{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T14:33:40Z","timestamp":1761921220021,"version":"build-2065373602"},"reference-count":35,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T00:00:00Z","timestamp":1705449600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>This paper introduces an efficient barrier model for enhancing smart building surveillance in harsh environment with thin walls and structures. After the main research problem of minimizing the total number of wall-recognition surveillance barriers, we propose two distinct algorithms, Centralized Node Deployment and Adaptation Node Deployment, which are designed to address the challenge by strategic placement of surveillance nodes within the smart building. The Centralized Node Deployment aligns nodes along the thin walls, ensuring consistent communication coverage and effectively countering potential disruptions. Conversely, the Adaptation Node Deployment begins with random node placement, which adapts over time to ensure efficient communication across the building. The novelty of this work is in designing a novel barrier system to achieve energy efficiency and reinforced surveillance in a thin-wall environment. Instead of a real environment, we use an ad hoc server for simulations with various scenarios and parameters. Then, two different algorithms are executed through those simulation environments and settings. Also, with detailed discussions, we provide the performance analysis, which shows that both algorithms deliver similar performance metrics over extended periods, indicating their suitability for long-term operation in smart infrastructure.<\/jats:p>","DOI":"10.3390\/s24020595","type":"journal-article","created":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T10:39:47Z","timestamp":1705487987000},"page":"595","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Enhancing Smart Building Surveillance Systems in Thin Walls: An Efficient Barrier Design"],"prefix":"10.3390","volume":"24","author":[{"given":"Taewoo","family":"Lee","sequence":"first","affiliation":[{"name":"Department of Embedded Systems Engineering, Incheon National University, Incheon 22012, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2361-7962","authenticated-orcid":false,"given":"Hyunbum","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Embedded Systems Engineering, Incheon National University, Incheon 22012, Republic of Korea"}]}],"member":"1968","published-online":{"date-parts":[[2024,1,17]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"8734","DOI":"10.1109\/JIOT.2022.3232091","article-title":"Efficient Multiple Green Energy Base Stations Far-Field Wireless Charging for Mobile IoT Devices","volume":"10","author":"Sha","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1535","DOI":"10.1109\/TII.2022.3209200","article-title":"Toward trustworthy and privacy-preserving federated deep learning service framework for industrial internet of things","volume":"19","author":"Bugshan","year":"2023","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1109\/MNET.011.2000521","article-title":"IoT for certified sustainability in smart buildings","volume":"35","author":"Taha","year":"2023","journal-title":"IEEE Netw."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1897","DOI":"10.1109\/JIOT.2021.3137291","article-title":"Performance optimization of serverless computing for latency-guaranteed and energy-efficient task offloading in energy-harvesting industrial IoT","volume":"10","author":"Ko","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"9989","DOI":"10.1109\/JIOT.2023.3235706","article-title":"Sensing quality-aware task allocation for multidimensional vehicular urban sensing","volume":"10","author":"Baek","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/MCE.2021.3061067","article-title":"Sema-IIoVT: Emergent semantic-based trustworthy information-centric fog system and testbed for intelligent internet of vehicles","volume":"12","author":"Zhang","year":"2023","journal-title":"IEEE Consum. Electron. Mag."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"2174","DOI":"10.1109\/TNSE.2022.3157274","article-title":"Dynamic SDN-based radio access network slicing with deep reinforcement learning for URLLC and eMBB Services","volume":"9","author":"Filali","year":"2022","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"26743","DOI":"10.1109\/ACCESS.2017.2777443","article-title":"Achievable multi-security levels for lightweight IoT-enabled devices in infrastructureless peer-aware communications","volume":"5","author":"Dao","year":"2017","journal-title":"IEEE Access"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1109\/JSAC.2022.3231861","article-title":"Intelligent reflecting surface backscatter enabled multi-tier computing for 6G internet of things","volume":"41","author":"Xu","year":"2023","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1016\/j.future.2022.11.011","article-title":"User-centric base station clustering and resource allocation for cell-edge users in 6G ultra-dense networks","volume":"141","author":"Su","year":"2023","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/MCOM.001.2100770","article-title":"Space mobile networks: Satellite as core and access networks for B5G","volume":"60","author":"Kim","year":"2022","journal-title":"IEEE Commun. Mag."