the sensing area of a sensor is usually not ofdisk shape due to hardware and environment factors.Nevertheless, the disk model can be used to approximatethe real sensing area and provide bounds for the real case.For example, the irregular sensing area of a sensor can belower and upper bounded by its maximum inscribed andminimum circumscribed circles, respectively.

3.2 Location and Mobility Model

We consider a sensor network consisting of a large numberof sensors placed in a 2D infinite plane. This is used to modela large 2D geographical region. For the initial configuration,we assume that, at time t ¼ 0, the locations of these sensorsare uniformly and independently distributed in the region.Such a random initial deployment is desirable in scenarioswhere prior knowledge of the region of interest is notavailable; it can also result from certain deploymentstrategies. Under this assumption, the sensor locations canbe modeled by a stationary two-dimensional Poisson pointprocess. Denote the density of the underlying Poisson pointprocess as �. The number of sensors located in a region R,NðRÞ, follows a Poisson distribution with parameter �kRk,where kRk represents the area of the region.

Since each sensor covers a disk of radius r, the initialconfiguration of the sensor network can be described by aPoisson Boolean model Bð�; rÞ. In a stationary sensornetwork, sensors do not move after being deployed andnetwork coverage remains the same as that of the initialconfiguration. In a mobile sensor network, depending on themobile platform and application scenario, sensors canchoose from a wide variety of mobility strategies, frompassive movement to highly coordinated and complicatedmotion. For example, sensors deployed in the air or watermay move passively according to external forces such as airor water currents; simple robots may have a limited set ofmobility patterns, and advanced robots can navigate in morecomplicated fashions; sensors mounted on vehicles andpeople move with their carriers, which may move randomlyand independently or perform highly coordinated search.

In this work, we consider the following sensor mobilitymodel. Sensors follow arbitrary random curves indepen-dently of each other without coordination among them-selves. In some cases, when it helps to yield closed-formresults and provide insights, we will make the model morespecific by limiting sensor movement to straight lines. Inthis model, the movement of a sensor is characterized byits speed and direction. A sensor randomly chooses adirection � 2 ½0; 2�Þ according to some distribution with aprobability density function of f�ð�Þ. The speed of thesensor, Vs, is randomly chosen from a finite range ½0; vmax

s �,according to a distribution density function of fVsðvÞ. Thesensor speed and direction are independently chosen fromtheir respective distributions.

The above models make simplified assumptions for realnetwork scenarios. Our purpose is to obtain analyticalresults based on the simplified assumptions and provideinsight and guideline to the deployment and performanceof mobile sensor networks. The Poisson distribution and

LIU ET AL.: DYNAMIC COVERAGE OF MOBILE SENSOR NETWORKS 303

Page 4: wireless sensor network,mobile networking

unit disk model have been widely used in the studies ofwireless networks (e.g., coverage and capacity problems) toobtain analytical results. The Poisson spatial distribution isa good approximation for large networks where nodes arerandomly and uniformly distributed. For the mobilitymodel, we consider the scenarios where nodes moveindependently of each other. For example, sensors can becarried by people or mounted on people’s vehicles, boats, oranimals, etc. These carriers are likely to move indepen-dently according to their own activity patterns withoutmuch coordination. This is similar to the uncoordinatedmobility model used in [39]. Note that in some scenarios(e.g., sensors mounted on robots) mobile sensors cancommunicate with each other and coordinate their moves.In that case, the sensors can optimize their movementpatterns and provide more efficient coverage than theindependent mobility case. In this paper, we will focus onthe independent mobility model.

Throughout the rest of this paper, we will refer to theinitial sensor network configuration as random sensor networkBð�; rÞ, the first mobility model where sensors move inarbitrary curves as random mobility model, and the morespecific mobility model where all sensors move in straightlines as straight-line mobility model. The shorthand X �expð�Þ stands for IPðX < xÞ ¼ 1� expð��xÞ, i.e., randomvariable X is exponentially distributed with parameter �.

3.3 Coverage Measures

To study the dynamic coverage properties of a mobilesensor network, we define the following three coveragemeasures.

Definition 1 (Area coverage). The area coverage of a sensornetwork at time t, faðtÞ, is the probability that a given pointxx 2 IR2 is covered by one or more sensors at time t.

Definition 2 (Time interval area coverage). The areacoverage of a sensor network during time interval ½s; tÞ withs < t, fiðs; tÞ, is the probability that given a point x 2 IR2,there exists u 2 ½s; tÞ such that x is covered by at least onesensor at time u.

Definition 3 (Detection time). Suppose that an intruder has atrajectory xðtÞ and that xð0Þ is uncovered at time t ¼ 0. Thedetection time of the intruder is the smallest t > 0 such thatxðtÞ is covered by at least one sensor at time t.

All three coverage measures depend not only on staticproperties of the sensor network (initial sensor distribu-tion, sensor density, and sensing range), but also on sensormovements. The characterization of area coverage atspecific time instants is important for applications thatrequire parts of the whole network be covered at anygiven time instant. The time interval area coverage isrelevant for applications that do not require or cannotafford simultaneous coverage of all locations at specifictime instants, but prefer to cover the network within sometime interval. The detection time is important for intrusiondetection applications, measuring how quickly a sensornetwork can detect a randomly located intruder.

4 AREA COVERAGE

In this section, we study and compare the area coverageof both stationary and mobile sensor networks. We first

analytically characterize the area coverage. We thendiscuss the implications of our results on networkplanning and show that sensor mobility can be exploitedto compensate for the lack of sensors to increase the areabeing covered during a time interval. However, we pointout, due to the sensor mobility, a point is only coveredpart of the time; we further characterize this effect bydetermining the fraction of time that a point is covered.Finally, we discuss the optimal moving strategies thatmaximize the area coverage during a time interval.

In a stationary sensor network, a location always remains

either covered or not covered. The area coverage does not

change over time. The effect of sensor mobility on area

coverage is illustrated in Fig. 1. The union of the solid disksconstitutes the area coverage at given time instants. As

sensors move around, exact locations that are covered at

different time instants change over time. The area that has

been covered during time interval ½0; tÞ is depicted as the

union of the shaded region and the solid disks. As can beobserved, more area is covered during the time interval

than the initial covered area. The following theorem

characterizes the effect of sensor mobility on area coverage.

