Next Article in Journal
Credit Card Fraud Detection: An Improved Strategy for High Recall Using KNN, LDA, and Linear Regression
Next Article in Special Issue
A Precise and Stable Space-Based Time System for Navigation in Smart Cities
Previous Article in Journal
Paper-Based Aptasensors: Working Principles, Detection Modes, and Applications
Previous Article in Special Issue
In-City Rain Mapping from Commercial Microwave Links—Challenges and Opportunities
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

AutoBar: Automatic Barrier Coverage Formation for Danger Keep Out Applications in Smart City

1
Shanghai Technical Institute of Electronics and Information, Shanghai 201411, China
2
Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
3
School of Computer Sciences and Technology, East China Normal University, Shanghai 200050, China
4
School of Information Science & Engineering, East China University of Science and Technology, Shanghai 200231, China
5
Aerospace Technology Holding Group Co., Ltd., Beijing 100070, China
6
Department of Computer Science, Knowledge University, Erbil 44001, Iraq
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(18), 7787; https://doi.org/10.3390/s23187787
Submission received: 16 August 2023 / Revised: 2 September 2023 / Accepted: 4 September 2023 / Published: 10 September 2023
(This article belongs to the Special Issue Advances in Wireless Sensor Networks for Smart City)

Abstract

:
Barrier coverage is a fundamental application in wireless sensor networks, which are widely used for smart cities. In applications, the sensors form a barrier for the intruders and protect an area through intrusion detection. In this paper, we study a new branch of barrier coverage, namely warning barrier coverage (WBC). Different from the classic barrier coverage, WBC has the inverse protect direction, which moves the sensors surrounding a dangerous region and protects any unexpected visitors by warning them away from the dangers. WBC holds a promising prospect in many danger keep out applications for smart cities. For example, a WBC can enclose the debris area in the sea and alarm any approaching ships in order to avoid their damaging propellers. One special feature of WBC is that the target region is usually dangerous and its boundary is previously unknown. Hence, the scattered mobile nodes need to detect the boundary and form the barrier coverage themselves. It is challenging to form these distributed sensor nodes into a barrier because a node can sense only the local information and there is no global information of the unknown region or other nodes. To this end, in response to the newly proposed issue of the formation of barrier cover, we propose a novel solution AutoBar for mobile sensor nodes to automatically form a WBC for smart cities. Notably, this is the first work to trigger the coverage problem of the alarm barrier, wherein the regional information is not pre-known. To pursue the high coverage quality, we theoretically derive the optimal distribution pattern of sensor nodes using convex theory. Based on the analysis, we design a fully distributed algorithm that enables nodes to collaboratively move toward the optimal distribution pattern. In addition, AutoBar is able to reorganize the barrier even if any node is broken. To validate the feasibility of AutoBar, we develop the prototype of the specialized mobile node, which consists of two kinds of sensors: one for boundary detection and another for visitor detection. Based on the prototype, we conduct extensive real trace-driven simulations in various smart city scenarios. Performance results demonstrate that AutoBar outperforms the existing barrier coverage strategies in terms of coverage quality, formation duration, and communication overhead.

1. Introduction

Barrier coverage [1] is one vital application in wireless sensor networks (WSNs) for smart cities [2,3], which forms sensor nodes surrounding barriers to protect a region by detecting all intruders. A wide range of safety scenarios of smart city demand barrier coverage exist, for example, the country border surveillance for stowaway detection. In this paper, we extend the classic concept of barrier coverage to a new branch, which moves the sensor nodes surrounding a dangerous region and protects any unexpected visitors by warning them away from the dangers, so-called warning barrier coverage (WBC). The WBC is promising in many danger keep out application for smart cities. For example, a WBC can surround debris areas in floods and alarm rescue workers to avoid unnecessary harms. Moreover, WBC can warn people to avoid entering dangerous areas such as hazardous gas leaks and even nuclear radiations in cities.
We compare the classic barrier coverage and WBC in Table 1. Different from the classic barrier coverage, WBC focuses on the danger keep out applications whose boundary of target region is previously unknown. To avoid danger, people cannot become close to the region or deploy sensor nodes manually. Hence, besides the visitor detection, sensor nodes in WBC should have the capability to detect the boundary as well. Based on the sensing results, mobile sensor nodes form the barrier collaboratively.
Regardless of the classic barrier coverage used in WBC, the formation process [4] is crucial because newly deployed sensor nodes lack a dependable infrastructure for communication and detection. The formation process in WBC is defined to form sensor nodes into k barriers enclosing the region, thus detecting or warning unexpected visitors.
Researchers have put forward various solutions in the literature for classic barrier coverage formation for smart cities. For instance, Kumar [1] proposed a centralized algorithm to determine weak k-barrier coverage in a region using randomly deployed sensor networks. Later, ref. [5] devised efficient algorithms to construct strong sensor barriers. And ref. [6] studied the barrier coverage of line-based deployment. In addition, ref. [7] funded a cluster-based barrier construction algorithm in mobile wireless sensor networks.
Different from the known region in classic barrier coverage, the boundary of a dangerous region in WBC is usually unknown. Hence, the classic formation approaches are not appropriate for WBC in smart cities. In addition, most existing works [1,6] fall into the category that forms the barrier coverage by stationary sensor nodes. Nevertheless, if the stationary sensor nodes are stochastically deployed, many redundant nodes will be needed to ensure a strong barrier [5]. On the other hand, if the stationary nodes are manually deployed, a significant amount of manpower and time are consumed. Especially in some cases for smart cities, the region is rather large in scale or hides dangers. Therefore, using stationary nodes is more of a hindrance than a help in WBC. A few state-of-the-art works also considered using mobile sensor nodes [8,9,10] to facilitate the barrier coverage. However, these works assumed that the region boundary is pre-known [11], which is not practical in WBC.

1.1. Challenge and Countermeasure

  • To tackle the formation problem in WBC, in this paper, we propose a distributed movement strategy for mobile nodes to form the barrier coverage automatically for smart cities. The basic objective of the proposed strategy is to leverage the given number of mobile nodes to form a barrier coverage with the highest coverage quality, i.e., the maximal k-barrier coverage [1]. However, in scenarios wherein sensor nodes lack prior knowledge of their initial positions or the boundaries of the region, their movement can only be determined based on the local information they sense and communicate. This practical challenge presents a significant design obstacle.
  • In order to address the challenge, we study the barrier coverage formation problem as follows: First, based on the convex analysis [12], we derive the following: the optimal distribution pattern for k-barrier coverage is that all sensor nodes are evenly distributed on the convex hull of the region. Second, we devise an algorithm AutoBar, which navigates the sensor nodes to detect the region boundary by themselves and then gradually move, approaching the optimal distribution pattern based on their local information. Third, extensive simulations verify the validity of AutoBar and evaluate its characteristics such as formation duration, communication overhead, and moving distance.

1.2. Major Contribution

  • As far as we know, this is the first work to cover the coverage problem of the alarm barrier for smart cities, wherein the regional information is not pre-known.
  • The optimal distribution of sensor nodes with maximum k-barrier coverage is derived to guide design.
  • A fully distributed algorithm is developed to automatically form barrier coverage for sensor nodes.
The rest of this paper is organized as follows: Section 2 presents the related work. Section 3 formulates the barrier coverage formation problem. Section 4 investigates the optimal distribution pattern. The proposed algorithm is designed in Section 5 and the practical issues are discussed in Section 7. Section 6 depicts the results of simulation. In Section 8, we present conclusion and future work.

