SlideShare a Scribd company logo
your name
your name
INTRODUCTION
The Target tracking in mobile sensor network
is defined as finding or tracing the location
and time informaion of mobile (electronic
device) which is to be tracked by using
sensors in a connected region wirelessly.
Wireless Target tracking in mobile sensor
network is shown below
your name
COMPONENTS OF MOBILE
SENSOR NETWORK FOR
TRACKINGComponents of mobile sensor network for
traking are:
Sensor
Mobile
Monitor
Network
your name
SYSTEM ANALYSIS
Existing System
However these existing solutions can only be
used to deal with adversaries who have only
local view of network traffic , for example the
adversaries may decide to deploy his own set of
sensor nodes to monitor the communication in
the target network.However all these existing
methods assume that the adversary is a local
eavesdropper.If an adversary has the global
knowledge of the network traffic , it can easily
defeat these schemes.
Disadvantage: These existing approaches assume
a weak adversary model where the adversary
sees only local network traffic.
your name
Proposed system
We are primarily interested in target tracking by
considering both moving targets and mobile
sensors.Specifically ,we are interested in the
spatial resolution for localizing a target’s
trajectory .
The spatial resolution refers to how accurate a
target’s position can be measured by sensors ,and
defined as the worst-case deviation between the
estimated and the actual paths in wireless sensor
networks. Our main objectives are to establish the
theoretical framework for target tracking in
mobile sensor networks, and quantitatively
demonstrate how the mobility can be exploited to
improve the tracking performance.
your name
SOFTWARE REQUIREMENT
SPECIFICATION
• Software Specification:
Operating System : windows 7
Coding language : c#.Net4.0
Database : SQL server2013
• Minimum Hardware Specification:
System Processor :PentiumIV2.4Ghz
Hard disk :40GB
Floppy derive :1.44Mb
Monitor :15 VGA colour
Mouse :Logitech
Ram :512Mb
your name
TARGET TRACKING PROCESS IN
MOBILE SENSOR NETWORK
Target tacking process is carried out by three segments which
are as follows.
1. Server
2. Commander
3. Tracker
1.Server:- Server sense and search for mobile devices to be
tracked ,analyse endangered mobile users and send all
information to commander for further processing.
2.Commander:-Commander keeps track of recieved
infomation of authenticated users and encrypt the
information in the form of packets and reports tracker.
3.Tracker:- Tracker trace mobiles(electronic devices) of
authenticated users and provides report analysis.
your name
OUTPUT SCREENS
your name
your name
your name
your name
your name
your name
your name
ADVANTAGES
The target tracking in mobile sensor network
helps to track mobile devices wirelessly.
 This provides security as it is accessed by
authorized users .
 The target tracking also works in network
simulation.
 This plays vital role in electronic robbery.
your name
APPLICATIONS
• In Mobile Navigation
• Military Navigation and Operations
• Wireless Communications
your name
Automobile manufacturers are offering moving-
map displays as an option on new vehicles.
• Criminal Investigation
your name
CONCLUSION
we have studied the target tracking problem in mobile
sensor networks. Specifically, we introduce
performance metrics: spatial resolution and we
investigate the resolution against moving targets. By
modeling the dynamic aspects of the target tracking that
depend on both sensor and target mobility, we derive
the inherent relationship between the spatial resolution
and a set of crucial system parameters including sensor
density, sensing range, sensor and target mobility. The
results demonstrated that mobility can be exploited to
obtain better spatial resolution.
your name

More Related Content

What's hot

1
11
Border security using wireless integrated network sensors(wins)
Border security using wireless integrated network sensors(wins)Border security using wireless integrated network sensors(wins)
Border security using wireless integrated network sensors(wins)
PRADEEP Cheekatla
 
4 pillers of iot
4 pillers of iot4 pillers of iot
4 pillers of iot
ShilpaKrishna6
 
Cyber-security of smart grids
Cyber-security of smart gridsCyber-security of smart grids
Cyber-security of smart grids
Hamza AlBzoor
 
an error-minimizing framework for localizing jammers in wireless networks
an error-minimizing framework for localizing jammers in wireless networksan error-minimizing framework for localizing jammers in wireless networks
an error-minimizing framework for localizing jammers in wireless networks
swathi78
 
border security using gsm
border security using gsmborder security using gsm
border security using gsm
bharath naidu
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
Piyush Mittal
 
Presentation on Wireless border security system
Presentation on  Wireless border security systemPresentation on  Wireless border security system
Presentation on Wireless border security system
Student
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_security
Tosha Shah
 
Bh35333338
Bh35333338Bh35333338
Bh35333338
IJERA Editor
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
Ankit Anand
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network security
Ankit Anand
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manet
flowerjaan
 

What's hot (13)

1
11
1
 
Border security using wireless integrated network sensors(wins)
Border security using wireless integrated network sensors(wins)Border security using wireless integrated network sensors(wins)
Border security using wireless integrated network sensors(wins)
 
4 pillers of iot
4 pillers of iot4 pillers of iot
4 pillers of iot
 
Cyber-security of smart grids
Cyber-security of smart gridsCyber-security of smart grids
Cyber-security of smart grids
 
an error-minimizing framework for localizing jammers in wireless networks
an error-minimizing framework for localizing jammers in wireless networksan error-minimizing framework for localizing jammers in wireless networks
an error-minimizing framework for localizing jammers in wireless networks
 
border security using gsm
border security using gsmborder security using gsm
border security using gsm
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
Presentation on Wireless border security system
Presentation on  Wireless border security systemPresentation on  Wireless border security system
Presentation on Wireless border security system
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_security
 
Bh35333338
Bh35333338Bh35333338
Bh35333338
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network security
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manet
 

Viewers also liked

A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
International Journal of Computer and Communication System Engineering
 
Incremental clustering based object tracking in wireless sensor networks
Incremental clustering based object tracking in wireless sensor networksIncremental clustering based object tracking in wireless sensor networks
Incremental clustering based object tracking in wireless sensor networks
Sachin MS
 
Multisink based approach for continous object tracking wsn
Multisink based approach for continous object tracking  wsnMultisink based approach for continous object tracking  wsn
Multisink based approach for continous object tracking wsn
Sajida Imran
 
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1414   Distributed Deployment Algorithms for Improved Coverage in a Networ...JPN1414   Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
chennaijp
 
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
Editor IJCATR
 
Local area prediction based mobile target tracking in wireless sensor networks
Local area prediction based mobile target tracking in wireless sensor networksLocal area prediction based mobile target tracking in wireless sensor networks
Local area prediction based mobile target tracking in wireless sensor networks
LogicMindtech Nologies
 
Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2
IAEME Publication
 
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor NetworkCluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
IJASCSE
 
Coordinated and adaptive information collecting in target tracking wireless s...
Coordinated and adaptive information collecting in target tracking wireless s...Coordinated and adaptive information collecting in target tracking wireless s...
Coordinated and adaptive information collecting in target tracking wireless s...
LogicMindtech Nologies
 
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKS
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKSA NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKS
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKS
Editor IJMTER
 
Long-Range Wireless Sensor Networks for Geo-location Tracking: Design and Eva...
Long-Range Wireless Sensor Networks for Geo-location Tracking: Design and Eva...Long-Range Wireless Sensor Networks for Geo-location Tracking: Design and Eva...
Long-Range Wireless Sensor Networks for Geo-location Tracking: Design and Eva...
Ahmad Muzaffar Baharudin
 
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSMULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
vtunotesbysree
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network report
Ganesh Khadsan
 
Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technology
Kapil Dev
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
Pradipta Ghosh
 
IoT-LPWAN LoRa Geoloc - sagemcom - m2m-innovationworld_geotrack
IoT-LPWAN LoRa Geoloc - sagemcom - m2m-innovationworld_geotrackIoT-LPWAN LoRa Geoloc - sagemcom - m2m-innovationworld_geotrack
IoT-LPWAN LoRa Geoloc - sagemcom - m2m-innovationworld_geotrack
Thierry Lestable
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor Networks
Mshari Alabdulkarim
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
rajatmal4
 

Viewers also liked (18)

A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
 
Incremental clustering based object tracking in wireless sensor networks
Incremental clustering based object tracking in wireless sensor networksIncremental clustering based object tracking in wireless sensor networks
Incremental clustering based object tracking in wireless sensor networks
 
