Identification of Intelligence Requirements of Military Surveillance for a WSN Framework and Design of a Situation Aware Selective Resource Use Algorithm

Identification of Intelligence Requirements of Military Surveillance for a WSN Framework and Design of a Situation Aware Selective Resource Use Algorithm

S. Deepak RajH.S. Ramesh Babu 

SVIT, Rajanukunte, Bangalore, Affiliated to VTU, Belagavi 590018, India

Department of CSE, Presidency University, Bangalore 560064, India

Department of CSE, Sai Vidya Institute of Technology, Bangalore 560064, India

Corresponding Author Email: 
sdrbangalore@gmail.com
Page: 
251-261
|
DOI: 
https://doi.org/10.18280/ria.360209
Received: 
17 February 2022
|
Revised: 
6 April 2022
|
Accepted: 
12 April 2022
|
Available online: 
30 April 2022
| Citation

© 2022 IIETA. This article is published by IIETA and is licensed under the CC BY 4.0 license (http://creativecommons.org/licenses/by/4.0/).

OPEN ACCESS

Abstract: 

Protecting or safeguarding the place we live in is a basic activity of life. This is also observable in animals. Identifying a suitable place to build a nest or create a cozy home is a primary requirement of carefree living. Once such a place is identified and selected, a lot of effort and planning goes into making it comfortable. From then onwards begins the constant task of safeguarding the place of domicile. Protecting a place involves keeping a constant lookout for disruptive elements, invasion or attacks. The term corresponding to this activity is surveillance. Surveillance when extended to a city, a state, a nation and then to continents will perform the same functionality of enabling protection against attacks but at a larger scale. Unlike in case of a bird, animal or a family unit, such surveillance requires dedicated infrastructure. Usually such a large-scale surveillance infrastructure is designed, implemented and maintained by a dedicated military. Increase in organized crime and acts of terrorism have made military surveillance evermore important and an indispensable requirement of safety. In addition to attacks by men or manmade agents, natural calamities and disasters also require surveillance on an equally large scale. Surveillance which was historically centralized in deployment and investigative in essence needs to change. Existing surveillance and sensor infrastructure can be further used to gather intelligence. Aim of this work is to identify intelligence requirements of military surveillance for a WSN framework. We have designed and implemented an algorithm to compute the area under attack, communicated nearest neighbor nodes to carry out surveillance under attack. The proposed algorithm achieves situation aware selective use of sensor infrastructure.

Keywords: 

WSN, intelligence surveillance, military ISR, sensor management

1. Introduction

Military surveillance was limited to war time surveillance historically. In recent times, acts of terrorism have made military surveillance most necessary even in peace times. Due to the change in scales of such attacks, surveillance must also evolve to cover larger areas and transform into distributed deployments and be preventive in design of functionality. Formally, surveillance is the means of attaining situation awareness, the end. In order to construct the complete picture of a given situation, surveillance is used as a method to monitor and interpret the behavior of objects within a fixed space [1]. It follows that mere detection of activity is not sufficient. Surveillance must culminate in intelligence. Prevention of a disaster is the best case. If that fails, quick identification and immediate alarm generation with usable intelligence to contain or minimize loss is the next best case. If both are not possible, the system in place must help disaster management, salvage and provide inputs for process improvement. Military surveillance also involves enemy tracking, battle ground surveillance, intelligence, reconnaissance, attack strategy too [2, 3]. This process of intelligence gathering is analogous to understanding a situation while being physically away from the situation and analyzing with limited and local observations made from multiple independent observers.

Addition of intelligence in this context will allow us to deploy optimal networks, assign sensor tasks to necessary nodes and avoid energy loss on redundant data transfers. Need for such data reduction is a very important gap as identified. Irrespective of where intelligence is incorporated, such an effort only adds immense value to an otherwise passive surveillance and reporting framework. Ultimately, incorporation of intelligence in the WSN framework will reduce the extent of human involvement and automate decision making and network component management. Aim of this work is to recognize requirements of intelligence in a WSN framework designed for military surveillance and reconnaissance. Suitability of wireless sensor networks to military surveillance and reconnaissance applications to gather intelligence is clearly depicted in the data compiled in Table 1. In the present paper we propose a situation aware algorithm that identifies nearest neighbor nodes of area under attack and generates selective control commands. The algorithm brings down the total number of redundant use of sensor infrastructure. Thereby adds intelligence to the network. From the simulation experiments we have determined the number of sensor nodes actively sensing the environment with and without the incorporation of our situation aware selective resource use algorithm. Our results demonstrate a considerable reduction of redundant resource use.

In section 2 of this paper, we present an account of work related to our problem at hand. We present a summary of prevalent problems and results of research. In section 3, Open problems and gaps in research are identified while carrying out extensive literature survey. Section 4, deals with emerging research issues where challenges facing military intelligence and surveillance. Section 5 describes the mathematical model developed to exercise the algorithm designed as a simulation. Section 6 presents the implementation results and analysis of findings, followed by conclusion and scope of future work in section 7.

Table 1. Network characteristics comparing WSN, fixed sensor networks and mobile networks (modelled on Table 1)

 

 

