Skip to main content

Mobile Target Tracking with Multiple Objectives in Wireless Sensor Networks

  • Chapter
  • First Online:
Mission-Oriented Sensor Networks and Systems: Art and Science

Part of the book series: Studies in Systems, Decision and Control ((SSDC,volume 163))

Abstract

Tracking mobile targets in wireless sensor networks (WSNs) is of utmost importance in surveillance applications. As it is often the case in prior work that the accuracy of tracking heavily depends on high accuracy in localization or distance estimation, which is never perfect in practice. These bring a cumulative effect on tracking (e.g., target missing). Recovering from the effect and also frequent interactions between nodes and a central server make tracking operation slow and energy-inefficient. Inspired by these, we design a tracking scheme, called t-Tracking, to address the target tracking problem in WSNs considering multiple objectives: low capturing time (e.g., the tracking time required to get around a target in a defined distance), high energy efficiency, and high quality of tracking (QoT). We propose a set of fully distributed tracking algorithms, which answer the query whether a target remains in a “specific area” (called a “face” in localized geographic routing, defined in terms of radio connectivity or local interactions of nodes). When a target moves across a face, the nodes of the face that are close to its estimated movements compute the sequence of the target’s movements and predict when the target moves to another face. The nodes answer queries from a mobile sink called the “tracker,” which follows the target along with the sequence. t-Tracking has advantages over prior work as it reduces the dependency on requiring high accuracy in localization and the frequency of interactions. It also timely solves the target missing problem caused by node failures, obstacles, etc., making the tracking robust in a highly dynamic environment. We validate its effectiveness considering the multiple objectives in extensive simulations and in a system implementation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Please see Appendix A for the detail about how we mitigate the difficulties.

  2. 2.

    More metrics are considered in the Appendix C.

  3. 3.

    Further results relevant to the three metrics are given in the Appendix C.

References

  1. Naderan, M., Dehghan, M., Pedram, H., Hakami, V.: Survey of mobile object tracking protocols in wireless sensor networks: a network-centric perspective. Int. J. Ad Hoc Ubiquitous Comput. 11(1), 34–63 (2012)

    Article  Google Scholar 

  2. Wang, G., Bhuiyan, M.Z.A., Cao, J., Wu, J.: Detecting movements of a target using face tracking in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 25(4), 939–949 (2014)

    Article  Google Scholar 

  3. Bhuiyan, M.Z.A., Wang, G., Cao, J., Wu, J.: Deploying wireless sensor networks with fault-tolerance for structural health monitoring. IEEE Trans. Comput. 64(2), 382–395 (2015)

    Article  MathSciNet  Google Scholar 

  4. Bhuiyan, M.Z.A., Wang, G., Vasilakos, A.V.: Local area prediction-based mobile target tracking in wireless sensor networks. IEEE Trans. Comput. 64(2), 1968–1982 (2015)

    Article  MathSciNet  Google Scholar 

  5. Bhuiyan, M.Z.A., Wang, J.W.G., Wang, T., Hassan, M.: e-Sampling: event-sensitive autonomous adaptive sensing and low-cost monitoring in networked sensing systems. ACM Trans. Auton. Adapt. Syst. 1–25 (2017)

    Article  Google Scholar 

  6. Cartigny, J., Ingelrest, F., Simplot, D., Stojmenovic, I.: Localized LMST and RNG based minimum-energy broadcast protocols in Ad Hoc networks. Ad hoc Netw. (Elsevier) 3(2), 1–16 (2005)

    Google Scholar 

  7. Bhuiyan, M.Z.A., Wang, J.W.G., Wang, T., Hassan, M.: Quality guaranteed and event-sensitive data collection and monitoring in wireless vibration sensor networks. IEEE Trans. Ind. Inform. 1–12 (2017). https://doi.org/10.1109/TII.2017.2665463

    Article  Google Scholar 

  8. Yu, Y.: Consensus-based distributed linear filter for target tracking with uncertain noise statistics. IEEE Sens. J. 17(15), 34–63, 12 (2017)

    Article  Google Scholar 

  9. Yu, Y.: Wireless communications and mobile computing. IEEE Sens. J. 2017(2017), 1–19, 12 (2017)

    Google Scholar 

  10. Amaldi, E., Capone, A., Cesana, M., Filippini, I.: Design of wireless sensor networks for mobile target detection. IEEE/ACM Trans. Netw. 20(3), 784–797 (2012)

    Article  Google Scholar 

  11. Song, L., Hatzinakos, D.: A cross-layer architecture of wireless sensor networks for target tracking. IEEE/ACM Trans. Netw. 15(1), 145–159 (2007)

    Article  Google Scholar 

  12. Keung, G.Y.: BoLi, Zhang, Q.: The intrusion detection in mobile sensor network. IEEE/ACM Trans. Netw. 20(4), 1152–1161 (2013)

    Article  Google Scholar 

  13. Sarkar, R., Gao, J.: Differential forms for target tracking and aggregate queries in distributed networks. IEEE/ACM Trans. Netw. 21(4), 1159–1172 (2013). https://doi.org/10.1109/TNET.2012.2220857