Theorem 1. Consider a sensor network Bð�; rÞ at time t ¼ 0,

with sensors moving according to the random mobility model

1. At any time instant t, the fraction of area beingcovered is

faðtÞ ¼ 1� e���r2

; 8t � 0: ð1Þ

2. The fraction of area that has been covered at least onceduring time interval ½s; tÞ is

fiðs; tÞ ¼ 1� e��IEð�ðs;tÞÞ; ð2Þ

where IEð�ðs; tÞÞ is the expected area covered by a

sensor during time interval ½s; tÞ. When all sensors

move in straight lines, we have

fiðs; tÞ ¼ 1� e��ð�r2þ2r�vsðt�sÞÞ; ð3Þ

where �vs is the average sensor speed.3. The fraction of the time a point is covered is

ft ¼ 1� e���r2

: ð4Þ

304 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 2, FEBRUARY 2013

Fig. 1. Coverage of mobile sensor network: the left figure depicts theinitial network configuration at time 0 and the right figure illustrates theeffect of sensor mobility during time interval ½0; tÞ. The solid disksconstitutes the area being covered at the given time instant, and theunion of the shaded region and the solid disks represents the area beingcovered during the time interval.

Page 5: wireless sensor network,mobile networking

Due to the space limit, the proof of the theorem isprovided in the supplemental material, which can be foundon the Computer Society Digital Library at http://doi.ieeecomputersociety.org/10.1109/TPDS.2012.141, ofthe paper.

At any specific time instant, the fraction of the areabeing covered by the mobile sensor network describedabove is the same as in a stationary sensor network. This isbecause at any time instant, the positions of the sensorsstill form a Poisson point process with the same para-meters as in the initial configuration. However, unlike in astationary sensor network, covered locations change overtime; areas initially not covered will be covered as sensorsmove around. Consequently, intruders in the initiallyuncovered areas can be detected by the moving sensors.

When sensors all move in straight lines, the fraction ofthe area that has ever been covered increases andapproaches one as time proceeds. Later in this section, wewill prove that, among all possible curves, straight linemovement is an optimal strategy that maximizes the areabeing covered during a time interval. The rate at which thecovered area increases over time depends on the expectedsensor speed. The faster sensors move, the more quickly thedeployed region is covered. Therefore, sensor mobility canbe exploited to compensate for the lack of sensors toimprove the area coverage over an interval of time. This isuseful for applications that do not require or cannot affordsimultaneous coverage of all locations at any given time,but need to cover a region within a given time interval.Note that the area coverage during a time interval does notdepend on the distribution of sensors movement direction.Based on (3), we can compute the expected sensor speedrequired to have a certain fraction of the area (f0) coveredwithin a time interval of length t0

�vs ¼ ���r2 þ logð1� f0Þ

2�rt0; for f0 � 1� e��r2

:

However, the benefit of a greater area being covered atleast once during a time interval comes with a price. In astationary sensor network, a location is either alwayscovered or not covered, as determined by its initialconfiguration. In a mobile sensor network, as a result ofsensor mobility, a location is only covered part of the time,alternating between covered and not covered. The fractionof time that a location is covered corresponds to theprobability that it is covered, as shown in (4). Note thatthis probability is determined by the static properties ofthe network configuration (density and sensing range of thesensors), and does not depend on sensor mobility. Inthe next section, we will further characterize the duration ofthe time intervals that a location is covered and uncovered.

From the proof of Theorem 1, it is easy to see that areacoverage during a time interval is maximized when sensorsmove in straight lines. This is because, among all possiblecurves, the area covered by a sensor during time interval½s; tÞ, �ðs; tÞ, is maximized when the sensor moves in astraight line. Based on (2), we have the following theorem.

Theorem 2. In a sensor network Bð�; rÞ with sensors movingaccording to the random mobility model, the fraction of areacovered during any time interval ½s; tÞ is maximized whensensors all move in straight lines.

It is important to point out that straight line movement isnot the only optimal strategy that maximizes the areacoverage during a time interval. There is a family of optimalmovement patterns that maximize the coverage. Weconjecture that the optimal movement patterns have thefollowing properties: 1) the local radius of curvature isgreater than the sensing range r everywhere along theoriented trajectory; 2) if the euclidean distance between twopoints of the curve is less than 2r, then the distance betweenthem along the curve is less than �r. When these twoproperties are satisfied, the sensing disk of a sensor doesnot overlap with its previously covered areas, and a pointwill not be covered redundantly by the same sensor. Thecovering efficiency is thus maximized.

5 DETECTION TIME OF STATIONARY INTRUDER

The time it takes to detect an intruder is of great importancein many military and security-related applications. In thissection, we study the detection time of a randomly locatedstationary intruder. Detection time for a mobile intruder isinvestigated in the next section. To facilitate the analysis andillustrate the effect of sensor mobility on detection time, weconsider the scenario where all sensors move at a constantspeed vs. More general sensor speed distribution scenarioscan be approximated using the results of this analysis.

We assume that intruders do not initially fall into thecoverage area of any sensor, and an intruder will beimmediately detected when it falls into the sensing range ofmobile sensors. Obviously, these intruders will never bedetected in a stationary sensor network. In a mobile sensornetwork, however, an intruder can be detected by sensorspassing within a distance r of it, where r is the commonsensing range of the sensors. The detection time charac-terizes how quickly the mobile sensors can detect arandomly located intruder previously not detected. Wewill first derive the detection time when sensors all move instraight lines. We will then consider the case when sensorsmove according to arbitrary curves.

Theorem 3. Consider a sensor network Bð�; rÞ with sensorsmoving according to the straight-line random mobility modeland a static intruder. The sequence of times at which newsensors detect the intruder forms a Poisson process of intensity2�r�vs, where �vs denotes the average sensor speed. As aconsequence, the time before the first detection of the intruderis exponentially distributed with the same parameter.

Due to the space limit, the proof of the theorem isprovided in the supplemental material, available online, ofthe paper.

