Wireless Sensor Network, 2011, 3, 73-81
doi:10.4236/wsn.2011.32008 Published Online February 2011 (http://www.SciRP.org/journal/wsn)
Copyright © 2011 SciRes. WSN
Compressing Information of Target Tracking in Wireless
Sensor Networks
Jianzhong Li, Qianqian Ren
Department of C omput er Science and Techn olo gy, Harbin Institute of Technology, Harbin , China
E-mail: {lijzh, qqren}@hit.edu.cn
Received January 21, 2011; February 15, 2011; February 22, 2011
Abstract
Target tracking is a well studied topic in wireless sensor networks. It is a procedure that nodes in the network
collaborate in detecting targets and transmitting their information to the base-station continuously, which
leads to data implosion and redundancy. To reduce traffic load of the network, a data compressing based
target tracking protocol is proposed in this work. It first incorporates a clustering based data gather method to
group sensor nodes into clusters. Then a novel threshold technique with bounded error is proposed to exploit
the spatial correlation of sensed data and compress the data in the same cluster. Finally, the compact data
presentations are transmitted to the base-station for targets localization. We evaluate our approach with a
comprehensive set of simulations. It can be concluded that the proposed method yields excellent perfor-
mance in energy savings and tracking quality.
Keywords: Wireless Sensor Networks, Target tracking, Compressing
1. Introduction
Target tracking is an important problem of wireless sen-
sor networks (WSNs). It has been applied in various areas
such as disaster predication, emergency response, battle-
field surveillance, home and office control, etc. Many
target tracking protocols have been proposed to support
long-term surveillance by using large scale WSNs [1-5].
In the applications of target tracking with WSNs, the
users are often interested in observing where the target is
at each time interval and figuring its trajectory. In such
cases, continuous information reporting of the target is
required. In continuous surveillance, sensor nodes in the
network collaborate in detecting the target, measuring
the signal the target emitting and transmitting measure-
ments to the base-station for further processing. However,
the limits of WSNs including limited bandwidth, pro-
cessing capabilities and energy supply challenge the re-
search of target tracking.
To minimize the volume of information transmission,
we can process the information of targets in a distributed
way in the network and transmit localization results to
the base-station. In-network localization is an effective
idea to reduce the volume of transmitted data, but is ra-
ther infeasible for multiple targets tracking that need
high complexity computation, such as Kalman filter,
Particle filter and Bayesian transforms in targets decom-
position. The limited computation capacity of sensor
nodes may not be sufficient to perform complex opera-
tions at nodes.
Considering the scenarios of target tracking, sensor
nodes generate sensed data of targets by measuring the
signal they emit. Most physical signals decay with dis-
tance, thus readings of the sensor nodes have similar
pattern if their distances to a target are approximately
same. In other words, sensed data for targets usually ex-
hibits a large deg ree of redundancy. App roximation is an
efficient mean of data reduction, in which sensed data
with similar patterns is replaced by an approximate value,
and only the approximate values are transmitted to the
base-station. Approximation can reduce the amount of
sensed data that need to be transmitted with allowable
accuracy scarifying.
In this paper, we present a data compressing based
target tracking protocol, which incorporates data ap-
proximation algorithm in the procedure of targets track-
ing. The characteristic of sensed data over sensor nodes
surrounding interested targets is exploited, replaced as a
series of approximate values. Compact descriptions of
these readings are transmitted to the base-station, where
targets location is implemented on the compact descrip-
tions directly. Given an error bound, we try to compress
J. Z. LI ET AL.
Copyright © 2011 SciRes. WSN
74
readings for the same target maximally by grouping the
original data and approximating them falls within the
error bound around estimated values. The proposed ap-
proach can release the traffic load and reduce energy
consumption for data transmission efficiently. However,