    Article  Google Scholar 

  14. Vicaire, P., He, T., Cao, Q., Yan, T., Zhou, G., Gu, L., Luo, L., Stoleru, R., Stankovic, J.A., Abdelzaher, T.F.: Achieving long-term surveillance in VigilNet. ACM Trans. Sens. Netw. 5(1), 1–39 (2009)

    Article  Google Scholar 

  15. He, T., Vicaire, P.A., Yan, T., Luo, L., Gu, L., Zhou, G., Stoleru, R., Cao, Q., Stankovic, J.A., Abdelzaher, T.F.: Achieving real-time target tracking using wireless sensor networks. In: Proceedings of the IEEE 12th Real-Time and Embedded Technology and Applications Symposium (RTAS’06), pp. 37–48 (2006)

    Google Scholar 

  16. Lin, C.-Y., Peng, W.-C., Tseng, Y.-C.: Efficient in-network moving object tracking in wireless sensor networks. IEEE Trans. Mob. Comput. 5(8), 1044–1056 (2006)

    Article  Google Scholar 

  17. Zhu, H., Li, M., Zhu, Y., Lionel, M.N.: HERO: online real-time vehicle tracking. IEEE Trans. Parallel Distrib. Syst. 20(5), 740–752 (2009)

    Article  Google Scholar 

  18. Bhuiyan, M.Z.A., Wu, J., Wang, G., Cao, J.: Sensing and decision-making in cyber-physical systems: the case of structural health monitoring. IEEE Trans. Ind. Inform. 12(6), 2103–2114 (2016)

    Article  Google Scholar 

  19. Bhuiyan, M.Z.A., Wang, G., Wu, J., Xiaofei, X., Liu, X.: Application-oriented sensor network architecture for dependable structural health monitoring. In: Proceedings of IEEE PRDC, pp. 134–147 (2015)

    Google Scholar 

  20. Bhuiyan, M.Z.A., Wang, G., Cao, J., Wu, J.: Energy and bandwidth-efficient wireless sensor networks for monitoring high-frequency events. In: Proceedings of the 10th IEEE International Conference on Sensing, Communication, and Networking (SECON’13), pp. 194–202 (2013)

    Google Scholar 

  21. Bhuiyan, M.Z.A., Wang, G., Wu, J., Cao, J., Liu, X., Wang, T.: Dependable structural helath monitoring using wireless sensor networks. IEEE Trans. Dependable Secure Comput. 14(4), 363–376 (2017)

    Article  Google Scholar 

  22. American Border Patrol, Operation B.E.E.F. Border enforcement evaluation first, 2006 [Online]. http://www.americanpatrol.com/ABP/BEEF/PDF/BEEFPLANDEC118.pdf

  23. Luo, H., Wu, K., Guo, Z., Gu, L., Ni, L.M.: Ship detection with wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 23(7), 1336–1343 (2012). http://doi.ieeecomputersociety.org/10.1109/TMC.2013.34

    Article  Google Scholar 

  24. Jeong, J., Gu, Y., He, T., Du, D.H.C.: Virtual scanning algorithm for road network surveillance. IEEE Trans. Parallel Distrib. Syst. 21(12), 1734–1749 (2010)

    Article  Google Scholar 

  25. Bisdikian, C., Kaplan, L.M., Srivastava, M.B.: On the quality and value of information in sensor networks. ACM Trans. Sens. Netw. 9(4), 1–26 (2013)

    Article  Google Scholar 

  26. Chen, P., Zhong, Z., He, T.: Bubble trace: mobile target tracking under insufficient anchor coverage. In: Proceedings of the IEEE 31st International Conference on Distributed Computing Systems (ICDCS 2011, pp. 770–779 (2011)

    Google Scholar 

  27. Yedavalli, K., Krishnamachari, B.: Sequence-based localization in wireless sensor networks. ACM Trans. Mob. Comput. 7(1), 81–84 (2005)

    Article  Google Scholar 

  28. Ding, M., Cheng, X.: Fault tolerant target tracking in sensor networks. In: Proceedings of the ACM 10th International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’09), pp. 125–134 (2009)

    Google Scholar 

  29. Bhuiyan, M.Z.A., Wang, G., Cao, J., Wu, J., Liu, X.: Localized decision making in wireless sensor networks for online structural health monitoring. Technical Report, Central South University, Changsha, China (2013). http://trust.csu.edu.cn/faculty/~csgjwang/publications/technicalreport/TR-SISE-02-Decision.pdf

  30. Wang, X., Ma, J., Wang, S., Bi, D.: Distributed energy optimization for target tracking in wireless sensor networks. IEEE Trans. Mob. Comput. 9(1), 73–86 (2010)

    Article  Google Scholar 

  31. Misra, S., Singh, S.: Localized policy-based target tracking using wireless sensor networks. ACM Trans. Sens. Netw. 8(3), 1–30 (2012)

