Presentation is loading. Please wait.

Presentation is loading. Please wait.

Dynamic Object Tracking in Wireless Sensor Networks Tzung-Shi Chen 1, Wen-Hwa Liao 2, Ming-De Huang 3, and Hua-Wen Tsai 4 1 National University of Tainan,

Similar presentations


Presentation on theme: "Dynamic Object Tracking in Wireless Sensor Networks Tzung-Shi Chen 1, Wen-Hwa Liao 2, Ming-De Huang 3, and Hua-Wen Tsai 4 1 National University of Tainan,"— Presentation transcript:

1 Dynamic Object Tracking in Wireless Sensor Networks Tzung-Shi Chen 1, Wen-Hwa Liao 2, Ming-De Huang 3, and Hua-Wen Tsai 4 1 National University of Tainan, Dept. Information and Learning Technology 2 Tatung University, Dept. Information Management 3 Chang Jung Christian University, Dept. Information Management 4 National Cheng-Kung University, Dept. CSIE Wang, Sheng-Shih Dec. 26, 2005 IEEE International Conference on Networks (ICON 2005)

2 Outline Introduction Movement Object Tracking Simulation Conclusion

3 Introduction Motivations  Target tracking is an important issue in WSNs Enemy vehicle tracking, habitat monitoring, etc  Cooperation of multiple sensors Objectives  Mobile object tracking Accurate Quick Energy efficiency

4 Movement Object Tracking --- Overview A F1 F3 F6 F7 F10 F2 F11 F12 F13 source mobile target ingress node sensor

5 Movement Object Tracking --- Operation Target discovery Mobile target detection Target tracking Track improvement  Face track adjustment  Loop face track adjustment

6 Target Discovery Target enters the network

7 Target Discovery (cont’d) Three sensor nodes detect the target

8 Target Discovery (cont’d) Where ? Three sensor nodes build their corresponding faces

9 Target Discovery (cont’d) query packet Source sends a query packet to discover the target

10 Target Discovery (cont’d) reply packet state  active active time  infinite Ingress node The sensor closest to the target replies the packet to the source

11 Target Discovery (cont’d)

12 Mobile Target Detection wakeup Wakeup packet ingress id (node A) face hop count (1) A B Node A is the 1st ingress node wakeup

13 Mobile Target Detection (cont’d) wakeup Wakeup packet ingress id (node A) face hop count (1) A B Node A is the 1st ingress node wakeup

14 Mobile Target Detection (cont’d) A B Target may enter face F0, F2, or F5 F2 F5 F0 F1

15 Mobile Target Detection (cont’d) A B Node B sends the wakeup packets to all of its neighboring face nodes (F1, F2, F3, F4, and F5)  Node A knows that node B is the next ingress node F2 F3 F4 F1 F0 F5 Node B is the 2nd ingress node

16 Mobile Target Detection (cont’d) A B F2 F3 F4 F1 active time expires  go to sleep F0 F5

17 Target Tracking A B C D Node A knows the next ingress node (node B) Node B knows the next ingress node (node C) Node C knows the next ingress node (node D) Source knows the 1st ingress node (node A)

18 Face Track Adjustment A

19 Face Track Adjustment (cont’d) A G B C D E F Track : (F1, F2, F3, F6, F7, F8, F9) Face hop count = 7 Not optimal track F1 F2 F3 F4 F5 F6 F7 F8 F9

20 Face Track Adjustment (cont’d) A G B C Optimal track : F1 F3 F4 F5 F6 F7 F8 F9 F D E F2

21 Face Track Adjustment (cont’d) A G B C F1 F3 F4 F5 F6 F7 F8 F9 if (face hop count = k) then send infoadj packet to the last checkface (node A) F D E F2

22 Face Track Adjustment (cont’d) A G B C F1 F3 F4 F5 F6 F7 F8 F9 F D E F2

23 Face Track Adjustment (cont’d) A G B C F1 F3 F4 F5 F6 F7 F8 F9 F D E The ingress nodes, B, C, D, and E, are canceled F2

24 Face Track Adjustment (cont’d) A G B C Node A finds the next ingress node closest to the kth ingress node (F), and then sends an adjustment packet to the next ingress node F1 F3 F4 F5 F6 F7 F8 F9 F D E adjustment F2

25 Loop Face Track Adjustment A G B C F1 F3 F4 F5 F6 F7 F8 F9 D E F2 F H

26 Loop Face Track Adjustment (cont’d) A G B C F1 F3 F4 F5 F6 F7 F8 F9 D E F2 Track : (F1, F2, F3, F6, F7, F8, F9, F4, F3) F H loop

27 Loop Face Track Adjustment (cont’d) A H B C F1 F3 F4 F5 F6 F7 F8 F9 F D E F2 Node C receives the wakeup packet from node H and detects the loop,  node C sends a deletion packet to node H deletion G

28 Loop Face Track Adjustment (cont’d) A G B C F1 F3 F4 F5 F6 F7 F8 F9 D E F2 F H

29 Simulation Model ns-2 simulator Sensing field: 500 m  500 m 1000 sensor nodes (random deployment) Communication range = sensing range = 25 m Power  Tx = Rx = 175 mW  Initial: 5 joule Moving speed  Target: 20 m/s  Source: 10 m/s, 20 m/s, or 30 m/s Simulation time: 2000 secs

30 Simulation --- Comparison Threshold Flooding (TF)  When the source reaches the location of the target, target discovery process is executed again Schedule Flooding (SF)  The source executes the target discovery process every 2 secs Schedule Updating (SU)  The source queries once  The sensor which detects the target sends the update message to the source every 2 secs Proposed Object Tracking scheme (OT)

31 Simulation Result --- First Catching Time infrequent query flooding and face track adjustment

32 Simulation Result --- Energy Consumption before the first catch after the first catch flooding-based less query flooding

33 Simulation Result --- Lifetime query packet is required although the source is near the target

34 Conclusion Target tracking protocol  Dynamic  Energy efficiency  Shorter tracking path  Loop avoidance

35 Movement Object Tracking --- Overview Flooding method The track of the target is recorded in a set of ingress nodes

36 Movement Object Tracking --- Idea The activated sensor nodes detect the tracked object and keep the information of track for the source The source follows the tracking route to approach the sensor node that covers the tracked object Face-aware routing  RHR is used to find the neighboring face node

37 Target Discovery Source issues a query packet and uses the flooding method to seek the target  (packet type, source id, target id, target location) A sensor closest to the target sends a reply packet to the source  State: active; active time: infinite  Ingress node Only one sensor in a face will send the reply packet

38 Mobile Target Detection --- Concept Every active node detects the target and checks whether it is closest to the target The sensor closest to the target forwards the wakeup packet All neighboring face nodes keep the information of the target, and then enters the sleep state when the active time expires Wakeup packet  (packet id, ingress node, sender id, face id, target location, active time, face hop count)

39 Mobile Target Detection --- Example

40 Target Tracking --- Concept A source S knows the location of target/first ingress node after a target discovery process, and then it begins to move towards the location of first ingress node (checkface) When it reaches the location, the first ingress sensor informs it about whether the target is still in here or not. If yes, the source catches the target o. If no, the sensor informs the source the location of next ingress node. Then, the source moves towards the location of next ingress node again. The first ingress node also informs the next ingress node the source will arrive in your location. The next ingress becomes the first ingress node (checkface)

41 Target Tracking --- Example Source moves to the 1st ingress node

42 Face Track Adjustment --- Overview

43 Face Track Adjustment --- Example

44 Face Track Adjustment --- Checkface

45 Loop Face Track Adjustment

46 Simulation Result --- Failed Sensor Ratio Failed sensor ratio represents the ratio of sensor consumed


Download ppt "Dynamic Object Tracking in Wireless Sensor Networks Tzung-Shi Chen 1, Wen-Hwa Liao 2, Ming-De Huang 3, and Hua-Wen Tsai 4 1 National University of Tainan,"

Similar presentations


Ads by Google