this often comes at the price of loss in tracking quality,
which is equivalent to a lo ss in data precision and locali-
zation accuracy. We analyze the error of tracking results
and discuss the determinations of parameters in the paper.
In addition, the proposed compressing provides a low
overhead, which makes it practical for overh ead sens itive
applications with WSNs.
The contributions of this paper are as follows:
We introduce a new approximation scheme that
makes full use of correlations among data of mul-
tiple sensor nodes. It exploits the spatial co rrelation
of targets information to implement data reduction.
We incorporate the idea of data reduction into tar-
get tracking, which shrinks the volume of trans-
mitted data efficiently with guarantee of tracking
quality. It is an efficient solution for prolonged
network lifetime.
We explore the trade-off between energy savings
and tracking quality. We aim to design a tracking
system in an energy-efficient manner at the price of
allowable accuracy sacrificing.
We provide an extensive experiments and analysis
of our framework using a simulated sensor network.
Experimental results show that our approach achie-
ves well performance in terms of tracking quality
and energy conservation.
The remainder of this paper is organized as follows.
Related work is shown in Section 2. We give the network
model in Section 3. A data compressing based tracking
protocol is detailed in Section 4. We analyze the perfor-
mance of proposed technique in Section 5. Section 6
presents detailed simulations. Finally, we conclude this
paper in Section 7.
2. Related Work
In recent years, many research works have been provided
in the area of target tracking using WSNs. The important
issues studied mainly include energy efficient tracking
and accurate tracking.
The authors in [6-9] adopt binary sensor model to
track targets. The output of each binary sensor is only
one bit (0 or 1). The binary sensor nodes based tracking
can conserve the energy for data transmissions efficiently.
However, this kind of nodes does not have the capacity
of calculation, and any loss of packets may affect the
tracking accuracy evidently. Some works address the
problem of energy efficiency by reducing the number of
nodes participating in working. In [10], a distributed
tracking algorithm using dynamic conveying tree struc-
ture is presented, which optimizes the problem of target
tracking by building a convoy tree sequence with high
tree coverage and low energy consumption. The work of
[11] proposes an information-driven tracking approach
by deciding the collaboration of sensor nodes consider-
ing the constraints of information and resource consump-
tion.
The authors in [2] propo se a minimal contour-track ing
model to minimize the number of nodes involved in
tracking. It searches for the minimal tracking area based
on the vehicular kinematics to minimize working nodes.
In [12], the problem of tracking mobile nodes is ad-
dressed by measuring the Doppler shifts of the transmit-
ted signal. Moreover, the extended Kalman filter is
adopted to remove the effects of the measurement errors
in sensor networks with uncertainty. The distributed al-
gorithms for in-network tracking and range queries are
proposed in [13], they use differential one-form in the
application of target tracking to search for a given id enti-
fiable target with low time complexity. The proposed
approaches are also flexible to network changes and
node mobility.
The above tracking techniques focus on reducing
transmission amounts or the number of nodes participat-
ing in work.
To further reduce energy consumption in the long-
term surveillance, nodes scheduling is app lied in moving
target tracking systems [4,14,15]. A real-time target
tracking system with WSNs is designed in [3,4], which
adopts an energy management scheme to make sensor
nodes rotate in active and sleep state to conserve energy
of the network. Moreover, some scheduling and wake-up
topics are analyzed. In [14], an optimal node sleep sche-
duling protocol for rare-event detection is proposed. A
deterministically rotating sensory coverage with con-
strains of detection delay is developed. The authors of
[15] study the problem of network deployment and de-
sign an efficient scheduling protocol. It wakes up and
shuts down sensor nodes with certain spatial and tem-
poral preciseness.
These existing techniques mainly focus on the tracking
and searching of a single target, it is not adaptable to
