I. I NTRODUCTION
IRELESS sensor networks (WSNs) have attracted the
attention of researchers for solving problems involving
health monitoring, habitat monitoring, environmental monitoring, and battlefield surveillance [1], [2]. Eventually, the utility
of a given monitoring or tracking application is grossly reliant
on the ability of detecting any target in a given area of interest.
Again, the detection and tracking of a target in WSN-based
applications are strongly dependent on the correct estimation
of mobility model of a target.
Anomalies, which adversely affect the functionality of a
WSN, can occur. A WSN is supposed to cover 100% of the
area of interest by densely deployed nodes. In practice, however, a WSN may have coverage holes due to many factors
such as obstructions, deployment strategy, environmental factors, wear and tear, and mobilityprominently prevalent being
Manuscript received February 10, 2015; revised April 30, 2015; accepted
June 18, 2015. This paper was recommended by Associate Editor J. Wang.
The authors are with the School of Information Technology,
Indian Institute of Technology Kharagpur, Kharagpur 721302, India
(e-mail:
smisra@sit.iitkgp.ernet.in;
sukhchain.singh@sit.iitkgp.ernet.in;
manas.khatua@sit.iitkgp.ernet.in).
Color versions of one or more of the figures in this paper are available
online at http://ieeexplore.ieee.org.
Digital Object Identifier 10.1109/TCYB.2015.2450836
node failures due to resource constraints. The notion of coverage hole in WSNs can be considered as the lack of actual
measure of the quality of service (QoS). The reasons behind
the coverage hole include sensor gap, sensor failure, target
disabled, and network failure. This paper considers blanket
coverage which provides maximum detection rate of targets
appearing in a sensing field [3].
In real-life applications, the mobility models of external
target nodes or entities are unknown. Again, the mobility
model that the target follows may vary with time. So, the
need for a method of predicting or estimating the mobility
model for future resource allocation is evident. We note that
the words mobility pattern and mobility model are used
interchangeably throughout the manuscript.
A. Motivation
Many prior works (see [4][11]) exist on mobility model
estimation in different networks. However, none of the existing works attempted to estimate the mobility model of a target
inside the coverage hole. At this juncture, it is pertinent to
differentiate between the problems of mobility model estimation in presence of coverage holes and inside a coverage hole.
While the former estimates the mobility model from a set
of sensed information with few incomplete information due
to coverage hole, the latter tries to estimate the model for a
region for what no information is present. Therefore, in the latter case, at first we have to virtually create the information for
that region followed by the model estimation. Additionally,
the existing works implicitly considered that a target does
not change its mobility pattern inside the tracking region.
However, in reality, a target may change its mobility pattern
for decreasing the probability of detection by the monitoring nodes. It is true especially in military surveillance. If a
target changes its mobility pattern, the existing works in the
literature become limitedly useful in predicting the mobility
model accurately. The applicability of mobility model prediction inside a coverage hole could be the use in battlefield
surveillance, building a repository of movements of a target,
and future resource allocation in the presence of missing links
due to the existence of coverage holes. Being motivated from
the shortcomings of the existing pieces of literature related to
target tracking and mobility prediction, we define the objectives of this paper in two folds. First, we want to estimate the
mobility model inside a coverage hole, given that the target
was tracked in the covered zones before and after the coverage hole. Second, we want to find probabilistic estimation
c 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
2168-2267
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
2
on transitions from one mobility model to another, if the target changes its mobility model inside the hole, and, thus, the
sensed data indicates two different mobility models of the
same target in the covered zones.
B. Contribution
Oommen and Rueda [12] established that the stochastic learning weak estimation (SLWE) mechanism is potent
in estimating a parameter, with nonstationary distribution,
from its observations. In this paper, there exists a possibility of changing the mobility pattern with time by a target.
Therefore, the parameterprobability of convergence to a
mobility patternwhich is intended to be estimated in this
paper changes with time. Hence, we use the SLWE for estimating the mobility model of a target inside the coverage
hole. Further, the samples required for such estimation are not
present in case of coverage hole. For such cases, we use trajectory extrapolation and fusion techniques for extracting the
target trajectory in a coverage hole. Finally, the proposed estimation method infers the possible transitions, if any, among
the mobility models in consideration.
