Abstract

Camera sensor networks (CSNs) have advantages on providing the precise and multimedia information for plenty of applications. The high coverage quality of CSNs especially satisfies the monitoring requirements of barrier coverage. In three-dimensional (3D) application scenarios, the tracking of the potential intruder in the monitored irregular spaces brings more difficulties and challenges on strong barrier coverage for CSNs. In this paper, we consider the strong barrier coverage problem in 3D CSNs and focus on the objective of monitoring the intruder with high resolution and maximizing the network lifetime. We firstly introduce the definition and hardness proof for the problem based on the irregular space model and the network model, which adopts the Region of Interest (ROI) sensing model with high effective resolution. Secondly, we design two sleep-and-awake scheduling algorithms for the problem in homogeneous and heterogeneous networks, respectively, which are based on the auxiliary graph transformation and the disjoint flows construction. To evaluate these algorithms’ performance on the lifetime maximization, we conduct extensive simulation experiments and analyze their results on their advantages and applicable scenarios.

1. Introduction

Wireless sensor networks (WSNs) are being studied for a long time, which can be classified into sensor-based studies and data-based works. The most data-based works focused on the extracting kernel dataset and data query processing [1, 2]. The most sensor-based studies concentrated on the coverage and data transmission issues. With the high accuracy of monitoring information on coverage issue, camera sensor networks (CSNs) have been utilized for a wide range of applications which can be classified into indoor monitoring [3] and outdoor surveillance, e.g. military inspection and wild animal protection. For the military applications, CSNs can provide intrusion warning and action trend prediction for constructing the military boundaries to guarantee the quality of coverage service. For the wild animal protection, CSNs do not only prevent illegal personnel from entering the protection regions for illegal poaching but also avoid the protected animals from escaping from the regions. Thus barrier coverage has got a lot of attentions for research. To satisfy the coverage requirement of the practical applications, barrier coverage has the highest requirement on the sensed information in these coverage optimization problems.

Among the related theoretical research of barrier coverage scheduling in CSNs, the most concerned issues are the particularity of the monitored space and the accuracy of the sensing model. For the particularity of the monitored space, the space may have an irregular terrain structure in the applications like mountainous regions as shown in the orange boundary in Figure 1. The complex structure brings the difficulties and challenges for the sensor deployment and the sensing model construction, which should be considered in the sensor scheduling. For the accuracy of the sensing model, the most existing works adopted the full-view sensing model proposed in [4], which can guarantee the coverage for the target’s all facing directions. Besides the sensing omnidirectivity, high image resolution is also considered in the sensing model in [5].

In this paper, we study on the barrier coverage problem in 3D CSNs for the application with irregular geometrical characteristics and strong coverage requirements. The goal of the problem is maximizing the network lifetime under the premise in strong barrier coverage, called the Lifetime-Maximized Strong Barrier Coverage problem for 3D CSNs (LifMax-BC Problem). To solve the problem, the modelling of the irregular space is our first consideration. And we secondly consider the sensing model of the camera sensors in [5] which is being modeled based on the combination of the sensing region and the image resolution. Thirdly, we focus on the problem in different network conditions, homogeneous networks and heterogeneous networks. The list of our contributions is as follows. (i)We introduce LifMax-BC Problem for strong barrier coverage in 3D CSNs based on modelling the monitored space and the sensing region and give its hardness proof;(ii)We propose two scheduling algorithms with the sleep-and-awake mode to solve the problem in the homogeneous networks and the heterogeneous networks, which are based on the auxiliary transformation and the disjoint maximum flow construction;(iii)We conduct a large number of experiments and evaluate the performance of the proposed algorithms in terms of the constructed barrier number. Based on the simulation results, we analyze each scheduling algorithm’s applicable scenarios.

The rest of the paper is organized as follows: Section 2 presents the related works. Section 3 introduces the preliminaries, the definition of our problem and the NP-hardness proof. The two scheduling algorithms are, respectively, proposed in Section 4 and Section 5. Performance evaluations are given in Section 6. concludes this paper and discusses the future work.

The existing sensor-based research on wireless sensor networks (WSNs) can be classified into coverage problems and data transmission problems [6, 7], in which coverage includes target coverage, area coverage, and barrier coverage. Many mature sensing models of camera sensors have been formed from the contribution of the works on target and area coverage in WSNs.

