Dynamic Clustering For Acoustic Target Tracking in Wireless Sensor Networks
Dynamic Clustering For Acoustic Target Tracking in Wireless Sensor Networks
Wei-Peng Chen, Jennifer C. Hou and Lui Sha Department of Computer Science University of Illinois at Urbana-Champaign, Urbana, IL 61801 wchen3,jhou,lrs @cs.uiuc.edu
Abstract In the paper, we devise and evaluate a fully decentralized, light-weight, dynamic clustering algorithm for target tracking. Instead of assuming the same role for all the sensors, we envision a hierarchical sensor network that is composed of (a) a static backbone of sparsely placed high-capability sensors which will assume the role of a cluster head (CH) upon triggered by certain signal events; and (b) moderately to densely populated low-end sensors whose function is to provide sensor information to CHs upon request. A cluster is formed and a CH becomes active, when the acoustic signal strength detected by the CH exceeds a pre-determined threshold. The active CH then broadcasts an information solicitation packet, asking sensors in its vicinity to join the cluster and provide their sensing information. We address and devise solution approaches (with the use of Voronoi diagram) to realize dynamic clustering: (I1) how CHs cooperate with one another to ensure that for the most of time only one CH (preferably the CH that is closest to the target) is active; (I2) when the active CH solicits for sensor information, instead of having all the sensors in its vicinity reply, only a sufcient number of sensors respond with non-redundant, essential information to determine the target location; and (I3) both packets with which sensors respond to their CHs and packets that CHs report to subscribers do not incur signicant collision. Through both probabilistic analysis and ns-2 simulation, we show with the use of Voronoi diagram, the CH that is usually closest to the target is (implicitly) selected as the leader and and that the proposed dynamic clustering algorithm effectively eliminates contention among sensors and renders more accurate estimates of target locations as a result of better quality data collected and less collision incurred.
mon characteristics: First, the tracking system should report the location of the target to subscribers (usually remote controllers) accurately and in a timely manner. Second, because the data collected by sensors may be redundant, correlated, and/or inconsistent, it is desirable to have sensors collaborate on processing the data and transporting a concise digest to subscribers. This reduces not only the number of packets to be transported, but also the possibility of collision and interference in the shared media. Localized and collaborative data processing also aids in reducing the power consumed in communication activities and hence prolonging the lifetime of sensor networks. To facilitate collaborative data processing in target trackingcentric sensor networks, the cluster architecture is usually used in which sensors are organized into clusters, with each cluster consisting of a cluster head (CH) and several neighboring sensors (members). In the conventional cluster architecture, clusters are formed statically at the time of network deployment. The attributes of each cluster, such as the size of a cluster, the area it covers, and the members it possesses, are static. In spite of its simplicity, the static cluster architecture suffer from several drawbacks. First, xed membership is not robust from the perspective of fault tolerance. If a CH dies of power depletion, all the sensors in the cluster render useless. In the case that sensors die, a cluster may not have sufcient sensors to carry out its tracking tasks. Second, xed membership prevents sensor nodes in different clusters from sharing information and collaborating on data processing. Lastly, xed membership cannot adapt to highly dynamic scenarios of interest in which sensors in the region of high (low) event concentration may be instrumented to stay awake (go to sleep). Dynamic cluster architectures, on the other hand, offer several desirable features. Formation of a cluster is triggered by certain events (e.g., detection of an approaching target with acoustic sounds). Specically, when a sensor with sufcient battery and computational power, detects with a high signal-to-noise ratio (SNR), certain signals of interest, it volunteers to act as a CH. No explicit leader (CH) election is required, and hence no excessive message exchanges are incurred. On the other hand, a judicious, decentralized approach has to be used to ensure that for most of the time only one CH is active in the vicinity of a target to be tracked. Sensors in the vicinity of the active CH are
I. I NTRODUCTION With the advancement of MEMS technologies, sensor networks have opened new vistas for a wide range of application domains. These sensor networks usually comprise small, lowpower devices that integrate sensors and actuators with limited on-board processing and wireless communication capabilities. One of their most important applications is target tracking, with the targets to be tracked ranging from security attacks in the forms of chemical, biological, or radiological weapons, to moving objects in civil surveillance, and to changes in light, temperature, pressure, acoustics in environmental monitoring. The type of signals to be sensed are determined based on the types of objects to be tracked. In spite of the different targets to be tracked and the various signals to be sensed, tracking applications share several comThis work is supported in part by the MURI program N00014-01-0576, by the DARPA NEST program F33615-5-01-c-1905, and by the NSF ANI under grant ANI-0221357.
In this paper, we devise and evaluate a fully decentralized, light-weight, dynamic clustering algorithm for single target tracking. We focus on acoustic target tracking, although the proposed approaches can be readily applied to other types of tracking applications. In acoustic tracking, two most common methods for target localization are the time delay-based [6] and energy-based [4], [5] approaches. While time delay-based approaches are susceptible to estimation errors in time synchronization, on-set detection and echo effect, energy-based approaches are more robust in these aspects. Hence we adopt in this paper the energy-based approach as the localization method. Sensors in the acoustic tracking systems perform two types of computation: (1) sensing the energy level of signals; (2) sound analysis, classication, and data fusion. The former is not computational intensive and can be handled by sensors with minimal computation power. The later, however, requires much higher computation power. To this end, we envision a hierarchical sensor network that is composed of (a) a static backbone of sparsely placed high-capability sensors which will assume the role of a CH upon triggered by certain events of interest; and (b) moderately to densely populated low-end sensors whose function is to provide sensor information to CHs upon request. A cluster is formed and a CH becomes active in an on-demand fashion, when the acoustic signal strength detected by the CH exceeds a pre-determined threshold. The active CH then broadcasts an information solicitation packet, asking sensors in its vicinity to join the cluster and provide their sensing information. After receiving a sufcient number of replies from sensors, the CH applies a localization method to estimate the location of the target and send a report to the subscribers. There are several issues that we have to address and devise solution approaches in order to realize the notion of dynamic clustering: (I1) how CHs cooperate with one another to ensure that for most of the time only one CH (preferably the CH that is closest to the target1 ) is active; (I2) when the active CH solicits for sensor information, instead of having all the sensors in its vicinity reply, only a sufcient number of sensors respond with non-redundant information to determine the target location; and (I3) both packets with which sensors respond to their CHs and packets that CHs report to subscribers do not incur signicant collision.
