Anda di halaman 1dari 8

GRD Journals | Global Research and Development Journal for Engineering | International Conference on Innovations in Engineering and Technology

(ICIET) - 2016 | July 2016

e-ISSN: 2455-5703

Tracking Coordinated and Adaptive Information


using Security from Target Wireless Sensor
Network
1P.

Ramya 2M. Satheesh Kumar 3M. Kaveri


1,3
P.G Student 2Assistant Professor
1,2,3
Department of Information Technology
1,2,3
K.L.N. College of Engineering, Pottapalayam, Sivagangai 630612, India
Abstract
Wireless sensor network (WSNs) consist of sensor node with sensing and communication capabilities. The important problem of
WSNs applications is Energy conservation. Clustered sensor network uses cluster heads (CHs) for data gathering. In Target
tracking applications, sensor nodes in multiple clusters do not uses a single target path, which leads to redundant data
transmissions from CHs to the sink so much energy is to waste. In this paper we propose coordinated and adaptive information
collecting strategy (CAICS) for Target tracking in clustered WSNs. In CAICS a coordinated node selection method considering
the spatial correlation of sensing nodes is proposed to dynamically select the best set of nodes for tracking missions. And an
adaptive aggregation node is selected for data collection to reduce the redundant data transmission and balance the energy cost.
Experimental results exhibit that the proposed approach reduces the computational complexity of node selections without
degrading tracking accuracy and achieves a significant energy consumption reduction and network lifetime extension compared
with the state-of-the-art approaches.
Keyword- Energy Conservation, WSNs, Clustered sensor network, Target tracking, Adaptive, CAICS
__________________________________________________________________________________________________

I. INTRODUCTION
WIRELESS sensor networks (WSNs) have emerged as an gorgeous technology which can consist of large number of cerebral
sensor nodes. With sensing, processing and wireless communicating capabilities.[2] In WSNs, one of important applications is
target tracking, such as vehicle tracking and migration tracking of animals. [3] The sensor nodes collectively monitor the
roaming path of moving targets in the deployed area. Since the sensor nodes are always deployed in an unattended environment,
it is very difficult to replace their battery after the deployment. As a result, energy efficiency is the most critical design issue for
WSNs. In a target tracking application, the sensor nodes which can sense the target at a particular time are kept in active mode
while the remaining nodes are to be retained in inactive mode so as to conserve energy until the target approaches them.
Clustering is an important approach to organize a closely deployed network. The clustering algorithms keep only a portion of
nodes (CHs) active and save the energy for the rest of the nodes. [1].The target will often be detected by the nodes in multiple
clusters at the same time. When all the nodes report their data to the respective CHs, each involved CH has to send the data to the
sink. This way may produce much redundant data that causes unnecessary energy consumption. The data gathering approaches
for clustered WSNs can be categorized into: DL-cluster [5] and MH-cluster [13].In DL-cluster each CH aggregates the sensed
data from its
Cluster Members (CMs) and directly transmits it to the sink, while in MH-cluster a hierarchical CHs model is built and
the data can be aggregated hop by hop through multiple intermediate CHs. These approaches are not efficient for target tracking
because of redundant data transmissions. A simple 5-cluster sensor network is taken as an example in Fig. 1. In Fig. 1(a), CH1,
CH2 and CH3 obtain the sensed data from their CMs and send them to the sink respectively. We can see that there are 3 data
flows from CHs to the sink. In Fig. 1(b), CH1 and CH3 send the aggregated data to CH2 which further aggregates the data.
Therefore, there is only one data flow from CH2 to the sink. However, when the target moves to the position shown in Fig. 1(c),
two data flows are established from CH2 and CH4 to the sink, because CH3 always transmits its data to CH2 and CH5 to CH4. If
we want to change their transmission routes dynamically according to the position of the moving target, a lot of communications
among CHs are needed. It will cause more energy cost and time delay. With these motivations, we propose a coordinated and
adaptive information collecting strategy (CAICS) for target tracking in clustered WSNs. The major objective of CAICS is to
reduce the redundant data transmission and keep a reliable object tracking with minimum energy consumption.