multiple targets tracking. The authors of [2] study fault
tolerant tracking. The Gaussian mixture model is intro-
duced to capture the characteristics of the target signal.
In addition, a temporally adaptive variant of the approach
is proposed to track dynamic multiple targets under
changing environments, with noisy considering. While
the focus of [2] is accurately tracking moving targets
with noise considering. In this paper, we propose a real
time target tracking protocol with energy savings and
J. Z. LI ET AL.
Copyright © 2011 SciRes. WSN
75
tracking quality guarantee. We seek to exploit the re-
dundancy of tracking information, compress the sensed
data, and transmit the compressed data to the based-station.
Our method not only reduces data transmission to the
base-station, but also implements localization in com-
pressed data structure directly.
3. Network Model
This section describes the network model used in this
paper. To simplify the presentation, we give the network
model based on following assumptions.
A monitored area is covered by a large number of
homogeneous sensor nodes with redundant density.
Each node gets its own location via GPS or a cer-
tain localization technique.
All sensor nodes in the monitoring area have the
same sensing range, denoted as R. The sensing are a
of each sensor node is a disk centered at the node
with radius R.
Nodes in the network are organized as an adaptive
clustering hierarchy [16]. Under the clustering
based routing protocol, sensed data is routed to the
destination.
Figure 1 gives an example of the network model.
There are one cluster head node and multiple member
nodes in each cluster. When a member node detects the
target, it transmits sensed data to its cluster head. The
cluster head node processes packets from its member
nodes to obtain a compact data structure, which is trans-
mitted the base-station.
4. Compressing Based Target Tracking
Protocol
In this section , we first illustra te the general fra mework of
data compressing based target tracking protocol (DCTTP),
then present its working pro c edure in details.
4.1. General Framework of DCTTP
Target tracking is a procedure that nodes in the network
collaborating in detecting and locating the given targets.
When targets show up in a local area, nodes surrounding
them (targets are insider their sensing range) detect the
targets via measuring the signal they emit, generate
sensed data and send it to cluster head nodes. After re-
ceiving packets from member nodes, the cluster heads
suppress these data maximally with guarantee of tracking
quality, and then transmit a compact data description to
the based station for further processing to locate targets.
DCTTP can be divided into four phases: 1) data collec-
tion, 2) data compressing, 3) data transmission and 4)
Figure 1. An example of the network model.
targets localization.
4.2. Data Collection
Sensor nodes in the network are organized as a hierarchy
of clusters. The entire network is divided into multiple
clusters, and there are one cluster head node and multiple
member nodes in each cluster. Each cluster head keeps a
list of its member nodes. As soon as a targ et appears in a
local area, all nodes receive the signal emitted by the
target generate sensed data, then transmit it to their clus-
ter head nodes, respectively.
When a cluster head receives the packet from a mem-
ber node, it fires a waiting timer Tw. Before reporting
sensed data to the base-station, it waits for Tw time to
collect packets from member nodes that have sent mes-
sages to it. This timer scheme can release packets lost
resulted by data collision in a certain degree. A larg er Tw
would allow larger latency in collecting sensed data and
obtaining tracking results for the base-station. On the
other hand, a larger Tw gives the cluster heads more
chances to collect enough data to locate targets with cer-
tain precision. Thus, the trade-off exists between tracking
latency and precision. We thus allow applications to set
an upper bound for this delay. In other words, applica-
tions can choose the trade-off adaptively.
After Tw time, cluster heads begin to process data re-
ceived from mem ber no des.
4.3. Data Compressing
We assumed that a cluster head has m members, which
have been sorted as node id ascending in member list
stored over the cluster head and base-station, respective-
ly. The data received from member nodes is represented
J. Z. LI ET AL.
Copyright © 2011 SciRes. WSN
76
as