2. Related Work

In the construction of smart cities, information and communication technologies are used to improve the living standards and management of citizens and governments [13,14]. The Internet of Things (IoT) using sensors is widely used in smart cities [15]. In particular, the coverage-related problem [16,17] is a fundamental topic in WSNs to measure the monitoring quality of a sensor network deployed in a given region. Barrier coverage guarantees the detection of any intruder attempting to cross the barrier of sensor networks or penetrating the protected region. There are numerous studies on classical intrusion detection and avoidance [18,19,20]. Ref. [21] presents methods for intrusion detection and tracking with pan–tilt cameras. And ref. [22] proposes a probabilistic sensor tasking algorithm in which cameras sense the environment independently of one another, thus reducing the communication overhead. In addition, diverse directions are excellently studied for coverage problems, such as barrier coverage [1], sweep coverage [23], surface coverage [24], and trap coverage [25].
In these directions, barrier coverage is one valuable and practical application for smart cities, which is advocated in [1] for the purpose of intrusion detection in country borders, critical infrastructure protection, and battlefield perimeter surveillance. The barrier coverage formed by stationary nodes has been widely studied. For instance, the minimum cost for achieving k-barrier coverage is calculated in [26]. In [5], strong sensor barriers were devised. Line-based and curve-based barrier coverage were studied by [6,27], respectively. Multi-round sensor deployment for guaranteed barrier coverage is proposed in [28]. Nevertheless, a significant amount of resources such as redundant nodes in stochastic deployment and manpower cost in manual deployment will be needed due to the reliance on stationary nodes only.
Mobile nodes for barrier coverage was firstly introduced in [4], in which the nodes with limited mobility (e.g., one-step move with one chance) are utilized to improve the quality of barrier coverage. With the rapid development of autonomous robot technology, sensor nodes with strong mobility [29] become practical. In addition, a movement barrier formation algorithm MobiBar designed in [11] presented distributed algorithms for barrier coverage using sensor relocation. Ref. [30] proposed a heuristic target-barrier construction algorithm to solve the target-barrier coverage problem while satisfying the boundary constraint conditions. These works mainly focus on centralized analysis, which is not suitable for large-scale barrier coverage for smart cities.
Distributed algorithms for mobile barrier coverage were also investigated in the literature. The chain reaction algorithm [31] was firstly developed for mobile barrier formation. But it totally ignores the situation of node failure, which may lead to certain loopholes in the barrier. Based on mobility and intruder prior information, PMS [32] is able to improve the quality of barrier coverage. However, PMS assumes that the region knowledge is pre-known, which is not practical in most real WBC applications for smart cities. Moreover, ref. [33] presented a distributed cellular automaton based algorithm for the autonomous deployment of mobile sensors. The limitation is that the number of sensors needs to be deployed in a fixed manner. Our method focuses on this practical problem and is able to complete the barrier coverage without prior knowledge of regional information. In addition, we have listed references using Stationary nodes and Mobile nodes in Table 2.
Thus, it is essential to design a distributed, fault-tolerant, and automatic barrier coverage formation method using mobile nodes for WBC with the unknown regions for smart cities. The Autobar we proposed can be competent for this task.

3. Problem Formulation

In this section, we model the objects and then formulate the automatic barrier coverage formation problem.

3.1. System Model

Region: The region of interest A is the area needing to be surrounded by the barrier coverage. Assume that the region A is an enclosed area on a 2D plane, which has a continuous boundary in our model. We also assume that the detailed boundary information of the region A is not pre-known. The only known information is the general location of A. This is a practice-motivated assumption. For example, in a hazardous gas leakage incident of city sewage pipelines, the barrier coverage formation is strongly desired to surround the diffuse region rapidly and automatically, so that any unexpected visitor can be alarmed when she enters the dangerous region. In this case, the boundary of the diffuse region is not pre-known. And we can only obtain the general location where the hazardous gas leak happens.
Node: In our model, a sensor node is denoted by u i , where 1 i n and n is a given number. Any node can move on the plane within the maximal velocity v. A node has at least two sensors to sense the region (e.g., the debris area, the nuclear area) and the unexpected visitors (e.g., the ships, the people), respectively. The sensing area of each sensor is assumed to be the widely adopted disk model [1]. The disk radius of the sensor for region sensing is denoted by r s . Within  r s , we assume that the distance from the node to the region boundary d B can be obtained by this sensor (e.g., camera sensor) as shown in Figure 1. In addition, the disk radius of the other sensor for visitors detection is denoted by r d . The communication range between nodes is r c . Without loss of generality, we set r c > 2 r d as the setting in [1]. Every node u i knows its location information by equipping it with auxiliary devices such as GPS. The autonomous robotic fish for debris monitoring [34,35] is an example of such sensor node, which can move in floods, has a camera to sense the debris, has an acoustic sensor to detect any approaching rescue workers, is equipped with GPS to know its location, and has a Zigbee module to communicate with other robotic fishes and to warn the approaching rescue workers.
Warning Barrier coverage: We use a graph G ( n ) = ( V , E ) to describe the warning barrier coverage as in [1]. The set V consists of the vertexes corresponding to the nodes. If the distance between any two vertexes is less than 2 r d , then there is an edge between them. Strong barrier coverage [5] is described as a closed chain consisting of edges surrounding the region. Due to the mobility of nodes, this study only considers the formation of strong barrier coverage. Strong k-barrier coverage is expressed as k vertex-disjointed chains in G ( n ) . In other words, any unexpected visitor that crosses the barriers would be detected by at least k nodes. We adopt k to measure the quality of barrier coverage in this paper. Figure 2 shows an example of a k = 2 barrier coverage. Any path (e.g., the dash arrow) crossing the barrier coverage is covered by two nodes. Since the region A is not pre-known and the number of nodes n should be given before deployment, we practically set that n is a large enough number for barrier coverage formation to the region.

3.2. Fundamental Problem

The automatic barrier coverage formation (ABCF) problem for WBC is defined as the automatic movement of all mobile nodes to form the maximum k barrier coverage around the region of interest.
The goal of solving the ABCF problem is to maximize k under the constraints of given n nodes. This problem is non-trivial due to the following challenges: First, sensor nodes just have local information through communication and sensing. Without global information about boundary, it is difficult for nodes to know their destinations and paths. Second, it is common that some sensor nodes fail during the movement due to mechanical breakdown or depleted battery. Thus, the movement strategy should take the node failure into account. Third, centralized solutions consume heavy traffic on multi-hop transmissions, which are not appropriate for large-scale WBC for smart cities. Hence, a total distributed solution is required even if it is not easy.

4. Theoretical Analysis

In this section, when the region A and the number n are given, we export the maximum value k.

4.1. Different Types of k-Barrier Coverage

In order to satisfy different coverage requirements for smart cities, the distribution of sensor nodes in k-barrier coverage has different types. Two typical types are as follows:
Multi-level type: All sensor nodes form several disjoint barriers [11]. Figure 3a shows that eight nodes form a two-barrier coverage with multi-level type for a part of the region with straight boundary.
Line type: All sensor nodes form several barriers on one line [6]. Figure 3b displays that eight nodes form a two-barrier coverage with line type for a part of the region with straight boundary.
In terms of the definition of k-barrier coverage [1], the value of k is only determined as the expected visitor being discovered by at least k nodes when it passes the barriers. In Figure 3a,b, no matter which crossing path (dash arrow) is selected, the path is always covered by two nodes. Hence, we observe that both types can provide k = 2 barriers. The difference between two types is as follows: a visitor is detected by two nodes one after another in multi-level type. By contrast, it is detected by two nodes simultaneously in line type.
The advantage of multi-level type is to early detect the expected visitor benefiting from its “width”. Consequently, if the coverage requirement is to detect as early as possible, multi-level type is an excellent choice. On the contrary, the strength of line type is to form k barriers with the least number of nodes. Although two types achieve the same k in Figure 3a,b, if the straight boundary changes to be the arc boundary, in order to maintain k = 2 , multi-level type needs nine nodes, as seen in in Figure 3c, due to the outer ring always requiring more nodes, and line type only needs eight nodes, as seen in Figure 3d. In real scenarios for smart cities, an enclosed region with an arc boundary is a general case.
In this paper, the coverage requirement of the ABCF problem is to maximize k with the given n nodes. It is evident that the barrier of line type is a better candidate than the multi-level type.

