Abstract
This paper proposes a twice deployment node balance algorithm (TDNB) which guarantees successful detection of the moving target on road networks. Through dividing the deployment of the sensor nodes into two phases instead of deploying all the sensors at one time, TDNB has a better performance. In the former phase, some of the sensors are deployed on the road at random. In the latter phase, the rest of the sensors are deployed on demand to make the number on each path the same. Due to the equivalence of the node's number, the network will have a prolonged lifetime after inserting nodes into the segment according to this algorithm. TDNB extends the network's lifetime remarkably compared with the former algorithms. Furthermore, TDNB enables us to insert nodes to the segment required in the network instead of all the segments, which reduces the workload to a large extent. In short, without increasing the number of sensors in road network, TDNB has a better performance compared to VISA in terms of network lifetime, which meets the demand for persistent monitoring application.
1. Introduction
The demand for surveillance and tracking in extreme environment or battlefield has fostered a growing interest in road network surveillance with wireless sensor network (WSN) in recent years [1, 2]. The lifetime of the network is one of the most important factors when applied to those extreme situations, so it is a big challenge to prolong the network's lifetime in the road network surveillance system. Sensing scheduling and node deployment are two dominant parts of the road network surveillance system for they are related to sensing area, interconnection of road networks, and energy consumption, and all of which will influence the performance of sensor networks greatly [3].
Most of the surveillance systems have focused on surveillance for two-dimensional space, such as open battle field, while the research on road network is limited. WSNroad network surveillance system consists of sensor nodes, targets, and road networks, which are the key features to distinguish it from two-dimensional space WSN surveillance systems. Meanwhile, there are protection point and entrance point in the road network. The entrance point denotes the point from which a target can intrude the network. The protection point denotes the point that surveillance system should protect. In the road network surveillance system, the target is confined within road segments with a bounded maximum speed. A typical scenario is shown in Figure 1.

Road network surveillance.
In a road network, the heart of the area is always the protection point, and the target can get to the protection point through variance of roads. The surveillance system guarantees both of the successful detection of the intruding target before it reaches the protection point and the maximization of the network's lifetime. Jeong et al. firstly proposes the virtual scanning algorithm (VISA) [1, 2] for road network surveillance which extends the lifetime of the network a lot. We will introduce VISA in the next section in detail. Nodes in VISA system are woke up one by one along the way from the protection point to the entrance point just like scanning wave. In this way, intruding target can be detected during a period of time. However, when it is applied to the road network surveillance system which consists of multiple paths, the network will suffer from a short lifetime due to the inherent shortcoming of the algorithm. So diverse scanning time caused by the drawbacks of VISA shortens the lifetime of the network.
In this paper, we propose a node deployment algorithm based on virtual scanning algorithm for target detection. Furthermore, it is the first work to study how to deploy the nodes satisfying the actual requirement and how to prolong the scanning time of wave on short scanning path which will balance the scanning time of all the scanning paths and maximize the lifetime of the networks.
The rest of the paper is organized as follows. Section 2 talks about the related works in road surveillance algorithm especially VISA who is particularly relevant to this paper. Section 3 introduces methodology of this paper. Evaluation of this algorithm is illustrated in Section 4. Section 5 is the summary of this paper.
2. Related Works
Much more attention is paid to the target detection and target tracking in the road network surveillance applications [1, 2]. Current researches are mainly about the open space surveillance algorithm [1, 2]. Take Point Detection and Tracking; for example, Rabbat and Nowak, who came from the Department of Computer, Wisconsin-Madison University, proposed a distributed detection tracking algorithm that utilizes signal strength received to localize the signal source [4]. Chen et al., who came from University of Illinois, presented a lightweight algorithm based on distributed dynamic hierarchical clustering target tracking algorithm, which took the sensing range of the sensor, as well as energy and other aspects of communication limitation into account [5]. Yao presented a localization algorithm based on the observation that signals from different nodes arrive at the target in different time [6]. Gui and Mohapatra proposed a patrolling surveillance algorithm which was similar to the virtual scanning algorithm that allows the nodes to be awake according to the schedule to find the track of the target [7]. In addition, He et al. implemented the target detection system which allows a group of sensor nodes to work together to identify and track target in the practical environment [8].
Those algorithms mentioned above are all for open space without limitation. When Jeong et al. studied surveillance applications on known road networks, he proposed always-scanning algorithm (ASA) [1, 2]. He divided the entire scenario into three parts, namely, entrance points, protection points, and the road network. The system completes the nodes' initialization by merging and duplicating initial messages. When the system starts to work, each wave propagates from the protection points set to the entrance points set. Taking advantages of low duty cycle of the network, the lifetime of the system can be extended greatly.
The VISA algorithm is described as follows. Compared with the open two-dimensional space surveillance system, there are two facts that we can leverage on. First, the movement of targets is confined within roadways. Second, the road network maps are normally known. The typical scenario for road network surveillance system is shown in Figure 2. Note that n is the number of sensors and they are randomly placed on a road segment with the length as l. The sensing circle radius of each sensor is r. We suppose that the road is covered by the circle. Most of commercially available sensors can achieve the assumption aforementioned, for example, a moving car 60–100 feet away can be detected by PIR sensors. Therefore, the scenario of typical road network surveillance system can be illustrated as Figure 2, where n sensors are linearly placed at random. The left end of the road segment is the entrance point where the target can get into the network and the right end of the road segment is the protection point P where we should protect.

