J. Parallel Distrib. Comput. 72 (2012) 1654–1663 Contents lists available at SciVerse ScienceDirect J. Parallel Distrib. Comput. journal homepage: www.elsevier.com/locate/jpdc Constructing sensor barriers with minimum cost in wireless sensor networks Jun He a, , Hongchi Shi b a College of Optical Sciences, University of Arizona, 1630 E. University Boulevard, Tucson, AZ 85721, United States b Department of Computer Science, Texas State University-San Marcos, 601 University Drive, San Marcos, TX 78666, United States article info Article history: Received 24 September 2010 Received in revised form 1 June 2012 Accepted 24 July 2012 Available online 1 August 2012 Keywords: Wireless sensor network Barrier coverage Minimum cost flow Distributed algorithm Complexity analysis Asynchronous communications abstract One major application category for wireless sensor networks is to detect intruders entering protected areas. Early research has studied the barrier coverage problem for intruder detection. However, an open problem is to build sensor barriers with minimum cost in wireless sensor networks. This is a critical problem (called minimum-cost barrier coverage), and its solution can be widely used in sensor barrier applications, such as border security and intruder detection. In this paper, we present a complete solution to the minimum-cost barrier coverage problem. The cost here can be any performance measurement and normally is defined as the resource consumed or occupied by the sensor barriers. Our algorithm, called the PUSH–PULL-IMPROVE algorithm, is the first one that provides a distributed solution to the minimum-cost barrier coverage problem in asynchronous wireless sensor networks. It can be used for protected areas of any size and shape with homogeneous or heterogeneous networks. In our algorithm, each node does not necessarily know its exact location and only needs to communicate with its neighbors. For a deployment of n sensors and a cost measurement with maximum value C max , our algorithm has O(n 2 log(nC max )) message complexity and O(n 2 log(nC max )) time complexity to find K barriers. Simulation results verify the performance of the algorithm. We observe that the actual number of messages sent in the simulations is much less than n 2 . © 2012 Elsevier Inc. All rights reserved. 1. Introduction One of the major application categories for wireless sensor networks (WSNs) is to detect intrusion in protected areas. For example, in border surveillance and homeland security, sensor barriers are used to detect intruders illegally crossing the protected border. A sensor barrier is formed by sensing areas of a set of active wireless sensor nodes. In order to detect all intrusion events, the barrier cannot contain any gap, and this is referred to as a strong barrier [15]. In this paper, we only consider the scenario of strong barriers. Sensors are usually dropped by airplanes or launched by artilleries onto a field. It is quite hard to determine sensor locations and network topology before the deployment. Thus, the deployed sensor nodes usually have to self-organize to set up the barriers in a distributed manner. Also, it is impractical to designate a sink to collect all sensor nodes’ information and centrally configure the network because it has a high communication cost and requires a powerful super-node which is usually unavailable. So, a distributed algorithm is more desirable, which reduces the chance of network failure and improves the network survivability Corresponding author. E-mail addresses: junhe@ieee.org (J. He), hs15@txstate.edu (H. Shi). and reliability. Furthermore, due to unreliable communication channels in wireless sensor networks, the algorithm has to be able to work asynchronously. Normally, sensor nodes are only equipped with weak computa- tion processors with little memory space and powered by batter- ies with limited energy. Therefore, an effective algorithm should build barriers with low message complexity to preserve the energy in each node and only activate the sensor nodes with minimum cost to form the barriers to extend the lifetime of the wireless sen- sor network. Here, the cost can be any performance measurement, and normally it is defined as the resource consumed or occupied by the sensor barriers. For example, it can be the energy cost (such as communication and sensing energy consumption) of the barrier coverage, a cost associated with the residual battery level in each sensor, or the number of sensor nodes activated for the barrier cov- erage. Any non-negative integer cost function can be incorporated into our algorithm. In case of non-integer costs, we can discretize the costs and then scale them into non-negative integer numbers so that the algorithm can handle them. In recent years, the barrier coverage problem has become an emerging subject of research [15,8,3,17,4,22,24,23,16,18,13, 5,19,20]. The concept of barrier coverage was first introduced in a robotic system [8]. More details of barrier coverage were given in [15]. Kumar et al. defined the notion of barrier coverage using wireless sensors and proposed a centralized algorithm to 0743-7315/$ – see front matter © 2012 Elsevier Inc. All rights reserved. doi:10.1016/j.jpdc.2012.07.004