WSN

Fixed sensor network

Mobile networks

Sensors and Base stations

Deployment

Fixed coordinates as planned or Random, ad hoc

Fixed at planned coordinates

Fixed or Planned

Dynamics

Stationary or mobile

Stationary or mobile

Stationary

Spatial coverage

Dense coverage

Sparse coverage

Sparse coverage

Number

Large

Small

Large

Type

Passive as well as active

Passive as well as active

Active only

Heterogeneous or homogeneous

Heterogeneous or homogeneous

Heterogeneous or homogeneous

Heterogeneous only

Entities under surveillance

Type

Cooperative or non-cooperative

Cooperative or non-cooperative

Always cooperative

Mobility

Static or dynamic

Mostly dynamic

Dynamic only

Extent

Distributed or localized

Distributed or localized

Localized only

Energy available

Constrained/Unconstrained

Constrained

Unconstrained

Unconstrained

Data processing framework

Centralized/distributed/hybrid

Distributed or hybrid

Centralized

Hybrid

Operating environment

Area size

Small

Medium to large

Large

Threats in area under surveillance/coverage

Low to High

Low to High

Low only

Communication

Bandwidth

Low

High

High

Networking

Wireless

Wired

Wired

2. Related Work

Singh et al. [4] have made a study of application of WSN to the problem of intrusion detection, classification of targets as well as tracking movements of intruders. They work with over ninety sensor nodes deployed on an experimental basis based on multiple designs. Their work assumes the network made of multimodal resource scarce sensors is unreliable. Sangaiah et al. [5] have also developed a similar application. A demonstration on similar lines is described in Ref. [6]. The application here deals with numerous vehicle tracking. The tracking is based on the framework of a pursuit evasion based game. The game basically has two teams contending to win: called the pursuers and the evaders. An additional element is a sensor network which aids pursuers track or trace their opponents. The sensor network keeps pursuers informed about the relative positions and movements of their enemies. In this way, sensors of the network augments the intelligence of pursuer elements and helps find their rivals. Yousefi et al. [7] have developed a vehicle tracking ‘vehicles of interest’. Approach used here is similar to basic immune based classification of own elements and intruder foreign bodies. We have implemented a similar algorithm to differentiate between self and non-self-presence in a military scenario and designed an algorithm. Yousefi et al. [7] have worked to keep track of a specifically identified vehicle using motes carrying audio or video sensors. The work deals with creating a coordinated effort among multiple sensors. Punriboon et al. [8] have presented arguments in favor of feasibility of military intelligence, surveillance and reconnaissance applications of WSNs in their work. They have identified the following aspects of WSN infrastructure as contributing significantly to cutting surveillance costs: Rotomotion SR20 VTOL UAV helicopter system is identified as suitable for Command, Control, Communications, Computers (C4) Intelligence, Surveillance and Reconnaissance (ISR), network extension, and sensor deployment. Crossbow wireless ad-hoc sensor networks are recognized to contribute InfraRed (IR) and magnetic-anomaly sensor coverage. Suitable communication protocols identified are, Open-standard internet-protocol router; Cisco voiceover- internet protocol; and wireless, satellite, and land mobile-radio-over-internet Protocol. These are optimal with secure voice and data communication up to 60 MHz. Sensor nodes that are commonly deployed are identified as XACTA deployable wireless-mesh nodes. Other than on-ground deployment, there are definite requirements for aerial surveillance too. Sensor nodes deployed aerially may be performing sensor functions themselves or work as aggregators or cluster heads. Such nodes may be deployed using helium filled balloons. Additionally repeaters or relay antennae may also be deployed on such balloons. Balloons equipped with Mesh Dynamics antennas are selected as suitable to this end. In the matter of communication protocol, IEEE 802.11. 802.16, and 802.20 wireless protocols are identified. A military sensor network deployed for surveillance is basically a WSN. It follows that basic functions of the network must also be taken care of for the application at hand to work. Such functions are also recognized in the quoted work. Aggregation of sensor data from multiple layers of sensors and unmanned aerial vehicle UAVs is a fundamental requirement. Sensors must sense individually but contribute data to the infrastructure as an aggregation. It is usual to deploy sensors of different energy levels in different physical or logical levels. Such a deployment aids in hierarchical management of data sensed in the bottom up movement of data and in top down movement of control communication. Physical requirement of such a deployment is the use of aerial nodes attached to quick- inflating balloons. Data integration also involves integration of sensor data from various types of sensors, like integration of IR and near-IR sensor data. Military surveillance is extended to monitoring of arms and ammunition. Weapons are also made to carry sensors. Such specialized weapons are called sensor fused weapons. They are made to serve the dual purpose of carrying out attack and sensing storage, use and effectiveness of weapons. It is identified that ground sensors when deployed as clusters of sensor fused weapons will help data integration too. In summary, network assumes to be constructed out of multiple sensors interacting with each other. Such networks are implemented as physical models as well as simulation exercises in literature. Basic logic involved in surveillance and intrusion detection is similar to gaming implementations. Some intrusion detection implementations do apply immune related algorithms. Sensor data is used in limited scope to determine presence of detection only. Application of intelligence is limited to data fusion and aggregation.

3. Open Problems and Gaps in Research

Open problems and gaps in research are plenty in military ISR, Singh et al. [9] have recognized the determination of whether in addition to what degree, the communication network can contribute to situation awareness among other scope for further research. Though there are convincing arguments on both sides saying WSN was developed due to military surveillance requirements and that WSN was developed first and adopted later to military requirements. The Defense Advanced Research Projects Agency (DARPA) incorporated Sensor Information Technology in 1980. Specifically in terms of tracking capability of WSN, National Science Foundation’s programs have worked and contributed too. Mallick et al. [10] have explored tracking capabilities in their work. Initial frameworks were limited to detection of intruder activity only. Measurements gathered by the sensors deployed would then be relayed across the network. Special notifications would then be generated and communicated in case of detection of intruder movement. From there on, military surveillance has grown beyond mere intruder detection to detection and measurement of chemical, biological as well as nuclear substances. Ahmad Ali et al, in their study on real time applications of WSN have traced applications of WSN in military surveillance beginning with sound surveillance systems of the United States military in the 1960 to recent trends. They have submitted their findings in future internet 2017. It is noted that military surveillance has come to encompass detection and tracking of submarines, airborne vehicles, in addition to soldier or vehicular movement. Further target recognition, tracking and border surveillance [11]. Njoya et al. [12] have developed a dense deployment of WSN aimed specifically at border surveillance. This work focuses on ensuring intruders do not cross over the border under surveillance. Advantages of such a deployment are beyond military surveillance. The same infrastructure will also aid in detecting smugglers of wildlife and exotic plants and trees. Like terrestrial military surveillance, underwater surveillance has also gained substantial limelight in research. We have implemented intelligence incorporating algorithms into underwater surveillance. Alfouzan [13] have investigated underwater WSN too. Though they have focused on improvement of sensor lifetime while not compromising on the bandwidth, they have contributed to sensor surveillance of aquatic life, collision avoidance of submarine vehicles as well. Underwater WSN unlike terrestrial deployments aid in continuous monitoring of ecology. Passive surveillance is important and will always retain its value, however with evolving threats and increase in scale of attacks, surveillance systems must evolve too. Next step in surveillance is smart surveillance. The Ref. [14] reports work dealing with making military surveillance smart and informative. Smart surveillance is a suitable framework to incorporate preventive mechanisms with investigation of the aftermath of an attack. This specific evolution is geared towards integration of intelligence into WSN surveillance to attain situation awareness. Smart surveillance aims at automating the process of sensor data analysis [15]. Formally, this vital step was in the control and hands of human users of the network. Due to the inherent nature of the framework, a delay is expected in generating usable intelligence from the sensor data. By incorporating data analysis techniques within the sensor framework itself, observations are transformed into usable situation aware knowledge or intelligence. In spite of this technology, it will remain to be used in the capacity of a decision support system. Such intelligent situation aware surveillance networks are equally applicable to peacetime monitoring also. Public safety systems deployed in railway stations, airports, places of crowd congregations, and disaster management are candidate applications where such a framework will prove equally if not more valuable. Incorporation of intelligence requires addition of few desirable characteristics into the framework. Military surveillance in war and in peace keeping missions encompasses large areas. Safety, confidentiality and integrity are critical qualities of such applications. It is also an obvious requirement that human involvement, if any, will be from a geographically separated remote location. These requirements demand additional features from the framework. In addition to heterogeneous sensor capability, self-organization capabilities of WSN network, information fusion and collaborative sensor control must also be incorporated. Bunke et al. [16] have studied sensor application in robotics while dealing with details of how sensor data is transformed into spatial estimations of ground layout. The work describes creation of a topological map of a spatial region just using sensor data collected from sensors mounted on robotic devices. Saleh et al. [17] have introduced a sensor network architecture for an information gathering facility. Their work is two pronged, one aiming at querying information from sensor data, the other at performance of sensor tasks using programming scripts. The framework allows basic querying, monitoring and tasking of sensors by implementing a programmable intermediate substrate layer. The work shows how coordination and control of networks can create associations to achieve surveillance or intelligence gathering goals. The framework allows us to even keep a constant track of the sensors, their activities and enforce coordination rules on their activities. Enabling sensor nodes with computational capabilities or inclusion of intelligence in WSN sensors, requires computational capability at the node level itself. Emerging technologies and advances in sensor hardware have made this quite possible. One such model is studied and reported. They have created and evaluated a directed diffusion paradigm. Computation capability of the sensor is employed to sense and use the data within the network itself. Approach here is data centric, where every node is enlightened about the application it is part of. Nodes are not dumb observers with passive tasks assigned to them, but intelligent and active appendages of the networking infrastructure. Next issue with WSN is the loss of sensors. Sensor loss is a persistent issue irrespective of the size of deployment. Some sensors are lost due to drainage of the onboard battery. Some sensors are physically partially damaged or completely destroyed due to physical factors of the terrain. Especially in military surveillance, sensors are damaged and destroyed more than in civilian deployments. Graceful management of sensor loss while continuing the monitoring activity is a very essential attribute of the WSN framework. Ullah [18], and Singh et al. [19] have come up with an algorithm to add fault tolerance. They have brought in a bottom up approach to detect loss of a node at the lowest level of deployment possible. When lost nodes are detected and accounted for, in sensor management, robustness of observation is enhanced. The graph summarizing global expenditure on military shown in Figure 1 is a clear indication of increase in expenses despite the regional classification recognized by the study. This data is from the Stockholm peace research institute, which has recognized Africa, America and surrounding regions, Asia and the neighbors, Europe and Middle East as the regions and accommodated all nations within the classification. According to the report published on 26th April 2021, the global expenditure stands at $1981 billion by the end of 2020. Military expenses have also been observed to have grown in the first twelve months of the COVID-19 pandemic. What actually shows the focus on military expenditure is the fact that a 2.6% increase in expenditure is recorded in spite of a 4.4% decrease in the global gross domestic product. Gaps identified can be summarized as under:

