scholarly journals A Comparative Study of Target Tracking Approaches in Wireless Sensor Networks

2016 ◽  
Vol 2016 ◽  
pp. 1-11 ◽  
Author(s):  
Asmaa Ez-Zaidi ◽  
Said Rakrak

Wireless sensor networks have been the subject of intense research in recent years. Sensor nodes are used in wide range of applications such as security, military, and environmental monitoring. One of the most interesting applications in wireless sensor networks is target tracking, which mainly consists in detecting and monitoring the motion of mobile targets. In this paper, we present a comprehensive survey of target tracking approaches. We then analyze them according to several metrics. We also discuss some of the challenges that influence the performance of tracking schemes. In the end, we conduct detailed analysis and comparison between these algorithms and we conclude with some future directions.

Author(s):  
Ghassan Samara ◽  
Mohammad Hassan ◽  
Yahya Zayed

Wireless sensor networks (WSNs) has a practical ability to link a set of sensors to build a wireless network that can be accessed remotely; this technology has become increasingly popular in recent years. Wi-Fi-enabled sensor networks (WSNs) are used to gather information from the environment in which the network operates. Many obstacles prevent wireless sensor networks from being used in a wide range of fields. This includes maintaining network stability and extending network life. In a wireless network, sensors are the most essential component. Sensors are powered by a battery that has a finite amount of power. The battery is prone to power loss, and the sensor is therefore rendered inoperative as a result. In addition, the growing number of sensor nodes off-site affects the network's stability. The transmission and reception of information between the sensors and the base consumes the most energy in the sensor. An Intelligent Vice Cluster Head Selection Protocol is proposed in this study (IVC LEACH). In order to achieve the best performance with the least amount of energy consumption, the proposed hierarchical protocol relies on a fuzzy logic algorithm using four parameters to calculate the value of each node in the network and divides them into three hierarchical levels based on their value. This improves network efficiency and reliability while extending network life by 50 percent more than the original Low Energy Adaptive Clustering Hierarchy protocol. Keywords: Wireless Sensor Networks, Sensors, Communication Protocol, Fuzzy logic, Leach protocol.


2017 ◽  
Vol 13 (09) ◽  
pp. 69 ◽  
Author(s):  
Lianjun Yi ◽  
Miaochao Chen

<p>Wireless sensor networks (WSN), as a new method of information collection and processing, has a wide range of applications. Since the acquired data must be bound with the location information of sensor nodes, the sensor localization is one of the supporting technologies of wireless sensor networks. However, the common localization algorithms, such as APIT algorithm and DV-Hop algorithm, have the following problems: 1) the localization accuracy of beacon nodes is not high; 2) low coverage rate in sparse environment. In this paper, an enhanced hybrid 3D localization algorithm is designed with combining the advantages of APIT algorithm and DV-Hop algorithm. The proposed hybrid algorithm can improve the localization accuracy of the beacon nodes in dense environments by reducing the triangles in the triangle interior point test (PIT) and selecting good triangles. In addition, the algorithm can combine the advantages of APIT algorithm and DV-Hop algorithm localization algorithm to calculate the unknown node coordinates, and also improve the location coverage of the beacon nodes in sparse environment. Simulation results show that the proposed hybrid algorithm can effectively improve the localization accuracy of beacon nodes in the dense environment and the location coverage of beacon nodes in sparse environment.</p>


Author(s):  
Arvind Madhukar Jagtap ◽  
Gomathi N.

In the past years, wireless sensor networks (WSNs) have increased successful real-world deployment in a wide range of civil and military applications. In order to ensure effective environmental sensing and robust communication, the two fundamental issues like TCOV and NCON are the very challenging tasks in WSN. As sensor nodes are battery-operated devices, the wide utilization of WSNs is obstructed by the severely limited energy constraints, this article tackles these kinds of issues by proposing an approach based on the energy model and aims at enhancing the network lifetime by improved balancing the movement and energy losses in the network. This article proposes a design which minimizes the power consumption and movement cost, thus enhancing the network lifetime. Finally, the authors compared the energy efficiency of the proposed approach with that of the existing approach. As such, the proposed AVABC improves the network lifetime by 14.29%, 26.09%, and 14.29% over VABC in response to the varying sensing radius of 5, 10, and 15, respectively.


