Barrier coverage construction without barrier-breach using virtual lines.

Saved in:
Bibliographic Details
Title: Barrier coverage construction without barrier-breach using virtual lines.
Authors: Lee, Joong-Lyul, Su, Ke, Zhou, Yisheng
Source: Discrete Mathematics, Algorithms & Applications; Nov2025, Vol. 17 Issue 8, p1-12, 12p
Subject Terms: WIRELESS sensor networks, ALGORITHMS, SECURITY systems, COMPUTER simulation
Abstract: In wireless sensor networks (WSNs), barrier coverage is used to detect objects crossing a protected area or to monitor an area of interest. It is a critical application within WSNs. Due to cost considerations, sensor nodes are often randomly deployed along the boundary of the monitoring area, constructing multiple barriers to maximize network lifetime. These barriers operate based on a sleep-wakeup schedule. However, a new security issue, known as the barrier-breach problem, can arise during this schedule. In this paper, we propose a novel barrier coverage construction algorithm (BCC_VL) that addresses the barrier-breach problem using Virtual Lines (VLs), a concept that has not been explored before. By employing VLs, our algorithm can construct a barrier coverage without any breaches. We conducted simulations to validate the proposed method, and the results were compared and verified against the MaxFlow model. In the MaxFlow_RM method, our approach demonstrated superior performance in identifying barrier coverage. [ABSTRACT FROM AUTHOR]
Copyright of Discrete Mathematics, Algorithms & Applications is the property of World Scientific Publishing Company and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
Database: Complementary Index
Description
Abstract:In wireless sensor networks (WSNs), barrier coverage is used to detect objects crossing a protected area or to monitor an area of interest. It is a critical application within WSNs. Due to cost considerations, sensor nodes are often randomly deployed along the boundary of the monitoring area, constructing multiple barriers to maximize network lifetime. These barriers operate based on a sleep-wakeup schedule. However, a new security issue, known as the barrier-breach problem, can arise during this schedule. In this paper, we propose a novel barrier coverage construction algorithm (BCC_VL) that addresses the barrier-breach problem using Virtual Lines (VLs), a concept that has not been explored before. By employing VLs, our algorithm can construct a barrier coverage without any breaches. We conducted simulations to validate the proposed method, and the results were compared and verified against the MaxFlow model. In the MaxFlow_RM method, our approach demonstrated superior performance in identifying barrier coverage. [ABSTRACT FROM AUTHOR]
ISSN:17938309
DOI:10.1142/S1793830924501246