11
,,,,,,,
jj mm
NXn XnXnX , where nj
is the node id and j is the serial number of node nj in
member list,
1,jm. Xj is a d-dimensional vector

1,,,,
j
kj dj
x
xx , where d is the number of targets in
the monitoring area and xkj is the reading of target k,
1,kd. If the cluster head does not receive data of
target k from node nj, it sets 1
kj
x.
The cluster head compresses data from its member
nodes as a compact structure with three entries:
mean: it defines the mean value of data from all
member nodes.
bitmap: it is a map indicating if the sensed data of a
sensor node can be approximated to mean within a
given compressing error bound
. The ith bit (i =
1, 2,) is used to indicate if the data from ith node
can be approximated by mean. If it is, set the value
of bit i 1, else keep it as 0. For example, a cluster
has four member nodes and their sensed data is 30,
32, 30, 34. Their expected value (mean) is 31.5. If
the given compressing error is 2, then bitmap is 1
(0001 in binary). As the first three data falls with
around mean, they can be replaced by mean,
and the last value falls outside
of mean, the 4th
bit of bitmap is updated to 1.
variance: it is an active array to store the variance
of data when it falls more than the specified error
constraint
away from mean.
After time Tw, the cluster head initializes bitmap as 0.
To simplify the presentation, we use b1b2bm to
represent the bits of bitmap, where bi{0,1}, it is the
value of ith bit of bitmap.
Since the compressing mechanism is applied indepen-
dently for each target, we only consider the sensed data
of target k for simplicity. First, the expected value of all
data in NX is computed, and then the cluster head vali-
dates whether the data in NX can be replaced by mean
with guarantee of compressing error. For each data k
j
x
,
if it is –1, it means that the data of node nj is not received,
then set bi 1 and write 0 to variance. Otherwise, its va-
riance of mean 2
kj
is calculated. If 2
kj
, the cluster
head replaces k
j
x
by mean. Otherwise, set bi 1 and write
kj
to variance sequentially. We observe that the num-
ber of 1 in bitmap shows the number the values have
been written to variance.
Algorithm 1 describes the compressing algorithm. The
cluster head computes the expected value of all received
data for the same target and assigns it to mean. For each
data kj
x
, if it is within
of mean, then it can be fil-
tered out. Otherwise, the jth bit of bitmap is set 1,
meanwhile the variance of k
j
x
and
is written to va-
riance [getIndex (j)]. getIndex() is a function returns the
corresponding subscript of kj
in variance by counting
the number of 1 in b1bm.
Algorithm 1: Compressing algorithm
Input: 1) the set of data NX = {(n1, X1),…, (nj, Xj),…, (nm, Xm)}
2) compressing error bound
Output: a compact data description
//initialization
1: set bitmap = 0
2: computer mea n of all received data
//main loop
3: for each data k
j
x
in NX
4: if (kj
x
== -1)
5: set bj to 1
6: append 0 to variance[ getInd e x(j)]
7: else
8: compute its variance of mean 2
kj
9: if (2
kj
)
10: set bi to 1
11: append kj
to variance[getIndex(j)]
12: end if
13: end if
14: end for
15: return a compact structure <mean, bitmap, variance>
Now, we analyze the complexity of Algorithm 1. As
the time complexity of function getIndex() is decided by
the order of k
j
x
in NX. For the best case, it runs in O(1)
time, while for the worst case, it runs in O(m), thus the
average time complexity of function getIndex() is O(m/2).
In Algorithm 1, computing the expected value of all re-
ceived data requires O(m) time, and sentences 3 to 14 run
in O(m/2 + m × m/2) time, so the time complexity of the
algorithm is O(m2/4) .
4.4. Data Transmission
After processing all packets from member nodes, the
cluster head obtains a series of compact representation of
sensed data for each target, which are transmitted to the
base station.
4.5. Targets Localization
When the base-station has received the compressed data
from a cluster head, it begins to locate targets. Most ex-
isting localizations algorithms can be incorporated with
our protocol. Without generality, we adopt Centroid lo-
calization algorithm, which is attractive for its simplicity.
Centroid localization algorithm computes the average
location of all sensor nodes detecting the target as the
location of the target. While its quality may be not good
enough as it assigns equal weight to each node without
considering its distance to the target. Instead of treating
all nodes equally, we compute the weighted average of
J. Z. LI ET AL.
Copyright © 2011 SciRes. WSN
77
participant nodes’ locations. Sensor nodes are weighted
under its distance from the target. Thus, a sensor close to
the target will be assigned a higher value.
Upon receiving a compact data description Gk, target
localization is implemented to locate target k. As the
base-station keeps the member list of each cluster, we
can scan Gk.bitmap to identify if a node in the list has
contributed sensed data of target k, moreover if its value
has been replaced by Gk.mean.
Algorithm 2 presents the algorithm of targets localiza-
tion on Gk, the algorithm is implemented on the com-
pressed data directly. F(.) is a function converting the
signal strength a sensor samples into the distance be-
tween the sensor and moving target emitting signal. We
use