Based on the sensing model of different kinds of camera sensors, there are more studies on barrier coverage with different optimization goals. Based on the sensing model of directional sensors, Wang and Cao [8] studied the construction problem for strong barrier coverage and presented redundancy reduction techniques. The authors proposed the algorithms to solve the barrier coverage problems with the minimum coverage cost based on modeling the full-view-covered regions in [9]. And Mohammad et al. [10] proposed a centralized barrier constructing algorithms based on distributed learning automata for adjustable-orientation directional sensor networks.

Among the optimization goals of barrier coverage, lifetime maximization and robustness guarantee have got attentions beside the coverage cost minimization. For lifetime maximization, Zhang et al. [11] designed a scheduling algorithm for maximizing the full-view coverage duration to solve the fairness-oriented coverage maximization problem, which is based on the full-view sensing model. For robustness guarantee, there exists lots of works to build -barrier coverage. The -barrier coverage algorithm for one-dimensional scenarios was proposed in [12], and the -barrier coverage algorithm for one-dimensional scenarios was designed in [13]. For the sensors with the movement constraints, the strategy was presented for the maximum -barrier coverage problem in [14]. There are some solutions for barrier coverage problem based on the classical theories: based on the divide and conquer theory, Wen et al. [15] proposed an efficient algorithm to construct -barrier; based on the Dijkstra algorithm, Liu et al. [16] realized the minimum full-view coverage for mobile CSNs. And there are some algorithms for meeting special requirements in barrier coverage problem: the sensor interference issue was solved in the algorithm for -barrier coverage in [17]; the one-way -barrier algorithm was proposed in [18] to avoid one-way invasion; the strategy for filling barrier coverage holes was designed to realize the goal of minimizing the energy consumption [19].

Considering the robustness guarantee, we focus on the strong barrier coverage problem with the goal of lifetime maximization and we will design two heuristics for CSNs with homogeneous networks and heterogeneous ones.

3. Preliminaries and Problem Formulations

3.1. Space Model

For the applications of CSNs in 3D scenarios, the monitored space can be modeled as a regular cube or cuboid in the most recent related works. The regular model of the space is beneficial to the deployment of the camera sensors and the construction of the sensing model of sensors. However, for the most applications with the rugged terrain or the mountain topography, the spaces are much different from those with the flat topography. The regular model of the space cannot provide precise position for the deployment of the sensors, which will affect the evaluation of the coverage quality.

With the consideration of the topographic complexity of the monitored space in real scenarios, we model the monitored space into an irregular 3D curve strip instead of a regular cube or cuboid. The 3D curve strip space has two terminal sections , and the ceiling and the ground planes , , which can be indicated as a quadruple as shown in Figure 2. Note that if the irregular 3D strip is a cyclic annular or a zigzag band, it can be decomposed into multiple curve strips which are similarly modeled in the paper.

3.2. Sensing Model Based ROI and Network Model

For the sensing model of camera sensors, the full-view coverage model has been widely applied for the most two-dimensional scenarios, which was introduced in [4]. The full-view coverage model can provide the omnidirectional coverage based on the facing directions of the targets, which can guarantee high coverage accuracy.

In this paper, considering the accuracy of the capturing information and 3D application scenarios, we adopt the Region of Interest (ROI) sensing model with high effective resolution, which was proposed in the research [5] as the 3D sensing model of camera sensors. The ROI sensing model of camera sensors dose not only consider the monitored target’s facing direction and position height but also construction the relationship between the 3D coverage space and the 2D projection area for the camera sensor. The model can satisfy the coverage requirement of application and the strategy design of sensor scheduling.

The ROI sensing model is applied in a 3D curve strip space in our paper. Considering a pair of a camera sensor and a target in , we focus on three groups of parameters: (1) the heights of and , denoted as and , respectively; (2) the length of target , denoted as , which is decide by the target itself; and (3)the angle between the ’s facing direction and the ’s viewing direction in the vertical plane (Effective vertical angle), denoted by . To guarantee the effective coverage, the parameter has a range with the minimum effective vertical angle and the maximum effective vertical angle , which is determined by the required resolution and can be predefined. Based on the conclusion in [5], the angle between the target’s facing direction and the sensor’s viewing direction in the horizontal plane is out of the consideration because of the instability of its value. The definition of ROI model for the camera sensor is given as follows:

Definition 1 (The ROI Sensing Model of Camera Sensors). Consider a 3D curve strip space , a camera sensor located at and a target located at in , the effective projection sensing area of for is a sector-shaped ring or an annular-sector domain on with the inside radius and the external radius as shown in Figure 3.

