• No results found

Secured Data with Enhanced Lifespan for Wireless Multimedia Sensor Networks

N/A
N/A
Protected

Academic year: 2020

Share "Secured Data with Enhanced Lifespan for Wireless Multimedia Sensor Networks"

Copied!
8
0
0

Loading.... (view fulltext now)

Full text

(1)

International Journal of Emerging Technology and Advanced Engineering

Website: www.ijetae.com (ISSN 2250-2459,ISO 9001:2008 Certified Journal, Volume 3, Issue 11, November 2013)

619

Secured Data with Enhanced Lifespan for Wireless Multimedia

Sensor Networks

Sindhu Duraisamy

1

, R. Priya

2

, Vinu Raja VijayaKumar

3 1

M.E Applied Electronics & Sri Eshwar College of Engineering, Coimbatore

2,3Assistant Professor & Sri Eshwar College of Engineering, Coimbatore

Abstract— In wireless sensor network energy cutback is considered as a principle intensive challenge which is studied largely in the Wireless Sensor Networks (WSN) literature. On the other hand introduction of audio video streaming in wireless architecture reveals additional challenges. The image and video transmission not only demands for energy-efficiency but also requires Quality of Service (QoS) assurance to ensure for the utilization of sensor resource as well as the reliability of information model. More over redundant statistics can be supplemented with streaming sequence for enhancing tracking accuracy. This paper proposes a Distributed Predictive Tracking and Verification Algorithm (DPTVA) which provides an improved to subdue existing conundrum in the streaming world. This protocol sense and categorize the level grades of sensor nodes and set nodes in a particular path to active mode and left over in sleep mode thus Predictive tracking algorithm consequences in superior energy consumption for sensing layers. Compared to classic Image Transmission Protocol and the traditional distributed predictive tracking and verification algorithm, this new algorithm has superior meeting and provides appreciably better QoS by ensuring 20% to 80% better efficiency with privileged security for manifold types of services in wireless multimedia sensor networks.

Keywords Data security, distributed predictive tracking, energy preservation, verification algorithm, wireless multimedia sensor network.

I. INTRODUCTION

Recently due to the advancement in image sensors [8, 6], there is a growing awareness in visual wireless sensor networks for a multiplicity of applications. Target tracking active monitoring and remote surveillance also plays an essential role in wireless sensor applications. Nevertheless, wireless sensor networks sham a great dispute to image transmission. Wireless Multimedia sensor networks (WMSNs) are useful in revealing the actions in a system for the challenges of physical phenomena of the environment [1], [18]. The common which is verdict in those networks is data insecurity and data loss due to failure of components, error in transmission of wireless data, interference. Collaboration of sensor nodes is essential for consistent event recognition.

In support of event recognition by collaborative tracking with multiple sensor nodes, technique frequently used is data aggregation [17], this technique not only helps in plummeting the throughput of data transmission but also profitably saves energy.

Target tracking is a key issue for preservation of energy, this tracking technique can be achieved by using various methods [2], [5]. One of such methods is prediction based scheme. Prediction based scheme works together with selective activation of nodes. This scheme is based on event driven mechanism for tracking the target path. Subsequent to target path few nodes are waked-up. Distributed Predictive Target Tracking algorithm is also used to solve the problem of inter-sensor interference (ISI). Data aggregation algorithm is used to gather the sensed data and aggregate it. The main objective of this algorithm is to utilize the energy in an efficient manner and to boost the network life span. Clustering in WMSN is the course of action of grouping the sensor nodes in a large-scale densely deployed sensor networks. The major issue established in clustering is that the potential node which is healthier in energy is resolute as cluster-head and the other nodes toil as Ordinary Sensor Nodes (OSN). Next to distributed predictive algorithm verification algorithm [10] is as well projected which performs data aggregate computation and in addition verifies the information. It’s a point to keep in mind that this paper aims at proving high energy efficiency and data accuracy for WMSN’s.

II. RELATED WORK

Focusing on two exposition problems, several researchers have wayward problems associated to energy efficiency, target tracking and prediction, data accuracy and data aggregation in WMSN’s.

