You are on page 1of 7

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072

Hybrid Target Tracking Scheme in Wireless Sensor Networks

Abha Tiwari1

1 Student Mtech, Department of Electronics and Communication Engineering, IGDTUW, Delhi, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The continuously widening variety of Wireless 2. LOCALIZATION PROBLEMS IN WSNS
Sensor Networks (WSNs) applications requires node this is
certainly precise which needs efficient and error free Localization [3] bypass on to the skill of ascertaining the
localization practices. Localization methods created in past locale (relative or absolute) of a sensor node, alongside a
times are totally centered on really good computation this is satisfactory precision. In a WSN, localization is a
certainly numerical of network variables for example tremendously vital task; though, localization is not the goal
transmission range, propagation form, transmitted or received of the network. In reality localization is a main ability as it is
power, delivering or arrival time, connection information etc. relevant to countless requests (intruder detection, target
These variables are susceptible towards ecological presence pursuing, environmental monitoring, etc.), that depend on
and circumstance of hurdles in environment. As wireless knowing the locale of nodes. Localization is relevant to the
sensor companies tend to be ubiquitous in general, localization Network main functions: contact, cluster conception,
is a factor this is certainly essential to be fixed. Localization of Network coverage geographical routing, etc. Even
a node that is unknown be identified through a collection of collaboration naturally depends on localization of nodes .
research nodes. In this work, we provide a novel hybrid
localization strategy, which determines the location this is
certainly exact of an unknown node through the mixture of
both range free and range based practices.

Keywords: wireless sensor network, sensor placement,


wireless sensor networks, DOA localization, RSS
localization

1. WIRELESS SENSOR NETWORK

The word "wireless" has come to be a generic and all-


encompassing word utilized to delineate contact in that
electromagnetic waves are utilized to hold a gesture above
portion or the whole contact path. Wireless knowledge can
able to grasp nearly every single locale on the external of the Figure-1: Localization in Wireless Sensor Network
earth. Due to incredible accomplishment of wireless voice
and messaging services, it is hardly stunning that wireless
contact is commencing to be requested to the area of 3. TARGET TRACKING
confidential and company computing. Ad- hoc [1] and Sensor
Networks[2] are one of the portions of the wireless Since sensor Networks are normally utilized to monitor the
communication. nature, one frank subject is the location-tracking setback,
whose aim is to draw the roaming trails of advancing
In ad-hoc Network every single nodes are permit to converse objects/individuals in the span in that sensors are used [4].
alongside every single supplementary lacking each fixed This setback is challenging in two senses:
infrastructure. This is truly one of the features that
differentiate amid ad-hoc and supplementary wireless (a) There no central manipulation mechanisms and
knowledge like cellular Networks and wireless LAN that backbone Network in such an environment.
truly needed groundwork established contact like across a (b) The wireless contact is extremely limited.
little center station.
At present, locale pursuing is completed employing GPS.
A Sensor Network is a placement of large numbers of tiny, Though, GPS has its limitations. It cannot be utilized in most
inexpensive, self-powered mechanisms that can sense, indoor environments. It depends on Line of Sight.
compute, and converse alongside supplementary Additionally in non-urban outdoor settings, GPS does not
mechanisms for the intention of meeting innate data to make yield precise aftermath because it depends too far on factors
globe decisions concerning a physical nature. such as terrain, foliage and topographical settings of the
locale where the object is located. Since, GPS receivers could
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 122
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072

be too colossal, too luxurious or too manipulation intensive, 3.1 Key Aspects of Localization Algorithms
employing wireless sensor Networks provides us alongside a
larger alternate for locale pursuing as the nodes are There are a little aspects that have to be believed after
moderately tiny, inexpensive and low manipulation devices. arranging or selecting a localization algorithm, like:
They are far extra viable pondering commercial and ease manipulated resources, density of nodes, number Network
constraints. topology, kinds of signals utilized, attendance of obstacles or
terrain irregularities, and node mobility (if nodes are
Some supplementary methods have additionally been stationary or mobile). Most of the continuing algorithms can
counseled in the past as alternates to the trilateration accomplish good localization accuracy. But, normally, they
technique. They are: can merely change to a little of these key aspects.

(a) Infrared: RFID tags emit infrared radiations grasping an (a) Limited resources
exceptional ID. This is consented by a number of
receivers dispersed across an ability that as certain the Usually, a sensor node embodies in four frank components:
locale of the badge established on distance. detecting (transmitter and receiver) and manipulation
(b) Ultrasound: These are additionally distance established (usually, a battery) units, processing, transceiver. New
arrangements but furnish a larger guesstimate by advancements permit for the present creation of sensor
computing time-of-flight of ultrasound alongside respect nodes to come to be yet tinier and cheaper. Therefore, nodes
to a reference RF signal. MITs Cricket arrangement is an have decreased recollection and processing capacity. Battery
example of this. is, limited. Furthermore, due to a short transmission scope
(c) Radio: The arrangements that use wireless waves (caused by restrained transmission power), nodes can
furnish a larger approximation for locale detection merely converse alongside its innate neighbors. A fine
because of the skill of these waves to penetrate assorted localization resolution has to ponder all these resource
materials. Instead of employing contrasts in entrance borders (computational, transmission minimizing energetic
periods as in Ultrasound, these arrangements use and hardware costs).
gesture strength to compute the location.
(b) Number and density of nodes
The finished pursuing strategies in words of selecting that
nodes are activated for pursuing intentions i.e. in words of Most localization algorithms are receptive to the number of
power efficiency are: nodes and/or to the density of nodes (amount of localizing
nodes each span unit). On one hand, a little algorithms
(a) Nave Activation (NA): In such a pursuing scheme all cannot associate to low density WSNs because they will
nodes are in pursuing mode all the time. This strategy reason momentous localization errors. On the
proposals the worst power efficiency. As it proposals the supplementary hand, after employing a little algorithms in
best pursuing aftermath, it is a functional baseline for exceedingly density WSNs, localization can be an expensive
comparison. procedure.
(b) Randomized Activation (RA): In this strategy, every
single node is on alongside a precise probability p. On an (c) Network topology adaptability
average, a fraction p of all nodes will be on and in the
pursuing mode. It is a extra power effectual resolution A number of the localization algorithms compute the
than NA. Euclidian distance amid a pair of nodes, ponder the shortest
(c) Discerning Activation (SA): In this activation method, trail amid them. Though, this is merely valid to such cases
insufficient selected nodes in the Network are selected whereas shortest trails are comparable a straight line. In
at a period reliant on their distance from the object. As Networks whereas the used span has a concave topology
and after the object moves, the distances additionally (naturally, S or C form settings, for instance: streams,
change from those nodes and therefore, handovers metropolis roads, valleys, etc.), this is normally not valid.
seize locale amid nodes. It proposals a good balance
amid power efficiency and pursuing precision.
(d) Duty-Cycled Activation (DA): In this, the whole sensor
Network periodically turns on and off alongside a usual
obligation cycle. The main supremacy of this scheme is
that it be utilized in conjunction alongside the three
methods remarked above. It is not the shrewdest of
resolutions in words of power efficiency but fares larger
than NA.

2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 123
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072

distance between the sender and the receiver). So, the


receiver only has to measure signal attenuation to
approximate the distance to the sender. This method is
suitable to outdoor environments. Though, it is not simple to
forecast radio signal behaviour indoors [8].

(a) ToA (Time of Arrival) techniques

This method measure the distance between nodes using


signal propagation time. The nodes transmit a signal to their
neighbours at a predefined pace and wait for answers. Their
Figure-2: Network topology adaptability in WSN
neighbours, send a signal back to them. Inter-node distance
is calculated by measuring the difference between sending
(d) Obstacles and irregularities and receiving times (round trip approach) [9]
A number of the proposed localization solutions have low
(b) TDoA (Time-Difference of Arrival)
accuracy in obstructed environments. This is due to the
survival of obstacles, which block the line-of-sight between
techniques
nodes. Obstacles and terrain irregularities can cause signal
reflections, what lead to incorrect distance estimations. This method compute the distance between nodes
employing gesture propagation time. In this method, inter-
node distance measurements demand that nodes transmits
(e) Stationary or mobile nodes
two disparate signals, that excursion at varied speeds, to
their neighbours. Typically, distance is computed established
In a large amount WSNs, nodes are stationary. As a effect,
on the difference in proliferation periods of wireless and
most localization algorithms are designed purposely to this
aural signals initiate at the alike point. Sender and receiver
kind of networks. Though, due to the emergence of new
synchronize their clocks. The sender shows a wireless memo
applications, algorithms should adjust to the existence of
pursued by an aural gesture (chirp). Every single node that
mobile nodes.
detects the chirp, computes the difference amid both signals
entrance periods and, as a consequence, the distance.
(f) Type of signals
(c) AoA (Angle of Arrival) measurement
It is really significant to know the type of signal that is going
to be used by an algorithm, owed to its propagation
techniques
characteristics. Typically, localization algorithms use one
type of signal, among three possibilities: acoustic,radio and This method makes use of the receiver antennas amplitude
ultrasounds. and receiver antennas phase response. The correctness of
AoA measurements is narrowed by the directivity of the
antenna, by the shadowing effect and by multipath
4. TYPES OF LOCALIZATION ALGORITHMS
reflections [10].
Localization algorithms can be categorized in two main
categories:
4.2 Range-free