Based on the ROI sensing model of the camera sensor, we consider the target or intruder in the barrier coverage with the known height and length, i.e., and . For example, if the monitored intruder is a person, the person’s height and face length can be set as meters and meters, respectively.

The camera sensor network considered in our paper is composed of randomly-deployed nodes, which are candidate for barrier coverage scheduling for a 3D curve strip space . These nodes are collected in the set . For each node in , it has its own position and the maximum working duration . With the consideration of the complexity and irregularity of the monitored space, the heights of the sensors are different. And we will discuss the cases with the same working duration and the different working durations later.

For the network, the camera sensors can be modeled as a node set . And we consider the connectivity between each pair of nodes based on their sensing ranges. Based on the ROI sensing model of nodes, there is an edge between and if their sector-shaped rings intersect, i.e., . All the connected edges are collected into the edge set . Then the original network is modeled as as shown in Figure 4. And it is assumed that the transmission radius is at least twice of the sensing radius for each camera sensor, then the network is a connected graph.

3.3. Problem Definitions and Hardness

We focus on the strong barrier coverage in 3D CSNs, which can guarantee to detect intruders without any constraint on crossing paths in the boundary space. Based on the preliminaries, we propose the Lifetime-Maximized Strong Barrier Coverage problem for 3D CSNs (LifMax-BC Problem), whose formal definition is as follows.

Definition 2 (LifMax-BC Problem) Given. (i)A 3D continuous curve strip space where , and are ’s two terminal sections and and are the ceiling and the ground planes of (ii)The camera sensor set deployed in the space , , in which each node has its position and maximum working duration (iii)A potential target or intruder crossing the space with the predefined height and face length (iv)LifMax-BC Problem is to find a collection of subsets of in which each barrier guarantees the strong barrier coverage of the potential target, and schedule these barriers in sleep-and-awake mode with the barrier lifetimes (v)The constraint is that each camera sensor cannot be scheduled to exceed its maximum working duration , i.e., , where is a binary variable to denote whether is scheduled in (if , ; otherwise )(vi)The goal is maximizing the network lifetime

To analyze the hardness of our problem, we review a classical NP-hard problem in graph theory, Minimum Weighted Set Cover (MWSC) Problem, which mathematical formulation is as follows:

Given a set composed of elements, a collection of subsets of where each with a weight , the problem is to find the minimum weighted subcollection such that and is minimized.

Based on the definition of MWSC Problem, the hardness proof of our problem is given as follows.

Theorem 3. The LifMax-BC Problem is NP-hard.

Proof 1. In order to prove the hardness of LifMax-BC Problem, we consider the special case of the problem: each node only contributes to only one barrier, i.e., its working duration overall contributes to the barrier it belongs to and . Based on the ROI sensing model, we can construct candidate node-disjoint barriers on the structural parameters of the space and the known height and face length of the potential target. With the predefined maximum working duration of each sensor, we can calculate the lifetime of each barrier, i.e., . If we assign the inverse of the lifetime as a weight to each barrier, i.e., , we can rewrite the problem in the case with different s as follows:
Given a sensor set and a barrier set in which each barrier is a subset of and can guarantee the barrier coverage for the space , the problem is to find a subset of , e.g. , such that is minimized and .
Since the special version of LifMax-BC Problem is equivalent to MWSC Problem which is proven to be NP-hard [20]. Therefore, LifMax-BC Problem is NP-hard in general.

To solve LifMax-BC Problem, we firstly consider the problem in homogeneous networks (denoted as Homo-LifMax-BC Problem), i.e., the camera sensors have the uniform working duration . We design a barrier coverage scheduling algorithm with disjoint barriers, Robust Barrier Coverage Algorithm. Secondly, we propose the scheduling algorithm with intersecting barriers for the problem in heterogeneous networks (denoted as Hetero-LifMax-BC Problem), i.e., the camera sensors have different maximum working duration s, which is called as Enhancing Barrier Coverage Algorithm. The descriptions and analysis of these two algorithms are presented in the next two sections.

