SlideShare a Scribd company logo
1 of 6
Download to read offline
Dec. 31                                             IJASCSE, VOL 1, ISSUE 4, 2012




          Cluster-based Target Tracking and Recovery
            Algorithm in Wireless Sensor Network
              Mohini Gawande1 (M.E. Student)                                        Veena Gulhane2 (Asst. Professor)
     Department of Computer Science & Engineering                           Department of Computer Science & Engineering
 G. H. Raisoni College of Engineering, Nagpur University                G. H. Raisoni College of Engineering, Nagpur University



Abstract- From the various issues related to WSN, energy                throughout tracking exploitation using dynamic clustered
efficiency is considered as one of the important issue. For one of      network.
the most killer application such as object tracking where the              Rest contents of the paper are organized as follows:
continuous reporting of object is required consumes more energy
                                                                                Section II: Related works of existing cluster- based
of network. As well, recovery mechanism has to be run to locate
the target exact position in case of object loss. In this work we are            tracking techniques and recovery mechanisms.
proposing energy and time conserving recovery technique.                        Section III: Challenges in recovery mechanism
                                                                                Section IV: Network scenario
Keywords- Clustering; Dynamic clustering; Prediction; Target                    Section V: Target tracking
tracking; Target recovery; Wireless sensor network;                             Section VI: Proposed recovery technique
                                                                                Section VII: Conclusion
                       I. INTRODUCTION
The fast evolutions in wireless sensor network, it is potential                             II. RELATED WORKS
to implement the wireless sensor network technology (WSNs)
                                                                        Wireless Sensor Network implementation has several design
in different in several eventualities. Such WSNs is collection
                                                                        challenges such as limited energy, communication failure,
of thousands of little coordinating device known as sensor
                                                                        deployment, network lifetime, accuracy and secure
nodes deployed in a in a very physical environment for sensing
                                                                        communication etc. Dividing the network into groups of node
various events such as speed, light, temperature etc. A wireless
                                                                        as a cluster can considered as a solution to handle these
sensor nodes are square measure battery operated. Such sensor
                                                                        challenges [2]. The light source, based tracking for terrain
node carries restricted and customarily irreplaceable battery
                                                                        observation during night using clusters is mentioned in [3].
power sources. Therefore, the first of WSNs must on power
conservation. Due to such limitations, Sensor nodes might
ends up into energy depletion and network failure. Therefore,           DELTA is one of the distributive algorithm which tracks the
to save energy it is very important for WSN to operate energy           article solely only at constant speed by dynamic clustering and
efficiently.                                                            selection of Cluster Head based on light measurement. The
                                                                        advantage of DELTA is that the communication range of the
In vast number of WSN applications, target tracking is one in           sensor is higher than their sensing range. However, the main
all-important application [1]. The sensors nodes in the vicinity        dispute of this method is that it can deal with constant speed
(area) of an incident should be able to continuously monitor it         only, and varying speed is not considered.
and report to the sink. A various traditional target-tracking
techniques for Wireless Sensor Networks use a centralized               Energy efficient approach, RARE [4] reduces the quantity of
approach. In traditional target tracking strategies, one node at a      node involving in tracking. It consists of two sub algorithms,
time typically performs sensing by resulting in heavy                   first is RARE-Area that ensures nodes with qualitative
computation burden, less accuracy and additional energy                 received data, and second is RARE-Node that reduces the
consumption wherever WSNs every node has terribly                       unnecessary nodes participating in target tracking. For
restricted power. Even if the more than one node performs               multiple moving targets tracking, a tree-based approach STUN
sensing and node fails due to battery drainage then target can          considers leaf nodes to track the targets as presented in [5].
not detected. Hence, next predicted nodes that were purported           Low-Energy Adaptive Clustering Hierarchy [6] reduces the
to be active for tracking target might not have the trace of            energy consumption of every node.
target, inflicting loss of target.
                                                                        In LEACH, sensor network divided into small components is
In this paper, we have a tendency to propose energy efficient           known as clusters and selects one in all as cluster-head.
and quick recovery mechanism (RM) to recover the lost target



www.ijascse.in                                                                                                            Page 72
Dec. 31                                                      IJASCSE, VOL 1, ISSUE 4, 2012




LEACH uses random selection and rotation of the cluster-                       architecture for wireless domains should be able to configure
heads to distribute randomly the energy consumption within                     itself dynamically with the changing network. Mostly, the
the network. LEACH performance can be divided into two                         cluster heads are performs formation of clusters and
parts first is Setup phase and another second is Steady phase.                 maintenance of the configuration of the network. A cluster
Within the setup phase clusters network will formed and a                      head provides resource allocation to all its members. The
cluster head is selected for every cluster. In the second phase,               dynamic nature of any target or mobile nodes, their connection
data is sensed and is sent to the central base station. As nodes               or disconnection to and from clusters disturbs the stability of
are depleted of energy, all the approaches of WSN ought to                     the network. Hence, cluster heads reconfiguration is necessary.
have less communication between one another to conserve                        Rather than waking up all single hop clusters [10] or all double
energy. Many tracking algorithms have already been                             hop clusters during recovery, this approach will find single or
developed [7]-[9].                                                             double hop clusters nearest to target’s next predicted location
                                                                               for saving time and energy of network.

                                                                                   III. CHALLENGES IN RECOVERY MECHANISM
                                                                               Sometimes network fails to trace the target’s trajectory
                                                                               accurately attributable to several reasons as follows:

                                                                               1. Node Failures
                                                                               2. Network Failure
                                                                               3. Deployment
                                                                               4. Localization Errors
                                                                               5. Synchronization
                                                                               6. Data Aggregation
                                                                               7. Data Dissemination
                                                                               8. Prediction Errors
                                                                               9. Uncertain change in target’s velocity/direction
                                                                               10. Hardware malfunction

                                                                               1. Node Failures:
                                                                               Sensor nodes are battery operated and generally irreplaceable.
                                                                               So, even single node failure causes network failure.

