The Community for Technology Leaders
2008 The 28th International Conference on Distributed Computing Systems Workshops (2008)
June 17, 2008 to June 20, 2008
ISSN: 1545-0678
ISBN: 978-0-7695-3173-1
pp: 315-320
Wireless sensor networks have many applications. In this paper, we are particularly interested in a sensor network which is used for monitoring a field to detect intrusion objects such as enemy tanks, enemy cars, etc. Since sensor nodes have limited energy supply, sensor networks may be configured to put some sensor nodes in sleep mode to save energy. This is a special case of a randomized scheduling algorithm. In this paper, we study the performance of the randomized scheduling algorithm via both analysis and simulation in terms of intrusion coverage intensity when an intrusion object occupies an area. We study the impact of the size of intrusion object on the sensor network’s configuration.
Intrusion Objects, Shapes, Randomized Scheduling Algorithm, Sensor Networks

H. Chen, B. Sun, K. Wu, Y. Zhang, X. Du and Y. Xiao, "Intrusion Objects with Shapes under Randomized Scheduling Algorithm in Sensor Networks," 2008 28th International Conference on Distributed Computing Systems Workshops (ICDCS Workshops)(ICDCSW), Beijing, 2008, pp. 315-320.
90 ms
(Ver 3.3 (11022016))