1
d
i
F
x to denote the weight of node ni, where xi is
the sensed data generated by ni, exponent d is typically
set as 1. Algorithm 2 runs in O(m) time.
Algorithm 2. Target localization algor ithm
Input: 1) the member list N = {n1, n2,…} 2) Gk
Output: (xk, yk)
//initialization
1: set count = 0, index = -1, w = 0, xk = 0, yk = 0
//main loop
2: for each node nj in member list
scan Gk.bitmap
3: if ith bit of Gk.bitmap is 0
4: count++
5:

.
.
id
kk
k
nx
xx
F
Gmean

7:

.
.
id
kk
k
ny
yy
F
Gmean

//( ni.x, ni.y) is the location coordinate of ni
8:

1
.d
k
ww
F
Gmean

9: else
10: index++
11: if variance[index]!=0
12:


.
.var
id
kk
k
nx
xxFmeaGance index

13:


.
.var
id
kk
k
ny
yy
F
meaGance index

14:


1
.vard
k
ww
F
meaGance index

15: end if
end if
16: end for
17: output (,
kk
x
y
ww
)
5. Analysis of DCTTP
In this section, we analyze the characteristic of DCTTP,
and further discuss the trade-off between tracking quality
and energy conservation.
We first define two metrics to measure the perfor-
mance of DCTTP.
Definition 1 (Compressing error): Compressing error
is the error between the real sample and its estimated
value.
Definition 2 (Compression ratio): Compression ratio
is the size of compact data description over the size of
original data.
Let
denote the density of the network. As sensor
nodes are uniformly and independently distributed in the
sensing area, the number of sensor nodes located in any
subarea s, denoted as N(s), follows Possion distribution
with mean of
s
, where



!
i
s
si
PNsi e
 (1)
When a moving target shows up in a local area, only
nodes of which sensing disk cover the target generate
sensed data. These nodes locate in the disk centered at
the location of the moving target with radius R, then the
number of nodes that can detect the target can be
represented as:



2
2!
i
R
Ri
PNsi e


 (2)
Thus, the number of nodes that can detect the target is
2
PNsiR


.
Definition 3 (Detecting area): Detecting area is a local
area, nodes in which can detect the target. It is a disk
centered at the target with radius R.
Definition 4 (Dividing disk) Dividing disk is a disk
centered at the target with radius r, denoted as DDr.
shortly.
Definition 5 (Detecting cirque) Detecting cirque is a
subarea formed by dividing disk

1i
DD
excluding
dividing disk i
DD
, denoted as

1ii
DC .
According to the design of DCTTP, only the sensed
data that fluctuates over their expected value can be re-
placed by mean. We divide the detecting area into a sub-
set of areas by a serial of dividing disks with radius
,2 ,,R

, respectively, as shown in Figure 2.
Nodes in the same subarea trend to have similar sensed
data, that’s most of them fluctuate over their expected
values, compressing these data together can obtain better
compressing ratio.
In the area of

1ii
DC  , there are
2
21iR
 
J. Z. LI ET AL.
Copyright © 2011 SciRes. WSN
78
Figure 2. The figure of the sensing area division.
member nodes. Assume that a units are needed to
represent the sensed data and node id, thus, a cluster
head node need transmit

2
221aiR
 
units data to
report the readings of one target. While with DCTTP, the
cluster head transmits a compact data description of

22
21 121aiRpiRa
  
 
units, where
p is the percentage of the filtered data and
 
2
121piR
 
 is the number of values written to
variance. a units are used to represent mean and

2
21iR
 
units are used to represent bitmap, re-
spectively.
The compression ratio of data in

1ii
DC  , denoted
as

1ii
CR can be defined as:



22
12
21 121
221
ii
aiRpiRa
CR aiR
  
 

 
(3)
Setting a = 64, then we have:


12
11 16
64 21
ii
p
CR iR
 

  (4)
Thus, the compression ratio of data in the whole de-
tecting area is:


2
1
2
11 16
64 21
16ln
33 32
64 1
R
whole i
p
CR iR
R
pR
R
 
 










 



