Skip to Main Content
Wireless sensor networks consist of a large number of sensors and have been broadly used for intrusion detection in surveillance systems. To guarantee detection quality, such networks are usually over-engineered, i.e., more than required sensors are deployed and remain active in order to cover each point in the monitored field with a high probability at any time instance. Existing sensor scheduling schemes based on the point coverage model tightly weave a sensor "net" that is unnecessarily dense. Intuitively, when the size and the shape of intrusion objects are considered, any net with holes no smaller than the size of the intrusion object would work fine. With this design philosophy in mind, we build a new mathematical model to investigate the impact of size and shape of intrusion objects on network configuration. We derive analytical results that provide practitioners with insights on how to weave an effective sensor "net" for intrusion object detection with minimum number of active sensors.