4.2. Optimal Distribution Pattern

In this subsection, we derive the optimal destinations of n nodes in line type. Additionally, f c ( A ) denotes the length of the convex hull of region A. The method of obtaining f c ( A ) can be found in [12]. Therefore, we have
Theorem 1.
To achieve the maximum value of k, it is sufficient for n nodes to be evenly distributed on the convex hull of region A. The maximal value of expectation k is
k = 2 n r d f c ( A ) .
Proof of Theorem 1.
Convex analysis [12] establishes that the convex hull of a 2D region is the polygon with the smallest area and shortest perimeter that encompasses it. Thus, the shortest perimeter can be expressed as f c ( A ) . This indicates that f c ( A ) represents the minimum length required for one barrier.
Due to an edge existing when d ( u i , u j ) 2 r d , where d ( ) is the function to obtain the shortest distance between two objects, the maximum distance between any two connectable vertexes is 2 r d . If we connect n vertexes in a series, the total length of all these vertexes is at most 2 n r d .
Wrap the series of vertexes around the convex hull of region A, and we have the theoretical maximal value of k = 2 n r d / f c ( A ) .
Assuming a line-type distribution of sensor nodes along the shortest perimeter, each point on the perimeter is covered by multiple nodes. The minimum number of nodes covering a point is denoted as k, which corresponds to the definition of strong k-barrier coverage in [1].
When n vertexes are evenly distributed, we have the distance between any pair of the nearest neighbors
Δ = f c ( A ) n .
And any point on the perimeter is covered by at least
k = 2 r d Δ .
Combining Equations (2) and (3), we have
k = 2 r d Δ = 2 n r d f c ( A ) .
The equality obtained in Equation (1) confirms the sufficiency of the condition, thereby proving Theorem 1. □

5. AutoBar Design

We have investigated that the destinations of n nodes are evenly distributed on the convex hull of the region in the last section. In this section, firstly, we present how the sensor nodes move to the destinations according to the proposed AutoBar algorithm. Secondly, we analyze the reasons behind the AutoBar design.

5.1. Design Overview

The source position of the sensor is assumed to follow random distribution in the basic problem, while the optimal distribution of the destination is derived. Then, in this section, we develop a cooperative algorithm for the sensors moving automatically from their source to the destination with only local information. To solve this problem, we exploit a distributed algorithm, called AutoBar, for the nodes with automatic movement from their initial positions to the destinations derived in Theorem 1 with only local information. The main procedure of AutoBar includes two steps: boundary seeking and barrier forming.
Step 1: Boundary seeking. The goal of this step is to design the moving path for a node to find the region boundary. Since the sensor nodes neither pre-know their initial positions (which depends on the deployment type) nor pre-know the location of the region A (no global information), the moving path cannot be pre-planed. To automatically form the barrier coverage, sensor nodes should find the region boundary in their first step no matter where their initial positions are. All initial positions can be classified into three cases: outside, on, and inside the region boundary.
Case 1.1: Outside the boundary. A node u i is considered outside the boundary if its distance from A, denoted as d ( u i , A ) , is greater than r s . Node u i can self-determine whether it is outside the boundary through it cannot sense any part of region A within its r s disk, i.e., the sensing area of u i does not overlap with the region A. In this case, in order to find the boundary, this node is designed to randomly select an initial angle and then move along the Archimedean spiral, as shown in Figure 4a, until it meets the boundary of region A. The spiral path used for boundary detection in [36] offers several advantages. It evenly explores all directions, minimizing the risk of overlooking the region. Additional examination of the Archimedean spiral will be presented in the next subsection.
Case 1.2: On the boundary. When d ( u i , B ( A ) ) r s , the node u i is on the boundary, where B ( A ) is the function that obtains the boundary of region A. The node u i can be discretionary whether it is on the boundary by sensing the part of area of u i that overlaps with the region A. In this case, the current distance d B = d ( u i , B ( A ) ) can be sensed, and then the node moves along the shortest path to the boundary, as shown in Figure 4b.
Case 1.3: Inside the boundary. When d ( u i , B ( A ) ) > r s and u i A , the node u i is inside the boundary. Node u i can be discretionary whether it is inside the boundary by sensing area of node u i completely overlaps with the region A, i.e., included by A. In this case, the node can move along a straight line after randomly selecting the direction to the boundary, as shown in Figure 4c.
Step 2: Barrier forming. After finding the boundary, the goal of the second step is for nodes to move together to form the maximum k-barrier coverage. Nodes have two directions along the boundary: clockwise (Right) and counterclockwise (Left). The nearest neighbor in any direction is called a direct neighbor. The barrier formation step is only based on the transmission of position information between close neighbors, which is easy to implement, energy-efficient, and little-delayed. Due to each node itself searching for boundaries, the situation of its neighbors is uncertain. There are three other cases of direct neighbors: 0, 1, or 2 direct neighbors.
Case 2.1: No neighbor. When there are no neighbors of the node u i in its sensing range r d , it should self-move to find the other nodes to form the barrier together. We design that such node moves toward the clockwise direction, along the boundary of A, and with the velocity v until encountering the other node, as shown in Figure 5a.
Case 2.2: One direct neighbor. When a node u i has only one direct neighbor u L on one certain side, a virtual repulsive force [37] is generated between u i and u L . This force leads to the node u i moving toward the opposite direction of u L and along the boundary of region A until the destination location that d ( u i , u L ) = 2 r d , as shown in Figure 5b.
Case 2.3: Two direct neighbors. When node u i on each side has two direct neighbors u L and u R , these two neighbors will generate virtual forces. The amount of force depends on the distance d ( u i , u L ) and d ( u i , u R ) . To balance these two forces, it demands that the destination location u i has the uniform distance to its direct neighbors u L and u R , i.e.,  d ( u i , u L ) = d ( u i , u R ) . Moreover, a node with its two immediate neighbors can form an internal angle, which is facing the region. We have set a limit that the internal angle should not exceed 180 o . In Figure 5c, the internal angle is α 180 °. Therefore, in order to balance the forces, the destination of u i is u i and the moving path is along the boundary. In Figure 5d, the inner angle is α > 180 o because the part of the boundary is concave. In order to balance the forces and maintain the angle constraints, node u i moves directly to the bourn, which is the intermediate position between u L and u R .
The pseudo-code of AutoBar is shown in Algorithm 1, where the lines 2–12 present the boundary-seeking step and the lines 13–28 present the barrier-forming step.
Algorithm 1 AutoBar algorithm.
Executed on node u i
Input: the sensing range r s ,
1:
while  d ( u i , u L ) d ( u i , u R )  do
      // step 1
2:
     Sense within r s area and self-determine;
3:
     switch (Location)
4:
        case outside boundary: do
5:
           spiral_moving();
6:
           break;
7:
        case on boundary: do
8:
           direct_moving();
9:
           break;
10:
      case inside boundary: do
11:
         straight_moving();
12:
         break;
    // step 2
    // u i is the next position to move, α is the inner angle
13:
   Detect the direct neighbors u R and u L ;
14:
   Exchange position information with u R and u L ;
15:
   switch (Num of immediate neighbors)
16:
      ¡¡¡¡case 0: do
17:
          u i ←{clockwise direction with v};
18:
         ¡¡¡¡¡¡break;
19:
      ¡¡¡¡case 1: do
20:
          u i { d ( u L , u i ) = 2 r d & d ( u i , B ( A ) ) = 0 } ;
21:
         ¡¡¡¡¡¡break;
22:
      ¡¡¡¡case 2:
23:
         if( α > 180 ) do
24:
             u i ← the middle position of u R & u L ;
25:
         ¡¡¡¡¡¡else do
26:
             u i { d ( u R , u i ) = d ( u L , u i ) & d ( u i , B ( A ) ) = 0 } ;
27:
         ¡¡¡¡¡¡break;
28:
   Move to u i ;
29:
end while

5.2. Design Analysis

We analyze our solution in depth in this section. Section 5.2.1 discusses the necessity of a distributed algorithm. This paragraph indicates the practice of a distributed algorithm in the barrier coverage formation problem. Section 5.2.2 studies the Archimedean spiral, which is adopted as the movement strategy in Case 1.1. We further derive the upper bound of time cost for the boundary-seeking step based on the theory of the Archimedean spiral. Section 5.2.3 explains the reason of the design strategies in Case 2.1 and 2.2, which involves the movement decision when a sensor has no or one immediate neighbor. Section 5.2.4 gives the design reason of the limitation of the internal angle. This design is the foundation to distributively realize the convex hull. Section 5.2.5 provides the reason behind the local balance design. Combined with the local balance design and the internal angle design, we prove that the maximal k-barrier coverage formation can be achieved. And Section 5.2.6 describes the chain reaction procedure of AutoBar. According to our design, AutoBar cannot move sensors to their final destination directly, but gradually approaches the optimal distribution.