                                                                               2. Network Failure:
                                                                               The failure of network occurs due to communication breaks,
                                                                               overload of data, physical disasters etc.
Figure 1 Cluster- Based Sensor Network Architecture for Target Tracking [10]

Recovery mechanism for target recovery using static clustered                  3. Deployment:
(as in figure 1) WSN is mentioned in [10], which is consists of
four phases: (a) loss of target – when target’s current location               Setting up an executive sensor network in a real time or real
is not known, current CH declares target is lost and recovery                  world environment [11] is a Deployment. Sensor nodes can be
mechanism is initiated, (b) search – current CH waits for some                 deployed either by placing them sequentially in a sensor field
time to receive acknowledgement from downstream that is.                       or at random by dropping it from height. Various deployment
From next single hop clusters to reduce the chances of false                   issues are [12, 13]:
initiation of recovery algorithm, (c) active recovery – this
phase consists of three levels throughout recovery (d) sleep –                 3.1. Node dies due to either by normal battery discharge or due
once target is found, clusters that square measure taking part                 to short circuits.
presently in tracking stay awake and remainder of them move
to sleep state. However, RM presented in [10] requires large
number of nodes to be in active state throughout recovery.                     3.2. Network congestion occurs due to many parallel data
                                                                               transmissions made by several sensor nodes simultaneously.
In this paper, we are proposing a dynamic clustered WSN that                   So that even if the two nodes may very close to each other but
provides energy efficient recovery approach that ends up with                  still each one can not communicate due to physical
less communication overhead and less number of active CHs                      interference in the real world instead nodes that are far away
for successful recovery. Multi-hop, multi-cluster network                      from each other may communicate.

www.ijascse.in                                                                                                                       Page 73
Dec. 31                                           IJASCSE, VOL 1, ISSUE 4, 2012




                                                                  interests to its neighbors periodically and then through the
3.3. Low data yield is also one of the common problems in         whole sensor network. In the second step, the nodes having
deployment. Low data yield occurs when network delivers           requested data will reply back to the source node with data.
insufficient amount of information.
                                                                  The key difference between data aggregation and data
3.4. Self-Configured sensor networks is needed due to random      dissemination is that, in data dissemination, all the nodes even
or distributed deployment of sensor nodes in real world           the base station also can request for the data but in data
environment without human participation.                          aggregation periodic data transition of the aggregated data will
                                                                  occur is to the base station.
4. Localization Errors:
When target enters into the area of interest of sensing nodes,    8. Prediction Errors:
distance between target and nodes can calculate by them.          To save the energy, not all clusters should be awake all time.
These distances help during localization of target. Hence, the    In such condition, advanced warning message should be
larger difference between calculated distance and actual          generated by operating cluster heads for its upstream and
distance will result in localization error.                       downstream cluster heads. To do so current CH need to predict
                                                                  future location of target. In this prediction process, minor
                                                                  errors can lead to target loss, since the target’s trajectory may
5. Synchronization:                                               be lost due to a cluster not being woken up in advance.
For real time data collection, the clock synchronization is an
important in sensor networks. Time Synchronization supports
to maintain events synchronization between nodes in the           9. Uncertain change in target’s velocity/direction:
network by providing common time scale for local clocks of        Sudden change in target trajectory may not be handles by
nodes in the network. Global clock synchronization also           monitoring nodes and prediction errors will generate. Some of
require for some applications are navigation guidance,            the applications such as military require reliable and credible
environment monitoring, vehicle tracking etc.                     target tracking. To overcome such problems quick, time saving
                                                                  and energy efficient recovery mechanisms needed.

In sensor network, need to properly coordinate and collaborate    10. Hardware malfunction [15]:
to perform a complex task such as data fusion in which the        Another attribute leads to a lost of target is the inbuilt
data collected from number of sensor nodes and aggregated to      hardware parts of sensor node which may causes malfunction
generate a meaningful result. Lack of synchronization between     or the battery is weakening. In such conditions, routine
sensor nodes then results into the inaccurate data estimation.    maintenance checks must be providing to confirm the integrity
                                                                  of the system that is not possible.
6. Data Aggregation:
                                                                                      IV. NETWORK SCENARIO
 The main objective of the sensors nodes is to periodically
sense the data from the surrounding environment process it        Overall architectural model for target-tracking system is
and transmit it to the sink or base station. Thus, a method for   shown in Figure 1, wherever the fundamental components are
combining the sensed data into accurate and high quality          sensor nodes, that are deployed initially. Once moving target
information is required and this is accomplished through Data     comes into the vicinity of boundary node, boundary sensor
Aggregation.                                                      nodes initiates the continuous sensing.

                                                                  The target-tracking algorithm initiates tracking of target. The
Data Aggregation is the process of collecting or aggregating
                                                                  energy saving operations performs by maintaining various
data from multiple sensors and estimating the desired output
                                                                  states by sensor nodes. Dynamic clustering algorithm also
by eliminating the redundant data and then providing fused
                                                                  applied for power consumption. Finally, the tracking
information to the base station. Therefore, there are some
                                                                  information from every node further sent to the other user
issues for data aggregation as to obtain complete and up to
                                                                  nodes. The proposed strategy for target tracking and recovery
date information from neighboring nodes, improving
                                                                  in wireless sensor networks there are various modules. The
clustering techniques for data gathering, eliminating redundant
                                                                  detailed explanation of every module is as follows.
data transmission etc.
                                                                  The proposed technique assumes the following properties for
7. Data Dissemination:                                            network modeling.
To obtain required data, the queries for the data routed from
node to node in the sensor network. Data dissemination is a
two step process. In which initially node broadcasts its

www.ijascse.in                                                                                                           Page 74
Dec. 31                                                      IJASCSE, VOL 1, ISSUE 4, 2012




                                                                             localization. The boundary node nearest to target sends this
           Sensor                                                            information to CH to perform prediction.
           nodes                                                             2) Prediction: The next predicted location of target depends on
                                                                             current and previous locations of target. Predictions are going
                                                                             to be performed by Current CH as follows:
                                   Dynamic                   Target
       Network                      Cluster                 Tracking         • Predict target’s next location.
     Scenario with                 formation                Algorithm        • Find member nodes in the area of predicted location.
    boundary nodes                 Algorithm                                 • Node nearest to target’s predicted location will wake up only.
                                                                             If no node is present in the vicinity, then only single hop CH
                                                                             wake up, this will become current CH for further tracking.