The reason why the CH closer to the target should be activated is because the quality of sensing data decreases with the distance from the target.
Research in using sensor networks for target tracking has recently attracted much attention. The type of work can be roughly categorized into two categories. In the rst category, data captured in different sensors are collected at a node, and signal processing schemes, such as Maximum Likelihood testing (ML) [5] and minimum square estimation [4], are applied to localize the target. In the second category, the target location is estimated successively based on the current measurement at a sensor and the past history at other sensors [8], [2], [3]. These types of work mainly focus in the signal processing aspect, rather than the communication aspect, of target tracking. In contrast, our proposed approach balances in selecting a subset of most adequate sensors to conduct tracking tasks. The signal processing techniques mentioned above can be incorporated with the proposed approach in a complementary manner. Clustering techniques, on the other hand, have been proposed in wireless networks for routing [14], [13], [7], bandwidth reuse [11], and data gathering [12]. None of them are targeted for the purpose of target tracking and hence do not consider issues (I1 I3) comprehensively. Through both the probabilistic analysis and ns-2 simulation, we evaluate and demonstrate the effectiveness of the proposed approaches. In particular, we show via a simplied model (which captures all the essential properties) that the probability that packets collide with one another is very small under the proposed approaches. We also show via simulation that with the use of Voronoi diagram, the CH that is usually closest to the target is (implicitly) selected as the leader and that the proposed dynamic clustering algorithm effectively eliminates contention among sensors and renders better and more accurate estimates on target location as a result of better quality data collected and
invited to become members of the cluster and will report their sensor data to the CH. In this manner, a cluster is only formed in the area of high event concentration. Sensors do not statically belong to a cluster, and may support different clusters at different times. Moreover, as only one cluster is active in the vicinity of a target, redundant data is suppressed and potential interference and contention at the MAC level is mitigated.
To deal with these issues, we propose, with the use of Voronoi diagram, a probabilistic leader volunteering procedure and a sensor replying method. Initially, we enable all the sensors to calibrate their relative positions to their neighbors (at the CH CH level and the sensor sensor level) at the time of network deployment. Then, with the use of Voronoi diagram, each CH (or sensor) can calculate and tabulate the probability that given an distance estimate between a target and itself, the CH (sensor) is closest to the target. This information is used to set up the timer used by a CH to announce its willingness to be active in the leader volunteering process. If no other CHs volunteer before the timer expires, the CH becomes active; otherwise, it suppresses its timer. Similarly, this probabilistic information is also used by a sensor to determine whether or not it should respond to a CH upon request to provide sensor information and the timer value with which it responds to such a request. Note that due to the limited mobility nature of sensors, the calibration and tabulation process needs only to be carried out initially at network deployment and infrequently during system operation.
II. S YSTEM OVERVIEW A. Energy-Based Localization The fundamental principle applied in the energy-based approach [4], [5] is that the signal strength (i.e., energy) of a received signal decreases exponentially with the propagation distance[2], [4]:
' 5 0 2 0 63431) ' $ " (&%#!
(1)
B @ CA
B. Overview of Proposed Dynamic Clustering Algorithm As mentioned in Section 1, we envision a heterogeneous, hierarchical sensor network that is composed of (a) a static backbone of sparsely placed high-capability sensors called CHs; and (b) moderately to densely populated low-end sensors whose function is to provide sensing information to CHs upon requests. Because of the limited mobility nature of sensors, the calibration process of sensor locations is executed only once when the network is deployed. In this calibration process, geographical information required to construct the Voronoi diagram is collected, and the Voronoi diagram constructed. Furthermore, both CHs and sensors construct several tables to facilitate determination of the back-off timer values (to be used when a CH intends to volunteer itself as a leader and when a sensor intends to respond to a CH). A CH volunteers to become active when it detects that the strength of an acoustic signal it receives exceeds a predetermined threshold and the signal matches one of the signal patterns which the system intends to track. As multiple CHs may detect the acoustic signal with a sufciently high signal-to-noise ratio and volunteer themselves as active leaders, we devise in Section 3.2 a two-phase volunteering procedure to determine in a decentralized manner the CH with the strongest signal strength. The tasks of an active CH include the following four steps: 1) broadcasting a packet that contains the energy and the extracted signature 2 of the detected signal to sensors, 2) receiving replies from sensors, 3) estimating the location of the target based on replies, 4) sending the result to subscriber(s).