5.2.1. Necessity of a Distributed Algorithm

It is necessary that the proposed design can determine the movement strategy distributively due to the following reasons: First, since the communication range r c and the sensing range r s , r d are not infinite of smart cities, any node cannot directly know the global information such as the real-time positions of all the other nodes and the boundary of region A. Second, if the nodes share their real-time positions by multi-hop transmission, the communication overhead is too high, especially when n is large. Thus, we design AutoBar, in which every node determines its movement only based on its local information.

5.2.2. Archimedean Spiral in Case 1.1

In order to realize the automatic seeking, every node determines its movement according to Step 1. The movement strategies in Case 1.2 and 1.3 (shown in Figure 4b,c) are intuitive. Then, we discuss the moving path of the Archimedean spiral in Case 1.1.
The Archimedean spiral [38] is defined as the locus that rotates with constant angular velocity. One special property of such spiral is that its distance between successive turnings D (also known as pitch) is a constant. Hence, a node in Case 1.1 is set to move along the Archimedean spiral with setting D = 2 r s , as shown in Figure 6. In polar coordinates ( r , θ ) , this path can be described by the following equation:
r ( θ ) = D 2 π θ = r s π θ .
Since any node deployed outside the boundary does not know the location of region A, the node moving along this spiral path can gradually expand the seeking scope. On one hand, due to its constant angular velocity definition, the node searches for boundaries with equal probability in all directions. On the other hand, the node will not miss any area even in a very small region A due to the constant pitch property D = 2 r s . Thus, the successful seeking for region A is guaranteed.
Theorem 2.
Given that Z is the shortest distance between the initial position of a node u i and the region A, the time cost T s for this node to seek the boundary of A is
T s 2 r s π v Z 2 r s 2 + r s 2 v π ln ( 4 π Z 2 r s ) ,
if this node moves along the Archimedean spiral with pitch 2 r s using the velocity v.
Proof of Theorem 2.
Since d ( u i , A ) = Z and the pitch of the spiral is 2 r s , we can obtain that the number of turnings, for which the node needs to move to find the region A, is at most Z 2 r s , as shown in Figure 6.
Hence, the moving distance L of this node is no more than the length of these Z 2 r s -turning spiral. Using the theory of Archimedean spiral [38], we obtain
L 0 2 π Z 2 r s r ( θ ) 2 + r ( θ ) 2 d θ .
Substitute Equation (5) into Equation (7), we obtain
L r s π 0 2 π Z 2 r s θ 2 + 1 d θ .
In terms of the integral formula in [39], we further obtain
L r s π 1 2 θ θ 2 + 1 + 1 2 ln | θ + θ 2 + 1 | | 0 2 π Z 2 r s .
Approximate θ 2 + 1 by θ , we simplify Equation (9) to
L 2 r s π Z 2 r s 2 + r s 2 π ln ( 4 π Z 2 r s ) .
Substitute Equation (10) into T s = L / v , the result of Theorem 2 is obtained. □

5.2.3. Movement Strategy of Case 2.1 and 2.2

After the boundary seeking, a node needs to move for barrier-forming based on the number of immediate neighbors.
When a node has no immediate neighbor, it implies that this is an isolated node. In order to form a barrier coverage, this node has to find the other nodes. Thus, Case 2.1 proposes that the isolated node selects the clockwise direction and moves with its maximal velocity v to encounter one node as soon as possible. Moreover, in an extreme scenario, if only one node is utilized, this node will keep moving along the boundary of A according to Case 2.1, which is equivalent to providing a sweep barrier coverage for A.
When a node has only one immediate neighbor, it indicates that this node is at the side of a segmental barrier, which certainly covers a partial boundary of the region. In order to form a complete barrier, the segmental barrier is desired to cover the boundary as much as possible. Hence, Case 2.2 proposes that the virtual repulsive force pushes this node running away from neighbors and maintaining the distance at less than 2 r d . This strategy is able to enlarge the length of this segmental barrier, cover more vacant boundaries, and maintain the connection of the segmental barrier. Such node will keep moving until it encounters the other node as its second immediate neighbor; then, they can move according to Case 2.3 and form the k-barrier coverage gradually.

5.2.4. Limitation of Internal Angle in Case 2.3

The movement strategy in Case 2.3 is actually the main force to shape the k-barrier coverage. Recall that the maximal k-barrier coverage is achieved when n nodes are evenly distributed on the convex hull of A with respect to Theorem 1. In Case 2.3, we propose the limitation of internal angle to ensure the convex hull and design the local balance to realize the even distribution of sensor nodes.
A formed barrier is the convex hull of the region A which can be determined by (i) a convex shape with (ii) the shortest perimeter to cover the region. Hence, we set the limitation of internal angle α 180 ° in Case 2.3 to satisfy these two conditions.
For condition (i), since every internal angle is limited by α 180 °, the formed barrier is an obvious convex shape.
For condition (ii), when the partial segment of the boundary is convex, the node forms the barrier along the boundary, as shown in Figure 5c. In the case of convex segment, the boundary itself is the shortest radian [12]. On the other hand, when the partial segment of the boundary is concave, the nodes form a straight barrier for ensuring the limitation of internal angle, as shown in Figure 5d. In the concave case, the straight line definitely presents the shortest distance. Consider all convex/concave segments of the boundary together, and the entire formed barrier still has the shortest perimeter.
Hence, the limitation of internal angle can ensure that the nodes form the convex hull.

5.2.5. Local Balance in Case 2.3

Only forming the convex hull is not adequate to tackle the maximal k-barrier forming; therefore, another key question is: how does a node locally determine whether all nodes are evenly distributed on the convex hull?
In [1], Kumar et al. confirmed that no distributed algorithm can payoff whether the barrier coverage is formed in a stationary scenario. However, in our mobile node scenario, we propose the local balance criterion to determine the achievement of k-barrier coverage.
Definition 1.
Local balance: The distance between a sensor node and its two immediate neighbors is equal.
Theorem 3.
The maximal k-barrier coverage is achieved when each sensor node satisfies the local equilibrium.
Proof of Theorem 3.
Due to the limitation of internal angle, all nodes are on the convex hull, which is a closed chain. Thus, when every node satisfies the local balance, the distance between any pair of immediate neighbors is consequentially isometric, which meets the optimal distribution pattern in Theorem 1. Therefore, the maximal k-barrier coverage is achieved. □
Therefore, the local balance criterion can ensure that the nodes evenly distribute on the convex hull in regard to Theorem 3.
This theorem also demonstrates that a distributed algorithm to k-barrier coverage determination can be feasible in a mobile scenario, because every node can locally determine it by the local balance criterion and obtain the value of k by the distance Δ according to Equation (3).
Furthermore, the local balance is also set to be the terminating condition, as shown in the line 1 of the AutoBar algorithm in Algorithm 1. This implies that a node will stop moving only if its local balance is achieved.

