• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Optimizing tree reconfiguration for mobile target tracking in sensor networks, in: (2004)

by W Zhang, G Cao
Venue:IEEE INFOCOM,
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 82
Next 10 →

Vigilnet: An Integrated Sensor Network System for Energy-Efficient Surveillance

by Tian He, Sudha Krishnamurthy, Liqian Luo, Ting Yan, Lin Gu, Radu Stoleru, Gang Zhou, Qing Cao, Pascal Vicaire, John A. Stankovic, Tarek F. Abdelzaher, Jonathan Hui, Bruce Krogh, Tianhe@cs. Umn. Edu S. Krishnamurthy, Liqian Luo, T. Yan, L. Gu, R. Stoleru, G. Zhou, Qing Cao - ACM Transaction on Sensor Networks , 2006
"... This article describes one of the major efforts in the sensor network community to build an integrated sensor network system for surveillance missions. The focus of this effort is to acquire and verify information about enemy capabilities and positions of hostile targets. Such missions often involve ..."
Abstract - Cited by 159 (36 self) - Add to MetaCart
This article describes one of the major efforts in the sensor network community to build an integrated sensor network system for surveillance missions. The focus of this effort is to acquire and verify information about enemy capabilities and positions of hostile targets. Such missions often involve a high element of risk for human personnel and require a high degree of stealthiness. Hence, the ability to deploy unmanned surveillance missions, by using wireless sensor networks, is of great practical importance for the military. Because of the energy constraints of sensor devices, such systems necessitate an energy-aware design to ensure the longevity of surveillance missions. Solutions proposed recently for this type of system show promising results through simulations. However, the simplified assumptions they make about the system in the simulator often do not hold well in practice, and energy consumption is narrowly accounted for within a single protocol. In this article, we describe the design and implementation of a complete running system, called VigilNet, for energyefficient surveillance. The VigilNet allows a group of cooperating sensor devices to detect and track the positions of moving vehicles in an energy-efficient and stealthy manner. We evaluate VigilNet middleware components and integrated system extensively on a network of 70 MICA2 motes. Our results show that our surveillance strategy is adaptable and achieves a significant extension of

Sensor relocation in mobile sensor networks

by Guiling Wang, Guohong Cao, Tom La Porta, Wensheng Zhang - In Proc. of IEEE INFOCOM , 2005
"... Abstract — Recently there has been a great deal of research on using mobility in sensor networks to assist in the initial deployment of nodes. Mobile sensors are useful in this environment because they can move to locations that meet sensing coverage requirements. This paper explores the motion capa ..."
Abstract - Cited by 98 (5 self) - Add to MetaCart
Abstract — Recently there has been a great deal of research on using mobility in sensor networks to assist in the initial deployment of nodes. Mobile sensors are useful in this environment because they can move to locations that meet sensing coverage requirements. This paper explores the motion capability to relocate sensors to deal with sensor failure or respond to new events. We define the problem of sensor relocation and propose a two-phase sensor relocation solution: redundant sensors are first identified and then relocated to the target location. We propose a Grid-Quorum solution to quickly locate the closest redundant sensor with low message complexity, and propose to use cascaded movement to relocate the redundant sensor in a timely, efficient and balanced way. Simulation results verify that the proposed solution outperforms others in terms of relocation time, total energy consumption, and minimum remaining energy. I.

Structure-free data aggregation in sensor networks

by Kai-wei Fan, Sha Liu, Prasun Sinha - IEEE Transactions on Mobile Computing , 2006
"... Abstract—Data aggregation protocols can reduce the communication cost, thereby extending the lifetime of sensor networks. Prior works on data aggregation protocols have focused on tree-based or cluster-based structured approaches. Although structured approaches are suited for data gathering applicat ..."
Abstract - Cited by 61 (5 self) - Add to MetaCart
Abstract—Data aggregation protocols can reduce the communication cost, thereby extending the lifetime of sensor networks. Prior works on data aggregation protocols have focused on tree-based or cluster-based structured approaches. Although structured approaches are suited for data gathering applications, they incur high maintenance overhead in dynamic scenarios for event-based applications. The goal of our work is to design techniques and protocols that lead to efficient data aggregation without explicit maintenance of a structure. As packets need to converge spatially and temporally for data aggregation, we propose two corresponding mechanisms—Data-Aware Anycast at the MAC layer and Randomized Waiting at the application layer. We model the performance of the combined protocol that uses both the approaches and show that our analysis matches with the simulations. Using extensive simulations and experiments on a testbed with implementation in TinyOS, we study the performance and potential of structure-free data aggregation. Index Terms—Anycasting, data aggregation, sensor networks, structure-free. 1
(Show Context)

Citation Context

...ed aggregation techniques incur low maintenance overhead and are therefore suited for such applications. Various distributed structured approaches have been proposed for event-based applications [7], =-=[8]-=-, [9], [10]. However, there are several limitations of structured aggregation techniques for event-based applications. First, for dynamic scenarios, the overhead of construction and maintenance of the...

Attack-Resilient Time Synchronization for Wireless Sensor Networks

by Hui Song, Sencun Zhu, Guohong Cao , 2007
"... ..."
Abstract - Cited by 37 (2 self) - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...the network. Examples of such applications include mobile object tracking, data aggregation, TDMA radio scheduling, message ordering, to name a few. Consider the application of mobile object tracking =-=[1]-=-, in which a sensor network is deployed in an area of interest to monitor passing objects. When an object appears, the detecting nodes record the detecting location and the detecting time. Later, thes...

Architecture of Wireless Sensor Networks with Mobile Sinks: Multiple Access Case

by Liang Song, Dimitrios Hatzinakos, Senior Member - International Journal of Distributed Sensor Networks , 2005
"... (LESOP) for target tracking in dense wireless sensor networks. A cross-layer design perspective is adopted in LESOP for high protocol efficiency, where direct interactions between the Application layer and the Medium Access Control (MAC) layer are exploited. Unlike the classical Open Systems Interco ..."
Abstract - Cited by 34 (3 self) - Add to MetaCart
(LESOP) for target tracking in dense wireless sensor networks. A cross-layer design perspective is adopted in LESOP for high protocol efficiency, where direct interactions between the Application layer and the Medium Access Control (MAC) layer are exploited. Unlike the classical Open Systems Interconnect (OSI) paradigm of communication networks, the Transport and Network layers are excluded in LESOP to simplify the protocol stack. A lightweight yet efficient target localization algorithm is proposed and implemented, and a Quality of Service (QoS) knob is found to control the tradeoff between the tracking error and the network energy consumption. Furthermore, LESOP serves as the first example in demonstrating the migration from the OSI paradigm to the Embedded Wireless Interconnect (EWI) architecture platform, a two-layer efficient architecture proposed here for wireless sensor networks. Index Terms—Application layer, embedded wireless interconnect, medium access control, open systems interconnect, target tracking, wireless sensor networks. I.
(Show Context)

Citation Context

...icient implemented in wireless sensor networks. Moreover, energy efficiency was not considered in the work of CSP. Zhang et al. proposed optimized tree reconfiguration for target tracking networks in =-=[16]-=-, which is concentrated on the Network layer domain, and shaped by the tracking application requirements. Potential optimization in lower layers, however, was also not considered. Related work also in...

Distributed dynamic scheduling for end-to-end rate guarantees in wireless ad hoc networks

by Theodoros Salonidis - In Wireless Ad Hoc Networks. In Proc. ACM MobiHoc, Urbana-Champaign, IL , 2005
"... We present a framework for the provision of deterministic end-toend bandwidth guarantees in wireless ad hoc networks. Guided by a set of local feasibility conditions, multi-hop sessions are dynamically offered allocations, further translated to link demands. Using a distributed Time Division Multipl ..."
Abstract - Cited by 32 (1 self) - Add to MetaCart
We present a framework for the provision of deterministic end-toend bandwidth guarantees in wireless ad hoc networks. Guided by a set of local feasibility conditions, multi-hop sessions are dynamically offered allocations, further translated to link demands. Using a distributed Time Division Multiple Access (TDMA) protocol nodes adapt to the demand changes on their adjacent links by local, conflict-free slot reassignments. As soon as the demand changes stabilize, the nodes must incrementally converge to a TDMA schedule that realizes the global link (and session) demand allocation. We first derive sufficient local feasibility conditions for certain topology classes and show that trees can be maximally utilized. We then introduce a converging distributed link scheduling algorithm that exploits the logical tree structure that arises in several ad hoc network applications. Decoupling bandwidth allocation to multi-hop sessions from link scheduling allows support of various end-to-end Quality of Service (QoS) objectives. We focus on the max-min fairness (MMF) objective and design an end-to-end asynchronous distributed algorithm for the computation of the session MMF rates. Once the end-to-end algorithm converges, the link scheduling algorithm converges to a TDMA schedule that realizes these rates. We demonstrate the applicability of this framework through an implementation over an existing wireless technology. This implementation is free of restrictive assumptions of previous TDMA approaches: it does not require any a-priori knowledge on the number of nodes in the network nor even network-wide slot synchronization.
(Show Context)

Citation Context

...are high speed internet access from a wired entry point through a low cost multi-hop wireless infrastructure [12, 15, 30]. In sensor networks data is reported to a single source over a tree structure =-=[24, 48]-=-. Trees are also used in Bluetooth scatternets [18, 47, 42] and mobile ad hoc networks (MANETs) for power-aware multicasting [44] or routing backbone structures [35]. Motivated by such applications, w...