    Article  Google Scholar 

  32. Souza, E.L., Campos, A., Nakamura, E.F.: Tracking targets in quantized areas with wireless sensor networks. In: Procedings of IEEE 36th Conference on Local Computer Networks (LCN’11), pp. 235–238 (2011)

    Google Scholar 

  33. Bhuiyan, M.Z.A., Kuo, S.-Y., Wu, J.: Special issue on dependability in parallel and distributed systems and applications. Inf. Sci. 319(1), 1–2 (2017)

    Article  Google Scholar 

  34. Basheer, M., Jagannathan, S.: Localization and tracking of objects using cross-correlation of shadow fading noise. IEEE Trans. Mob. Comput. (IEEE Computer Society Digital Library) (2013). http://doi.ieeecomputersociety.org/10.1109/TMC.2013.34

  35. Xu, E., Ding, Z., Dasgupta, S.: Target tracking and mobile sensor navigation in wireless sensor networks. IEEE Trans. Mob. Comput. 12(1), 177–186 (2013)

    Article  Google Scholar 

  36. Wang, X., Fu, M., Zhang, H.: Target tracking in wireless sensor networks based on the combination of KF and MLE using distance measurements. IEEE Trans. Mob. Comput. 11(4), 567–576 (2012)

    Article  Google Scholar 

  37. Tan, R., Xing, G., Liu, B., Wang, J., Jia, X.: Exploiting data fusion to improve the coverage of wireless sensor networks. IEEE/ACM Trans. Netw. 20(2), 450–462 (2012)

    Article  Google Scholar 

  38. Yang, Z., Jian, L., Wu, C., Liu, Y.: Beyond triangle inequality: sifting noisy and outlier distance measurements for localization. ACM Trans. Sens. Netw. 9(2), 1–20 (2013)

    Article  Google Scholar 

  39. Au, A.W.S., Feng, C., Valaee, S., Reyes, S., Sorour, S., Markowitz, S.N., Gold, D., Gordon, K., Eizenman, M.: Indoor tracking and navigation using received signal strength and compressive sensing on a mobile device. IEEE Trans. Mob. Comput. 12(10), 2050–2062 (2013)

    Article  Google Scholar 

  40. Klein, D.J., Venkateswaran, S., Isaacs, J.T., Burman, J., Pham, T., Hespanha, J., Madhow, U.: Localization with sparse acoustic sensor networks using uavs as information-seeking data mules. ACM Trans. Sens. Netw. 9(3), 1–29 (2013)

    Article  Google Scholar 

  41. Ercan, A.O., Gama, A., Guibas, L.J.: Object tracking in the presence of occlusions using multiple cameras: a sensor network approach. ACM Trans. Sens. Netw. 9(2), 1–36 (2013)

    Article  Google Scholar 

  42. Kwon, Y., Mechitov, K., Sundresh, S., Kim, W., Agha, G.: Resilient localization for sensor networks in outdoor environments. ACM Trans. Sens. Netw. 7(1), 1–30 (2010)

    Article  Google Scholar 

  43. Karbasi, A., Oh, S.: Robust localization from incomplete local information. IEEE/ACM Trans. Netw. 21(4), 1131–1144 (2013)

    Article  Google Scholar 

  44. Xiao, Q., Bu, K., Wang, Z., Xiao, B.: Robust localization against outliers in wireless sensor networks. ACM Trans. Sens. Netw. 9(2), 1–26 (2013)

    Article  Google Scholar 

  45. Chiu, W.-Y., Chen, B.-S., Yang, C.-Y.: Robust relative location estimation in wireless sensor networks with inexact position problems. IEEE Trans. Mob. Comput. 11(6), 935–946 (2012)

    Article  Google Scholar 

  46. De, D., Song, W.-Z., Xu, M., Wang, C.-L., Cook, D., Huo, X.: FindingHuMo: real-time tracking of motion trajectories from anonymous binary sensing in smart environments. In: Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems (ICDCS ’12), pp. 162–172 (2012)

    Google Scholar 

  47. Zheng, J., Bhuiyan, M.Z.A., Liang, S., Xing, X., Wang, G.: Auction-based adaptive sensor activation algorithm for target tracking in wireless sensor networks. Future Gener. Comput. Syst. 39, 88–99 (2014)

    Article  Google Scholar 

  48. Chen, F., Dressler, F.: A simulation model of IEEE 802.15.4 in OMNeT++. In: Proceedings of GI/ITG KuVS Fachgesprch Drahtlose Sensornetze, pp. 35–38 (2007)

    Google Scholar 

  49. Luo, J., Hubaux, J.-P.: Joint sink mobility and routing to increase the lifetime of wireless sensor networks: The case of constrained mobility. IEEE/ACM Trans. Netw. 18(3), 871–884 (2010)

    Article  Google Scholar 

  50. Li, X., Yang, J., Nayak, A., Stojmenovic, I.: Localized geographic routing to a mobile sink with guaranteed delivery in sensor networks. IEEE J. Sel. Areas Commun. 30(9), 1719–1729 (2012)