5.2.6. Chain Reaction Procedure of AutoBar

Based on the above design analysis, it is obvious that AutoBar is a chain reaction procedure, where the nodes do not reach the final destinations directly, but gradually approach the optimal distribution pattern.
In Step 1, since the initial positions of the nodes are unknown, these nodes consume a different duration on boundary seeking. We adopt a first arrive first work (FAFW) mechanism, i.e., once a node finds the boundary, it starts Step 2 immediately without waiting for other nodes. This mechanism has two advantages: First, a node does not need to know the information from all the others, which meets the requirement of a distributed algorithm. Second, this mechanism assists to form at least a one-barrier coverage as fast as possible, which is valuable in certain time-critical applications.
In Step 2, a partial number of nodes may have built a barrier coverage firstly due to the FAFW mechanism. Then, any new arrival node will change the relationship of immediate neighbors and break the current local balance. Consequently, all the other nodes on the barrier should restart to adjust their positions little by little until the re-achievement of their (including the new arrival node together) local balance. This chain reaction repeats until all n nodes join into the barrier, and then the automatic maximal k-barrier coverage formation is finally realized.

5.2.7. Node Failure

AutoBar supports to re-form the barrier coverage when some nodes are failed. Assume a node is failed (damage or battery drained); the relationship of immediate neighbors will be changed and the local balance will be broken as well, which is similar to the new arrival node case. Then, the chain reaction will carry out to achieve the local balance of the rest nodes.

6. Performance Evaluation

In this section, we conduct extensive simulations in the scenario for smart cities to evaluate the proposed AutoBar algorithm.

6.1. Simulation Settings

In our simulation, the region of interest A is the colored area in an 800 m × 600 m rectangle area, as shown in Figure 7a, and the other part is white. Assume the initial positions of all nodes should be in the rectangle area. Any sensor node is able to detect the boundary of the region (by distinguishing the color in our simulation) within its sensing range r s = 25 m. The range for visitor detection is also set to r d = 25 m. Thus, any node is depicted as a point with a radius of 25 m, as shown in Figure 7a. Nodes also can propagate information within their communication ranges r c = 60 m. In addition, the number of nodes is set as n = 50 by default. Every node can move within the velocity of 10 m/s (even go outside the rectangle area). A node transmits its location information to its immediate neighbors once per second. The results described in this section are averaged over 100 simulation runs.

6.2. Performance Analysis

6.2.1. Validation with Different Deployment Types

The purpose of the first simulation is to verify the universal validation of the proposed AutoBar algorithm on automatic barrier coverage formation (ABCF).
The initial positions of the nodes are not pre-known, which rely on the deployment types. In order to test the feasibility of AutoBar with diverse distributions of initial positions, we conduct this simulation based on two typical deployment types: (i) Random deployment, in which all nodes are uniformly scattered in the rectangle area; and (ii) OnePosition deployment, in which all nodes are deployed at one position.
Figure 7a–d are four snapshots using AutoBar in Random deployment type. Since the initial positions of all nodes are uniformly distributed, as shown in Figure 7a, the nodes need to seek the boundary of the given region according to Step 1 in AutoBar. Once some nodes (Case 1.2 and 1.3) detect the boundary, they start Step 2 to form the barrier directly, as depicted in Figure 7b. Figure 7c illustrates that some nodes join into the barrier after spiral moving (Case 1.1). And Figure 7d displays the result of AutoBar, which forms a strong k = 2 barrier coverage.
Correspondingly, Figure 8a–d are four snapshots using AutoBar in OnePosition deployment type, which is a simple and practical deployment type specialized for ABCF problem. We assume that all nodes are deployed at one position on the region boundary. Thus, the nodes can skip Step 1, and gradually enlarge the barrier according to Case 2.2. Figure 8d exhibits that AutoBar also achieves the same two-barrier coverage formation as it does in Random deployment.
Therefore, this simulation demonstrates that AutoBar is valid for ABCF problem though the initial positions of the nodes are different.

6.2.2. Different Algorithms Comparison

This simulation evaluates the quality of the barrier coverage, i.e., the number of barriers k compared with the state-of-the-art algorithm MobiBar [11].
MobiBar is also a distributed algorithm to form the barrier coverage. One difference is that the goal of MobiBar is to form the multi-level barriers, as the example shown in Figure 3c. Another difference is that MobiBar works under an assumption of pre-knowing the region of interest. Under this assumption, the nodes do not need to seek the boundary and thus its application range is constrained. For fair comparison, we only compare AutoBar and MobiBar on the value of k, which just involves the final formed barriers. The comparison involving the boundary-seeking step such as formation duration, communication overhead, and moving distance are omitted.
Figure 9 displays the performance of k while the number of nodes n vary from 50 to 300. Both algorithms show that k is proportional to n. However, our AutoBar achieves a little higher k than MobiBar. For example, when 300 nodes are utilized, AutoBar achieves 12-barrier coverage while MobiBar achieves 10-barrier coverage. This result proves that AutoBar fully utilizes the number of nodes to shape the maximal k-barrier coverage.

6.2.3. Performance on Formation Duration

Except for the quality of barrier coverage k, the formation duration is another significant metric to evaluate the proposed algorithm. A short duration is desired for ABCF. Hereby, we measure the formation duration of AutoBar in different deployment types in Figure 10.
In the OnePosition deployment type, all time is consumed by the Step 2 barrier forming, which does not need the Step 1 boundary seeking. Hence, the formation duration mainly depends on how long the nodes at two ends can encounter each other, as shown in Figure 8a–c. And thus, the shape of the region A and the velocity of nodes v determine the formation duration without the influence from the number of nodes n. As a result, the formation duration remains at 2 min when n varies from 50 to 300, as seen in Figure 10.
By contrast, in the Random deployment type, since several faraway nodes require much time to find the region boundary through the spiral path, the formation duration mostly relies on how long the last node can join into the barriers. When more nodes are utilized, it has a higher probability of a longer distance between the region and the initial position of the farthest node. Therefore, the formation duration of the Random deployment is increased from 9.5 to 15.5 min with the increase in n, as shown in Figure 10. In addition, the curve converges around 15.5 min because the longest distance between A and the farthest node (has to be deployed inside the rectangle area) is finite.

6.2.4. Performance on Communication Overhead

Moreover, we consider the average communication times of every node for ABCF in Figure 11. In AutoBar, the communication happens only in the barrier-forming step, which demands the location information from the immediate neighbors. As a result, in the OnePosition deployment type, the number of average communication times of every node is around 120. In addition and in the Random deployment type, the average communication times changes from 141 to 163 when n is increased from 50 to 300, whose tendency is similar to the formation duration curve in Figure 10. We find that the communication overhead is very low, so the current wireless devices are sufficient to transmit necessary information to perform AutoBar.

6.2.5. Performance on Moving Distance

A mobile node is constrained by its equipped energy, which can support only the limited moving distance. The goal of this simulation is to measure the moving distance of every node using AutoBar in Random and OnePosition deployment types. The maximal, the average, and the minimal moving distances with different n are listed in Table 3. We find that the nodes do not move a long way. For example, even we randomly scatter 300 nodes, a node moves at most 9054 m and the average moving distance is 972 m. As another example, in the OnePosition deployment, no matter how many sensor nodes are utilized, the average moving distances remain around 350 m. These results further demonstrate the feasibility of AutoBar because current mobile nodes can satisfy the movement requirement.
Additionally, in terms of the above simulations, we strongly suggest to combine the OnePosition deployment type and AutoBar algorithm together to tackle the problem of automatic k-barrier coverage formation, whose advantages include simple deployment, high quality, quick formation, low overhead, and energy-saving.

7. Practical Issue

In this section, we discuss a few practical issues for smart cities when implementing AutoBar on mobile sensor nodes which include the mobility capability, energy consumption, computation and communication overhead, reliability and dependability, authentication and privacy, as well as hardware affordability and Scalability.