(5)
In formula (5), parameters R and p are fixed wh en the
network is being deployed. It is clearly that
and p are
two key factors decide the compressing ratio, further
energy conservation of the network.
In theory, sensed data of nodes in the same detecting
cirque can be replaced by their expected value with va-
riances less than
However, measurement errors and
data noisy make var iances of pa rts data be yond
, these
data has to be stored into the item variance of the com-
pact structures.
As the measurement error and data noisy at a certain
node usually follow Gaussian distribution [17]. As p is
decided by the distribution of data and
, thus com-
pressing ratio is in inverse proportion to the given com-
pressing error bound
. That’s energy conservation is at
the cost of data quality sacrificing. We can choose ap-
propriate compressing error according to the moving
mode of targets and experiences to obtain optimal per-
formance of the system.
6. Experiments and Evaluation
In this section, we report our simulation results under
two scenarios: with data noisy and without noisy. In each
case, we report the performance of tracking quality and
energy conservation and our analysis.
In the simulations, sensors nodes are deployed in a re-
gion of 1000 × 1000 unit field. The locations of nodes
are known. All sensor nodes have the same sensing ra-
dius. Three electronic cars are simulated as the targets,
which move along any velocity. For the case with noisy,
we set the mean and variance of Gaussian noise at each
sensor node to 1.
We first define two metrics to measure the perfor-
mance of DCTTP in terms of tracking quality and energy
conservation, that’s tracking error and energy savings
ratio.
Tracking error: It is the average distance between the
real trace of the moving target and its estimated trace.
Energy savings ratio: It is defined as the ratio of
energy savings of DCTTP over the normal tracking sys-
tem without energy conservation mechanisms.
In each scenario, we explore the impact of some key
system configurations on the system performance, such
as network density, sensing range and compressing error.
6.1. Tracking Error
Figure 3 shows the results of tracking error for varying
network density. Fixing sensing range and compressing
error, the numb er of sensor nodes is ranging from 100 to
1000, and the corresponding density varies from 104 to
103. As the increasing of network density, tracking error
decreases obviously. This is because when the network
density is higher, there are more sensor nodes participat-
ing in locating the targets, which generates more sensed
data to be involved in locating multiple targets. The in-
fluence of network density on data with noisy consider-
ing is more serious. As more sensed data helps to fix the
J. Z. LI ET AL.
Copyright © 2011 SciRes. WSN
79
error of data, which contributes to data that are more
precise.
Figure 4 shows the influence of sensing range on
tracking error. We observe that sensing range is one of
key factors that influence tracking quality. As the raising
of sensing range, more sensor nodes can detect the tar-
gets, which provides better tracking performance. It is
observed that tracking error decrease slightly as the in-
crease of compressing error, especially for data with
noisy. From the results, we can conclude that: 1) com-
pressing data does not bring obvious tracking error; 2) our
compressing technique can efficient alleviate the impact
of data noisy on tracking quality.
Figure 5 presents the influence of compressing ratio
on tracking error. It is clear that tracking error is in in-
verse proportion to compressing ratio, while when com-
pressing ratio reaches 50%, the change of tracking error
approaches to constant.
Figure 3. Impact of network density on tracking error.
Figure 4. Impact of sensing range on tracking error.
Figure 5. Impact of compressing ratio on tracking error.
6.2. Energy Savings Ratio
Figure 6 depicts the impact of network density on ener-
gy savings. Clearly, applying data compressing algo-
rithm conserves much energy. As the increase of network
density, energy savings enhances significantly. For in-
creasing network density leads to more sensed data to be
compressed, more energy of packets transmission is
saved.
From Figure 7, we observe that energy saving increases
monotonically with the raise of sensing range. The rea-
son is that the increase of sensing range leads to more
sensor nodes detecting the target, and more information
transmitted to the base station, thus, the advantage of
data compressing is more remarkable.
Figure 8 plots the influence of compressing ratio on
energy savings. It is shown that the degree of data com-
pressing also has influences on energy savings, especially
Figure 6. Impact of network density on energ y s a v i n g rati o .
J. Z. LI ET AL.
Copyright © 2011 SciRes. WSN
80
Figure 7. Impact of sensing range on energy savings ratio.
Figure 8. Impact of compressing ratio on energy savings
ratio.
for data with noisy.
7. Conclusions
In this paper, we concentrate on energy efficient tracking,
