1 bandwidth-aware breach-free barrier construction with vanet nodes for realtime fugitive search...
TRANSCRIPT
![Page 1: 1 Bandwidth-aware Breach-free Barrier Construction with VANET nodes for Realtime Fugitive Search Donghyun Kim*, Junggab Son*, Wei Wang**, Deying Li***,](https://reader033.vdocument.in/reader033/viewer/2022051417/5697bfd21a28abf838cab737/html5/thumbnails/1.jpg)
1
Bandwidth-aware Breach-free Barrier Construction with VANET nodes for
Realtime Fugitive Search
Donghyun Kim*, Junggab Son*, Wei Wang** , Deying Li***, Alade O. Tokuta*, Sunghyun Cho+
* Department of Mathematics and Physics, North Carolina Central University, Durham, NC, USA** Schoo of Mathematics and Statistics, Xi'an Jiaotong University, Xi'an, China
*** School of Information, Renmin University of China, China+ Department of Computer Science and Engineering, Hanyang University, South Korea
![Page 2: 1 Bandwidth-aware Breach-free Barrier Construction with VANET nodes for Realtime Fugitive Search Donghyun Kim*, Junggab Son*, Wei Wang**, Deying Li***,](https://reader033.vdocument.in/reader033/viewer/2022051417/5697bfd21a28abf838cab737/html5/thumbnails/2.jpg)
22
Agenda
• Introduction• Problem Formulation
– Abstraction of Metropolitan Area Topology– Breach of Sensor Barriers– Formal Definition of Problem
• Main Contribution – Polynomial Time Exact Algorithm– Checking Integrity of a VANET Barrier– Barrier-breach between Two VANET Barriers– Scheduling Subsets for Breach-free Barrier
• Concluding Remarks
![Page 3: 1 Bandwidth-aware Breach-free Barrier Construction with VANET nodes for Realtime Fugitive Search Donghyun Kim*, Junggab Son*, Wei Wang**, Deying Li***,](https://reader033.vdocument.in/reader033/viewer/2022051417/5697bfd21a28abf838cab737/html5/thumbnails/3.jpg)
33
Introduction
• Vehicular Ad hoc NETwork (VANET)– An adhoc network of highly mobile nodes, in particular
vehicles travelling on the road
Image source: http://adrianlatorre.com/projects/pfc/img/vanet_full.jpg
![Page 4: 1 Bandwidth-aware Breach-free Barrier Construction with VANET nodes for Realtime Fugitive Search Donghyun Kim*, Junggab Son*, Wei Wang**, Deying Li***,](https://reader033.vdocument.in/reader033/viewer/2022051417/5697bfd21a28abf838cab737/html5/thumbnails/4.jpg)
44
Introduction
• VANET applications– Remote vehicle personalization and diagnostics– Internet access– Digital map downloading– On-demand-basis real-time visual data collection
• Pics-on-wheel (POW): mobile cloud-based real-time street visual data collection system [2]
• Vehicle Witnesses as a Service (VWaaS): privacy enhanced version of POW [3]
– and many more.
![Page 5: 1 Bandwidth-aware Breach-free Barrier Construction with VANET nodes for Realtime Fugitive Search Donghyun Kim*, Junggab Son*, Wei Wang**, Deying Li***,](https://reader033.vdocument.in/reader033/viewer/2022051417/5697bfd21a28abf838cab737/html5/thumbnails/5.jpg)
55
Introduction
• Q: Collecting Real-time Visual Images of Suspects Who Are Trying to Leave Area of Interest using VANET nodes?– VANET nodes are expected to have visual sensors and
wireless transceivers
Image source: http://humandrama.tistory.com/975
![Page 6: 1 Bandwidth-aware Breach-free Barrier Construction with VANET nodes for Realtime Fugitive Search Donghyun Kim*, Junggab Son*, Wei Wang**, Deying Li***,](https://reader033.vdocument.in/reader033/viewer/2022051417/5697bfd21a28abf838cab737/html5/thumbnails/6.jpg)
66
Introduction
– People care their privacy• Normally, reluctant to reveal their current locations and/or their
future travel schedule
– Under urgent/emergent situation, e.g. Boston Bombing• Previous experiences show many people may voluntarily
disclose their locations and give up their privacy
Image source: http://ipvm.com/
![Page 7: 1 Bandwidth-aware Breach-free Barrier Construction with VANET nodes for Realtime Fugitive Search Donghyun Kim*, Junggab Son*, Wei Wang**, Deying Li***,](https://reader033.vdocument.in/reader033/viewer/2022051417/5697bfd21a28abf838cab737/html5/thumbnails/7.jpg)
77
Introduction
• Still, the future trajectories of VANET nodes may not be controllable, but may provide their current locations and short-term future trajectories
• Asking all nodes to transmit real-time video would generate too much network traffic
https://cleanenergydurham.wordpress.com/category/neighborhoods/trinity-park/
?