A. Energy efficiency

(2)

International Journal of Emerging Technology and Advanced Engineering

Website: www.ijetae.com (ISSN 2250-2459,ISO 9001:2008 Certified Journal, Volume 3, Issue 11, November 2013)

620

The energy consumption models to optimize grid size and diminish the energy consumption for probabilistic distance distribution network has been analyzed and evaluated in [24]. For data gathering in wireless networks the quandary of scheduling packet transmission is premeditated by author in [23]. This scheme focuses to travel around the energy latency exchanges by using modulation scaling technique in wireless communication. In [21], Sengul et al. proposed a new protocol called PBBF which is used for investigating the energy-latency-reliability transaction in broadcasting wireless information. This algorithm provides a competent study of relationship at the reliability level. PBBF says that the energy and latency is inversely proportional to a given reliability level. The input requirements from the modish can be curtailed by dynamically adjusting the parameters of PBBF algorithm.

B. Collaborative Target Tracking and target prediction

For many perspective WSN applications target tracking is an extensively used technique. In many efforts such as [3, 8] target tracking technique is viewed as a progression of continuous localization operation. Target tracking mechanism is also used to obtain optimal solution by taking into account as a dynamic state estimation problem for the trajectory and Bayesian estimation methods. Gui et al

described a power saving maneuvers when the sensor nodes are in surveillance state and in tracking state [11]. To detect the moving objects, a set of novel metrics is proposed for determining the moving objects. Collaborative tracking scheme is used to wake-up and to put sensor nodes in shut down mode. The real time analysis of VigilNet is offered by He et al in [13] which classify the target node based on timely and energy efficiency manner. In this the target tracking process is detached into six phases. For each phase deadline is partitioned and theoretical derivations to certify sub-deadline, end to end delay tracking deadline is satisfied. In [22] the author presented a Prediction-based Energy Saving scheme (PES) which is an illustration of Kinematics-based prediction. In this technique the specific location of the sensor nodes is forecasted only by using simple models without considering their detailed probabilities. In [13] author predicted a scheme in which sleep schedule pattern is based on the distance of the node from the target’s instantaneous position. Thus the sleep level of the sensor nodes nearer to the target ought to be lighter.

C. Data Aggregation

Existing method of data aggregation technique mainly spotlight on the structure of aggregation and performance which involves aggregation node selection [6] and delay in aggregation [14] for aggregating multiple packets into single there are two methods available semantics-based aggregation [12] and length-based aggregation. Semantics-based aggregation technique compresses the total length of multiple packets into a single packet of original length or even less than original packet length [19]. To the converse length-based aggregation technique does not change the length of packet as an alternative it just combines the multiple packets into one, with the identical payload length.

III. DISTRIBUTED PREDICTIVE TARGET TRACKING

ALGORITHM

In existing Image Transmission Protocol [4] only one node can carry out the transmission of image packet at a moment in time. Consequently on reception of intact network packets will domino effect in encumber of energy thrashing of base station. To surmount this shortcoming collaborative target tracking technique is engrossed in proposed technique. In Distributed Predictive Target Tracking (DPTT) scheme nodes in attendance to target tracking path are awakened for few time slots and lingering nodes are set aside in sleep mode. The energy consumption can be reduced by following phases.

A. Cluster Head Selection Phase

In the world of multimedia communication, to reduce the global transmission of data packets a cluster head is made to put into practice of few optimizing functions such as data aggregation, cryptographic analysis and identification of distant cluster heads for transmitting fused data. This seems to reduce the energy level of cluster head nodes ahead of ordinary nodes. Our DPTV algorithm picks out the higher residual energy node to pretend as a cluster head node.

The election procedure is as follows.

(3)

International Journal of Emerging Technology and Advanced Engineering

Website: www.ijetae.com (ISSN 2250-2459,ISO 9001:2008 Certified Journal, Volume 3, Issue 11, November 2013)

621

Next elector node selection

elector node becomes CH node

Base Station Selection of CH and

[image:3.612.42.266.140.423.2]

next elector

Figure I: Selection of Cluster Head and next elector node

 The remaining nodes its energy level with the nearest elector nodes energy level.

 Then energy reply message (ENE_REP) is send by remaining nodes if any of its energy level is higher than elector nodes energy level, else it hold off for cluster head advertisement message (CH_ADV).

 If energy of elector node is greater than remaining nodes energy level then it becomes cluster head otherwise elector node selects the node with maximum residual energy as the cluster head and subsequent maximum residual energy as the next elector node. The election procedure is depicted in above figure I.

B. Cluster formation phase

[image:3.612.328.541.143.458.2]

Once elector node elects the cluster head, cluster head advertisement message (CH_ADV) is broadcasted by cluster head node along with cluster head ID. Then each ordinary sensor nodes on the basis of the signal strength of the advertisement message received selects the relevant cluster head node and joins with that cluster by transmitting the join request message (JOIN_REQ). The figure II shows the cluster formation and data transmission between the Cluster Head and Base Station.

Figure II: cluster formation and data communication

C. Motion Prediction for Target Node

The movement of target area is under discussion to certain rules of physics. But for short duration of time period there is no momentous transformation on target’s motion rules as a result the target motion simply follows the kinematics rules. On the other hand a spiky rotate or long term behavior of targets motion is hard to predict by simply using kinematic rules. Thus probabilistic model is used to tackle any possibilities of changes in targets motion. The probability determination for target node motion prediction is shown in figure IV.

The motion prediction of target node at any instant of time involves the following three steps:

1. On based on previous state S(n-1), determine the current speed , acceleration ⃗⃗⃗⃗ , sense the current position ( , ) and direction

2. Displacement of the target node ⃗⃗⃗⃗⃗⃗⃗⃗ ʹ;

3. Lay down the probabilistic model by embracing the deviation and scalar displacement of target node

⃗⃗⃗⃗⃗⃗⃗⃗ ʹ.

Base station

Cluster Head

Next elector node

Awaken node

Node in sleep mode

CH_ADV and JOIN_REQ

Transmission of data to sink Base station

Cluster Head

Selection of CH and next elector node Next elector node

Ordinary node

Node in sleep mode

ENE_REQ message

(4)

International Journal of Emerging Technology and Advanced Engineering

Website: www.ijetae.com (ISSN 2250-2459,ISO 9001:2008 Certified Journal, Volume 3, Issue 11, November 2013)

622

4.The sleep delay = + TP

[image:4.612.60.266.216.501.2]

When the target is detected for first time, the preceding observations such as S(n-1) are not existing so it is skipped. The following figure III shows the motion of target node at three consecutive points.

Figure III: States of target motion

BB O N

| |MO| M

Figure IV: Probabilistic model for target node

If current location of target is assumed as ( , ), then

⃗⃗⃗⃗ and ⃗⃗⃗⃗ is determined as,

⃗⃗⃗⃗ = √

(1)

= arctan

, if (2)

= 0 , if (3)

⃗⃗⃗⃗ = ⃗⃗⃗⃗⃗ ⃗⃗⃗⃗⃗⃗⃗⃗⃗⃗⃗

(4)

⃗⃗⃗⃗⃗⃗⃗⃗ ʹ = ⃗⃗⃗⃗ TP + ⃗⃗⃗⃗ (5)

σ = ||⃗⃗⃗⃗ TP + ⃗⃗⃗⃗ || (6)

Algorithm 1 Target Detection ( ) 1. begin

2. if (node in tracking mode) then

3. if (target is not moving away from current awaken region) then

4. return; 5. end if

6. if (node is selected as alarm node) then 7. compute ⃗⃗⃗⃗ and ⃗⃗⃗⃗

8. calculate ⃗⃗⃗⃗⃗⃗⃗⃗ ʹ

9. calculate µ⃗⃗⃗⃗⃗⃗⃗⃗ and σ

10.transmit , , , ⃗⃗⃗⃗⃗⃗⃗⃗ ʹ, µ⃗⃗⃗⃗⃗⃗⃗⃗ ,σ and σ

11.end if 12.return;

D. Awaken nodes reduction phase

The transmission range of sensor nodes is R which is far longer than its range of sensing r. In a densely deployed environment a guarantee for sensing coverage is achieved by receiving a broadcast alarm message by all the neighboring sensor nodes within the transmission range. Meanwhile there is possibility for target node to shift away from the alarm node during sleep delay. During these possible situations it is necessary for nodes within this distance to wake up. As a consequence a ring shaped awake region is fashioned. The number of awakened nodes in awake region can be reduced on the basis of target moving direction predictions. Target node can move in different probabilities in various directions. By this it seems to predict that a path with higher probability the number of awakened nodes will be high and path with lower probability the number of awakened nodes will be less. Construction of awake region is analogous to designing of cluster in network architecture [20], [7]. Only responsibility of alarm nodes is to broadcast the alarm message for the detection of target path. Awake region is an implicit notion it decides whether a node need or not to come within reach of target.

E. Proactive wake-up with Awaken Regions phase

This phase deals with the mechanism for managing the awaken region is poles apart from cluster management. The depiction of this mechanism is as follows.

 Conception. Once a target node is selected the sensor nodes will ensure its status to agree on whether it is an awaken node in existing awaken region. If it guarantees it to be an awaken node, it justifies if the target parting the current awaken region.

S(n-2)

⃗⃗⃗⃗⃗⃗⃗⃗

S(n-1)

S(n)

⃗⃗⃗⃗

R

[image:4.612.66.255.563.691.2]
(5)

International Journal of Emerging Technology and Advanced Engineering

Website: www.ijetae.com (ISSN 2250-2459,ISO 9001:2008 Certified Journal, Volume 3, Issue 11, November 2013)

623

If target is not parting away from current awake region then the node does nothing. On the other hand if the target is departing the current awake region or if no previously awaken region exist then the node begins to process the alarm node election procedure [16]. If this node is elected as an alarm node then it broadcast the alarm note to all the other candidate nodes.

 Firing. As the time proceeds, this protocol enhances the automatic dismissal of awaken region, since the sleep patterns of awakened nodes is automatically recovered back to the default pattern. It does not require the explicit dismissal mechanism.

F. Election Procedure for Alarm Node

The alarm node selection procedure is discussed in [16]. In this technique when the detection is declared each node will broadcast a DETECTION message to all the neighboring nodes with a time stamp recording. Then it checks all the DETECTION messages of the neighboring nodes within an interval and it compares the time stamps of other nodes with its time stamp value.

Nodes that detect their neighbor node’s time stamp faster than its own is kept silently. This node is considered as the alarm node for the target. There are two working models for sensor node’s default mode and tracking mode. The sensor node will be in default mode when the sleep pattern for a specific target is not programmed and then the node follows the default pattern. The sensor node will enters into target mode when it detects a target or during rescheduling the sleep pattern on receiving an alarm message.

An alarm message includes the following information

 ID and the location of alarm node ( , , );

 State vector State(n);

 The prediction results ⃗⃗⃗⃗⃗⃗⃗⃗ ʹ,µ⃗⃗⃗⃗⃗⃗⃗⃗ ,σ and σ

G. Selection Phase of Awaken Nodes in Awaken Region

The target node may move by during sleep delay TP. For computational efficiency let us assume that the targets position is unerringly the alarm node’s position. Let d denotes the distance of an awakened node from the alarm node.

If d ≥ µ σ , the probability is less than 16% and

if d ≤ R nodes are moving in range outside the alarm node’s transmission range and those are put in sleep mode. Thus the scope of awaken region is identified as max {µ σ , 0} ≤ d ≤ R. By considering ρ as node density, the scope for number of awaken nodes in awaken region is ρπ[ -max{ µ σ , 0 ].

Algorithm 2 Awaken node detection ( ) 1. begin

2. Calculate distance d of alarm node; 3. If (d µ σ ) then

4. Return to awake mode; // nodes in awaken region 5. End if

6. If ( d ≤ R ) then

7. Return to sleep mode; // nodes are moving away from target lane

H. Data transmission phase

[image:5.612.331.541.423.671.2]

Once the cluster is formed transmission of data takes place. Inside the cluster only nodes located in target tracking path are in awaken state and only those nodes are involved in data transmission progress. The implementation of this technique also results in reducing the attenuation level of interfering. DPTV algorithm also facilitates for the acceptance of new node from other clusters when the current cluster is in demand for ordinary sensor nodes which is shown in figure V. The transmission of data inside each cluster is based on TDMA technique in which time is divided into periodic cycles. This further reduces the collision level of data transmitted from ordinary sensor nodes.

