Target Tracking.

Slides:



Advertisements
Similar presentations
* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Advertisements

Coverage in Wireless Sensor Network Phani Teja Kuruganti AICIP lab.
1/22 Worst and Best-Case Coverage in Sensor Networks Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, and Mani Srivastava IEEE TRANSACTIONS.
A Hierarchical Multiple Target Tracking Algorithm for Sensor Networks Songhwai Oh and Shankar Sastry EECS, Berkeley Nest Retreat, Jan
Dynamic Object Tracking in Wireless Sensor Networks Tzung-Shi Chen 1, Wen-Hwa Liao 2, Ming-De Huang 3, and Hua-Wen Tsai 4 1 National University of Tainan,
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
4/29/2015 Wireless Sensor Networks COE 499 Deployment of Sensor Networks II Tarek Sheltami KFUPM CCSE COE
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
5/2/2015 Wireless Sensor Networks COE 499 Sleep-based Topology Control II Tarek Sheltami KFUPM CCSE COE
Sensor Network 教育部資通訊科技人才培育先導型計畫. 1.Introduction General Purpose  A wireless sensor network (WSN) is a wireless network using sensors to cooperatively.
A Survey on Tracking Methods for a Wireless Sensor Network Taylor Flagg, Beau Hollis & Francisco J. Garcia-Ascanio.
산업 및 시스템 공학과 통신시스템 및 인터넷보안연구실 김효원 Optimizing Tree Reconfiguration for Mobile Target Tracking in Sensor Networks Wensheng Zhang and Guohong Cao.
Coverage Algorithms Mani Srivastava & Miodrag Potkonjak, UCLA [Project: Sensorware (RSC)] & Mark Jones, Virginia Tech [Project: Dynamic Sensor Nets (ISI-East)]
1 Prediction-based Strategies for Energy Saving in Object Tracking Sensor Networks Yingqi Xu, Wang-Chien Lee Proceedings of the 2004 IEEE International.
Coverage Issues in WSNs
Worst and Best-Case Coverage in Sensor Networks Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, Mani Srivastava IEEE TRANSACTIONS ON MOBILE.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Networks Wei-Peng Chen*, Jennifer C. Hou and Lui Sha Department of Computer Science.
1 Prediction-based Strategies for Energy Saving in Object Tracking Sensor Networks Tzu-Hsuan Shan 2006/11/06 J. Winter, Y. Xu, and W.-C. Lee, “Prediction.
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
Time Synchronization (RBS, Elson et al.) Presenter: Peter Sibley.
1-1 Topology Control. 1-2 What’s topology control?
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Topology Control II.
1 Distributed Navigation Algorithms for Sensor Networks Chiranjeeb Buragohain, Divyakant Agrawal, Subhash Suri Dept. of Computer Science, University of.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 15th Lecture Christian Schindelhauer.
1 Target Tracking with Sensor Networks Chao Gui Networks Lab. Seminar Oct 3, 2003.
1 Worst and Best-Case Coverage in Sensor Networks Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, Mani Srivastava IEEE TRANSACTIONS ON MOBILE.
A Hierarchical Energy-Efficient Framework for Data Aggregation in Wireless Sensor Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 3, MAY.
Energy-Efficient Design Some design issues in each protocol layer Design options for each layer in the protocol stack.
LPT for Data Aggregation in Wireless Sensor networks Marc Lee and Vincent W.S Wong Department of Electrical and Computer Engineering, University of British.
Scalable Information-Driven Sensor Querying and Routing for ad hoc Heterogeneous Sensor Networks Maurice Chu, Horst Haussecker and Feng Zhao Xerox Palo.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Topology Control.
A Topology Discovery Algorithm for Sensor Networks Go Suzuki CS691, SSNS Spring 2003.
Exposure In Wireless Ad-Hoc Sensor Networks S. Megerian, F. Koushanfar, G. Qu, G. Veltri, M. Potkonjak ACM SIG MOBILE 2001 (Mobicom) Journal version: S.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha Presented by Ray Lam Oct 23, 2004.
Acoustic Target Tracking Using Tiny Wireless Sensor Devices Qixin Wang, Wei-Peng Chen, Rong Zheng, Kihwal Lee, and Lui Sha Dept. of CS, UIUC.
Exposure In Wireless Ad-Hoc Sensor Networks Seapahn Meguerdichian Computer Science Department University of California, Los Angeles Farinaz Koushanfar.
The Coverage Problem in Wireless Ad Hoc Sensor Networks Supervisor: Prof. Sanjay Srivastava By, Rucha Kulkarni
Exposure In Wireless Ad-Hoc Sensor Networks Seapahn Meguerdichian Computer Science Department University of California, Los Angeles Farinaz Koushanfar.
Decentralized Scattering of Wake-up Times in Wireless Sensor Networks Amy L. Murphy ITC-IRST, Trento, Italy joint work with Alessandro Giusti, Politecnico.
Authors: Sheng-Po Kuo, Yu-Chee Tseng, Fang-Jing Wu, and Chun-Yu Lin
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha.
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
Mobile Ad hoc Networks Sleep-based Topology Control
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
Minimum Average Routing Path Clustering Problem in Multi-hop 2-D Underwater Sensor Networks Presented By Donghyun Kim Data Communication and Data Management.
MAC Protocols In Sensor Networks.  MAC allows multiple users to share a common channel.  Conflict-free protocols ensure successful transmission. Channel.
An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks Seema Bandyopadhyay and Edward J. Coyle Presented by Yu Wang.
Neighborhood-Based Topology Recognition in Sensor Networks S.P. Fekete, A. Kröller, D. Pfisterer, S. Fischer, and C. Buschmann Corby Ziesman.
Data Collection and Dissemination. Learning Objectives Understand Trickle – an data dissemination protocol for WSNs Understand data collection protocols.
Efficient Energy Management Protocol for Target Tracking Sensor Networks X. Du, F. Lin Department of Computer Science North Dakota State University Fargo,
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
UNIT IV INFRASTRUCTURE ESTABLISHMENT. INTRODUCTION When a sensor network is first activated, various tasks must be performed to establish the necessary.
2010 IEEE Fifth International Conference on networking, Architecture and Storage (NAS), pp , 2010 作者: Filip Cuckov and Min Song 指導教授:許子衡 教授 報告學生:馬敏修.
Coverage Problems in Wireless Ad-hoc Sensor Networks Seapahn Meguerdichian 1 Farinaz Koushanfar 2 Miodrag Potkonjak 1 Mani Srivastava 2 University of California,
Saran Jenjaturong, Chalermek Intanagonwiwat Department of Computer Engineering Chulalongkorn University Bangkok, Thailand IEEE CROWNCOM 2008 acceptance.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
1 Power Efficient Monitoring Management in Sensor Networks A.Zelikovsky Georgia State joint work with P. BermanPennstate G. Calinescu Illinois IT C. Shah.
I owa S tate U niversity Laboratory for Advanced Networks (LAN) Coverage and Connectivity Control of Wireless Sensor Networks under Mobility Qiang QiuAhmed.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
CMPE 259: Sensor Networks Topology Control Manikandan Punniyakotti.
Coverage and Deployment 1. Coverage Problems Coverage: is a measure of the Quality of Service (QoS) of a sensor network How well can the network observe.
UCLA Computer Science Department
Wireless Sensor Network Architectures
Net 435: Wireless sensor network (WSN)
Worst & Best-Case Coverage in Sensors Networks DEC 2004
Connectivity and Scheduling in Wireless Sensor Networks
Adaptive Topology Control for Ad-hoc Sensor Networks
Presentation transcript:

