Skip to main content
Log in

Selfishness-aware target tracking in vehicular mobile WiMAX networks

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

The location information of a mobile node is an essential parameter for vehicle monitoring and other location-based services (Junglas and Watson, Commun ACM 51(3):65–69, 2008). The conventional methods used for target tracking, which are applicable for vehicular networks, are either Global Positioning System-based, time of propagation-based or signal strength-based. All of these methods have their own limitations such as additional hardware requirement, power consumption, lack of accuracy, and environmental dependencies. Besides, traditional tracking algorithms do not consider the presence of misbehaving nodes in the network. In this paper, we study target tracking in vehicular mobile WiMAX network environments. We present the proposed Selfishness-Aware Target Tracking (SATT) algorithm. SATT uses time difference of arrival based measurement data when the target is in line-of-sight (LOS) with more than three base stations (BSs). When no more than three LOS links between the target and the BSs are available, then the cluster-head, which serves the target at that instant, activates the three most promising mobile nodes for collecting location information of the target. We use the Stochastic Learning Weak Estimator (Oommen and Rueda, Pattern Recogn 39(3):328–341, 2006) method for keeping track of the misbehaving nodes in the network. The volunteer nodes are selected for target tracking based on this information. Unscented Kalman Filter is used for estimation of the position and velocity of the target. The simulation results show that the SATT algorithm increases the accuracy in tracking information up to 70 % in comparison to the other methods and the algorithm is able to achieve 55–95 % cooperation depending on the degree of misbehavior in the network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Aatique, M. (1997). Evaluation of TDOA Techniques for Position Location in CDMA Systems. Blacksburg: Master of Science, Virginia Polytechnic Institute and State University, Electrical Engineering.

  2. Akyildiz, I. F., & Wang, X. (2005). A Survey on Wireless Mesh Networks. IEEE Communications Magazine, 43(9), S23–S30.

    Article  Google Scholar 

  3. Arulampalam, M. S., Maskell, S., Gordon, N., & Clapp, T. (2002). A tutorial on Particle Filters for online nonlinear/non-Gaussian Bayesian tracking. IEEE Transactions on Signal Processing, 50(2), 174–188.

    Article  Google Scholar 

  4. Bandyopadhyay, S., & Coyle, E. J. (2003). An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks. 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), 3, 1713–1723.

  5. Barton, R. J., & Rao, D. (2008). Performance Capabilities of Long-Range UWB-IR TDOA Localization Systems. EURASIP Journal on Advances in Signal Processing, 2008, 2008.

    Google Scholar 

  6. Biswas, P., Aghajan, H., Ye, Y. (2005). Integration of Angle of Arrival Information for Multimodal Sensor Network Localization using Semidefinite Programming, In Proceedings of 39th Asilomar Conference on Signals, Systems and Computers, 2005.

  7. Bshara, M., Biesen, L.V. (2009). Tracking in WiMAX Networks depending on the available RSS-based information, VIII Semetro, Joo Pessoa.

  8. Cagalj, M., Ganeriwal, S., Aad, I., & Hubaux, J. P. (2005). On Selfish Behavior in CSMA/CA Networks. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 4, 2513–2524.

  9. Chan, Y. T., Tsui, W. Y., So, H. C., & Ching, P. C. (2006). Time of arrival based localization in NLOS condition. IEEE Transactions on Vehicular Technology, 55(1), 17–24.

    Article  Google Scholar 

  10. Chandrasekar, R., Misra, S., & Obaidat, M. S. (2008). FORK: A Novel Two-Pronged Strategy for an Agent-Based Intrusion Detection Scheme in Ad-Hoc Networks. Computer Communications, 31(16), 3855–3869.

    Article  Google Scholar 

  11. Dhurandher, S. K., Misra, S., Obaidat, M. S., Bansal, V., Singh, P., & Punia, V. (2009). EEAODR: An Energy-Efficient On-Demand Routing Protocol for Wireless Ad-Hoc Networks. International Journal of Communication Systems, 22(7), 789–817.

    Article  Google Scholar 

  12. Dhurandher, S. K., Misra, S., Obaidat, M. S., & Gupta, N. (2009). An Ant Colony Optimization Approach for Reputation and Quality-of-Service-Based Security in Wireless Sensor Networks. Security and Communication Networks, 2(2), 215–224.

    Article  Google Scholar 

  13. Estves, J. S., Carvalho, A., & Couto, C. (2003). Generalized Geometric Triangulation Algorithm for Mobile Robot Absolute Self-Localization. IEEE International Symposium on Industrial Electronics, 1, 346–351.