  • use of ground intelligence to manage sensor infrastructure.
  • use of situation awareness to selectively enable sensor and communication functions.
  • use network infrastructure topology in making situation aware decisions.
  • design and apply situation aware, topology aware intelligence algorithms to aid military surveillance and reconnaissance.

Figure 1. Global expenditure in billion us dollars, since 1990 [20]

According to a technical report cited from the study [21], military expenditure is also focused on emerging smart surveillance systems. Reason attributed to such an increase is the affordability of pervasive system technology. Recognizable domains like consumer, corporate, government, homeland security, and homeland defense have also emerged around the technology. These have also gained research momentum. Military pervasive surveillance is aptly suited to border security, territorial control and crisis management. Especially after recent terrorist acts, defense and security expenditure have increased globally in surveillance, intelligence and pervasiveness [22]. Nature and modus operandi of a terrorist act are almost always random, unpredictable and non-repetitive. Detecting such acts and nipping them in the bud requires an alert framework that is pervasive, ubiquitous and quick to respond or agile. There are studies that have worked with pervasive surveillance in order to add intelligence. Such studies have also extended to civilian environments and commercial hubs of dense human activity [23]. The inferences arrived at by many studies in the domain lead to the effective and efficient management of infrastructure rather than on other means. The gap recognized is to use the infrastructure to generate intelligence, while incorporating intelligence within the framework.

Additionally, well known intelligence approaches are also applicable to problem solving in surveillance applications. Table 3 presents a survey of such approaches. Genetic based algorithms are found to be applicable in surveillance of three dimensional spaces as well as in determination of nearest base station. Analysis of sensor data also finds use of select genetic algorithms. Estimation of cost of sensor deployment and effective coverage evaluation are also implemented using genetic algorithms. Algorithms developed based on greedy and fuzzy logic are also found to be applicable to similar areas of research. Substantial literature as evidenced in the table support this fact. To military specific applications of intrusion detection and target tracking, algorithms based on artificial neural networks and uncategorized ground breaking approaches are used [24-30]. Table 4 summarizes and compares intelligence techniques based on problem solving approaches. Techniques implemented, features of the algorithms put in place, study references and their findings are also tabulated. Drawbacks or challenges of each strategy is also identified and presented in the last column of the table.

4. Emerging Research Issues

Incorporation of intelligence in military surveillance using WSN is a critical area of research. Its importance can never be understated. There is ample scope for intelligent sensor data analysis, intelligent sensor management, design and application of propositional, predicate logic rules and frugal or judicious use of sensor capabilities. Cooperative sensor management, energy aware sensor framework operations and extended surveillance are recent domains gaining attention. As the area under surveillance increases, the framework will be suitable for applications like military ISR, wildlife preservation efforts, forest security against poachers and wildfires [31-45]. Large area surveillance is also applicable to natural disaster management and border surveillance. A common feature of all such applications are huge number of sensor nodes deployed in an unattended environment, distributed operation and huge volumes of sensed data. Challenges in such environments are distributed operation and control, selective perception, management of huge volumes of sensor data, deriving intelligence from data, collaborative decision making and related difficulties. Energy is a great and perpetual concern of WSN frameworks. As the sensor nodes are battery operated, they are prone to power drain related node loss. Minimizing unnecessary sensor activity directly contributes to battery lifetime and thereby improves framework efficacy. Gathering intelligence, obtaining world view or global perspective from sensor data is also a new and emerging challenge faced by WSN framework when applied to a military surveillance scenario [46-53]. Cooperative multi sensor management improves decision making, efficiency and intelligence gathering. Cooperative sensing when fed with intelligence feedback will improve framework performance. Such applications will be most valuable in dynamic environmental conditions. Cooperative multi sensor framework in the form of cue or handoff or both allows the detected information to flow through the network intelligently rather than redundantly. Sensor information is used to refine the operation of sensors in the future [53-55].

Table 2 summarizes literature surveyed in Ref. [56-100].

Table 2. Evolution of sensor nodes over three generations [56]

 

1980-1990

2000-2003

2010 onwards

Class of manufacturers

Custom contractors

Commercial contractors

Dust Inc and others

Node size

Large shoebox and above

Pack of cards to small shoebox

Dust particles

Weight

Kilograms

Grams

Negligible

Deployment

Vehicle placed or air dropped

Hand placed

Embedded or sprinkled/left behind in case of tactical missions

Power supply and lifetime

Large batteries, hours, days or longer

AA batteries, days to weeks

Solar, perpetual

Network topology

Point to point, star

Client-server, peer to peer

peer to peer

Node level architecture

Sensor, processor and communication capabilities separated

Sensor, processor and communication capabilities are integrated

Sensor, processor and communication capabilities are integrated

Table 3. Survey and analysis of logical approach to problem solving in surveillance and related applications

 

Logical approach to problem solving

Genetic algorithm

Greedy based approach

Fuzzy logic

Virtual forces

Linear programming

Artificial neural networks

Swarm intelligence

Uncategorised, ground breaking approaches

Application domain

Limited or fixed area surveillance

 

[69]

 

[70]

 

 

 

[71]

Surveillance in 3D space

[57-60]

[61]

[62-64]

[65]

[77]

 

[78]

[79, 92-94]

Intrusion detection

 

 

 

 

 

[95]