4. Robust Barrier Coverage Algorithm for Homo-LifMax-BC Problem

Consider the case of homogeneous camera sensors with the same maximum working duration , the robustness of the network is important. And the pivotal key is avoiding the exhausted situation of some sensor, which will lead to the failure of the barriers that the sensor works for. Thus the scheduling should balance each sensor’s function in the coverage barriers. With the goal of maximizing the network lifetime, we adopt the sleep-and-awake mode for scheduling, i.e., there is one barrier working and the other barriers are in sleep mode for each round. The sleep-and-awake mode can transform the original goal into maximizing the number of batches of the constructed coverage barriers. For Homo-LifMax-BC Problem, we design Robust Barrier Coverage Algorithm which is composed of two phases, Auxiliary Graph Transformation and Barrier Coverage Scheduling.

4.1. Auxiliary Graph Transformation in Robust Barrier Coverage

To design a sleep-and-awake scheduling for barrier coverage, the first phase is to give an equivalent transformation for the network model illustrated in subsection 3.2. The 3D graph has the node set of camera sensors and is connected by the intersection of the sensing ranges among the sensors, i.e., . For each node in , we define its neighbor set and degree as and , respectively. Then, we transform the undirected and unweighted graph into a directed and edge-weighted graph according to the following steps:

Step 1. Virtual source and destination introducing. To guarantee the strong barrier coverage of any potential target in the space , it is important to construct a consecutive barrier without interval. To the end, we introduce two virtual nodes on the terminal sections and , respectively, i.e., , as shown in Figure 5. For the additional source on , we add new edges to connect and the nodes with the sensing range intersecting with the terminal section , i.e., . For example, ’s sensing range intersects with in , and then the edge can be added into , as shown in Figure 5. In a similar way, for the additional destination on , the new edges are added to connect and the nodes with the sensing range intersecting with the terminal section , i.e., . Then, we update the network graph as by introducing and and we construct the auxiliary graph in the next steps.

Step 2. Node-to-directed-edge converting. Based on the updated graph , we give an equivalent transformation for each node in (with the exception of and ): is converted into a directed edge with the weight . For example, with the degree in the original corresponds to the directed edge with in as shown in Figure 5.

Note that there is a clear division of each pair on the function of connecting directed edges in Step 3. will be the destination of all the ingoing edges to and will be the source of all the outgoing edges from in the original which will give the detailed examples in Step 3. Then for the auxiliary graph , the node set , the edge set , and the edge-weight set .

Step 3: Undirected-edge-to-directed-edge duplexing. For the auxiliary graph , we will transform the edges in the original and assign the weights for them, which are considered into the following three cases: (i)The outgoing edges from : For each edge in , it is converted into a directed edge with the weight . Then and . For example, the edge in has a corresponding edge with in as shown in Figure 5.(ii)The bidirectional edges between s: For each edge in , it is transformed into two directed edges and which both have the weight . Then and . For example, if there is an edge in , the directed edges and are connected in as shown in Figure 5.(iii)The ingoing edges to : For each edge in , it is converted into a directed edge with the weight . Then and . For example, the edge in has a corresponding edge with in as shown in Figure 5.

After the above three steps, we construct an equivalent auxiliary graph for the next barrier constructing in subsection 4.2.

4.2. Barrier Coverage Scheduling in Robust Barrier Coverage

Based on , we construct the feasible barriers with the maximum number based on the maximum flow algorithm as follows.

Firstly, by taking , and as the source and destination as the input of the Stint Algorithm in [21], node-disjoint flows can be obtained which can be restored into a path set . The paths in are node-disjoint which can satisfy the requirement of LifMax-BC Problem in homogeneous network, i.e., it can avoid the situation that some sensor’s expiration causes the failure of the barriers which this sensor works for.

Secondly, since the path set is constructed in the auxiliary graph , we need to reduce these paths in back into the barriers in . Here we take one path as an example to explain the reduction process and the reduction of other paths are in the same way. For each in , it can be reduced back to a coverage barrier according to the following process: for the edge , it is restored into the source of in ; for the edge , it is reduced into the undirected edge of in ; for the edge , it is restored into the destination of in . As shown in Figure 6, two node-disjoint paths in the auxiliary graph are reduced into two barriers and . And the lifetime of each barrier is in the homogeneous network, thus the network lifetime is .