This cluster of algorithms is established in connectivity data,


4.1 Range-based
i.e., who is inside the contact scope of whom, to estimation
the locale of nodes. The connectivity can be tested by
In range-based approach, distance estimation is generally
computing the number of consented packets. The principle
performed using one of the following techniques: TDoA,
of these algorithms is: if two nodes can converse, next the
RSSI, ToA or AoA/DoA. Then, distance estimation is used to
distance amid them is, alongside huge probability, less than
establish nodes position. Range based approaches are called
their highest transmission range. These methods do not need
one-hop approaches because nodes have to be at one-hop
supplementary hardware, as they do not rely in each
distance from a minimum of anchor nodes [7].
distance measurements. The main gains of range-free ways
are its ease and low cost. Range-free advances can be hop-
(a) The RSSI (Received Signal Strength Indicator)
based, whereas inter-node distance is probable across the
technique
number of hops amid the nodes, ponder the shortest
trail[11].
The RSSI (Received Signal Strength Indicator) method is
based in the attenuation of the radio signal with the
amplification of distance (according to 1/r2, where r is the

2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 124
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072

5. PROPOSED HYBRID LOCALIZATION where xi is the position of the ith sensor, xs is the position of
the source transmitter, and ||x|| denotes the norm of the
Hybrid techniques is one of the main categories of vector x. The straight dotted lines shown in Figure 1 can be
distributed techniques. An example of such category is the calculated using the following equations:
use of RSS combined with Triangulation. Combining both between x1 and x2 :
RSS and Triangulation in one node provide a significant
improvement to the accuracy of localization when compared
to RSS on its own. Triangulation is considered a between x1 and x3 :
computational expensive technique, but the use of it can be
justified for some applications that needs higher localization
accuracy. In addition, just few nodes in the network are
going to use Triangulation to localize other nodes. between x2 and x3

The location of the blind node can be determined by solving


for xs and ys in equation (3) and (4). In this case, there are
only two independent lines, which means that there will be
only one intersection. However, as the number of reference
nodes increases, the number of independent lines increases,
which results in increasing the number of intersections.
Those lines are not going to intersect at the same point due
to the error in the distance measurements. Therefore, it is
required to use an algorithm to estimate the values xs and ys.
For a system with N reference nodes, there will be N - 1
linear line equations that will intersect at different position
forming a polygon. The blind node position can be estimated
by averaging the intersection points or calculating the
centroid of the polygon.
Figure-3: RSS localization Scenario
The least square method is an alternative approach to
5.1 RSS FORMULATION estimate the position of the blind node. Each of the N - 1
independent lines is represented in the following form :
RSS is a common technique in localizing sensor nodes; this is
due to the fact that almost all nodes have the ability to
measure the strength of the received signal. RSS technique where ai,1, ai,2 and bi are known.
benefits from the fact that radio signals diminish with the This equation can be rewritten as:
square of the distance from the signal source. In other words,
the node can calculate its distance from the transmitter using
the power of the received signal, knowledge of the
transmitted power, and the path-loss model. The RSS The equations describing all of the lines can also be written
between nodes i and j at time t can be calculated using : in matrix form as:

where n is the signal propagation constant (environment


dependent), dij is the distance between nodes iand j, and P0 is .,
the Received Signal Strength at a distance of 1 meter. Let us Since the straight lines do not intersect with each other in a
consider the simplest scenario where there are only three single point, there is no solution for the above equation.
reference nodes and a single blind node as shown in Figure However, least square estimation can be used to estimate the
3. Each two circles intersect with one another at two points. values of xsthat are as close as possible to the actual blind
These two points are used to draw a line which will node coordinates. The estimated location of the blind
intersect with other line from other anchor nodes. node is given by:
The distance between the ith reference node and the blind
node is given by:
This algorithm is obviously much less difficult than the
geometric one since there is no need to compute
intersections of many lines.