Target Tracking

Target tracking problem Problem statement A varying number of targets Arise at random in space and time Move with continuous motions Persist for a random time and possibly disappear Positions of targets are sampled at random intervals Measurements are noisy and Detection probability < 1.0 False alarms Goal: detect, alert, and track for each target

Frisbee model

Issues in Frisbee model Power savings with wake-up Can be waked up by neighbors Be able to form a “wakeup wavefront” that precedes the target Localized algorithm for defining the Frisbee boundary Each node autonomously decide if it is in the current Frisbee Adaptive fidelity

Sensing model Sensor detection model Object always detected in rage R-e Object never detected out of range R+e Object possibly detected in range [R-e, R+e] e≈ 0.1R e R Comments: Binary detection model is most simple and reliable. Location resolution is the sensing range for one sensor, however, by combining multiple sensors, resolution is improved significantly. The sensing range don’t have to be circular.

Sensing model We express the general sensing model S at an arbitrary point p for a sensor s as: where d(s,p) is the Euclidean distance between the sensor s and the point p, and positive constants  and K are sensor technology dependent parameters

A Cooperative tracking algorithm When the object enters the region where multiple sensors can detect it, its position is within the intersection of the overlapping sensing ranges. Algorithm: Each node records the duration for which the object is in its range. Neighboring nodes exchange these times and their locations. For each point of time, the object’s estimated position is computed as the weighted average of the detecting nodes’ locations. A line fitting algorithm is run on the resulting set of points.

Weight assignments Sensors that are closer to the path of the target will stay in sensor range for a longer duration.

Weight assignments R: sensor radius v: estimated speed Equal weight Proportional weight (r) Logarithmic weight R: sensor radius v: estimated speed ti: detection duration f: sampling frequency

Tracking methods One sensor at a time Minimal sensor (binary) model Each time, only the best sensor conducts tracking Minimal sensor (binary) model 1: target in range 0: target out of range Hierarchical method, clusters Acoustic sensors (delay-based collaboration) More than 3 sensors track a target jointly Tree-based group collaboration

IDSQ Information-driven sensor query Procedures Each sensor performs detection by comparing measurement with a threshold (aka, likelihood ratio test) Detecting nodes elect a leader The leader suppresses the other nodes to prevent multiple tracks for the same target The leader initializes the belief state and reports the sensory data to the sink

IDSQ DETECTION message

IDSQ Timestamp Likelihood ratio

IDSQ SUPPRESSION message

IDSQ HANDOFF message New leader reports sensory data to sink

Acoustic target tracking Context Delay based sound source locating algorithm, requires large number of redundant sensors for accuracy Tiny wireless sensors to real-world acoustic tracking applications Tracking only impulsive acoustic signals, such as foot steps, sniper shots, etc. No concept of tracking motion

Acoustic target tracking Two subsystems Acoustic target tracking subsystem Communication subsystem

System Overview Acoustic target tracking subsystem Sensor (mica motes) Sensors belong to clusters with singular cluster head. Cluster head knows the locations of its slave sensors. Raw data gathered from sensors are processed in cluster head to generate localization results Cluster Head (mono-board computer)

Acoustic target tracking subsystem Reference-broadcast synchronization (RBS) Physical layer broadcast

RBS Reference broadcasts do not have an explicit timestamp Receivers use reference broadcast’s arrival time as a point of reference for comparing nodes’ clocks Receivers synchronize with one another using the message’s timestamp (which is different from one receiver to another)

RBS illustration Transmitter A broadcasts a reference packet to two receivers (e.g., 1 and 2) Each receiver records the time that the reference was received, according to its local clock The receivers (1 and 2) exchange their observations A 1 3 2 4

Cross Correlation (to find out delays) Locate sound source location Detect interesting sound Broadcast sound signature Cluster Head Cross-correlation to detect local arrival time Report local arrival time Slave Sensor

Final position fixed Sensor (mica motes) Sensors belong to clusters with singular cluster head. Cluster head knows the locations of its slave sensors. Raw data gathered from sensors are processed in cluster head to generate localization results Cluster Head (mono-board computer)

Communication subsystem Quality-driven redundancy suppression and contention resolution (QDR) Overlapping of clusters’ monitoring areas (redundant areas) CSMA MAC interval: time unit Q: 0 is the highest quality

Scenario Sensor Router Cluster Head Sink/Pursuer Sink/ Pursuer

Multi-parent sink tree routing Communication Subsystem: route back the reports generated by cluster heads to sink Multi-parent sink tree routing Sink cluster covered area cluster head router (mica motes)

Dynamic convoy tree-based collaboration (DCTC) Hierarchical (tree) Refer to relevant slides for details

references K. Mechitov, S. Sundresh, Y. Kwon, G. Agha, “Cooperative Tracking with Binary-Detection Sensor Networks,” Technical Report UIUCDCS-R-2003-2379, Computer Science, UIUC, Sept. 2003 Juan Liu, Jie Liu, James Reich, Patrick Cheung, Feng Zhao: Distributed Group Management for Track Initiation and Maintenance in Target Localization Applications. IPSN 2003: 113-128 Qixin Wang, Wei-Peng Chen, Rong Zheng, Kihwal Lee, and Lui Sha, Acoustic Target Tracking Using Wireless Sensor Devices, Proc. of the 2nd Workshop on Information Processing in Sensor Networks (IPSN03), April 2003 Fine-Grained Network Time Synchronization using Reference Broadcasts, Jeremy Elson, Lewis Girod and Deborah Estrin, In Proceedings of the Fifth Symposium on Operating Systems Design and Implementation (OSDI 2002)

Sensor coverage and sleeping

Assumption Sensing effectiveness diminishes as distance increases (monotonic) E.g., Homogeneous sensor nodes Non-directional sensing technology Centralized computation model

How well can the field be observed ? Coverage Formulation How well can the field be observed ? Worst Case Coverage: Maximal Breach Path Best Case Coverage: Maximal Support Path The “paths” are generally not unique. They quantify the best and worst case observability (coverage) in the sensor field.

Maximal Breach Path (PB) Given: Field A instrumented with sensors; areas I and F. Problem: Identify PB, the maximal breach path in S, starting in I and ending in F. PB is defined as a path with the property that for any point p on the path PB, the distance from p to the closest sensor is maximized.

