RECOD: reliable detection protocol for large-scale and dynamic continuous objects in wireless sensor networks
- 63 Downloads
Whether individual objects such as enemy tanks or intruders have been reliably detected typically depends on the number of data reports successfully delivered to a sink node from the sensor nodes surrounding the object. When the number of data reports exceeds a required threshold, the sink recognizes the object that is detected by sensor nodes. Thus, previous studies exploited this framework for reliable detection as event reliability for individual objects, and proposed event-to-sink reliable-transport mechanisms that can reach a required threshold. Recently, in wireless sensor networks, research has focused on coverage detection for large-scale phenomena such as biochemical material and wild fires. Such phenomena are known as continuous objects because they generally cover wide areas and frequently change their shape as a result of wind or geographical features. Since continuous objects are large-scale and alterable, they present new challenges for the event reliability. In this paper, we first define new criteria for measuring the event reliability of large-scale phenomena. Then, we propose a novel event-to-sink transport protocol that is reliable, even when excessive data is generated from many sensor nodes detecting these phenomena. Analysis and simulation results demonstrate the event reliability of our protocol.
KeywordsWireless sensor networks Continuous objects Event reliability Reliable transport
This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science and ICT (NRF-2018R1D1A3B07042838).
- 4.Tezcan, N., Cayirci, E., & Caglayan, M. U. (2004). End-to-end reliable event transfer in wireless sensor networks. Proceedings IEEE Personal, Indoor and Mobile Radio Communications (PIMRC), 2, 989–994.Google Scholar
- 5.Dalvi, S., Sahoo, A., & Deo, A. (2009). A MAC-aware energy efficient reliable transport protocol for wireless sensor networks. In Proceedings IEEE wireless communications and networking conference (WCNC) (pp. 1–6).Google Scholar
- 6.Park, H., Lee, J., Oh, S., Yim, Y., Kim, S.-H., & Nam, K.-D. (2011). Quality-based event reliability protocol in wireless sensor networks. In Proceedings IEEE consumer communications and networking conference (CCNC) (pp. 730–734).Google Scholar
- 7.Ji, X., Zha, H., Metzner, J. J., & Kesidis, G. (2004). Dynamic cluster structure for object detection and tracking in wireless ad-hoc sensor networks. Proceedings IEEE International Conference on Communication (ICC), 7, 3807–3811.Google Scholar
- 8.Chang, W., Lin, H., & Cheng, Z. (2008). CODA: A continuous object detection and tracking algorithm for wireless ad hoc sensor networks. In Proceedings IEEE consumer communications and networking conference (CCNC) (pp. 168–174).Google Scholar
- 9.Zhong, C., & Worboys, M. (2007). Energy-efficient continuous boundary monitoring in sensor networks. Technical report, available https://www.researchgate.net/profile/Michael_Worboys2/publication/228876338_Energy-efficient_continuous_boundary_monitoring_in_sensor_networks/links/0deec5211eb577d816000000/Energy-efficient-continuous-boundary-monitoring-in-sensor-networks.pdf. Accessed 31 May 2019.
- 10.Zhong, C., & Worboys, M. (2008). Continuous contour mapping in sensor networks. In Proceedings IEEE consumer communications and networking conference (CCNC) (pp. 152–156).Google Scholar
- 11.Chen, J., & Matsumoto, M. (2009). EUCOW: Energy-efficient boundary monitoring for unsmoothed continuous objects in wireless sensor network. In Proceedings IEEE mobile ad hoc and sensor systems (MASS) (pp. 906–911).Google Scholar
- 14.Imran, S., Ercetin, O., & Ko, Y.-B. (2015). Continuous phenomena boundary detection and tracking in wireless sensor networks through optimized monitoring. In IEEE Pacific rim conference on communications, computers and signal processing (PACRIM) (pp. 402–406).Google Scholar
- 17.Karp, B., & Kung, H. (2000). GPSR: Greedy perimeter stateless routing for wireless networks. In Proceedings ACM international conference on mobile computing and networking (MobiCom).Google Scholar
- 20.He, T., Huang, C., Blum, B. M., Stankovic, J. A., & Abdelzaher, T. (2003). Range-free localization schemes for large scale sensor networks. In Proceedings ACM international symposium on mobile ad hoc networking and computing (MobiHoc) (pp. 81–95).Google Scholar
- 21.Shang, Y., Ruml, W., Zhang, Y., & Fromherz, M. P. J. (2003). Localization from mere connectivity. In Proceedings ACM international symposium on mobile ad hoc networking and computing (MobiHoc) (pp. 201–212).Google Scholar
- 24.Zhou, Z., Xiang, X., & Wang, X. (2006). An energy-efficient data-dissemination protocol in wireless sensor networks. In Proceedings IEEE international symposium on world of wireless, mobile and multimedia networks (WoWMoM).Google Scholar
- 29.Scalable Network Technologies, Qualnet, [online] available: http://www.scalable-networks.com. Accessed 31 May 2019.