All rights reserved by www.grdjournals.com

171

Tracking Coordinated and Adaptive Information using Security from Target Wireless Sensor Network
(GRDJE / CONFERENCE / ICIET - 2016 / 028)

A. Novel Spatial-Correlated Node Selection


We proposed a novel coordinated node selection approach considering the spatial correlation of sensor nodes. Moreover, a joint
distance weighted information utility measurement is proposed to select the optimal set of nodes for tracking.
B. Improved the Aggregation Node (AN) Selection
to avoid the different starting point of waiting executed by each node, the time flag was added to the waiting time of the nodes
which competed for AN.
C. Parameters Selection Discussing
The waiting time for AN election is appropriately selected to reduce the delay and make the node which has the most residual
energy as AN so that the energy consumption in each node is balanced.
D. Strengthening Experimental Results
We added the comparisons of mean square errors, energy consumption ( = 3.5), and transmitting delay in different cases, to
further illustrate the effectiveness of our approach.
The rest of this paper is organized as follows: Section II reviews related works. Section III specifies proposed CAICS is
described in detail. Then, Section III presents the experimental results. Finally, we conclude the paper in Section IV.

II. RELATED WORK


In [16] they proposed a weighted distance based node selection method for bearings-only sensors. The sensor with the minimum
weighted distance is activated for tracking mission. Although weighted distance method needs less computation comparing with
entropy-based method, it chooses only one sensor each time and does not consider the spatial correlations of sensor nodes. The
data gathering techniques for WSNs vary with different network architectures. In [5] an adaptive scheme is proposed to control
the degree of data aggregation with respect to the reliability requirement. In [9] a dynamic clustering scheme is proposed for
target tracking applications. The idea is to dynamically construct a cluster around the target. The sensor nodes in the dynamic
cluster perform the tracking task. When the target moves out of the range of the cluster, the cluster is deconstructed and a new
cluster is built. However, such a dynamic cluster must be constructed before the target moves into the range.

Fig. 1: State-of-the-art data gathering approach for cluster-based WSNs (a) DL-cluster (b) and (c) ML-cluster

III. COORDINATED AND ADAPTIVE INFORMATION COLLECTING STRATEGY


In a cluster-based target tracking WSN, each Cluster Member (CM) of a cluster has the detecting and tracking states. In the
detecting state, it is in the sleep mode most of the time and wakes up for a fraction of time to process and to react to the control
messages from its CH. In the tracking state, a CM keeps active to track the target until the target is out of its sensing range. Each
involved CH performs data aggregation and transmits the aggregated data either directly (DL-cluster) or hop by hop (MLcluster) to the sink. These approaches do not work efficiently for target tracking due to the changing position of the randomly
moving target. To overcome this problem, we propose an coordinate and adaptive information collecting strategy CAICS Our
novel idea is to utilize an Aggregation Node (AN) for data gathering. The AN is selected from the nodes in the tracking state that
are all close to the target. As the target moves, the AN will be adaptively re-selected. Therefore, the position of the AN is
dynamically changing and is always close to the target. Hence, the proposed approach consists of 1) coordinated tracking nodes
selection 2) adaptive AN (re-)selection and 3) data aggregation and transmission.

