Clustering and Fault Tolerance For Target Tracking Using Wireless Sensor Networks
Clustering and Fault Tolerance For Target Tracking Using Wireless Sensor Networks
org
Published in IET Wireless Sensor Systems
Received on 19th October 2010
Revised on 1st February 2011
doi: 10.1049/iet-wss.2010.0085
ISSN 2043-6386
Abstract: Using wireless sensor networks to track a moving object provided a practical solution to a wide variety of applications
including, for example, wild life, military operations, intruder tracking and monitoring in indoor ofce buildings. While much
work has been done in this area, failures are not considered in most of the existing solutions. However, failures have to be
handled carefully in target tracking applications because of their unpredictable and dynamic nature of communication, such as
sensor energy depletion, severe environment conditions, unstable communication links and malicious attacks. Traditional
approaches of fault tolerance are not well suited to address these new challenges. Therefore the authors propose a novel faulttolerant target tracking (FTTT) protocol based on clustering. Also, the results of an investigation in terms of performance
overheads and scalable nature of the FTTT protocol via comparative simulations with LEACH are discussed. Overall, in all
the cases, FTTT consumes at least 25% less energy than LEACH.
Introduction
www.ietdl.org
tracking. This work is an extension of our work presented in
[14] with more simulations. The model checking of FTTT is
presented in [15].
This paper makes three major contributions. First, we present
a static cluster formation technique, which facilitates CH
recovery procedure. Secondly, RN are identied and enforced
to maintain a sleep state in order to reduce the cost of fault
tolerance and conserve the total energy consumption of the
network. Thirdly, a technique of how failed CH member
nodes can be recovered and when CHs activate RNs, which
are currently in a sleep state. The rest of the paper is organised
as follows. Section 2 briey presents a summary of related
work. In Section 3, details of the proposed FTTT is illustrated.
The mathematical evaluation of FTTT protocol is given in
Section 4. Parameters and metrics for simulation of the
proposed protocol are demonstrated in Section 5. In Section 6,
simulation results are reported and analysed. Finally, Section
7 states concluding remarks.
Related work
www.ietdl.org
Table 1
Notational conventions
MNTj MAMij
Notations
Descriptions
CHN
SNM
LSi (xi , yi)
LHj (xj , yj)
LT (xt , yt)
ELi
CHID
SNID
SCHID
RCHID
MNTj
NNTj
Edij
w1
w2
set of N CHs
set of M SNs
2D location of SNi
2D location of CHj
2D location of target
energy level of SNi
CH identity
SN identity
sending CH identity
receiving CH identity
member node table of CHj
NCH member node table maintained by CHj
distance between SNi and CHj
threshold value used during cluster formation
threshold value used during redundancy
reduction and SN fault tolerance
threshold value used during target tracking
packet sending time
size of packet
number of SNs sending data to the CHj
maximum limit of SNs sending data to the CHj
set of SNs unable to join any CH
threshold for maximum overlaps
faulty CH
w3
T
size
Ct
K
mi
maxO
CHf
(1)
NNTj MNTj+1 ,
CHj (SCM) SNi ,
NNTj+1 MNTj
(3)
(4)
(5)
if j [ CHN , i [ SNM
Redundancy reduction
www.ietdl.org
drainage or because of damage.
j [ CHN , i [ SNM
Target tracking
CHj+1 = faulty,
(6)
if Edit f3 > ct , K
i [ SNM
(7)
|NCH| 2
3.5
(10)
3.4
There can be three possible fault scenarios for a CHj . First is the
link failure with only one particular NCH due to any type of
interference. Second is energy depletion and the third is
complete damage. The CHj sends an activate message (AM)
to NCH in order to check their status periodically (11). If a
NCH does not send a reply message (RM) to CHj as dened
in step (12), then it is assumed to be a faulty CH, CHf . The
details of communication during fault tolerance of CHs
revealed in Fig. 1 are demonstrated as follows
CHj (AM) CHj+1 : AM = (SCHID , RCHID , t, size)
CHj+1 (RM) CHj : RM = (RCHID , t, size)
(11)
(12)
The rst step is to identify which fault has occurred. The CHj
would consult its NCHs to send an activate message to CHf
and if they get RM from CHf then it is identied that the
communication link between CHj and CHf has failed. Thus,
no recovery procedure is required as other CHs can
communicate with the CHf and it can take part in the
tracking process. If NCHs also do not get RM, then it is
identied that CHf has failed, either because of energy
IET Wirel. Sens. Syst., 2011, Vol. 1, Iss. 2, pp. 6673
doi: 10.1049/iet-wss.2010.0085
if Edij , f2
(8)
(9)
j [ CHN
if cluster N , NCH
(13)
(14)
(15)
Mathematical derivation
(16)
N
M
(100 + 0.1Edij2 ) b
j=1 i=1
69
www.ietdl.org
Let Dj is the distance between CHj or mi and the BS, while
dj is the distance between CHj and CHj+1 . The energy
consumed during communication among CHs is
ENCH =
N
5
(100 + 0.1dj2 ) b
j=1
mi
N
(100 + 0.1D2j ) b
j=1 i=1
N
M
(100 + 0.1Edij2 )b +
j=1 i=1
N
(100 + 0.1dj2 )b
j=1
mi
N
(100 + 0.1D2j ) b
j=1 i=1
A
Theorem 2: The probability Pt(k) as the total R packets are
received by BS in response of Pj packets send by CHj and
Pi packets send by mi SNs is given as
Pt(k) =
SRa=1 Pa
mi
SCHj
j=1 Pj + Si=1 Pi
(17)
ERA
CHj
Sj=1 Ej
ERS
SN
+ Si=1i Ei
(18)
6
Corollary 2: Let the Lavg in terms of the time difference
between target information packet reception by CHj or SNi
and packet delivery to the BS is given as
Lavg =
N
SM
i=1 ti + Sj=1 tj
SRa=1 Pa
(19)
70
Performance evaluation
www.ietdl.org
Fig. 3 Pt(k) with varying number of SNs and CHs at different target
speeds
www.ietdl.org
indicates FTTT with all the steps. It is obvious that a
signicant amount of energy saving is achieved in case of
the RN: sleep state. One of the reasons for the greater
energy consumption by the RN: active state is redundant
packet transmission towards BS. In the RN: active state
more SNs are detecting the target and are sending data to
CH at the cost of additional energy while in the RN: sleep
state, RNs are in sleep state as indicated and only K SNs
are allowed to send data to the CHj .
6.4
Network throughput
Average latency
Fault tolerance
Conclusion
www.ietdl.org
redundancy. Simulations demonstrate that FTTT protocol
achieves better results when compared with LEACH via
less energy consumption, higher tracking probability and
fault tolerance. It is observed that ETotal , Pt(k) and NTP show
the direct relationship with the number of SNs and CHs.
Future work includes exploring the tracking quality and
recovery of target losses in FTTT. It would be useful to
explore the upper bound on the degree of redundancy to
achieve fault tolerance.
Acknowledgments
References
73