Article

Object tracking using wireless sensor networks /

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

Wireless sensor network (WSN) is a promising new technology. It could be a way to achieve ubiquitous computing and embedded Internet. WSNs are an efficient solution for applications that involve deep monitoring of a deployment environment. The objective of this thesis is to explore the use of WSNs for object tracking and motion estimation. It introduces the WSN technology, their theoretical characteristics, system constraints, WSN architectures, deployment topologies and standards. The object-tracking system that this thesis introduces, demonstrates a real-world application that uses a WSN to track objects and communicate their information. It is an event-driven application implemented in Java, built on top of the Crossbow MSP 410 wireless sensor system. The algorithm process the data returned from the WSN detection signals and tracks the object's motion. Deployment scenarios are proposed that demonstrate suitable node topologies for the system. The evaluation of the object-tracking system is performed by conducting a number of indoor and outdoor experiments. Thesis Advisor(s): Gurminder Singh, Arijit Das. Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2005. Includes bibliographical references (p. 271-273). System requirements: Adobe Acrobat reader.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... Topology overview of OTAv1 straight road scenario (From:Salatas, 2005) ...
... Topology overview of OTAv1 T-road scenario (From:Salatas, 2005) Topology overview of OTAv1 4-way intersection scenario (From:Salatas, 2005) ...
... Topology overview of OTAv1 T-road scenario (From:Salatas, 2005) Topology overview of OTAv1 4-way intersection scenario (From:Salatas, 2005) ...
Article
Wireless Sensor Networks (WSNs) are a relatively new technology with many potential applications, including military and homeland security surveillance operations. Accurate classification of WSN contacts has been attempted using various sensor combinations over the past few years, yet video and photographic imagery remain the only choices for attaining context specific contact classification. While cameras have been successfully installed within some WSNs, there are serious limitations to this solution. Most stemming from the scarce power resources, immobility, and small form factor common among conventional WSN nodes. An efficient, low cost answer to this problem involves the use of unmanned aerial vehicles (UAVs) to acquire imagery of WSN contacts. For this system to scale to the wide expanses that WSNs deploy over, UAV contact surveillance operations must be controlled autonomously. The objective of this thesis is to research and implement an autonomous UAV WSN system, where an optimized two-dimensional flight plan is produced in response to WSN contact detection. Flight plans autonomously guide the UAV on a course to either an estimated interception point with the WSN contact or to the instigated WSN cluster, depending upon user input. The event driven application produced in this study functions in the periphery of the Kestrel Autopilot System, communicating flight plans to the UAV through properly crafted Kestrel packets.
... 1. In his master thesis, Salatas constructs an object-tracking system that demonstrates a realworld application using a WSN to track objects and communicate the tracking information to the base station [1]. The thesis talks about an event-driven application implemented in Java, built on top of the Crossbow MSP 410 wireless sensor system. ...
... Also address efficient ways to algorithmically analyze the collected the raw data from the specific wireless sensor networks product. However the main focus is the deployment of a real world object tracking application using wireless sensor networks, it also provides idea to explore overall wireless communication [1].Figure 1 above shows the overall system High-Level View. It shows the wireless sensor network (formed by the nodes: white colored boxes) is connected with some another system Tactical Remote Sensor System version 3 (TSSRv3). ...
... It then transmits those pictures to the control station by using satellite or cellular communications. In the overall system, the subsystem is responsible for taking photos, acting, at the proper time after the object's detection, and tracking [1]. This Object-tracking application receives and uses the raw values returned by the sensor network system to produce clear and meaningful outputs. ...
Article
Full-text available
Wireless sensor networks (WSN) represent a new technology that could be adopted to achieve ubiquitous computing and embedded Internet. One example of WSN applications is surveillance and monitoring of a deployment area. The goal of our project is the development of effective WSN for detecting and tracking human and/or vehicle presence. In this paper, our focus is two-folded. We first examine the issues of tracking objects using wireless sensor networks, including a brief introduction to object tracking, a survey of work related to object tracking using WSN, and the challenges of designing an object tracking sensor network using the emulation approach (in contrast to the simulation approach). The second focus of this paper is the design of a sample wireless sensor network application capable of detecting human presence. In the sample application, motes and sensor nodes capture data from the surrounding environment and send the data to the base station. A Java application running at the base station analyzes the data to determine whether a human is present. In addition to discussing our experience of developing the project, we examine the challenges of emulating a wireless sensor network, difficulties encountered during the project, and the algorithm implemented in the application. We also propose the design of a multi-node WSN for detecting/tracking humans. Projects are currently underway to implement and evaluate the design.
... Wireless Sensor Networks (WSNs) are a kind of ad-hoc mesh networks with strict resource constraints. They often comprise a large number of randomly deployed resource constrained sensor nodes and inherit all characteristics of ad-hoc mesh networks such as being self-organizing, self-healing, wireless and adaptive (Bhatti and Xu, 2009;Salatas, 2005). WSNs are usually deployed in remote and unfriendly territories, often called the monitored areas, for monitoring purposes. ...
... Due to lack of physical security, once one or more of the nodes are compromised, they can generate false measurements or inject false object-state predictions into the network, and those nodes which receive such information are not able to produce correct moving object state estimates. The combination of these factors demands object tracking security for WSNs to guarantee the procedure safety, concealment of sensitive data, and privacy of people in sensor environments (Salatas, 2005). ...
