IDEAS home Printed from https://ideas.repec.org/a/ids/eujine/v7y2013i5p635-656.html
   My bibliography  Save this article

A leader-follower game for the point coverage problem in wireless sensor networks

Author

Listed:
  • Mehmet BaÅŸdere
  • Necati Aras
  • Ä°. Kuban Altınel
  • Sezin AfÅŸar

Abstract

Sensors form an effective wireless network for the surveillance of a region. Ensuring coverage is an important issue in wireless sensor network design. This paper focuses on an application where sensors are used to detect intruders. The defender wants to determine the best locations of the sensors to maximise the point coverage in the area with the anticipation that an intruder will attack and destroy some of the sensors to reduce the coverage. This sequential game between the defender and the intruder is modelled using bilevel programming. Two models are formulated: a bilevel pure integer linear programme (BPILP) where an attacked sensor is destroyed completely and a bilevel mixed integer linear programme (BMILP) where a damaged sensor continues to operate at a reduced capacity. Since BPILP and BMILP models are difficult to solve exactly, solution methods based on local search and tabu search are proposed, which are hybridised with an exact method. [Received 9 September 2011; Revised 7 January 2012; Revised 20 March 2012; Accepted 20 March 2012]

Suggested Citation

  • Mehmet BaÅŸdere & Necati Aras & Ä°. Kuban Altınel & Sezin AfÅŸar, 2013. "A leader-follower game for the point coverage problem in wireless sensor networks," European Journal of Industrial Engineering, Inderscience Enterprises Ltd, vol. 7(5), pages 635-656.
  • Handle: RePEc:ids:eujine:v:7:y:2013:i:5:p:635-656
    as

    Download full text from publisher

    File URL: http://www.inderscience.com/link.php?id=57385
    Download Restriction: Access to full text is restricted to subscribers.
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Karabulut, Ezgi & Aras, Necati & Kuban Altınel, İ., 2017. "Optimal sensor deployment to increase the security of the maximal breach path in border surveillance," European Journal of Operational Research, Elsevier, vol. 259(1), pages 19-36.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:ids:eujine:v:7:y:2013:i:5:p:635-656. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sarah Parker (email available below). General contact details of provider: http://www.inderscience.com/browse/index.php?journalID=210 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.