Compared to the case of stationary sensors where anundetected intruder always remains undetected, the prob-ability that the intruder is not detected in a mobile sensornetwork decreases exponentially over time

P ðX � tÞ ¼ e�2�rvst;

where X represents the detection time of the intruder.The expected detection time of a randomly located

intruder is E½X� ¼ 12�rvs

, which is inversely proportional tothe density of the sensors (�), the sensing range of each

LIU ET AL.: DYNAMIC COVERAGE OF MOBILE SENSOR NETWORKS 305

Page 6: wireless sensor network,mobile networking

sensor (r), and the speed of sensors (vs). Note that theexpected intruder detection time is independent of thesensor movement direction distribution density function,fs�ð�Þ. Therefore, in order to quickly detect a stationaryintruder, one can add more sensors, use sensors with largersensing ranges, or increase the speed of the mobile sensors.

To guarantee that the expected time to detect a randomlylocated stationary intruder be smaller than a specific valueT0, we have

1

2�rvs� T0;

or equivalently,

�vs �1

2rT0:

If the sensing range of each sensor is fixed, the aboveformula presents the tradeoff between sensor density andsensor mobility to ensure given expected intruder detectiontime requirement. The product of the sensor density andsensor speed should be larger than a constant. Therefore,sensor mobility can be exploited to compensate for the lackof sensors, and vice versa.

In the proof of Theorem 1, we pointed out that a locationalternates between being covered and not being covered,and then derived the fraction of time that a point is covered.While the time average characterization shows, to a certainextent, how well a point is covered, it does not reveal theduration of the time that a point is covered and uncovered.The time scales of such time durations are also veryimportant for network planning; they present the timegranularity of the intrusion detection capability that amobile sensor network can provide. Theorem 3 now allowsus to characterize the time durations of a point beingcovered and not being covered.

Corollary 1. Consider a random sensor network Bð�; rÞ at time

t ¼ 0, with sensors moving according to the straight-linerandom mobility model. A point alternates between being

covered and not being covered. Denote the time duration that apoint is covered as Tc, and the time duration that a point is notcovered as Tn, we have

Tn � expð2�rvsÞ ð5Þ

E½Tc� ¼e��r

2 � 1

2�rvs: ð6Þ

Proof. In the proof of Theorem 3 (see supplementalmaterial, available online), we know that the sequenceof times at which a new sensor hits a given point forms aPoisson process of intensity 2�rvs. After each sensor hitsthe point, it immediately covers the point until it movesout of range. There is no constraint on the number ofsensors that cover the point. Therefore, the covered/uncovered sequence experienced by the point can beseen as a M=G=1 queuing process, where the servicetime of an sensor is the time duration that the sensorcovers the point before moving out of range. The idleperiods of M=G=1 queue corresponds to the timeduration that the point is not covered. It is known that

idle periods in such queues have exponentially distrib-uted durations. Therefore, we have Tn � expð2�rvsÞ.

Since a point alternates between being covered and notbeing covered, the fraction of time a point is covered is

ft ¼E½Tc�

E½Tc� þE½Tn�¼ 1� e���r2

:

The last equality in the above equation is given in (4).Solving for E½Tc�, we obtain (6).

Let T denote the period of a point being covered andnot being covered, i.e., T ¼ Tc þ Tn. The expected valueof the period is

E½T � ¼ E½Tc� þ E½Tn� ¼ e��r2

=2�rvs:

tu

Above we obtain the detection time of a stationaryintruder when sensors all move in straight lines. In practice,mobile sensors do not always move in straight lines; theymay make turns and move in different curves, as depictedin Fig. 2. Next, we establish the optimal sensor movingstrategy to minimize the detection time of a stationaryintruder.

Theorem 4. Consider a sensor network Bð�; rÞ at time t ¼ 0,with sensors moving according to the random mobility modelat a fixed speed vs. The detection time of a randomly locatedstationary intruder, X, is minimized in probability if sensorsall move in straight lines.

Proof. From the proof of Theorem 3 (see supplementalmaterial, available online), we know that the number ofsensors detecting the intruder during the interval ½0; t�is Poisson distributed with mean IEðkAð0; tÞkÞ. Thus,we have

IP X � tð Þ ¼ IP cardð�ð0; tÞÞ � 1ð Þ ¼ 1� expð�IE kAð0; tÞkð ÞÞ;

which is a increasing function of IEðkAð0; tÞkÞ. AsIEðkAð0; tÞkÞ is maximized when sensors move alongstraight lines, the probability of detecting the intruder isalso maximized.

tu

Similar to the arguments on the optimal strategies for areacoverage in Section 4, straight line movement is not the onlyoptimal strategy that minimizes the detection time. There isa family of moving patterns that can minimize the detectiontime, where straight line movement is one of them.

In this work, we focus on the sensing model where eachsensor covers a disk area of radius r. It is of practical interest

306 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 2, FEBRUARY 2013

Fig. 2. Mobile sensor network with sensors moving along arbitrarycurves.

Page 7: wireless sensor network,mobile networking

to consider the scenario where the probability that anintruder is detected by a sensor depends on the distancebetween the two. In the supplemental file, available online,we consider the sensing model where each sensor senses itssurroundings with a certain intensity which vanishes withdistance, and examine the detection time under this model.

In this paper, we have assumed that an intruder isimmediately detected when it is hit by the perimeter of asensor, regardless of the time duration (ts) it stays in thesensing range of the sensor. In many intrusion detectionapplications, for example, radiation, chemical, and biologi-cal threats, due to the probabilistic nature of the phenom-enon and the sensing mechanisms, an intruder will not beimmediately detected once it enters the sensing range of asensor. Instead, it will take a certain amount of time todetect the intruder. If the sensing time is too short, anintruder may escape undetected. To account for this sensingtime requirement, we define td to be the minimum sensingtime in order for a sensor to detect an intruder. Obviously, itis only interesting when 0 � td � 2r=vs. Otherwise, thesensing time of an intruder by a sensor will be smaller thanthe minimum requirement td, and the intruder will never bedetected. In order to yield closed-form results and provideinsights, we will consider the straight-line random mobilitymodel as follows.