![Page 8: 1 Bandwidth-aware Breach-free Barrier Construction with VANET nodes for Realtime Fugitive Search Donghyun Kim*, Junggab Son*, Wei Wang**, Deying Li***,](https://reader033.vdocument.in/reader033/viewer/2022051417/5697bfd21a28abf838cab737/html5/thumbnails/8.jpg)
88
Agenda
• Introduction• Problem Formulation
– Abstraction of Metropolitan Area Topology– Breach of Sensor Barriers– Formal Definition of Problem
• Main Contribution – Polynomial Time Exact Algorithm– Checking Integrity of a VANET Barrier– Barrier-breach between Two VANET Barriers– Scheduling Subsets for Breach-free Barrier
• Concluding Remarks
![Page 9: 1 Bandwidth-aware Breach-free Barrier Construction with VANET nodes for Realtime Fugitive Search Donghyun Kim*, Junggab Son*, Wei Wang**, Deying Li***,](https://reader033.vdocument.in/reader033/viewer/2022051417/5697bfd21a28abf838cab737/html5/thumbnails/9.jpg)
99
Problem Formulation
• Problem Statement– How to operate a subset of VANET nodes
• to provide (inside-out) barrier-coverage over an area of interest to detect fugitives leaving an area of interest during a given mission period
– Assume• the area of interest is a huge metropolitan area,• the mission period consists of a series of time slots,• the travel schedule of each VANET node is known for next T
time slots,• each participating VANET node is with visual sensors and
wireless connectivity to the central authority, and• are either moving on the road and parked on a parking lot,
![Page 10: 1 Bandwidth-aware Breach-free Barrier Construction with VANET nodes for Realtime Fugitive Search Donghyun Kim*, Junggab Son*, Wei Wang**, Deying Li***,](https://reader033.vdocument.in/reader033/viewer/2022051417/5697bfd21a28abf838cab737/html5/thumbnails/10.jpg)
1010
Problem Formulation
• Abstraction of Metropolitan Area Topology– Assume the shape of the map M of a metropolitan area
is a rectangle– Partition M into regular squares whose length and
width are r– Construct a topology graph G=(V, E)
(a)
(b)
r
![Page 11: 1 Bandwidth-aware Breach-free Barrier Construction with VANET nodes for Realtime Fugitive Search Donghyun Kim*, Junggab Son*, Wei Wang**, Deying Li***,](https://reader033.vdocument.in/reader033/viewer/2022051417/5697bfd21a28abf838cab737/html5/thumbnails/11.jpg)
1111
Problem Formulation
• Barrier coverage of a sensor network and breach [27]
a
b
c
d
e
1g
2g
x
y
![Page 12: 1 Bandwidth-aware Breach-free Barrier Construction with VANET nodes for Realtime Fugitive Search Donghyun Kim*, Junggab Son*, Wei Wang**, Deying Li***,](https://reader033.vdocument.in/reader033/viewer/2022051417/5697bfd21a28abf838cab737/html5/thumbnails/12.jpg)
1212
Problem Formulation
• Adoption of the Concept of Breach to Our Context
p p
(a) (b) (c)
![Page 13: 1 Bandwidth-aware Breach-free Barrier Construction with VANET nodes for Realtime Fugitive Search Donghyun Kim*, Junggab Son*, Wei Wang**, Deying Li***,](https://reader033.vdocument.in/reader033/viewer/2022051417/5697bfd21a28abf838cab737/html5/thumbnails/13.jpg)
1313
Problem Formulation
• Seamless VANET barrier coverage problem (SVBCP)– Given
• the location of each VANET node at each time slot in [0, T], • find a VANET node operation schedule (a collection of subsets
of nodes) which does not have two subsets at t-time slot and (t+1)-time slot, between which there exists a breach, and (b) the size of each subset does not exceed a network limit, b.
(a) (b)
q
p1a
2a3a
4a5a
6a7a
8a
9a 10a
![Page 14: 1 Bandwidth-aware Breach-free Barrier Construction with VANET nodes for Realtime Fugitive Search Donghyun Kim*, Junggab Son*, Wei Wang**, Deying Li***,](https://reader033.vdocument.in/reader033/viewer/2022051417/5697bfd21a28abf838cab737/html5/thumbnails/14.jpg)
1414
Problem Formulation
• Seamless VANET barrier coverage problem (SVBCP)
q
p
q
p
Q: There might be more than one choice from one slot to the next slot – which one does not lead to the dead end?