The detailed description of Robust Barrier Coverage Algorithm for Homo-LifMax-BC Problem is given in Algorithm 1.

1: Set ,
2: for each sensor in do
3:   ,
4: //Phase 1: Auxiliary Graph Transformation
5: //Step 1: Virtual source and destination introducing
6: 
7: 
8: //Step 2: Node-to-directed-edge converting
9: 
10: 
11: 
12: //Step 3: Undirected-edge-to-directed-edge duplexing
13: for each edge in do
14:   ,
15: for each edge in do
16:   ,
17: for each edge in do
18:  ,
19: 
20: //Phase 2: Barrier Coverage Scheduling
21: Apply Stint Algorithm in [21] to (, , ) and obtain node-disjoint
  paths collected in
21: for each path in do
23:  for each directed edge on do
24:   Case 1: for , it is restored into the source of .
25:   Case 2: for each , it is reduced into the undirected edge
   of .
26:   Case 3: for , it is restored into the destination of
  .
27: 
28: , .

To analyze the time complexity of Algorithm 1, we review the two phases of the algorithm: for auxiliary graph transformation, the virtual nodes introducing, node converting, and edge duplexing take the time of , and , respectively. Thus the time complexity of Phase 1 is under the assumption that in barrier coverge; for barrier coverage scheduling, it adopts the Stint Algorithm for constructing the node-disjoint flows with the maximum number, which has the time complexity of . And the reduction process takes the time of . To sum up, the time complexity of Algorithm 1 is .

5. Enhancing Barrier Coverage Algorithm for Hetero-LifMax-BC Problem

Consider the heterogeneous camera sensors with the different maximum working duration s, increasing the coverage efficiency of the sensors with high s is beneficial to maximize the network lifetime. If applying Algorithm 1 to solve Hetero-LifMax-BC Problem, disjoint barriers will lead to the situation that there is plenty of extended sleep time for the sensors with high s, which goes against the problem goal of maximizing network lifetime. Thus it is necessary to design another algorithm to efficiently schedule the sensors with high durations from the perspective of making contribution to as many barriers as possible. Then, we design Enhancing Barrier Coverage Algorithm for Hetero-LifMax-BC Problem, whose main idea is to schedule the sensors with longer working durations and higher degrees in more barriers to maximize the network lifetime. There are also two phases in this algorithm, Auxiliary Graph Transformation and Barrier Coverage Scheduling.

5.1. Auxiliary Graph Transformation in Enhancing Barrier Coverage

This phase is composed of three steps, and we adopt the same Step 1. Virtual source and destination introducing as that in Section 4 and obtain the updated graph .

To construct an auxiliary graph for barrier scheduling in the heterogeneous network, it is necessary to balance two important parameters for each node: the maximum working duration and the neighborhood scale . To this end, we introduce a new measure for each node as , which represents the node’s possible average working duration for each neighbor. Furthermore, to analyze each node’s contribution for barrier coverage, we need to give the criterion for parameters and . (1) For the node degree, ’s degree is identified as high-degree if ; otherwise, it is regarded as low-degree. (2) For the maximum working duration, is identified as high-lifetime if , where ; otherwise, it is regarded as low-lifetime. Based on the above preliminaries, we explain the process for Step 2 as follows.

Step 2. Node-to-directed-edge converting. Based on the graph added with and , the transformation for the nodes in (with the exception of and ) is divided into the following three cases: (i). Since which stands for that has only one neighbor, will contribute on only one barrier if is scheduled in Phase 2, which is regardless of whether is high-lifetime or low-lifetime. In this case, is converted into directed edge with the weight (ii). In this case, will give high contribution for several barriers and we divide its working duration equally to each connectivity relationship. In details, is converted into directed edges s with the uniform weight (iii). This case is the most complicated because of its possible unbalanced contributions to several barriers in scheduling. To avoid the unbalance, we propose a trade-off approach to guarantee the reasonably efficient scheduling for such nodes.