Article
Mobile object tracking is one of the most important applications of Wireless Sensor Networks (WSNs) deployed in battlefields, wildlife or habitat monitoring applications. Existing object tracking algorithms are mostly centralized and based on heavy and complex signal processing algorithms hence they cannot be applied to resource constrained WSNs directly. Object tracking algorithms of WSNs should be designed by considering energy conservation, bandwidth and communication overheads. Moreover, as practical object tracking applications are typically used in mission-critical applications, security is another important design matter to be considered. In mission-critical applications, sensor nodes are deployed in hostile fields and they can be easily captured by intruders. Such compromised nodes can be used to falsify the collected data and threaten the object tracking reliability. In this paper, we propose a novel secure and reliable object tracking protocol that considers security and object tracking tasks simultaneously. The basic idea behind the proposed protocol is to ensure tracking security using reputation based trust concept for individual sensor nodes. The performance evaluation results show that the proposed protocol allows the network to retain the reliability of tracking data even in the presence of compromised nodes, thereby achieving secure and reliable object tracking process.
... Target tracking in a sensor field has become one of the most important applications of WSNs particularly for military purposes [1][2][3][4][5] . Although there are many papers that propose target tracking algorithms by focusing on energy conservation, bandwidth and communication overload [5][6][7][8][9][10] , there is limited amount work considering secure target tracking in the literature [11][12][13] . ...
... The magnetic sensors were two-axis magneticfield "disorder" detectors that note changes to the magnetic field with a field range of plus or minus 6 gauss, sensitivity 1 mV/V/gauss, and a resolution of 120 microgauss for a 50 hertz bandwidth. Earlier experiments on tracking people with this equipment were promising (Salatas, 2005). Base Station MoteFigure 1. Crossbow MSP410 Base Station and Mote. ...
Article
Full-text available
Persistent wireless sensor networks can be a cost-effective way to monitor public areas for suspicious behavior and reduce the need for military patrols. We examine here their applicability to the difficult problem of detecting emplacement of improvised explosive devices (IEDs). We first discuss the threat and how wireless sensor networks could help fight it; flexible and adaptable management of the sensor network is essential. We then report some experiments with magnetic and infrared sensors from Crossbow Technologies. We built a network of these sensors and ran human subjects through it engaged in various activities, some involving carrying of ferromagnetic materials. Results indicated that a variety of suspicious activities could be detected, though not all mock IEDs triggered detection, and triangulation was difficult due to the tendency of the signal to quickly saturate. Our network design is such that data can be easily aggregated in larger networks for broad-area automated monitoring of settings such as airports and busy urban areas.
... Generally a developer only needs to install the TinyOS package to get the above listed software. Although a WSN may maintain a database to store the collected data [4], in this paper we deal with simple projects that do not need a database. ...
Article
Full-text available
Wireless technologies have achieved dramatic growth in recent years. Wireless sensor networks (WSN), in particular, have captured the interest of various sectors. The increasing popularity of WSN has motivated universities to include the subject in their curricula. Effective learning and teaching of WSN, however, require the students to gain hands-on experiences in developing WSN projects, which help the students to understand the strength and limitations of this new technology. In this paper we report our experience of teaching WSN by requiring students to develop emulation-based labs following pre-designed template projects. The projects make it easier for the instructor adopt WSN labs in the teaching, and help to smooth the student's learning curve.
Article
In this paper, a localization technique is used to reduce the number of active sensors at an instant of time in a region for wireless sensor networks(WSNs). The active nodes in a region is calculated baed on the K-hop Independent Dominating Set(K-IDS). The proposed algorithm is evaluated using Castalia Simulator.The simulation results are analysed using network parameters namely,energy consumption,number of active nodes in a cluster and packet delivery ratio. The simulation results indicates that the proposed algorithm outperforms LEACH and MOCA protocls.
Article
Full-text available
Tracking a target as it moves in monitored area has become an increasingly important application for wireless sensor networks (WSNs). Target tracking algorithms continuously report the position of the target in terms of its coordinates to a sink node or a central base station. Due to the rapid development of WSNs, there is no standardized classification of target tracking algorithms. Some of those classifications consider scalability, energy consumption and accuracy; other classification considers network topology, position of target, mobility of target/object etc. In this paper, we have considered target tracking algorithms of WSNs from the security point of view. We have compared and discussed problem of security in the most important target tracking algorithms for WSNs. To the best of our knowledge, this is the first study that analyses the target tracking algorithms in terms of security.
Conference Paper
Full-text available
Abstract—We,consider,the rate allocation problem,for data aggregation,in wireless sensor networks,with two objectives: 1) maximizing the lifetime of a local aggregation cluster and, 2) achieving,fairness among,all data,sources. The two,objectives are generally correlated with each other and,usually they cannot be maximized,simultaneously. We adopt a lexicographic,method to solve this multi-objective programming problem. First, we recursively induce the maximum,lifetime for the local aggregation cluster. Under the given maximum lifetime, we then formulate the problem,of maximizing,fairness as a convex,optimization problem, and derive the optimal rate allocation strategy. We also present low-complexity,algorithms,that a local aggregation cluster can,use to determine,the optimal,rate allocation. Our simulation,results validate our,analytical results and,illustrate the effectiveness of the approach.
ResearchGate has not been able to resolve any references for this publication.