All rights reserved by www.grdjournals.com

172

Tracking Coordinated and Adaptive Information using Security from Target Wireless Sensor Network
(GRDJE / CONFERENCE / ICIET - 2016 / 028)

A. Coordinated Tracking Nodes Selection


Dynamically choose the best set of sensor nodes for tracking task can reduce the network energy consumption and improve
tracking accuracy. Generally, CHs should select their members which can bring more information among the candidate nodes in
the sensing area. For information utility measure, the entropy is used in the entropy-based method. The information utility of
node Ni is calculated by,

where Dx_ and Dy_ are deviations along axes X_ and Y _, respectively, and r is the correlation coefficient. Then a new
coordinate system, whose origin is at (x_, y_) and axes are along the direction of the eigenvectors Cov_, is established [16]. In
the new coordinate system, the predicted belief is represented by zero-mean Gaussian density function with covariance,

where 2x and 2y are the largest and smallest eigenvalue of Cov_, respectively. Then, the state uncertainty of the
target can be represented by an ellipse whose major axis and minor axis are 32 x and 32 y [16], respectively, as Fig. 2 shows.
Assuming the measurement error _i is known, and the location (xi , yi ) of node Ni can be denoted by the polar coordinates (i ,
Ri ). Then, the information utility in weighted distance method is defined as Utility(Ni ) = Areaabcd. And we proposed a joint
distance weightedinformation utility measurement to effectively select nodes for tracking mission. It can be represented as
follow,

Where C_AreaNi is the certainty area enclosed by the sight lines of node Ni and the ellipse. C_AreaNi C_AreaNj is
the overlapped area of the certainty area of node Ni and Nj . The smaller the area C_AreaNi C_AreaNj is, the more certainty
by using the nodes information there will be. In order to obtain the joint distance weighted information utility, we just need to
calculate the equation of the sight lines of the sensor node and calculate the certainty area. In this work, each CM has detecting
and tracking states. In the detecting state, it is in the sleep mode most of the time and wakes up for a fraction of time to react to
the control messages from its CH. In the tracking state, a CM keeps active to track the target until the target is out of its sensing
range and the node that has the largest joint information utility is chosen as tracking node. The procedure is continued until
enough tracking nodes are selected.
B. Selection of Aggregation Node
When a target is detected, the sensor nodes around it will be woken up by their CHs and get into the tracking state. All sensor
nodes in the tracking state form a tracking node set D={N 1D,N2D,N3D..NmD}where m is the number of nodes in the tracking
state. Since all nodes in D are in a vicinity area, they can directly communicate with each other. Therefore, AN can be elected by
the internal negotiation of the nodes in D without the participation of any CHs. To achieve load balance the node that has the
most residual energy and consumes the least energy for communication with its CH as well as the other nodes in D is selected as
AN. The pseudo code of the AN selection is shown in Algorithm 1. For each ND i , the residual energy Ei res and
communication cost Eic are converted to a waiting time ti (line 3). More residual energy and less communication cost lead to a
shorter ti. Therefore, the node with the most Ei res and least Eic waits for the shortest time in D. This node first finishes waiting
and is elected as the AN (line 8). It then broadcasts a message finish election to the other nodes that are still waiting (line 9).
These nodes stop waiting and give up the AN election as soon as they receive the message, and send their sensed data to the AN
(line 5 and 6). ti is calculated by the following equation:

All rights reserved by www.grdjournals.com

173

Tracking Coordinated and Adaptive Information using Security from Target Wireless Sensor Network
(GRDJE / CONFERENCE / ICIET - 2016 / 028)

where tmax a design parameter, used to control the waiting time in a reasonable range (0 <ti <tmax). Ei ini is the initial
energy of node ND i .Two nodes might have the same residual energy and communication cost and therefore have the same ti.
To avoid this, a random time tran is added. tran is an order of magnitude smaller than tmax, so that it will not have a large impact
on the value of ti. The AN is dynamically selected according to the changing position of the target. It is assumed that the AN can
obtain the distance to the target (line 17 in Algorithm 1), using some technique, for example, distance measurement by means of
the strength of the detecting signal. If the distance between the AN and the target is larger than a defined threshold dth, the AN
will broadcast a message reselect AN to the other nodes to start the next round of AN election (line 21). In the whole process,
all tracking nodes in D are kept under the control of respective CHs. When they finish the tracking task, their CHs will get them
back to the detecting state.
C. Data Aggregation and Transmission
After AN is selected, it will periodically broadcast the flag message gather_data to the other nodes in D to request sensed data.
When the nodes receive this message, they will wait for a random time before reporting their sensed data toCthe AN, in order to
avoid data collision. Although this random waiting time reduces the possibility of collision, it cannot totally eliminate it. This is
mainly due to the transmission delay of the data packets. An underlying carrier-sense MAC protocol is still needed to mitigate
collision at the MAC level [9]. The sensed data in local area have strong correlations and therefore can be effectively aggregated
by AN.

Fig. 2: Data Collection in CAICS

All rights reserved by www.grdjournals.com

174

Tracking Coordinated and Adaptive Information using Security from Target Wireless Sensor Network
(GRDJE / CONFERENCE / ICIET - 2016 / 028)

In addition, CAICS utilizes local communications with low cost to accelerate data aggregations and to reduce the
number of data packets transmitted over long distances.
Fig. 2 illustrates CAICS using the same example as in Fig. 1. Nd is selected as the AN of the tracking node set D = {Na,
Nb, Nc, Nd }. Then, Na , Nb and Nc send their sensed data to Nd instead of their own CHs. Nd aggregates the received data as
well as its own data into one packet and sends it to CH2. Then, CH2 forwards the aggregated data to the sink. In this example,
there is only one long-distance transmission (from CH2 to the sink). Comparing this example with the aforementioned approach,
it is seen that the nearer to the source node the sensed data can be aggregated, the less long-distance transmission is needed to
transmit to the sink so that both the transmission cost and data collision can be significantly reduced in our approach.
D. Communication among Sensor Node

IV. EXPERIMENTAL EVALUATION


In the experiments, we demonstrate the energy efficiency of CAICS by comparing to the state-of-the-art approaches, DL cluster
and MH cluster, by means of simulations carried out on NS 2.34. The performance metrics include the network load (the number
of packets transmitted), the energy consumption for data transmission and the network lifetime.
A. Simulation Setup
Table I shows the simulation parameters. Although the number of sensor nodes and the number of clusters are fixed, the
distribution of sensor nodes varies for each simulation run and each result is averaged over five runs. The selection of the cluster
head is periodically performed. The target moves randomly in the field. The AN is reselected when the target moves out of its
sensing range, so the threshold of the distance between the AN and the target is set to dth = 12m, the same as the sensing range.
The listening power consumption is set to 12.5 mw, while the power consumption in the sleep mode is ignored. The location of
the sink can also affect the network performance, so we simulated two scenarios: (1) Scenario 1 (s1): The sink is located at the
edge of the field and its coordinate is (0,0); (2) Scenario 2 (s2): The sink is located in the center of the field and its coordinate is
(225, 225). In order to examine the scalability of CAICS and study the impact of the velocity of the target, we also simulate
different network sizes and different velocities of the target.
B. Simulation Results
Fig. 3 shows the total number of transmitted data packets after 300s simulation time. Using DL-cluster, since all CHs directly
transmit the data to the sink, the number of transmitted data packets is not affected by the location of the sink. Therefore, DLcluster has the same number of transmitted data packets for both scenarios. Whereas, using MH-cluster, each CH transmits data
hop by hop to the sink. The larger distance between the data source and the sink, the more hops are needed, leading to more data
packets transmitted between CHs. Therefore, the number of data packets transmitted in scenario 1 is larger than that in scenario
2. Due to the hop-by-hop data transmission between CHs, MH-cluster transmits more data packets than DL-cluster. As shown,
CAICS can significantly reduce the network load in both scenarios, compared to DL-cluster and MH-cluster, because, using
CAICS, all the sensed data can be completely aggregated on a single AN.
Fig. 4,5 shows the average energy consumption of each sensor node versus simulation time. As shown, all three
approaches consume more energy in scenario 1 because the sink is located at the edge of the field so that many data packets are
transmitted over long distances. Compared to DL-cluster, CAICS achieves 43.7% energy saving for scenario 1 and 44.6% for
scenario 2 after 2000s simulation time. Although MH-cluster provides a mechanism for data aggregation, the most data are
aggregated after multiple hops of transmission. In contrast, in our CAICS, all data can be aggregated on the AN before being
delivered to the sink. Therefore, CAICS achives 20.5% energy saving for both scenarios compared to MH-cluster.

All rights reserved by www.grdjournals.com

175

Tracking Coordinated and Adaptive Information using Security from Target Wireless Sensor Network
(GRDJE / CONFERENCE / ICIET - 2016 / 028)

The energy saving is highly related to the number clusters involved in the tracking. If the target is detected by sensor
nodes in n clusters, using CAICS there is always one data flow from the AN to the sink, while using DL-cluster and MH-cluster,
in the worst case, there might be n data flows from the cluster heads to the sink. In the simulation, we traced the value of n. Fig. 6

Table 1: Simulation Parameters

Fig. 3: Number of packet transmitted

Illustrates the distribution of the value n in the whole tracking process. As shown, in most cases (_ 93%) the target is
detected by sensor nodes in more than one cluster. CAICS can significantly prolong the network lifetime in all cases. For
example, if the lifetime is defined as the time when 10% of nodes die, CAICS achieves lifetime extensions by 857.6% and 85.8%
compared to DL-cluster and MH-cluster, respectively, for scenario 1. Similar lifetime extensions are achieved for the other cases.
The main reasons for the large lifetime extension are twofold: 1) CAICS avoids redundant long-distance transmissions and saves
energy, as shown in Fig. 5; 2) The energy consumption is better balanced because the node with the highest residual energy and
the lowest communication cost is selected as AN. We further investigated the average data transmission delay, which is defined
as the time between the moment a source transmits a packet and the moment the sink receives the packet, averaged over all
source-sink pairs in the two scenarios. The results after 3000s simulation time are shown in Table II. We can see that CAICS has
the lowest data transmission delay because the AN can send the data to its CH without waiting for the time slot. The delay of
waiting for the time slots in DL-cluster and MH-cluster is larger than the delay of AN selection in CAICS. DL-cluster has longer
data aggregation delay than CAICS but shorter transmission delay because of its end-to-end transmission. Therefore, the overall
data transmission delay of DL-cluster and CAICS are close. Now, we can conclude that CAICS can reduce the energy
consumption and extend the lifetime of the cluster based WSNs for target tracking, without sacrificing the system performance.
We also examined the impact of the moving speed of the target, while fixing the sink at (0, 0).

All rights reserved by www.grdjournals.com

176

Tracking Coordinated and Adaptive Information using Security from Target Wireless Sensor Network
(GRDJE / CONFERENCE / ICIET - 2016 / 028)

Fig. 4:

Fig. 5:

Table 2: Transmission Delay

V. CONCLUSION
This paper proposed a novel coordinated and adaptive information collecting strategy (CAICS) for target tracking WSNs. In
CAICS, a coordinated spatial-correlated node selection algorithm is proposed. It uses a joint distance weighted measurement to
estimate the information utility of sensing nodes. Moreover, the AN is dynamically selected to gather and aggregate the sensed
data. Simulation results proved that the coordinated node selection approach outperformed the existing approaches by reducing
computational complexity and guaranteeing the tracking accuracy and achieved a significant energy consumption reduction and
network lifetime extension. Future work will explore and extend the coordinated and adaptive information collecting strategy to
other application domains.

All rights reserved by www.grdjournals.com

177

Tracking Coordinated and Adaptive Information using Security from Target Wireless Sensor Network
(GRDJE / CONFERENCE / ICIET - 2016 / 028)

REFERENCES
[1] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan,Energy efficient communication protocol for wireless micro
sensor networks, in Proc. 33rd Annu. Hawaii Int. Conf. Syst. Sci.(HICSS),Jan. 2000, pp. 110.
[2] A. A. Abbasia and M.Younis, A survey on clustering algorithmsfor wireless sensor networks, Comput. Commun., vol.
30, nos. 1415,pp. 28262841, Oct. 2007.
[3] H. Gao, H. Li, and Y. Cheng, A hybrid relative distance based cluster scheme for energy efficiency in wireless sensor
networks, in Proc. IEEE GLOBECOM, Miami, FL, USA, Dec. 2010, pp. 15.
[4] R. Rajagopalan and P. K. Varshney, Data-aggregation techniques in sensor networks: A survey, IEEE Commun. Surveys
Tuts., vol. 8, no. 4, pp. 4863, Oct./Dec. 2006.
[5] H. Chen, H. Mineno, and T. Mizuno, Adaptive data aggregation scheme in clustered wireless sensor networks, Comput.
Commun., vol. 31, no. 15, pp. 35793585, Sep. 2008.
[6] Liu and G. Cao, Distributed monitoring and aggregation in wireless sensor networks, in Proc. IEEE INFOCOM, Mar.
2010, pp. 19.
[7] W. Lou, An efficient N-to-1 multipath routing protocol in wireless sensor networks, in Proc. IEEE Int. Conf. MASS,
Washington, DC, USA, Nov. 2005, pp. 665672.
[8] K. Dasgupta, K. Kalpakis, and P. Namjoshi, An efficient clusteringbased heuristic for data gathering and aggregation in
sensor networks, in Proc. IEEE Wireless Commun. Netw. Conf. (WCNC), Mar. 2003, pp. 468474.
[9] W.-P. Chen, J. C. Hou, and L. Sha, Dynamic clustering for acoustic target tracking in wireless sensor networks, IEEE
Trans. Mobile Comput., vol. 3, no. 3, pp. 258271, Jul./Aug. 2004.
[10] G.-Y. Jin, X.-Y. Lu, and M.-S. Park, Dynamic clustering for object tracking in wireless sensor networks, in Ubiquitous
Computing Systems (Lecture Notes in Computer Science), vol. 4239. Berlin, Germany: Springer-Verlag, 2006, pp. 200
209.
[11] Q. Mamun, S. Ramakrishnan, and B.Srinivasan, Selecting member nodes in a chain oriented WSN, in Proc. IEEE
Wireless Commun. Netw. Conf. (WCNC), Apr. 2010, pp. 16.
[12] N. Shrivastava, R. Mudumbai, U. Madhow, and S. Suri, Target tracking with binary proximity sensors: Fundamental limits,
minimal descriptions, and algorithms, in Proc. 4th Int. Conf. SenSys, 2006, pp. 251264.
[13] X. Wang, J.-J. Ma, S. Wang, and D.-W. Bi, Cluster-based dynamic energy management for collaborative target tracking in
wireless sensor networks, Sensors, vol. 7, no. 7, pp. 11931215, 2007.
[14] (2011). OMNeT++ Network Simulator. [Online]. Available: http://www.omnetpp.org/
[15] H. Wang, G. Pottie, K. Yao, and D. Estrin, Entropy-based sensor selection heuristic for target localization, in Proc. 3rd
Int. Symp. IPSN, Berkeley, CA, USA, Apr. 2004, pp. 3645.
[16] W. Zhao, Y. Han, H. Wu, and D. Zhang, Weighted distance based sensor selection for target tracking in wireless sensor
networks, IEEE Signal Process. Lett., vol. 16, no. 8, pp. 647650, Aug. 2009.
[17] J. Qian, X. Jin, and Y. Zhang, Energy-efficient node selection for acoustic source localization in wireless sensor network,
in Proc. 6th Int. Conf. Wireless Commun. Netw. Mobile Comput. (WiCOM), Sep. 2010, pp. 14.

All rights reserved by www.grdjournals.com

178

Anda mungkin juga menyukai