Theorem 5. Consider a sensor network Bð�; rÞ at time t ¼ 0,with sensors moving according to the straight-line randommobility model at a fixed speed vs. An intruder is detected iffthe sensing time ts is at least td, i.e., ts � td. Let Y be thedetection time of a randomly located stationary intruderinitially not located in the sensing area of any sensor, we have

Y ¼ td þ T ð7Þ

where

T � expð2�reffvsÞ ð8Þ

reff ¼ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffir2 � v

2st

2d

4

r: ð9Þ

Proof. We assume without loss of generality that theintruder is located at the origin. We observe first that asensor covers the intruder for a time longer than td ifand only if the distance between its trajectory and theorigin is less than reff (see Fig. 3). We call such sensorsvalid sensors.

Similarly as in Theorem 1, we define a thinnedPoisson process �effð0; tÞ by selecting the sensors thatwill detect the intruder during the interval ½0; t�. To do so,we define the effective covered area Aeffð0; tÞ of a sensor asthe area covered by the disk of radius reff centered on it.Then, the probability that a sensor initially located at xxdetects the intruder during the interval ½0; t� isIPð�xx 2 Aeffð0; tÞÞ. From the proof of Theorem 3 (seesupplemental material, available online), we find that theexpected number of points in �effð0; tÞ is � IEðkAeffð0 ;tÞkÞ ¼ 2�reffvs. Denoting by T the time before a validsensor covers the intruder, we get

IP T � tð Þ ¼ IPðcardð�effð0; tÞÞ � 1Þ ¼ 1� expð�2�reffvsÞ:

Then, the intruder is finally detected by the system aftera time T þ td. tuIn (7), the detection time has two terms, namely, a

constant term td and an exponentially distributed randomvariable with mean E½T � ¼ 1=ð2�reffvsÞ. The first term td is adirect consequence of the minimum sensing time require-ment. After the perimeter of a sensor hits an intruder, it takesa minimum sensing time of td to detect the intruder, andhence the constant delay. By Theorem 3, the second termcorresponds to the detection time in the case where there isno minimum sensing time requirement but sensors have areduced sensing radius of reff . This is again a consequence ofthe minimum sensing time requirement and the effect isillustrated in Fig. 3. An intruder will only be detected by amobile sensor if the trajectory of the sensor falls within reff

from the intruder. The above two effects of minimumsensing time requirement result in an increased expecteddetection time compared to the case without minimumsensing time requirement. Since td > 0 and reff < r, we have

E½Y � ¼ td þ 1=ð2�reffvsÞ > 1=ð2�rvsÞ ¼ E½X�:

Sensor speed has two opposite effects on an intruder’sdetection time:

. On one hand, as sensors move faster, uncoveredareas will be covered more quickly and this tends tospeed up the detection of intruders.

. On the other hand, the effective sensing radius reff

decreases as sensors increase their speed due to thesensing time requirement, making intruders lesslikely to be detected.

In the following, we present the optimal sensor speedthat minimizes the expected detection time. Excess mobilitywill be harmful when the sensor speed is larger than theoptimal value.

Theorem 6. Under the scenario in Theorem 5, the optimal sensorspeed minimizing the expected detection time of a randomlylocated intruder is

v�s ¼ffiffiffi2p

r=td: ð10Þ

Proof. Let dY =dvs ¼ 0, we have v�s ¼ffiffiffi2p

r=td, and the secondorder derivative d2Y

dv2sjv�s < 0. The corresponding minimum

expected detection time is

E½Y �� ¼ ð1þ 2�r2Þtd=2�r2:

tu

LIU ET AL.: DYNAMIC COVERAGE OF MOBILE SENSOR NETWORKS 307

Fig. 3. Effective radius of a mobile sensor.

Page 8: wireless sensor network,mobile networking

In real-world applications, the minimum required sen-sing time depends on a number of components: sensingmechanism (underlying physical, chemical, biological pro-cesses), hardware (CPU, ADC, memory, clock rate, etc.) andsoftware (operating systems) configurations. While theresponse time of some sensors is small (e.g., accelerometerMMA73x0L by Freescale Semiconductor, Inc., has a responsetime of less than 1 ms) and the effect on the detection time isnegligible, other sensors (e.g., certain optical biosensors,chemical sensors) have a response time of several seconds orlonger [45], [46], [47]. In this case, the effect of the minimumrequired sensing time on detection time of intruders cannotbe ignored. In a real sensor network system, one will need tomeasure the minimum required sensing time for theapplication and determine if the effect is negligible.

6 DETECTION TIME OF MOBILE INTRUDER

In this section, we consider the detection time of a mobileintruder, which depends not only on the mobility behaviorof the sensors but also on the movement of the intruderitself. Intruders can adopt a wide variety of movementpatterns. In this work, we will not consider specific intrudermovement patterns. Rather, we approach the problem froma game theoretic standpoint and study the optimal mobilitystrategies of the intruders and sensors.

For simplicity, we assume that an intruder will beimmediately detected when it falls into the sensing range ofmobile sensors. Note that the analysis and results of thedetection time requirement presented in the previoussection can be readily adapted in this part of the study.From Theorem 4, the detection time of a stationary sensorintruder is minimized when sensors all move in straightlines. This result can be easily extended to a mobile intruderusing similar arguments in the reference framework wherethe intruder is stationary. From the perspective of anintruder, since it only knows the mobility strategy of thesensors (sensor direction distribution density function) anddoes not know the locations and directions of the sensors,changing direction and speed will not help prolong itsdetection time. In the following, we will only consider thecase where sensors and intruders move in straight lines.

Given the mobility model of the sensors, f�ð�Þ, anintruder chooses the mobility strategy that maximizes itsexpected detection time. More specifically, an intruderchooses its speed vt 2 ½0; vmax

t Þ and direction �t 2 ½0; 2�Þ soas to maximize the expected detection time. The expecteddetection time is a function of the sensor directiondistribution density, intruder speed, and intruder movingdirection. Denote the resulting expected detection time asmaxvt;�tE½Xðf�ð�Þ; �t; vtÞ�; the sensors then choose themobility strategy (over all possible direction distributions)that minimizes the maximum expected detection time. Thiscan be viewed as a zero-sum minimax game between thecollection of mobile sensors and the intruder, where thepayoffs for the mobile sensors and intruder are �E½Xðf� ;�t; vtÞ� and E½Xðf�; �t; vtÞ�, respectively.