The extracted signature can be eithor the raw data or the extracted feature of a signal.
where is the received signal strength in the sensor, is the (unknown) strength of an acoustic signal from the target, is the target position yet to be determined, is the known position of the sensor, is the (known) attenuation coefcient, and is the white Gaussian noise with zero-mean and variance . Instead of solving for the unknowns in Eq. (1) based on energy readings from multiple sensors, we use the following simple Voronoi diagram-based approach. Conceptually, each pair of energy readings, ( ), from two sensors and determines a half plane that contains the target, i.e., if , the target is closer to sensor than to sensor and hence lies in the half plane that contains sensor . With multiple pairs of energy readings, the target location can be conned to be the intersection area of all the half planes. It can be shown that for a set of sensor readings, out of the total half planes are independent. Therefore, in order to obtain a bounded intersection area, at least four sensor readings are required. As the locations of sensors are static (only subject to environmental factors such as wind), the intersection area can be determined in advance in the form of Voronoi diagram. For completeness of the paper, we dene the Voronoi diagram below [1]: Denition 1: (Voronoi) Let be a nite set of points in the -dimensional space and their location vectors . The region given by is called Voronoi cell associated with and
f W Q U V1T S 2
associated with the point We claim that the Voronoi cell is exactly the intersection area of all the half planes by the following observation:
a X g
X a g
The rest of the paper is organized as follows. We lay the necessary technical background and give an overview of the proposed dynamic clustering algorithm in Section 2. We then delve into the algorithm details In Section 3. Following that we present, respectively, the analysis and simulation results in Sections 45. Finally we conclude the paper in Section 6.
As a result, as long as the sensor with the maximum energy reading, say , can be identied, the location of the target is inside and the position of can be used as the approximate location of the target. Note that the error of the above approximation is small and bounded if the target is at a bounded Voronoi cell . In the case that the Voronoi cell identied is not bounded, more detailed estimation is needed. For example, as indicated in [4], each pair of energy readings determines a circle on which the target may reside. To estimate the target location, a nonlinear least square equation has to be solved. Considering the limited computational power sensors are equipped with, we assume in this paper a target travels within a bounded region, and it is sufcient to estimate the location of the target with the position of the sensor with the maximum signal strength.
a ' bQ g y g X
less collision incurred. As compared to the performance of the static cluster, the proposed approaches reduce the estimation error and latency by 23% and 15%, respectively.
Observation 1:
g r bQ w Q i a ' Q g P g X
a X g
, where
g 0 h u u u
E B F%@
87 92
4 g a X s tB r ' i g g qqq' ph
d c a ) e(b`
WX 9YW
8 97 2
Q ' RP(I
)
E H
E B @ FD3
Once the CH collects enough replies, it ignores all subsequent replies (if any), generates the localization result and sends the result back to subscribers. Sensors that decided to reply but have not yet done so (as their timers have not expired) stop replying, if they overhear the packet that carries the localization result. The relationship between the radio transmission range and the acoustic signal detection range determines the size of a cluster. The radio transmission range is controlled by adjusting the transmission power, while the acoustic signal detection range is controlled by adjusting the detection threshold. If the acoustic signal detection range is larger than the radio transmission range, multiple CHs may become active and multiple clusters formed at the same time, without knowing the existence of one another. The results obtained from different clusters may differ dramatically because a CH may not be able to recruit sufcient sensors and gather enough sensor information to conne the target in a bounded Voronoi cell. On the other hand, if the radio transmission range is larger than the acoustic signal detection range, the localization results will be more accurate but collision has to be handled carefully. In this paper, we assume that the radio transmission range is set to be twice of the acoustic signal detection range. III. D ETAILED D ESCRIPTION OF P ROPOSED DYNAMIC C LUSTERING A LGORITHM The proposed dynamic clustering algorithm is composed of four component mechanisms: initial distance calibration and tabulation, CH volunteering, sensor replying, and reporting of tracking results. In what follows we elaborate on each of the four component mechanisms. A. Distance Calibration and Tabulation Before the acoustic tracing system starts to function, each sensor has to know the positions of sensors in its tracking ranges. Under the assumption that the radio transmission range is larger than the acoustic detection range, a sensor can notify other sensors of its ID, device function (CH or sensor), and location information by broadcast. To reduce the possibility of collisions,
a broadcast packet is delayed by a back-off value determined based on the sensor ID. Construction of Voronoi diagrams at a CH: After receiving the location information from all the neighboring sensors, a CH constructs two Voronoi diagrams around itself, one for the set of neighboring sensors and the other for the set of neighboring CHs. In what follows, we rst elaborate on how to use Voronoi diagrams to construct response tables and will explain their usage in Sections 3.23.3. Construction of the response table based on Voronoi diagrams at a CH: After the Voronoi diagrams are constructed, a CH proceeds to construct the response table to facilitate determination of back-off timer values (to be used when the CH intends to volunteer itself as a leader). The table is indexed by the estimated distance from the target to the CH, , and each table entry stores the conditional probability that with the distance , a target indeed locates within this CHs Voronoi cell. The distance from the target to a CH, say , can be estimated (with the noise ignored and the conjectured signal . That is, the posstrength from the target 3 ) as sible position at which the target may be located is a circle cenand with radius . Next, we derive the conditional tered at probability, , that the target locates within the Voronoi cell of , given the distance from the target to , . Let and denote, respectively, the distance from to its nearest neighboring CH and that from to the farthest Voronoi vertex of its Voronoi cell. We have to consider three cases (Figure. 1) : is the nearest CH to the target because the circle that is centered at and has a radius of lies completely within s Voronoi cell. Hence . 2) : By the denition of , the circle cenInitially is set to a default value and dynamically adjusted according to the previous localization results.
&%
$ #) "
U b Ya 2 X
1)
i
T e X a c
X a 2
c ) d
Upon receipt a broadcast packet from a CH, a sensor matches the signature with its buffered data. In the case of a match, the sensor then determines, with the use of the Voronoi diagram based table, whether or not it may be (i) the sensor that is closest to the target or (ii) one of the neighbors of the sensor that is closest to the target. If any of the above two conditions holds, it replies, after a random delay, to the CH the strength of the signal it receives. The random delay is determined based on the strength of the signal the sensor receives so as to mitigate collision. We will elaborate on how a sensor determines whether or not, and when, it should reply to a broadcast message from a CH in Section 3.3.
CH i
Fig. 1. Voronoi diagram of . If a target locates within the inner dotted is sure that the target is in its Voronoi cell. On the other hand, if a circle, target resides outside the outer dashed circle, is sure that the target is out of its Voronoi cell.
