Coverage in Sensor Networks When Obstacles Are Present

Onur, Ertan
Delic, Hakan
Akarun, Lale
In this paper, we propose a method to determine the quality of deployment in a surveillance wireless sensor network in an environment that contains obstacles. The maximum detection probability on the potential breach paths is used as the deployment quality measure. The watershed segmentation algorithm is applied on the graph formed by the iso-sensing curves to identify the possible breach paths. An algorithm is proposed to convert the watershed segmentation to an auxiliary graph which is then employed to determine the deployment quality measure.


Fusion of thermal- and visible-band video for abandoned object detection
Beyan, Cigdem; Yiğit, Ahmet; Temizel, Alptekin (2011-07-01)
Timely detection of packages that are left unattended in public spaces is a security concern, and rapid detection is important for prevention of potential threats. Because constant surveillance of such places is challenging and labor intensive, automated abandoned-object-detection systems aiding operators have started to be widely used. In many studies, stationary objects, such as people sitting on a bench, are also detected as suspicious objects due to abandoned items being defined as items newly added to ...
Impacts of Routing Attacks on Surveillance Wireless Sensor Networks
Sert, Seyyit Alper; Yazıcı, Adnan; Coşar, Ahmet (2015-08-25)
Surveillance Wireless Sensor Networks (SWSNs) are the result of abundant data gathering requirements occurring in Wireless Sensor Networks, specifically for surveillance reasons. Most SWSNs operate by sensing the environment and transmitting the acquired data to a sink in order to utilize it for decision making processes such as object detection, classification, localization, or event detection. In this respect, secure routing of acquired data is crucial since a decision making process is performed accordin...
Optimized Hexagon-Based Deployment for Large-Scale Ubiquitous Sensor Networks
Al-Turjman, Fadi (2018-04-01)
Ubiquitous Sensor Network describes an application platform comprised of intelligently networked sensors deployed over a large area, supporting multiple application scenarios. On one hand, at the user-end, storing and managing the large amount of heterogeneous data generated by the network is a daunting task. On the other hand, at the network-end, ensuring network connectivity and longevity in a dynamically changing network environment, while trying to provide context-aware application data to the end-users...
Finding sensing coverage and breach paths in wireless sensor networks
Onur, Ertan; Delic, H (2004-01-01)
Most of the recent studies on wireless sensor networks deal with the communication coverage. However, for the surveillance wireless sensor networks, sensing coverage is an open research area. In this paper, the sensing coverage area of surveillance wireless sensor networks is studied. The sensing coverage is determined by applying Neyman-Pearson Detection Model and Dijkstra's shortest path algorithm is applied to find the weakest breach path. Although individually not enough, breach probability is an approp...
Surveillance wireless sensor networks: Deployment quality analysis
Onur, Ertan; Delic, Hakan; Akarun, Lale (2007-11-01)
Surveillance wireless sensor networks are deployed at perimeter or border locations to detect unauthorized intrusions. For deterministic deployment of sensors, the quality of deployment can be determined sufficiently by analysis in advance of deployment. However, when random deployment is required, determining the deployment quality becomes challenging. To assess the quality of sensor deployment, appropriate measures can be employed that reveal the weaknesses in the coverage of SWSNs with respect to the suc...
Citation Formats
E. Onur, H. Delic, and L. Akarun, “Coverage in Sensor Networks When Obstacles Are Present,” 2006, Accessed: 00, 2020. [Online]. Available: