Surveillance and intrusion detection in wireless sensor networks: design, analysis, and evaluation
dc.contributor | Hong, Xiaoyan | |
dc.contributor | Vrbsky, Susan V. | |
dc.contributor | Zhang, Jingyuan | |
dc.contributor | Zhao, Shan | |
dc.contributor.advisor | Xiao, Yang | |
dc.contributor.author | Zhang, Yanping | |
dc.contributor.other | University of Alabama Tuscaloosa | |
dc.date.accessioned | 2017-04-26T14:22:23Z | |
dc.date.available | 2017-04-26T14:22:23Z | |
dc.date.issued | 2012 | |
dc.description | Electronic Thesis or Dissertation | en_US |
dc.description.abstract | Wireless sensor networks have many applications. In our research, we are particularly interested in applications of monitoring a field to detect emergent incidents, such as forest fire, or intrusion objects such as enemy tanks, vehicles, submarines, etc. The traditional way for environment monitoring is to deploy sensors all over the region. However, this way not only wastes huge amounts of money for sensor nodes and resources, but it is also unnecessary and unrealistic sometimes. It provides huge amounts of garbage in the form of dead sensor nodes and batteries. It invokes many data collisions and places a serious burden on network protocols. Since sensor nodes have limited energy supply, sensor networks may be configured to put some sensor nodes in sleep mode to save energy. We first studied the deployment and schedule strategy of sensors. We also study the impact of object size for intrusion detection. In many applications, we have no need to have detail on every point inside the area, but only in some critical places. For example, in a forest fire surveillance application, covering the whole forest is unnecessary and unrealistic. Then, we propose a divide and conquer based environment surveillance methodology. We deploy sensors along critical lines instead of all over the region which is divided into some small area. Our aim is to detect, or even capture a target or target event rather than tracking it in real time. There are main three components in the design: sensors, sinks, and robots. Instead of deploying sensors all over the monitored area we only deploy sensor in some critical areas which divide the interested region into small areas. In this strategy, robots play critical role for handling events. Next, we propose bio-inspired strategies for large area surveillance based on wireless sensor networks. Inspired by the scent-marking behavior among primates and many other mammals, we propose and study a collaboration strategy for mobile and static sensors. Finally, we propose a digital pheromone based patrolling strategy of robots. | en_US |
dc.format.extent | 221 p. | |
dc.format.medium | electronic | |
dc.format.mimetype | application/pdf | |
dc.identifier.other | u0015_0000001_0001007 | |
dc.identifier.other | Zhang_alatus_0004D_11106 | |
dc.identifier.uri | http://ir.ua.edu/handle/123456789/2927 | |
dc.language | English | |
dc.language.iso | en_US | |
dc.publisher | University of Alabama Libraries | |
dc.relation.hasversion | born digital | |
dc.relation.ispartof | The University of Alabama Electronic Theses and Dissertations | |
dc.relation.ispartof | The University of Alabama Libraries Digital Collections | |
dc.rights | All rights reserved by the author unless otherwise indicated. | en_US |
dc.subject | Computer science | |
dc.title | Surveillance and intrusion detection in wireless sensor networks: design, analysis, and evaluation | en_US |
dc.type | thesis | |
dc.type | text | |
etdms.degree.department | University of Alabama. Department of Computer Science | |
etdms.degree.discipline | Computer Science | |
etdms.degree.grantor | The University of Alabama | |
etdms.degree.level | doctoral | |
etdms.degree.name | Ph.D. |
Files
Original bundle
1 - 1 of 1