DOI QR코드

DOI QR Code

A Single Mobile Target Tracking in Voronoi-based Clustered Wireless Sensor Network

  • Chen, Jiehui (Graduate School of Global Information and Telecommunication Studies (GITS), Waseda University) ;
  • Salim, Mariam B. (Graduate School of Global Information and Telecommunication Studies (GITS), Waseda University) ;
  • Matsumoto, Mitsuji (Graduate School of Global Information and Telecommunication Studies (GITS), Waseda University)
  • Received : 2010.09.20
  • Accepted : 2010.11.23
  • Published : 2011.03.31

Abstract

Despite the fact that the deployment of sensor networks and target tracking could both be managed by taking full advantage of Voronoi diagrams, very little few have been made in this regard. In this paper, we designed an optimized barrier coverage and an energy-efficient clustering algorithm for forming Vonoroi-based Wireless Sensor Networks(WSN) in which we proposed a mobile target tracking scheme (CTT&MAV) that takes full advantage of Voronoi-diagram boundary to improve detectability. Simulations verified that CTT&MAV outperforms random walk, random waypoint, random direction and Gauss-Markov in terms of both the average hop distance that the mobile target moved before being detected and lower sensor death rate. Moreover, we demonstrate that our results are robust as realistic sensing models and also validate our observations through extensive simulations.

Keywords

References

  1. Cardei, M.. and Wu, J. “Coverage in wireless sensor networks”, handbook of sensor networks: Compact Wireless and Wired Sensing Systems. CRC Press LLC. July, 2004.
  2. Meguerdichian, S., Koushanfar, F., Potkonjak, M., & Srivastava, M. “Worst and best-case coverage in sensor networks”, proceeding of IEEE Transactions on Mobile Computing, 4(1), 84-92. doi:10.1109/TMC.2005.15.
  3. D. J. Baker and A. Ephremides, “The Architectural Organization of a Mobile Radio Network via a Distributed Algorithm”, IEEE Transactions on Communications, Vol.29, No.11, November, 1981, pp.1694-1701. https://doi.org/10.1109/TCOM.1981.1094909
  4. A.D. Amis, R. Prakash, T.H.P. Vuong and D. T. Huynh, “ Max-Min D-Cluster Formation in Wireless Ad Hoc Networks”, in Proceedings of IEEE INFOCOM, March, 2000. https://doi.org/10.1109/INFCOM.2000.832171
  5. A. Ephremides, J.E. W. and D.J.B., “A Design concept for Reliable Mobile Radio Networks with Frequency Hopping Signaling”, Proceeding of IEEE, Vol.75, 1987, pp.56-73. https://doi.org/10.1109/PROC.1987.13705
  6. W.R. Heinzelman, A.C. and H. Balakrishnan, “Energy-Efficient Communication Protocol for Wireless Microsensor Networks”, in Proceedings of IEEE HICSS, January, 2000. https://doi.org/10.1109/HICSS.2000.926982
  7. J. Janssen, M. Ditzel, C. Lageweg, Arne Theil, “Multi-target Data Aggregation and Tracking in Wireless Sensor Networks” in proceeding of journal of networks, Vol.3, No.1, January, 2008.
  8. T. He, P. Vicaire, T. Yan, L. Luo, L. Gu, G. Zhou, R. Stoleru, Q. Cao, J.Stankovic, and T. Abdelzaher, “Achieving real-time target tracking using wireless sensor networks,” Proc. IEEE Real-Time and Embedded Technology and Applications Symposium, 2006.
  9. S. G. Foss and S. A. Zuyev, “On a Voronoi Aggregative Process Related to a Bivariate Poisson Process”, Advances in Applied Probability, Vol.28, No.4, 1996, pp.965-981. https://doi.org/10.2307/1428159
  10. T. Camp, J. Boleng, and V. Davies, A Survey of Mobility Models for Ad Hoc Network Research, in Wireless Communication and Mobile Computing (WCMC): Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications, Vol.2, No.5, 2002, pp.483-502.
  11. B. Liang, Z. J. Haas, Predictive Distance-Based Mobility Management for PCS Networks, in Proceedings of IEEE information Communications Conference (INFOCOM 1999), April, 1999. https://doi.org/10.1109/INFCOM.1999.752157
  12. L. Lima, J. Barros, ”Random Walks on Sensor Networks,” the 5th International Symposium on Modeling and optimization in Mobile, Ad hoc, and Wireless Networks (WiOpt 2007), Limassol, Cyprus, April, 2007.
  13. C. Bettstetter, G. Resta, and P. Santi, ”The Node Distribution of the Random Waypoint Mobility Model for Wireless Ad Hoc Networks”, IEEE Transactions on Mobile Computing, Vol.2, No.3, July-Sept, 2003, pp.257-269. https://doi.org/10.1109/TMC.2003.1233531

Cited by

  1. Multiple 3D object position estimation and tracking using double filtering on multi-core processor vol.63, pp.1, 2013, https://doi.org/10.1007/s11042-012-1029-9
  2. Building a Smooth Medical Service for Operating Room Using RFID Technologies vol.2014, 2014, https://doi.org/10.1155/2014/984721
  3. A low-latency communication protocol for target tracking in wireless sensor networks vol.2016, pp.1, 2016, https://doi.org/10.1186/s13638-016-0517-4
  4. Conditions for target tracking with range-only information vol.75, 2016, https://doi.org/10.1016/j.robot.2015.10.003
  5. On the security and improvement of a two-factor user authentication scheme in wireless sensor networks vol.17, pp.5, 2013, https://doi.org/10.1007/s00779-012-0540-3
  6. Optimal Mobile Sensor Scheduling for a Guaranteed Coverage Ratio in Hybrid Wireless Sensor Networks vol.9, pp.4, 2013, https://doi.org/10.1155/2013/740841
  7. Efficient security mechanism to counter the malicious attack in wireless sensor networks vol.2, pp.1, 2014, https://doi.org/10.1007/s40012-014-0042-8
  8. An energy-efficient self-deployment with the centroid-directed virtual force in mobile sensor networks vol.88, pp.10, 2012, https://doi.org/10.1177/0037549711411314
  9. User authentication schemes for wireless sensor networks: A review vol.27, 2015, https://doi.org/10.1016/j.adhoc.2014.11.018
  10. Security Analysis of Scalable Block Cipher PP-1 Applicable to Distributed Sensor Networks vol.9, pp.9, 2013, https://doi.org/10.1155/2013/169638
  11. Data Aggregation and Transmission Mechanism for Energy Adaptive Node in Wireless Sensor Networks vol.36, pp.11A, 2011, https://doi.org/10.7840/KICS.2011.36A.11.903
  12. Lifetime maximization considering target coverage and connectivity in directional image/video sensor networks vol.65, pp.1, 2013, https://doi.org/10.1007/s11227-011-0646-9
  13. A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps vol.63, 2016, https://doi.org/10.1016/j.future.2016.04.016
  14. A Routing Algorithm Based on Dynamic Forecast of Vehicle Speed and Position in VANET vol.9, pp.6, 2013, https://doi.org/10.1155/2013/390795
  15. Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines pp.1868-5145, 2018, https://doi.org/10.1007/s12652-018-0712-8