    Google Scholar 

  14. Friis, H. T. (1946). A Note on a Simple Transmission Formula. Proceedings of the IRE, 34(5), 254–256.

    Article  Google Scholar 

  15. Guvenc, I. Chong, C.C. Watanabe, F. (2007). Analysis of a Linear Least-Squares Localization Technique in LOS and NLOS Environments, IEEE 65th Vehicular Technnology Conference 2007, VTC2007-Spring, pp. 1886–1890, May 2007.

  16. Han, G., Xu, H., Duong, T. Q., Jiang, J., & Hara, T. (2011). Localization algorithms of Wireless Sensor Networks: A survey. Telecommunication Systems, 12(2), 2026–2061. doi:10.1007/s11235-011-9564-7.

    Google Scholar 

  17. Hong, X., Gerla, M., Pei, G., & Chiang, C.-C. (1999). A group mobility model for ad hoc wireless networks. Proceedings of the 2nd ACM International Workshop on Modeling (pp. 53–60)., Analysis and Simulation of Wireless and Mobile Systems Washington, United States: Seattle.

  18. Julier, S. J., & Uhlmann, J. K. (1997). A New Extension of the Kalman Filter to Nonlinear Systems. Proceedings SPIE, 3068, 182–193.

    Article  Google Scholar 

  19. Junglas, I. A., & Watson, R. T. (2008). Location-Based-Services: Evaluating user perceptions of location tracking and location awareness services. Communications of the ACM, 51(3), 65–69.

    Article  Google Scholar 

  20. Kleusberg, A., Langley, R.B. (1990). The Limitations of GPS, GPS World.

  21. Lee, S. C., Lee, W. R., & You, K. H. (2009). TDOA based UAV Localization using Dual-EKF Algorithm. International Journal of Control and Automation, 2(4), 47–54.

    Article  Google Scholar 

  22. Liu, C., Wu, K., He, T. (2004). Sensor Localization with Ring Overlapping Based on Comparison of Received Signal Strength Indicator, IEEE International Conference on Mobile Ad-hoc and Sensor Systems, (pp. 516–518).

  23. Liu, J., Liu, J., Reich, J., Cheung, P., & Zhao, F. (2004). Distributed Group Management in Sensor Networks: Algorithms and Applications to Localization and Tracking. Telecommunication Systems, 26(2–4), 235–251.

    Article  Google Scholar 

  24. Maraj, A., & Imeri, I. (2009). WiMAX integration in NGN network, architecture, protocols and services. WSEAS Transactions on Communications, 8(7), 708–717.

    Google Scholar 

  25. McDonald, A. B., & Znati, T. F. (1999). A Mobility-Based Framework for Adaptive Clustering in Wireless Ad Hoc Networks. IEEE Journal on Selected Areas in Communications, 17(8), 1446–1487.

  26. Misra, S., Singh, S. (2012). Localized Policy Based Target Tracking Using Wireless Sensor Networks, ACM Transactions on Sensor Networks, 8(3), 27.

  27. Misra, S., Abraham, K. I., Obaidat, M. S., & Krishna, P. V. (2009). LAID: A Learning Automata-Based Scheme for Intrusion Detection in Wireless Sensor Networks. Security and Communication Networks, 2(2), 105–115.

    Article  Google Scholar 

  28. Misra, S., Krishna, P. V., Abraham, K. I., Sasikumar, N., & Fredun, S. (2010). An Adaptive Learning Routing Protocol for the Prevention of Distributed Denial of Service Attacks in Wireless Mesh Networks. Computers and Mathematics with Applications, Elsevier, 60(2), 294–306.

    Article  Google Scholar 

  29. Misra, S., Oommen, B. J., Yanamandra, S., & Obaidat, M. S. (2010). Random Early Detection for Congestion Avoidance in Wired Networks: The Discretized Pursuit Learning-Automata-Like Solution. IEEE Transactions on Systems, Man and Cybernetics, Part B, 40(1), 66–76.

    Article  Google Scholar 

  30. Misra, S., & Thomasinous, D. (2010). A Simple, Least-Time, Energy-Efficient Routing Protocol with One-Level Data Aggregation for Wireless Sensor Networks. Journal of Systems and Software, 83(5), 852–860.

    Article  Google Scholar 

  31. Misra, S., & Agarwal, P. (2011). Bio-inspired group mobility model for mobile ad hoc networks based on bird-flocking behaviour. Soft Computing, 16(3), 437–450.

    Article  Google Scholar 

  32. Misra, S., Banerjee, B., & Wolfinger, B. E. (2012). A Learning Automata-Based Uplink Scheduler for Supporting Real-time Multimedia Interactive Traffic in IEEE 802.16 WiMAX Networks. Computer Communications, 35(15), 1871–1881.

    Article  Google Scholar 

  33. Neumann, J. V., & Morgenstern, O. (1944). Theory of Games and Economic Behavior. New Jersey: Princeton University Press.

    Google Scholar 

  34. Oommen, B. J., & Rueda, L. (2006). Stochastic Learning-based Weak Estimation of Multinomial Random Variables and Its Applications to Pattern Recognition in Non-stationary Environments. Pattern Recognition, 39(3), 328–341.

    Article  Google Scholar 

  35. Oommen, B. J., & Misra, S. (2010). Fault-tolerant routing in adversarial mobile ad hoc networks: an efficient route estimation scheme for non-stationary environments. Telecommunication Systems, 44(1–2), 159–169.

  36. Osborne, M. J., & Rubinstein, A. (1994). A Course in Game Theory, Cambridge: The MIT Press.

  37. Johnson, D. B., Maltz, D. A., & Broch, J. (2001). In Perkins, C. (Ed.), DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks, Ad Hoc Networking (pp. 139–172). Reading: Addison-Wesley.

  38. Raniwala, A., Chiueh, T. (2005). Architecture and algorithms for an IEEE 802.11-based multi-channel wireless mesh network 24th annual joint conference of the IEEE computer and communications societies (INFOCOM 2005) (vol. 3, pp. 2223–2234).

  39. Rosa, F. D., Frattasi, S., Figueiras, J. (2011). Co-operative Localization in a Hybrid WiMAX/WiFi System: A Future Proof Framework, Globalization of Mobile and Wireless Communications, Signal and Communication Technology, 237–247.

  40. Schwalowsky, S., Trsek, H., Exel, R., Kero, N. (2010). System Integration of an IEEE 802.11 based TDOA Localization System, 2010 International IEEE Symposium on Precision Clock Synchronization for Measurement Control and Communication (ISPCS), (pp. 55–60).

  41. Skone, S., Kundsen, K., & de Jong, M. (2001). Limitations in GPS Receiver Tracking Under Ionospheric Scintillation Conditions. Physics and Chemistry of the Earth, Part A: Solid Earth and Geodesy, 6(6–8), 613–621.

    Article  Google Scholar 

  42. Stoyanova, T., Kerasiotis, F., Prayati, A., & Papadopoulos, G. (2009). Evaluation of impact factors on RSS accuracy for localization and tracking applications in sensor networks. Telecommunication Systems, 42(3–4), 235–248.

    Article  Google Scholar 

  43. Urpi, A., Bonuccelli, M., Giordano, S. (2003). Modelling cooperation in mobile ad hoc networks: a formal description of selfishness, In Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, (pp. 3–5).

  44. Wan, E. A., Merwe, R. V. D., & Nelson, A. T. (2000). Dual Estimation and the Unscented Transformation. Neural Information Processing Systems, 12, 666–672.

    Google Scholar 

  45. Wang, S. C., Liang, H. H., & Yan, K. Q. (2009). Capability Based Clustering Mechanism in WiMAX. Proceedings of the International Multi Conference of Engineers and Computer Scientists, 1, 2009.

    Google Scholar 

  46. Wei, H.Y., Ganguly, S., Izmailov, R., Haas, Z. J. (2005). Interference-Aware IEEE 802.16 WiMAX Mesh Networks, IEEE 61st Vehicular Technology Conference, VTC 2005-Spring, 5, 3102–3106.

  47. Welch, G., & Bishop, G. (2006). An Introduction to the Kalman Filter. Chapel Hill: Dept. of Computer Science, University of North Carolina.

    Google Scholar 

  48. Wellenhof, B. H., Lichtenegger, H., & Collins, J. (2001). Global Positioning System: Theory and Practice (4th ed., pp. 181–200). New York: Springer.

    Book  Google Scholar 

  49. Whitehouse, K., Karlof, C., & Culler, D. (2007). A Practical Evaluation of Radio Signal Strength for Ranging-based Localization. ACM SIGMOBILE Mobile Computing and Communications Review, 11(1), 41–52.

    Article  Google Scholar 

  50. Zeadally, S., Hunt, R., Chen, Y.-S., Irwin, A., & Hassan, A. (2012). Vehicular ad hoc networks (VANETS): status, results, and challenges. Telecommunication Systems, 50(4), 217–241.

    Article  Google Scholar 

Download references

Acknowledgments

The authors are thankful to Manas Khatua and the anonymous Referees for their constructive criticisms, feedback, and help in improving the quality of this work. The work of the second author was done when he was a visiting summer student at IIT Kharagpur. The work of the first author was partially done when he was a Alexander von Humboldt Fellow at the University of Hamburg, Germany.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sudip Misra.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Misra, S., Kapri, N.R. & Wolfinger, B.E. Selfishness-aware target tracking in vehicular mobile WiMAX networks. Telecommun Syst 58, 313–328 (2015). https://doi.org/10.1007/s11235-014-9879-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-014-9879-2

Keywords

Navigation