'
where and
To keep the table size at a xed value, we quantize the distance from the target to itself as follows. The table contains entries. The rst entry is indexed by the maximum value of (denoted as ) such that , while the last entry by the minimum value of (denoted as ) such that . The other entries are indexed by values evenly spaced between and . Given an arbitrary distance , a binary search is made to locate the two entries with the closest distance and interpolation is used to obtain the approxi. mate value of Construction of the Voronoi diagram and the response tables at a sensor: A sensor constructs one Voronoi diagram
Q
One point is worthy of mentioning the process of table construction takes place only once at each CH/sensor. In the case that sensors are not equipped with sufcient circuitry to perform this pre-processing, their nearest CH may construct the tables on their behalves and transmit the resulting tables to them. B. Cluster Head Volunteering In the rst step of dynamic clustering, a CH volunteers to recruit sensors to form a cluster if its detected signal strength exceeds a predened threshold. One fundamental design issue to consider is which CH(s) should be elected to form a cluster if more than one CH detect simultaneously signals with the strength exceeding the threshold. Note that if two or more clusters are active simultaneously, packets exchanged in one cluster may interfere/collide with those in the other cluster(s). (This is corroborated by our performance study in Sec. 4 in which we
Q h i
"$
s Ya
X Q 5
Note also that in line 7 needs to know for every neighboring . This can be achieved by having each CH broadcast the distance to its nearest CH in the second round. Also, if s Voronoi cell is not bounded, the algorithm excludes in line 5 samples which are in but with the distance to larger than that from to its farthest Voronoi vertex.
s
a qQ
gX V
SX a i Q h
Q 5
X a Q h i Q 5
a bQ
gX V
Note that lines 5 and 7 in the algorithm can be executed in time and space, where is the number of CHs in the detection range, after the Voronoi diagram is constructed. Essentially the algorithm takes resolution samples on the circle that is centered at and has a radius of , where resolution is a tunable parameter. Whenever a sample lies within , the variable gain is incremented. On the other hand, when a sample may lie within for some neighboring , the variable loss is incremented, except that samples that are surely located in the Voronoi cell of one neighboring CH are not counted in loss. The probability sought for is then estimated as .
X a 2
the circle.
Given the above expressions and the signal strength detected at , each sensor can locate the potential positions of the target. Using a similar algorithm to that in Fig. 2, we can calcu. Each sensor then maintains, late and tabulate for each CH within its transmission range, a table of entries. In addition, let denotes the event that the target is in neither nor the Voronoi cells of any of s Voronoi neighbors. Then each sensor calculates the conditional probability, , that the target is located at neither nor the Voronoi cells of any of s Voronoi neighbors. Note that needs only to store the minimum value of , , such that .
' E
tu E a
" E a
or
is the radius of
E a
j X r#j p
" E a
X p
E a i
j r j X
" E a i t X
tered at with a radius of lies completely outside s Voronoi cell. Hence . 3) : The circle that is centered at and has a radius of is partially located within s Voronoi cell and hence . We will further estimate using the algorithm given in Fig. 2.
. Let . After a few algebraic operations, one can derive that the locus of the potential position of the target, ( ), is a circle characterized by
X
E a
n k m k
ya E
j' n oX bp m o q
a
n oo m 6X
u 2hg df 1Xaw u yx
$ #) "
X 0 #a 2 b
"$
"$ $
s a
X Ya 2
v t qp eu )srYi
Fig. 2.
when
j a'
n #k mk al
Q h i
Q h iI i
X a i S b Q h i
j '
i
Q h i a Q
gX V
d hg f eT ! c 6Tb'aP`Y)XV7 6U'SRQ &H 9H $ W5 T & 9H $ P)I '&SRQ 9H $ PAI E ( ' G8F8D5 !C0B9 A &@9 687564!201$ ) %$ 3 ( ' & #!" X C
d F f 2 X "$ $
c $
C ALC 1. gain 0; loss 0 1 to resolution 2. for /resolution 3. 4. ; 5. if is within Voronoi cell 6. gain++ 7. else if is within and 1/2 8. loss++ 9. return gain/(gain+loss)
around itself for the set of neighboring sensors. The response table is indexed by the ratio, , of the signal strength at a to its received energy, where is the CH that initiates the solicitation. Each table entry stores the conditional probability, , that the target locates in s Voronoi cell rather than other neighboring sensors or CHs, given the ratio . Specically, suppose a sensor , located at ( ), , loreceives an information solicitation packet from a CH cated at ( ). Assume that the signal strength detected at and , is, respectively, and . Then
X a 2
PSX
a WX
dd ahFs
X a 2
"$ $
Ya
c ) d
a W
2 b X
D df &u u 6V9X f
X
will investigate the performance in the case that more than one cluster is active.) Ideally, the CH that is closest to the target (or the CH with the largest SNR ratio) should be elected. Since the communication cost of deterministic leader election is very high, we propose to use a two-phase, random delay-based broadcast mechanism to implicitly determine the active CH. In what follows, we rst describe how the random delay is set and then delve into the two-phase broadcast mechanism. Determination of back-off timer values: Without a centralized facility and/or excessive message exchanges for CH election, the most effective method to determine the active CH is to gure in the received signal strength into the determination of the back-off timer values used to send solicitation packets. A CH whose received signal strength exceeds the pre-determined threshold sets a back-off timer and does not broadcast its solicitation packet until the timer expires. If by the time the back-off timer expires, the CH receives a solicitation packet from some other CH, it cancels the timer. Specically, the back-off time, , for which (with the estimated distance ) delays before sending its solicitation packet is:
' a s
To deal with the above problems, we propose a two-phase broadcast mechanism: in the rst phase, an energy packet that carries only the signal strength information is broadcast. In the second phase, a signature packet that contains the detailed signature information is then broadcast. Both packets are subject to the same random back-off delay value (except for the randomized term). Specically the two-phase broadcast mechanism operates as follows: (R1) A CH sets its back-off timer with the value of (Eq. (2)) for the energy packet. (R2) When the timer in the rst phase expires, the CH broadcasts an energy packet and sets its back-off timer to the same value in the second phase (except for the randomized term). (R3) When the timer in the second phase expires, the CH broadcasts a signature packet. (R4) If by the time the timer expires in the rst or second phase, the CH overhears (i) a broadcast packet with the signal strength larger than that it itself detects or (ii) a signature packet, it cancels its timer and does not henceforth volunteer. Otherwise, the overheard packet is ignored. Note that the energy packet in the rst phase is much shorter than the signature packet in the second phase and hence the possibility of collision is reduced. Also, as will be analyzed in detail in Section 4, even if the energy packet of a CH collides with other packets, the CH may still be able to broadcast its signature packet in the second phase.