![Page 15: 1 Bandwidth-aware Breach-free Barrier Construction with VANET nodes for Realtime Fugitive Search Donghyun Kim*, Junggab Son*, Wei Wang**, Deying Li***,](https://reader033.vdocument.in/reader033/viewer/2022051417/5697bfd21a28abf838cab737/html5/thumbnails/15.jpg)
1515
Agenda
• Introduction• Problem Formulation
– Abstraction of Metropolitan Area Topology– Breach of Sensor Barriers– Formal Definition of Problem
• Main Contribution – Polynomial Time Exact Algorithm– Checking Integrity of a VANET Barrier– Barrier-breach between Two VANET Barriers– Scheduling Subsets for Breach-free Barrier
• Concluding Remarks
![Page 16: 1 Bandwidth-aware Breach-free Barrier Construction with VANET nodes for Realtime Fugitive Search Donghyun Kim*, Junggab Son*, Wei Wang**, Deying Li***,](https://reader033.vdocument.in/reader033/viewer/2022051417/5697bfd21a28abf838cab737/html5/thumbnails/16.jpg)
1616
Main Contributions
• Three Key Questions– Given a city map abstraction , the initial location , and a
subset of nodes , the locations of participating VANET nodes at the -th time slot, how to determine if provides a (inside-out) barrier coverage over against ?
– Given and two barriers and , how to determine if there is no breach when is replaced by .
– How to design a polynomial time exact algorithm for SVBCP?
![Page 17: 1 Bandwidth-aware Breach-free Barrier Construction with VANET nodes for Realtime Fugitive Search Donghyun Kim*, Junggab Son*, Wei Wang**, Deying Li***,](https://reader033.vdocument.in/reader033/viewer/2022051417/5697bfd21a28abf838cab737/html5/thumbnails/17.jpg)
1717
Checking Integrity of a VANET Barrier
– Given a city map abstraction , the initial location , and a subset of nodes , the locations of participating VANET nodes at the -th time slot, how to determine if provides a (inside-out) barrier coverage over against ?
• Step 1: modify to a directional graph
• Step 2: compute a path from to – the existence of such path implies the existence of a covert
path for the fugitive
such that any incoming directional edge to a VANET node in is removed
![Page 18: 1 Bandwidth-aware Breach-free Barrier Construction with VANET nodes for Realtime Fugitive Search Donghyun Kim*, Junggab Son*, Wei Wang**, Deying Li***,](https://reader033.vdocument.in/reader033/viewer/2022051417/5697bfd21a28abf838cab737/html5/thumbnails/18.jpg)
1818
Barrier-breach between Two VANET Barriers
• In our context, – a breach between two barriers is a node in such that
• used to reachable to , but not reachable to , but• now, not reachable to , but reachable to (outside the current
barrier, and thus get to almost immeidately)
q
p
q
p
![Page 19: 1 Bandwidth-aware Breach-free Barrier Construction with VANET nodes for Realtime Fugitive Search Donghyun Kim*, Junggab Son*, Wei Wang**, Deying Li***,](https://reader033.vdocument.in/reader033/viewer/2022051417/5697bfd21a28abf838cab737/html5/thumbnails/19.jpg)
1919
Scheduling Subsets for Breach-free Barrier
• For each i-th time slot – find all possible configurations (a subset with size b)– edge from one configuration at i-th time slot to another
configuration at i+1 time slot– find s-t path 0S 1S 2S TS
… … … …
…
10,s
20,s 21,s
11,s
… ts
![Page 20: 1 Bandwidth-aware Breach-free Barrier Construction with VANET nodes for Realtime Fugitive Search Donghyun Kim*, Junggab Son*, Wei Wang**, Deying Li***,](https://reader033.vdocument.in/reader033/viewer/2022051417/5697bfd21a28abf838cab737/html5/thumbnails/20.jpg)
2020
Analysis
• Theorem 1– The proposed strategy solves the SVBCP correctly.
• Theorem 2– The running time of the proposed algorithm is
polynomial
![Page 21: 1 Bandwidth-aware Breach-free Barrier Construction with VANET nodes for Realtime Fugitive Search Donghyun Kim*, Junggab Son*, Wei Wang**, Deying Li***,](https://reader033.vdocument.in/reader033/viewer/2022051417/5697bfd21a28abf838cab737/html5/thumbnails/21.jpg)
2121
Agenda
• Introduction• Problem Formulation
– Abstraction of Metropolitan Area Topology– Breach of Sensor Barriers– Formal Definition of Problem
• Main Contribution – Polynomial Time Exact Algorithm– Checking Integrity of a VANET Barrier– Barrier-breach between Two VANET Barriers– Scheduling Subsets for Breach-free Barrier
• Concluding Remarks
![Page 22: 1 Bandwidth-aware Breach-free Barrier Construction with VANET nodes for Realtime Fugitive Search Donghyun Kim*, Junggab Son*, Wei Wang**, Deying Li***,](https://reader033.vdocument.in/reader033/viewer/2022051417/5697bfd21a28abf838cab737/html5/thumbnails/22.jpg)
2222
Concluding Remarks
• Proposed a polynomial exact algorithm for SVBCP
• Will Consider– Smaller running time– Less assumptions
• more sophisticated assumption for network bandwidth• more practical VANET node mobility• unpredictability