    Article  Google Scholar 

  51. Huang, Q., Bhattacharya, S., Lu, C., Roman, G.-C.: FAR: Face-aware routing for mobicast in large-scale sensor networks. ACM Trans. Sens. Netw. 1(2), 240–271 (2005)

    Article  Google Scholar 

  52. Leong, B., Mitra, S., Liskov, B.: Path vector face routing: geographic routing with local face information. In: Proceedings of the IEEE 13th International Conference on Network Protocols (ICNP’05), pp. 147–158 (2005)

    Google Scholar 

  53. Bhuiyan, M.Z.A., Wang, G., Wu, J.: Target tracking with monitor and backup sensors in wireless sensor networks. In: Proceedings of the IEEE 18th International Conference on Computer Communications and Networks (ICCCN’09), pp. 1–6 (2009)

    Google Scholar 

  54. Bhuiyan, M.Z.A., Wang, G., Wu, J.: Polygon-based tracking framework in surveillance wireless sensor networks. In: Proceedings of the IEEE 15th International Conference on Parallel and Distributed Systems (ICPADS’09), pp. 174–181 (2009)

    Google Scholar 

  55. Sathyan, T., Hedley, M.: Fast and accurate cooperative tracking in wireless networks. IEEE Trans. Mob. Comput. 12(9), 1801–1813 (2013)

    Article  Google Scholar 

  56. Singh, J., Kumar, R., Madhow, U., Suri, S., Cagley, R.: Multiple-target tracking with binary proximity sensors. ACM Trans. Sens. Netw. 8(1), 1–26 (2011)

    Article  Google Scholar 

  57. Li, H., Barbosa, P.R., Chong, E.K.P., Hannig, J., Kulkarni, S.R.: Zero-error target tracking with limited communication. IEEE J. Sel. Areas Commun. 26(4), 686–684 (2008)

    Article  Google Scholar 

  58. Jiang, B., Ravindran, B., Cho, H.: Probability-based prediction and sleep scheduling for energy-efficient target tracking in sensor networks. IEEE Trans. Mob. Comput. 12(4), 735–747 (2013)

    Article  Google Scholar 

  59. Gao, P., Shi, W., Zhou, W., Li, H., Wang, X.: A location predicting method for indoor mobile target localization in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2013, 1–11 (2013)

    Article  Google Scholar 

  60. Jing, T., Hichem, S., Cedric, R.: Prediction-based cluster management for target tracking in wireless sensor networks. Wirel. Commun. Mob. Comput. 12(9), 797–812, 2012 [Online]. http://dx.doi.org/10.1002/wcm.1014

  61. Arik, M., Akan, O.B.: Collaborative mobile target imaging in UWB wireless radar sensor networks. IEEE J. Sel. Areas Commun. 28(6), 950–961 (2010)

    Article  Google Scholar 

  62. Dong, D., Liao, X., Liu, Y., Li, X.-Y., Pang, Z.: Sharp thresholds for relative neighborhood graphs in wireless ad hoc networks. Algorithmica 60(3), 593–608 (2011)

    Article  MathSciNet  Google Scholar 

  63. Toussaint, G.: The relative neighborhood graph of finite planarset. Pattern Recognit. 12(4), 261–268 (1980)

    Article  Google Scholar 

  64. Ruehrup, S., Stojmenovic, I.: Optimizing communication overhead while reducing path length in beaconless georouting with guaranteed delivery for wireless sensor networks. IEEE Trans. Comput. (2013). http://doi.ieeecomputersociety.org/10.1109/TC.2012.148

  65. Kim, Y.-J., Govindan, R., Karp, B., Shenker, S.: Lazy cross-link removal for geographic routing. In: Proceedings of ACM SenSys (2006)

    Google Scholar 

  66. Rhrup, S., Stojmenovic, I.: A new traversal scheme for georouting and boundary detection in WSNs. University of Ottawa, Canada, TR-2010-05 (2010)

    Google Scholar 

  67. Guibas, L.J., Hershberger, J.: Optimal shortest path queries in a simple polygon. J. Comput. Syst. Sci. 39(2), 126–152 (1989)

    Article  MathSciNet  Google Scholar 

  68. Sugihara, R., Gupt, R.K.: Optimal speed control of mobile node for data collection in sensor networks. In: Proceedings of IEEE INFOCOM (2009)

    Google Scholar 

  69. Gu, Y., Ji, Y., Li, J., Zhao, B.: ESWC: efficient scheduling for the mobile sink in wireless sensor networks with delay constraint. IEEE Trans. Parallel Distrib. Syst. 24(7), 1810–1820 (2013)

    Article  Google Scholar 

  70. Xu, X., Luo, J., Zhang, Q.: Delay tolerant event collection in sensor networks with mobile sink. In: Proceedings of IEEE 29th Joint Annual Conference of the IEEE Computer and Communications Societies (INFOCOM’10) (2010)

    Google Scholar 

  71. Sugihara, R., Gupta, R.K.: Optimal speed control of mobile node for data collection in sensor networks. IEEE Trans. Mob. Comput. 9(1), 127–139 (2010)