(2)
where and denote the minimum and maximum backoff timer values, is the uniform distribution in , and can be retrieved from the response table (Section 3.1). Note that contains two parts. The rst two terms in Eq. (2) are the deterministic part that relates the estimated distance to the back-off delay value, and the third term accounts for the random part that prevents potential collision when the distances from the target to two or more CHs are approximately the same. The random part is an order of magnitude smaller than the deterministic part. Note also that the back-off timer is set at the application level, meaning that a CH only passes an information solicitation broadcast packet onto its MAC layer when the back-off timer expires. An underlying carrier-sense MAC protocol, such as a light-weight version of IEEE 802.11b, is still needed to mitigate collision at the MAC level. Two-phase broadcast with energy and signature packets: Although the above random back-off delay method reduces the possibility of collision, it does not totally eliminate it. This is in part due to the fact that these information solicitation packets may be queued at the MAC layer before being transmitted. Moreover, in order for sensors to identify which event a CH is interested in, information solicitation packets contain not only the signal strength but also the signature of the acoustic sound and as a result are usually quite large. A sensor then attempts to match the received signature with its buffered data to make sure the same event is being tracked. These solicitation packets of large sizes also contribute to the possibility of collision.
aX
Operations performed by a volunteering CH: In order to realize the above mechanism, clock synchronization is required in two respects. First, a CH has to inform sensors of the time when the event takes place so that sensors can match the signature contained in the packet with its buffered data. Second, when a CH sends the localization result to the sink, it has to inform the sink of the time when the event takes place. To avoid the expensive clock synchronization process, we use relative clock values rather than absolute clock values. A CH records the time it detects the event. Before broadcasting the signature packet, the CH calculates the time lag (which includes the processing time, back-off delay and expected propagation delay), and attaches the time lag in the signature packet. When a sensor receives the signature packet, it can infer the time when the CH detected the event. After broadcasting the signature packet, a CH sets a timer to wait for replies from neighboring sensors. If a sufcient number of replies are received before the timer expires, the CH cancels the timer and calculates the localization result; otherwise, the result is generated upon the expiry of the timer.
X e(aa 2 q " X
s ) X a
X a 2 b
&%
X
"
' $
C. Sensor Replying After a sensor receives a signature packet, the rst step is to match the signature with its buffered data. The search range can be conned with the use of the time lag information in the signature packet. If the signature is matched, the signal strength in the buffered data (as well as the ratio of the signal strength detected at the CH to that in the buffered data) is calculated. A sensor does not respond if and , where is a constant and is the minimum value of such that . In the case that a response is to be sent, a similar, random back-off method is used to avoid potential collision of all the replies from sensors to . That is, a sensor delays its reply by a back-off value determined by
' Ra s
sensor
cluster head
D. Reporting Tracking Results A CH generates the localization result, if either the timer set after the signature packet was sent expires or the CH receives a sufcient number of replies, whichever occurs rst. By sufcient, we mean the set of replies includes a reply from a node with the largest signal strength, and replies from all s Voronoi neighbors. In this manner, the target is guaranteed to be within the Voronoi cell of , , due to the convexity of the propagation model. Then, a simple localization approach is used to determine the position of the target: the position of the sensor that reports the largest signal strength is taken as the estimate of the target. A more sophisticated localization method is currently under investigation and will be gured in our future work. Once the localization result is generated, the CH has to send the location and time information of the target to the sink(s).
Q
1) Both the CHs and the sensors are deployed on a regular square grid shown in Fig. 3. In this scenario, at most four CHs will contend to become a leader. 2) The following equation, rather than Eq. (2), is used by to determine its back-off time:
a s
(3)
where is the estimated distance from the target to , is half of the distance from to the closest neighboring CH, and is the distance from to its farthest Voronoi vertex. In the scenario given in Fig. 3, . Note that we replace in Eq. (2) with to simplify the analysis. Given the position of a target, we number CHs in the increasing denotes the order of their distances to the target, such that if distance from to the target, we have
qq E
X a 2 b
" a
E i X qa
)
s "
If by the time the back-off timer expires the sensor overhears reply packets from other sensors, it records the sensor that reports the largest signal strength. When the timer expires, the sensor sends a reply packet only if (i) the signal strength it detected is larger than that carried in any of the overheard reply packets; or (ii) it is one of the Voronoi neighbors of the sensor node that reports the largest signal strength. The two conditions ensure that the set of replies that the active CH will receive includes a reply from a node with the largest signal strength, and replies from all s Voronoi neighbors. Due to the convexity of the propagation model, the target is guaranteed to be within the Voronoi cell of , . Finally, when a sensor overhears a tracking report packet from a CH, if it prepares to reply to this CH and the event ID is the same, the sensor cancels its timer and does not respond.
a Q
m 7 no7 m7 i 1d
E
gX V
a Q
SX a s Q h
are the minimum and maximum backcan be retrieved from the response
Q ih
X " a a Q h TPsb S R
$ !
s X a s S b Q h
s ) X a
$ #) "
s a
gX V
&% X
X Q 5
p
"
Qi h p
10 m
Fig. 3. The scenario that shows how CHs and sensors are deployed in the analysis.
The CH calculates the time difference between the time instant when it detected the event and the expected time instant when the packet arrives at the next hop and sends the tracking report packet. Each intermediate router accumulates and updates the time lag in the same manner. When the sink receives the report, it can calculate the time when the CH detected the event. IV. A NALYSIS
OF
P ROPOSED A LGORITHM
In this section we analyze the performance of the CH volunteering procedure (Section 3.2) and show that with properly se, , and , (a) the CH with the lected parameters largest signal strength ( ) transmits its energy packet earlier than any other CH (and thus suppress other energy packets) with a high probability; and (b) in the case that (a) is not true, still has a very good chance to become the leader eventually. To facilitate derivation, we make the following simplications:
P4
CH 1
P1 P2
$ %f
Proof: Cases (ii) and (iii) occur only if , for some , where is the backoff time determined by Eq. (3). That is,
a s
) D
"
4a
Lemma 1: Cases (ii) and (iii) occur only if , where and maximum and minimum backoff timer values and is the range of the uniform distribution in Eq. (3).
The rst step to calculate the probability that s energy packet collides with other energy packets is to identify the region in the Voronoi diagram in which collisions may potentially occur. By Lemma 1, any point in such a region possesses the following property: The distance between the distance from this point to , , and that to , , is less than . As is a hyperbola in the Voronoi diagram, the region is bounded by the hyperbolas and the Voronoi cell boundaries. For example, if the CHs and sensors are deployed in the square grid in Fig. 3, then the hyperbolas that bound the collision region are s Voronoi cell is symmetric, we given in Fig. 4. Because only consider its one eighth portion in the northwestern corner (i.e., the area bounded by , , and ).
First we show in the following lemma that cases (ii) and (iii) occur with small probabilities, if the parameters , , are properly selected. and
Now we inspect the probability that will not become a leader in case (iii). In this case, may still become the leader if (a) s signature packet is not scheduled before s signature packet and (b) s signature packet does not collide with any other signature or energy packets. As the probability of the above events can not be exactly and easily calculated, we use s energy packet collides with other enthe probability that ergy packets as the upper bound of the probability that can not become the leader. This is because if the energy packet from does not collide with other packets, always become the leader. We will show that this probability is very small.
i i
In this paper we set to be equal to case (ii) always becomes the leader.
, thus ensuring in
" #)
" a
E
!
X a s
&%
"
"
transmits its energy packet earlier than any 1) Case (i): other CHs and by overhearing s energy packet, other CHs cancel their back-off timers and do not volunteer. , for some successfully transmits its 2) Case (ii): energy packet earlier than .4 proceeds to transmit its energy packet by (R4) in Section 3.2, and assume this packet does not collide with s signature packet or energy packets from other CHs. In this case, if s energy packet is sent earlier than s signature packet, will still becomes the leader. 3) Case (iii): The energy packet from collides with the energy packet from , . but the energy packet from , is successfully transmitted. In this case, may still have chance to become active if its signature packet is sent earlier than any other signature packets and does not collide with other packets.
k ' $ 0 i
. Ideally by the end of the volunteering process, become the leader. Now we consider three cases:
i
should
" a i i
E a i i i X " E X s a
Proof: As discussed in Section 3.2, after sends its energy units of time before sending the packet, it has to wait for signature packet. Moreover, the timer is cancelled and the signature packet is not sent, if overhears an energy packet with a larger signal strength. Therefore, as long as sends its en, will not send the signature ergy packet before packet. That is,
m7 n7 s ) " a m 7 (m o o E X pa
C1
" #s k
P3
P5
C2
. In this paper we set (approximately three orders of magnitude smaller) to make a very small value, thus ensuring transmits its energy packet earlier than any other packets with a high probability.
C3
P0
" q
a i
E X
) 3
) s
k
)
k
0 i
As is a discrete random variable with the uniform distribution in , we set in to be zero and in to be for the worse case, and can reach the following conclusion
"
s k X a i ' $ s k X s i a
y Xx d
U 2
s a
a i
E X
U 2
"
"
TABLE I
The collision region under consideration is composed of four sub-regions, , , , and . (Points in the parenthesis represent the vertices of the sub-regions in the clockwise direction.) If the target is located in region , by Lemma sends its energy packet earlier than any other CHs. 1 On the other hand, if the target is located in region , s energy packet may collide with other energy packets. For example, if the target is located in region , s energy packet may potentially collide with energy packets sent by the CHs in the left lower grid and in the right upper grid. Given that the target is located at in region , the conditional probability, collision of s energy packet , that s energy packet collides with other energy packets is given in Table 1. Finally the probability that s energy packet collides with other energy packets can be expressed as:
In this paper we set , , to be 0.1 second, second, and second, respectively. 5 In this case , and region is much smaller than region . The numerical result of collision of s energy pkt is equal to . This ensures the probability that s energy packet collides with other energy packets is almost zero, and the proposed algorithm always elects the CH with the largest signal strength to be the leader.
a i
V. S IMULATION R ESULTS In this section, we evaluate the proposed dynamic clustering algorithm using SensorSim [10] (which is built upon ns-2[9]). The surveillance area is 180 180 . A total of 324 devices, including 36 CHs and 288 sensors, are deployed in the area. In addition, a sink is located at (0,0) in the system. Two deployment
g1
second,
9 $ ! 9H $ ( ( 7 7XY) `Y
CB
X
' &
collision of
A
Q
R
) Dd
' &
collision of
s energy pkt
s energy pkt
2 ' %P(
a )
2X
congurations are considered: one is to deploy the CHs and sensors on a square grid shown in Fig. 3, and the other is to assume both CHs and sensors are uniformly distributed in the area. The detection threshold of each acoustic microphone is adjusted so that the acoustic detection range is 25 meters. The radio transmission range is set to be twice of the acoustic detecting range, i.e., 50 meters. A static topology based sink tree rooted at the sink is built by the underlying routing protocol. IEEE 802.11b is adopted as the underlying MAC protocol. The performance metrics of interest are (i) the location error: the deviation (in meters) of the estimated location from the exact location of the target; (ii) the latency: the time interval from the instant when the acoustic event occurs till the time instant when the location result is delivered to the sink; (iii) the number of events detected and reported to the sink; (iv) the number of collisions throughout the simulation; and (v) the total number of control messages (information solicitation messages, replies, and tracking reports to the sink) throughout the simulation. Each data point reported below is an average of 30 simulation runs. In the rst set of simulations, we compare the performance of the full-edged version of the proposed algorithm, including the distance calibration and tabulation procedure and the two phase CH volunteering procedure, against two partial versions of the proposed algorithm and the static clustering approach. The rst partial version includes only one phase in CH volunteering, i.e., each time a CH intends to volunteer itself as the leader, it sends a complete signature packet after its delay timer expires. Also, the rst version does not construct the tables in advance to facilitate determination of the back-off timer values. Instead a CH determines its backoff timer value based on Eq. (3), and a sensor sets its backoff timer in proportion to the ratio of the signal strength detected by the soliciting CH to that detected by itself. The second partial version employs the two phase CH volunteering procedure but does not exercise the distance calibration and tabulation procedure. In the simulation, the target generates an acoustic event every 0.5 second. The target moves continuously
a a j ' ( X
COLLISION OF
THAT
! dW
S ' ' d
qp #Yi
C ONDITIONAL PROBABILITY,
S ENERGY PACKET
S ENERGY
0 n n "
0 A 0@0 g 90' 6 1 0 e ' 0 4 ' 0 4 d 6 8 n ' ' " 6 n n ( n & $ 0 ( n & $ 0 & d $ 0 0 6 ! 0 ! # ' ' d 7m "# ( ) n ' $%0 n ' 0 5 30 g 2' 0 1 0 0 n & ! 4 d 0 n n ! # m d n n m n n m E 4 5 4 ' 8XVs3 &
vv FE SG'DCq B t
9H $ P`Y
Region
i 2 (' B
U VT
Q I f I B R a Pf ' f ' X
) d b Dac)
d
'
"
` X Y#
I B
d
"
X b a j ' X
S ' 7' Td Q
i B
U VT
at the speed of maximum 20 m/s under the random waypoint model. As each simulation run lasts for 1000 seconds, at most 2000 events can be detected. Table 2 gives the comparison results under the rst conguration (square deployment). Under the assumption of negligible noises, each sensor can precisely estimate the distance from the target to itself based on the magnitude of its received signal strength. As shown in Table 2, the proposed approach incurs the minimum location error, the smallest latency, and the least amount of message exchange. The static clustering approach incurs the largest location error, as a CH that is not in the vicinity of the target may be responsible for estimating the location and reporting the event. Without the two-phase volunteering procedure, the rst partial version of the proposed algorithm incurs signicant collision. This is in part because once a solicitation packet is handed over to the MAC layer for transmission, it cannot be cancelled by the high-layer algorithm even if collision occurs. In the case that the solicitation packet contains both the signal strength and the signature, the chance for MAC level collision increases. This problem is notably mitigated in the second partial version. However, without carefully setting the backoff timer values, the second partial version still incurs heavy message overhead. In contrast, the full-edged version incurs the least collision and the least amount of message exchange, the former due to the two-phase CH volunteering procedure, and the latter due to the use of Voronoi diagram to properly determine the backoff timer values. In the next set of simulations, we investigate the impact of noise on the performance of the proposed algorithm. The noise for each sensor, in Eq. (1), is the product of noise magnitude and additive Gaussian distribution . Fig. 5(a) gives the average location error and latency under different magnitudes of noise. The noise with magnitude 40 is approximately equivalent to SNR = 10. The proposed algorithm performs much better than the static clustering algorithm. This is partially because the proposed algorithm has gured in the effect of possible errors on measurements and can tolerate certain levels of noise. Next, we investigate the effect of the moving speed of the target on the performance (with the noise magnitude xed at 40). As shown in Fig. 5(b), even though the performance of the proposed algorithm degrades as the moving speed of the target increases, it is still the most robust algorithm as compared to other three approaches. Finally we investigate the performance of the proposed algorithm under the assumption that both CHs and sensors are uniformly distributed within the detection range in the area. Fig. 6(a) gives the results of the full-edged and partial versions of the proposed algorithm under nine deployment congurations with noise = 40 and maximum speed = 20 (m/s). The full-edged version of the proposed approach outperforms two other partial versions, although its performance also degrades. This is due to the fact that as CHs are
$ a
not deployed uniformly, under certain cases none of the CHs detects the event. Another interesting observation is that the gap between the rst and second partial versions is signicant. This demonstrates the usefulness of the two phase CH volunteering procedure. Fig. 6(b) gives the average performance under the nine deployment congurations as the moving speed of the target varies. The result exhibits similar trends to that under square deployment. VI. C ONCLUSIONS In the paper, we devise and evaluate a fully decentralized, light-weight, dynamic clustering algorithm for target tracking. We envision a hierarchical sensor network that is composed of (a) a static backbone of sparsely placed CHs that assume the role of leaders upon triggered by certain signal events; and (b) moderately to densely populated low-end sensors whose function is to provide sensor information to CHs upon request. A cluster is formed and a CH becomes active, when the acoustic signal strength detected by the CH exceeds a pre-determined threshold. The active CH then broadcasts an information solicitation packet, asking sensors in its vicinity to join the cluster and provide their sensor information. We address and devise solution approaches to the issues (I1)(I4) as outlined in Section 1. Through both probabilistic analysis and ns-2 simulation, we show with the use of Voronoi diagram, the CH that is closest to the target is (implicitly) selected as the leader and and that the proposed dynamic clustering algorithm effectively eliminates contention among sensors and renders more accurate estimates of target locations. We have identied several research avenues. First we will engage in devising a more accurate localization method to deal with sensing errors and multiple tracking targets. Second, we will integrate dynamic clustering with information quality driven routing protocols. In conjunction with all the above research tasks, we are currently working on a prototype implementation on a lab testbed that consists of Berkeley motes integrated with PC 104 boards. R EFERENCES
[1] F. Aurenhammer, Voronoi Diagrams - A Survey Of A Fundamental Geometric Data Structure, ACM Computing Surveys 23, pp. 345- 405, 1991. [2] M. Chu, H. Haussecker and F. Zhao, Scalable Information-driven Sensor Querying and Routing for Ad Hoc Heterogeneous Sensor Networks, Intl J. High Performance Computing Applications, vol. 16, no. 3, Fall 2002. [3] J. Liu, J. Liu, J. Reich, P. Cheung, and F. Zhao, Distributed Group Management for Track Initiation and Maintenance in Target Localization Applications, Proc. 2nd Workshop on Information Processing in Sensor Networks (IPSN03), April 2003. [4] D. Li, K. Wong, Y. Hu and A. Sayeed, Detection, Classication, Tracking of Targets in Micro-sensor Networks, IEEE Signal Processing Magazine, pp. 17-29, March 2002 [5] X. Sheng, and Y-H Hu, Energy Based Acoustic Source Localization, Proc. of 2nd Workshop on Information Processing in Sensor Networks (IPSN03), April 2003.
"$
) q' $ X
avg err(m) static cluster 1st base-line 2nd base-line proposed algorithm 5.57 5.89 4.87 4.35
TABLE II
C OMPARISON BETWEEN
THE FULL - FLEDGED VERSION OF THE PROPOSED ALGORITHM , TWO PARTIAL VERSIONS OF THE PROPOSED ALGORITHM , AND THE STATIC CLUSTERING ALGORITHM UNDER SQUARE DEPLOYMENT AND THE ASSUMPTION THAT NOISE CAN BE IGNORED .
7 Proposed:error Proposed:delay 1st base-line:error 1st base-line:delay 2nd base-line:error 2nd base-line:delay static:error static:delay
0.7
8 Proposed:error Proposed:delay 1st base-line:error 1st base-line:delay 2nd base-line:error 2nd base-line:delay static:error static:delay
0.7
6.5
0.65 7 0.6
0.65
0.6
0.5
0.5 5
4.5
0.45
0.45
0.4 4
0.4
3.5
0.35
0.35
0.3 160
0.3
Fig. 5. Performance of the proposed algorithm under different magnitudes of noise ((a)) and different moving speeds of the target ((b)).
8 Avg. Error for 9 scenarios Avg. Delay for 9 scenarios 7.5 0.9 9 1 10 Proposed:error Proposed:delay 1st base-line:error 1st base-line:delay 2nd base-line:error 2nd base-line:delay 1
0.9
7 0.8 8 Avg. Error (m) 6.5 Avg. Error (m) Delay(sec.) 0.7 6 0.6 5.5 0.5 5 5 4.5 0.4
0.8
0.4
4 4 Proposed Approach 2nd base-line 1st base-line 0.3 20 25 30 Max. speed of the target(m/sec) 35 40
0.3
(a)
(b)
Fig. 6. Performance of the full-edged and partial versions of the proposed algorithm under nine different deployment congurations with noise = 40 and maximum speed = 20 ((a)) and with noise =40 and varying moving speeds.
[6] Q. Wang, W-P Chen, R. Zheng, K. Lee, and L. Sha, Acoustic Target Tracking Using Wireless Sensor Devices, Proc. of the 2nd Workshop on Information Processing in Sensor Networks (IPSN03), April 2003. [7] F. Ye, H. Luo, J. Cheng, S. Lu and L. Zhang, A Two-tier Data Dissemination Model for Large-scale Wireless Sensor Networks, ACM International Conference on Mobile Computing and Networking (Mobicom 2002), Atlanta, Georgia, September 2002. [8] F. Zhao, J. Shin and J. Reich, Information-Driven Dynamic Sensor Collaboration for Tracking Applications, IEEE Signal Processing Magazine, March 2002. [9] UCB, LBNL, VINT network simulator, http://wwwmash.cs.berkeley.edu/ns/. [10] UCLA, SensorSim : A Simulation Framework for Sensor Networks, http://nesl.ee.ucla.edu/projects/sensorsim/.
[11] C. Lin and M. Gerla, Adaptive Clustering for Mobile Wireless Networks, IEEE Journal of Selected Areas in Communications, Vol. 15, No.7, September 1997 [12] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, Energy-Efcient Communication Protocols for Wireless Microsensor Networks, Proc. Hawaaian Intl Conf. on Systems Science, January 2000 [13] P. Krishna, N. H. Vaidya, M. Chatterjee, D. K. Pradhan, A Cluster-Based Approach for Routing in Dynamic Networks, , ACM SIGCOMM Computer Communications Review, April 1997 [14] M.R. Pearlman and Z.J. Haas, Determining the Optimal Conguration for the Zone Routing Protocol, IEEE Journal on Selected Areas in Communications, Vol. 17, No. 8, August 1999, pages 1395-1414.