1 / 43

OCO - a method for target tracking in wireless sensor networks

OCO - a method for target tracking in wireless sensor networks. T. Andrew Yang ( yang@uhcl.edu ) with Sam Tran Computer Science Program University of Houston – Clear Lake Houston, Texas. Outline. Introduction The Methods Simulation-based Evaluation Evaluation Results

byron-mayo
Download Presentation

OCO - a method for target tracking in wireless sensor networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. OCO - a method for target tracking in wireless sensor networks T. Andrew Yang (yang@uhcl.edu) with Sam Tran Computer Science Program University of Houston – Clear Lake Houston, Texas Yang (SUTC 2006)

  2. Outline • Introduction • The Methods • Simulation-based Evaluation • Evaluation Results • Conclusion and Future Work Yang (SUTC 2006)

  3. Acknowledgement • This work is supported in part by National Science Foundation (Grant DUE-0311592) Institute of Space Systems Operations (ISSO) UHCL Faculty Research and Support Fund (No. 859) Yang (SUTC 2006)

  4. Introduction • wireless sensor networks (WSN) • a network of wireless sensor nodes. • Each node is a computer with attached sensors (aka mote) that can process, exchange sensing data, as well as communicate wirelessly among themselves to perform various tasks. • WSN have many applications in both military and civilian systems. • Sample applications: data collection, surveillance, object tracking, etc. Yang (SUTC 2006)

  5. WSN applications An example of wireless sensor network for data collection in agriculture Yang (SUTC 2006)

  6. WSN applications A scenario of enemy tracking using sensor networks Yang (SUTC 2006)

  7. The Challenges Small size of sensor node  Limited battery capacity and lower hardware performance Overlapping sensing areas (redundancy)  The network may be formed by randomly throwing thousands or even millions of sensor nodes in an area. Frequent change of network topology  The network is usually installed in a large area with many physical effects, such as earthquake, explosion, etc. Limited bandwidth of wireless links + interferences in the environment  Problems such as dropped packets and disconnected links Yang (SUTC 2006)

  8. Requirements • Accuracy of target detection – The primary goal is to ensure consistent accuracy without sacrificing the network’s longevity. • Efficient energy dissipation – The goal is to increase the overall longevity of the WSN. • Effective computation – Due to the limited processor and battery power of a sensor, computation performed on the sensor must be effective, in order to incur minimum energy dissipation. • Re-configurability – When one or more of the sensors cease to function, the network should be able to self-organize or re-configure itself, in order to re-construct a functional WSN allowing the mission to continue to be fulfilled. • Secure communications – In the context of WSN security, prevention-based security features such as authentication, data integrity, confidentiality, and availability are needed. Yang (SUTC 2006)

  9. The Methods • OCO: Optimized Communication & Organization • DC: Direct Communication • LEACH: Low Energy Adaptive Clustering Hierarchy [Heinzelman, Chandrakasan, etc., 2000] Direct Communication • The sensor modules of all nodes are ON. • Nodes send data directly to the base. Advantages • Gives the best accuracy. Disadvantages • Unrealistic because the base has limited number of channels, and node energy is limited. • Cannot be applied to a large area. • Suffer redundancy Yang (SUTC 2006)

  10. The Methods • Cluster-based method (e.g., LEACH) • Build a hierarchy tree by using LEACH algorithm: • Nodes randomly self-elect to become cluster heads. • The cluster head invites its neighbors to join to the group. • Re-elect cluster heads after a period of time for energy balancing. • Nodes send data to the base through the cluster heads. • Cluster heads communicate to the base directly. • Advantages • Simple • Disadvantages • All nodes are supposed to communicate directly with the base • Cannot be applied to a large area • suffer the channel limitation of the base • Suffer redundancy. Yang (SUTC 2006)

  11. OCO • 4 phases - position collection, processing, tracking, and maintenance • In the position collection phase, the base-station collects positions of all reachable nodes in the network. • In the processing phase, it applies image processing techniques to clean up the redundant nodes, detect border nodes, and find the shortest path from each node to the base. • In the tracking phase, the sensors in the network all work together to detect and track intruding objects. • The maintenance phase involves re-organizing the network when, for example, a change in the topology of the network occurs, or some of the sensor nodes die (i.e., running out of power). Yang (SUTC 2006)

  12. OCO- Position collection phase • Assumption: The sensor nodes are randomly scattered in the geographical area. • The base station sends a message to its neighbors to gather their IDs and positions, and at the same time advertise its own ID as the parent ID of the neighbor nodes. • The base’s neighbor nodes, after sending its ID and position to its parent (the base), marks itself as recognized, and then performs the same actions as the base does by collecting IDs and positions from their neighbors, and advertising itself as the parent node, and so on. • When a node gets the position and ID information from its neighbor, it forwards the information to its parent. Yang (SUTC 2006)

  13. OCO- Processing phase • 3 steps: • Clean up redundant nodes • Define the border nodes • Find the shortest path from each node to the base Yang (SUTC 2006)

  14. OCO: Processing phase Clean up redundant nodes Yang (SUTC 2006)

  15. OCO’s reduction of sensor nodes Yang (SUTC 2006)

  16. OCO: Processing phase- Determine the border nodes • Clean up redundant nodes • Define the border nodes • Find the shortest path from each node to the base • Finally, find a minimum set of nodes in the Area_List that contain all the border points, which are the border nodes. Yang (SUTC 2006)