To find the optimal mobility strategies for mobile sensorsand the intruder, we consider the following minimaxoptimization problem:

minf�

max�t;vt

E½Xðf�; �t; vtÞ�: ð11Þ

To solve the minimax optimization problem, we firstcharacterize the detection time of an intruder moving at aconstant speed in a particular direction.

Theorem 7. Consider a sensor network Bð�; rÞ at time t ¼ 0,with sensors moving according to the straight-line randommobility model at a fixed speed vs. Let X be the detection timeof an intruder moving at speed vt along direction �t. Denote

c ¼ vt=vs; c ¼ 1þ c

wðuÞ ¼ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi1� 4c

c2cos2

u

2

r

vs ¼ vscZ 2�

0

wð�� �tÞf�ð�Þd�:

We have

X � expð2�rvsÞ: ð12Þ

Proof. To prove this theorem, we put ourselves in the frameof reference of the intruder and look at the speeds of thesensors. Thus, if a sensor has an absolute speed vector vs,its speed vector in the new frame of reference is simplyvs � vt, where vt denotes the intruder’s absolute speedvector.Let �s denote the direction of vs and �t thedirection of vt.

In the new frame of reference, the intruder is static.

Denote c ¼ vt=vs , c ¼ 1þ c, and wðuÞ ¼ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi1� 4c

c2 cos2 u2

q.

Using the Law of Cosines, the relative speed of the

sensor can be computed as

kvs � vtk ¼ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiv2s þ v2

t � 2vsvtcosð�s � �tÞq

¼ vscwð�s � �tÞ:

We know from the proof of Theorem 3 (see supple-mental material, available online) that

IP X � tð Þ ¼ IPðcardð�ð0; tÞÞ � 1Þ¼ 1� expð��IEðkAð0; tÞkÞ:

Therefore, if IEðkAð0; tÞkÞ is a linear function of t, then Xis exponentially distributed. We get

kAð0; tÞk ¼ 2rkvs � vtkt ¼ 2rtwð�s � �tÞ;

so that

IEðkAð0; tÞkÞ ¼ 2rt

Z 2�

0

wð�� �tÞf�ð�Þd�

¼ 2rtvs;

where vs ¼ vscR 2�

0 wð�� �tÞf�ð�Þd�, which can beviewed as the average effective sensor speed in thereference framework where the intruder is stationary.Therefore, the detection time is exponentially distributedwith rate 2�rvs. tuFrom Theorems 3 and 7, it can be noted that the detection

times of both stationary and mobile intruders followexponential distributions, and that the parameters are ofthe same form, except that the sensor speed is now replacedby the effective sensor speed for the mobile intruder case.

Assuming that the sensor density and sensing rangeare fixed, since the intruder detection time follows an

308 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 2, FEBRUARY 2013

Page 9: wireless sensor network,mobile networking

exponential distribution with mean 1=ð2�rvsÞ, maximizingthe expected detection time corresponds to minimizingthe effective sensor speed vs. In the following, we derive theoptimal intruder mobility strategies for two special sensormobility models.

Sensors move in the same direction �s: f�ð�Þ ¼ �ð�� �sÞ.Using the fundamental property of the delta functionR1

�1 fðxÞ�ðx� aÞdx ¼ fðaÞ, we have

vs ¼ vscZ 2�

0

wð�� �tÞ�ð�� �sÞd�

¼ vscwð�s � �tÞ:

We need to choose a proper �t and vt that minimizes theabove effective sensor speed vs. First, it is easy to see thatwe require �t ¼ �s. Now, we have

vs ¼ vscffiffiffiffiffiffiffiffiffiffiffiffiffi1� 4c

c2

r¼ jvt � vsj

and vs is minimized when

vt ¼vs if vmax

t � vsvmaxt otherwise:

The above results show, quite intuitively, that the intrudershould move in the same direction as the sensors at a speedclosest matching the sensor speed. If the maximum intruderspeed is larger than the sensor speed, the intruder will not bedetected since it chooses to move at the same speed and inthe same direction as the sensors. In this case, the detectiontime is infinity. Otherwise, if the maximum intruder speed issmaller than the sensor speed, the intruder should move atthe maximum speed in the same direction of the sensors. Theexpected detection time is 1

2�rðvs�vmaxt Þ .

Sensors move in uniformly random directions:f�ð�Þ ¼ 1

2� .Fig. 4 plots the normalized effective sensor speed vs=vs as

a function of c ¼ vt=vs, the ratio of the intruder speed to thesensor speed. The effective sensor speed is an increasingfunction of c, and is minimized when c ¼ 0, or vt ¼ 0.Therefore, if each sensor uniformly chooses its movingdirection from 0 to 2�, the maximum expected detectiontime is achieved when the intruder does not move. The

corresponding expected detection time is 12�rvs

. The optimalintruder mobility strategy in this case can be intuitivelyexplained as follows: Since sensors move in all directionswith equal probability, the movement of the intruder in anydirection will result in a larger relative speed and thus asmaller first hit time in that particular direction. Conse-quently, the minimum of the first hit times in all directions(detection time) will become smaller.

We now present the solution to the minimax gamebetween the collection of mobile sensors and the intruder inthe following theorem.

Theorem 8. Consider a sensor network Bð�; rÞ at time t ¼ 0,with sensors moving according to the random mobility modelat a fixed speed vs. For the game between the collection ofmobile sensors and the mobile intruder, the optimal sensorstrategy is for each sensor to choose a direction according to auniform distribution, i.e., f�ð�Þ ¼ 1

2� . The optimal mobilitystrategy of the intruder is to stay stationary. This solutionconstitutes a Nash equilibrium of the game.

Due to the space limit, the proof of the theorem isprovided in the supplemental material, available online, ofthe paper.