 

[66-68]

Target detection and tracking moving targets

 

 

[72]

 

 

[73]

 

[65, 74-76, 80-82]

Identification of Base station location

[89, 90]

[89]

 

 

 

 

 

[91]

Aggregation of sensor data

 

 

 

 

 

 

 

[87, 88]

Analytics

[83]

 

 

 

 

 

 

[84-86]

Other applications

 

[96, 97]

[98]

 

 

 

 

[99, 100]

Research objective

Coverage of area under surveillance / number of manager nodes served

[57-60, 90]

[61, 69, 89, 96]

[62-98]

[65, 70]

[77, 96]

 

[78]

[63, 91, 93]

Cost of deployment

[58, 59, 90]

[61, 89]

 

[65, 70]

[77]

 

 

[91]

Table 4. Intelligence techniques categorised based on problem solving approaches

 

Technique

Features

Findings

Drawbacks

Problem solving strategies to incorporate intelligence in military surveillance and reconnaissance using WSN

Random probability decision making

 

Markov decision process, decision outcomes are partly random and to limited extent under decision maker's control

Modelling is in terms of decision making. Provides a Mathematical model to represent decision processes.

Effective when applied in combination with dynamic programming or reinforcement learning.

Combinatorial explosion when solving large instances

Heuristic decision making

Evolutionary algorithms

Learning and discovery

Experience based, attempts to arrive at optimal solutions at optimal times. Based on search heuristics that replicates natural evolution

Applicable to decision making in self-learning environments

Does not promise feasibility, optimality of solution obtained.

Swarm intelligence

Based on direct search methods, allows finding optimum solutions of objective functions

Particle swarm optimization schemes are found to be most suitable

Information-theoretic approaches

 

Reduce uncertainty by gathering extensive data.

Each observation made by a sensor must accompany maximum amount of data

Probabilistic methods are used to predict future intelligence gain

Data intensive, adds redundancy in data collection and communication

Control-theoretic approaches

Classical Control systems

Create aggregate responses to internal and external stimuli.

Based on predefined behavioral rules or an adaptive control architecture

Highly application dependent studies are reported

Inflexible, not suitable for reuse

Adaptive control systems

Adapt to change autonomously, more flexible in organizational structure

5. Modeling

U={(ID,x,y)|ID is unique, min<=x<=max, min<=x<=max }, where min and max are the least and greatest coordinate value within the deployment respectively. It is the universal set of all nodes.

A={(ID,x,y)|ID is unique, min<=x<=max, min<=x<=max }, where min and max are the least and greatest coordinate value within the deployment respectively. It is the set of all nodes that have recorded an attack.

B=={(ID,x,y)|ID is unique, min<=x<=max, min<=x<=max }, where min and max are the least and greatest coordinate value within the deployment respectively. It is the set of nodes neighboring elements from the set A. These are selected such that they are enclosing the region occupied by elements of set A.

Graphical representation of the problem’s model is as in Figure 2. Red colored circles are the nodes that have sensed and reported attacks. Region shaded pink is therefore the area under attack. Nodes on the periphery shown as blue circles are the nodes on the boundary. Blue colored lines connecting blue circles form the outer boundary of the area under intrusion or attack. Immediate neighboring nodes on the outside of this blue colored region shown in the figure as green colored circles are the destination nodes identified. Green lines connecting these nodes form the region intended for counter attack action to be initiated. Aim of the algorithm id to determine shortest routes to nodes in this selection. Additionally, computation of area under attack contributes to managing the magnitude of counter action required.

Figure 2. Layout of military surveillance and reconnaissance deployment showing attack, boundary and shortest paths to points of strategic attack

Input to the algorithm is a connected graph with positive edge costs. Let G be the graph input which is a triplet (V, E, W) where V is the set of vertices, E is the set of pairs of vertices representing directed edges. |V|=n, the number of nodes in the deployment. |E|= m is the number of edges. Wi is an edge cost of an edge belonging to the set E such that Wi=(u,v) where u and v are vertices in the set V. S, a vertex belonging to V is the source and a set T is a set of points Ti on the boundary of the area under attack, the set of destinations. T is a proper subset of V. Weight or cost of a feasible path is the sum of individual weights of edges selected to form the path. Wpath(s,ti) is the weight of the path from source s to a certain destination ti. Wpath(s,ti)= j=1|path(s,ti)|Wej.

Minimum path however is the minimum of all feasible paths from S to ti. The algorithm we have designed, the shortest route is determined from a source node to the nodes on the boundary of the area under attack. Source is a point of strategic advantage. Instead of treating the problem as a single source multiple destination shortest path problem directly, we identify the nearest destination node out of the set of destinations first. This identified node is assigned as the new source and the rest of the nodes on the boundary are made multiple destinations. Before the algorithm iterates, for every destination node its adjacent nodes are identified and corresponding edge costs are reduced by the minimum of all edge costs. This procedure makes the cost of reaching the destination 0 from the nearest neighbor.

Algorithm: selectiveresourceuse (A, U, B, E)

Inputs: U the universal set of all sensor nodes, their location coordinates, A is the set of nodes on the boundary of area under attack, B is the source, E is the set of edges

Output: an array of node IDs selected to continue monitoring

  1. Create L1[][],L2[][],L3[]
  2. while(|A|>0)
  3. a.d<-0
  4. For all v in (A-a) do
  5. min<-+∞
  6. For all (x,Ai) in E do
  7. If w(x,Ai)<min then
  8. min<-w(x,Ai)
  9. End if
  10. End for
  11. For all (x,Ai) in E do
  12. w(x,Ai)<-w(x,Ai)-min
  13. Ak<-Ak union x
  14. End for
  15. For i<-0;i<|A|;i++
  16. path[i]<-singlesourcesingledestination(U,B,A)
  17. a<-min(path[i])
  18. For all v in (A-a)
  19. v.d<-+∞
  20. v.pre<-NULL
  21. v.tag<-0
  22. End for
  23. area<-0
  24. For all v(x,y) in A
  25. area<-area+(y1+y2)/2)*(x2-x1)
  26. If Ak==a return 0 else
  27. Repeat finding shortest route using (Ak, U, a, E)
6. Implementation and Results

Simulation experiments are performed on Matlab R2021a running on Intel® Core™ i3-6006 CPU @ 2.00GHz 1.99GHz with 4.00 GB RAM. Test bed layout is a grid as shown in Figure 1. Area of the grid is 100X100 units. Each square unit is of 20X20 units and they are identified as unit cells. Each unit cell is under the surveillance of one high power node identified also as the grid head. High power nodes are represented as the red colored circle in Figure 2. The sky blue colored nodes are also high power nodes but not grid heads. The dark blue colored nodes are low power nodes whose responsibility is limited to monitor physical parameters. The screenshot in the figure is showing an output of one of the many simulations. Green colored circles represent the boundary nodes enclosing every node that has detected attack. Figure 3 is showing the nodes on the periphery of the area under attack in green. Shortest path is discovered to reach nodes along this outer boundary connected to a chosen point of strategic advantage. The graph in Figure 4 is showing the marked reduction in the number of nodes employed in monitoring the area under attack. Number of nodes involved in intelligent monitoring is constantly less than the number of nodes employed to monitor the same area without the application of deployment and situation aware intelligence. Figure 5 presents the results of comparison experiments showing the number of active nodes involved in surveillance with and without intelligent node management.