                                Formation of                 Estimate
           Initial               Cluster &                    Target                  VI. PROPOSED RECOVERY TECHNIQUE
           Target               Cluster Head                 Location
          Detection                                                          In the clustered based tracking network, CH is itself
                                                                             accountable to predict next location of target and establish
                                                                             various next CH to handle further tracking process. In static
                                                                             cluster based network, probability of CH failure is more than
                                                                             the failure of local (member) nodes as it because of
                                                                             communication overhead. The proposed recovery mechanism
                                                                             follows three steps (Figure 3 shows flowchart of tracking and
                              Optimization                Estimation of      recovery):
                               Of target                      target
                               Location                                      1. Announcement of lost of target
                                                        Tracking Error &
                                                             Energy          2. Recovery
                                                          consumption        3. Sleep
                                                                             1) Announcement of lost of target: As continuous target moves
                      Figure 2. Architecture of target tracking system       far from current cluster, current Cluster Head sends warning
                                                                             massage to wake up to the next predicted or selected CH. If
1. The sensor nodes are limited energy and stationary.                       CH is failed due to any of the reason such as Node Failures,
2. All sensor nodes are having constrained energy with a                     Network Failure, Localization Error or Prediction Errors, then
uniform initial energy.                                                      no acknowledgement will receive by current CH from selected
3. Boundary nodes get selected as per boundary node selection                CH. Current CH waits for acknowledgement for some period
procedure [14].                                                              and finally target lost situation can be announced by current
4. Cluster head selection will be depending on energy level of               CH. This step is same as described in [10].
sensor and average energy level of network.
5. The sink node is located some where in the network for data               2) Recovery: As loss of target occurs, current CH initiates true
collection from every cluster-head.                                          recovery process immediately. Detail of recovery method is as
                                                                             given below:
6. Continuous data delivery assumed for network.
7. Dynamic cluster heads selection will perform based on the                 Synonyms:
remaining energy level of every sensor node and entire sensor                NL: Next locations of target
networks. Every sensor node sends their energy information to                PL: Predicted locations
the base station.                                                            SCH: Single hop CH
                                                                             Steps:
                        V. TARGET TRACKING
                                                                             Current CH:
Tracking algorithm [10] for target performs two steps:                       1. Wake up all member nodes.
     i. Localization
                                                                             2. Predict few NL based on previous PL.
     ii. Prediction
                                                                             3. As CH has information about its SCHs, it finds one of
                                                                             them that is not fail and nearest to NL.
1) Localization: Boundary nodes exchange their information
with one another to identify the nodes who also have detected                4. Wake up this SCH.
the target. Such three nodes found then trilateration                        5. If (any of NL is in vicinity of selected SCH) Selected SCH:
mechanism is initiated. Otherwise, wake message send by                         a. Wake up all member nodes.
boundary nodes to its single hop neighbors to perform                           b. Become current CH.

www.ijascse.in                                                                                                                     Page 75
Dec. 31                                                 IJASCSE, VOL 1, ISSUE 4, 2012




  c. Locate target using trilateration and start tracking.                                       VII. CONCLUSION
  d. Send acknowledgement to current CH.                                This paper focused on the various problems of loss of target
      Else                                                              trajectory in a target tracking wireless sensor network. For
        a. Make selected SCH as current CH temporarily.                 WSNs to be used effectively and reliably, by considering
        b. Follow step 1-5 until the target will recover.               energy and time saving issue for target tracking, quick and
3) Sleep: Once target recovered, only currently tracking nodes          additional correct recovery mechanisms has been given in this
stay active and remaining will go in sleep mode, same as in             paper.
[10].

                                                                                                    REFERENCES

                                                                        [1] F. Martincic and L. Schwiebert, “Introduction to Wireless Sensor
                                                                        Networking” In Ivan Stojmenovic (Ed.): Handbook of Sensor
                                                                        Networks: Algorithms and Architectures, John Wiley & Sons, 2005,
                                  START                                 pp. 22-61

                                                                        [2] P. Kumarawadu, D. J. Dechene, M. Luccini, and A. Sauer,
                        Boundary nodes are found                        "Algorithms for Node Clustering in Wireless Sensor Networks: A
                                                                        Survey," Proc. of Information and Automation for Sustainability,
                                                                        2008. ICIAFS 2008, 12-14 Dec. 2008, pp. 295- 300

                                                                        [3] M. Walchli, P. Skoczylas, M. Meer and T. Braun, “Distributed
                    Cluster based n/w is formed and
                                                                        Event Localization and Tracking with Wireless Sensors,” in
                   Cluster Head (CH) selected on the                    Proceedings of the 5th international Conference on Wired/Wireless
                         basis of nodes energy                          internet Communications, May 23 - 25, 2007.

                                                                        [4] E. Olule, G. Wang, M. Guo and M. Dong, "RARE: An Energy-
                       Only Boundary nodes will                         Efficient Target Tracking Protocol for Wireless Sensor Networks,"
                             remain active                              Proc. of Parallel Processing Workshops, 2007. ICPPW 2007, 10-14
                                                                        Sept. 2007, pp.76
           Target entered into
           network                                                      [5] H.T. Kung and D. Vlah, “Efficient Location Tracking Using
                                                                        Sensor Networks,” Proc. of the IEEE Wireless Communications and
                          Tracking/Localization                         Networking Conference (WCNC 2003), New Orleans, Louisiana,
                                of target                               USA, March 2003, pp. 1954-1961

                                                                        [6] Chan, H, Luk, M, Perrig,"Using clustering information for sensor
                                                                        network localization", in: Proceedings of the International Conference
                        Prediction of Target’s next                     on Distributed Computing in Sensor Systems (DCOSS’05), 2005.
                                 location
                                                                        [7] Y. Xu, J. Winter and W.-C. Lee, “Prediction-based strategies for
                                                                        energy saving in object tracking sensor networks," Proc. Of Mobile
                 Select next CH based on predicted location             Data Management 2004, 2004, pp. 346- 357

                                                                        [8] Y. Xu, J. Winter and W.-C. Lee, "Dual prediction-based reporting
                                                                        for object tracking sensor networks," Proc. of Mobile and Ubiquitous
                           Recovery Mechanism                           Systems: Networking and Services, 2004. MOBIQUITOUS 2004. 22-
                                                                        26 Aug. 2004, pp. 154- 163

                   Successful recovery of target                        [9] H.T. Kung and D. Vlah, “Efficient Location Tracking Using
                                                                        Sensor Networks,” Proc. of the IEEE Wireless Communications and
                                                                        Networking Conference (WCNC 2003), New Orleans, Louisiana,
                                                                        USA, March 2003, pp. 1954-1961
                                  STOP
                                                                        [10] A. Khare, K.M. Sivalingam, "On recovery of lost targets in a
                                                                        cluster-based wireless sensor network," Proc. of Pervasive Computing
                                                                        and Communications Workshops (PERCOM Workshops), 21-25
          Figure 3: Target Tracking and Recovery Flowchart
                                                                        March 2011, pp.208-213

                                                                        [11] Matthias Ringwald, Kay Romer, “Deployment of Sensor
                                                                        Networks: Problems and Passive Inspection”, in proceedings of Fifth


www.ijascse.in                                                                                                                     Page 76
Dec. 31                                               IJASCSE, VOL 1, ISSUE 4, 2012




International workshop on Intelligent solutions in embedded systems,
Madrid, Spain 2007.

[12] Ashar Ahmed et.al, “Wired Vs Wireless Deployment Support for
Wireless sensor Networks”, TENCON 2006, IEEE region 10
conference, pp 1-3.

[13] J.Li, Y Bai, Haixing Ji and D. Qian, “POWER: Planning and
Deployment Platform for Wireless Sensor Networks”, in proceedings
of the Fifth International Conference on Grid and Cooperative
Computing Workshops (GCCW’06), IEEE 2006.

[14] P.K. Sahoo, K. Hsieh, J. Sheu, “Boundary Node Selection and
Target Detection in Wireless Sensor Network”, Proc. IEEE, 1-4244-
1005-3/IEEE 2007.

[15] F. Lalooses, H. Susanto and C.H. Chang, “An Approach for
Tracking Wildlife Using Wireless Sensor Networks,” Proc. of the
International Workshop on Wireless Sensor Networks (NOTERE
2007), IEEE, Marrakesh, Morocco, 2007




www.ijascse.in                                                                        Page 77

More Related Content

What's hot

Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...IJERD Editor
 
A cell based clustering algorithm in large wireless sensor networks
A cell based clustering algorithm in large wireless sensor networksA cell based clustering algorithm in large wireless sensor networks
A cell based clustering algorithm in large wireless sensor networksambitlick
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Surveyijsrd.com
 
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor NetworksAccurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networksambitlick
 
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksSpread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksIDES Editor
 
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...IDES Editor
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
 
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ijasuc
 
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor NetworksEnergy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor NetworksIDES Editor
 
Computing localized power efficient data
Computing localized power efficient dataComputing localized power efficient data
Computing localized power efficient dataambitlick
 
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...Editor IJCATR
 
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...CSCJournals
 
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORKAN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORKijceronline
 
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...IJASCSE
 
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSNBOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSNijngnjournal
 

What's hot (18)

Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
 
A cell based clustering algorithm in large wireless sensor networks
A cell based clustering algorithm in large wireless sensor networksA cell based clustering algorithm in large wireless sensor networks
A cell based clustering algorithm in large wireless sensor networks
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
 
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor NetworksAccurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
 
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksSpread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
 
196 202
196 202196 202
196 202
 
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
 
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
 
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor NetworksEnergy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks
 
Report
ReportReport
Report
 
Ms2420992102
Ms2420992102Ms2420992102
Ms2420992102
 
Computing localized power efficient data
Computing localized power efficient dataComputing localized power efficient data
Computing localized power efficient data
 
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
 
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...
 
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORKAN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
 
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
 
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSNBOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
 

Similar to Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network

A seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networksA seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networkspraveen369
 
Node clustering in wireless sensor
Node clustering in wireless sensorNode clustering in wireless sensor
Node clustering in wireless sensorambitlick
 
Efficient Cluster Head Selection in Wireless Sensor Networks.
Efficient Cluster Head Selection in Wireless  Sensor Networks.Efficient Cluster Head Selection in Wireless  Sensor Networks.
Efficient Cluster Head Selection in Wireless Sensor Networks.Sanjay Shelar
 
ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...
ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...
ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...ijwmn
 
Energy consumption mitigation routing protocols for large wsn's final
Energy consumption mitigation  routing protocols for large wsn's finalEnergy consumption mitigation  routing protocols for large wsn's final
Energy consumption mitigation routing protocols for large wsn's finalsumavaidya90
 
De3211001104
De3211001104De3211001104
De3211001104IJMER
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...cscpconf
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
Challenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksChallenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksAuwal Amshi
 
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...IJCNCJournal
 
Ca mwsn clustering algorithm for mobile wireless senor network [
Ca mwsn clustering algorithm for mobile wireless senor network  [Ca mwsn clustering algorithm for mobile wireless senor network  [
Ca mwsn clustering algorithm for mobile wireless senor network [graphhoc
 
CA-MWSN: CLUSTERING ALGORITHM FOR MOBILE WIRELESS SENOR NETWORK
CA-MWSN: CLUSTERING ALGORITHM FOR MOBILE WIRELESS SENOR NETWORKCA-MWSN: CLUSTERING ALGORITHM FOR MOBILE WIRELESS SENOR NETWORK
CA-MWSN: CLUSTERING ALGORITHM FOR MOBILE WIRELESS SENOR NETWORKFransiskeran
 
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )ijassn
 

Similar to Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network (20)

358 365
358 365358 365
358 365
 
A seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networksA seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networks
 
Node clustering in wireless sensor
Node clustering in wireless sensorNode clustering in wireless sensor
Node clustering in wireless sensor
 
Jm2416491652
Jm2416491652Jm2416491652
Jm2416491652
 
Efficient Cluster Head Selection in Wireless Sensor Networks.
Efficient Cluster Head Selection in Wireless  Sensor Networks.Efficient Cluster Head Selection in Wireless  Sensor Networks.
Efficient Cluster Head Selection in Wireless Sensor Networks.
 
Ijetr021229
Ijetr021229Ijetr021229
Ijetr021229
 
Ijetr021229
Ijetr021229Ijetr021229
Ijetr021229
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...
ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...
ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...
 
Energy consumption mitigation routing protocols for large wsn's final
Energy consumption mitigation  routing protocols for large wsn's finalEnergy consumption mitigation  routing protocols for large wsn's final
Energy consumption mitigation routing protocols for large wsn's final
 
De3211001104
De3211001104De3211001104
De3211001104
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
 
Cn24588592
Cn24588592Cn24588592
Cn24588592
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
Challenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksChallenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networks
 
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
 
Ca mwsn clustering algorithm for mobile wireless senor network [
Ca mwsn clustering algorithm for mobile wireless senor network  [Ca mwsn clustering algorithm for mobile wireless senor network  [
Ca mwsn clustering algorithm for mobile wireless senor network [
 
CA-MWSN: CLUSTERING ALGORITHM FOR MOBILE WIRELESS SENOR NETWORK
CA-MWSN: CLUSTERING ALGORITHM FOR MOBILE WIRELESS SENOR NETWORKCA-MWSN: CLUSTERING ALGORITHM FOR MOBILE WIRELESS SENOR NETWORK
CA-MWSN: CLUSTERING ALGORITHM FOR MOBILE WIRELESS SENOR NETWORK
 
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
 

More from IJASCSE

Inter Time Series Sales Forecasting
Inter Time Series Sales ForecastingInter Time Series Sales Forecasting
Inter Time Series Sales ForecastingIJASCSE
 
Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...
Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...
Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...IJASCSE
 
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...IJASCSE
 
Improving Utilization of Infrastructure Cloud
Improving Utilization of Infrastructure CloudImproving Utilization of Infrastructure Cloud
Improving Utilization of Infrastructure CloudIJASCSE
 
Four Side Distance: A New Fourier Shape Signature
Four Side Distance: A New Fourier Shape SignatureFour Side Distance: A New Fourier Shape Signature
Four Side Distance: A New Fourier Shape SignatureIJASCSE
 
Theoretical study of axially compressed Cold Formed Steel Sections
Theoretical study of axially compressed Cold Formed Steel SectionsTheoretical study of axially compressed Cold Formed Steel Sections
Theoretical study of axially compressed Cold Formed Steel SectionsIJASCSE
 
Improved Performance of Unsupervised Method by Renovated K-Means
Improved Performance of Unsupervised Method by Renovated K-MeansImproved Performance of Unsupervised Method by Renovated K-Means
Improved Performance of Unsupervised Method by Renovated K-MeansIJASCSE
 
A Study on the Effectiveness of Computer Games in Teaching and Learning
A Study on the Effectiveness of Computer Games in Teaching and LearningA Study on the Effectiveness of Computer Games in Teaching and Learning
A Study on the Effectiveness of Computer Games in Teaching and LearningIJASCSE
 
Design Equation for CFRP strengthened Cold Formed Steel Channel Column Sections
Design Equation for CFRP strengthened Cold Formed Steel Channel Column SectionsDesign Equation for CFRP strengthened Cold Formed Steel Channel Column Sections
Design Equation for CFRP strengthened Cold Formed Steel Channel Column SectionsIJASCSE
 
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...IJASCSE
 
A Study on Thermal behavior of Nano film as thermal interface layer
A Study on Thermal behavior of Nano film as thermal interface layerA Study on Thermal behavior of Nano film as thermal interface layer
A Study on Thermal behavior of Nano film as thermal interface layerIJASCSE
 
Performance analysis of a model predictive unified power flow controller (MPU...
Performance analysis of a model predictive unified power flow controller (MPU...Performance analysis of a model predictive unified power flow controller (MPU...
Performance analysis of a model predictive unified power flow controller (MPU...IJASCSE
 
Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...
Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...
Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...IJASCSE
 
Evaluation of Exception Handling Metrics
Evaluation of Exception Handling MetricsEvaluation of Exception Handling Metrics
Evaluation of Exception Handling MetricsIJASCSE
 
Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...
Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...
Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...IJASCSE
 
An effect of synthesis parameters on structural properties of AlN thin films ...
An effect of synthesis parameters on structural properties of AlN thin films ...An effect of synthesis parameters on structural properties of AlN thin films ...
An effect of synthesis parameters on structural properties of AlN thin films ...IJASCSE
 
Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...
Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...
Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...IJASCSE
 
Portfolio Analysis in US stock market using Markowitz model
Portfolio Analysis in US stock market using Markowitz modelPortfolio Analysis in US stock market using Markowitz model
Portfolio Analysis in US stock market using Markowitz modelIJASCSE
 
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...IJASCSE
 
Study on momentum density in magnetic semiconductor MnTe by positron annihila...
Study on momentum density in magnetic semiconductor MnTe by positron annihila...Study on momentum density in magnetic semiconductor MnTe by positron annihila...
Study on momentum density in magnetic semiconductor MnTe by positron annihila...IJASCSE
 

More from IJASCSE (20)

Inter Time Series Sales Forecasting
Inter Time Series Sales ForecastingInter Time Series Sales Forecasting
Inter Time Series Sales Forecasting
 
Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...
Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...
Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...
 
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...
 
Improving Utilization of Infrastructure Cloud
Improving Utilization of Infrastructure CloudImproving Utilization of Infrastructure Cloud
Improving Utilization of Infrastructure Cloud
 
Four Side Distance: A New Fourier Shape Signature
Four Side Distance: A New Fourier Shape SignatureFour Side Distance: A New Fourier Shape Signature
Four Side Distance: A New Fourier Shape Signature
 
Theoretical study of axially compressed Cold Formed Steel Sections
Theoretical study of axially compressed Cold Formed Steel SectionsTheoretical study of axially compressed Cold Formed Steel Sections
Theoretical study of axially compressed Cold Formed Steel Sections
 
Improved Performance of Unsupervised Method by Renovated K-Means
Improved Performance of Unsupervised Method by Renovated K-MeansImproved Performance of Unsupervised Method by Renovated K-Means
Improved Performance of Unsupervised Method by Renovated K-Means
 
A Study on the Effectiveness of Computer Games in Teaching and Learning
A Study on the Effectiveness of Computer Games in Teaching and LearningA Study on the Effectiveness of Computer Games in Teaching and Learning
A Study on the Effectiveness of Computer Games in Teaching and Learning
 
Design Equation for CFRP strengthened Cold Formed Steel Channel Column Sections
Design Equation for CFRP strengthened Cold Formed Steel Channel Column SectionsDesign Equation for CFRP strengthened Cold Formed Steel Channel Column Sections
Design Equation for CFRP strengthened Cold Formed Steel Channel Column Sections
 
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
 
A Study on Thermal behavior of Nano film as thermal interface layer
A Study on Thermal behavior of Nano film as thermal interface layerA Study on Thermal behavior of Nano film as thermal interface layer
A Study on Thermal behavior of Nano film as thermal interface layer
 
Performance analysis of a model predictive unified power flow controller (MPU...
Performance analysis of a model predictive unified power flow controller (MPU...Performance analysis of a model predictive unified power flow controller (MPU...
Performance analysis of a model predictive unified power flow controller (MPU...
 
Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...
Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...
Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...
 
Evaluation of Exception Handling Metrics
Evaluation of Exception Handling MetricsEvaluation of Exception Handling Metrics
Evaluation of Exception Handling Metrics
 
Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...
Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...
Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...
 
An effect of synthesis parameters on structural properties of AlN thin films ...
An effect of synthesis parameters on structural properties of AlN thin films ...An effect of synthesis parameters on structural properties of AlN thin films ...
An effect of synthesis parameters on structural properties of AlN thin films ...
 
Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...
Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...
Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...
 
Portfolio Analysis in US stock market using Markowitz model
Portfolio Analysis in US stock market using Markowitz modelPortfolio Analysis in US stock market using Markowitz model
Portfolio Analysis in US stock market using Markowitz model
 
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
 
Study on momentum density in magnetic semiconductor MnTe by positron annihila...
Study on momentum density in magnetic semiconductor MnTe by positron annihila...Study on momentum density in magnetic semiconductor MnTe by positron annihila...
Study on momentum density in magnetic semiconductor MnTe by positron annihila...
 

Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network

  • 1. Dec. 31 IJASCSE, VOL 1, ISSUE 4, 2012 Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network Mohini Gawande1 (M.E. Student) Veena Gulhane2 (Asst. Professor) Department of Computer Science & Engineering Department of Computer Science & Engineering G. H. Raisoni College of Engineering, Nagpur University G. H. Raisoni College of Engineering, Nagpur University Abstract- From the various issues related to WSN, energy throughout tracking exploitation using dynamic clustered efficiency is considered as one of the important issue. For one of network. the most killer application such as object tracking where the Rest contents of the paper are organized as follows: continuous reporting of object is required consumes more energy  Section II: Related works of existing cluster- based of network. As well, recovery mechanism has to be run to locate the target exact position in case of object loss. In this work we are tracking techniques and recovery mechanisms. proposing energy and time conserving recovery technique.  Section III: Challenges in recovery mechanism  Section IV: Network scenario Keywords- Clustering; Dynamic clustering; Prediction; Target  Section V: Target tracking tracking; Target recovery; Wireless sensor network;  Section VI: Proposed recovery technique  Section VII: Conclusion I. INTRODUCTION The fast evolutions in wireless sensor network, it is potential II. RELATED WORKS to implement the wireless sensor network technology (WSNs) Wireless Sensor Network implementation has several design in different in several eventualities. Such WSNs is collection challenges such as limited energy, communication failure, of thousands of little coordinating device known as sensor deployment, network lifetime, accuracy and secure nodes deployed in a in a very physical environment for sensing communication etc. Dividing the network into groups of node various events such as speed, light, temperature etc. A wireless as a cluster can considered as a solution to handle these sensor nodes are square measure battery operated. Such sensor challenges [2]. The light source, based tracking for terrain node carries restricted and customarily irreplaceable battery observation during night using clusters is mentioned in [3]. power sources. Therefore, the first of WSNs must on power conservation. Due to such limitations, Sensor nodes might ends up into energy depletion and network failure. Therefore, DELTA is one of the distributive algorithm which tracks the to save energy it is very important for WSN to operate energy article solely only at constant speed by dynamic clustering and efficiently. selection of Cluster Head based on light measurement. The advantage of DELTA is that the communication range of the In vast number of WSN applications, target tracking is one in sensor is higher than their sensing range. However, the main all-important application [1]. The sensors nodes in the vicinity dispute of this method is that it can deal with constant speed (area) of an incident should be able to continuously monitor it only, and varying speed is not considered. and report to the sink. A various traditional target-tracking techniques for Wireless Sensor Networks use a centralized Energy efficient approach, RARE [4] reduces the quantity of approach. In traditional target tracking strategies, one node at a node involving in tracking. It consists of two sub algorithms, time typically performs sensing by resulting in heavy first is RARE-Area that ensures nodes with qualitative computation burden, less accuracy and additional energy received data, and second is RARE-Node that reduces the consumption wherever WSNs every node has terribly unnecessary nodes participating in target tracking. For restricted power. Even if the more than one node performs multiple moving targets tracking, a tree-based approach STUN sensing and node fails due to battery drainage then target can considers leaf nodes to track the targets as presented in [5]. not detected. Hence, next predicted nodes that were purported Low-Energy Adaptive Clustering Hierarchy [6] reduces the to be active for tracking target might not have the trace of energy consumption of every node. target, inflicting loss of target. In LEACH, sensor network divided into small components is In this paper, we have a tendency to propose energy efficient known as clusters and selects one in all as cluster-head. and quick recovery mechanism (RM) to recover the lost target www.ijascse.in Page 72
  • 2. Dec. 31 IJASCSE, VOL 1, ISSUE 4, 2012 LEACH uses random selection and rotation of the cluster- architecture for wireless domains should be able to configure heads to distribute randomly the energy consumption within itself dynamically with the changing network. Mostly, the the network. LEACH performance can be divided into two cluster heads are performs formation of clusters and parts first is Setup phase and another second is Steady phase. maintenance of the configuration of the network. A cluster Within the setup phase clusters network will formed and a head provides resource allocation to all its members. The cluster head is selected for every cluster. In the second phase, dynamic nature of any target or mobile nodes, their connection data is sensed and is sent to the central base station. As nodes or disconnection to and from clusters disturbs the stability of are depleted of energy, all the approaches of WSN ought to the network. Hence, cluster heads reconfiguration is necessary. have less communication between one another to conserve Rather than waking up all single hop clusters [10] or all double energy. Many tracking algorithms have already been hop clusters during recovery, this approach will find single or developed [7]-[9]. double hop clusters nearest to target’s next predicted location for saving time and energy of network. III. CHALLENGES IN RECOVERY MECHANISM Sometimes network fails to trace the target’s trajectory accurately attributable to several reasons as follows: 1. Node Failures 2. Network Failure 3. Deployment 4. Localization Errors 5. Synchronization 6. Data Aggregation 7. Data Dissemination 8. Prediction Errors 9. Uncertain change in target’s velocity/direction 10. Hardware malfunction 1. Node Failures: Sensor nodes are battery operated and generally irreplaceable. So, even single node failure causes network failure. 2. Network Failure: The failure of network occurs due to communication breaks, overload of data, physical disasters etc. Figure 1 Cluster- Based Sensor Network Architecture for Target Tracking [10] Recovery mechanism for target recovery using static clustered 3. Deployment: (as in figure 1) WSN is mentioned in [10], which is consists of four phases: (a) loss of target – when target’s current location Setting up an executive sensor network in a real time or real is not known, current CH declares target is lost and recovery world environment [11] is a Deployment. Sensor nodes can be mechanism is initiated, (b) search – current CH waits for some deployed either by placing them sequentially in a sensor field time to receive acknowledgement from downstream that is. or at random by dropping it from height. Various deployment From next single hop clusters to reduce the chances of false issues are [12, 13]: initiation of recovery algorithm, (c) active recovery – this phase consists of three levels throughout recovery (d) sleep – 3.1. Node dies due to either by normal battery discharge or due once target is found, clusters that square measure taking part to short circuits. presently in tracking stay awake and remainder of them move to sleep state. However, RM presented in [10] requires large number of nodes to be in active state throughout recovery. 3.2. Network congestion occurs due to many parallel data transmissions made by several sensor nodes simultaneously. In this paper, we are proposing a dynamic clustered WSN that So that even if the two nodes may very close to each other but provides energy efficient recovery approach that ends up with still each one can not communicate due to physical less communication overhead and less number of active CHs interference in the real world instead nodes that are far away for successful recovery. Multi-hop, multi-cluster network from each other may communicate. www.ijascse.in Page 73
  • 3. Dec. 31 IJASCSE, VOL 1, ISSUE 4, 2012 interests to its neighbors periodically and then through the 3.3. Low data yield is also one of the common problems in whole sensor network. In the second step, the nodes having deployment. Low data yield occurs when network delivers requested data will reply back to the source node with data. insufficient amount of information. The key difference between data aggregation and data 3.4. Self-Configured sensor networks is needed due to random dissemination is that, in data dissemination, all the nodes even or distributed deployment of sensor nodes in real world the base station also can request for the data but in data environment without human participation. aggregation periodic data transition of the aggregated data will occur is to the base station. 4. Localization Errors: When target enters into the area of interest of sensing nodes, 8. Prediction Errors: distance between target and nodes can calculate by them. To save the energy, not all clusters should be awake all time. These distances help during localization of target. Hence, the In such condition, advanced warning message should be larger difference between calculated distance and actual generated by operating cluster heads for its upstream and distance will result in localization error. downstream cluster heads. To do so current CH need to predict future location of target. In this prediction process, minor errors can lead to target loss, since the target’s trajectory may 5. Synchronization: be lost due to a cluster not being woken up in advance. For real time data collection, the clock synchronization is an important in sensor networks. Time Synchronization supports to maintain events synchronization between nodes in the 9. Uncertain change in target’s velocity/direction: network by providing common time scale for local clocks of Sudden change in target trajectory may not be handles by nodes in the network. Global clock synchronization also monitoring nodes and prediction errors will generate. Some of require for some applications are navigation guidance, the applications such as military require reliable and credible environment monitoring, vehicle tracking etc. target tracking. To overcome such problems quick, time saving and energy efficient recovery mechanisms needed. In sensor network, need to properly coordinate and collaborate 10. Hardware malfunction [15]: to perform a complex task such as data fusion in which the Another attribute leads to a lost of target is the inbuilt data collected from number of sensor nodes and aggregated to hardware parts of sensor node which may causes malfunction generate a meaningful result. Lack of synchronization between or the battery is weakening. In such conditions, routine sensor nodes then results into the inaccurate data estimation. maintenance checks must be providing to confirm the integrity of the system that is not possible. 6. Data Aggregation: IV. NETWORK SCENARIO The main objective of the sensors nodes is to periodically sense the data from the surrounding environment process it Overall architectural model for target-tracking system is and transmit it to the sink or base station. Thus, a method for shown in Figure 1, wherever the fundamental components are combining the sensed data into accurate and high quality sensor nodes, that are deployed initially. Once moving target information is required and this is accomplished through Data comes into the vicinity of boundary node, boundary sensor Aggregation. nodes initiates the continuous sensing. The target-tracking algorithm initiates tracking of target. The Data Aggregation is the process of collecting or aggregating energy saving operations performs by maintaining various data from multiple sensors and estimating the desired output states by sensor nodes. Dynamic clustering algorithm also by eliminating the redundant data and then providing fused applied for power consumption. Finally, the tracking information to the base station. Therefore, there are some information from every node further sent to the other user issues for data aggregation as to obtain complete and up to nodes. The proposed strategy for target tracking and recovery date information from neighboring nodes, improving in wireless sensor networks there are various modules. The clustering techniques for data gathering, eliminating redundant detailed explanation of every module is as follows. data transmission etc. The proposed technique assumes the following properties for 7. Data Dissemination: network modeling. To obtain required data, the queries for the data routed from node to node in the sensor network. Data dissemination is a two step process. In which initially node broadcasts its www.ijascse.in Page 74
  • 4. Dec. 31 IJASCSE, VOL 1, ISSUE 4, 2012 localization. The boundary node nearest to target sends this Sensor information to CH to perform prediction. nodes 2) Prediction: The next predicted location of target depends on current and previous locations of target. Predictions are going to be performed by Current CH as follows: Dynamic Target Network Cluster Tracking • Predict target’s next location. Scenario with formation Algorithm • Find member nodes in the area of predicted location. boundary nodes Algorithm • Node nearest to target’s predicted location will wake up only. If no node is present in the vicinity, then only single hop CH wake up, this will become current CH for further tracking. Formation of Estimate Initial Cluster & Target VI. PROPOSED RECOVERY TECHNIQUE Target Cluster Head Location Detection In the clustered based tracking network, CH is itself accountable to predict next location of target and establish various next CH to handle further tracking process. In static cluster based network, probability of CH failure is more than the failure of local (member) nodes as it because of communication overhead. The proposed recovery mechanism follows three steps (Figure 3 shows flowchart of tracking and Optimization Estimation of recovery): Of target target Location 1. Announcement of lost of target Tracking Error & Energy 2. Recovery consumption 3. Sleep 1) Announcement of lost of target: As continuous target moves Figure 2. Architecture of target tracking system far from current cluster, current Cluster Head sends warning massage to wake up to the next predicted or selected CH. If 1. The sensor nodes are limited energy and stationary. CH is failed due to any of the reason such as Node Failures, 2. All sensor nodes are having constrained energy with a Network Failure, Localization Error or Prediction Errors, then uniform initial energy. no acknowledgement will receive by current CH from selected 3. Boundary nodes get selected as per boundary node selection CH. Current CH waits for acknowledgement for some period procedure [14]. and finally target lost situation can be announced by current 4. Cluster head selection will be depending on energy level of CH. This step is same as described in [10]. sensor and average energy level of network. 5. The sink node is located some where in the network for data 2) Recovery: As loss of target occurs, current CH initiates true collection from every cluster-head. recovery process immediately. Detail of recovery method is as given below: 6. Continuous data delivery assumed for network. 7. Dynamic cluster heads selection will perform based on the Synonyms: remaining energy level of every sensor node and entire sensor NL: Next locations of target networks. Every sensor node sends their energy information to PL: Predicted locations the base station. SCH: Single hop CH Steps: V. TARGET TRACKING Current CH: Tracking algorithm [10] for target performs two steps: 1. Wake up all member nodes. i. Localization 2. Predict few NL based on previous PL. ii. Prediction 3. As CH has information about its SCHs, it finds one of them that is not fail and nearest to NL. 1) Localization: Boundary nodes exchange their information with one another to identify the nodes who also have detected 4. Wake up this SCH. the target. Such three nodes found then trilateration 5. If (any of NL is in vicinity of selected SCH) Selected SCH: mechanism is initiated. Otherwise, wake message send by a. Wake up all member nodes. boundary nodes to its single hop neighbors to perform b. Become current CH. www.ijascse.in Page 75
  • 5. Dec. 31 IJASCSE, VOL 1, ISSUE 4, 2012 c. Locate target using trilateration and start tracking. VII. CONCLUSION d. Send acknowledgement to current CH. This paper focused on the various problems of loss of target Else trajectory in a target tracking wireless sensor network. For a. Make selected SCH as current CH temporarily. WSNs to be used effectively and reliably, by considering b. Follow step 1-5 until the target will recover. energy and time saving issue for target tracking, quick and 3) Sleep: Once target recovered, only currently tracking nodes additional correct recovery mechanisms has been given in this stay active and remaining will go in sleep mode, same as in paper. [10]. REFERENCES [1] F. Martincic and L. Schwiebert, “Introduction to Wireless Sensor Networking” In Ivan Stojmenovic (Ed.): Handbook of Sensor Networks: Algorithms and Architectures, John Wiley & Sons, 2005, START pp. 22-61 [2] P. Kumarawadu, D. J. Dechene, M. Luccini, and A. Sauer, Boundary nodes are found "Algorithms for Node Clustering in Wireless Sensor Networks: A Survey," Proc. of Information and Automation for Sustainability, 2008. ICIAFS 2008, 12-14 Dec. 2008, pp. 295- 300 [3] M. Walchli, P. Skoczylas, M. Meer and T. Braun, “Distributed Cluster based n/w is formed and Event Localization and Tracking with Wireless Sensors,” in Cluster Head (CH) selected on the Proceedings of the 5th international Conference on Wired/Wireless basis of nodes energy internet Communications, May 23 - 25, 2007. [4] E. Olule, G. Wang, M. Guo and M. Dong, "RARE: An Energy- Only Boundary nodes will Efficient Target Tracking Protocol for Wireless Sensor Networks," remain active Proc. of Parallel Processing Workshops, 2007. ICPPW 2007, 10-14 Sept. 2007, pp.76 Target entered into network [5] H.T. Kung and D. Vlah, “Efficient Location Tracking Using Sensor Networks,” Proc. of the IEEE Wireless Communications and Tracking/Localization Networking Conference (WCNC 2003), New Orleans, Louisiana, of target USA, March 2003, pp. 1954-1961 [6] Chan, H, Luk, M, Perrig,"Using clustering information for sensor network localization", in: Proceedings of the International Conference Prediction of Target’s next on Distributed Computing in Sensor Systems (DCOSS’05), 2005. location [7] Y. Xu, J. Winter and W.-C. Lee, “Prediction-based strategies for energy saving in object tracking sensor networks," Proc. Of Mobile Select next CH based on predicted location Data Management 2004, 2004, pp. 346- 357 [8] Y. Xu, J. Winter and W.-C. Lee, "Dual prediction-based reporting for object tracking sensor networks," Proc. of Mobile and Ubiquitous Recovery Mechanism Systems: Networking and Services, 2004. MOBIQUITOUS 2004. 22- 26 Aug. 2004, pp. 154- 163 Successful recovery of target [9] H.T. Kung and D. Vlah, “Efficient Location Tracking Using Sensor Networks,” Proc. of the IEEE Wireless Communications and Networking Conference (WCNC 2003), New Orleans, Louisiana, USA, March 2003, pp. 1954-1961 STOP [10] A. Khare, K.M. Sivalingam, "On recovery of lost targets in a cluster-based wireless sensor network," Proc. of Pervasive Computing and Communications Workshops (PERCOM Workshops), 21-25 Figure 3: Target Tracking and Recovery Flowchart March 2011, pp.208-213 [11] Matthias Ringwald, Kay Romer, “Deployment of Sensor Networks: Problems and Passive Inspection”, in proceedings of Fifth www.ijascse.in Page 76
  • 6. Dec. 31 IJASCSE, VOL 1, ISSUE 4, 2012 International workshop on Intelligent solutions in embedded systems, Madrid, Spain 2007. [12] Ashar Ahmed et.al, “Wired Vs Wireless Deployment Support for Wireless sensor Networks”, TENCON 2006, IEEE region 10 conference, pp 1-3. [13] J.Li, Y Bai, Haixing Ji and D. Qian, “POWER: Planning and Deployment Platform for Wireless Sensor Networks”, in proceedings of the Fifth International Conference on Grid and Cooperative Computing Workshops (GCCW’06), IEEE 2006. [14] P.K. Sahoo, K. Hsieh, J. Sheu, “Boundary Node Selection and Target Detection in Wireless Sensor Network”, Proc. IEEE, 1-4244- 1005-3/IEEE 2007. [15] F. Lalooses, H. Susanto and C.H. Chang, “An Approach for Tracking Wildlife Using Wireless Sensor Networks,” Proc. of the International Workshop on Wireless Sensor Networks (NOTERE 2007), IEEE, Marrakesh, Morocco, 2007 www.ijascse.in Page 77