A Survey on Tracking Methods for a Wireless Sensor Network Taylor Flagg, Beau Hollis & Francisco J. Garcia-Ascanio.

Slides:



Advertisements
Similar presentations
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Advertisements

A Hierarchical Multiple Target Tracking Algorithm for Sensor Networks Songhwai Oh and Shankar Sastry EECS, Berkeley Nest Retreat, Jan
Directed Diffusion for Wireless Sensor Networking
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
HIERARCHY REFERENCING TIME SYNCHRONIZATION PROTOCOL Prepared by : Sunny Kr. Lohani, Roll – 16 Sem – 7, Dept. of Comp. Sc. & Engg.
Distributed Indexing and Querying in Sensor Networks using Statistical Models Arnab Bhattacharya Indian Institute of Technology (IIT),
Algorithms in sensor networks By: Raghavendra kyatham.
An Energy Efficient Routing Protocol for Cluster-Based Wireless Sensor Networks Using Ant Colony Optimization Ali-Asghar Salehpour, Babak Mirmobin, Ali.
TOPOLOGIES FOR POWER EFFICIENT WIRELESS SENSOR NETWORKS ---KRISHNA JETTI.
Sensor Network 教育部資通訊科技人才培育先導型計畫. 1.Introduction General Purpose  A wireless sensor network (WSN) is a wireless network using sensors to cooperatively.
Efficient Location Tracking Using Sensor Networks H. T. Kung and D. Vlah WCNC 2003 Speaker : Chi-Chih Wu.
Rumor Routing Algorithm For sensor Networks David Braginsky, Computer Science Department, UCLA Presented By: Yaohua Zhu CS691 Spring 2003.
산업 및 시스템 공학과 통신시스템 및 인터넷보안연구실 김효원 Optimizing Tree Reconfiguration for Mobile Target Tracking in Sensor Networks Wensheng Zhang and Guohong Cao.
A Cloud-Assisted Design for Autonomous Driving Swarun Kumar Shyamnath Gollakota and Dina Katabi.
A Novel Cluster-based Routing Protocol with Extending Lifetime for Wireless Sensor Networks Slides by Alex Papadimitriou.
GS 540 week 6. HMM basics Given a sequence, and state parameters: – Each possible path through the states has a certain probability of emitting the sequence.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 LINK STATE PROTOCOLS (contents) Disadvantages of the distance vector protocols Link state protocols Why is a link state protocol better?
Progress Report Wireless Routing By Edward Mulimba.
Distributed Regression: an Efficient Framework for Modeling Sensor Network Data Carlos Guestrin Peter Bodik Romain Thibaux Mark Paskin Samuel Madden.
Mobile Agents for Adaptive Routing Presented by Hong-Jiun Chen & Manu Prasanna Gianni Di Caro & Marco Dorigo.
Mesh Networks A.k.a “ad-hoc”. Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology- each.
He Huang Introduction:The Flooding Time Synchronization Protocol.
Dissemination protocols for large sensor networks Fan Ye, Haiyun Luo, Songwu Lu and Lixia Zhang Department of Computer Science UCLA Chien Kang Wu.
May 14, Organization Design and Dynamic Resources Huzaifa Zafar Computer Science Department University of Massachusetts, Amherst.
Chess Review May 11, 2005 Berkeley, CA Tracking Multiple Objects using Sensor Networks and Camera Networks Songhwai Oh EECS, UC Berkeley
Probabilistic Data Aggregation Ling Huang, Ben Zhao, Anthony Joseph Sahara Retreat January, 2004.
Ad Hoc Networks Routing
Distributed Algorithms for Guiding Navigation across a Sensor Network Qun Li, Michael DeRosa, and Daniela Rus Dartmouth College MOBICOM 2003.
LPT for Data Aggregation in Wireless Sensor networks Marc Lee and Vincent W.S Wong Department of Electrical and Computer Engineering, University of British.
May 11, 2005 Tracking on a Graph Songhwai Oh Shankar Sastry Target trajectoriesEstimated tracks Tracking in Sensor Networks Target tracking is a representative.
Wireless Distributed Sensor Networks Special Thanks to: Jasvinder Singh Hitesh Nama.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha Presented by Ray Lam Oct 23, 2004.
Network Topologies.
Energy-Aware Synchronization in Wireless Sensor Networks Yanos Saravanos Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
1 Pertemuan 20 Teknik Routing Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Decentralized Scattering of Wake-up Times in Wireless Sensor Networks Amy L. Murphy ITC-IRST, Trento, Italy joint work with Alessandro Giusti, Politecnico.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha.
ROUTING ALGORITHMS IN AD HOC NETWORKS
Message-Passing for Wireless Scheduling: an Experimental Study Paolo Giaccone (Politecnico di Torino) Devavrat Shah (MIT) ICCCN 2010 – Zurich August 2.
COMPUTING AGGREGATES FOR MONITORING WIRELESS SENSOR NETWORKS Jerry Zhao, Ramesh Govindan, Deborah Estrin Presented by Hiren Shah.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
College of Engineering Grid-based Coordinated Routing in Wireless Sensor Networks Uttara Sawant Major Advisor : Dr. Robert Akl Department of Computer Science.
Neighborhood-Based Topology Recognition in Sensor Networks S.P. Fekete, A. Kröller, D. Pfisterer, S. Fischer, and C. Buschmann Corby Ziesman.
The Performance of Query Control Schemes for the Zone Routing Protocol Zygmunt J. Haas Marc R. Pearlman.
1 Shape Segmentation and Applications in Sensor Networks Xianjin Xhu, Rik Sarkar, Jie Gao Department of CS, Stony Brook University INFOCOM 2007.
Differential Ad Hoc Positioning Systems Presented By: Ramesh Tumati Feb 18, 2004.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Data Dissemination Based on Ant Swarms for Wireless Sensor Networks S. Selvakennedy, S. Sinnappan, and Yi Shang IEEE 2006 CONSUMER COMMUNICATIONS and NETWORKING.
Using Ant Agents to Combine Reactive and Proactive strategies for Routing in Mobile Ad Hoc Networks Fredrick Ducatelle, Gianni di caro, and Luca Maria.
Ben Miller.   A distributed algorithm is a type of parallel algorithm  They are designed to run on multiple interconnected processors  Separate parts.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
KAIS T Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for Wireless Sensor Networks Harshavardhan Sabbineni and Krishnendu Chakrabarty.
Protocols for Wireless Sensor Networks
Introduction to Wireless Sensor Networks
Wireless Sensor Network Architectures
Net 435: Wireless sensor network (WSN)
Presented by Prashant Duhoon
CS 457 – Lecture 12 Routing Spring 2012.
Intra-Domain Routing Jacob Strauss September 14, 2006.
Routing.
Protocols.
Overview: Chapter 2 Localization and Tracking
Protocols.
Presentation transcript:

A Survey on Tracking Methods for a Wireless Sensor Network Taylor Flagg, Beau Hollis & Francisco J. Garcia-Ascanio

Overview Sensor Network Tracking Hierarchical Approach Hierarchical Approach Hidden Markov Model with Binary Sensors Hidden Markov Model with Binary Sensors Compare and Contrast Compare and Contrast Pursuit Evasion Games Two-Tier Approach Two-Tier Approach Multi-Hop Approach Multi-Hop Approach Ant-Based Approach Ant-Based Approach Compare and Contrast Compare and ContrastConclusion

Sensor Network Tracking Tracking an object moving through a field of sensors Smart House Smart House Air Traffic Control Air Traffic Control Fleet Monitoring Fleet Monitoring Security Security Many sensor types can be used

Hierarchical Approach STUN: Scalable Tracking Using Networked sensors Sensor network described as a hierarchical graph Sensor network described as a hierarchical graph Each node has a detection set Each node has a detection set Object positions are queried from the root using detection sets Object positions are queried from the root using detection sets

Detection Sets Nodes broadcast detected objects Parents broadcast set of objects detected by their child nodes Only broadcast when set changes Redundant massages are pruned

Graph weights The sensor graph is weighted based on movement patterns Higher weight means more objects transition between those two nodes

Communication Cost Depends on number of messages transmitted Tree structure affect cost

DAB – Drain and Balance Idea Imagine flooding a mountain range Imagine flooding a mountain range At each step water level is lowered and visible peaks are added to the tree At each step water level is lowered and visible peaks are added to the tree Actual Algorithm Set a weight threshold Set a weight threshold Add balanced sets of with weights above the threshold Add balanced sets of with weights above the threshold Iteratively lower threshold and reapply Iteratively lower threshold and reapply

Drain and Balance Example

Using Hidden Markov Model to Track with Binary Sensors Binary sensors only report if an object is detected or not Reduces affect of calibration and error Sensor location is not needed Object paths are based on statistical analysis

Graph Sensor graph with links for adjacent sensors Graph forms Hidden Markov Model (HMM) HMM is used to calculate probable object paths Path prediction uses the Viterbi Algorithm

Implementation Each node stores 3 values required for the path calculation Probability of an object starting at that node Probability of an object starting at that node Probability that objects will be accurate detected (accounts for sensor error) Probability that objects will be accurate detected (accounts for sensor error) Matrix of probabilities for transition to another node in the node’s neighborhood Matrix of probabilities for transition to another node in the node’s neighborhood

Pruning and Overlap

Similarities Avoid localization issues by graphing sensor topology Communicate in between nodes rather than flooding the network Pruning redundant information Use pre-computed probabilities and weights to gain efficiency

