Wireless Networks

, Volume 25, Issue 7, pp 4193–4213 | Cite as

RECOD: reliable detection protocol for large-scale and dynamic continuous objects in wireless sensor networks

  • Yongbin Yim
  • Soochang Park
  • Euisin LeeEmail author
  • Ki-Dong Nam
  • Cheonyong Kim
  • Sang-Ha Kim


Whether individual objects such as enemy tanks or intruders have been reliably detected typically depends on the number of data reports successfully delivered to a sink node from the sensor nodes surrounding the object. When the number of data reports exceeds a required threshold, the sink recognizes the object that is detected by sensor nodes. Thus, previous studies exploited this framework for reliable detection as event reliability for individual objects, and proposed event-to-sink reliable-transport mechanisms that can reach a required threshold. Recently, in wireless sensor networks, research has focused on coverage detection for large-scale phenomena such as biochemical material and wild fires. Such phenomena are known as continuous objects because they generally cover wide areas and frequently change their shape as a result of wind or geographical features. Since continuous objects are large-scale and alterable, they present new challenges for the event reliability. In this paper, we first define new criteria for measuring the event reliability of large-scale phenomena. Then, we propose a novel event-to-sink transport protocol that is reliable, even when excessive data is generated from many sensor nodes detecting these phenomena. Analysis and simulation results demonstrate the event reliability of our protocol.


Wireless sensor networks Continuous objects Event reliability Reliable transport 



This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science and ICT (NRF-2018R1D1A3B07042838).