2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 125
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072

5.2 POINT IN TRIANGULATION IN WSN

A Network of sensors in a 2D plane is considered. A


triangular Network is believed i.e. the sensors are allocated
in a triangular fashion. Typically, the Network is believed as
a hexagonal mesh. Every single sensor is cognizant of its
physical locale and that of its bordering sensors. All the
sensors have a processor, a recollection and needed
hardware to prop detecting, data meeting and contact
capabilities. Every single sensor has a detecting radius, r that
is equal to the length of the side of the triangle. Three
sensors are utilized to ascertain the locale of the object. The
methodology utilized in this case is the triangulation method
of noticing the spatial coordinates. The sensors in this case
are consented to have disparate detecting radii. The work
gave aims to trail the advancing trail of an object in the
network. The sensors have an overlapping span of detecting
that is recognized as the working area and the spans Figure-4: Working area and backup areas
encircling these are recognized as backup areas that imply
that as quickly as the object moves into these spans a
handover ought to seize place. As quickly as a movement is
noticed, an vote procedure is led amid the sensors
established on their distance from the object. The sensor
closest to the object is selected as the chief agent as the
subsequent two are selected as slave agents.

As quickly as the vote procedure is completed, all the


supplementary sensors ar0e prohibited from pursuing the
object by dispatching them blocking messages. Employing
the trilateration method, these sensors compute the locale of
the object. From period to period the slave agents report
their aftermath to the chief and the pursuing reports are
recorded. They are described by the chief as and after
required. To cut the number of overhead, a chief could select
to bypass on the gathered data to the locale server from
period to time. A chief agent can revoke and reassign a slave
established on the movement of the object. Precise gesture Figure-5: Position Approximation Algorithm
strength thresholds law this. Also, in case the object moves
out of the detecting span of the chief agent, there is a ability It has been consented that the sensors can discriminate
for a reelection procedure and selection of a new chief agent. objects that could be due to the exceptional ID sent by the
The above procedure can be understood by Fig.4.1.1 in that objects. Thus, the nature considers several objects even
till the period the object moves in the working span (A0), the though the method has been delineated for one object.
elected nodes do the detecting, as quickly as the object Sensors normally have four modes of operation: Transmit,
moves to the backup spans defines (A1, A2 and A3), the Receive, Inactive and Nap established on the procedure they
sensor node farthest from the object is revoked as the are performing. Every single of the nodes has a disparate
gesture strength falls below the threshold level. level of manipulation consumption. Initially, all the sensors
work in the Inactive mode of procedure in that they
unceasingly notice each object inside their detecting scope.
The variance of gesture strength alongside distance is
measured and flattened out employing a regression
quadratic polynomial. Gesture strengths can vary and the
measurements are not extremely accurate. Thus, there are
always a little errors amid approximated distances and
actual distances. The trilateration method utilized basically
uses the intersection of three circles to find out the precise
spatial coordinates of the object. In a real globe scenario, the
three circles not ever intersect at a public point as shown in

2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 126
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072