This result suggests that in order to minimize theexpected detection time of an intruder, sensors shouldchoose their directions uniformly at random between ½0; 2�Þ.The corresponding optimal mobility strategy of the intruderis to stay stationary. The uniformly random sensor move-ment represents a mixed strategy which is a Nashequilibrium of the game between mobile sensors andintruders. If sensors choose to move in any fixed direction(pure strategy), it can be exploited by an intruder by movingin the same direction as sensors to maximize its detectiontime. The optimal sensor strategy is to choose a mixture ofavailable pure strategies (move in a fixed direction between½0; 2�Þ). The proportion of the mix should be such that theintruder cannot exploit the choice by pursuing anyparticular pure strategy (move in the same direction assensors), resulting in a uniformly random distribution forsensor’s movement. When sensors and intruders followtheir respective optimal strategies, neither side can achievebetter performance by deviating from this behavior.

In this study, we assume that the goal of the mobileintruder is to maximize the expected detection so that it canstay undetected as long as possible. This is a desirable goalin some applications such as intruder intelligence gathering.In other applications, the intruder may want to pass througha region monitored by sensors ( e.g., [22], [48]) or to visit a setof particular locations without being detected. In these cases,the objective of the intruder is different and the correspond-ing optimal strategy would be different. In general, for aspecific application, we will need to first identify theobjective of the intruder and then study the correspondinggame between the intruder and mobile sensors.

7 SUMMARY

In this paper, we study the dynamic aspects of the coverageof a mobile sensor network resulting from the continuousmovement of sensors. Specifically, we studied the coveragemeasures related to the area coverage and intrusiondetection capability of a mobile sensor network.

LIU ET AL.: DYNAMIC COVERAGE OF MOBILE SENSOR NETWORKS 309

Fig. 4. Normalized effective relative sensor speed vs=vs as a function ofc ¼ vt=vs.

Page 10: wireless sensor network,mobile networking

For the random initial deployment and the randomsensor mobility model under consideration, we showed thatwhile the area coverage at any given time instants remainsunchanged, more area will be covered at least once during atime interval. This is important for applications that do notrequire or cannot afford simultaneous coverage of alllocations but want to cover the deployed region within acertain time interval. The cost is that a location is onlycovered part of the time, alternating between covered andnot covered. To this end, we characterized the durations andfraction of time that a location is covered and not covered.

As sensors move around, intruders that will never bedetected in a stationary sensor network can be detected bymoving sensors. We characterized the detection time of arandomly located stationary intruder. The results suggestthat sensor mobility can be exploited to effectively reducethe detection time of an intruder when the number ofsensors is limited. We further considered a more realisticsensing model where a minimum sensing time is requiredto detect an intruder. We find that there is an optimal sensorspeed that minimizes the expected detection time. Beyondthe optimal speed, excess mobility will be harmful to theintrusion detection performance. Moreover, we discussedthe optimal mobility strategies that maximize the areacoverage during a time interval and minimize the detectiontime of intruders.

For mobile intruders, the intruder detection timedepends on the mobility strategies of the sensors as wellas the intruders. We took a game theoretic approach andobtained the optimal mobility strategy for sensors andintruders. We showed that the optimal sensor mobilitystrategy is that each sensor chooses its direction uniformlyat random in all directions. By maximizing the entropy ofthe sensor direction distribution, the amount of priorinformation on sensor mobility strategy revealed to anintruder is minimized. The corresponding intruder mobilitystrategy is to stay stationary in order to maximize itsdetection time. This solution represents a Nash equilibriumof the game between mobile sensors and intruders. Neitherside can achieve better performance by deviating from theirrespective optimal strategies.

8 ACKNOWLEDGMENTS

Benyuan Liu was supported in part by the US NationalScience Foundation (NSF) under grants CNS-0953620 andCNS-1018303. Don Towsley was supported in part by theUS National Science Foundation (NSF) under grant CNS-1018464 and ARO MURI under grant W911NF-08-1-0233.

REFERENCES

[1] L.E. Navarro-Serment, R. Grabowski, C.J. Paredis, and P.K.Khosla, “Millibots: The Development of a Framework andAlgorithms for a Distributed Heterogeneous Robot Team,” IEEERobotics and Automation Magazine, vol. 9, no. 4, pp. 31-40, Dec.2002.

[2] S. Bergbreiter and K. Pister, “Cotsbots: An Off-the-Shelf Platformfor Distributed Robotics,” Proc. IEEE/RSJ Int’l Conf. IntelligentRobots and Systems, 2003.

[3] G.T. Sibley, M.H. Rahimi, and G.S. Sukhatme, “Robomote: A TinyMobile Robot Platform for Large-Scale Sensor Networks,” Proc.IEEE Int’l Conf. Robotics and Automation (ICRA), 2002.

[4] M.A. Batalin and G.S. Sukhatme, “Coverage, Exploration andDeployment by a Mobile Robot and Communication Network,”Telecomm. Systems J., Special Issue on Wireless Sensor Networks,vol. 26, no. 2, pp. 181-196, 2004.

[5] A. Howard, M. Mataric, and G. Sukhatme, “Mobile SensorNetwork Deployment Using Potential Fields: A Distributed,Scalable Solution to the Area Coverage Problem,” Proc. Int’l Symp.Distributed Autonomous Robotics Systems (DARS ’02), 2002.

[6] M. Batalin and G. Sukhatme, “Spreading Out: A Local Approachto Multi-Robot Coverage,” Proc. Sixth Int’l Conf. DistributedAutonomous Robotic Systems (DARS ’02), 2002.

[7] J. Pearce, P. Rybski, S. Stoeter, and N. Papanikolopoulous,“Dispersion Behaviors for a Team of Multiple Miniature Robots,”Proc. IEEE Int’l Conf. Robotics and Automation, 2003.

[8] Y. Zou and K. Chakrabarty, “Sensor Deployment and TargetLocalization Based on Virtual Forces,” Proc. IEEE INFOCOM,2003.

[9] G. Wang, G. Cao, and T.L. Porta, “Movement-Assisted SensorDeployment,” Proc. IEEE INFOCOM, 2004.

[10] G. Fletcher, X. Li, A. Nayak, and I. Stojmenovic, “RandomizedRobot-Assisted Relocation of Sensors for Coverage Repair inWireless Sensor Networks,” Proc. IEEE 72nd Vehicular TechnologyConf. (VTC), 2010.