  1. 1.
    Akyildiz, I. F., Weilian, S., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40, 102–114.CrossRefGoogle Scholar
  2. 2.
    Li, D., Wong, K. D., Hu, Y. H., & Sayeed, A. M. (2002). Detection, classification, and tracking of targets. IEEE Signal Processing Magazine, 19(2), 17–19.CrossRefGoogle Scholar
  3. 3.
    Akan, O. B., & Akyildiz, I. F. (2005). Event-to-sink reliable transport in wireless sensor networks. IEEE/ACM Transactions on Networking, 13(5), 1003–1016.CrossRefGoogle Scholar
  4. 4.
    Tezcan, N., Cayirci, E., & Caglayan, M. U. (2004). End-to-end reliable event transfer in wireless sensor networks. Proceedings IEEE Personal, Indoor and Mobile Radio Communications (PIMRC), 2, 989–994.Google Scholar
  5. 5.
    Dalvi, S., Sahoo, A., & Deo, A. (2009). A MAC-aware energy efficient reliable transport protocol for wireless sensor networks. In Proceedings IEEE wireless communications and networking conference (WCNC) (pp. 1–6).Google Scholar
  6. 6.
    Park, H., Lee, J., Oh, S., Yim, Y., Kim, S.-H., & Nam, K.-D. (2011). Quality-based event reliability protocol in wireless sensor networks. In Proceedings IEEE consumer communications and networking conference (CCNC) (pp. 730–734).Google Scholar
  7. 7.
    Ji, X., Zha, H., Metzner, J. J., & Kesidis, G. (2004). Dynamic cluster structure for object detection and tracking in wireless ad-hoc sensor networks. Proceedings IEEE International Conference on Communication (ICC), 7, 3807–3811.Google Scholar
  8. 8.
    Chang, W., Lin, H., & Cheng, Z. (2008). CODA: A continuous object detection and tracking algorithm for wireless ad hoc sensor networks. In Proceedings IEEE consumer communications and networking conference (CCNC) (pp. 168–174).Google Scholar
  9. 9.
  10. 10.
    Zhong, C., & Worboys, M. (2008). Continuous contour mapping in sensor networks. In Proceedings IEEE consumer communications and networking conference (CCNC) (pp. 152–156).Google Scholar
  11. 11.
    Chen, J., & Matsumoto, M. (2009). EUCOW: Energy-efficient boundary monitoring for unsmoothed continuous objects in wireless sensor network. In Proceedings IEEE mobile ad hoc and sensor systems (MASS) (pp. 906–911).Google Scholar
  12. 12.
    Park, S., Park, H., Lee, E., & Kim, S.-H. (2012). Reliable and flexible detection of large-scale phenomena on wireless sensor networks. IEEE Communications Letters, 16(6), 933–936.CrossRefGoogle Scholar
  13. 13.
    Kim, J., Kim, K., Chauhdary, S., Yang, W., & Park, M. (2008). DEMOCO: Energy-efficient detection and monitoring for continuous objects in wireless sensor networks. IEICE Transactions on Communications, E91–B(11), 3648–3656.CrossRefGoogle Scholar
  14. 14.
    Imran, S., Ercetin, O., & Ko, Y.-B. (2015). Continuous phenomena boundary detection and tracking in wireless sensor networks through optimized monitoring. In IEEE Pacific rim conference on communications, computers and signal processing (PACRIM) (pp. 402–406).Google Scholar
  15. 15.
    Manatakis, D. V., & Manolakos, E. S. (2015). Estimating the spatiotemporal evolution characteristics of diffusive hazards using wireless sensor networks. IEEE Transactions on Parallel and Distributed System, 26(9), 2444–2458.CrossRefGoogle Scholar
  16. 16.
    Han, G., Shen, J., Liu, L., Qian, A., & Shu, L. (2016). TGM-COT: Energy-efficient continuous object tracking scheme with two-layer grid model in wireless sensor networks. Personal and Ubiquitous Computing, 20(3), 349–359.CrossRefGoogle Scholar
  17. 17.
    Karp, B., & Kung, H. (2000). GPSR: Greedy perimeter stateless routing for wireless networks. In Proceedings ACM international conference on mobile computing and networking (MobiCom).Google Scholar
  18. 18.
    Stojmenovic, I. (2002). Position-based routing in ad hoc networks. IEEE Communications Magazine, 40(7), 128–134.CrossRefGoogle Scholar
  19. 19.
    Cadger, F., Curran, K., Santos, J., & Moffett, S. (2013). Survey of geographical routing in wireless ad-hoc networks. IEEE Communications Surveys and Tutorials, 15(2), 621–653.CrossRefGoogle Scholar
  20. 20.
    He, T., Huang, C., Blum, B. M., Stankovic, J. A., & Abdelzaher, T. (2003). Range-free localization schemes for large scale sensor networks. In Proceedings ACM international symposium on mobile ad hoc networking and computing (MobiHoc) (pp. 81–95).Google Scholar
  21. 21.
    Shang, Y., Ruml, W., Zhang, Y., & Fromherz, M. P. J. (2003). Localization from mere connectivity. In Proceedings ACM international symposium on mobile ad hoc networking and computing (MobiHoc) (pp. 201–212).Google Scholar
  22. 22.
    Sivrikaya, F., & Yener, B. (2004). Time synchronization in sensor networks: A survey. IEEE Network, 18(4), 45–50.CrossRefGoogle Scholar
  23. 23.
    Kim, D., & Cho, J. (2009). Active caching: A transmission method to guarantee desired communication reliability in wireless sensor networks. IEEE Communications Letters, 13(6), 378–380.CrossRefGoogle Scholar
  24. 24.
    Zhou, Z., Xiang, X., & Wang, X. (2006). An energy-efficient data-dissemination protocol in wireless sensor networks. In Proceedings IEEE international symposium on world of wireless, mobile and multimedia networks (WoWMoM).Google Scholar
  25. 25.
    Cormen, T. H., Leiserson, C. E., Rivest, R. L., & Stein, C. (2001). Introduction to algorithms. Cambridge: The MIT Press.zbMATHGoogle Scholar
  26. 26.
    Younis, O., Krunz, M., & Ramasubramanian, S. (2006). Node clustering in wireless sensor networks: Recent developments and deployment challenges. IEEE Network, 20, 20–25.CrossRefGoogle Scholar
  27. 27.
    Younis, O., & Fahmy, S. (2004). HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. IEEE Transactions on Mobile Computing, 3(4), 366–379.CrossRefGoogle Scholar
  28. 28.
    Yu, M., Leung, K., & Malvankar, A. (2007). A dynamic clustering and energy efficient routing technique for sensor networks. IEEE Transactions on Wireless Communications, 6(8), 3069–3079.CrossRefGoogle Scholar
  29. 29.
    Scalable Network Technologies, Qualnet, [online] available: Accessed 31 May 2019.
  30. 30.
    Hill, J., & Culler, D. (2002). Mica: A wireless platform for deeply embedded networks. IEEE Micro, 22(6), 12–24.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Computer EngineeringChungnam National UniversityDaejeonKorea
  2. 2.Department of Computer EngineeringChungbuk National UniversityCheongjuKorea
  3. 3.School of Information and Communication EngineeringChungbuk National UniversityCheongjuKorea
  4. 4.Electronics and Telecommunications Research Institute (ETRI)DaejeonKorea
  5. 5.Department of Electrical and Computer EngineeringUniversity of British ColumbiaVancouverCanada

Personalised recommendations