dedicated to conserve the whole network energy, as well
as maintain high tracking quality. We have proposed a
data compressing scheme to reduce information trans-
mission of targets. In addition, we incorporate the pro-
posed data compressing technique with tracking protocol
and optimize it to obtain trade-off between energy con-
servation and tracking quality.
We implement a set of simulations to validate our ap-
proach. The results demonstrate the effectiveness of
proposed protocol and illustrate influences of several
parameters on the system. As our future work, we will
implement our tracking algorithm on real sensor nodes.
8. Acknowledgements
This work is partially supported by the NSFC-RGC of
China under Grant No.60831160525, the Key Program
of the National Natural Science Foundation of China
under Gran t No. 61033015, th e National Natural Science
Foundation of China under Grant No. 60933001, the
National Natural Science Foundation of China under
Grant No. 60703012, the Natural Science Foundation of
Heilongjiang Province of China under Grant No. F201038
and the Science and Technology Innovation Research
Project of Harbin for Young Scholar under Grant No.
2009RFQX080.
9. References
[1] Q. Ren, J. Li and H. Gao, “Tpss: A Two-Phase Sleep
Scheduling Protocol for Object Tracking in Sensor Net-
works,” Proceedings of 6th IEEE International Confe-
rence on Mobile Ad-hoc and Sensor Systems, Macao,
2009, pp. 458-465.
[2] Z. Zhong, T. Zhu, D. Wang and T. He, “Tracking with
Unreliable Node Sequences,” INFOCOM, Rio de Janeiro,
19-25 April 2009, pp.1215-1223 .
[3] J. Jeong, T. Hwang, T. He and D. Du, “MCTA: Target
Tracking Algorithm Based on Minimal Contour in Wire-
less Sensor Networks,” Proceedings of 26th Conference
on Computer Communications, Anchorage, 6-12 May
2007, pp. 2371-2375.
[4] T. He, P. A. Vicaire, T. Yan, L. Luo, L. Gu, G. Zhou, R.
Stoleru, Q. Cao, J. A. Stankovic and T. Abdelzaher,
“Achieving Real-Time Target Tracking Using Wireless
Sensor Networks,” ACM Transaction on Embedded
Computing System, 2007.
[5] T. He, P. Vicaire, T. Yan, Q. Cao, G. Zhou, L. Gu, L.
Luo, R. Stoleru, J. A. Stankovic and T. Abdelzaher,
“Achieving Long-Term Surveillance in VigilNet,” Pro-
ceedings of 25th Conference on Computer Communica-
tions, Barcelona, April 2006, pp. 1-12.
[6] N. Shrivastava, R. Mudumbai, U. Madhow and S. Suri,
“Target Tracking with Binary Proximity Sensors: Fun-
damental Limits, Minimal Description, and Algorith,”
ACM Sensys, November 2006.
[7] W. Kim, K. Mechitov, J.-Y. Choi and S. K. Ham, “On
Tracking Objects with Binary Proximity Sensors,” Pro-
ceedings of 4th International Conference on Information
Processing in Sensor Networks, A pr il 2005.
[8] J. Singh, U. Madhow, R. Kumar, S. Suri and R. Cagley,
“Tracking Multiple Targets Using Binary Proximity
Sensors,” Proceedings of 6th International Conference on
Information Processing in Sensor Networks, April 2007.
doi:10.1145/1236360.1236427
[9] Z. J. Wang, E. Bulut, B. K. Szymansky, “Distributed
Energy-Efficient Target Tracking with Binary Sensor
Networks,” ACM Transactions on Sensor Networks, Vol.
6, No. 4, July 2010. doi:10.1145/1777406.1777411
J. Z. LI ET AL.
Copyright © 2011 SciRes. WSN
81
[10] W. S. Zhang and G. H. Cao, “DCTC: Dynamic Convey
Tree-based Collaboration for Target Tracking in Sensor
Networks,” IEEE Transactions on Wireless Communica-
tion, Vol. 3, No. 5, September 2004, pp. 1689-1701. doi:
10.1109/TWC.2004.833443
[11] F. Zhao, J. Shin and J. Reich, “Information-driven Dy-
namic Sensor Collaboration for Tracking Applications,”
IEEE Signal Processing Magazine, Vol. 19, No. 2, March
2002, pp. 61-72. doi:10.1109/79.985685
[12] B. Kusy, A. Ledeczi and X. Koutsoukos, “Tracking Mo-
bile Nodes Using RF Doppler Shifts,” Proceedings of 5th
International Conference on Embedded Networked Sen-
sor Systems, 2007, pp. 29-42. doi:10.1145/1322263.1322
267
[13] R. Sarkar and J. Gao, “Differential Forms for Target
Tracking and Aggregate Queries in Distributed Net-
works,” Proceedings of 11th ACM International Sympo-
sium on Mobile Ad hoc Networking and Computing, 2010,
pp. 377-388.
[14] Q. Cao, T. Abdelzaher, T. He and J. Stankovic, “Towards
Optimal Sleep Scheduling in Sensor Networks for
Rare-Event Detection,” Proceedings of the 4th Interna-
tional Symposium on Information Processing in Sensor
Networks, 15 April 2005, pp. 20-27.
[15] C. Gui and P. Mohapatra, “Power conservation and Qual-
ity of Surveillance in Target Tracking Sensor Networks,”
Proceedings of the International Conference on Mobile
Computing and Networking, 2004.
[16] W. Heinzelman, A. Chandrakasan and H. Balakrishnan,
“Energy-efficient Communication Protocol for Wireless
Micro-sensor Networks,” Proceedings of the 33rd Inter-
national Conference on System Sciences, Vol. 8, January
2000.
[17] G. Xing, R. Tan, B. Liu, J. Wang, X. Jia and C. W. Yi,
“Data Fusion Improves the Coverage of Wireless Sensor
Networks,” Proceedings of 15th Annual International
Conference on Mobile Computing and Networking, New
York, 2009, pp. 157-168. doi:10.1145/1614320.161 4338