  17. OCO: Processing phase Yang (SUTC 2006)

  18. Number of nodes vs percentage of border nodes Yang (SUTC 2006)

  19. OCO: Processing phase- find the shortest path Yang (SUTC 2006)

  20. Yang (SUTC 2006)

  21. Assigning roles to the nodes • At the end of the processing phase, all nodes are assigned missions. • The base broadcasts messages with node IDs to assign tasks for them. • The redundant nodes are turned off to conserve energy. They just wake up after a long period (predefined) to receive commands from the base. If there is no command or the commands do not relate to them, they again switch to off totally. • The border nodes have the sensor modules and the radio receiver modules ON (called ACTIVE state). • The rest of the nodes in the sensor network are called forwarding nodes, which have their sensor modules OFF but the radio receiver modules is ON (called FORWARD state). Yang (SUTC 2006)

  22. Roles of the nodes & initial states Yang (SUTC 2006)

  23. OCO: Tracking phase • Objects are assumed to have come from the outside. • Normally, only the border nodes are ACTIVE. • When a border node detects an object, it periodically sends its position information to the base by first forwarding the information to its parent. Yang (SUTC 2006)

  24. OCO: Maintenance phase Maintenance phase • To reconfigure the network in the case of topology change (probably due to dying or dead nodes) • Examples: exhausted nodes, damaged nodes, re-positioned nodes • Exhausted nodes  turns all its child nodes to SLEEP (orphan nodes)  sends a report to the base. • Global re-configuration: When the base gets the report, it enters the processing phase to reconfigure the whole network, with dead nodes being removed and the network restructured. • Local re-configuration: Find new parent(s) to adopt the orphans. Yang (SUTC 2006)

  25. OCO: Maintenance phaseSample case:The dead node is a forwarding node. Yang (SUTC 2006)

  26. OCO: Maintenance phaseSample case:The dead node is a border node. Yang (SUTC 2006)

  27. Simulation • The tool used for simulation is OMNET++. • There are 3 basic components needed for the simulation: • sensor node • intruder object • sensor network • In addition, we need a module called manager to help configure and run the simulation. Yang (SUTC 2006)

  28. Application Sensor Coordinator Module Radio MAC Energy Layer 0 Simulation of Sensor Nodes Yang (SUTC 2006)

  29. Simulation - Intrusion object simulation An object has only two layers: the application layer + the physical layer. Simulating a sensor network with intruder objects Yang (SUTC 2006)

  30. Create/Receive a data message Create/Receive a signal message 100 µJ 3 µJ Send a data message (d<= 60m) Send a signal message (d<=60m) 820 µJ 26 µJ Send a message (d > 60m) 100 µJ + 0.1*d^2 Sensor board (full operation) 66 µJ/s Radio board (idle/receive mode) 100 µJ/s Energy consumption calculation • We use the assumptions in [5] as the basis when calculating the energy dissipation for our simulations.[5] Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan (2000). “Energy-Efficient Communication Protocol for Wireless Microsensor Networks”. THE HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2000. Yang (SUTC 2006)

  31. Metrics • Four types of metrics are considered when comparing the performance of the three selected methods: • The total energy consumption is defined as the total energy that the network spends in a scenario. • The accuracy is a percentage of the number of detected object positions of the method over the number of detected positions of the DC. • The cost per detected point is an average number of energy units that are spent for a detected position. • The time before first dead node is the time when the first node of the network runs out of energy. This matrix is a significant indication of the sensor network’s ‘well-being’ or longevity. Yang (SUTC 2006)

  32. Simulation Settings Yang (SUTC 2006)

  33. Simulation Results • in the case of no intruder object Energy consumption Yang (SUTC 2006)

  34. Simulation Results • in the case of no intruder object time before first dead node Yang (SUTC 2006)

  35. Paths of intruding objects • Intruder objects move following specific paths and come from outside of the network area. • The moving paths of objects are created by draw images. • A MATLAB program reads the images and generates appropriate text files of positions of the path images. Yang (SUTC 2006)

  36. Simulation Results (one intruder) Energy consumption Yang (SUTC 2006)

  37. Simulation Results (one intruder) time before first dead node Yang (SUTC 2006)

  38. Simulation Results (one intruder) accuracy Yang (SUTC 2006)

  39. Simulation Results (one intruder) cost per detected points Yang (SUTC 2006)

  40. Summary • We have devised a method, OCO, for efficient target tracking in wireless sensor networks, and have evaluated its performance in various simulation scenarios against two other methods (DC and LEACH). • Based on the evaluations, OCO appears to consume less energy than the other methods while achieving superior accuracy. • The main strengths of OCO include its efficiency and easy maintenance, meaning that, when too many nodes have exhausted their energy, new nodes can be refilled to the tracking area and the OCO method will be able to dynamically build up a new network. Yang (SUTC 2006)

  41. The sensor network usually works in hostile environments; therefore, security features need to be added to OCO.  node-to-base and node-to-node authentications Re-configuration of the networks  algorithms in the maintenance phase OCO needs to be implemented in a real sensor network to further verify its performance.  WSN test beds Limitations & On-going Work Yang (SUTC 2006)

  42. A WSN Test Bed Yang (SUTC 2006)

  43. Questions? • Contact: • T. Andrew Yang • yang@uhcl.edu • University of Houston – Clear Lake • Houston, TX Yang (SUTC 2006)

More Related