Smart Sleeping Policies for Energy-Efficient Tracking in Sensor Networks

  • Jason A. Fuemmeler
  • Venugopal V. Veeravalli

Advances in technology are enabling the deployment of vast sensor networks through the mass production of cheap wireless sensor units with small batteries. Such sensor networks can be used in a variety of application areas - indeed any application where there are signals to be detected. Our focus in this chapter is on applications of sensor networks that involve tracking, e.g., surveillance, wildlife studies, environmental control, and health care. More specifically, due to the use of battery power in these networks we concern ourselves with energy efficiency in tracking applications.


Sensor Network Wireless Sensor Network Object Location Target Tracking Sleep Mode 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    H. Yang and B. Sikdar, “A protocol for tracking mobile targets using sensor networks,” Proc. IEEE Int. Workshop on Sensor Network Protocols and Applications, 2003, pp. 71-81.Google Scholar
  2. [2]
    C. Gui and P. Mohapatra, “Virtual patrol: a new power conservation de-sign for surveillance using sensor networks,” in IEEE/ACM Information Processing in Sensor Networks (IPSN) 2005, 2005.Google Scholar
  3. [3]
    X. Du and F. Lin, “Efficient energy management protocol for target tracking sensor networks,” International Symposium on Integrated Network Management, May 2005, pp. 45-58.Google Scholar
  4. [4]
    N. Vasanthi and S. Annadurai, “Energy saving schedule for target track-ing sensor networks to maximize the network lifetime,” in First Interna-tional Conference on Communication System Software and Middleware, Jan. 2006, pp. 1-8.Google Scholar
  5. [5]
    T. He et al., “Achieving real-time target tracking using wireless sen-sor networks,” Real-Time and Embedded Technology and Applications Symposium, Apr. 2006, pp. 37-48.Google Scholar
  6. [6]
    J. Liu, J. Reich, and F. Zhao, “Collaborative in-network processing for target tracking,” EURASIP Journal on Applied Signal Processing, Mar. 2003, pp. 378-391.Google Scholar
  7. [7]
    R. R. Brooks, P. Ramanathan, and A. M. Sayeed, “Distributed target classification and tracking in sensor networks,” Proc. of the IEEE, vol. 91, no. 8, Aug. 2003, pp. 1163-1171.CrossRefGoogle Scholar
  8. [8]
    R. Gupta and S. R. Das, “Tracking moving targets in a smart sensor net-work,” Proceedings of the 58th IEEE Vehicular Technology Conference, vol. 5, Oct. 2003, pp. 3035-3039.Google Scholar
  9. [9]
    S. Balasubramanian. “Distributed and collaborative tracking for energy-constrained ad-hoc wireless sensor networks,” in IEEE WCNC, vol. 3, Mar. 2004, pp. 1732-1737.Google Scholar
  10. [10]
    W. Zhang and G. Cao, “DCTC: Dynamic convoy tree-based collabora- tion for target tracking in sensor networks,” IEEE Trans. on Wireless Communications, vol. 3, no. 5, Sep. 2004, pp. 1689-1701.Google Scholar
  11. [11]
    B. S. Malhotra and A. A. Aravind, “Energy efficient on-site tracking of mobile target in wireless sensor network,” Intelligent Sensors, Sensor Networks and Information Processing Conference, Dec. 2004, pp. 43-48.Google Scholar
  12. [12]
    L. Yang et al., “A multi-modality framework for energy efficient tracking in large scale wireless sensor networks,” IEEE Conf. on Networking, Sensing and Control, Apr. 2006, pp. 916-921.Google Scholar
  13. [13]
    Y. Xu and W.-C. Lee, “DTTC: Delay-tolerant trajectory compression for object tracking sensor networks,” IEEE Conf. on Sensor Networks, Ubiquitous, and Trustworthy Computing, vol. 1, Jun. 2006, pp. 436-445.CrossRefGoogle Scholar
  14. [14]
    Y. He and E. K. P. Chong, “Sensor scheduling for target tracking in sensor networks,” IEEE Conf. on Decision and Control (CDC), vol. 1, Dec. 2004, pp. 743-748.Google Scholar
  15. [15]
    W.-L. Yeow, C.-K. Tham, W.-C. Wong, “A novel target movement model and energy efficient target tracking in sensor networks,” IEEE Vehicular Technology Conf., vol. 5, May 2005, pp. 2825-2829.Google Scholar
  16. [16]
    A. S. Chhetri, D. Morrell, and A. Papandreou-Suppappola, “Energy efficient target tracking in a sensor network using non-myopic sensor scheduling,” International Conf. on Information Fusion, vol. 1, Jul. 2005, pp. 558-565.CrossRefGoogle Scholar
  17. [17]
    J. L. Williams, J. W. Fisher III, and A. S. Willsky, “An approximate dynamic programming approach to a communication constrained sensor management problem,” IEEE Conf. on Information Fusion, vol. 1, Jul. 2005, pp. 582-589.CrossRefGoogle Scholar
  18. [18]
    W.-L. Yeow, C.-K. Tham, W.-C. Wong, “Energy efficient multiple target tracking in sensor networks,” IEEE Global Telecommunications Conf., vol. 1, Nov. 2005, pp. 168-172.CrossRefGoogle Scholar
  19. [19]
    W. Xiao et al., “Multi-step adaptive sensor scheduling for target tracking in wireless sensor networks,” IEEE ICASSP, vol. 4, May 2006, pp. 705-708.Google Scholar
  20. [20]
    S. Aeron, V. Saligrama, and D. A. Castañón, “Energy efficient policies for distributed target tracking in multihop sensor networks,” in IEEE Conf. on Decision and Control (CDC), Dec. 2006.Google Scholar
  21. [21]
    J. Fuemmeler and V.V. Veeravalli, “Smart Sleeping Policies for Energy Efficient Tracking in Sensor Networks,” to appear in IEEE Transactions on Signal Processing, 2007.Google Scholar
  22. [22]
    D. Bertsekas, Dynamic Programming and Optimal Control, Athena Scientific, Belmont MA, 2007.Google Scholar
  23. [23]
    D. Aberdeen, “A (revised) survey of approximate methods for solving POMDP’s,” Technical Report, Dec. 2003, http://users.rsise.anu.
  24. [24]
    R. Horn and C. Johnson, Matrix Analysis, Cambridge University Press, New York, 1985.MATHGoogle Scholar
  25. [25]
    J. Fuemmeler and V.V. Veeravalli, “Smart Sleeping Strategies for Lo- calization and Tracking in Sensor Networks,” Asilomar Conference on Signals, Systems, and Computers, Oct. 2006.Google Scholar
  26. [26]
    P. Auer, N. Cesa-Bianchi, Y. Freund, and R.E. Schapire, “Gambling in a rigged casino: The adversarial multi-armed bandit problem,” Proceeding of 36th Annual Symposium on Foundations of Computer Science (FOCS’95) p. 322, 1995.Google Scholar
  27. [27]
    J. Liu, M. Chu, and J.E. Reich, “Resource-Aware Multi-Target Tracking in Distributed Sensor Networks,” IEEE Signal Processing Magazine Spe-cial Issue on Resource-Constrained Signal Processing, Communications, and Networking, May 2007.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2008

Authors and Affiliations

  • Jason A. Fuemmeler
    • 1
  • Venugopal V. Veeravalli
    • 1
  1. 1.Department of Electrical and Computer Engineering, and the Coordinated Science LaboratoryUniversity of Illinois at Urbana-ChampaignUrbanaUSA

Personalised recommendations