Road network surveillance scenario with VISA.
To guarantee successful detection of intrusion target, we may let the sensors always awake intuitively. However, the energy consumption is considerable, and there is better solution. It is observed that it takes
Based on the fact that targets move only along the roadways, a new design called virtual scanning is proposed by Jaehoon Jeong which prolonged the lifetime of road network remarkably. As shown in Figure 2, sensors are waked up one by one for a certain time w (the least time a sensor needs to guarantee successful detection of a target) from sensor
VISA algorithm extents the lifetime of network remarkably compared with the road surveillance system before. What is more, it opens a promising direction of road network surveillance. However, because the sensors are all randomly deployed at one time, when VISA is applied on road network surveillance system, the scanning time on each path may be different due to the different number of sensors on each path. As a result, the network will suffer from a short lifetime. We find that the algorithm can be improved furthermore. Therefore, we studied the deployment of the sensor nodes. The network's lifetime can be maximized by balancing the scanning time of each of the scanning waves.
3. Method Design
This section presents the detailed design of TDNB and analyzes the performance of the network with our algorithm in theory.
3.1. Definitions and Assumptions
Our TDNB is based on the following assumptions.
The road network map is known (download from Google). Targets are confined within the road segments with a maximum speed of The sensing area can cover all the paths of the road network, and there is no sensing hole segment in the network. Sensors are roughly time-synchronized (it can make sure that the time shift by the existing solutions is under acceptable limits). There is no sophisticated sensor applied to the node point (only sensors like PIR). When the target move into the sensing area, the system guarantees successful detection.
The relevant parameters are defined in Table 1.
The relevant parameters.
3.2. System Model
As shown in Figure 3, there are 4 entrance points and 4 protection points in the road network, and the target intrudes the sensing area and moves towards any protection point from any of the entrance points through any of the paths with the bounded maximum speed as

Sensor deployment in road networks.
There are lots of entrance points and protection points on the road network. When the system starts working with VISA, there are, actually, multiple scanning waves propagating from every protection point simultaneously. According to the working schedule of virtual scanning algorithm on road networks, there are three kinds of scanning wave: (1) waves that are originated from one protection point and their destinations are not any of the entrance points; (2) waves that are originated from one protection point and arrive at one entrance point without any branches; (3) waves that are originated from one protection point and arrive at many entrance points through variance of branches. These three kinds of waves are illustrated in Figure 4.

Types of virtual scan waves.
The scanning time differ from each other due to the different sensor density among road segments and different types of scan waves, which will lead to a big
According to formula (1), the network's silent time
As a result, the system needs to start a new round of scanning. The lifetime of the network can be computed as
3.3. Maximization of the Network's Lifetime
In the previous discussions,
As shown in Figure 5, we can make the number of the sensor nodes on each path from the protection points to entrance points equivalent. Waves propagating from the protection points are transmitted to the entrance points through m nodes on each path when the network gets to start. It takes

Maximization of network's lifetime.
3.4. Improvement on Road Network
In practical, there is always a big difference from one virtual scan wave's scanning time to another. To handle the issue, we propose twice deployment and node balance algorithm which consists of two phases (Figure 9). And we refer the former algorithm as random-deployment and the latter as demand-deployment phase. The sensor nodes are deployed at random during the random-deployment phase. During the demand-deployment phase, the nodes are increased in number and density to make the scanning time longer, and the scanning time will be balanced overall. As a result, the lifetime of the network will be optimized. A model is made to illustrate the scenario we described. As shown in Figure 6(a), there are two entrance points and two protection points.

Network with a big
We suppose that it takes at least 1 second for a node to detect the target. That means, when a node is passed, one second should be added to the scanning time. The shortest distance in this scenario is
As shown in Figure 6(b), two waves are propagating from the protection points to the entrance points. Their routes should follow the arrowhead. The time difference for the waves to get to entrance points is 3 seconds while the time for the target to get to the protection point is 2. It implicates that the system should begin another round of virtual scanning before it finished this round. Otherwise, there may be enough time for a target to get to the protection point which will make our system useless. So, it is important to adjust the number of the sensor nodes on each road segment to guarantee the successful detection of the target in our system.
As shown in Figure 7, to change the type of the two waves mentioned above to type two, we add 1 and 4 nodes to

The optimal state of road network.
What is more, to reduce our workload, we can only insert nodes in segment

A better solution.