Figure V: Data transmission and Migration of new node from cluster1 to cluster2

Cluster1 New

node

Cluster3

(6)

International Journal of Emerging Technology and Advanced Engineering

Website: www.ijetae.com (ISSN 2250-2459,ISO 9001:2008 Certified Journal, Volume 3, Issue 11, November 2013)

624

I. Data Accuracy Detection

In this paper verification algorithm is utilized along with Distributed Predictive Target tracking algorithm in order to get better level of security. Each cluster head inside specific cluster performs data aggregation of encrypted information being transmitted by ordinary nodes of the corresponding cluster. Each sensor nodes while data transmission, encrypt the data and transmit the cipher text to the Cluster Head. Data aggregators on the other hand does not requires the decryption of cipher text, rather it simply fuse the encrypted data and transmit to the Base station directly.

Algorithm 3 secured aggregation (R, Wx, k) 1. Begin

2. Receive {(A , ), (A , ),……, (A , )} from ordinary nodes;

3. A = W x| A' | A' | ……. |A' ; // cipher text aggregation by cluster head;

4. P = index of qth rightmost ―1‖ bit in A , for 1 q ≤ , where is largest integer but lesser than k; // 5. A possibly will have fewer than k ―1‖ bits where k' < k. // generate a MAC bit for P in Q'x, for 1≤ q ≤ k';

6. Assemble the unification of M of the received MAC’s; arbitrarily choose = {MI , MI ,……., MI } from M; broadcast (A'x, ) to parent nodes;

7. End

IV. SIMULATION RESULTS

In this section, the report investigates the simulation cram that examined the network life span and accuracy of our distributed predictive target tracking and verification algorithm. The evaluation result shows the better performance metrics for the parameters such as network lifetime and data security.

A. Simulation Environment

Simulations were performed by using Network Simulator (NS2) environment which is a powerful platform for network research process and it is a discrete event simulator tool. In the environment, 100 nodes are randomly deployed in a 1000m 1000m area. The performance of our DPTV algorithm is compared with Image Transmission Algorithm by considering the terms such as the total number of received packets at the BS, network lifetime and the security level of the received packets.

B. Results and Discussion

In the proposed technique, distributed predictive target tracking algorithm is used for the transmission and aggregation of the image packets which outcomes with condensed energy consumption and hence protracts the networks lifespan. The verification protocol works together to check the accuracy of image packets being ordained to BS from Cluster Head.

a. Network Lifespan

[image:6.612.326.545.310.497.2]

The lifespan of the network is the time duration of survival of the node from the instigation of the network operation to the instant that the network can no more afford the readable information.

Figure VI: Energy consumption with respect to time

This figure VI shows the approach regarding the network lifetime under the influence of the protocols DPTVA and Image Transmission. It shows that the lifespan of the proposed network is enhanced with reduced energy consumption due to cooperative scheduling of sensor nodes when compared to existing protocol.

b. Data precision

The data accuracy is defined as the ratio of summing up the collected image packets by data aggregation technique proposed and the summation of all data packets from individual sensor nodes.

0 1 2 3 4 5 6 7 8 9 10

0.5 1 1.5 2 2.5 3

DPTVA

Image Transmission Protocol

Time Interval (seconds)

En

erg

y

(jo

u

les

(7)

International Journal of Emerging Technology and Advanced Engineering

Website: www.ijetae.com (ISSN 2250-2459,ISO 9001:2008 Certified Journal, Volume 3, Issue 11, November 2013)

[image:7.612.56.279.162.330.2]

625

Figure VII: Data accuracy with respect to time

From figure VII the accuracy of the proposed technique shows better performance level when compared to existing protocol which contributes fewer chances for collision and furthermore provides better chance for delivery of packets within time limit.

V. CONCLUSION

In Wireless Multimedia Sensor Networks, battery life and the resource reticence plays a vital role. Transmission of image packets also results in more energy consumption. The paper proposes an algorithm for a mobile target tracking surveillance sensor network is supported by sleep docketing technique. The main spotlight of this technique is to optimize the recital metrics such as network lifespan, energy consumption and data security. By applying sleep scheduling method and reducing the efforts of the working nodes energy efficiency can be made superior. The aggregation of data packets results in compressed data packets which further reduces the transmission burden and also provides scope for security and source coding. Thus the sensor data’s are associated and transmitted with higher-ranking efficiency which comes as a result of cryptographic and data compression techniques. Data latency is another significant issue in wireless multimedia sensor applications, in future work the research will be preceded with alternative technique in exploring the communication overhead problem.

REFERENCES

[1] I.F. Akyildiz, T. Melodia, and K.R. Chowdury, ―Wireless Multimedia Sensor Networks: A Survey,‖ IEEE Wireless Comm., vol. 14, no. 6, pp. 1339-1352, Dec. 2007.

[2] G. Anastasi, M. Conti, M. D. Francesco, and A. Passarella, ―Energy conservation in wireless sensor networks: A survey,‖ Ad Hoc Networks, vol. 7, no. 3, pp. 537-568, 2009.

[3] J. Aslam, Z. Butler, F. Constantin, V. Crespi, G. Cybenko, D. Rus, ―Tracking a moving object with a binary sensor network,‖ in Proceedings of the 1st international conference on Embedded networked sensor systems, ser. SenSys ’03, 2003, pp. 150-161. [4] S. M. Aziz and D. M. Pham, ―Efficient parallel architecture for

multi-level forward discrete wavelet transform processors,‖ Computers & Electrical Engineering, vol. 38, no. 5, pp. 1325–1335, 2012.

[5] A. Aziz, Y. Sekercioglu, P. Fitzpatrick, and M. Ivanovich, ―A Survey on Distributed Topology Control Techniques for Extending the Lifetime of Battery Powered Wireless Sensor Networks,‖ IEEE Commun. Surveys Tuts., vol. PP, no. 99, pp. 1–24, 2012.

[6] S. Chatterjea, T. Nieberg, N. Meratnia, and P. Havinga, ―A distributed and self-organizing scheduling algorithm for energy-efficient data aggregation in wireless sensor networks,‖ ACM Trans. Sen. Netw., vol. 4, no. 4, pp. 1-41, 2008.

[7] J. Denga, Y. S. Hanb, W. B. Heinzelmanc, and P. K. Varshney, ―Balanced-energy sleep scheduling scheme for jigh density cluster-based sensor networks,‖ in computer communications: special issue on ASWN04, vol. 28, 2005, pp. 1631-1642.

[8] D. Eickstedt and M. Benjamin, ―Cooperative target tracking in a distributed autonomous sensor network,‖ in OCEANS 2006, September 2006, pp. 1-6.

[9] W. Feng, B. Code, E. Kaiser, M. Shea, W. Feng, and L. Bavoil, ―Panoptes: Scalable low-power video sensor networking technologies,‖ in Pro. ACM Multimedia, Berkeley, CA, Nov. 2003. [10] M. Garofalakis, J. M. Hellerstein, and P. Maniatis, ―Proof sketches:

Verifiable in-network aggregation,‖ in Proc. 23rd Int. Conf. Data Engineering (ICDE), 2007.

[11] C. Gui and P. Mohapatra, ―Power conservation and quality of surveillance in target tracking sensor networks,‖ in Proceedings of the 10th annual international conference on Mobile computing and networking, 2004, pp. 129-143.

[12] T. He, L. Gu, L. Luo, T. Yan, J. Stankovic, and S. Son, ―An overview of data aggregation architecture for real-time tracking with sensor networks,‖ apr. 2006, p. 8 pp.

[13] T. He, P. Vicaire, T. Yan, L. Luo, L. Gu, G. Zhou, R. Stoleru, Q. Cao, J. A. Stankovic, and T. Abdelzaher, ―Achieving real-time target tracking using wireless sensor networks,‖ in RTAS ’06: Proceedings of the 12th IEEE Real-Time and Embedded Technology and Applications Symposium, 2006, pp. 37-48.

[14] C. Joo, J.-G. Choi, and N. B. Shroff, ―Delay performance of scheduling with data aggregation in wireless sensor networks,‖ in Proceedings of the 29th conference on Information communications, Piscataway, NJ, USA, 2010, pp. 893-901.

[15] P. Kulkarni, D. Ganesan, P. Shenoy, and Q. Lu, ―Senseye: A multi-tier camera sensor network,‖ in Pro. ACM Multimedia, Singapore, Nov. 2005.

0 0.2 0.4 0.6 0.8 1 1.2

0 20 40 60

DPTVA

Image Transmission Protocol

Time Period (seconds)

Da

ta Ac

cu

ra

(8)

International Journal of Emerging Technology and Advanced Engineering

Website: www.ijetae.com (ISSN 2250-2459,ISO 9001:2008 Certified Journal, Volume 3, Issue 11, November 2013)

626

[16] J. Liu, J. Liu, J. Reich, P. Cheung, and F. Zhao, ―Distributed group management in sensor networks: Algorithms and applications to localization and tracking,‖ in Telecommunication System, vol. 26, no. 2-4, 2004, pp. 235-251.

[17] H. Luo, Y. Liu, and S.K. Das, ―Distributed Algorithm for Enroute Aggregation Decision in Wireless Sensor Networks,‖ IEEE Trans. Mobile Computing, vol. 8, no. 1, pp. 1-13, Aug. 2009.

[18] H. Ma and D. Tao, ―Multimedia Sensor Network and its Research Progresses,‖ J. Software, vol. 17, no. 9, pp. 2013-2028, Dec. 2006. [19] R. Rajagopalan and P. K. Varshney, ―Data aggregation techniques

in sensor networks: A survey,‖ IEEE Communications Survey & Tutorials, vol. 8, pp. 48-63, 2006.

[20] X. Wang, J.-J. Ma, S. Wang, and D.-W. Bi, ―Cluster-based dynamic energy management for collaborative target tracking in wireless sensor networks,‖ Sensors, vol. 7, pp. 1193-1215, 2007.

[21] C. Sengul, M. J. Miller, and I. Gupta, ―Adaptive probability-based broadcast forwarding in energy-saving sensor networks,‖ ACM Trans. Sen. Netw., vol 4, pp. 6:1-6:32, April 2008.

[22] Y. Xu, J. Winter, and W.-C. Lee, ―Prediction-based strategies for energy saving in object tracking sensor networks,‖ in Mobile Data Management, 2004. Proceedings. 2004 IEEE International Conference on, 2004, pp. 346-357.

[23] Y. Yu, B. Krishnamachari, andV. K. Prasanna, ―Energy-latency tradeoffs for data gathering in wireless sensor networks,‖ in INFOCOM, 2004.

Figure

Figure I: Selection of Cluster Head and next elector node
Figure III: States of target motion
Figure V: Data transmission and Migration of new node from cluster1  to cluster2
Figure VI: Energy consumption with respect to time
+2

References

Related documents

It considers information about people aged 100 years or more at the moment of census data collection: gender (male or female), marital status (married, single, widowed, or

In the present contribution, we describe (i) the syntheses of new sterically shielded carbenes 1-alkyl-3,4-diaryl-1,2,4-triazol-5-ylidenes; (ii) the syntheses of mono- and

Therefore, this study was designed to assess the microbiological pro- file of goat carcasses and water used in both formal and informal slaughter slabs thereby evaluating

The comparison between diesel and alcohol-diesel blend has been made in terms of fuel properties characterization, engine performance such as brake power (BP)

Genotype X Environment Interactions Over Seven Years for Yield, Yield Components, Fiber Quality, and Gossypol Traits in the Regional High Quality Tests.. Gannaway, Kathy Glass,

The present study tested a conceptual model of the relationships among religious well-being, existential well-being, positive religious coping, and family

We invite unpublished novel, original, empirical and high quality research work pertaining to recent developments &amp; practices in the area of Computer, Business, Finance,

Vital to this approach are Cognos business analytics solutions, which include the software and services that enable you to make better decisions by providing planning,