7.1. Mobility Capability

The proposed AutoBar demands that the nodes have the mobility capability. Plenty of mobile sensor nodes have been exploited in real applications for smart cities. For instance, in CarTel [29] project, vehicles equipped with sensors move along the roads. In addition, the SUMMIT [40] is a widely adopted multi-sensor robot, which can move on the diverse terrain. Furthermore, the Waalbot [41] robot is able to climb on the wall and ceiling. Hereby, using mobile nodes to form barrier coverage automatically has become practical recently for smart cities.

7.2. Energy Consumption

The energy consumption is another significant practical issue, which is considered by most WSN studies in smart cities. Different from the static WSNs, in the mobile scenario, movement costs much more energy than communication and computation [29]. The energy issue can be addressed in AutoBar due to the following reasons. On one hand, with the powerful battery, current autonomous robots such as the SUMMIT [40] can move 240 min with the velocity of 3 m/s, i.e., totaling 43.2 km. On the other hand, the sensor node using AutoBar is not required to move a long distance. For example, under our simulation setting in Section 6, the result shows that a node moves no more than 10 km.

7.3. Computation and Communication Overhead

The third issue needing to be considered is whether the computation and communication capability of sensor nodes are sufficient to perform AutoBar. From the algorithm in Algorithm 1, a node making one movement decision requires that the computational complexity is O ( 1 ) and the communication overhead is one message from two immediate neighbors, respectively. Current off-the-shelf mobile nodes such as the SUMMIT [40] (Embedded PC and WiFi) are more than adequate to apply our design.

7.4. Reliability and Dependability

Compared with the existing methods, AutoBar is totally distributed and is able to tolerate node failure. As mentioned in Section 5.2.7, Autobar has the ability to re-form the barrier coverage when some nodes fail. When a node fails, its neighbors can be regarded as “newly arrived nodes”, and a new local balance is reached through the chain reaction. This guarantees the reliability and dependability of AutoBar, which is fault-tolerant.

7.5. Authentication and Privacy

AutoBar can be widely used in smart cities, but it also brings problems worthy of attention like authenticity (people could be authenticated) and privacy (that have to be preserved). AutoBar is a distributed and automatic barrier coverage formation method using mobile nodes for WBC with the unknown regions. The main purpose of using AutoBar in smart cities is to keep humans out of dangerous areas such as nuclear leaks. An immediate warning can be issued for any unexpected visitors entering the covered region. It is possible to identify humans entering a particular area, and the technology itself can protect privacy [42,43].

7.6. Hardware Affordability

Deploying sensors without motion ability may cause a waste of resources. In addition, in a realistic case, the region of interest is usually large in scale and the task is dangerous and dull. It is impossible to deploy all sensors manually. Therefore, this paper introduces a solution that mobile sensors relocate their positions and self-organize the barrier coverage for the region. This design of AutoBar greatly reduces the cost of creating and deploying nodes.

7.7. Scalability

According to our design, AutoBar does not move sensors to their final destination directly, but gradually approaches the optimal distribution. In smart city applications, when the coverage region increases, we add new nodes. At this point, all the other nodes on the barrier should restart to adjust their positions until the re-achievement of their local balance. Ultimately, the automatic maximal k-barrier coverage formation can be achieved.

8. Conclusions

This article focuses on the application for smart cities of early warning barrier coverage and solves the problem of mobile nodes automatically forming barrier coverage. An AutoBar algorithm is proposed for nodes to automatically move nodes from their initial positions to form the maximum k-barrier coverage. The pragmatic algorithm can be widely used for different inception states, such as tatted or arbitrary deployment. AutoBar can warn people to avoid harmful gas leaks, nuclear contamination, and other dangerous areas in cities, reducing unnecessary injuries. To a certain extent, it also saves labor costs. It can effectively improve the safety and efficiency in smart cities, and has practical impact and extensive application value.
Due to the newly proposed issue of the formation of barrier cover, there are several promising research directions for the studies in the future. One of these directions is to extend AutoBar from an ideal 2D plane to a complex terrain situation for smart cities. For example, a surface with obstacles or holes. Second, optimizing the barrier coverage formation from other metrics such as the shortest formation time or the shortest moving distance is another are of research worth pursuing.