In this paper, we consider one random synthetic mobility model (viz. GaussMarkov mobility (GM) [13]), two
simulator-based mobility models (viz. Manhattan (MM) [14],
Pathway (PMM) [15]), and two group mobility models (viz. Pursue [16], and reference point group mobility (RPGM) [17]) for establishing the prototype solution.
A preliminary discussion of the above mobility models is
presented in Appendix A, which is available in the online
supplemental material. There exists many other mobility
models to classify, which are summarized in [18] and [19].
Broadly, we can categorize them into two classes
homogeneous and heterogeneous. The RPGM and Pursue
mobility models exhibit group mobility and represent the former, while GM, MM, and PMM represent the latter. Moreover,
RPGM and Pursue models are partially random, while GM is
a fully random model. The MM and PMM are also geographic
models wherein they constrain the mobility as per a city or a
campus map. An effort was made to represent as many subclasses of mobility models as possible using less number of
models. However, we have plan to extend this paper in the
future by considering other classes of mobility models.
We employ an SLWE-based classifier in the this paper.
Since the classifier has to discriminate each mobility model,
a set of mobility features help the classifier in the process.
The mobility features are extracted from the trace file. The
proposed scheme uses five essential mobility metrics, as mentioned by Mousavi [20], to affect the classification. In sum,
the contributions of the this paper are as follows.
1) We propose a method for generating target mobility traces inside a coverage hole using the trajectory
extrapolation and fusion techniques.
2) Using the SLWE, we propose a prediction scheme
namely mobility prediction inside a coverage hole
(MIRACLE) in WSNs.
3) We propose a scheme for estimating the expected mobility model transition for all possible combinations among
the five mobility models under consideration.
C. Paper Organization
The remainder of this paper is organized as follows. In
Section II, we review some related works from the literature.
We describe the formal model of MIRACLE in Section III.
In Section IV, we provide the implementation details of
MIRACLE. We report the simulation and experimental results
in Section V. Finally, we conclude this paper in Section VI,
with insight about how this paper can be extended in the future.
II. R ELATED W ORKS
Comprehensive surveys on existing mobility models are
available in [21]. Mobility model estimation was attempted by
a number of researchers in the literature. Jamalian et al. [22]
proposed a fixed structure stochastic automata-based mobility model estimation scheme of a node in mobile ad-hoc
networks (MANETs). The authors considered four mobility
models, and employed two metrics, degree of spatial dependence (DSD) and relative speed (RS), for classifying those
four models. In [4], continuous action-set learning automata
was used for mobility prediction in wireless networks (WNs).
Mousavi et al. [23] proposed a supervised learning-based classification method that is capable of classifying mobility traces,
by analyzing three mobility metrics: 1) RS; 2) DSD; and
3) degree of temporal dependence (DTD).
In cellular networks, mobility prediction has been studied
extensively for single-hop topology such as [7][9], but not
much work exists for multihop topology [4]. The networks
need mobility prediction to study hand-offs or predict a users
future location. Wanalertlak et al. [11] improved the mobilityprediction accuracy by considering multiparametric model.
However, computational efficiency of the proposed method
is very taxing. Markov chain has also been used for mobility prediction. For example, Abu-Ghazaleh and Alfa [5] used
Markov renewal process for future location prediction in WNs.
The main problem of Markov chain-based schemes is that the
schemes are not suitable for infrastructure-less networks [5]
such as WSNs. Venkateswaran et al. [8] proposed a mobility prediction-based energy optimal relay-node deployment
scheme in MANET. Zhou et al. [7] proposed a localization scheme for underwater sensor networks using a mobility
prediction scheme. Kaaniche and Kamoun [10] proposed a
back-propagation feed-forward multilayer neural network to
predict the future location of a mobile user. A model-based
tracking algorithm was proposed in [24]. Xu et al. [25] showed
that target tracking accuracy is improved by jointly prediction
of locations of mobile sensor and target in WSNs.
Recently, Gaussian process (GP) approaches have been studied for modeling target motion patterns [26]. For example,
Ferguson et al. [26] proposed a novel change-point detection
and clustering algorithm for long-term trajectory prediction
of autonomous vehicles. Gu [27] proposed a game theoretic
approach for target tracking, whereas Misra and Singh [28]
used Markov decision process for the same in WSNs.
Hu et al. [29] improve the lifespan of WSN by employing
Kalman filter-based target tracking algorithm. A review of
many energy efficient target tracking algorithms was studied in [30]. The effect of topology on target tracking was
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
MISRA et al.: MIRACLE USING STOCHASTIC LEARNING WEAK ESTIMATOR
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
T n = {Pn (x0 , y0 ), Pn (x1 , y1 ), . . . , Pn (xt , yt )}, where the observations are taken over t time instants, and Pn (xt , yt ) is the
sensed coordinate at time t.
We need a virtual transition trajectory T 2 followed by the
mobility model M2 for a target moving through Z2 . We call
the trajectory virtual because of synthetic generation of it
using the trajectory extrapolation. The only inputs we have
are T 1 and T 3 . The final goal can be summed up as a function
of trajectory operations (.) on a set of trajectories followed
by the function of mobility estimation (.).
B. Components of MIRACLE
The overall solution for the problem at hand is illustrated in
Algorithm 1. We formalize the basic components to estimate
mobility model in a coverage hole as follows.
1) Trace Files: We generate trace files for the five mobility
modelsGM, MM, PMM, Pursue, and RPGM, which
are considered for estimation in this paper, as mentioned
in Section I-B. The sources of trace files are obtained
through simulations executed in NS-2 [45].
2) Training of Classifier: All the known trace files of
covered zones are used for training the classifier.
3) Trajectory Extrapolation: The traced coordinates are
extrapolated to Z2 from Z1 and Z3 , respectively, using
simulation-based extrapolation to generate the virtual
trajectories.
4) Trajectory Fusion: It is a two-fold process, wherein
an extrapolated trajectory is truncated approximately
around the mid-range, and then, spliced with the other
zones extrapolated trajectory.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
4
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
MISRA et al.: MIRACLE USING STOCHASTIC LEARNING WEAK ESTIMATOR
Fig. 1. Trajectory fusion: cases I, II, and III. (a) Case-I: there is only one intersection point between the extrapolated trajectories, as shown in the left
sub-figure, and the corresponding fused trajectory is shown in the right sub-figure. (b) Case-II: there are multiple intersection points between the extrapolated
trajectories, as shown in the left sub-figure, and the corresponding fused trajectory is shown in the right sub-figure. (c) Case-III: there is no intersection
point between the extrapolated trajectories, as shown in the left sub-figure, and the CutTrajectory operations are shown in the middle sub-figure, and the
corresponding fused trajectory is shown in the right sub-figure.
4
5
6
7
8
10
11
12
13
14
2
3
4
7
8
9
10
11
12
13
14
mk then
update probabilities of action set using
SLWE (Equation 3)
Return optimal action := arg max{q1 , . . . , qr }
mk
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
6
+ + minPass 2r
2
= (5r + 14.5 + minPass 2r).
(5)
Time = 5r + 10 + 2 + +
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
MISRA et al.: MIRACLE USING STOCHASTIC LEARNING WEAK ESTIMATOR
5
1
k
k 2
dj (t) dj
5
(6)
TABLE I
S IMULATION PARAMETERS
(8)
(9)
For the other case, i.e., if ek (t) > max , we have Var[djk (t)] =
2 . We can, therefore, say that d k (t) is a symminPassk2 +max
j
metrically distributed random variable with respect to its mean
equal to kj , k = 1, 2, . . . , r, j = 1, 2, . . . , 5. This concludes
the proof. The methodology adopted in this proof follows [50].
The basic difference of MIRACLE with [50] is that the proposed scheme estimates the mobility patterns inside a coverage
hole, whereas the scheme in [50] addressed the QoS routing
issue in asynchronous transfer mode networks. However, both
works use stochastic estimation learning automata [39], which
has significant influence on the proof of this lemma.
The above result has the following implications.
1) When the feature set is within 1 limit, individual
degrees constituting the set have all their values calculated so far are symmetrically distributed with respect
to the mean at convergence.
2) The value of mean of a given degree within 1 limit
can be taken as converged value of the degree.
j=1
where, = N(0, 2 djk (t) ). We can, therefore, state that djk (t)
is a sum of symmetric random variables, since djik (t), i =
1, 2, . . . , minPass, are symmetrically distributed with mean kj
and variance (jk )2 . is also a symmetric random variable.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
8
TABLE II
C ONVERGED D EGREES FOR E ACH M ETRIC ( IN N ORMALIZED F ORM )
(a)
(a)
(b)
(c)
(d)
(b)
Fig. 2. Effects of learning rate () on the (a) probability and (b) number of
iterations required to achieve convergence.
the algorithm to be executed at least minPass number of iterations, which equals 5, according to other parameter settings
provided in this section. Before indulging into the details of
simulation results, we discuss about the cross-validation (CV)
technique used for validating the results.
CV is a statistical tool of evaluating and comparing learning algorithms by arranging data into two parts: 1) one is used
to train a model and 2) the other is used to validate it. The
basic form of CV is k-fold CV. This paper aims to validate the
performance (estimation accuracy) of SLWE-based estimator
by taking into consideration the available trace files of covered zones, and the possibility of mobility model transitions
inside the uncovered zone. In other words, we would estimate
the Mj of uncovered zone j for Mi Mj Mk transitions
among the mobility models inside the zones Zi , Zj , and Zk ,
respectively. In the model estimation, we consider two cases.
First, the estimated models for the covered zones are same,
i.e., Mi = Mk . Second, the estimated models for the covered
zones are different, i.e., Mi = Mk .
A. Experiment 1: Mobility Model Estimation
We know that the learning rate () controls the rate of convergence in SLWE-based schemes. Therefore, we performed
the mobility model estimation experiment under the varying
values of learning rate to understand its impact on the process
of estimation. In this experiment, we ensured that the target
follows the same mobility model inside the covered zones, that
is, M1 = M3 . In the next experiment, we would estimate the
model while the target changes its model inside the uncovered
zone.
1) Probability of Convergence: We measured the probability of convergence, and the received results for all the mobility
models are plotted in Fig. 2(a). We clarify that the convergence
probability is a saturated value of probability of a mobility
model under consideration, which is frozen at a point where
(e)
Fig. 3. CV results on the convergence of all mobility models. (a) GM mobility
model. (b) MM mobility model. (c) PMM mobility model. (d) RPGM mobility
model. (e) Pursue mobility model.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
MISRA et al.: MIRACLE USING STOCHASTIC LEARNING WEAK ESTIMATOR
(a)
(b)
(c)
(d)
(g)
(h)
(i)
(e)
Fig. 4. Results of trajectory operations in Z2 for different combinations of mobility model transitions inside the zone. (a) PMM to MM. (b) PMM to GM.
(c) MM to PMM. (d) MM to Pursue. (e) Pursue to PMM. (f) Pursue to RPGM. (g) GM to Pursue. (h) GM to RPGM. (i) RPGM to PMM.
(j) RPGM to Pursue.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
10
(a)
(b)
(a)
(b)
(c)
(d)
(c)
(d)
(e)
Fig. 5. Effects of learning rate () on the probability of convergence for
mobility model transition. Transition from (a) GM to others, (b) MM to others,
(c) PMM to others, (d) Pursue to others, and (e) RPGM to others.
(e)
Fig. 6. Effects of learning rate () on the number of iterations for achieving convergence under mobility model transition. Transition from (a) GM to
others, (b) MM to others, (c) PMM to others, (d) Pursue to others, and (e)
RPGM to others.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
MISRA et al.: MIRACLE USING STOCHASTIC LEARNING WEAK ESTIMATOR
(b)
(a)
11
accuracy with more than 60%, and the mobility model transition show on an average 67% accuracy. We believe that this
paper forms the basis of further addition of more models in
estimation. Additionally, we want to extend this paper for an
array of covered and uncovered zones in WSNs in the future.