A spatiotemporal query service for mobile users in sensor networks

by Chenyang Lu, Guoliang Xing, Octav Chipara, Chien-liang Fok, Sangeeta Bhattacharya - In ICDCS ’05 , 2005
"... This paper presents MobiQuery, a spatiotemporal query service that allows mobile users to periodically gather information from their surrounding areas through a wireless sensor network. A key advantage of MobiQuery lies in its capability to meet stringent spatiotemporal performance constraints cruci ..."
Abstract - Cited by 31 (3 self) - Add to MetaCart
This paper presents MobiQuery, a spatiotemporal query service that allows mobile users to periodically gather information from their surrounding areas through a wireless sensor network. A key advantage of MobiQuery lies in its capability to meet stringent spatiotemporal performance constraints crucial to many applications. These constraints include query latency, data freshness and fidelity, and changing query areas due to user mobility. A novel justin-time prefetching algorithm enables MobiQuery to maintain robust spatiotemporal guarantees even when nodes operate under extremely low duty cycles. Furthermore, it significantly reduces the storage cost and network contention caused by continuous queries from mobile users. We validate our approach through both theoretical analysis and simulation results under a range of realistic settings. 1
(Show Context)

Citation Context

...protocols, MobiQuery is designed to query an area that moves with an user. Dealing with both user mobility and time-varying data sources introduces new challenges to the design of data services. DCTC =-=[22]-=- is an object tracking protocol that maintains a tree around a moving target. DCTC wakes up the nodes ahead of the target based on motion prediction schemes. However, while DCTC only provides a best e...

Efficient Key Establishment for Group-Based Wireless Sensor Deployments

by Li Zhou, Jinfeng Ni, Chinya V. Ravishankar - in ACM WiSe’05 , 2005
"... Establishing pairwise keys for each pair of neighboring sensors is the first concern in securing communication in sensor networks. This task is challenging because resources are limited. Several random key predistribution schemes have been proposed, but they are appropriate only when sensors are uni ..."
Abstract - Cited by 30 (2 self) - Add to MetaCart
Establishing pairwise keys for each pair of neighboring sensors is the first concern in securing communication in sensor networks. This task is challenging because resources are limited. Several random key predistribution schemes have been proposed, but they are appropriate only when sensors are uniformly distributed with high density. These schemes also suffer from a dramatic degradation of security when the number of compromised sensors exceeds a threshold. In this paper, we present a group-based key predistribution scheme, GKE, which enables any pair of neighboring sensors to establish a unique pairwise key, regardless of sensor density or distribution. Since pairwise keys are unique, security in GKE degrades gracefully as the number of compromised nodes increases. In addition, GKE is very efficient since it requires only localized communication to establish pairwise keys, thus significantly reducing the communication overhead. Our security analysis and performance evaluation illustrate the superiority of GKE in terms of resilience, connectivity, communication overhead and memory requirement. Categories and Subject Descriptors C.2 [Computer-Communication Networks]: secuirty and protection;
(Show Context)

Citation Context

...5.00. 1 are becoming cheap enough for them to be deployed on demand, and in environments where access or maintenance is ruled out. Sensors typically need to communicate with their neighboring sensors =-=[24, 21, 22]-=-, aggregating sensing data into a more compact report and then transmitting it to the base station over multiple hops. Messages sent between neighboring sensors may contain sensitive data or commands ...

Adaptive data fusion for energy efficient routing in wireless sensor networks

by H Luo, J Luo, Y Liu, S K Das - IEEE Trans. Computers
"... ..."
Abstract - Cited by 20 (0 self) - Add to MetaCart
Abstract not found

W paths in wireless sensor networks

by Hongwei Zhang, See Profile, Jinhong Xu, Xiaohui Liu, Loren J. Rittle, Jinhong Xu, Xiaohui Liu, Loren J. Rittle - Proceedings of MSN 2005 , 2005
"... All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately. ..."
Abstract - Cited by 19 (5 self) - Add to MetaCart
All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately.
(Show Context)

Citation Context

...nodes surrounding it can detect it. A leader node (source) among them periodically generates sensing data about the target, based on its own detection [17] or the readings of multiple detecting nodes =-=[18]-=-. As the target moves SpringerWireless Netw (2007) 13:583–595 585 away from its current source, the source is changed to be another node closer to the target. Some mobile hosts (e.g., PDAs) are movin...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University