Author Contributions

Conceptualization, Y.S., S.F. and X.L.; methodology, Y.S., Z.W. and E.Z.; software, Z.W., J.C. and E.Z.; validation, Y.S., Q.W., J.C., K.Z.G. and L.K.; formal analysis, Y.S. and L.K.; investigation, S.F.; writing—original draft preparation, Y.S. and Q.W.; writing—review and editing, X.L. and L.K.; visualization, E.Z. and K.Z.G.; supervision, L.K.; project administration, Z.W.; funding acquisition, X.L. and L.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Natural Science Foundation of Shanghai (No.21ZR1419900).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data available upon request.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Kumar, S.; Lai, T.H.; Arora, A. Barrier coverage with wireless sensors. In Proceedings of the 11th Annual International Conference on Mobile Computing and Networking, Cologne, Germany, 28 August–2 September 2005; pp. 284–298. [Google Scholar]
  2. Chen, C.P.; Mukhopadhyay, S.C.; Chuang, C.L.; Lin, T.S.; Liao, M.S.; Wang, Y.C.; Jiang, J.A. A hybrid memetic framework for coverage optimization in wireless sensor networks. IEEE Trans. Cybern. 2014, 45, 2309–2322. [Google Scholar] [CrossRef] [PubMed]
  3. Yoon, Y.; Kim, Y.H. An efficient genetic algorithm for maximum coverage deployment in wireless sensor networks. IEEE Trans. Cybern. 2014, 43, 1473–1483. [Google Scholar] [CrossRef] [PubMed]
  4. Saipulla, A.; Liu, B.; Xing, G.; Fu, X.; Wang, J. Barrier coverage with sensors of limited mobility. In Proceedings of the Eleventh ACM International Symposium on Mobile ad Hoc Networking and Computing, Chicago, IL, USA, 20–24 September 2010; pp. 201–210. [Google Scholar]
  5. Tao, D.; Tang, S.J.; Zhang, H.T.; Mao, X.F.; Ma, H.D. Strong barrier coverage in directional sensor networks. Comput. Commun. 2012, 35, 895–905. [Google Scholar] [CrossRef]
  6. Saipulla, A.; Westphal, C.; Liu, B.; Wang, J. Barrier coverage with line-based deployed mobile sensors. IEEE Ad Hoc Netw. 2013, 11, 1381–1391. [Google Scholar] [CrossRef]
  7. Cheng, C.F.; Hsu, C.C.; Pan, M.S.; Srivastava, G.; Lin, J.C.W. A cluster-based barrier construction algorithm in mobile Wireless Sensor Networks. Phys. Commun. 2022, 54, 101839. [Google Scholar] [CrossRef]
  8. La, H.M.; Sheng, W.; Chen, J. Cooperative and active sensing in mobile sensor networks for scalar field mapping. IEEE Trans. Syst. Man Cybern. Syst. 2014, 45, 1–12. [Google Scholar] [CrossRef]
  9. Wang, J.; Pham, K. A Distributed Policy Gradient Algorithm for Optimal Coordination of Mobile Sensor Networks. In Proceedings of the 2022 IEEE Sensors, Dallas, TX, USA, 30 October–2 November 2022; pp. 1–4. [Google Scholar]
  10. Le, V.A.; Nguyen, L.; Nghiem, T.X. Multistep Predictions for Adaptive Sampling in Mobile Robotic Sensor Networks Using Proximal ADMM. IEEE Access 2022, 10, 64850–64861. [Google Scholar] [CrossRef]
  11. Silvestri, S. Mobibar: Barrier coverage with mobile sensors. In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM), Houston, TX, USA, 5–9 December 2011; pp. 1–6. [Google Scholar]
  12. Rockafellar, R.T. Convex Analysis; Princeton University Press: Princeton, NJ, USA, 1997; Volume 11. [Google Scholar]
  13. Attaran, H.; Kheibari, N.; Bahrepour, D. Toward integrated smart city: A new model for implementation and design challenges. GeoJournal 2022, 87, 511–526. [Google Scholar] [CrossRef]
  14. Trindade, E.P.; Hinnig, M.P.F.; Costa, E.M.D.; Marques, J.S.; Bastos, R.C.; Tan, Y. Sustainable development of smart cities: A systematic review of the literature. J. Open Innov. Technol. Mark. Complex. 2017, 3, 1–14. [Google Scholar] [CrossRef]
  15. Singh, S.P.; Viriyasitavat, W.; Juneja, S.; Alshahrani, H.; Shaikh, A.; Dhiman, G.; Singh, A.; Kaur, A. Dual adaption based evolutionary algorithm for optimized the smart healthcare communication service of the Internet of Things in smart city. Phys. Commun. 2022, 55, 101893. [Google Scholar] [CrossRef]
  16. Chu, Y.; Ahmadi, H.; Grace, D.; Burns, D. Deep Learning Assisted Fixed Wireless Access Network Coverage Planning. IEEE Access 2021, 9, 124530–124540. [Google Scholar] [CrossRef]
  17. Sharma, J.; Bhutani, A. Review on Deployment, Coverage and Connectivity in Wireless Sensor Networks. In Proceedings of the 2022 IEEE World Conference on Applied Intelligence and Computing (AIC), Sonbhadra, India, 17–19 June 2022; pp. 802–807. [Google Scholar]
  18. Bhadauria, S.; Mohanty, T. Hybrid Intrusion Detection System using an Unsupervised method for Anomaly-based Detection. In Proceedings of the 2021 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Hyderabad, India, 13–16 December 2021; pp. 1–6. [Google Scholar]
  19. Ouiazzane, S.; Addou, M.; Barramou, F. A Multi-Agent Model for Network Intrusion Detection. In Proceedings of the 2019 1st International Conference on Smart Systems and Data Science (ICSSD), Rabat, Morocco, 3–4 October 2019; pp. 1–5. [Google Scholar]
  20. Cai, X.; Ding, X. A comparative study of machine vision-based rail foreign object intrusion detection models. In Proceedings of the 2023 IEEE 3rd International Conference on Power, Electronics and Computer Applications (ICPECA), Shenyang, China, 19–31 January 2023; pp. 1304–1308. [Google Scholar]
  21. Biswas, A.; Guha, P.; Mukerjee, A.; Venkatesh, K.S. Intrusion detection and tracking with pan-tilt cameras. In Proceedings of the IET International Conference on Visual Information Engineering, Bangalore, India, 26–28 September 2006; pp. 565–571. [Google Scholar]
  22. Skraba, P.; Guibas, L. Energy efficient intrusion detection in camera sensor networks. In Proceedings of the Distributed Computing in Sensor Systems: Third IEEE International Conference, Santa Fe, NM, USA, 18–20 June 2007; pp. 309–323. [Google Scholar]
  23. Li, M.; Cheng, W.; Liu, K.; He, Y.; Li, X.; Liao, X. Sweep coverage with mobile sensors. IEEE Trans. Mob. Comput. (TMC) 2011, 10, 1534–1545. [Google Scholar]
  24. Kong, L.; Zhao, M.; Liu, X.Y.; Lu, J.; Liu, Y.; Wu, M.Y.; Shu, W. Surface coverage in sensor networks. IEEE Trans. Parallel Distrib. Syst. (TPDS) 2013, 25, 234–243. [Google Scholar] [CrossRef]
  25. Chen, J.; Li, J.; He, S.; He, T.; Gu, Y.; Sun, Y. On energy-efficient trap coverage in wireless sensor networks. ACM Trans. Sens. Netw. (TOSN) 2013, 10, 1–29. [Google Scholar] [CrossRef]
  26. He, J.; Shi, H. Constructing sensor barriers with minimum cost in wireless sensor networks. J. Parallel Distrib. Comput. (JPDC) 2012, 72, 1654–1663. [Google Scholar] [CrossRef]
  27. He, S.; Gong, X.; Zhang, J.; Chen, J.; Sun, Y. Curve-based deployment for barrier coverage in wireless sensor networks. IEEE Trans. Wirel. Commun. 2014, 13, 724–735. [Google Scholar] [CrossRef]
  28. Pang, C.; Shan, G.; Duan, X.; Xu, G. A Multi-Mode Sensor Management Approach in the Missions of Target Detecting and Tracking. Electronics 2019, 8, 71. [Google Scholar] [CrossRef]
  29. Hull, B.; Bychkovsky, V.; Zhang, Y.; Chen, K.; Goraczko, M.; Miu, A.; Madden, S. Cartel: A distributed mobile sensor computing system. In Proceedings of the 4th International Conference on Embedded Networked Sensor Systems, Boulder, CO, USA, 31 October–3 November 2006; pp. 125–138. [Google Scholar]
  30. Eftekhari, M.; Kranakis, E.; Krizanc, D.; Morales-Ponce, O.; Narayanan, L.; Opatrny, J.; Shende, S. Distributed algorithms for barrier coverage using relocatable sensors. In Proceedings of the 2013 ACM Symposium on Principles of Distributed Computing, Montreal, QC, Canada, 22–24 July 2013; pp. 383–392. [Google Scholar]
  31. Kong, L.; Liu, X.; Li, Z.; Wu, M.Y. Automatic barrier coverage formation with mobile sensor networks. In Proceedings of the 2010 IEEE International Conference on Communications, Cape Town, South Africa, 23–27 May 2010; pp. 1–5. [Google Scholar]
  32. He, S.; Chen, J.; Li, X.; Shen, X.; Sun, Y. Mobility and intruder prior information improving the barrier coverage of sparse sensor networks. IEEE Trans. Mob. Comput. 2013, 13, 1268–1282. [Google Scholar]
  33. Lloyd, H.; Hammoudeh, M. A Distributed Cellular Automaton Algorithm for Barrier Formation in Mobile Sensor Networks. In Proceedings of the 2010 Wireless Days (WD), Venice, Italy, 20–22 October 2010; pp. 1–4. [Google Scholar]
  34. Wang, Y.; Tan, R.; Xing, G.; Tan, X.; Wang, J.; Zhou, R. Spatiotemporal aquatic field reconstruction using robotic sensor swarm. In Proceedings of the 2012 IEEE 33rd Real-Time Systems Symposium, San Juan, PR, USA, 4–7 December 2012; pp. 205–214. [Google Scholar]
  35. Wang, Y.; Tan, R.; Xing, G.; Wang, J.; Tan, X.; Liu, X.; Chang, X. Aquatic debris monitoring using smartphone-based robotic sensors. In Proceedings of the 13th International Symposium on Information Processing in Sensor Networks, Berlin, Germany, 15–17 April 2014; pp. 13–24. [Google Scholar]
