DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Tcha, Dong-Wan | - |
dc.contributor.advisor | 차동완 | - |
dc.contributor.author | Kim, Kwang-Soo | - |
dc.contributor.author | 김광수 | - |
dc.date.accessioned | 2011-12-27T04:21:43Z | - |
dc.date.available | 2011-12-27T04:21:43Z | - |
dc.date.issued | 2010 | - |
dc.identifier.uri | http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=454745&flag=dissertation | - |
dc.identifier.uri | http://hdl.handle.net/10203/53519 | - |
dc.description | 학위논문(박사) - 한국과학기술원 : 경영공학과, 2010.2, [ v, 73 p. ] | - |
dc.description.abstract | The main function of a wireless sensor network (WSN) is to detect intruders in its service area. Once a WSN is installed, it is desired to work as long as possible. For that the scarcity of energy from the limited size of sensor batteries has to be effectively handled, motivating us to develop energy efficient intruder detecting schemes in a WSN.Popularly used for extending the lifetime of a sensor network is a policy to let only a selected subset of sensors actively operate at a time while other sensors remain idle or in a sleep mode consuming only a tiny fraction of energy. This policy is adopted throughout, rendering the focus of our study on finding an optimal sleep schedule of sensors. For the sleep scheduling, introduced as a unit of selected sensor subset is the sensor path, which can by itself detect intruders and deliver that data via a form of alarm message to the gateway hub node for further processing. A sensor area is the area within which any intruder can be detected by a sensor at its center, taking the circular form. A sensor path is defined as a connected chain of overlapped sensor areas stretching from one side to the other side of a rectangular shaped cover (or service) area. Then the detection area covered by a sensor path looks like a strip stretching horizontally the rectangular service area. Penetration (confined here the vertical type only) by an intruder cannot thus be made without crossing the sensor area. Note that activating a certain sensor path means operating actively all the sensors constituting the barrier while letting all other sensors in the area be in the sleep mode. With the notion of sensor path, we deal with the problem on how to optimally schedule in time active ones from a list of sensor paths so as to maximize the lifetime of a WSN. Included in this setting is how to configure each candidate sensor path, which also affects the network’s lifetime. Provided that an intruder located within a sensor area is surely detect... | eng |
dc.language | eng | - |
dc.publisher | 한국과학기술원 | - |
dc.subject | energy efficiency | - |
dc.subject | wireless sensor network | - |
dc.subject | intruder detection | - |
dc.subject | 효율적 에너지 활용 | - |
dc.subject | 침입탐지 | - |
dc.subject | 무선 센서 네트워크 | - |
dc.subject | barrier coverage | - |
dc.title | Energy efficient intruder detection in a wireless sensor network | - |
dc.title.alternative | 무선 센서 네트워크에서의 에너지 효율적인 침입 탐지기법에 관한 연구 | - |
dc.type | Thesis(Ph.D) | - |
dc.identifier.CNRN | 454745/325007 | - |
dc.description.department | 한국과학기술원 : 경영공학과, | - |
dc.identifier.uid | 020015034 | - |
dc.contributor.localauthor | Tcha, Dong-Wan | - |
dc.contributor.localauthor | 차동완 | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.