2014 ◽  
Vol 687-691 ◽  
pp. 1071-1075
Author(s):  
Yong Long Zhuang ◽  
Xiao Lan Weng ◽  
Xiang He Wei

Research on multi-target tracking wireless sensor networks, the main problem is how to improve tracking accuracy and reduce energy consumption. Proposed use of forecasting methods to predict the target state, the selection of target detection range forecast based on the relationship between states and between sensor nodes deployed. And in accordance with the selected detection range, to wake up and form a cluster to track the target. In multi-target tracking will use to adjust the detection range, time to time to separate the conflict node of conflict, in order to achieve a successful track multiple targets. Simulation results show that the proposed method can indeed improve the chances of success of the track.


2016 ◽  
Vol 12 (10) ◽  
pp. 97
Author(s):  
Jun Ma

<span style="font-family: 'Times New Roman',serif; font-size: 10pt; -ms-layout-grid-mode: line; mso-fareast-font-family: SimSun; mso-fareast-theme-font: minor-fareast; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;">In this paper the dynamic point target tracking is studied, and a message driven target tracking algorithm based on non-ranging is proposed by combining the actual sensor node characteristics. By tissue tracking around the target sensor nodes collaborate to establish a tracking cluster and the cluster head node for data fusion to accurately locate the target and thus formed a kind of efficient and precise distributed dynamic tracking cluster algorithm of DTC. The tracking cluster can follow the target as a shadow, and it can realize the management of the cluster itself and constantly report to the sink node to the target location. The protocol is especially suitable for the use of large scale wireless sensor networks with low node cost.</span>


2015 ◽  
Vol 2015 ◽  
pp. 1-13 ◽  
Author(s):  
Hongyao Luo ◽  
Zhichuan Huang ◽  
Ting Zhu

In recent years, the industrial, scientific, and medical (ISM) bands have been intensively shared with unlicensed wireless communications applications such as wireless sensor networks (WSNs). With flourishing popularity of sensor devices and increasing installation of wireless sensor nodes, the cross technology interference (CTI) has become a considerable real-world problem. Because of CTI, wireless devices suffer significant communication dilemma. Moreover, ISM band, as the main communication medium of WSN, should be reasonably utilized in an efficient and effective manner. Extensive approaches have been proposed to explore spectrum utilization in WSN. However, there is no such one, which systematically organizes these works. In this paper, we present a comprehensive survey on spectrum utilization in WSNs. To achieve this goal, We first illustrate the background of WSN and spectrum utilization. Our concern on CTI is then noted. Later we demonstrate the importance of efficient spectrum utilization. Eventually, through classification and summary of recent related works, we provide an essential structure of research in titled field and detailed intellectual merits of published works. Our survey covers more than 80 studies in the scope of spectrum utilization in WSN.


Sensors ◽  
2018 ◽  
Vol 18 (10) ◽  
pp. 3585 ◽  
Author(s):  
Juan Feng ◽  
Hongwei Zhao

One important way to extend the lifetime of wireless sensor networks (WSNs) is to manage the sleep scheduling of sensor nodes after they are deployed. Most of the existing works on node scheduling mainly concentrate on nodes which have only one sensor, and they regard a node and its sensor modules as a whole to manage sleep scheduling. Few works involve the sensed modules scheduling of the sensor nodes, which have multiple sensors. However, some of the sensed modules (such as video sensor) consume a lot of energy. Therefore, they have less energy efficiency for multisensory networks. In this paper, we propose a distributed and energy-balanced multisensory scheduling strategy (EBMS), which considers the scheduling of both the communication modules and the sensed modules for each node in target tracking WSNs. In EBMS, the network is organized as clustering structures. Each cluster head adaptively assigns a sleep time to its cluster members according to the position of the members. Energy-balanced multisensory scheduling strategy also proposes an energy balanced parameter to balance the energy consumption of each node in the network. In addition, multi-hop coordination scheme is proposed to find the optimal cooperation among clusters to maximize the energy conservation. Experimental results show that EBMS outperformed the state-of-the-art approaches.


Author(s):  
Yawen Wei ◽  
Zhen Yu ◽  
Yong Guan

Localization of sensor nodes is very important for many applications proposed for wireless sensor networks (WSN), such as environment monitoring, geographical routing, and target tracking. Because sensor networks may be deployed in hostile environments, localization approaches can be compromised by many malicious attacks. The adversaries can broadcast corrupted location information; they can jam or modify the transmitting signals between sensors to mislead them to obtain incorrect distance measurements or nonexistent connectivity links. All these malicious attacks will cause sensors not able to or wrongly estimate their locations. In this chapter, we summarize the threat models and provide a comprehensive survey and taxonomy of existing secure localization and verification schemes for wireless sensor networks.


Sign in / Sign up

Export Citation Format

Share Document