Firstly, we sort ’s neighbors in nonincreasing order on the values of , where . Secondly, we calculate the maximum value of the sum of the first neighbors’ s, which is no more than . In other words, we maximize the contribution of on a part of neighbors (the first neighbors) rather than all the neighbors . Then we update as by only retaining the first neighbors and eliminating other neighbors. Then, . Thirdly, we perform the transformation of : is converted into directed edges with the different weights .

To conclude the above three cases, there is also a clear division of each pair and on the function of connecting directed edges in Step 3. is in charge of all the ingoing edges to and is responsible for all the outgoing edges from in the original . And the construction of the auxiliary graph in Step 2 is as follows: (a)The node set (b)The edge set (c)The edge-weight set

Step 3. Undirected-edge-to-directed-edge duplexing. Based on the partial of constructed in Step 2, we will add new directed edges by transforming the undirected edges in the original as follows: (i)The outgoing edges from are as follows: for each edge in , it is converted into a directed edge with if ; it is converted into directed edges with , if ; it is converted into directed edges with , if . Then and (ii)The bidirectional edges between s: For each edge in , it is transformed into pairs of directed edges and which all have the weight . Then and .(iii)The ingoing edges to are as follows: For each edge in , the transformation is similar with that of (i), i.e., and

5.2. Barrier Coverage Scheduling in Enhancing Barrier Coverage

For this phase, we input the constructed auxiliary graph to Stint Algorithm [21] and generate node-disjoint flows which are collected in . Note that since we divide the nodes with high possible contributions into several independent directed edges in Step 2 of Phase 2, we can also apply the node-disjoint flows algorithm, which can realize the scheduling of such nodes in different barriers.

These node-disjoint paths in are constructed in the auxiliary graph which are needed to be reduced back into the barriers in . Since the nodes in or may be scheduled in multiply flows in , the reduction process is different from that of Algorithm 1. For each path in , it can be reduced back to a coverage barrier based on three kinds of edges: for the edge or , it is restored into the source of in ; for the edge or , it is reduced into the undirected edge of in ; and for the edge or , it is restored into the destination of in . Finally, the minimum nonzero weight on the corresponding path is the lifetime of each barrier in the heterogeneous network, i.e., .

The whole description of Enhancing Barrier Coverage Algorithm for LifMax-BC Problem is given in Algorithm 2.

1: Set , ,
2: for each sensor in do
3:  ,
4:  
5: //Phase 1: Auxiliary Graph Transformation
6: Set
7: for each sensor in do
8:  Case 1: if ,
9:  Case 2: if and ,
10:  Case 3: if and ,
11: //Step 1: Virtual source and destination introducing
12: 
13: 
14: //Step 2: Node-to-directed-edge converting
15: for each sensor in do
16:   , ,
17: for each sensor in do
18:  , ,
19: for each sensor in do
20:   Calculate the maximum value of the sum of the first neigh-bors’ s, which is no more than .
21:   ,
22:   , ,
23: //Step 3: Undirected-edge-to-directed-edge duplexing
24: for each edge in do
25: ,
26: for each edge in do
27:  ,
28: for each edge in do
29:  ,
30: 
31: //Phase 2: Barrier Coverage Scheduling
32: Apply the maximum flow algorithm in [21] to (, , ) and obtain node-disjoint paths collected in
33: for each path in do
34:  for each directed edge on do
35:    Case 1: for or , it is restored into the source of .
36:    Case 2: For each or , It Is reduced into the undirected edge of .
37:    Case 3: For or , It Is Restored into the Destination of .
38:  
39: 
40: Return , .

Similarly with the analysis of Algorithm 1, Algorithm 2 also has the time complexity of . Thus the running times of our strategies are both polynomial. They are the feasible solutions of LifMax-BC Problem for homogeneous networks and heterogeneous networks.

6. Performance Evaluation

6.1. Experiment Plan

To evaluate the performance of the proposed algorithms for LifMax-BC Problem, we perform a series of experiments to compare their performance by JAVA. The optimization goal of LifMax-BC Problem is maximizing the network lifetime and we solve it for two cases (the same working duration and the different ones). Instead of the network lifetime, we choose the number of barriers as the evaluation criterion. It is because that the number of constructed barriers stands for the number of scheduling rounds, which is more objective and fairer than the length of network lifetime, especially in the case that there is a big difference in the sensors’ working duration. Here, we denote the two algorithms as Robust Algorithm and Enhancing Algorithm for short.

The experiments are performed in an irregular 3D space which is a 3D curve strip space with the length of units, the width of units, and the height in the range of units, i.e., the ceiling plane of the space is an irregular curved surface. And the boundary located in the space has the length of . For the camera sensor network, camera sensors are randomly deployed on the ceiling plane of the space, i.e., their positions are randomly valued in the scope of the space. And the process of deployment is successfully finished when the network graph is connected. For each camera sensor, it has the sensing radius of units, the Field-of-Vision and the effective vertical angle . And the maximum working duration of each sensor is uniformed as for Robust Algorithm and valued in the range of for Enhancing Algorithm. Based on the ROI sensing model, each sensor has the minimum effective vertical angle and the maximum effective vertical angle ; for the potential target/intruder, we set the height as units and the face length as units for general situations.

In the experiments, we will investigate the performance of the scheduling algorithms from two important parameters: the number of camera sensors and the effective vertical angle , which are corresponding to two groups of settings: Group 1— varies from to by the step of (a) , ; (b) , ; and (c) , . Group 2— varies from to by the step of (a) , ; (b) , ; and (c) . For each parameter setting, we run instances and compute their average for evaluation.

6.2. Experiment Result Analysis

As the results in Figure 7 shown, it can be observed that the number of constructed barriers from the proposed algorithms present rising trend with the enlargement of the networks . Between the two algorithms, Enhancing Algorithm is more influenced by , i.e., obtained by the algorithm grows faster with the increasing of ; Robust Algorithm is less effected by , and the gap between the results from the two algorithms becomes larger with the growth of . The increasing of the network scale can satisfy more requirements of strong barrier coverage and Enhancing Algorithm utilizes some sensor for multiple barriers, which increases the number of barriers. Furthermore, from Figures 7(a) and 7(c), the better performance of Enhancing Algorithm becomes more significant when the effective vertical angle . It can be explained that the enlargement of the effective vertical angle improves sensors’ coverage range which increases the probability of barrier coverage.

Investigating the effect of the effective vertical angles on scheduling algorithms in Figure 8, we can find that ’s change has less significant influence when network scale is relatively small and the number of barriers increases slowly in Figures 8(a) and 8(b), while has more influence on the algorithms’ performance from Figure 8(c). Furthermore, the gap between the results from the two algorithms presents smaller than that obtained by varying the number of sensors. Seen from these three subfigures, Robust Algorithm’s results presents the rising trend with the increasing of , which is less than that presented by Enhancing Algorithm. It can be concluded that the sensing conditions have less influence on the coverage quality when the network is homogeneous, and the difference on the coverage range is more beneficial for enhancing the coverage efficiency in the heterogeneous network.

From the above two groups of experiment results, we can conclude that the proposed algorithms are both efficient on maximizing the network lifetime and can be utilized into the solution for LifMax-BC Problem in the homogeneous and heterogeneous networks.

7. Conclusions

In this paper, we investigated the camera sensor scheduling problem for strong barrier coverage in 3D CSNs with the goal of maximizing the network lifetime, LifMax-BC Problem. The problem has been considered and analyzed for homogeneous networks (all the sensors have the uniform working duration) and heterogeneous networks (the sensors have different working durations). Based on the ROI sensing model, we, respectively, proposed two heuristic algorithms via the auxiliary graph construction and the maximum flow algorithm. The algorithm for homogeneous networks aims to increase the network robustness by constructing the disjoint barriers; and the algorithm for heterogeneous networks realizes the lifetime maximization via enhancing the utilization of the sensors with high working duration. By evaluating the performance of the proposed algorithms, the simulation results were analyzed in terms of the number of the scheduled barriers, which show that the algorithms have high efficiency on maximizing the network lifetime and can adapt to different network types. We will design the distributed strategies for the related optimization problems in the future.

Data Availability

The data used to support the findings of this study are included within the article.

Conflicts of Interest

The authors declare that there is no conflict of interest regarding the publication of this article.

Acknowledgments

This paper was supported by the National Natural Science Foundation of China under Grant (62002022 and 62202054) and the Fundamental Research Funds for the Central Universities (No. BLX201921, No. 2021ZY88).