    Article  Google Scholar 

  72. Mourad, F., Chehade, H., Snoussi, H., Yalaoui, F., Amodeo, L., Richard, C.: Controlled mobility sensor networks for target tracking using ant colony optimization. IEEE Trans. Mob. Comput. 11(8), 1261–1273 (2012)

    Article  Google Scholar 

  73. Welsh, M., Mainland, G.: Programming sensor networks using abstract regions. In: Proceedings of the USENIX 1st Symposium on Networked Systems Design and Implementation (NSDI’04), pp. 29–42 (2004)

    Google Scholar 

  74. Mathews, E., Frey, H.: A localized planarization algorithm for realistic wireless networks. In: Proceedings of the IEEE 12th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WOWMOM’11), pp. 1–11 (2011)

    Google Scholar 

  75. Dong, D., Liao, X., Liu, Y., Li, X.-Y., Pang, Z.: Fine-grained location-free planarization in wireless sensor networks. IEEE Trans. Mob. Comput. 12(5), 971–983 (2013)

    Article  Google Scholar 

  76. Zhang, F., Jiang, A., Chen, J.: On the planarization of wireless sensor networks. Algorithmica 60(3), 593–608 (2011)

    Article  MathSciNet  Google Scholar 

  77. Bhuiyan, M.Z.A., Wang, G., Cao, J., Wu, J.: Local monitoring and maintenance for operational wireless sensor networks. In: Proceedings the IEEE 11th International Symposium on Parallel and Distributed Processing with Applications (ISPA’13) (2013)

    Google Scholar 

  78. Lu, G., Sadagopan, N., Krishnamachari, B., Goe, A.: Delay efficient sleep scheduling in wireless sensor networks. In: Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM’06), pp. 2470–2481 (2005)

    Google Scholar 

  79. Fuemmeler, J.A., Veeravalli, V.V.: Smart sleeping policies for energy efficient tracking in sensor networks. IEEE Trans. Signal Process. 56(5), 2091–2101 (2008)

    Article  MathSciNet  Google Scholar 

  80. http://docs.tinyos.net/index.php/Imote2

  81. I.D.O.A.: http://docs.tinyos.net/tinywiki/index.php/Imote2

  82. Huang, Q., Lu, C., Roman, G.-C.: Mobicast: Just-in-time multicast for sensor networks under spatiotemporal constraints. In: Proceedings of ACM/IEEE IPSN, pp. 442–457 (2003)

    Chapter  Google Scholar 

  83. Kim, Y.-J., Govindan, R., Karp, B., Shenker, S.: Geographic routing made practical. In: Proceedings of the USENIX 1st Symposium on Networked Systems Design and Implementation (NSDI’05), pp. 217–230 (2005)

    Google Scholar 

  84. Zhang, F., Jiang, A., Chen, J.: Robust planarization of unlocalized wireless sensor networks. In: Proceedings of IEEE INFOCOM, pp. 798–806 (2008)

    Google Scholar 

  85. Seada, K., Zuniga, M., Helmy, A., Krishnamachari, B.: Energy-efficient forwarding strategies for geographic routing in lossy wireless sensor networks. In: Proceedings of ACM SenSys, pp. 108–121 (2004)

    Google Scholar 

  86. Seada, K., Helmy, A., Govindan, R.: Modeling and analyzing the correctness of geographic face routing under realistic conditions. Ad Hoc Netw. 5(6), 855–871 (2007)

    Article  Google Scholar 

  87. Lin, J., Kuo, G.-S.: A novel location-fault-tolerant geographic routing scheme for wireless ad hoc networks. In: Proceedings of IEEE VTC, pp. 1092–1096 (2006)

    Google Scholar 

  88. Delouille, V., Neelamani, R., Baraniuk, R.: Robust distributed estimation in sensor networks using the embedded polygons algorithm. In: Proceedings of the ACM 3rd Information Processing in Sensor Networks (IPSN’04), pp. 405–413 (2004)

    Google Scholar 

  89. Frey, H., Stojmenovic, I.: On delivery guarantees of face and combined greedy-face routing in ad hoc and sensor networks. In: Proceedings of ACM MobiCom, pp. 390–401 (2006)

    Google Scholar 

  90. Clouser, T., Miyashita, M., Nesterenko, M.: Fast geometric routing with concurrent face traversal. In: Proceedings of OPODIS, pp. 346–362 (2008)

    Google Scholar 

  91. Rao, A., Papadimitriou, C., Shenker, S., Stoica, I.: Geographical routing without location information. In: Proceedings of ACM MobiCom, pp. 96–108 (2003)

    Google Scholar 

  92. Lin, C.-H., Liu, B.-H., Yang, H.-Y., Kao, C.-Y., Tsai, M.-J.: Virtual-coordinate-based delivery-guaranteed routing protocol in wireless sensor networks with unidirectional links. In: Proceedings of IEEE INFOCOM, pp. 351–359 (2008)

    Google Scholar 

  93. Waelchli, M., Scheidegger, M., Braun, T.: Intensity-based event localization in wireless sensor networks. In: Proceedings of the IFIP 3rd Annual Conference on Wireless On demand Network Systems and Services (WONS’06), pp. 41–49 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Md Zakirul Alam Bhuiyan or Gary M. Weiss .