Multisink based approach for continous object tracking wsn
Multisink based approach for continous object tracking  wsnMultisink based approach for continous object tracking  wsn
Multisink based approach for continous object tracking wsn
 
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1414   Distributed Deployment Algorithms for Improved Coverage in a Networ...JPN1414   Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
 
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
 
Local area prediction based mobile target tracking in wireless sensor networks
Local area prediction based mobile target tracking in wireless sensor networksLocal area prediction based mobile target tracking in wireless sensor networks
Local area prediction based mobile target tracking in wireless sensor networks
 
Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2
 
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor NetworkCluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
 
Coordinated and adaptive information collecting in target tracking wireless s...
Coordinated and adaptive information collecting in target tracking wireless s...Coordinated and adaptive information collecting in target tracking wireless s...
Coordinated and adaptive information collecting in target tracking wireless s...
 
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKS
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKSA NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKS
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKS
 
Long-Range Wireless Sensor Networks for Geo-location Tracking: Design and Eva...
Long-Range Wireless Sensor Networks for Geo-location Tracking: Design and Eva...Long-Range Wireless Sensor Networks for Geo-location Tracking: Design and Eva...
Long-Range Wireless Sensor Networks for Geo-location Tracking: Design and Eva...
 
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSMULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network report
 
Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technology
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
IoT-LPWAN LoRa Geoloc - sagemcom - m2m-innovationworld_geotrack
IoT-LPWAN LoRa Geoloc - sagemcom - m2m-innovationworld_geotrackIoT-LPWAN LoRa Geoloc - sagemcom - m2m-innovationworld_geotrack
IoT-LPWAN LoRa Geoloc - sagemcom - m2m-innovationworld_geotrack
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor Networks
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 

Similar to Targettracking

SNIFFER FOR DETECTING LOST MOBILE ppt arya
SNIFFER FOR DETECTING LOST MOBILE ppt  aryaSNIFFER FOR DETECTING LOST MOBILE ppt  arya
SNIFFER FOR DETECTING LOST MOBILE ppt arya
yidegev626
 
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
IJERA Editor
 
574 501-507
574 501-507574 501-507
574 501-507
idescitation
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Mumbai Academisc
 
Comparison of network intrusion detection
Comparison of network intrusion detectionComparison of network intrusion detection
Comparison of network intrusion detection
mtamilpriya
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
JPINFOTECH JAYAPRAKASH
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)
Mumbai Academisc
 
blutooth based sensor network
blutooth based sensor networkblutooth based sensor network
blutooth based sensor network
Maulik Patel
 
Cyber Threat Intelligence for information .pptx
Cyber Threat Intelligence for information .pptxCyber Threat Intelligence for information .pptx
Cyber Threat Intelligence for information .pptx
RishiDash2
 
JPD1424 A System for Denial-of-Service Attack Detection Based on Multivariat...
JPD1424  A System for Denial-of-Service Attack Detection Based on Multivariat...JPD1424  A System for Denial-of-Service Attack Detection Based on Multivariat...
JPD1424 A System for Denial-of-Service Attack Detection Based on Multivariat...
chennaijp
 
Classification and review of security schemes
Classification and review of security schemesClassification and review of security schemes
Classification and review of security schemes
HabitamuAsimare
 
blutooth based smart sensor network
blutooth based smart sensor networkblutooth based smart sensor network
blutooth based smart sensor network
Maulik Patel
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
Adit Pathak
 
Database security project-presentation-2-v1
Database security project-presentation-2-v1Database security project-presentation-2-v1
Database security project-presentation-2-v1
galibhussain
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
IEEEMEMTECHSTUDENTPROJECTS
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
researcherchennai
 
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET Journal
 

Similar to Targettracking (20)

SNIFFER FOR DETECTING LOST MOBILE ppt arya
SNIFFER FOR DETECTING LOST MOBILE ppt  aryaSNIFFER FOR DETECTING LOST MOBILE ppt  arya
SNIFFER FOR DETECTING LOST MOBILE ppt arya
 
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
 
574 501-507
574 501-507574 501-507
574 501-507
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
 
Comparison of network intrusion detection
Comparison of network intrusion detectionComparison of network intrusion detection
Comparison of network intrusion detection
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)
 
blutooth based sensor network
blutooth based sensor networkblutooth based sensor network
blutooth based sensor network
 
Cyber Threat Intelligence for information .pptx
Cyber Threat Intelligence for information .pptxCyber Threat Intelligence for information .pptx
Cyber Threat Intelligence for information .pptx
 
JPD1424 A System for Denial-of-Service Attack Detection Based on Multivariat...
JPD1424  A System for Denial-of-Service Attack Detection Based on Multivariat...JPD1424  A System for Denial-of-Service Attack Detection Based on Multivariat...
JPD1424 A System for Denial-of-Service Attack Detection Based on Multivariat...
 
Classification and review of security schemes
Classification and review of security schemesClassification and review of security schemes
Classification and review of security schemes
 
blutooth based smart sensor network
blutooth based smart sensor networkblutooth based smart sensor network
blutooth based smart sensor network
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
Database security project-presentation-2-v1
Database security project-presentation-2-v1Database security project-presentation-2-v1
Database security project-presentation-2-v1
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
 

Recently uploaded

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 

Recently uploaded (20)

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 

Targettracking

  • 2. your name INTRODUCTION The Target tracking in mobile sensor network is defined as finding or tracing the location and time informaion of mobile (electronic device) which is to be tracked by using sensors in a connected region wirelessly. Wireless Target tracking in mobile sensor network is shown below
  • 3. your name COMPONENTS OF MOBILE SENSOR NETWORK FOR TRACKINGComponents of mobile sensor network for traking are: Sensor Mobile Monitor Network
  • 4. your name SYSTEM ANALYSIS Existing System However these existing solutions can only be used to deal with adversaries who have only local view of network traffic , for example the adversaries may decide to deploy his own set of sensor nodes to monitor the communication in the target network.However all these existing methods assume that the adversary is a local eavesdropper.If an adversary has the global knowledge of the network traffic , it can easily defeat these schemes. Disadvantage: These existing approaches assume a weak adversary model where the adversary sees only local network traffic.
  • 5. your name Proposed system We are primarily interested in target tracking by considering both moving targets and mobile sensors.Specifically ,we are interested in the spatial resolution for localizing a target’s trajectory . The spatial resolution refers to how accurate a target’s position can be measured by sensors ,and defined as the worst-case deviation between the estimated and the actual paths in wireless sensor networks. Our main objectives are to establish the theoretical framework for target tracking in mobile sensor networks, and quantitatively demonstrate how the mobility can be exploited to improve the tracking performance.
  • 6. your name SOFTWARE REQUIREMENT SPECIFICATION • Software Specification: Operating System : windows 7 Coding language : c#.Net4.0 Database : SQL server2013 • Minimum Hardware Specification: System Processor :PentiumIV2.4Ghz Hard disk :40GB Floppy derive :1.44Mb Monitor :15 VGA colour Mouse :Logitech Ram :512Mb
  • 7. your name TARGET TRACKING PROCESS IN MOBILE SENSOR NETWORK Target tacking process is carried out by three segments which are as follows. 1. Server 2. Commander 3. Tracker 1.Server:- Server sense and search for mobile devices to be tracked ,analyse endangered mobile users and send all information to commander for further processing. 2.Commander:-Commander keeps track of recieved infomation of authenticated users and encrypt the information in the form of packets and reports tracker. 3.Tracker:- Tracker trace mobiles(electronic devices) of authenticated users and provides report analysis.
  • 15. your name ADVANTAGES The target tracking in mobile sensor network helps to track mobile devices wirelessly.  This provides security as it is accessed by authorized users .  The target tracking also works in network simulation.  This plays vital role in electronic robbery.
  • 16. your name APPLICATIONS • In Mobile Navigation • Military Navigation and Operations • Wireless Communications
  • 17. your name Automobile manufacturers are offering moving- map displays as an option on new vehicles. • Criminal Investigation
  • 18. your name CONCLUSION we have studied the target tracking problem in mobile sensor networks. Specifically, we introduce performance metrics: spatial resolution and we investigate the resolution against moving targets. By modeling the dynamic aspects of the target tracking that depend on both sensor and target mobility, we derive the inherent relationship between the spatial resolution and a set of crucial system parameters including sensor density, sensing range, sensor and target mobility. The results demonstrated that mobility can be exploited to obtain better spatial resolution.