Differences HMM Operates on binary sensors Operates on binary sensors Processes all necessary information in each individual node, distributes tracking Processes all necessary information in each individual node, distributes tracking Communicates back and forth among neighbors Communicates back and forth among neighborsSTUN Made for non-uniform movement Made for non-uniform movement Leaves actual tracking to a centralized query- point Leaves actual tracking to a centralized query- point Only communicates up hierarchy tree Only communicates up hierarchy tree

Pursuit Evasion Games Autonomous agents (Pursuers) pursue one or more non-cooperative agents (evaders) Sensor networks are used to detect evaders

Pursuit Evasion Games In traditional PEG’s The evaders attempt to avoid detection and capture by varying speed and direction The evaders attempt to avoid detection and capture by varying speed and direction Different forms of PEG’s consist of Rescue operations Rescue operations Surveillance Surveillance Localization and tracking of moving parts in a warehouse, etc. Localization and tracking of moving parts in a warehouse, etc.

Lower Tier Numerous nodes Numerous nodes Handles simple detection Handles simple detection Limited resources Limited resources Provide basic information Provide basic information Power conservation Power conservation Results gathered don’t need to be perfect Results gathered don’t need to be perfect Leader election algorithm based on strongest detection Leader election algorithm based on strongest detection Two-Tier Approach

Higher Tier Fewer nodes Fewer nodes Nodes are more complex (e.g. sophisticated camera nodes.) Nodes are more complex (e.g. sophisticated camera nodes.) Handles processing and initiates actions Handles processing and initiates actions Resulting actions sent to the pursuer Resulting actions sent to the pursuer

Pursuer has its own onboard software service for interception and navigation Receives detection events from the network Receives detection events from the network Determines if event was caused by the evader, another pursuer, or noise Determines if event was caused by the evader, another pursuer, or noise Pursuer only needs data from the network every few seconds Pursuer only needs data from the network every few seconds Uses GPS to calculate an interception destination Uses GPS to calculate an interception destination Pursuer in Two Tier System

Multi-Hop Approach Sensor nodes estimate evader positions and push their data to other nodes and to the pursuer Super nodes Receive data and do processing to get a composite estimate Receive data and do processing to get a composite estimate Collaborate with neighbors to further improve the estimates Collaborate with neighbors to further improve the estimates Broadcast final estimate to pursuer Broadcast final estimate to pursuer

Multi-Hop Problems Cost effective sensors are problematic Small power supply Small power supply Low detection probability Low detection probability High false alarm rate High false alarm rate With each hop, likelihood of transmission failure and packet delays increase

Ant-Based Approach Based on how ants gather food Ants leave trail of pheromones Ants leave trail of pheromones Other ants follow the direction in which pheromones are most intense Other ants follow the direction in which pheromones are most intense Sensors store a timestamp of evader detection Pursuer looks compares timestamps in a region to derive the evaders direction

Ant-Based Implementation Ant-Based approach is broken down into three phases: Reporting the Initial Position Reporting the Initial Position Initiation of Tracking Initiation of Tracking Tracking Tracking

Reporting the Initial Position Starts when first sensor detects evader. This node will do the following Contacts pursuer Contacts pursuer Broadcast to entire network about the evader and suppresses other nodes from contacting the purser with redundant information Broadcast to entire network about the evader and suppresses other nodes from contacting the purser with redundant information Subsequent nodes will send new information to the purser but not the entire network

Initiation of Tracking Pursuer heads toward the first node to detect the evader Pursuer queries nearby nodes for timestamps These timestamps are used to determine the velocity vector

Tracking Pursuer intelligently queries only nodes in the direction of the velocity vector Compares timestamps and looks for larger timestamp value Cuts down on communication costs The velocity vector is updated and the process is repeated until the evader is captured or leaves the network

Similarities Sensor nodes are pre-established in the region that the evader will occupy Systems provide a lower tier of nodes that only collect evader data

Differences Two-Tier Higher tier contain processing and tracking algorithms Dedicated software services located on the pursuer Elect a leader node to distribute information Results don’t need to be perfect Leader election based on strongest detection Multi-Hop Higher tier nodes contain processing and tracking algorithms Collaborates with neighboring super nodes to improve estimates Super node similar to leader election to propagate information to pursuer Ant-Based Nodes collect timestamp of evader Pursuer uses timestamp to get velocity vector and which node to contact next Nodes communicate only with pursuer

Conclusions The tiers systems can benefit from hierarchal topology Super nodes are at the root of the tree Super nodes are at the root of the tree Ant based approach Use HMM to shift processing from the pursuer to sensor network Use HMM to shift processing from the pursuer to sensor network Pursuers queries the sensors Pursuers queries the sensors