Voronoi diagram The plane is partitioned by assigning every point in the plane to the nearest site

Voronoi diagram A Voronoi Line consists of points which are equidistant to two sites in the plane.

Enabling Step: Voronoi Diagram By construction, each line-segment maximizes distance from the nearest point (sensor). Consequence: Path of Maximal Breach of Surveillance in the sensor field lies on the Voronoi diagram lines.

Graph-Theoretic Formulation Given: Voronoi diagram D with vertex set V and line segment set L and sensors S Construct graph G(N,E): Each vertex viV corresponds to a node ni N Each line segment li L corresponds to an edge ei E Each edge eiE, Weight(ei) = Distance of li from closest sensor sk S Formulation: Is there a path from I to F which uses no edge of weight less than K?

Finding Maximal Breach Path Algorithm Generate Voronoi Diagram Apply Graph-Theoretic Abstraction Search for PB Check existence of path I --> F using binary search and BFS

Delaunay triangulation The Delaunay triangulation of a point set is a collection of edges satisfying an "empty circle" property For each edge we can find a circle containing the edge's endpoints but not containing any other points

Delaunay Triangulation The Delaunay triangulation is a triangulation which is equivalent to the nerve of the cells in a Voronoi diagram

Maximal Support Path Given: Delaunay Triangulation of the sensor nodes Construct graph G(N,E): The graph is dual to the Voronoi graph previously described Formulation: what is the path from which the agent can best be observed while moving from I to F? (The path is embedded in the Delaunay graph of the sensors) Solution: Similar to the max breach algorithm, use BFS and Binary Search to find the shortest path on the Delaunay graph.

PEAS: probing environment and adaptive sleeping

Basic Approach and assumption Exploit the redundancy Keep a necessary subset of nodes working; turn off others into sleeping Sleeping nodes replace failed ones as needed Assume nodes can control the transmitting power to reach a given radius Variable tx power available in Berkeley motes

Probing Environment working No REPLY is heard Each node sleeps for a random time ts ts follows an exponential distribution f(ts) = e- ts The PROBE message is within a radius Rp (given by applications) Rp < maximum tx range Rt Working nodes send back REPLY when hearing the PROBE (also within radius Rp) working No REPLY is heard Broadcast a PROBE within Rp (probing range) sleeping probing Upon hearing a REPLY (, probing rate, is adjusted)

Design rationale Adjacent working nodes keep appropriate distances (at least Rp) Redundancy in sensing and communicating function at appropriate levels Probing avoid per-neighbor state about topology information maintenance Randomized sleeping times Spread over time to reduce “gap”, avoid prediction of a working node’s active time

Adaptive Sleeping Goal: keep the aggregate PROBE rate on a desired level _d (specified by the application) independent from node densities at different locations, over time Probing rate decides how quick a dead node can be replaced Unnecessary overhead if too frequent Long gaps if too slow Basic idea working node measures the aggregate PROBE rate piggybacks the info in REPLY probing nodes adjust their rates accordingly.

How it works … Time K wakeups Example: A working node keeps Counter C Last measurement time t0 Increase the counter each time a PROBE is heard Calculate aggregate PROBE rate _a and includes it in REPLYs Each probing neighbor adjusts its rate accordingly Ts … Time t0 t K wakeups Measure aggregate rate: _a = K / (t - t0) Each probing one adjusts: _new =  (_d / _a ) Example: An application wants _d = 6 times/min. Working node A has 5 sleeping neighbors, each probes at  =6. Node A measures aggregate _a = 30. Each sleeping one adjusts to _new = 6(6/30)=1.2, thus new _a = 6

Maximum distance between working neighbors Working node A puts nodes in cell 4, 5, 6 into sleep To put node C in cell 2 into sleep, node B’s maximum distance to A is (1+5)Rp Otherwise, C will be working When there’s at least one node in each cell, distance between working neighbors is bounded Theorem 3.1: when Rt > (1+5)Rp, and conditions in Blough’s Theorem 2 hold (mobicom ’02), working nodes are connected asymptotically. Rp 3 B C 4 5 A C 2 6 1

references Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, Mani Srivastava. "Coverage Problems in Wireless Ad-Hoc Sensor Networks." IEEE Infocom 2001, Vol. 3, pp. 1380-1387, April 2001. Seapahn Meguerdichian, Farinaz Koushanfar, Gang Qu, Miodrag Potkonjak. "Exposure in Wireless Ad Hoc Sensor Networks." Procs. of 7th Annual International Conference on Mobile Computing and Networking, pp. 139-150, July 2001 Fan Ye, Gary Zhong, Jesse Cheng, Songwu Lu, Lixia Zhang, "PEAS: A Robust Energy Conserving Protocol for Long-lived Sensor Networks", in ICDCS'03, 2003