IDEAS home Printed from https://ideas.repec.org/a/sae/intdis/v2y2006i3p289-311.html
   My bibliography  Save this article

Vulnerability of Surveillance Networks to Faults

Author

Listed:
  • Tai-Lin Chin

    (Department of Electrical and Computer Engineering, University of Wisconsin-Madison, Madison, WI, USA)

  • Thomas Clouqueur

    (Computer Design and Test Laboratory, Nara Institute of Science and Technology, Japan)

  • Parameswaran Ramanathan

    (Department of Electrical and Computer Engineering, University of Wisconsin-Madison, Madison, WI, USA)

  • Kewal K. Saluja

    (Department of Electrical and Computer Engineering, University of Wisconsin-Madison, Madison, WI, USA)

Abstract

Recent advances in technology have made it possible to build surveillance systems using many low-cost sensor nodes with limited computation and communication capabilities. Due to a potentially large number of nodes deployed, node failures are inevitable and can render a surveillance system that has degraded detection performances. The exposure metric has been proposed earlier to assess the quality of a surveillance system based on the detection performances. In this paper, we characterize the vulnerability of a system in terms of its exposure with respect to the number of faulty nodes and their combinations. Specifically, we assess the exposure of a surveillance network subject to a given number of faulty nodes, and identify the worst-case fault combination for both an idling target and a traversing target. For an idling target, the worst-case fault combination and exposure is analytically identified. For a traversing target, a genetic algorithm based approach is proposed to derive a near worst-case fault combination, and extensive simulation results are presented to show the effectiveness of the algorithm.

Suggested Citation

  • Tai-Lin Chin & Thomas Clouqueur & Parameswaran Ramanathan & Kewal K. Saluja, 2006. "Vulnerability of Surveillance Networks to Faults," International Journal of Distributed Sensor Networks, , vol. 2(3), pages 289-311, July.
  • Handle: RePEc:sae:intdis:v:2:y:2006:i:3:p:289-311
    DOI: 10.1080/15501320600692036
    as

    Download full text from publisher

    File URL: https://journals.sagepub.com/doi/10.1080/15501320600692036
    Download Restriction: no

    File URL: https://libkey.io/10.1080/15501320600692036?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:sae:intdis:v:2:y:2006:i:3:p:289-311. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: SAGE Publications (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.