Young-sam Kim / M.D Course School of Information Technology Dept. of Computer Engineering Korea University of Technology and Education Location Tracking.

Slides:



Advertisements
Similar presentations
1 A Real-Time Communication Framework for Wireless Sensor-Actuator Networks Edith C.H. Ngai 1, Michael R. Lyu 1, and Jiangchuan Liu 2 1 Department of Computer.
Advertisements

Dynamic Object Tracking in Wireless Sensor Networks Tzung-Shi Chen 1, Wen-Hwa Liao 2, Ming-De Huang 3, and Hua-Wen Tsai 4 1 National University of Tainan,
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks Xiaorui Wang, Guoliang Xing, Yuanfang Zhang*, Chenyang Lu, Robert Pless,
CLUSTERING IN WIRELESS SENSOR NETWORKS B Y K ALYAN S ASIDHAR.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin Presented By Tu Tran 1.
MPAC 2004Rae Harbird 1 RUBI Adaptive Resource Discovery for Ubiquitous Computing Rae Harbird Stephen Hailes
1 Prediction-based Strategies for Energy Saving in Object Tracking Sensor Networks Yingqi Xu, Wang-Chien Lee Proceedings of the 2004 IEEE International.
1 Next Century Challenges: Scalable Coordination in sensor Networks MOBICOMM (1999) Deborah Estrin, Ramesh Govindan, John Heidemann, Satish Kumar Presented.
1 On Handling QoS Traffic in Wireless Sensor Networks 吳勇慶.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Mobile Agents: A Key for Effective Pervasive Computing Roberto Speicys Cardoso & Fabio Kon University of São Paulo - Brazil.
A New Household Security Robot System Based on Wireless Sensor Network Reporter :Wei-Qin Du.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
1 TTS: A Two-Tiered Scheduling Algorithm for Effective Energy Conservation in Wireless Sensor Networks Nurcan Tezcan & Wenye Wang Department of Electrical.
Di Wu 03/03/2011 Geographic Routing in Clustered Multi-layer Vehicular Ad Hoc Networks for Load Balancing Purposes.
“Multi-Agent Systems for Distributed Data Fusion in Peer-to-Peer Environment” Smirnova Vira ”Cheese Factory”/
Power saving technique for multi-hop ad hoc wireless networks.
Wireless Video Sensor Networks Vijaya S Malla Harish Reddy Kottam Kirankumar Srilanka.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
Proxy-assisted Content Sharing Using Content Centric Networking (CCN) for Resource-limited Mobile Consumer Devices Jihoon Lee, Dae Youb Kim IEEE Transactions.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Authors: Sheng-Po Kuo, Yu-Chee Tseng, Fang-Jing Wu, and Chun-Yu Lin
Project Introduction 이 상 신 Korea Electronics Technology Institute.
An Introduction Table Of Context Sensor Network PreviewRouting in Sensor NetworksMobility in Sensor Networks Structure and characteristics of nodes and.
Protocols for Self-Organization of a Wireless Sensor Network K. Sohrabi, J. Gao, V. Ailawadhi, and G. J. Pottie IEEE Personal Comm., Oct Presented.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
1 Adaptive QoS Framework for Wireless Sensor Networks Lucy He Honeywell Technology & Solutions Lab No. 430 Guo Li Bin Road, Pudong New Area, Shanghai,
Network Kernel Architectures and Implementation ( ) Network Architecture Chaiporn Jaikaeo Department of Computer Engineering.
A novel approach of gateway selection and placement in cellular Wi-Fi system Presented By Rajesh Prasad.
Distributed Anomaly Detection in Wireless Sensor Networks Ksutharshan Rajasegarar, Christopher Leckie, Marimutha Palaniswami, James C. Bezdek IEEE ICCS2006(Institutions.