[11] R. Falcon, X. Li, A. Nayak, and I. Stojmenovic, “The One-Commodity Traveling Salesman Problem with Selective Pickupand Delivery: An Ant Colony Approach,” Proc. IEEE Congress onEvolutionary Computation (CEC), 2010.

[12] X. Li, A. Nayak, D. Simplot-Ryl, and I. Stojmenovic, “SensorPlacement in Sensor and Actuator Networks,” Wireless Sensor andActuator Networks: Algorithms and Protocols for Scalable Coordinationand Data Communication, Wiley, 2010.

[13] S. Shakkottai, R. Srikant, and N. Shroff, “Unreliable Sensor Grids:Coverage, Connectivity and Diameter,” Proc. IEEE INFOCOM,2003.

[14] S. Meguerdichian, F. Koushanfar, M. Potkonjak, and M.B.Srivastava, “Coverage Problems in Wireless Ad-Hoc SensorNetworks,” Proc. IEEE INFOCOM, pp. 1380-1387, 2001.

[15] S. Meguerdichian, F. Koushanfar, G. Qu, and M. Potkonjak,“Exposure in Wireless Ad-Hoc Sensor Networks,” Proc. ACMMobiCom, pp. 139-150, 2001.

[16] X.-Y. Li, P.-J. Wan, and O. Frieder, “Coverage Problems inWireless Ad-Hoc Sensor Networks,” IEEE Trans. Computers,vol. 52, no. 6, pp. 753-763, June 2003.

[17] G. Veltri, Q. Huang, G. Qu, and M. Potkonjak, “Minimal andMaximal Exposure Path Algorithms for Wireless EmbeddedSensor Networks,” Proc. ACM Int’l Conf. Embedded NetworkedSensor Systems (Sensys), 2003.

[18] T.-L. Chin, P. Ramanathan, K.K. Saluja, and K.-C. Wang,“Exposure for Collaborative Detection Using Mobile SensorNetworks,” Proc. First IEEE Int’l Conf. Mobile Adhoc and SensorSystems, 2005.

[19] C. Huang and Y. Tseng, “The Coverage Problem in a WirelessSensor Network,” Proc. ACM Int’l Workshop Wireless SensorNetworks and Applications (WSNA), pp. 115-121, 2003.

[20] Z. Zhou, S. Das, and H. Gupta, “Connected k-Coverage Problemin Sensor Networks,” Proc. Int’l Conf. Computer Comm. andNetworks (ICCCN), 2004.

[21] S. Kumar, T. Lai, and J. Balogh, “On k-Coverage in a MostlySleeping Sensor Network,” Proc. ACM Mobicom, 2004.

[22] B. Liu and D. Towsley, “A Study on the Coverage of Large-ScaleSensor Networks,” Proc. First IEEE Int’l Conf. Mobile Ad-hoc andSensor Systems, 2004.

[23] C. Gui and P. Mohapatra, “Power Conservation and Quality ofSurveillance in Target Tracking Sensor Networks,” Proc. ACMMobicom, 2004.

[24] C. Gui and P. Mohapatra, “Virtual Patrol: A New PowerConservation Design for Surveillance Using Sensor Networks,”Proc. Int’l Workshop Information Processing in Sensor Networks(IPSN), 2005.

[25] X. Li, H. Frey, N. Santoro, and I. Stojmenovic, “Strictly LocalizedSensor Self-Deployment for Optimal Focused Coverage,” IEEETrans. Mobile Computing, vol. 10, no. 11, pp. 1520-1533, Nov. 2011.

[26] X. Wang, G. Xing, Y. Zhang, C. Lu, R. Pless, and C. Gill,“Integrated Coverage and Connectivity Configuration in WirelessSensor Networks,” Proc. ACM Conf. Embedded Networked SensorSystems (SenSys ’03), 2003.

310 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 2, FEBRUARY 2013

Page 11: wireless sensor network,mobile networking

[27] H. Zhang and J. Hou, “Maintaining Sensing Coverage andConnectivity in Sensor Networks,” Proc. Int’l Workshop Theoreticaland Algorithmic Aspects of Sensor, Ad Hoc Wireless and Peer-to-PeerNetworks, 2004.

[28] X. Bai, S. Kumar, Z. Yun, D. Xuan, and T.-H. Lai, “DeployingWireless Sensors to Achieve both Coverage and Connectivity,”Proc. ACM MobiHoc, 2006.

[29] S. Poduri and G.S. Sukhatme, “Constrained Coverage for MobileSensor Networks,” Proc. IEEE Int’l Conf. Robotics and Automation,2004.

[30] J. Cortes, S. Martinez, T. Karatas, and F. Bullo, “Coverage Controlfor Mobile Sensing Networks,” IEEE Trans. Robotics and Automa-tion, vol. 20, no. 2, pp. 243-255, Apr. 2004.

[31] B. Zhang and G.S. Sukhatme, “Controlling Sensor Density UsingMobility,” Proc. Second IEEE Workshop Embedded Networked Sensors,pp. 141-149, 2005.

[32] G. Fletcher, X. Li, A. Nayak, and I. Stojmenovic, “Back-TrackingBased Sensor Deployment by a Robot Team,” Proc. Seventh IEEEComm. Soc. Conf. Sensor, Mesh and Ad Hoc Comm. and Networks(SECON), pp. 385-393, 2010.

[33] Y. Tang, B. Birch, and L.E. Parker, “Planning Mobile Sensor NetDeployment for Navigationally-Challenged Sensor Nodes,” Proc.IEEE Int’l Conf. Robotics and Automation, 2004.

[34] A. Casteigts, J. Albert, S. Chaumette, A. Nayak, and I. Stojmenovic,“Biconnecting a Network of Mobile Robots Using Virtual AngularForces,” Computer Comm., vol. 35, pp. 1038-1046, 2012.

[35] X. Li, N. Santoro, and I. Stojmenovic, “Localized Distance-Sensitive Service Discovery in Wireless Sensor and Actor Net-works,” IEEE Trans. Computers, vol. 58, no. 9, pp. 1275-1288, Sept.2009.

[36] S. Chellappan, W. Gu, X. Bai, D. Xuan, B. Ma, and K. Zhang,“Deploying Wireless Sensor Networks under Limited MobilityConstraints,” IEEE Trans. Mobile Computing, vol. 6, no. 10,pp. 1142-1157, Oct. 2007.