Editor information

Editors and Affiliations

Appendices

Appendix A

Mitigating the Difficulties in Face Generation and Regeneration

In Sects. 3.1, 3.3.1, and 4.2.1, we have described the face generation at the system initialization and node organization into faces (or face regeneration) during tracking operation, respectively. In this appendix, we discuss some difficulties in face generation during target tracking.

According to the geographic routing algorithms, a node carries out routing through the boundaries of faces intersected by virtual edges, transmitting a packet from a source node u to a destination node v by employing a local right-hand rule technique. This is the technique by which a packet is forwarded along the next edge clockwise, or counterclockwise, from the edge where it arrived. Such a technique requires all faces to traverse completely on the way to a destination (more specifically, there exists no path from node u to node v) or to terminate when node v is eventually reached. This algorithm has limitations—they involve a number of faces, and require exchanging information between them. Thus, a large number of nodes of those faces are actively involved in carrying out an application task that may not be efficient for an envisaged WSN application. For example, if we considered all of the faces and the nodes that correspond to a particular node (e.g., the monitor), the frequency of interactions in the WSN during each tracking of target tracking would be high, resulting in a high energy consumption in the WSN.

Also in the planarized network model, the greedy forwarding technique work well in dense WSNs. But It experiences routing failures in more realistic, non-uniform node placements, where it suffers from so-called local minima, i.e., nodes with no direct neighbor closer to the destination than themselves [64, 66].

To make the techniques practicable in this application, we make some modifications on it. We determine the boundary of a face region rather than to generating only planar subgraphs. That can reduce the chance of having local minima [66].

We determine the boundary of a face region rather than to only generating a planar subgraph. In more clearly, we can determine a boundary/perimeter of a subset of nodes, that encloses all nodes of a connected component and contains all local minimum nodes on its border. This has to be achieved by a fully reactive and localized algorithm, which cannot rely on knowledge of the 1-hop neighborhood in advance. Locations of 1-hop neighbors have to be requested explicitly by message exchange. That can reduce the chance of having local minima.

We consider that a node u communicates to the nodes in the face to which it belongs and also maintains connectivity through its adjacent neighbors along the boundaries of the faces using the right-hand rule technique. Only the face, to which a node u belongs, is traversed completely and one of its immediately neighboring nodes, v, of the face is the destination node. More explicitly, a node u needs to know only its own, and its adjacent neighboring node v’s locations. u grows its radio range \(R_c\)

$$\begin{aligned} \forall u \in V\quad {r_c}(u) = \max \{ d(u,v)|v \in V \wedge (u,v) \in {E_{RNG}}\} \end{aligned}$$
(22)

as in (22) until all its neighboring nodes are found in the not-yet-covered face. Thus, the number of faces which a node belongs to reduces to a few faces.

There is a class of protocols and algorithms in the literature focusing on network planarization that helps us to make the improvement on the correctness on face generation at the system initialization. These include disconnection between the nodes, incorrect edge removal, insufficient edge removals, cross-links, link or node failure, establishing direct link, hole/obstacle problem, non-ideal radio ranges, network instability, and so on [6, 51, 52, 64, 65, 74,75,76,77, 82,83,84,85,86,87,88,89,90,91,92]. Furthermore, we think that there may still remain some of the difficulties when using faces in a practical environment. This is why, we ensure to the preservation of faces by regenerating them at a certain moment; e.g., when the nodes in a face can detect t or receive a request to detect t before t’s moving to the face. The face prediction helps to achieve this. We consider to maintain a linear link list between nodes of faces, which can help mitigate irregularities found in faces and can provide online fault tolerance.

In the following, we discuss some concerns/questions that are essential to make more clear the tracking through faces.

Concern 3

Given the initial radio broadcasts on the generation of a planar graph, what if \(v_1\) can also hear \(v_{12}\) and \(v_{20}\) in Fig. 2 during a tracking operation?

Our response to this concern goes to the sensor node organization rules described in Sect. 4.1. Referring to Fig. 2, \(v_1\) may hear both \(v_{12}\) and \(v_{20}\). However, neither \(v_{12}\) nor \(v_{20}\) can be an adjacent neighboring node of \(v_1\). To generate faces effectively, we put some preferences on nodes’ interactions, by which both \(v_2\) and \(v_5\) cannot be the witness between \(v_1\) and \(v_{12}\), and between \(v_1\) and \(v_{20}\), respectively. If there are several neighbors reachable under the same radio range (e.g., \(v_1\) may hear \(v_{12}\), \(v_{20}\), or may also hear \(v_{11})\), a decision is made on this situation, which node should be the adjacent neighboring nodes of \(v_1\); in other words, whether a node like \(v_{12}\) should be included in a face or not. There are two preferences to decide on the situation: (i) the minimal Euclidean distance from u to v; (ii) whether or not v is the first node by using the right-hand rule technique (having no witness). If these two conditions are not met, \(v_{12}\) is excluded from \(v_1\)’s adjacent neighboring node list (i.e., connected to another face). Similarly, \(v_{20}\) is excluded from \(v_1\)’s adjacent neighboring node list. We can emphatically say that they are neither the immediate neighbors nor the distant neighbors of \(v_1\).