fig 4.1.2. Hence, to minimize error, an approximation The projected modeling was a easy scheme lacking
algorithm has been utilized in that the difference purpose is convoluted processing. They have uses MATLAB to conduct
minimized. The difference purpose, x, y s is computed as the simulation and numerical analyses to find the optimal
modeling variables. The analyses alongside disparate
variables will contain object advancing ideal, detecting
radius, ideal weighting value, and power-level rising ratio k
of bordering sensor nodes. Contrasted alongside our work
their localization error is on average larger.
-rc| 7. CONCLUSION AND FUTURE WORK
where A, B and C are the sensor nodes and (xA ,yA), (xB ,yB)
In this paper we have discovered a hybrid localization
and (xC ,yC) are their center coordinates and rA, rB and rC
method that uses both RSS and Triangulation methods.
are the distances to A, B and C from any point (x,y) on the
Joining RSS and Triangulation provides countless gains
plane.
making it outperform methods that uses just RSS technique.
For example, a hybrid node is capable of localizing one more
6. RESULTS AND ANALYSIS
node by itself lacking each assistance from supplementary
nodes, and at the alike period it provides a higher
In our proposed work Total Average End to End Delay
localization accuracy after contrasted to nodes that merely
between nodes is around 0.065 seconds which is sufficient
use RSS. In supplement, the result of multipath on the
for deploying real world sensor nodes using Hop by Hop
presentation of the hybrid method has been illustrated.
location tracking mechanisms. The authors have
Upcoming orders could contain studying the encounter of
industrialized and counseled the mechanism and procedure
hybrid method (RSS/Triangulation) on a real Network and
to ideal the locale estimation for object pursuing in large-
the best method to use such node in a given nature.
scale WSNs. The projected modeling was a simple scheme
without complex processing which uses range free
REFERENCES
positioning knowledge as well as centralized data. The
procedure and modeling of location estimation for object
[1] Sabokrou, M.; Fathy, M.; Hoseni , M., "Intelligent
pursuing in WSN.
target tracking in Wireless Visual Sensor Networks",
IEEE, Computer and Knowledge Engineering
(ICCKE), 2012 2nd International Conference on,
2012
[2] Yadav, A.; Naik, N.; Ananthasayanam, M.R.; Gaur,
A.; Singh, Y.N.,"A constant gain Kalman filter
approach to target tracking in wireless sensor
networks",IEEE,Industrial and Information Systems
(ICIIS), 2012 7th IEEE International Conference on,
2012
[3] Gopakumar, A., and Lillykutty Jacob. "Localization in
Figure-6: End to End Delay between nodes in seconds wireless sensor networks using particle swarm
optimization." In Wireless, Mobile and Multimedia
Networks, 2008. IET International Conference on,
pp. 227-230. IET, 2008.
[4] Tseng, Yu-Chee, Sheng-Po Kuo, Hung-Wei Lee, and
Chi-Fu Huang. "Location tracking in a wireless
sensor network by mobile agents and its data fusion
strategies." The Computer Journal 47, no. 4 (2004):
448-460.
[5] Chan, Frankie KW, and Hing-Cheung So. "Accurate
distributed range-based positioning algorithm for
wireless sensor networks." IEEE Transactions on
Signal Processing 57, no. 10 (2009): 4100-4105.
[6] He, Tian, Chengdu Huang, Brian M. Blum, John A.
Stankovic, and Tarek Abdelzaher. "Range-free
localization schemes for large scale sensor
Figure-7: Estimation Error with Respect to time networks." In Proceedings of the 9th annual
compared with Base paper (blue) [12] and Proposed work
APIT scheme (red).

2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 127
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072

international conference on Mobile computing and


networking, pp. 81-95. ACM, 2003.
[7] Liu, Chong, Kui Wu, and Tian He. "Sensor
localization with ring overlapping based on
comparison of received signal strength indicator."
In Mobile Ad-hoc and Sensor Systems, 2004 IEEE
International Conference on, pp. 516-518. IEEE,
2004.
[8] Shen, Hong, Zhi Ding, SouraDasgupta, and
Chunming Zhao. "Multiple source localization in
wireless sensor networks based on time of arrival
measurement." IEEE Transactions on Signal
Processing 62, no. 8 (2014): 1938-1949.
[9] Ahmed, Hesham Ibrahim, Ping Wei, Imran Memon,
Yanshen Du, and Wei Xie. "Estimation of time
difference of arrival (TDoA) for the source radiates
BPSK signal." IJCSI Int. J. Comput. Sci 10 (2013):
164-71.
[10] Malajner, Marko, DuanGleich, and Peter Planinic.
"Angle of arrival measurement using multiple static
monopole antennas." IEEE Sensors Journal 15, no. 6
(2015): 3328-3337.
[11] Peng, Jing, JunxiaJia, and Tao Liu. "WSN Node
Localization Algorithm Based On Range Free
Localization." In 2015 International Industrial
Informatics and Computer Engineering Conference.
Atlantis Press, 2015.
[12] Wu, Huafeng, Lei Yang, Ling Liu, Ming Xu, and
Xinping Guan. "Real-Time Localization Algorithm
for Maritime Search and Rescue Wireless Sensor
Network." International Journal of Distributed
Sensor Networks 2013 (2013).

2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 128

You might also like