  36. Dubey, V.; Patel, B.; Barde, S. Path Optimization and Obstacle Avoidance using Gradient Method with Potential Fields for Mobile Robot. In Proceedings of the 2023 International Conference on Sustainable Computing and Smart Systems (ICSCSS), Coimbatore, India, 14–16 June 2023; pp. 1358–1364. [Google Scholar]
  37. Tomic, S.; Beko, M.; Dinis, R.; Montezuma, P. Distributed algorithm for target localization in wireless sensor networks using RSS and AoA measurements. Pervasive Mob. Comput. 2017, 37, 63–77. [Google Scholar] [CrossRef]
  38. Holland, H.C. The archimedes spiral. Nature 1957, 179, 432–433. [Google Scholar] [CrossRef]
  39. Zwillinger, D.; Jeffrey, A. Table of Integrals, Series, and Products; Elsevier: Amsterdam, The Netherlands, 2007. [Google Scholar]
  40. The Datasheet of Mobile Robot SUMMIT. Available online: http://www.robotnik.es/ilsupload/Summit-e.pdf (accessed on 1 August 2023).
  41. Gao, X.S.; Yan, L.; Wang, G.; Chen, I.-M. Modeling and Analysis of Magnetic Adhesion Module for Wall-Climbing Robot. IEEE Trans. Instrum. Meas. 2023, 72, 1–9. [Google Scholar] [CrossRef]
  42. Wu, S.; Wang, S.; Laganière, R.; Liu, C.; Wong, H.S.; Xu, Y. Exploiting Target Data to Learn Deep Convolutional Networks for Scene-Adapted Human Detection. IEEE Trans. Image Process. 2018, 27, 1418–1432. [Google Scholar] [CrossRef] [PubMed]
  43. Gao, Y.M.; Zhang, L.L.; Du, M.; Vai, M.I. Design of human motion detection based on the human body communication. In Proceedings of the TENCON 2015–2015 IEEE Region 10 Conference, Macao, China, 1–4 November 2015; pp. 1–4. [Google Scholar]
Figure 1. A node u i has two sensors to sense the region and detect unexpected visitors, respectively.
Figure 1. A node u i has two sensors to sense the region and detect unexpected visitors, respectively.
Sensors 23 07787 g001
Figure 2. Coverage map of strong k-barrier coverage around area A, where k = 2.
Figure 2. Coverage map of strong k-barrier coverage around area A, where k = 2.
Sensors 23 07787 g002
Figure 3. (a) Two-barrier coverage with multi-level type for a part of region with straight boundary. (b) Two-barrier coverage with line type for a part of region with straight boundary. (c) Two-barrier coverage with multi-level type for a part of region with arc boundary. (d) Two-barrier coverage with line type for a part of region with arc boundary.
Figure 3. (a) Two-barrier coverage with multi-level type for a part of region with straight boundary. (b) Two-barrier coverage with line type for a part of region with straight boundary. (c) Two-barrier coverage with multi-level type for a part of region with arc boundary. (d) Two-barrier coverage with line type for a part of region with arc boundary.
Sensors 23 07787 g003
Figure 4. The paths for boundary seeking: (a) Nodes outside the region move along the boundary in a spiral pattern. (b) Nodes on the boundary remain on the boundary. (c) Nodes inside the region move directly toward the boundary.
Figure 4. The paths for boundary seeking: (a) Nodes outside the region move along the boundary in a spiral pattern. (b) Nodes on the boundary remain on the boundary. (c) Nodes inside the region move directly toward the boundary.
Sensors 23 07787 g004
Figure 5. The movement strategy of the nodes for barrier forming: (a) If a node u i has no immediate neighbor, it selects clockwise direction and moves along the boundary until meeting the other node. (b) If a node u i has only one immediate neighbor, it moves away from that neighbor u L by a distance of 2 r d along the boundary. (c) If a node u i has two immediate neighbors and an internal angle ≤180°, it relocates on the boundary such that d ( u i , u L ) = d ( u i , u R ) . (d) When a node u i has two immediate neighbors and an internal angle > 180 °, it positions itself at the midpoint between u L and u R .
Figure 5. The movement strategy of the nodes for barrier forming: (a) If a node u i has no immediate neighbor, it selects clockwise direction and moves along the boundary until meeting the other node. (b) If a node u i has only one immediate neighbor, it moves away from that neighbor u L by a distance of 2 r d along the boundary. (c) If a node u i has two immediate neighbors and an internal angle ≤180°, it relocates on the boundary such that d ( u i , u L ) = d ( u i , u R ) . (d) When a node u i has two immediate neighbors and an internal angle > 180 °, it positions itself at the midpoint between u L and u R .
Sensors 23 07787 g005
Figure 6. The Archimedean spiral with pitch D = 2 r s .
Figure 6. The Archimedean spiral with pitch D = 2 r s .
Sensors 23 07787 g006
Figure 7. Four snapshots formed by AutoBar algorithm’s automatic barrier coverage when the initial positions of sensor nodes are randomly distributed in the region.
Figure 7. Four snapshots formed by AutoBar algorithm’s automatic barrier coverage when the initial positions of sensor nodes are randomly distributed in the region.
Sensors 23 07787 g007
Figure 8. Four snapshots formed by AutoBar algorithm’s automatic barrier coverage when all sensor nodes are scattered at the same position at the beginning.
Figure 8. Four snapshots formed by AutoBar algorithm’s automatic barrier coverage when all sensor nodes are scattered at the same position at the beginning.
Sensors 23 07787 g008
Figure 9. Comparison between AutoBar and MobiBar on the performance of k when varying n.
Figure 9. Comparison between AutoBar and MobiBar on the performance of k when varying n.
Sensors 23 07787 g009
Figure 10. The formation duration of AutoBar in different deployment types when varying n.
Figure 10. The formation duration of AutoBar in different deployment types when varying n.
Sensors 23 07787 g010
Figure 11. The communication overhead of AutoBar in different deployment types when varying n.
Figure 11. The communication overhead of AutoBar in different deployment types when varying n.
Sensors 23 07787 g011
Table 1. Comparison between classic barrier coverage and warning barrier coverage.
Table 1. Comparison between classic barrier coverage and warning barrier coverage.
Barrier CoverageClassicWarning
Target RegionKnownUnknown boundary
Sensing CapabilityIntruder detectionVisitor detection and boundary detection
Moving CapabilityMobile/static nodeMobile node
Typical ApplicationBorder surveillanceDanger, keep out!
Table 2. Comparison table of some references.
Table 2. Comparison table of some references.
ClassificationTitlePublish Time
Stationary nodesConstructing sensor barriers with minimum cost in wireless sensor networks [26].2012
Strong barrier coverage in directional sensor networks [5].2012
Barrier coverage with line-based deployed mobile sensors [6].2013
Curve-based deployment for barrier coverage in wireless sensor networks [27].2014
A multi-mode sensor management approach in the missions of target detecting and tracking [28].2019
Mobile nodesBarrier coverage with sensors of limited mobility [4].2010
Cartel: a distributed mobile sensor computing system [29].2006
Mobibar: Barrier coverage with mobile sensors [11].2011
Distributed algorithms for barrier coverage using relocatable sensors [30].2013
Automatic barrier coverage formation with mobile sensor networks [31].2010
Mobility and intruder prior information improving the barrier coverage of sparse sensor networks [32].2013
A distributed cellular automaton algorithm for barrier formation in mobile sensor networks [33].2019
Table 3. Moving distance (meters) in different deployment types.
Table 3. Moving distance (meters) in different deployment types.
Num. of Nodes n50100150200250300
RandomMax605775248463897190099054
Ave774851910946963972
Min171310866
OnePositionMax734731728725723720
Ave351349348346345344
Min000000
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Shao, Y.; Wang, Q.; Lu, X.; Wang, Z.; Zhao, E.; Fang, S.; Chen, J.; Kong, L.; Ghafoor, K.Z. AutoBar: Automatic Barrier Coverage Formation for Danger Keep Out Applications in Smart City. Sensors 2023, 23, 7787. https://doi.org/10.3390/s23187787

AMA Style

Shao Y, Wang Q, Lu X, Wang Z, Zhao E, Fang S, Chen J, Kong L, Ghafoor KZ. AutoBar: Automatic Barrier Coverage Formation for Danger Keep Out Applications in Smart City. Sensors. 2023; 23(18):7787. https://doi.org/10.3390/s23187787

Chicago/Turabian Style

Shao, Ying, Qiwen Wang, Xingjian Lu, Zhanquan Wang, E Zhao, Shuang Fang, Jianxiong Chen, Linghe Kong, and Kayhan Zrar Ghafoor. 2023. "AutoBar: Automatic Barrier Coverage Formation for Danger Keep Out Applications in Smart City" Sensors 23, no. 18: 7787. https://doi.org/10.3390/s23187787

APA Style

Shao, Y., Wang, Q., Lu, X., Wang, Z., Zhao, E., Fang, S., Chen, J., Kong, L., & Ghafoor, K. Z. (2023). AutoBar: Automatic Barrier Coverage Formation for Danger Keep Out Applications in Smart City. Sensors, 23(18), 7787. https://doi.org/10.3390/s23187787

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop