A Survey of Secure Target Tracking Algorithms for ... - IEEE Xplore

2 downloads 0 Views 682KB Size Report
Dec 14, 2010 - Technical Faculty. Bihac, Bosnia and Herzegovina osmanovic _ [email protected]. Abstract- Tracking a target as it moves in monitored area.
A Survey of Secure Target Tracking Algorithms for Wireless Sensor Networks Alma Oracevic

Suat Ozdemir

University ofBihac

Computer Engineering Department

Technical Faculty

Faculty of Engineering, Gazi University

Bihac, Bosnia and Herzegovina

Ankara, Turkey

[email protected]

[email protected]

Abstract- Tracking a target as it moves in monitored area

algorithms are also demanding applications considering the

has become an increasingly important application for wireless

scarce resources of sensor nodes. Traditional target tracking

sensor

networks

(WSNs).

Target

tracking

algorithms

algorithms are based on heavy and complex signal processing

continuously report the position of the target in terms of its

algorithms

coordinates to a sink node or a central base station. Due to the

traditional target tracking algorithms cannot be applied in

rapid

development

classification

of

classifications accuracy;

of

target

consider

other

WSNs,

there

tracking

scalability,

classification

is

no

algorithms. energy

standardized

Some

of

those

consumption

considers

network

and

topology,

position of target, mobility of target/object etc. In this paper, we have considered target tracking algorithms of WSNs from the security

point of view.

We have compared and discussed

problem of security in the most important target tracking algorithms for WSNs. To the best of our knowledge, this is the first study that analyses the target tracking algorithms in terms of security.

and

they

are

generally

centralized.

Hence,

WSNs due to their high resource requirements and limitations of sensor nodes such as limited power. Therefore, target tracking

algorithms

considering communication

of

WSNs

energy

should

conservation,

overload.

In

be

designed

bandwidth

addition,

as

target

by and

tracking

applications are generally used in mission critical applications, security is another important design issue to be considered. In mission critical applications, sensor nodes are deployed in hostile

areas

and

they

can

be

easily

captured

by

the

enemies/intruders. Such compromised nodes can be used to falsify the collected data and threaten the target tracking

Keywords-target tracking algorithms, classification of target tracking algorithms, survey, wireless sensor networks; security.

reliability. Although there are many papers that propose target tracking

algorithms

by

focusing

on

energy

conservation,

bandwidth and communication overload [5-10] there is a I.

INTRODUCTION

limited amount work considering secure target tracking in the

Specialization of the wireless ad-hoc mesh networks are wireless

sensor

characteristics organizing,

networks

(WSNs).

of ad-hoc mesh

self-healing,

WSNs

networks

wireless

and

inherit

all

like being self­

adaptive

networks.

WSNs are composed of large nwnber of inexpensive wireless sensor

nodes,

deployed

in

a

physical

environment

for

observation of an event of interest. Every node can not only communicate with its neighboring nodes, but also collect, process and store data/information. A sensor node is a very small device that represents the integral part of WSNs. These nodes are being produced at a very low cost and yet with high levels of sophistication in terms of computing power, energy consumption savings, and multipurpose functionalities. WSNs are usually deployed in a remote and hostile area, which is usually called the monitored region, for monitoring purposes. Sensor nodes behave as instrwnents capable of covering large areas

providing

detailed

information.

These

nodes

are

interconnected and are used together as a single monitoring and reporting device to acquire specific types of data as desired by the application requirements [1]. Most researchers consider target tracking as one of the important

applications

of

WSNs

[2-6].

Target

tracking

literature [11-l3]. In the literature, there are several survey papers [2-4] that classifies target tracking algorithms from different aspects but not from the security point of view [11-l3]. In this paper we also give the most important works in the target tracking area; however we make the classification based on the security services. To the best of our knowledge, this is the first paper that presents a survey for secure data target tracing in WSNs. We first analyze the existing target tracking algorithms not only from the resource conswnption aspects but also from the security point of view and demonstrate what security services they provide. We explain each algorithm under its category giving special attention to security. Finally, we provide the open research problems and future research directions in secure target tracking area. The rest of paper is organized as follows: In section II, our classification of target tracking algorithms is presented. In Section III, we compare each class of algorithms in detail focusing on security aspects. Section IV depicts the open research problems and future research directions in secure target tracking. We conclude the paper in Section V.

978-1-4799-3351-8/14/$31.00 ©2014 IEEE

needs more energy, so the main problem is maintaining the balance between energy efficiency and the number of active nodes. There is several activation methods used in the literature Tree Based



[4],[9], [16], [17],

Target Detection

(i) naIve activation (NA), (ii) (RA), (iii) selective activation (SA), (iv)

namely

randomized activation

duty-cycled activation (DA). Target

Activation Based Target

H

Detection in WSN

Detection

In naIve activation, all the nodes in network are active all

Cluster Based

t--f-+-+

the time; basically, nodes are in tracking mode until they are

Target Detection

, ,

out of energy (i.e., become dead) [9],[17]. In [16], the authors propose a new method to save energy. In terms security, naIve activation is the most secure target tracking method as all the

Hybrid Based

nodes are in tracking mode all the time and any misbehaving

Target



sensor node can be detected by the others. However, this

Detection

,

method's energy efficiency is very low, hence it is rarely used.

,

In random activation strategy, every node is active with

Fig. 1. Traditional classification of target tracking approaches

some possibility. The nodes that will be used in tracking are determined

II.

CLASSIFICA nON OF TARGET TRACKING ALGORITHMS

Most of the target tracking methods used in the literature can fmd itself a place in the classification presented in Fig. 1. Similar classifications can be found in other survey papers

by

randomly

[9].

This

type

of activation

is

vulnerable, if one of the sensors is compromised and makes itself target tracking node by playing with its random method. In this case, the compromised node can send false target information to the base station.

[2],[3], [4]. In this paper, we use the classification given in

Selective activation based on prediction (SA) is activation

Fig.l by considering the security issues in target tracking task.

based algorithm that predicts next possible position of target

Our new classification is given in Fig. 2.

and by that prediction choose which group of nodes should be in tracking mode. In this strategy, chosen nodes are the ones that are closest to the next predicted position of the target. Nodes which are not in tracking mode are in communication mode

Tree Based Target Detection

[9],[16], [17]. Similar to random activation strategy,

compromised nodes can tamper with the prediction algorithm �

to falsify the target tracking process.

� �

I-

Target

Activation Based Target Detection

+--

Cluster Based

Detection in

Target

WSN

Detection

Duty-cycled activation (DA) is a kind of activation based



algorithm that turns on and off whole sensor network in

� ." w

.li

certain periods of time. It can be used jointly with any other



activation strategy. Security treat in this activation based

i Hybrid Based



algorithm is to prevent the distribution of the on/off command

Z

in WSN. In this case,

Target Detection

WSN can stay in off condition

(completely or partially) and intruders may take advantage of the off WSN regions.

Fig. 2. Classification of target tracking considering security.

In section, we analyze several important target tracking

B.

Tree based target tracking

algorithms in the literature by following the classification in

Tree-based methods organize the network into a tree

Fig. 2. As for the security analysis, we specifically look for if

topology so that data can be collected efficiently. In these

the target tracking algorithm supports

(i)

data confidentiality

algorithms, nodes that detect the target communicate with each

data integrity. Violation of

other and select one node which becomes the root node. The

one of these security properties in a target tracking protocol

root node is always the node closest to the target, and its job is

(ii)

source authentication and

(iii)

can result in catastrophic events. For example, target detection algorithm can be fooled by inserting false data into network [14], changing the collected data or sending false data from unauthorized sensor nodes

[15]. Therefore, in any target

detection algorithm above security requirements must be addressed.

of the target changes. When target moves, some nodes become part of tree, and some get deleted from the tree. There are several important papers that employ tree based target tracking: Scalable Tracking Using Networked Sensors (STUN) [18], Dynamic

Convoy

Tree-based

Collaboration

(DCTC)

[19],

Optimized Communication & Organization (OCO) [20],[21]

A. Activation based target tracking In activation based target tracking algorithms,

to collect information from all the nodes via a distributed spanning tree. The root node frequently changes as the position

energy

savings come at the expense of a reduction in the quality of tracking.Basically, the more active sensors are in the network, the quality of tracking is better. But in this case the network

and Deviation Avoidance Tree (DAT) [22]. STUN target tracking algorithm calculates the cost between two links using Euclidean distance. Sink node gets data

through intermediate nodes which also keep record of the

In static clustering, the number of nodes, head of cluster,

detected object. In this algorithm, data are collected and sent by

area of network coverage is static. It looks like simple

leaf nodes, but it can be very ineffective and costly if its leaf

architecture, since everything is decided in advance, however

and intermediate nodes are not chosen correctly. From the

in real-life implementation it has several negative sides. One

security aspect, STUN is very vulnerable, since in case of a

down side of static clustering is that if the cluster head is out of

compromised node attack it is enough to falsify the selection of

power, all other nodes in its cluster are useless, since nodes in cluster communicate only with the cluster head. Usually, the

leaf and intermediate nodes. DCTC protocol works on principle of convoy tree. When target enters into the monitored area, sensor nodes around the

nodes

of

two

different

clusters

do

not

communicate

or

exchange information between clusters.

target are activated. Activated sensor nodes collaboratively

In [23] authors propose three algorithms for tracking a

form a tree. The root node which collects information from the

mobile target in wireless sensor network utilizing cluster-based

tree refines this information to obtain more complete and

architecture. These algorithms are namely: (i) adaptive head,

accurate

information

about

the

target

by

employing

a

(ii) static head, and (iii) selective static head. Goal of paper was

classification algorithm. The rest of the nodes around the

to achieve a promising tracking accuracy and energy efficiency

moving target make convoy tree dynamically. That is the tree

by choosing the candidate sensor nodes nearby the target to

is reconfigured as the target moves. The negative side of this

participate in the tracking process while preserving the others

algorithm is its energy consumption for reconfiguration of the

in sleep state. They showed that the adaptive head is the most efficient algorithm in terms of energy consumption while static

convoy tree when the target is moving. OCO is another tree based method that is used for single target tracking. It provides self-organizing routing capabilities with low computation overhead. It consists of the following steps:

(i)

(ii)

processing,

(iii)

tracking error is concerned especially when the target moves rapidly.

tracking and

In [24] authors propose improving former strategy designed

maintenance [4],[20]. In the first phase, base station

for heterogeneous WSNs, where sensors are organized in a

collects the position of all sensor nodes in the network. In the

static clustering architecture. Goal of paper was to improve

second phase, border nodes of network are detected and

energy and the longevity constrains of sensor nodes. The

(iv)

position collecting,

and selective static heads algorithms are preferred as far as the

defined. In the tracking stage, all objects that come from the

proactive and the reactive cluster management are proposed to

outside of the network area are detected. To be more energy

efficiently deal with these constraints.

efficient, only border nodes are kept on and they notify the base station when a target detected. When the border nodes lost the target, they send message to all of their neighbors. This way, target is tracked all the way while it is in network area, and the energy cost is less compared to other target tracking algorithms.

Dynamic clustering present several advantages compared to static clustering. Cluster head is a sensor node with good energy and computation capacity and large communication range. In dynamic clustering, nodes can be a part more than one cluster, so there is no useless nodes like with static clustering. This type of clustering can be very energy efficient

DA T target tracking algorithm is a result of overcoming

when WSN is large and when it is necessary to cover a big

issues in earlier version of similar target tracking algorithms.

area. Although dynamic clustering based target tracking sounds

The problem in earlier solutions is the large amount of energy

like

spending necessary for target location updating when network

consumption, it has some drawbacks such as loosely defmed

scale is large. DAT protocol is a two-stage approach. The first

missing target recovery procedure.

stage reduces the update cost, and the second stage reduces query costs. Updates are done when object moves from one location to another, and queries are broadcasted to whole network.

DAT

reduces

cost

of

uploading

and

querying

expenses by treating each node as singleton sub tree, so eventually all nodes would become one tree. C.

In order to detect and track targets, these methods take head and cluster members (sensor nodes). The node who first detects the target becomes the cluster head. Cluster based target tracking algorithms can be divided into the following two

(i)

Static

Clustering

[23],[24]

[27] target tracking algorithm is one of the

objects that move with constant speed by dynamically forming a

cluster

and

selecting

the

and

cluster

head.

Although,

the

algorithm assumes the communication range of sensor nodes is wider than their sensing range, it can only deal with the targets

advantage of clusters in which each cluster consists of a cluster

Clustering [25], [4],[26], [27], [28].

DELTA

due to its low energy

dynamic clustering based target tracking methods. It tracks the

that move at constant speed.

Cluster based target tracking

types:

a winner in target tracking

(ii)

Dynamic

Table 1. Comparison of target tracking algorithms

Performance Criteria

Security Services

Target tracking algorithm

Tracking

Communication

Fault tolerance

accuracy

Confidentiality

Authentication

Integrity

x

x

x

overload

STUN [18[

x

.,/

DCTC [19[

x

.,/

.,/

x

x

x

.,/

.,/

x

x

x

.,/

x

x

x

.,/

x

x

x

.,/

x

x

x

.,/

.,/

x

x

x

.,/

.,/

x

x

x

.,/

.,/

x

x

x

.,/

OCO [20] DAT [21]

x

DELTA [27]

x

RARE [28]

x

DPT [30]

x

x

.,/ x

.,/

DCAT [25] HPS [31]

x

x

compromlSlng

the

current

cluster

head

or

prevent

the

communication between the cluster head and its sensor nodes. D.

Hybrid based target tracking Hybrid methods are the tracking algorithms that fulfill the

requirements of more than one type of target tracking [4],[29] Hybrid

Clustering

(Distributed

""'

Clustering

0

D O//\b

consists

Predictive for

of

some

Tracking)

Acoustic

Tracking)

methods like

[30],

DCAT

[25],

and

DPT

(Dynamic

Hierarchical

prediction strategy (HPS) [31]. DPT protocol employs two different mechanisms for target tracking. A clustering based approach makes DPT protocol scalable, ensures

whereas a prediction based tracking mechanism a

distributed

and

energy

efficient

solution. By

employing these two mechanisms, DPT is able to be resilient against node or prediction failures. DCA T is decentralized dynamic clustering algorithm for acoustic target tracking. In this method, Voronoi Diagrams are used compose the clusters and only one cluster head becomes active when the acoustic signal strength detected by cluster head exceeds a pre-determined threshold. After this signal,

Fig. 3. Scheme for cluster based wireless sensor network [35]

cluster head sends a broadcast packet and forms cluster. Sensor nodes join

Dynamic

clustering

based

target

tracking

method

RARE

protocol reduces the quantity of nodes involved in tracking, and

therefore

it

is

able

to

diminish

the

overall

energy

consumption. In order to achieve this low energy consumption, RARE uses two sub algorithms as follows. RARE-Node algorithm reduces the number of nodes participating in the target tracking process. RARE-Area algorithm ensures that only the nodes that satisfy the certain data quality can send data to cluster head.

the

cluster

depending

on

calculated

distance

between them. HPS protocol also forms clusters using Voronoi division and a target's next location is predicted via Least Square Method.

The

protocol's

drawbacks

are

communication

overhead which is not studied in the paper. III.

COMPARISON OF ALGORITHMS FOR TARGET TRACKING FOCUSING ON SECURITY

Many researches investigate and discus the classification of

In both static and dynamic cluster based target tracking

target tracking algorithms for WSNs [2], [3],[4] however very

cluster heads play an important role. Therefore, in terms

few number of papers discus about these problems from the

security, intruders can falsify the target tracking process by just

security point of view [11], [12],[13]. As seen from Section II,

if at least one node is compromised, false measurement could

explain the important protocols in each category and present

lead to wrong decision-making in the network [32],[33]. In

which security properties they provide. Our study shows that

case of any kind of malicious or hostile attack, target tracking

current research in target tracking mostly focuses on the

algorithm would not be able to report the correct position of

accuracy or energy efficiency and there is limited amount of

target. In the literature,

some of the conventional target

work that considers security. Based on the findings of our

tracking algorithms incorporates Bayesian filtering, particle

study, we present a table that summarizes the state of the art in

filters or EKF filters to ensure secure target tracking in WSNs

the target tracking area. At the end of the paper, we also

[12].

provide open research issues and future research directions.

However,

overlooks

the

many basic

of

the

security

target

tracking

requirements.

algorithms

In

order

to

Due to page limitation, we are able present only a subset of the

summarize this finding, in Table I, we present the comparison

work we that have been surveyed, we plan to prepare the

of the most important target tracking algorithms for WSNs.

extended journal version of this paper covering all target

This table shows if the target tracking protocol supports or

tracking protocols in detail.

considers

the

following

criteria:

communication

tolerance,

tracking

accuracy,

overload,

fault

authentication and integrity. IV.

REFERENCES

confidentiality,

OPEN RESEARCH PROBLEMS AND FUTURE RESEARCH

[I]

Salatas, V. "Object Tracking Using Wireless Sensor Networks", Master Thesis,Naval Postgraduate School, pp. 11-25,September 2005.

[2]

Bhatti,S. and Jie Xu. "Survey of target tracking protocols using wireless sensor network", Proceedings of Fifth International Conference on Wireless and Mobile Communications (ICWMC), pp. 110-115, August 2009.

[3]

M. Fayyaz, "Classification of object tracking techniques in wireless sensor networks",Wireless Sensor Network, Vol. 3,No. 4, pp. 121-124, 2011.

[4]

lLi and Y. Zhou, "Target Tracking in Wireless Sensor Networks", ISBN 978-953-307-321-7,Published: December 14,2010

[5]

M.Nandhini and V.R.Sarma Dhulipala (2012). "Energy-Efficient target tracking algorithms in wireless sensor networks: an overview", !JCST Vol. 3,Isuue 1,pp. 66-71,Jan. - March 2012.

[6]

S. Samarah, M. AI-Hajri and A. Boukerche, "A Predictive Energy­ Efficient Technique to Support Object-Tracking Sensor Networks", IEEE Transaction on vehicular technology: Vol. 60, No. 2, pp. 656-663 February 2011

[7]

S. Kaur Sarna and M. Zaveri, "ERTA: energy efficient real time target tracking approach for wireless sensor networks",Proceedings of the 4th International Conference on Sensor Technologies and Applications (SENSORCOMM),pp. 220-225 ,July 2010.

[8]

Y. Wang and D. Wang, "Energy-Efficient node selection for target tracking in wireless sensor networks", International Journal of Distributed Sensor Networks,6 pages,Volume 2013.

[9]

S. Pattern,S. Poduri, and B. Krishnamachari, "Energy-Quality Tradeoffs for Target Tracking in Wireless Sensor Networks",LNCS 2634,pp. 3246,2003.

DIRECTIONS

There are many open research issues in target tracking. Majority of these problems fall into moving target(s) related scenarios. For example, the large number of targets or change in target's speed or direction may falsify the algorithms result [34]. So, future research direction for this problem is to propose target tracking algorithms that are not affected by the number of targets and are resilient against the changes in targets' direction/pace. Balancing

between

energy

consumption

and

tracking

accuracy is another problem that protocol designers need to tackle with. Depending on the application, consumption

or

tracking

accuracy

may

either energy

have

a

higher

importance. It is the protocol designer's job to give appropriate weight to them. However, in order to expand the network lifetime applications usually need to maximize both energy utilization and tracking accuracy. Therefore, there is a need for adaptive

protocols

that

dynamically

balances

the

energy

consumption and track accuracy based on the application requirements. Security is the most important issue for mission critical WSNs. Hence, security and target tracking represent a rich field of research problems. Most of target tracking algorithms are not designed with security in mind and these algorithms are vulnerable to several kind of attacks. After the design of target tracking algorithm has been completed, it is not trivial to implement a security mechanism for the algorithm. The best way is to address the security problem during the design of target tracking algorithm. Hence, secure tracking algorithms that are designed from the scratch are needed. In addition, using cryptographic functions increases the delay in communication, using traditional security algorithms in target tracking negatively affects the respond time of the sensor nodes. As target tracking algorithms are delay sensitive, security functions that work fast on small data (such as coordinate or direction information) are needed for target tracking. V.

CONCLUSION

In this paper, we explore the categories of target tracking methods in the literature by focusing on the security. We

[10] F. Deldar and M. H. Yaghmaee, "Designing an Energy Efficient Prediction-based Algorithm for Target Tracking in Wireless Sensor Networks", Wireless Communications and Signal Processing (WCSP), pp 1-6,2011. [II] M. Mansouri and L. Khoukhi, "Secure Quantized Target Tracking in Wireless Sensor Networks", IEEE 978-1-4577-9538-2/11, pp. 713-718, 2011. [12] A. P. Fard and M. Nabaee, "Secure Tracking in Sensor Networks using Adaptive Extended Kalman Filter", arXiv preprint arXiv:1204.3141, Apr 14,2012 [13] M. Mansouri, L. Khoukhi, H. Nounou, and M. Nounou, "Secure and Robust Clustering M. Mansouri, L. Khoukhi, H. Nounou, and M. Nounou, "Secure and Robust Clustering for Quantized Target Tracking in Wireless Sensor Networks, JOURNAL OF COMMUNICATIONS AND NETWORKS,VOL. 15,NO. 2,APRIL 2013 [14] S. Ozdemir, and H. Cam, "Integration of False Data Detection with Data Aggregation and Confidential Transmission in Wireless Sensor Networks", IEEE/ACM Transactions on Networking, vo1.l8, no.3, pp. 736-749,Jun. 2010. [15] M. Meghdadi, S. Ozdemir, I. GuIer, "A Survey of Wormhole-Based Attacks and Their Countermeasures in Wireless Sensor Networks", [ETE Technical Review,vol. 28,no. 2,pp. 89-102,2011.

[16] W. Zhou, W. Shi, X. Wang and K. Wang, "Adaptive sensor activation algorithm for target tracking in wireless sensor networks", International Journal of Distributed Sensor Networks,10 pages,Volume 2012. [17] J. Chen, K. Cao, K. Li and Y. Sun, "Distributed sensor activation algorithm for target tracking with binary sensor networks", Cluster Computing,Volume 14, Issue I ,pp 55-64,2011. [18] H. T. Kung and D. Vlah, "Efficient Location Tracking Using Sensor Networks", Proceedings of 2003 IEEE Wireless Communications and Networking Conference [19] W. Zhang and G. Cao, "DCTC: Dynamic Convoy Tree-Based Collaboration for Target Tracking in Sensor Networks",Published in the IEEE Transactions on Wireless Communications,Sept. 2004 [20]

S.P.M. Tran, "OCO: Optimized Communication & Organization for Target Tracking in Wireless Sensor Networks", Sensor Networks, Ubiquitous, and Trustworthy Computing, 2006. IEEE International Conference,5-7 June 2006

[21] S. P. M. Tran and T. A Yang, "Evaluations of Target Tracking in Wireless Sensor Networks", SIGCSE'06, March 1-5, 2006, Houston, Texas,USA. [22] C.Y. Lin, W.C. Peng, and Y.c. Tseng, "Efficient In-Network Moving Object Tracking in Wireless Sensor Networks", Mobile Computing, IEEE Transactions on (Volume:5, Issue:8),Aug. 2006 [23] Khalid ADarabkh, Shereen S. Ismail, M. AI-Shurman, Iyad F. Jafar, E. Alkhader,Mamoun F.AI-Mistarihi,"Performance evaluation of selective and adaptive heads clustering algorithms over wireless sensor networks",Journal of Network and Computer Applications, Vol. 35,Iss. 6,pp. 2068-2080, November 2012. [24] J. Teng, H. Snoussi and C. Richard, Prediction-based cluster management for target tracking in wireless sensor networks", Wireless Communications and Mobile Computing, Vol. 12,Iss. 9,pp. 797812, June 2012. [25] W.P. Chen, "Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Networks", Published by the IEEE CS, CASS, ComSoc,IES, & SPS,2004.

[26] K. Huang, H. Wang, W. Wang, Y. Wang, A Dynamic tracking " mechanism for mobile target in wireless sensor networks", Proceedings of 2012 IEEE International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS), New Taipei, pp. 822-826, November 2012. [27] M.Walchli, P. Skoczylas, M. Meer, and T. Braun, "Distributed event localization and tracking with wireless sensors",WWIC 2007 [28] E. Changsha,W. Guojun,G. Minyi,D. Mianxiong, "RARE: An Energy­ Efficient Target Tracking Protocol for Wireless Sensor Networks", Parallel Processing Workshops,2007. ICPPW 2007 [29] Z. Wang, W. Lou, Z. Wang, 1. Ma and H. Chen, "A Hybrid Cluster­ Based target tracking protocol for wireless sensor networks", International Journal of Distributed Sensor Networks, 16 pages, Volume 2013. [30] H. Yang and B. Sikdar, "A Protocol for Tracking Mobile Targets using Sensor NetworksD, Sensor Network Protocols and Applications, 2003. Proceedings of the First IEEE,May 2003 [31] Z. Wang, H. Li, X. Shen, X. Sun, "Tracking and Predicting Moving Targets in Hierarchical Sensor NetworksD, Networking, Sensing and Control,2008. ICNSC 2008 [32] J. Sen, A Survey on Wireless Sensor Network Security", International " Journal of Communication Networks and Information Security (IJCNIS), Vol.l, No. 2,August 2009,pp. 55-78 [33] J. P. Walters, Z. L. W. Shi, and V. Chaudhary, "Wireless Sensor Network Security: A Survey", Security in Distributed, Grid, and Pervasive Computing,Auerbach Publications,CRC Press 2006. [34] S. Oh,"A scalable Multi-Target Tracking Algorithm for Wireless Sensor Networks", International Journal of Distributed Sensor Networks Volume 2012 (2012),Article lD 938521. [35] M. A. Matin, "Wireless Sensor Networks - Tehnology and Protocols", InTech,2012,p. 3-49

Suggest Documents