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Multi-Resolution Spatial and Temporal Coding in a Wireless Sensor Network for Long-Term Monitoring Applications You-Chiun Wang, Member, IEEE, Yao-Yu Hsieh,
Content Sharing over Smartphone-Based Delay- Tolerant Networks.
Location Tracking in a Wireless Sensor Network by Mobile Agents and Its Data Fusion Strategies Yu-Chee Tseng, Sheng-Po Kuo, Hung-Wei Lee and Chi-Fu Huang.
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Rendezvous Regions: A Scalable Architecture for Service Location and Data-Centric Storage in Large-Scale Wireless Sensor Networks Karim Seada, Ahmed Helmy.
Differential Ad Hoc Positioning Systems Presented By: Ramesh Tumati Feb 18, 2004.
Virtual Wire for Managing Virtual Dynamic Backbone in Wireless Ad Hoc Networks Bo Ryu, Jason Erickson, Jim Smallcomb ACM MOBICOM 1999.
Central China Normal University A Cluster-based and Range Free Multidimensional Scaling-MAP Localization Scheme in WSN 1 Ke Xu, Yuhua Liu ( ), Cui Xu School.
Copyright © 2011, Scalable and Energy-Efficient Broadcasting in Multi-hop Cluster-Based Wireless Sensor Networks Long Cheng ∗ †, Sajal K. Das†,
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Ching-Ju Lin Institute of Networking and Multimedia NTU
Energy-Efficient Randomized Switching for Maximizing Lifetime in Tree- Based Wireless Sensor Networks Sk Kajal Arefin Imon, Adnan Khan, Mario Di Francesco,
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
Energy-Efficient Signal Processing and Communication Algorithms for Scalable Distributed Fusion.
TOPICS INTRODUCTION CLASSIFICATION CHARACTERISTICS APPLICATION RELATED WORK PROBLEM STATEMENT OBJECTIVES PHASES.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
Decentralized Energy-Conserving and Coverage-Preserving Protocols for Wireless Sensor Networks Chi-Fu Huang, Li-Chu Lo, Yu-Chee Tseng, and Wen-Tsuen Chen.
FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions Young-Mi Song, Sung-Hee Lee and Young- Bae Ko Ajou University.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
A Protocol for Tracking Mobile Targets using Sensor Networks H. Yang and B. Sikdar Department of Electrical, Computer and Systems Engineering Rensselaer.
I-Hsin Liu1 Event-to-Sink Directed Clustering in Wireless Sensor Networks Alper Bereketli and Ozgur B. Akan Department of Electrical and Electronics Engineering.
A Two-Tier Heterogeneous Mobile Ad Hoc Network Architecture and Its Load-Balance Routing Problem C.-F. Huang, H.-W. Lee, and Y.-C. Tseng Department of.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Dynamic Proxy Tree-Based Data Dissemination Schemes for Wireless Sensor Networks Wensheng Zhang, Guohong Cao and Tom La Porta Department of Computer Science.
KAIS T Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for Wireless Sensor Networks Harshavardhan Sabbineni and Krishnendu Chakrabarty.
Security of the Internet of Things: perspectives and challenges
In the name of God.
Presented by Edith Ngai MPhil Term 3 Presentation
Author:Zarei.M.;Faez.K. ;Nya.J.M.
IMPROVING OF WIRELESS MESH NETWORKS.
Abstract In this paper, the k-coverage problem is formulated as a decision problem, whose goal is to determine whether every point in the service area.
Ad-hoc Networks.
Net 435: Wireless sensor network (WSN)
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
The Coverage Problem in a Wireless Sensor Network
Presentation transcript:

Young-sam Kim / M.D Course School of Information Technology Dept. of Computer Engineering Korea University of Technology and Education Location Tracking in a WSN by Mobile Agents and Its Data Fusion Strategies Yu-Chee Tseng, Sheng-Po Kuo, Hung-Wei Lee, and Chi-Fu Huang

Contents  Abstract  Introduction  Network Model & Problem Statement  The Location Tracking Protocol  Fusion & Delivery of Tracking Results  Prototyping Experiences and Simulation Results  Conclusion  Q/A

- Abstract -

Abstract (1)  Providing ubiquitous sensing, computing and communication capability -> greatly facilitate human life 1. WSN (Wireless Sensor Network)2. Location Tracking (1)  One of the central issues in sensor networks.  To monitor the roaming path of a moving object.

Abstract (2)  Similar to the location-update problem in PCS networks.  Location Tracking is more challenging in two senses. 1) Central control mechanism & backbone network. (X) 2) Wireless communication bandwidth is very limited. 3. Location Tracking (2)4. Proposed paradigm  Novel protocol based on the mobile agent paradigm.  The communication & sensing overheads are greatly reduced.  Based on IEEE b, NICs

- Introduction -

WSN (1) Rapid progress Wireless communicationMEMS technologiesWireless Sensor Network Inexpensive node collecting processing storing Environmental Info

WSN (2) 1. Sensor are connected  Past : wire lines.  Today : wire lines + wireless ad hoc network 1) The flexibility of installation & configuration is greatly improved. 2) Research activities have recently been commenced in SN

WSN (3) 2. Issues remain to be resolved  Scalability - coverage and exposure problems  Stability - stable and fault-tolerant  Power-saving - since no plug-in power is available - energy consumption of communications might be a major factor - mobile agent-based solutions are sometimes more power-efficient

Proposed paradigm 3. Novel protocol based on the mobile agent paradigm  To solve the location tracking problem  Advantage 1) sensing, computing & communication overheads can be greatly reduced. -> delivery & fusion of the tracking results 2) on-site or follow-me services may be provided

Network Model & Problem Statement

Network Model (1)  Sensor network (2D)  Triangular network (regular)

Network Model (2) & Problem Statement  Sensing scope is r  Working Area is A0, Backup Area is A1, A2, A3 Practice errors may exist, and thus more sensors will be needed to improve the accuracy.

The Location Tracking Protocol

Basic Idea  Proposed protocol is derived by the cooperation of sensors. (master 1, slave 2)

Protocol Details (1)  Assume that … 1) Sensors can distinguish one object from the other 2) Each object periodically send a unique ID 3) focus on only one particular object

Protocol Details (2)  Master agent : closets to the object - go to master state & protocol  Slave agents : nearby sensors - go to slave state & protocol  Once the object enters the backup areas, the roles of master & slave may be changed

Protocol Details (3) Master For track1, the master discovers two slaves losing the target simultaneously. For track2, only the slave agent in S1 will be revoked, and new one will be invited. For track3, the master discovers one slave as well as itself losing the target

Protocol Details (4)  Each sensor will keep an object list (OL). unique identity, denote by ID, two sub-field  Two sub-field : status & time-stamp 1) ID.state : Master, Slave, Standby, Inhibited 2) time-stamp is the time when the record is last updated.

Protocol Details (5)  Seven types of control messages 1) bid-master(ID, sig) 2) assign_slave(ID, si, t) 3) revoke_slave(si) 4) inhibit(ID) 5) release(ID) 6) move_master(ID, si, hist) 7) data(ID, sig, ts)

Basic Protocol

Election Protocol

Master Protocol

Slave Protocol

Extension to Irregular Network Topologies  The election process does not need to be changed.  The rules to migrate masters/slaves need to be modified.  Sensors need to know the locations of at least their two-hop neighbors.  Still use one master and two slaves to track an object.

Extension to Irregular Network Topologies  How to define the master & slaves ? The problem can be solved by a divide-and-conquer solution in time complexity

Fusion & Delivery of Tracking Results

Fusion & Delivery of Tracking Results (1)  Assume that… one of the sensors in the network serves as the gateway connecting to a location server in the wireline network.

Fusion & Delivery of Tracking Results (2)  Propose three data delivery solutions. 1) Non-Agent-Based (NAB) strategy. Each sensor works independently and forwards its sensing results back to the gateway 2) Threshold-Based (TB) strategy. 3) Distance-Based (DB) strategy. The delivery action may be taken only when the master agent moves.

Prototyping Experiences

 IEEE b NICs Object Sensor 1 Sensor 0 Sensor 2

Prototyping Experiences

 Position approximation algorithm

Prototyping Experiences

Simulation Results

Simulation Results (1)

Simulation Results (2)

Conclusions

Conclusion  A mobile-agent approach, A data fusion model and several data delivery strategies are significantly reducing the communication & sensing overheads.

Q/A

Thank you