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1109\/JIOT.2021.3103320","article-title":"6G Internet of Things: A comprehensive survey","volume":"9","author":"Nguyen","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1016\/j.icte.2021.11.008","article-title":"Mathematical models of the information interaction process in 5G-IoT ecosystem: Different functional scenarios","volume":"9","author":"Kovtun","year":"2023","journal-title":"ICT Express"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1304","DOI":"10.1109\/COMST.2022.3171135","article-title":"What will the future of UAV cellular communications be? A flight from 5G to 6G","volume":"24","author":"Geraci","year":"2022","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"ref_15","first-page":"877","article-title":"Resource-aware relay selection for inter-cell interference avoidance in 5G heterogeneous network for Internet of Things systems","volume":"93","author":"Dao","year":"2019","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"6100","DOI":"10.1109\/JIOT.2022.3222968","article-title":"QoS-Aware Machine Learning Task Offloading and Power Control in Internet of Drones","volume":"10","author":"Yao","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"2511","DOI":"10.1109\/TVT.2022.3213567","article-title":"MLB-IoD: Multi Layered Blockchain Assisted 6G Internet of Drones Ecosystem","volume":"72","author":"Raja","year":"2023","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"5216","DOI":"10.1109\/JIOT.2021.3110138","article-title":"Letaief, K.B. Average AoI minimization in UAV-assisted data collection with RF wireless power transfer: A deep reinforcement learning scheme","volume":"9","author":"Liu","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"5747","DOI":"10.1109\/JIOT.2022.3150794","article-title":"CRB Weighted Source Localization Method Based on Deep Neural Networks in Multi-UAV Network","volume":"10","author":"Cong","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1109\/MNET.011.2000245","article-title":"Research challenges and security threats to AI-driven 5G virtual emotion applications using autonomous vehicles, drones, and smart devices","volume":"34","author":"Kim","year":"2020","journal-title":"IEEE Netw."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.icte.2022.10.003","article-title":"Optimized UAV-based data collection from MWSNs","volume":"9","author":"Memos","year":"2023","journal-title":"ICT Express"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1016\/j.icte.2021.12.006","article-title":"Combining transformer and CNN for object detection in UAV imagery","volume":"9","author":"Hendria","year":"2023","journal-title":"ICT Express"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1161","DOI":"10.1109\/TMC.2010.78","article-title":"Maximizing the lifetime of a barrier of wireless sensors","volume":"9","author":"Kumar","year":"2010","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.jnca.2015.08.018","article-title":"A hybrid exact approach for maximizing lifetime in sensor networks with complete and partial coverage constraints","volume":"58","author":"Carrabs","year":"2015","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2014.10.007","article-title":"Improving area coverage of wireless sensor networks via controllable mobile nodes: A greedy approach","volume":"48","author":"Vecchio","year":"2015","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/dac.3955","article-title":"Optimal barrier coverage for critical area surveillance using wireless sensor networks","volume":"32","author":"Benahmed","year":"2019","journal-title":"Int. J. Commun. Syst."},{"key":"ref_27","first-page":"5802","article-title":"Fault-tolerant design of barrier coverage for periodically repairable wireless sensor networks","volume":"59","author":"Daniel","year":"2023","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"2865","DOI":"10.1109\/JSEN.2022.3227601","article-title":"A k-barrier coverage enhancing scheme based on gaps repairing in visual sensor network","volume":"23","author":"Chen","year":"2023","journal-title":"IEEE Sens. J."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"3766","DOI":"10.1109\/JSEN.2021.3140138","article-title":"Energy-efficient barrier coverage based on nodes alliance for intrusion detection in underwater sensor networks","volume":"22","author":"Chang","year":"2022","journal-title":"IEEE Sens. J."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1016\/j.comnet.2016.11.014","article-title":"Achieving location error tolerant barrier coverage for wireless sensor networks","volume":"112","author":"Wang","year":"2017","journal-title":"Comput. Netw."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1109\/LCOMM.2022.3218050","article-title":"Eco-friendly low resource security surveillance framework toward green AI digital twin","volume":"27","author":"Kim","year":"2023","journal-title":"IEEE Commun. Lett."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"4373","DOI":"10.1109\/TVT.2022.3148175","article-title":"Target-barrier coverage improvement in an insecticidal lamps internet of UAVs","volume":"71","author":"Si","year":"2022","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1172","DOI":"10.1109\/TMC.2020.3024059","article-title":"A virtual emotion detection architecture with two-way enabled delay bound toward evolutional emotion-based IoT services","volume":"21","author":"Kim","year":"2022","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"819","DOI":"10.1016\/j.jnca.2014.10.011","article-title":"Coverage hole and boundary nodes detection in wireless sensor networks","volume":"48","author":"Li","year":"2015","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_35","unstructured":"Lammich, P., and Sefidgar, S.R. (2016). Springer Lecture Notes in Computer Science (LNCS), Springer."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/2\/595\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T13:49:03Z","timestamp":1760104143000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/2\/595"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,17]]},"references-count":35,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024,1]]}},"alternative-id":["s24020595"],"URL":"https:\/\/doi.org\/10.3390\/s24020595","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2024,1,17]]}}}