Concern 4

According to the rules of node organization techniques described in Sect. 4.1, do all the nodes of all the neighboring faces of a specific face (where t is currently moving) involve in tracking?

According to the rules of node organization into faces, we only consider a t’s current moving face (\(F_i\)) and the predicted face \(F_j\), and the edges and nodes of these faces associated with the monitor and backup nodes. We need to mention an underlying issue of the localized face: When t travels across \(F_i\), not only is the closed face covered, but an additional area is also covered by each node’s working area, since each node of \(F_i\) contributes a part of its working area inside \(F_i\). The rest of the working area of the node is on the outside of \(F_i\), which is included with a neighboring face and is not mainly our concern, except that there is the event of t’s missing. The outside/additional area of \(F_i\) can be calculated by the rest of the working areas of all of the nodes of \(F_i\). In this example, the number of nodes of \(F_i\) is still the same. Such an area can be effectively used in the event of t’s missing. If any node corresponding to \(F_i\) can detect t outside of \(F_i\) in its working area, the adjacent face of \(F_i\) immediately becomes the new \(F_i\), and one of the node become monitor based on the detection probability (\(P_d\)) on t and another node becomes the backup, just like the target detection and tracking operation start at the beginning. They send a message to the monitoring and neighboring nodes in the previous \(F_i\) to change their active state \(s_i\) to inactive state \(s_2\) (excluding the node if any node belongs to the new \(F_i\)). The calculation of additional area coverage can be found in existing localization approaches, e.g., [93].

Concern 5

What is the main purpose to treat two nodes as “monitor” and “backup” for the tracking?

In many localization techniques, such as TOA, TDOA, AOA, or MPS, a large number of nodes (3 to many) requires to participate in tracking. In many cases, most of the nodes of the network should be awake during a tracking. Tracking schemes with target localization-free require more nodes, such as Forms needs a lot of nodes (12 to many) in each period of tracking. In t-Tracking, one of the main purposes or advantages of treating the monitor and backup as the common nodes between the faces, \(F_{i}\) and \(F_{j} \), is to minimize the number of participating nodes in target tracking. For example, \(v_{5}\) has 5 adjacent faces with 12 neighboring nodes in Fig. 2, and node \(v_{1}\) has 3 adjacent faces with 8 neighboring nodes. However, nodes \((v_{1}\) and \(v_{5})\) together directly correspond only 2 faces with 7 neighbors. Thus, in a normal case of tracking, the number of nodes involved in tracking can be minimized from 20 to 7. This also implies that a number of nodes that hear about t’s approaching become active. Among them, the number of nodes that do not participate in tracking (they may be basically idle and unnecessarily consume energy) can be minimized. Another purpose is to provide robustness in tracking. In the case that the monitor has any problem due to any reason, the backup takes the role of the monitor. Target detection and localization is mainly performed by using their previous “cooperation information”.

Appendix B

More Concerns with the Proposed Tracking Algorithms

Concern 6

Does \(P_d^c\) (the combined detection probability) estimation really result in a successful tracking operation?

As t moves toward the monitor and backup, the distance \(d(l_i^s-l_i)\) between t and each of the nodes decreases and the \(P_d^c\) between the monitor and backup increases. In most cases, \(P_d^c\) between the pairs of neighboring nodes should decrease. The steady decrease in the distance increases in the probability, meaning that t is moving from the monitor and backup to new monitor and backup (from \(F_i\) to \(F_j\), as shown in Fig. 3(b)). When \(P_d^c\) by any two nodes (the monitor and backup) is the highest, compared to its probabilities in the previous instants and to probabilities of the neighboring pairs of nodes, the chance that t crosses the edge between them is high, resulting normally in a successful tracking step (STS). We think that there may not happen such a case that \(P_d^c\) of two pairs of nodes is the same. However, because of the node organization into faces, there has a possibility that \(P_d^c\) of two pairs of nodes can be close.

Recall that in Sect. 4.2, we have mentioned that the angle between two or three adjacent neighboring nodes can be estimated to decide in which face t is in. This can also be used to reduce the above possibilities. However, such estimation may bring additional complexity in computation. Regarding the relevant information of the node organization into faces, we set three conditions for any pair of nodes to be the monitor and backup: (i) \(P_d^c\) should be higher than other pairs of nodes; (ii) they should be the adjacent and also be the immediate neighbors; (iii) they should be in the same face \(F_i\) (e.g., \(F_2\)).

These conditions reduce the wrong selection of the monitor and backup as well as the wrong detection of t, resulting in a successful tracking operation.

Concern 7

Is there any big deal of detection error in the estimation of \(P_d^c\) between two nodes? More precisely, according to the scenario presented in Fig. 4, how does the system detect that t is going to cross between \(v_1\) and \(v_5\), not between \(v_1\) and \(v_3\), or between \(v_5\) and \(v_4\).