Nevertheless, we evaluate the performance of the MIRACLE
using simulation only. We have plan to test the scheme in
real-life environment in the future.
R EFERENCES
(d)
(c)
(e)
Fig. 7. CV results for successful estimation of mobility model transitions.
(a) CV: GM to other models. (b) CV: MM to other models. (c) CV: PMM
to other models. (d) CV: RPGM to other models. (e) CV: Pursue to other
models.
below 102, according to the above mentioned experimental setup. It is pertinent to mention that this is not
the upper bound of the parameter. We have plan to find
out the upper bound of the parameter in the future.
4) We have now a bigger picture about how transition
from one model to another model occurs across different
classes of mobility models.
VI. C ONCLUSION
The existence of coverage holes, as well as the change of
mobility pattern inside the territory of WSNs is a reality. These
practical issues were the starting premise of this paper, and the
proposed algorithm successfully estimates the target mobility
and transitions in WSNs. We generated traces for uncovered
zones from the traces obtained by sensing the target motion
in covered zones. We implemented an SLWE-based estimator
coupled with trajectory extrapolation and fusion techniques
to arrive at estimation results. We used five mobility models
for simulation and analysis. The approach taken to estimate
mobility model also considers the possible transitions between
mobility models across two covered zones with a coverage
hole in between. To the best of our knowledge, this is one
of the first attempts to solve the mobility model estimation
problem inside an uncovered zones, as well as, in presence
of mobility model transition from one model to another. The
results of mobility model estimation show significantly high
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
12
[44] S. Misra, S. Singh, M. Khatua, and M. S. Obaidat, Extracting mobility pattern from target trajectory in wireless sensor networks, Int. J.
Commun. Syst., vol. 28, no. 2, pp. 213230, Jan. 2015.
[45] The Network Simulator NS-2. (2008). [Online]. Available:
http://www.isi.edu/nsnam/ns
[46] R. L. Burden and J. D. Faires, Numerical Analysis, 9th ed. Boston, MA,
USA: Brooks-Cole, 2010.
[47] F. F. Song, T. S. Bi, H. Y. Li, Q. X. Yang, and Y. Liu, The perturbed
trajectories prediction method based on wide-area measurement system,
in Proc. IEEE PES Transm. Distrib. Conf. Exhibit., Dallas, TX, USA,
2006, pp. 14671471.
[48] K. Nag and N. R. Pal, A multiobjective genetic programming-based
ensemble for simultaneous feature selection and classification, IEEE
Trans. Cybern., 2015, to be published.
[49] F. Theoleyre, R. Tout, and F. Valois, New metrics to evaluate mobility models properties, in Proc. IEEE Int. Symp. Wireless Pervasive
Comput., San Juan, PR, USA, Mar. 2007, pp. 16.
[50] A. Vasilakos, M. Saltouros, A. Atlassis, and W. Pedrycz, Optimizing
QoS routing in hierarchical ATM networks using computational intelligence techniques, IEEE Trans. Syst., Man, Cybern. C, Appl. Rev.,
vol. 33, no. 3, pp. 297312, Aug. 2003.
Manas Khatua (S12) received the B.Tech. in computer science and engineering from the University of
Kalyani, Kalyani, India, in 2003, and the M.Tech.
degree in information technology from Bengal
Engineering and Science University, Howrah, India,
in 2007. He is currently pursuing the Ph.D. degree
with the School of Information Technology, Indian
Institute of Technology Kharagpur, Kharagpur,
India.
He was with Tata Consultancy Services, Kolkata,
India, for two and a half years. He was a Lecturer
with the Bankura Unnayani Institute of Engineering, Bankura, India, for over
two years. He is currently an Research Assistant with the Singapore University
of Technology and Design, Singapore. He researches on wireless LAN, sensor
networks, mobile cloud computing, and network security.