Twice deployment and node balance algorithm.
To clarify, twice deployment and node balance algorithm is described as follows. There are n protection points and n entrance points on the road network. The K is the last intersection point from protection point to entrance point; that is, there is no intersection within all
The procedure is as follows.
Randomly deploy a lot of nodes in area from the protection points set to the entrance points set. Initialize the network. We regard the k point as the last point of the route. Compute the waves' scanning time. Waves propagate from j protection point to the entrance point. The system maintains a timer for each wave during their propagation. The timer is set to be 0 when the waves start to propagate. And the node k returns the information. Deploy on the demand. To guarantee the equivalence of each wave's scanning time, the terminal utilizes the information provided by overall k points to compute the number of the nodes required to insert into each
During the random-deployment phase, sensor nodes are deployed at random among the whole area and we just insert nodes into a certain area during the last phase. That is why we call it the twice deployment and node balance algorithm.
After we optimize the algorithm, the lifetime of network
4. Performance Simulation
The simulation experiment of the system is conducted on the platform built by us. We constructed a virtual road network consisting of 4 protection points and 4 entrance points. Covering every corner of the networks, sensor nodes are deployed at random. The target is set to intrude the road network at the maximum of the bounded speed
The relevant simulation parameters required are shown in Table 2.
Simulation parameters.
4.1. Simulation of the Network's Lifetime
n,
4.1.1. The Lifetime of the Network Influenced by the Node's Number
As revealed in Figure 10, with the increment of the node's number, the network's lifetime increases linearly, except for the worst case of ASA. Compared with it, TDNB increases rapidly with the increment of the nodes. When the node's number reaches 1000, the life time of the network with ASA and TDNB increases by 241.58% and 313.73%, respectively, compared with the case of 200 nodes. On average, the life time of the network with TDNB algorithm is increased by 66.13% compared with the network using ASA. And from the result of the simulation, the node's number has an equivalent influence on the network's lifetime on either a single path or the road networks. And the increment of the node's number makes a difference to the performance of the network. In ASA, the node's number on the shortest scanning time path is fixed, so it does not make any contribution to the network's lifetime. Generally speaking, TDNB is much better!

The lifetime of the network influenced by the node's number.
4.1.2. The Lifetime of the Network Influenced by the Node's Working Time
As shown in Figure 11, with the increment on the node's working time, it shows a down trend on the network's lifetime. When the node's working time is 1, the lifetime of network with ASA and TDNB algorithm is increased by 36% and 25.71%, respectively, compared with the case that the nodes' working time is 10. Generally speaking, the network's life time with TDNB is increased by 56.73% compared with ASA. And the shorter the working time is the better the network will perform.

The lifetime of the network influenced by the node's working time.
4.1.3. The Lifetime of the Network Influenced by the Maximum Speed
As shown in Figure 12, there is strong negative correlation between the network's lifetime and the target's maximum speed. When the target's maximum speed is 5 m/s, the life time of network with ASA and TDNB is increased by 69.23% and 60.54%, respectively, compared with the case that the nodes' speed is 50 m/s. The increment on the maximum speed results in a big decrement on the network's lifetime due to the negative correlation between the target's maximum speed and the network's silent time. So we need to choose a reasonable

The lifetime of the network influenced by the maximum speed.
5. Conclusions
The novelty of this paper can be concluded as follows. Compared with the road network surveillance algorithm before, this paper presents a novel algorithm which proved to have a better performance in intrusive target detection in road networks, through dividing the deployment of the sensor nodes into two phases instead of deploying all the sensors at one time. In the former phase, some of the sensors are deployed on the road at random. In the latter phase, the rest of the sensors are deployed on the last road segment to make the number of sensors on each path the same, which will be easier for people to handle in practical scenario. The network will have a prolonged lifetime due to the equivalence of the node's number after inserting nodes on the segments according to this algorithm. TDNB extends the node's lifetime remarkably compared with former algorithms. In short, TDNB meets the demand for persistent monitoring application without increasing the number of sensors in the road networks.
Footnotes
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
Acknowledgments
This work is supported by China NSF (61373091, 61202478, 60933011, 11102124, and 71102113); the National Science and Technology Major Project of China (2011ZX03005-002); the State Key Development Program for Basic Research of China (2011CB302902); the Program for New Century Excellent Talents in University, Ministry of Education of China (NCET-10-0604); and the US NSF Grants CNS-0917097.