This is quite similar to Concern 6. But we want to discuss it in another point of view, which may help understanding the target tracking through faces.

If t moves, it must move toward another face \(F_j\), but initially the system does not know which face t is moving toward. In fact, tracking t is not only based on t’s movement direction, also based on the direction of the nodes (or which face) t is moving toward. As shown in the scenario presented in Fig. 4a–c, it may move toward any face, i.e., toward \(F_3\) by crossing the edge between \(v_6\) and \(v_7\), toward \(F_{12}\) by crossing the edge between \(v_5\) and \(v_6\), toward \(F_{10}\) by crossing the edge between \(v_7\) and \(v_2\), and \(F_{18}\) by crossing the edge between \(v_2\) and \(v_1\). It may also turn back to \(F_{1}\) by crossing the edge between \(v_1\) and \(v_5\). In an extreme case, if t turns back, it should be easily detected as it is still under detection (within \(R_s\) of the same nodes). When such a case happens, \(d(l_i^s-l_i)\) continues to decrease as time goes on, which was increasing in the previous some time instants. \(P_d^c\) between any pair of nodes should be increased or decreased (see Concern 6). This indicates that t is still moving inside \(F_i\) and may move across from \(F_i\) to \(F_j\). There is no chance that t is crossing another edge between another pairs of nodes (e.g., between \(v_1\) and \(v_3\), between \(v_3\) and \(v_4\), between \(v_5\) and \(v_{24}\), or others) without going through the edge between the monitor and backup or the edge between any pair of nodes of \(F_i\) (which are also common nodes between \(F_i\) and \(F_j\)). Thus, there should be no big deal of detection error.

Concern 8

Suppose that t is moving toward face \(F_7\), how does it work? More precisely, how does the system knows that t is moving toward \(F_7\), not \(F_3\), or \(F_9\) in Fig. 2? Actually, in the beginning, how does the system detect t is in \(F_1\)?

To reduce the confusion about the target tracking, we raise Concern 7. In fact, this is similar to Concern 6 in the sense that we discuss Concern 6 considering t’s moving through an edge between any two nodes (the monitor and backup), while we can discuss Concern 7 considering t’s moving through an edge between two faces. The two nodes (a pair) are the common nodes between the two faces. In other words, the edge between the two nodes (a pair) is also the common edge between the two faces. The underlying techniques are the same. We emphatically say that, in t-Tracking, it is non-trivial to determine exactly at which face t is currently located and moving, and then which face t may move. We have elaborated how the above conditions can be obtained in Sect. 4.2 and Algorithm 2.

Concern 9

Why is the “face prediction” preferred to the target movement prediction?

Depending on finding accurate movement prediction, providing quality of tracking (QoT) is difficult in a practical, unpredictable environment. Because of faults in the WSN, noise in the environments, or any other reasons, if there are prediction errors, it becomes tough to relocate t further. Particularly, it is tough when considering the fast tracking operation and radio and energy constraints in the WSN. This is why, we first roughly find the movement information of t inside a face and the prediction information. Then, we convert these into a “face prediction”. We do not find any second-order error adjustment on the localization or on the estimation of the \(P_d\). Up to this point, we have assumed that t can be detected by the monitor and backup, which are the end nodes of a “direct edge” (the “common nodes” between two faces), that t is about to cross to. Thus, to avoid an unexpected loss of tracking, the tracking is based on the face prediction.

Concern 10

What if t is no longer in the detection range of a \(F_i\)? We handle this extreme case that may appear during tracking operation. Assuming that t has disappeared or is missed during tracking, t may be out of \(R_s\) of any of monitor and backup. This may be due to several reasons: irregular signal patterns, especially when (i) a face size is too small in the situation that network density \(\rho \) too high or low in the local areas and (ii) t is much faster than normal. In such a case, the WSN in t-Tracking still has the ability to track/capture t. This case is mitigated by extending the face area coverage (see Concern 2).

Suppose that there is the event of t’s missing reported by the monitor for whatever reason. When the monitor broadcasts a message about the event, the distant nodes start sensing (or which are already in sensing function), since they are in \(s_0\). If t is sensed by a distant node in its \(R_s\), but is outside of \(F_i\), the corresponding face in which t is sensed becomes a new \(F_i\). The distant node becomes the monitor, and it issues a message to the nodes in the previous \(F_i\) and finds a backup. All of the nodes, including previous monitor and backup in the previous \(F_i\), revert to \(S_2\), and the nodes in the current \(F_i\) start target detection and face detection algorithm.

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Bhuiyan, M.Z.A., Weiss, G.M., Wang, T., Min, G. (2019). Mobile Target Tracking with Multiple Objectives in Wireless Sensor Networks. In: Ammari, H. (eds) Mission-Oriented Sensor Networks and Systems: Art and Science. Studies in Systems, Decision and Control, vol 163. Springer, Cham. https://doi.org/10.1007/978-3-319-91146-5_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-91146-5_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-91145-8

  • Online ISBN: 978-3-319-91146-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics