Presented by: Chaitanya K. Sambhara Paper by: Rahul Gupta and Samir R. Das - Univ of Cincinnati SUNY Stony Brook.

Slides:



Advertisements
Similar presentations
TARGET DETECTION AND TRACKING IN A WIRELESS SENSOR NETWORK Clement Kam, William Hodgkiss, Dept. of Electrical and Computer Engineering, University of California,
Advertisements

1 A Real-Time Communication Framework for Wireless Sensor-Actuator Networks Edith C.H. Ngai 1, Michael R. Lyu 1, and Jiangchuan Liu 2 1 Department of Computer.
V-1 Part V: Collaborative Signal Processing Akbar Sayeed.
CSLI 5350G - Pervasive and Mobile Computing Week 6 - Paper Presentation “Exploiting Beacons for Scalable Broadcast Data Dissemination in VANETs” Name:
1 Routing Techniques in Wireless Sensor networks: A Survey.
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
Haiyun Luo, Fan Ye, Jerry Cheng, Songwu Lu, Lixia Zhang
August 7, 2003 Sensor Network Modeling and Simulation in Ptolemy II Philip Baldwin University of Virginia Motivation With.
Scalable and Distributed GPS free Positioning for Sensor Networks Rajagopal Iyengar and Biplab Sikdar Department of ECSE, Rensselaer Polytechnic Institute.
TelosCAM: Identifying Burglar Through Networked Sensor-Camera Mates with Privacy Protection Presented by Qixin Wang Shaojie Tang, Xiang-Yang Li, Haitao.
Collaborative Signal Processing CS 691 – Wireless Sensor Networks Mohammad Ali Salahuddin 04/22/03.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha Presented by Ray Lam Oct 23, 2004.
Relationships Among Variables
Presented by: Chaitanya K. Sambhara Paper by: Maarten Ditzel, Caspar Lageweg, Johan Janssen, Arne Theil TNO Defence, Security and Safety, The Hague, The.
1 Sequential Acoustic Energy Based Source Localization Using Particle Filter in a Distributed Sensor Network Xiaohong Sheng, Yu-Hen Hu University of Wisconsin.
LOCALIZATION in Sensor Networking Hamid Karimi. Wireless sensor networks Wireless sensor node  power supply  sensors  embedded processor  wireless.
Authors: Sheng-Po Kuo, Yu-Chee Tseng, Fang-Jing Wu, and Chun-Yu Lin
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha.
APPL: Anchor Path Planning –based Localization for Wireless Sensor Networks Imane BENKHELIFA and Samira MOUSSAOUI LSI, Computer Science Department Houari.
Tracking with Unreliable Node Sequences Ziguo Zhong, Ting Zhu, Dan Wang and Tian He Computer Science and Engineering, University of Minnesota Infocom 2009.
Patch Based Mobile Sink Movement By Salman Saeed Khan Omar Oreifej.
Algorithms for Wireless Sensor Networks Marcela Boboila, George Iordache Computer Science Department Stony Brook University.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Chapter 4 Linear Regression 1. Introduction Managerial decisions are often based on the relationship between two or more variables. For example, after.
1 Virtual Patrol : A New Power Conservation Design for Surveillance Using Sensor Networks Prasant Mohapatra, Chao Gui Computer Science Dept. Univ. California,
Communication Support for Location- Centric Collaborative Signal Processing in Sensor Networks Parmesh Ramanathan University of Wisconsin, Madison Acknowledgements:K.-C.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
Cooperative Air and Ground Surveillance Wenzhe Li.
Efficient Energy Management Protocol for Target Tracking Sensor Networks X. Du, F. Lin Department of Computer Science North Dakota State University Fargo,
Wireless Sensor Networks Nov 1, 2006 Jeon Bokgyun
A Passive Approach to Sensor Network Localization Rahul Biswas and Sebastian Thrun International Conference on Intelligent Robots and Systems 2004 Presented.
Dynamic Routing in Mobile Ad Hoc Network 報告者:呂佐鴻 指導教授:李鴻璋.
Differential Ad Hoc Positioning Systems Presented By: Ramesh Tumati Feb 18, 2004.
Geo479/579: Geostatistics Ch4. Spatial Description.
1.Research Motivation 2.Existing Techniques 3.Proposed Technique 4.Limitations 5.Conclusion.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
C. Savarese, J. Beutel, J. Rabaey; UC BerkeleyICASSP Locationing in Distributed Ad-hoc Wireless Sensor Networks Chris Savarese, Jan Beutel, Jan Rabaey.
Detection, Classification and Tracking in Distributed Sensor Networks D. Li, K. Wong, Y. Hu and A. M. Sayeed Dept. of Electrical & Computer Engineering.
UNIT IV INFRASTRUCTURE ESTABLISHMENT. INTRODUCTION When a sensor network is first activated, various tasks must be performed to establish the necessary.
Sensor Network Data Dissemination based on the paper titled Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks Presented.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Repairing Sensor Network Using Mobile Robots Y. Mei, C. Xian, S. Das, Y. C. Hu and Y. H. Lu Purdue University, West Lafayette ICDCS 2006 Speaker : Shih-Yun.
Wireless Access and Networking Technology (WANT) Lab. An Efficient Data Aggregation Approach for Large Scale Wireless Sensor Networks Globecom 2010 Lutful.
Wireless Sensor Network: A Promising Approach for Distributed Sensing Tasks.
Minimum spanning tree diameter estimation in random sensor networks in fractal dimension Students: Arthur Romm Daniel Kozlov Supervisor: Dr.Zvi Lotker.
Wireless sensor networks: a survey
Enforce Collaboration in Mobile Ad Hoc Network Ning Jiang School of EECS University of Central Florida
Mingze Zhang, Mun Choon Chan and A. L. Ananda School of Computing
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
Descriptive and Inferential Statistics
Wireless Sensor Networks
Jamming for good: a fresh approach to authentic communication in WSNs
Introduction to Wireless Sensor Networks
Winning Strategy in Programming Game Robocode
Packet Leashes: Defense Against Wormhole Attacks
DIRECTED DIFFUSION.
Wireless Sensor Networks
Wireless Sensor Network Architectures
Real-time Wall Outline Extraction for Redirected Walking
Net 435: Wireless sensor network (WSN)
Presented by Prashant Duhoon
Motion Planning for Multiple Autonomous Vehicles
DIRECTED DIFFUSION.
Jason A. Fuemmeler, and Venugopal V. Veeravalli Edwin Lei
RADAR: An In-Building RF-based User Location and Tracking System
Spectrum Sharing in Cognitive Radio Networks
Remote sensing in meteorology
Connected Sensor Cover Problem
Overview: Chapter 2 Localization and Tracking
Presentation transcript:

Presented by: Chaitanya K. Sambhara Paper by: Rahul Gupta and Samir R. Das - Univ of Cincinnati SUNY Stony Brook

Why this topic ? Networks of small, densely distributed wireless sensor nodes are capable of solving a variety of collaborative problems. Networks of small, densely distributed wireless sensor nodes are capable of solving a variety of collaborative problems. Monitoring Monitoring Surveillance Surveillance

Introduction Rapid advances in miniaturization in computing and sensor technologies and advent of low-power short- range radios recently have given rise to strong interest in smart sensor networks. The idea is to be bring together sensor nodes with on-board processing capability and radio interface into a large network to enable them to process higher level sensing tasks in a co-operative fashion.

Introduction The system must leverage data processing and decision making ability inside the network as much as possible, instead of shipping the data to a central controller to make decisions. The system must leverage data processing and decision making ability inside the network as much as possible, instead of shipping the data to a central controller to make decisions.

Aim Sensors are distributed, likely randomly, in a geographic area to be monitored. Sensors are distributed, likely randomly, in a geographic area to be monitored. The goal is to track and predict the movement of an appropriate target and alert the sensors which are close to the predicted path of the target. The goal is to track and predict the movement of an appropriate target and alert the sensors which are close to the predicted path of the target.

What is the target ? The target can be a moving vehicle, for example, or can be a phenomenon such as an approaching fire. The target can be a moving vehicle, for example, or can be a phenomenon such as an approaching fire. It is assumed that each individual sensor node is equipped with appropriate sensory device(s) to be able to detect the target as well as to estimate its distance based on the sensed data. It is assumed that each individual sensor node is equipped with appropriate sensory device(s) to be able to detect the target as well as to estimate its distance based on the sensed data.

How it works The sensors that are triggered by the target collaborate to localize the target in the physical space to predict its course. The sensors that are triggered by the target collaborate to localize the target in the physical space to predict its course. Then the sensor nodes that lie close to the predicted course of the target are alerted. This alert is meant to serve as a trigger for these nodes to activate additional on-board sensors. Then the sensor nodes that lie close to the predicted course of the target are alerted. This alert is meant to serve as a trigger for these nodes to activate additional on-board sensors.

Example These additional sensors may be of a different modality (e.g., alerts coming from heat sensors activating vibration sensors) that are ordinarily turned off or not sampled to conserve power. These additional sensors may be of a different modality (e.g., alerts coming from heat sensors activating vibration sensors) that are ordinarily turned off or not sampled to conserve power. Then the sensor nodes that lie close to the predicted course of the target are alerted. This alert is meant to serve as a trigger for these nodes to activate additional on-board sensors. Then the sensor nodes that lie close to the predicted course of the target are alerted. This alert is meant to serve as a trigger for these nodes to activate additional on-board sensors.

Example The alert can also serve as a trigger to actuate certain on-board devices, depending on the capability of the nodes and the application. The alert can also serve as a trigger to actuate certain on-board devices, depending on the capability of the nodes and the application. The goal is to develop techniques for the above moving target tracking problem and report experience in testing them in a live low-cost sensor network testbed using Berkeley motes The goal is to develop techniques for the above moving target tracking problem and report experience in testing them in a live low-cost sensor network testbed using Berkeley motes

Assumptions Sensor nodes are scattered randomly in a geographical region. Each node is aware of its location. Sensor nodes are scattered randomly in a geographical region. Each node is aware of its location. Absolute location information is not needed. It is sufficient for the nodes to know their location with respect to a common reference point. Absolute location information is not needed. It is sufficient for the nodes to know their location with respect to a common reference point.

Assumptions for location lnformation In their experiment the sensor nodes are stationary and we have directly encoded the location information into the sensor nodes to eliminate the possibility of any localization error. In their experiment the sensor nodes are stationary and we have directly encoded the location information into the sensor nodes to eliminate the possibility of any localization error. Hence there is no emphasis on any particular localization technique. Hence there is no emphasis on any particular localization technique.

Assumptions The sensors must be capable of estimating the distance of the target to be tracked from the sensor readings. The sensors must be capable of estimating the distance of the target to be tracked from the sensor readings. It is assumed that the sensor has already learned the sensor reading to distance mapping. It is assumed that the sensor has already learned the sensor reading to distance mapping.

Tracking a target Tracking a target involves three distinct steps: Tracking a target involves three distinct steps: Detecting the presence of the target. Detecting the presence of the target. Determining the direction of motion of the target. Determining the direction of motion of the target. Alerting appropriate nodes in the network. Alerting appropriate nodes in the network.

Detection Each node periodically (every 1 sec in our experiments) polls its sensor module to detect the presence of any target to be tracked. Each node periodically (every 1 sec in our experiments) polls its sensor module to detect the presence of any target to be tracked. Sensor reading above a particular threshold indicates the presence of a target in the vicinity. As soon as this threshold is crossed, a TargetDetected message is broadcast by the node. Sensor reading above a particular threshold indicates the presence of a target in the vicinity. As soon as this threshold is crossed, a TargetDetected message is broadcast by the node.

Detection Each TargetDetected message contains the location of the originating node and its distance from the target, as determined from the sensor reading. Each TargetDetected message contains the location of the originating node and its distance from the target, as determined from the sensor reading. When this message is received by a neighboring node, it stores the coordinates of the originator and the target’s distance from the originator in a table. When this message is received by a neighboring node, it stores the coordinates of the originator and the target’s distance from the originator in a table. Table entries expire after a timeout unless refreshed. Table entries expire after a timeout unless refreshed.

Tracking A minimum of three nodes sensing the target are needed to apply the commonly used triangulation method. A minimum of three nodes sensing the target are needed to apply the commonly used triangulation method. When a node that has already detected the target hears two additional TargetDetected messages from two different neighbors, it computes a location estimate via triangulation When a node that has already detected the target hears two additional TargetDetected messages from two different neighbors, it computes a location estimate via triangulation

Tracking Here we limit this computation only to the nodes that themselves have detected the target, and hears from two other neighbors that also detected the target. Here we limit this computation only to the nodes that themselves have detected the target, and hears from two other neighbors that also detected the target. This This limits the estimation to be done only in nodes within a close vicinity of the target, thus localizing the computation. This This limits the estimation to be done only in nodes within a close vicinity of the target, thus localizing the computation.

Tracking In order to estimate the trajectory of the target, its location must be estimated at a minimum of two instants of time. In order to estimate the trajectory of the target, its location must be estimated at a minimum of two instants of time. A straight line through these two points defines the trajectory in the direction of the latest location estimate. A straight line through these two points defines the trajectory in the direction of the latest location estimate. Three or more estimates, however, work significantly better. Three or more estimates, however, work significantly better.

Alerting After estimating the trajectory, the network must alert nodes that lie near the trajectory. After estimating the trajectory, the network must alert nodes that lie near the trajectory. Specifically, within a perpendicular distance d from it by sending them a Warning message so that they are aware of the approaching target and can take appropriate actions. Specifically, within a perpendicular distance d from it by sending them a Warning message so that they are aware of the approaching target and can take appropriate actions.

Alerting Any node that is able to estimate the trajectory by using three location estimates broadcasts a Warning message. Any node that is able to estimate the trajectory by using three location estimates broadcasts a Warning message. The message contains the location of the sender and parameters describing the equation of the straight line trajectory. Any node receiving the Warning message rebroadcasts it, if it is located within a distance d from the trajectory. The message contains the location of the sender and parameters describing the equation of the straight line trajectory. Any node receiving the Warning message rebroadcasts it, if it is located within a distance d from the trajectory.

Alerting The node receiving a Warning message computes, through itself, a line perpendicular to the trajectory. The node receiving a Warning message computes, through itself, a line perpendicular to the trajectory. The line divides the geographic area into two regions R1 and R2, R2 being towards the direction of motion. A node forwards the Warning message The line divides the geographic area into two regions R1 and R2, R2 being towards the direction of motion. A node forwards the Warning message

Alerting Conditions 1. It lies within a distance d from the trajectory, 1. It lies within a distance d from the trajectory, 2. The Warning message is received from a node in region R1. 2. The Warning message is received from a node in region R1.

Alerting

Why such conditions needed Such conditions are needed as the warning message propagation is suppressed outside this region. Such conditions are needed as the warning message propagation is suppressed outside this region. Without this assumption, simply larger regions need to be flooded with warning messages. Without this assumption, simply larger regions need to be flooded with warning messages. Because multiple nodes may originate Warning messages for the same detected target. Because multiple nodes may originate Warning messages for the same detected target. This is because any node detecting an target independently attempts to carry out location and trajectory estimations This is because any node detecting an target independently attempts to carry out location and trajectory estimations

Experimental Evaluation The moving target is a light source. The moving target is a light source. The experimental platform is a 60 inch × 60 inch square area with 16 motes placed at random locations in a dark room. The experimental platform is a 60 inch × 60 inch square area with 16 motes placed at random locations in a dark room. A threshold of 15 inches is used for the distance of the light source; beyond this distance the sensor reading is assumed too low to be reliable. A threshold of 15 inches is used for the distance of the light source; beyond this distance the sensor reading is assumed too low to be reliable.

Characteristics of the Photo Sensor Different sensors generate different readings for the same distance of the light source. Different sensors generate different readings for the same distance of the light source.

Tracking moving target “WO” denotes the node that originates the Warning message. “WO” denotes the node that originates the Warning message. “WR” denotes the node that receives a Warning message and lies within distance d of the estimated trajectory,but does not forward the message because it lies in the direction opposite to the direction of motion. “WR” denotes the node that receives a Warning message and lies within distance d of the estimated trajectory,but does not forward the message because it lies in the direction opposite to the direction of motion. “WF” denotes the node that receives a Warning message, lies within distance d of the estimated trajectory and also forwards the message “WF” denotes the node that receives a Warning message, lies within distance d of the estimated trajectory and also forwards the message

Tracking moving target

Tracking moving target: an interesting experimental scenario.

Concerns To decrease the variability in sensor readings, one needs to calibrate each sensor individually. To decrease the variability in sensor readings, one needs to calibrate each sensor individually. This will be difficult to do for a very large number of sensors This will be difficult to do for a very large number of sensors A large number of location samples has a strong potential to reduce errors in estimating the trajectory. A large number of location samples has a strong potential to reduce errors in estimating the trajectory.

Conclusions The sensor nodes detect and track the moving target in a collaborative fashion and alert the nodes near the predicted path of the target. The sensor nodes detect and track the moving target in a collaborative fashion and alert the nodes near the predicted path of the target. There are several factors that influence the accuracy of target tracking using low-cost sensor nodes such as the motes, and the potential problems a designer can face. There are several factors that influence the accuracy of target tracking using low-cost sensor nodes such as the motes, and the potential problems a designer can face.

Conclusions The accuracy is greatly influenced by the number of location estimation samples the designer can work with. The accuracy is greatly influenced by the number of location estimation samples the designer can work with. You cannot ensure that the light source always emits light with the same power. You cannot ensure that the light source always emits light with the same power. Experimental research using distributed networks of smart sensors is in its infancy and more work needs to be done. Experimental research using distributed networks of smart sensors is in its infancy and more work needs to be done.

Suggestions/ Question time Suggestions/ Question time