Figure 3. Test bed grid deployment showing area under attack

Figure 4. Number of nodes monitoring region under attack with and without application of the proposed selective resource use algorithm

Figure 5. Graph comparing number of active nodes involved in surveillance without intelligent node management and number of nodes involved in surveillance with intelligent node management

7. Conclusion

WSN when applied to large area surveillance evolves into an intelligent pervasive surveillance framework. They are self-organizing, expansive and ever active. Constant surveillance implies huge volume of data, redundant transmissions and unnecessary use of infrastructure in gaining the same data. With increased pervasiveness comes lower efficiency. Challenge is to maintain pervasive surveillance while maintaining efficiency. This dual purpose can be achieved by adding intelligence to the framework. Sensor information must aid in sensor management. Coordination of sensors, optimal use of sensors are possible if logical rules are incorporated in node management. Earlier studies in this domain do not use the sensor data to make framework management decisions. Intelligence gathered is not utilized in selective sensor use. These two are the contributions of the proposed algorithm. Due to the inherent quality of the intelligence added by the proposed algorithm, redundant use of every sensor node in the deployment is avoided. Strategic use of required subset of nodes improve the overall life of the sensor infrastructure. Limitation of our study is that we have not made a study of direct impact of the proposed algorithm on control message communication. Logically reduction of such messages is also an indirect impact of situation aware algorithms. We wish to study that impact in the future.

  References

[1] Wirz, C.D., Mayorga, M., Johnson, B.B. (2021). Evaluating the effects of news-following, volume and content of news coverage on Americans’ risk perceptions during the 2014-2016 Ebola outbreak. Journal of Health Communication, 26(5): 328-338. https://doi.org/10.1080/10810730.2021.1927257

[2] Ghosh, R., Sardana, H.K. (2020). Multi-feature optimization strategies for target classification using seismic and acoustic signatures. Automatic Target Recognition XXX, 11394: 113940I. https://doi.org/10.1117/12.2556457

[3] Alharbe, N., Abdullah, M. (2017). Routing protocols for dense wireless sensor networks: Characteristics and challenges. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 9(1-3): 7-13. 

[4] Singh, A., Amutha, J., Nagar, J., Sharma, S., Lee, C.C. (2022). LT-FS-ID: Log-transformed feature learning and feature-scaling-based machine learning algorithms to predict the k-barriers for intrusion detection using wireless sensor network. Sensors, 22(3): 1070. https://doi.org/10.3390/s22031070

[5] Sangaiah, A.K., Rostami, A.S., Hosseinabadi, A.A. R., Shareh, M.B., Javadpour, A., Bargh, S.H., Hassan, M. M. (2021). Energy-aware geographic routing for real-time workforce monitoring in industrial informatics. IEEE Internet of Things Journal, 8(12): 9753-9762. https://doi.org/10.1109/JIOT.2021.3056419

[6] Singh, R., Singh, S. (2021). Smart border surveillance system using wireless sensor networks. International Journal of System Assurance Engineering and Management. https://doi.org/10.1007/s13198-021-01208-6

[7] Yousefi, M.H.N., Kavian, Y.S., Mahmoudi, A. (2019). On the processing architecture in wireless video sensor networks: node and network level performance evaluation. Multimedia Tools and Applications, 78(17): 24789-24807. https://doi.org/10.1007/s11042-019-7709-y

[8] Punriboon, C., So-In, C., Aimtongkham, P., Leelathakul, N. (2021). Fuzzy logic-based path planning for data gathering mobile sinks in WSNs. IEEE Access, 9: 96002-96020. https://doi.org/10.1109/ACCESS.2021.3094541

[9] Singh, P., Khosla, A., Kumar, A., Khosla, M. (2018). Computational intelligence based localization of moving target nodes using single anchor node in wireless sensor networks. Telecommunication Systems, 69(3): 397-411. https://doi.org/10.1007/s11235-018-0444-2

[10] Mallick, M., Chang, K.C., Arulampalam, S., Yan, Y. (2019). Heterogeneous track-to-track fusion in 3-D using IRST sensor and air MTI radar. IEEE Transactions on Aerospace and Electronic Systems, 55(6): 3062-3079. https://doi.org/10.1109/TAES.2019.2898302

[11] Anjum, M.S., Ali, S.M., Subhani, M.A., et al. (2021). An emerged challenge of air pollution and ever-increasing particulate matter in Pakistan; a critical review. Journal of Hazardous Materials, 402: 123943. https://doi.org/10.1016/j.jhazmat.2020.123943

[12] Njoya, A.N., Ari, A.A.A., Nana Awa, M., et al. (2020). Hybrid wireless sensors deployment scheme with connectivity and coverage maintaining in wireless sensor networks. Wireless Personal Communications, 112(3): 1893-1917. https://doi.org/10.1007/s11277-020-07132-5

[13] Alfouzan, F.A. (2021). Energy-efficient collision avoidance MAC protocols for underwater sensor networks: Survey and challenges. Journal of Marine Science and Engineering, 9(7): 741. https://doi.org/10.3390/jmse9070741

[14] Khoshelham, K. (2021). Computer vision techniques for urban mobility. Placeholder_Parent_Metadata_Value, pp. 62-76.

[15] Fries, L., Son, J.Y., Givvin, K.B., Stigler, J.W. (2021). Practicing connections: A framework to guide instructional design for developing understanding in complex domains. Educational Psychology Review, 33(2): 739-762. https://doi.org/10.1007/s10648-020-09561-x

[16] Bunke, H., Christensen, H.I., Hager, G., Klein, R. (2021). Modelling of Sensor-Based Intelligent Robot Systems (Dagstuhl Seminar 00421). Schloss Dagstuhl-Leibniz-Zentrum für Informatik.

[17] Saleh, N., Kassem, A., Haidar, A.M. (2018). Energy-efficient architecture for wireless sensor networks in healthcare applications. IEEE Access, 6: 6478-6486. https://doi.org/10.1109/ACCESS.2018.2789918

[18] Ullah, Z. (2020). A survey on hybrid, energy efficient and distributed (HEED) based energy efficient clustering protocols for wireless sensor networks. Wireless Personal Communications, 112(4): 2685-2713. https://doi.org/10.1007/s11277-020-07170-z

[19] Singh, S.K., Kumar, P., Singh, J.P. (2017). A survey on successors of LEACH protocol. IEEE Access, 5: 4298-4328. https://doi.org/10.1109/ACCESS.2017.2666082

[20] Stockholm International Peace Research Institute. World military spending, by region, 1988–2020. Data and graphic: SIPRI https://sipri.org/media/press-release/2021/world-military-spending-rises-almost-2-trillion-2020, accessed on 14 August 2021.

[21] Trüdinger, E.M. (2019). Perceptions of threat and policy attitudes: the case of support for anti-terrorism policies in Germany. Universität Stuttgart. http://dx.doi.org/10.18419/opus-10993

[22] Safapour, E., Kermanshachi, S., Pamidimukkala, A. (2021). Post-disaster recovery in urban and rural communities: Challenges and strategies. International Journal of Disaster Risk Reduction, 64: 102535. https://doi.org/10.1016/j.ijdrr.2021.102535

[23] Nte, N.D., Gande, G., Uzorka, M. (2020). The challenges and prospects of ICTs in crime prevention and management in Nigeria: A review of CCTV cameras in Abuja. IJCLS (Indonesian Journal of Criminal Law Studies), 5(1): 75-100. https://doi.org/10.15294/ijcls.v5i1.26393

[24] Paggi, H., Lara, J.A., Soriano, J. (2020). Structures generated in a multiagent system performing information fusion in peer-to-peer resource-constrained networks. Neural Computing and Applications, 32(21): 16367-16385. https://doi.org/10.1007/s00521-018-3818-1

[25] Xu, J., Zhu, W., Qian, S., et al. (2020). Roda: A flexible framework for real-time on-demand data aggregation. In International Conference on Algorithms and Architectures for Parallel Processing, New York City, NY, USA, pp. 587-602. https://doi.org/10.1007/978-3-030-60239-0_40

[26] Yang, T., Niu, Y., Yu, J. (2020). Clock synchronization in wireless sensor networks based on Bayesian estimation. IEEE Access, 8: 69683-69694. https://doi.org/10.1109/ACCESS.2020.2984785

[27] Izadi, D., Abawajy, J. H., Ghanavati, S., Herawan, T. (2015). A data fusion method in wireless sensor networks. Sensors, 15(2): 2964-2979. https://doi.org/10.3390/s150202964

[28] Brumancia, E., Samuel, S.J., Gomathi, R.M., Dhas, Y.M. (2018). An effective study on data fusion models in wireless sensor networks. ARPN Journal of Engineering and Applied Sciences, 13(2): 686-692. 

[29] Yadav, S.S., Chitra, A., Deepika, C.L. (2015). Reviewing the process of data fusion in wireless sensor network: a brief survey. International Journal of Wireless and Mobile Computing, 8(2): 130-140. https://doi.org/10.1504/IJWMC.2015.068617

[30] Azimirad, E., Haddadnia, J., Izadipour, A.L.I. (2015). A comprehensive review of the multi-sensor data fusion architectures. Journal of Theoretical & Applied Information Technology, 71(1): 33-42.

[31] Monteiro, T.G., Li, G., Skourup, C., Zhang, H. (2020). Investigating an integrated sensor fusion system for mental fatigue assessment for demanding maritime operations. Sensors, 20(9): 2588. https://doi.org/10.3390/s20092588

[32] Li, A., Xu, W., Shi, Y. (2020). A new data fusion framework of business intelligence and analytics in economy, finance and management. In 2020 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT), pp. 940-945. https://doi.org/10.1109/WIIAT50758.2020.00144

[33] Cao, N., Brahma, S., Geng, B., Varshney, P.K. (2019). Optimal auction design with quantized bids for target tracking via crowdsensing. IEEE Transactions on Computational Social Systems, 6(5): 847-857. https://doi.org/10.1109/TCSS.2019.2931476

[34] Khaleq Zghair, N.A., Al-Araji, A.S. (2021). A one decade survey of autonomous mobile robot systems. International Journal of Electrical & Computer Engineering (2088-8708), 11(6): 4891-4906. https://doi.org/10.11591/ijece.v11i6.pp4891-4906

[35] Iqbal, M., Naeem, M., Anpalagan, A., Qadri, N.N., Imran, M. (2016). Multi-objective optimization in sensor networks: Optimization classification, applications and solution approaches. Computer Networks, 99: 134-161. https://doi.org/10.1016/j.comnet.2016.01.015

[36] Kaushik, A., Yakkali, R.T., Indu, S., Ahmed, F., Gupta, D., Nayar, R., Yadav, S. (2019). A self-configurable event coverage approach for wireless sensor networks. International Journal of Mobile Computing and Multimedia Communications (IJMCMC), 10(2): 1-18. https://doi.org/10.4018/IJMCMC.2019040101

[37] Zhou, T., Zhang, F., Shao, K., et al. (2021). Cooperative Multi-Agent Transfer Learning with Level-Adaptive Credit Assignment. arXiv preprint arXiv:2106.00517.

[38] Afflerbach, T. (2020). Theory: Challenges for cooperation. Hybrid Virtual Teams in Shared Services Organizations, pp. 9-50. https://doi.org/10.1007/978-3-030-34300-2_2

[39] Proctor, P., Teuscher, C., Hecht, A., Osiński, M. (2021). Proximal policy optimization for radiation source search. Journal of Nuclear Engineering, 2(4): 368-397. https://doi.org/10.3390/jne2040029

[40] Janjua, Z.H., Vecchio, M., Antonini, M., Antonelli, F. (2019). IRESE: An intelligent rare-event detection system using unsupervised learning on the IoT edge. Engineering Applications of Artificial Intelligence, 84: 41-50. https://doi.org/10.1016/j.engappai.2019.05.011

[41] Lu, X., Liu, J., Zhao, H. (2019). Collaborative target tracking of IoT heterogeneous nodes. Measurement, 147: 106872. https://doi.org/10.1016/j.measurement.2019.106872

[42] Braten, A.E., Kraemer, F.A., Palma, D. (2020). Autonomous IoT device management systems: Structured review and generalized cognitive model. IEEE Internet of Things Journal, 8(6): 4275-4290. https://doi.org/10.1109/JIOT.2020.3035389

[43] Kolba, M.P., Scott, W.R., Collins, L.M. (2010). A framework for information-based sensor management for the detection of static targets. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, 41(1): 105-120. https://doi.org/10.1109/TSMCA.2010.2058098

[44] Kubiak, K., Dec, G., Stadnicka, D. (2022). Possible applications of edge computing in the manufacturing industry-Systematic literature review. Sensors, 22(7): 2445. https://doi.org/10.3390/s22072445

[45] Xing, L. (2020). Reliability in Internet of Things: Current status and future perspectives. IEEE Internet of Things Journal, 7(8): 6704-6721. https://doi.org/10.1109/JIOT.2020.2993216

[46] Banerjee, S., Roy, S., Khatua, S. (2021). Efficient resource utilization using multi-step-ahead workload prediction technique in cloud. The Journal of Supercomputing, 77(9): 10636-10663. https://doi.org/10.1007/s11227-021-03701-y

[47] Willis, C.J. (2013). Meeting performance and sensing-cost requirements for detection and recognition systems. In Emerging Technologies in Security and Defence; and Quantum Security II; and Unmanned Sensor Systems X, 8899: 889912. https://doi.org/10.1117/12.2027582

[48] Fitzgerald, J., Griffin, C. (2017). Pareto optimal decision making in a distributed opportunistic sensing problem. IEEE Transactions on Cybernetics, 49(2): 719-725. https://doi.org/10.1109/TCYB.2017.2766451

[49] Shahad, R.A., Ibrahim, M.F., Xian, E.L.K., Hussain, A., Saad, M.H.M. (2018). Suspicious loitering detection from annotated CCTV feed using CEP based approach. Journal of Engineering [Jurnal Kejuruteraan], 30: 83-91. https://doi.org/10.17576/jkukm-2018-30(1

[50] Luo, F., Dong, Z.Y., Liang, G., Murata, J., Xu, Z. (2018). A distributed electricity trading system in active distribution networks based on multi-agent coalition and blockchain. IEEE Transactions on Power Systems, 34(5): 4097-4108. https://doi.org/10.1109/TPWRS.2018.2876612

[51] Montealegre Vázquez, L.E., López y López, F. (2006). An agent-based model for hierarchical organizations. In International Workshop on Coordination, Organizations, Institutions, and Norms in Agent Systems, Riva del Garda, Italy, pp. 194-211. https://doi.org/10.1007/978-3-540-74459-7_13

[52] Tianfield, H. (2007). A new framework of holonic self-organization for multi-agent systems. In 2007 IEEE International Conference on Systems, Man and Cybernetics, Montreal, QC, Canada, pp. 753-758. https://doi.org/10.1109/ICSMC.2007.4414048

[53] Benaskeur, A.R., Rhéaume, F. (2007). Adaptive data fusion and sensor management for military applications. Aerospace Science and Technology, 11(4): 327-338. https://doi.org/10.1016/j.ast.2007.01.005

[54] Benaskeur, A., Irandoust, H. (2008). Holonic approach for control and coordination of distributed sensors. Defence Research and Development Canada Valcartier (QUEBEC).

[55] Yu, F., Tu, F., Pattipati, K.R. (2008). Integration of a holonic organizational control architecture and multiobjective evolutionary algorithm for flexible distributed scheduling. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, 38(5): 1001-1017. https://doi.org/10.1109/TSMCA.2008.923082

[56] Chong, C.Y., Kumar, S.P. (2003). Sensor networks: Evolution, opportunities, and challenges. Proceedings of the IEEE, 91(8): 1247-1256. https://doi.org/10.1109/JPROC.2003.814918

[57] Jourdan, D.B., de Weck, O.L. (2004). Layout optimization for a wireless sensor network using a multi-objective genetic algorithm. In 2004 IEEE 59th Vehicular Technology Conference. VTC 2004-Spring (IEEE Cat. No. 04CH37514), Milan, Italy, pp. 2466-2470. https://doi.org/10.1109/VETECS.2004.1391366

[58] Sakr, Z., Wesolkowski, S. (2011). Sensor network management using multiobjective evolutionary optimization. In 2011 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA), Paris, France, pp. 39-42. https://doi.org/10.1109/CISDA.2011.5945954

[59] Oh, S.C., Tan, C.H., Kong, F.W., et al. (2007). Multiobjective optimization of sensor network deployment by a genetic algorithm. In 2007 IEEE Congress on Evolutionary Computation, Singapore, pp. 3917-3921. https://doi.org/10.1109/CEC.2007.4424981

[60] Jiang, X., Chen, Y.P., Yu, T. (2008). Localized distributed sensor deployment via coevolutionary computation. In 2008 Third International Conference on Communications and Networking in China, Hangzhou, China, pp. 785-789). IEEE.

[61] Dhillon, S.S., Chakrabarty, K., Iyengar, S.S. (2002). Sensor placement for grid coverage under imprecise detections. In Proceedings of the Fifth International Conference on Information Fusion. FUSION 2002.(IEEE Cat. No. 02EX5997), Annapolis, MD, USA, pp. 1581-1587. https://doi.org/10.1109/ICIF.2002.1021005

[62] Osmani, A., Dehghan, M., Pourakbar, H., Emdadi, P. (2009). Fuzzy-based movement-assisted sensor deployment method in wireless sensor networks. In 2009 First International Conference on Computational Intelligence, Communication Systems and Networks, Indore, India, pp. 90-95. https://doi.org/10.1109/CICSYN.2009.97

[63] Biswas, R.N., Mitra, S.K., Naskar, M.K. (2021). Wireless node localization under hostile radio environment using smart antenna. Wireless Personal Communications, 116(3): 1815-1836. https://doi.org/10.1007/s11277-020-07763-8

[64] Shu, H., Liang, Q., Gao, J. (2008). Wireless sensor network lifetime analysis using interval type-2 fuzzy logic systems. IEEE Transactions on Fuzzy Systems, 16(2): 416-427. https://doi.org/10.1109/TFUZZ.2006.890668

[65] Zou, Y., Chakrabarty, K. (2003). Sensor deployment and target localization based on virtual forces. In IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No. 03CH37428), Francisco, CA, USA, pp. 1293-1303. https://doi.org/10.1109/INFCOM.2003.1208965

[66] He, T., Krishnamurthy, S., Stankovic, J.A., et al. (2004). Energy-efficient surveillance system using wireless sensor networks. In Proceedings of the 2nd International Conference on Mobile systems, Applications, and Services, Boston MA, USA, pp. 270-283. https://doi.org/10.1145/990064.990096

[67] Drira, S., Smith, I.F.C. (2022). A framework for occupancy detection and tracking using floor-vibration signals. Mechanical Systems and Signal Processing, 168: 108472. https://doi.org/10.1016/j.ymssp.2021.108472

[68] Hechmi, J.M., Khlaifi, H., Bouatay, A., Zrelli, A., Ezzedine, T. (2018). Intrusion Detection Using Data Fusion and Machine Learning. In 2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), pp. 1-6. https://ieeexplore.ieee.org/abstract/document/8555800

[69] Howard, A., Matarić, M.J., Sukhatme, G.S. (2002). An incremental self-deployment algorithm for mobile sensor networks. Autonomous Robots, 13(2): 113-126. https://doi.org/10.1023/A:1019625207705

[70] Howard, A., Matarić, M.J., Sukhatme, G.S. (2002). Mobile sensor network deployment using potential fields: A distributed, scalable solution to the area coverage problem. In Distributed Autonomous Robotic Systems, 5: 299-308. https://doi.org/10.1007/978-4-431-65941-9_30

[71] Chu, M., Reich, J., Zhao, F. (2004). Distributed attention in large scale video sensor networks. Intelligent Distributed Surveillance Systems (IDSS-04), 2004: 61-65. https://doi.org/10.1049/ic:20040100

[72] Miranda, S.L.C., Baker, C.J., Woodbridge, K., Griffiths, H.D. (2007). Fuzzy logic approach for prioritisation of radar tasks and sectors of surveillance in multifunction radar. IET Radar, Sonar & Navigation, 1(2): 131-141. https://doi.org/10.1049/iet-rsn:20050106

[73] García-Rodríguez, J., Angelopoulou, A., Mora-Gimeno, F.J., Psarrou, A. (2012). Building visual surveillance systems with neural networks. In Computational Intelligence for Privacy and Security, pp. 181-198. https://doi.org/10.1007/978-3-642-25237-2_11

[74] Lee, S., Park, C.S., Yoon, H. (2022). Nanoparticulate photoluminescent probes for bioimaging: Small molecules and polymers. International Journal of Molecular Sciences, 23(9): 4949. https://doi.org/10.3390/ijms23094949

[75] Abualsauod, E.H. (2022). A hybrid blockchain method in internet of things for privacy and security in unmanned aerial vehicles network. Computers & Electrical Engineering, 99: 107847. https://doi.org/10.1016/j.compeleceng.2022.107847

[76] Song, B., Choi, H., Lee, H.S. (2008). Surveillance tracking system using passive infrared motion sensors in wireless sensor network. 2008 International Conference on Information Networking, pp. 1-5. https://doi.org/10.1109/ICOIN.2008.4472790

[77] Chakrabarty, K., Iyengar, S.S., Qi, H., Cho, E. (2002). Grid coverage for surveillance and target location in distributed sensor networks. IEEE Transactions on Computers, 51(12): 1448-1453. https://doi.org/10.1109/TC.2002.1146711

[78] Biswas, R.N., Mitra, S.K., Naskar. M.K. (2022). Localization under node capture attacks using fuzzy based anchor mobility control. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-021-03619-6

[79] Afolabi, D., Man, K.L., Liang, H.N., Lim, E.G., Shen, Z., Lei, C.U., Krilavicius, T., Yang, Y., Cheng, L., Hahanov, V., Yemelyanov, I. (2013). A WSN approach to unmanned aerial surveillance of traffic anomalies: Some challenges and potential solutions. In: Design and Test Symposium, pp. 1-4. http://dx.doi.org/10.1109/EWDTS.2013.6673163

[80] Zhao, F., Shin, J., Reich, J. (2002). Information-driven dynamic sensor collaboration. IEEE Signal Processing Magazine, 19(2): 61-72. https://doi.org/10.1109/79.985685

[81] Sinopoli, B., Sharp, C., Schenato, L., Schaffert, S., Sastry, S.S. (2003). Distributed control applications within sensor networks. Proceedings of the IEEE, 91(8): 1235-1246. https://doi.org/10.1109/JPROC.2003.814926

[82] Arora, A., Dutta, P., Bapat, S., Kulathumani, V., Zhang, H., Naik, V., Mittal, V., Cao, H., Demirbas, M., Gouda, M., Choi, Y., Herman, T., Kulkarni, S., Arumugam, U., Nesterenko, M., Vora, A., Miyashita, M. (2004). A line in the sand: A wireless sensor network for target detection, classification, and tracking, computer networks. Int. J. Comput. Telecom. Netw. 46(5): 605-634. https://doi.org/10.1016/j.comnet.2004.06.007

[83] Wojtaszek, D., Wesolkowski, S. (2012). Military fleet mix computation and analysis [Application Notes]. IEEE Computational Intelligence Magazine, 7(3): 53-61. https://doi.org/10.1109/MCI.2012.2200628

[84] Huang, X.C., Yi, J.J., Chen, Y., Zhu, X.M., Dai, Z.Y. (2020). Adaptive agent tracking approach for oil contamination in water environments. International Journal of Advanced Robotic Systems, 17(4). https://doi.org/10.1177/1729881420940217

[85] Li, D., Wong, K.D., Hu, Y.H., Sayeed, A.M. (2002). Detection, classification, and tracking of targets. IEEE Signal Processing Magazine, 19(2): 17-29. https://doi.org/10.1109/79.985674

[86] Meesookho, C., Narayanan, S., Raghavendra, C.S. (2002). Collaborative classification applications in sensor networks. In Sensor Array and Multichannel Signal Processing Workshop Proceedings, Rosslyn, VA, USA, pp. 370-374. https://doi.org/10.1109/SAM.2002.1191063

[87] Madden, S., Franklin, M.J., Hellerstein, J.M., Hong, W. (2002). TAG: A tiny aggregation service for ad-hoc sensor networks. In 5th Symposium on Operating System Design and Implementation, Boston, pp. 131-146. 

[88] Dasgupta, K., Kalpakis, K., Namjoshi, P. (2003). An efficient clustering-based heuristic for data gathering and aggregation in sensor networks. In 2003 IEEE Wireless Communications and Networking, Orleans, LA, USA, pp. 1948-1953. https://doi.org/10.1109/WCNC.2003.1200685

[89] Rose, R. (2001). A smart technique for determining base-station locations in an urban environment. IEEE Transactions on Vehicular Technology, 50(1): 43-47. https://doi.org/10.1109/25.917869

[90] Meunier, H., Talbi, E.G., Reininger, P. (2000). A multiobjective genetic algorithm for radio network optimization. In Proceedings of the 2000 Congress on Evolutionary Computation. CEC00 (Cat. No. 00TH8512), La Jolla, CA, USA, pp. 317-324. https://doi.org/10.1109/CEC.2000.870312

[91] Amaldi, E., Capone, A., Malucelli, F., Signori, F. (2002). UMTS radio planning: Optimizing base station configuration. In Proceedings IEEE 56th Vehicular Technology Conference, Vancouver, BC, Canada, pp. 768-772. https://doi.org/10.1109/VETECF.2002.1040703

[92] Wu, X., Cho, J., d’Auriol, B.J., Lee, S. (2007). Mobility-assisted relocation for self-deployment in wireless sensor networks. IEICE Trans., E90-B(8): 2056-2069. https://doi.org/10.1093/ietcom/e90-b.8.2056

[93] Zhang, H., Hou, J.C. (2005). Maintaining sensing coverage and connectivity in large sensor networks. Ad Hoc Sens. Wirel. Networks, 1(1-2): 89-124.

[94] Abielmona, R., Petriu, E.M., Harb, M., Wesolkowski, S. (2011). Mission-driven robotic intelligent sensor agents for territorial security. IEEE CI Mag., 6(1): 55-67. https://doi.org/10.1109/MCI.2010.939580

[95] Amato, A., Di Lecce, V., Piuri, V. (2005). Neural network based video surveillance system. In CIHSPS 2005. Proceedings of the 2005 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety, Orlando, FL, USA, pp. 85-89. https://doi.org/10.1109/CIHSPS.2005.1500617

[96] Church, R., ReVelle, C. (1974). The maximal covering location problem. In Papers of the Regional Science Association, 32(1): 101-118. 

[97] Bulusu, N., Heidemann, J., Estrin, D. (2001). Adaptive beacon placement. In Proceedings 21st International Conference on Distributed Computing Systems, Mesa, AZ, USA, pp. 489-498. https://doi.org/10.1109/ICDSC.2001.918979

[98] Lekova, A., Skjelsvik, K., Plagemann, T., Goebel, V. (2007). Fuzzy logic-based event notification in sparse manets. In 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), Niagara Falls, ON, Canada, pp. 296-301. https://doi.org/10.1109/AINAW.2007.194

[99] Liu, J., Perrone, L.F., Nicol, D.M., Liljenstam, M., Elliott, C., Pearson, D. (2001). Simulation modeling of large-scale ad-hoc sensor networks. In European Simulation Interoperability Workshop.

[100] Kong, J., Cui, J.H., Wu, D., Gerla, M. (2005). Building underwater ad-hoc networks and sensor networks for large scale real-time aquatic applications. In MILCOM 2005-2005 IEEE Military Communications Conference, Atlantic City, NJ, USA, pp. 1535-1541. https://doi.org/10.1109/MILCOM.2005.1605894