[37] W. Wang, V. Srinivasan, and K.-C. Chua, “Trade-Offs betweenMobility and Density for Coverage in Wireless Sensor Networks,”Proc. ACM Mobicom, 2007.

[38] B. Liu, P. Brass, O. Dousse, P. Nain, and D. Towsley, “MobilityImproves Coverage of Sensor Networks,” Proc. ACM MobiHoc,2005.

[39] T.-L. Chin, P. Ramanathan, and K. Saluja, “Analytic Modeling ofDetection Latency in Mobile Sensor Networks,” Proc. Int’l Work-shop Information Processing in Sensor Networks (IPSN), 2006.

[40] O. Dousse, C. Tavoularis, and P. Thiran, “Delay of IntrusionDetection in Wireless Sensor Networks,” Proc. ACM MobiHoc,2006.

[41] G. Yang, W. Zhou, and D. Qiao, “Defending against BarrierIntrusion with Mobile Sensors,” Proc. Int’l Conf. Wireless Algo-rithms, Systems and Applications (WASA), 2007.

[42] Y. Keung, B. Li, and Q. Zhang, “The Intrusion Detection in MobileSensor Network,” Proc. ACM MobiHoc, 2010.

[43] Y. Peres, A. Sinclair, P. Sousi, and A. Stauffer, “Mobile GeometricGraphs: Detection, Coverage and Percolation,” Proc. Ann. ACM-SIAM Symp. Discrete Algorithms, 2011.

[44] J.-C. Chin, Y. Dong, W.-K. Hon, C.Y.T. Ma, and D.K.Y. Yau,“Detection of Intelligent Mobile Target in a Mobile SensorNetwork,” IEEE/ACM Trans. Networking, vol. 18, no. 1, pp. 41-52,Feb. 2010.

[45] A. Hierlemann and R. Gutierrez-Osuna, “Higher-Order ChemicalSensing,” Chemical Rev., vol. 108, pp. 563-613, 2008.

[46] S.M. Borisov and O.S. Wolfbeis, “Optical Biosensors,” ChemicalRev., vol. 108, pp. 423-661, 2008.

[47] X. Li, J.H. Cho, P. Kurup, and Z. Gu, “Novel Sensor Array Basedon Doped Tin Oxide Nanowires for Organic Vapor Detection,”Sensors and Actuators B, vol. 162, pp. 251-258, 2012.

[48] B. Liu, O. Dousse, J. Wang, and A. Saipulla, “Strong BarrierCoverage of Wireless Sensor Networks,” Proc. ACM MobiHoc,2008.

Benyuan Liu received the BS degree in physicsfrom the University of Science and Technology ofChina (USTC) in 1994, the MS degree in physicsfrom Yale University in 1998, and the PhD degreein computer science from the University ofMassachusetts, Amherst in 2003. He is currentlyan associate professor of computer science at theUniversity of Massachusetts Lowell. His mainresearch interests include the protocol designand performance modeling of wireless ad hoc and

sensor networks. He served as the technical program co-chair of theInternational Conference on Wireless Algorithms, Systems, and Applica-tions (WASA) in 2009, the technical program co-chair of the Cross-layerDesign and Optimization Track of IEEE International Conference onComputer Communication Networks (ICCCN) in 2008, and technicalprogram committee member of numerous computer networking confer-ences. He was the US National Science Foundation (NSF) CAREERAward recipient in 2010. He is a member of the IEEE.

Olivier Dousse (S’02-M’05) received the MScdegree in physics from the Swiss FederalInstitute of Technology at Lausanne, Switzer-land (EPFL) in 2000, and the PhD degree incommunication systems from the same institu-tion in 2005. From 2006 to 2008, he was with theDeutsche Telekom Laboratories in Berlin. He iscurrently a principal member of Research Staffat the Nokia Research Center in Lausanne. Hisresearch interests are in stochastic models for

communication networks. He received the honorable mention of the2005 ACM Doctoral Dissertation Competition and was runner up for theIEEE-Infocom Best Paper Award in 2003. He served as a guest editor ofthe IEEE Journal on Selected Areas in Communications in 2008 and isserving as an associate editor of the IEEE Transactions on MobileComputing since 2011. He is a member of the IEEE.

Philippe Nain received the PhD degree inapplied mathematics in 1981 from the Universityof Paris XI, Orsay, France. He is a researchdirector at INRIA (France), where he has beenthe scientific leader of the MAESTRO researchgroup devoted to the modeling of computersystems and telecommunications networkssince 1998. His research interests includemodeling and performance evaluation of com-munication networks. He is editor-in-chief of

Performance Evaluation. He is past associate editor of IEEE/ACMTransactions on Networking, IEEE Transactions on Automatic Control,Performance Evaluation, and Operations Research Letters. Dr. Nainwas a coprogram chair of the ACM Sigmetrics 2000 conference and thegeneral chair of the IFIP Performance 2005 conference.

Don Towsley received the BA degree in physicsin 1971 and the PhD degree in computer sciencein 1975 from the University of Texas. He iscurrently a distinguished professor at the De-partment of Computer Science, University ofMassachusetts. He has held visiting positions atnumerous universities and research labs. Hisresearch interests include networks and perfor-mance evaluation. He currently serves on theeditorial board of IEEE Journal on Selected

Areas in Communications and previously served as editor-in-chief ofIEEE/ACM Transactions on Networking and on numerous other editorialboards. He has served as a program co-chair of several conferencesincluding INFOCOM 2009. He is a member of ACM and ORSA. He hasreceived several achievement awards including the 2007 IEEE KojiKobayashi Award and the 2011 INFOCOM Achievement Award. He hasreceived numerous paper awards including a 2008 SIGCOMM Test-of-Time Paper Award and the 1998 IEEE Communications Society WilliamBennett Best Paper Award. He is a fellow of the IEEE and the ACM.

. For more information on this or any other computing topic,please visit our Digital Library at www.computer.org/publications/dlib.

LIU ET AL.: DYNAMIC COVERAGE OF MOBILE SENSOR NETWORKS 311