Boundary Nodes Selection and Target Detection Protocols in Wireless Sensor Networks

碩士 === 國立中央大學 === 資訊工程研究所 === 93 === In recent years, target tracking has been an important issue in research of wireless sensor networks. Users can use wireless sensor networks to keep the interesting target under surveillance. Once the target enters the sensing range of the sensor node, the sensin...

Full description

Bibliographic Details
Main Authors: Cheng-Ju Yu, 游政儒
Other Authors: Jang-Ping Sheu
Format: Others
Language:en_US
Published: 2005
Online Access:http://ndltd.ncl.edu.tw/handle/33020270667768063970
id ndltd-TW-093NCU05392068
record_format oai_dc
spelling ndltd-TW-093NCU053920682015-10-13T11:53:59Z http://ndltd.ncl.edu.tw/handle/33020270667768063970 Boundary Nodes Selection and Target Detection Protocols in Wireless Sensor Networks 在無線感測器網路中邊界點選擇與目標物偵測之通訊協定 Cheng-Ju Yu 游政儒 碩士 國立中央大學 資訊工程研究所 93 In recent years, target tracking has been an important issue in research of wireless sensor networks. Users can use wireless sensor networks to keep the interesting target under surveillance. Once the target enters the sensing range of the sensor node, the sensing information will be recorded by the sensor nodes and forwarded to the sink node. Therefore, users can obtain the information from the sink node. However, some applications only need to record the information of a target entering or leaving a boundary for some specific regions. For example, zoologists want to know some kinds of wildlife migration or habitual behavior in a large-scale natural habitat, and then they can deploy a wireless sensor network to keep a long-term surveillance and get precious monitoring data. In this thesis, we proposed a distributed algorithm to find out the boundary nodes in a wireless sensor network. The selected boundary nodes are used to track the interesting targets (wildlife) when they enter or leave a boundary of the wireless sensor network. The information of wildlife entering or leaving the monitoring regions will be recorded and forwarded to the sink node by the boundary sensor nodes. Simulation results show that the proposed protocols have good performance in selecting boundary nodes. The number of selected boundary nodes almost closes to the optimal value. Besides, our protocol has the less total control overhead during selecting boundary nodes. As the size of the wireless sensor network is increasing, the time of selecting the boundary nodes using our protocol will not increase rapidly in our protocol. Jang-Ping Sheu 許健平 2005 學位論文 ; thesis 35 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立中央大學 === 資訊工程研究所 === 93 === In recent years, target tracking has been an important issue in research of wireless sensor networks. Users can use wireless sensor networks to keep the interesting target under surveillance. Once the target enters the sensing range of the sensor node, the sensing information will be recorded by the sensor nodes and forwarded to the sink node. Therefore, users can obtain the information from the sink node. However, some applications only need to record the information of a target entering or leaving a boundary for some specific regions. For example, zoologists want to know some kinds of wildlife migration or habitual behavior in a large-scale natural habitat, and then they can deploy a wireless sensor network to keep a long-term surveillance and get precious monitoring data. In this thesis, we proposed a distributed algorithm to find out the boundary nodes in a wireless sensor network. The selected boundary nodes are used to track the interesting targets (wildlife) when they enter or leave a boundary of the wireless sensor network. The information of wildlife entering or leaving the monitoring regions will be recorded and forwarded to the sink node by the boundary sensor nodes. Simulation results show that the proposed protocols have good performance in selecting boundary nodes. The number of selected boundary nodes almost closes to the optimal value. Besides, our protocol has the less total control overhead during selecting boundary nodes. As the size of the wireless sensor network is increasing, the time of selecting the boundary nodes using our protocol will not increase rapidly in our protocol.
author2 Jang-Ping Sheu
author_facet Jang-Ping Sheu
Cheng-Ju Yu
游政儒
author Cheng-Ju Yu
游政儒
spellingShingle Cheng-Ju Yu
游政儒
Boundary Nodes Selection and Target Detection Protocols in Wireless Sensor Networks
author_sort Cheng-Ju Yu
title Boundary Nodes Selection and Target Detection Protocols in Wireless Sensor Networks
title_short Boundary Nodes Selection and Target Detection Protocols in Wireless Sensor Networks
title_full Boundary Nodes Selection and Target Detection Protocols in Wireless Sensor Networks
title_fullStr Boundary Nodes Selection and Target Detection Protocols in Wireless Sensor Networks
title_full_unstemmed Boundary Nodes Selection and Target Detection Protocols in Wireless Sensor Networks
title_sort boundary nodes selection and target detection protocols in wireless sensor networks
publishDate 2005
url http://ndltd.ncl.edu.tw/handle/33020270667768063970
work_keys_str_mv AT chengjuyu boundarynodesselectionandtargetdetectionprotocolsinwirelesssensornetworks
AT yóuzhèngrú boundarynodesselectionandtargetdetectionprotocolsinwirelesssensornetworks
AT chengjuyu zàiwúxiàngǎncèqìwǎnglùzhōngbiānjièdiǎnxuǎnzéyǔmùbiāowùzhēncèzhītōngxùnxiédìng
AT yóuzhèngrú zàiwúxiàngǎncèqìwǎnglùzhōngbiānjièdiǎnxuǎnzéyǔmùbiāowùzhēncèzhītōngxùnxiédìng
_version_ 1716850499670507520