aninformation-theoreticapproachforenergy-efficient

14
Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 2010, Article ID 641632, 14 pages doi:10.1155/2010/641632 Research Article An Information-Theoretic Approach for Energy-Efficient Collaborative Tracking in Wireless Sensor Networks Loredana Arienzo Institute for the Protection and Security of the Citizen, Joint Research Centre, European Commission, Ispra, 21027 Varese, Italy Correspondence should be addressed to Loredana Arienzo, [email protected] Received 3 November 2009; Accepted 24 February 2010 Academic Editor: Xinbing Wang Copyright © 2010 Loredana Arienzo. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. The problem of collaborative tracking of mobile nodes in wireless sensor networks is addressed. By using a novel metric derived from the energy model in LEACH (W.B. Heinzelman, A.P. Chandrakasan and H. Balakrishnan, Energy-Ecient Communication Protocol for Wireless Microsensor Networks, in: Proceedings of the 33rd Hawaii International Conference on System Sciences (HICSS ’00), 2000) and aiming at an ecient resource solution, the approach adopts a strategy of combining target tracking with node selection procedures in order to select informative sensors to minimize the energy consumption of the tracking task. We layout a cluster-based architecture to address the limitations in computational power, battery capacity and communication capacities of the sensor devices. The computation of the posterior Cramer-Rao bound (PCRB) based on received signal strength measurements has been considered. To track mobile nodes two particle filters are used: the bootstrap particle filter and the unscented particle filter, both in the centralized and in the distributed manner. Their performances are compared with the theoretical lower bound PCRB. To save energy, a node selection procedure based on greedy algorithms is proposed. The node selection problem is formulated as a cross-layer optimization problem and it is solved using greedy algorithms. 1. Introduction Wireless sensor networks (WSNs), which normally consist of hundreds or thousands of sensor nodes each capable of sensing, processing, and transmitting environmental infor- mation, are deployed to monitor certain physical phenomena or to detect and track certain targets in an area of interests [1]. The issue of tracking moving targets in WSNs has received significant attention in recent years [24]. As any other algorithm designed for sensor networks, a tracking algorithm should be: (1) self-organizing, i.e. it should not depend on global infrastructure; (2) energy ecient, i.e. it should require little computation and, especially, communication; (3) robust, i.e. it should not depend on noise and movement of the target; (4) accurate, i.e. it should work with accuracy and precision in various environments, and should not depend on sensor-to-sensor connectivity in the network; (5) reliable, i.e. it should be tolerant to node failures. Tracking a target in sensor networks is mainly challeng- ing regardless of the energy consumption due to resource- constrained features of such a network. The minimization of energy consumption for a sensor network with target activities is complicated since target estimation involves collaborative sensing and communication between dierent nodes. The problem of selecting the best nodes for tracking a target in a distributed wireless sensor network was investigated since [5]. The main idea is for a network to determine participants in a sensor collaboration by dynamically optimizing the utility function of data for a given cost of communication and computation. Previous research [69] has focused on information- theoretic node selection approaches, that is, on heuristics to select an informative sensor such that the fusion of the selected sensor observation with the prior target location distribution would yield on average the greatest reduction in the entropy of the target location distribution. In [6],

Upload: others

Post on 23-Feb-2022

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: AnInformation-TheoreticApproachforEnergy-Efficient

Hindawi Publishing CorporationEURASIP Journal on Wireless Communications and NetworkingVolume 2010, Article ID 641632, 14 pagesdoi:10.1155/2010/641632

Research Article

An Information-Theoretic Approach for Energy-EfficientCollaborative Tracking inWireless Sensor Networks

Loredana Arienzo

Institute for the Protection and Security of the Citizen, Joint Research Centre, European Commission, Ispra, 21027 Varese, Italy

Correspondence should be addressed to Loredana Arienzo, [email protected]

Received 3 November 2009; Accepted 24 February 2010

Academic Editor: Xinbing Wang

Copyright © 2010 Loredana Arienzo. This is an open access article distributed under the Creative Commons Attribution License,which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

The problem of collaborative tracking of mobile nodes in wireless sensor networks is addressed. By using a novel metric derivedfrom the energy model in LEACH (W.B. Heinzelman, A.P. Chandrakasan and H. Balakrishnan, Energy-Efficient CommunicationProtocol for Wireless Microsensor Networks, in: Proceedings of the 33rd Hawaii International Conference on System Sciences(HICSS ’00), 2000) and aiming at an efficient resource solution, the approach adopts a strategy of combining target trackingwith node selection procedures in order to select informative sensors to minimize the energy consumption of the tracking task.We layout a cluster-based architecture to address the limitations in computational power, battery capacity and communicationcapacities of the sensor devices. The computation of the posterior Cramer-Rao bound (PCRB) based on received signal strengthmeasurements has been considered. To track mobile nodes two particle filters are used: the bootstrap particle filter and theunscented particle filter, both in the centralized and in the distributed manner. Their performances are compared with thetheoretical lower bound PCRB. To save energy, a node selection procedure based on greedy algorithms is proposed. The nodeselection problem is formulated as a cross-layer optimization problem and it is solved using greedy algorithms.

1. Introduction

Wireless sensor networks (WSNs), which normally consistof hundreds or thousands of sensor nodes each capable ofsensing, processing, and transmitting environmental infor-mation, are deployed tomonitor certain physical phenomenaor to detect and track certain targets in an area of interests[1]. The issue of tracking moving targets in WSNs hasreceived significant attention in recent years [2–4]. As anyother algorithm designed for sensor networks, a trackingalgorithm should be: (1) self-organizing, i.e. it shouldnot depend on global infrastructure; (2) energy efficient,i.e. it should require little computation and, especially,communication; (3) robust, i.e. it should not depend onnoise and movement of the target; (4) accurate, i.e. it shouldwork with accuracy and precision in various environments,and should not depend on sensor-to-sensor connectivity inthe network; (5) reliable, i.e. it should be tolerant to nodefailures.

Tracking a target in sensor networks is mainly challeng-ing regardless of the energy consumption due to resource-constrained features of such a network. The minimizationof energy consumption for a sensor network with targetactivities is complicated since target estimation involvescollaborative sensing and communication between differentnodes. The problem of selecting the best nodes for trackinga target in a distributed wireless sensor network wasinvestigated since [5].

The main idea is for a network to determine participantsin a sensor collaboration by dynamically optimizing the utilityfunction of data for a given cost of communication andcomputation.

Previous research [6–9] has focused on information-theoretic node selection approaches, that is, on heuristicsto select an informative sensor such that the fusion of theselected sensor observation with the prior target locationdistribution would yield on average the greatest reductionin the entropy of the target location distribution. In [6],

Page 2: AnInformation-TheoreticApproachforEnergy-Efficient

2 EURASIP Journal on Wireless Communications and Networking

the sensor node which will result in the smallest expectedposterior uncertainty of the target state is chosen as thenext node to contribute to the movement decision. Specially,minimizing the expected posterior uncertainty is equivalentto maximizing the mutual information between the sensornode output and the target state [6]. In [7], an entropy-based sensor selection heuristic is proposed for targetlocalization in which a sensor node is chosen at eachstep and the observation of that node is incorporeted intothe target location distribution using sequential Bayesianfilering. Instead, the main idea underlying our approach isthat the heuristics select an informative sensor such that thefusion of the selected sensor observation with the prior targetlocation distribution would yield to minimize the overallenergy consumption in a cluster while maximizing themutual information between the sensor node observationand the target state in order to improve the quality ofthe tracking data. We show that properly selected nodesto collect measurements in a cluster head, we can saveenergy to maximize the sensor network lifetime, and we willcompare our node selection algorithm with that of Kaplan[8, 9].

1.1. Main Contribution. The main contributions are asfollows.

(i) By using the energy model in [10], we propose anovel energy-based metric to evaluate the energyconsumption of node selection algorithms in a clusterof sensor nodes.

(ii) We formulate the node selection problem as across-layer optimization problem and determine theoptimal solution by greedy algorithm.

(iii) We compare the proposed node selection algorithmswith the existing literature.

(iv) We implement distributed tracking algorithms usingparticle filter method and we compare them with theexisting literature.

Preliminary results of this work were published in theauthor references [11]. The remainder of this paper isorganized as follows: in Section 1.2 we describe the existingwork. Section 2 provides the preliminary information bydescribing the model of the overall system, by introducingthe energy-based metrics. Section 3 provides a concisereview of some basic concepts and statistical model of thenonlinear dynamical system. Section 4 describes the trackingalgorithms and formulates the distributed tracking problemintroducing a node selection rule. In Section 5 we describethe optimization problem and provide solutions. Section 6discusses the performances of proposed algorithms, while inSection 7, we draw the main conclusions.

1.2. Related Work. Many criteria influence the design ofenergy-efficient tracking approaches, and a wide range ofschemes have been proposed. This Section is devoted toprovide an overview of existing energy-efficient techniquesfor tracking a target in a wireless sensor network.

Generally, the hierarchical structures include tree-based,cluster-based, and prediction-based structures. The tree-based approaches [12–15] use a hierarchy tree to representthe sensors and record information about presence of theobjects being detected by the sensors. Kung and Vlah[12] propose STUN (Scalable Tracking Using NetworkedSensors), a scalable tracking architecture that employshierarchical structure to allow the system to handle a largenumber of tracked objects. Additionally to the tree, Lin andTseng [13] consider an in-network moving object trackingin a sensor network, consisting of two operations: locationupdate and query. The drawback is the building of thetree as the target moves. Zhang and Cao [14, 15] proposeDCTC (Dynamic Convoy Tree-Based Collaboration). Theyintroduce a message-pruning tree structure called convoytree, which is dynamically configured to add and prunesome nodes as the target moves and the tracking problem isformalized as amultiple objective optimization problem. Thesolution to the problem is a convoy tree sequence with hightree coverage and low energy consumption. Building such aconvoy tree sequence requires global network information,and reconfiguration and maintenance of a convoy tree incursconsiderable computational and communication overhead.As a result, the tree-based approaches are usually centralizedand applied in the deployment phase of sensor networks.

Wang et al. [16] and Chen et al. [17] propose cluster-based tracking schemes. They envision a hierarchical sensornetwork that is composed of (a) a static backbone of sparselyplaced position-aware sensors which will assume the role of acluster head (CH) upon triggered by certain signal events and(b) moderately to densely populated low-end sensors whosefunction is to provide sensor information to CHs uponrequest. In these schemes, sensors are grouped into clusterseither statically or dynamically (upon detection of the targetin the vicinity), and a cluster head collects informationfrom its cluster members and determines the target locationusing either the trilateration technique [16] or the Voronoidiagram-based approach [17]. Both localization approachesaim to determine the exact location of the target at theexpense of considerable computational overhead because ofthe potentially high number of nodes in the cluster.

From the topology perspective, the tracking approachescould use a global or local knowledge about the location ofevery node in the network. As opposed to the tree-basedschemes [12–15] that use a global information, the cluster-based schemes [16, 17] rely on local topology knowledge tolimit the scope of target’s location updates.

As to the signal processing, the tracking approaches can beclassified as centralized or distributed. Usually the tree-basedschemes are centralized approaches, while the cluster-basedschemes are distributed schemes in which the cluster head isthe leader node in the processing. The works in [13, 18] arecentralized approaches, while those in [3, 4, 14, 16, 19] aredistributed approaches.

As defined in [20] the sensor management is the processof dynamically retasking sensors in response to an evolvingenvironment. The goal of sensor management is to chooseactions for individual sensors dynamically so as to maxi-mize overall network utility. In a tracking task the sensor

Page 3: AnInformation-TheoreticApproachforEnergy-Efficient

EURASIP Journal on Wireless Communications and Networking 3

CH

Sink

Active low-end sensor node with radio and unknown positionInactive low-end sensor node with radio and unknown positionActive sensor node with radio and known positionTarget position at the time tTarget trajectory

T(t)

Figure 1: Sensor network topology.

management addresses the problem of choosing informativesensors needed to obtain information about the target stateand therefore maximize the network lifetime. Based onthe collaboration, the existing approach of target trackingcan be classified in information-driven and information-based. Zhao et al. [19] propose IDSQ (Information DrivenSensor Querying), in which the selection of the best nodeis based on a Mahalanobis distance that leads to a heuristicmethod favoring the sensors whose Euclidean distance tothe target is small. In [7–9] the node selection problemhas been addressed using an information-based approach.The main idea behind this approach is to optimize a utilityfunction, representing the location accuracy, using entropy-based metrics.

As will be discussed in detail in the next sections, themain idea underlined our proposed information-theoreticapproach is to optimize an utility function representingthe overall energy in a cluster, using energy-based metrics,jointly to the mutual information between the sensor nodeobservation and the target state.

2. SystemModel

We make the following assumptions about the sensornetwork. First, the network is composed of a single gateway(sink) node and multiple sources. Next, the network ismodeled as a combination of (1) a static backbone of sensornodes aware of their position which assume the role of acluster head and (2) randomly distributed low-end sensorswhich sense a moving target and report data to CHs uponrequest. Finally, we assume that the network is composedof dynamic clusters, depending on the predicted targettrajectory (see Figure 1). Indeed, to facilitate collaborativedata processing in target tracking sensor networks, usuallythe sensors are aggregated in clusters, led by a CH.

The details of the clustering algorithm are out of theaim of this paper. In the following we will limit ourselvesto consider only the intra-cluster communication issues.

We only highlight that to waste less power the cluster-headshould be selected with a shorter distance to the target. Theactive sensor of the cluster, which will assume the role ofcluster head, will predict the trajectory of a target by meansof a particle filter based on the history of the target locationand some observations which come from some active sensorsin the cluster. These sensors in the cluster are chosen tominimize the overall energy consumption.

2.1. Energy Model. The main concept underlying the pro-posed energy efficient tracking algorithm is that the CHshould select the active neighbors with the goal of reducingthe total energy needed to transmit its data through its radio.In this subsection we introduce two metrics based on energyconsumption for a tracking task.

2.1.1. Energy-Based Metric. To describe the energy con-sumption of a tracking algorithm for power-constrainedsensor network, we use the energy model for wireless sensornetworks introduced by Heinzelman et al. [10]. The energyconsumption per bit at the physical layer is

E = ETx-elec + βdα + ERx-elec, (1)

where ETx-elec is a distance independent term that takesinto account overheads of transmitter electronics (PLLs,VCOs, bias currents, etc.) and digital processing; ERx-elec is adistance independent term that takes into account overheadsof receiver electronics; finally βdα accounts for the radiatedpower necessary to transmit one bit over a distance d betweensource and destination, where α is the exponent of the pathloss (2 ≤ α ≤ 5).

According to [21] we assume that ETx-elec = ERx-elec =Eelec. Hence, given l bits of data, the overall energy consump-tion to transmit the packet of l bit between two nodes at adistance d with a given received SNR can be expressed as

E(d, l) =(2Eelec + Eamp · dα

)· l, (2)

where Eelec [Joule/bit] is the energy needed by the transceivercircuitry to transmit or receive one bit and Eamp [Joule/(bit ·mα)] is a constant which represents the energy needed totransmit one bit over a distance d to achieve an acceptableSNR at the destination.

This model assumes that the energy consumption isdominated by the radio communication rather than thecomputation. We refer to (2) as the energy-based metric.

2.1.2. Residual Energy-Based Metric. According to [22, 23]we propose another metric combining energy and remainingenergy at nodes. Hence, if we refer to a link (i, j) with distanced, the overall energy consumption to transmit a l-bit packetbetween the node i and node j at a distance d with a givenreceived SNR can be expressed as

Ei j(d, l) = Er −(2Eelec + Eamp · dα

)· l, (3)

where the first addend Er is the remaining energy at node iand the second addend is the transmission energy requiredfor the node i to transmit l bits to its neighboring node j. Werefer to (3) as the residual energy-based metric.

Page 4: AnInformation-TheoreticApproachforEnergy-Efficient

4 EURASIP Journal on Wireless Communications and Networking

2.2. Network Model. In our analysis, we consider a networkcomposed of randomly deployed sensor nodes which sense amoving target and forward the information into a position-aware sensor which acts as a data gathering node. Thenetwork is divided into Nc clusters each having Na nodes.Each sensor is equipped by a low data rate radio interface.The position-aware sensors are equipped by two radio trans-mitters, that is, a low data rate transmitter to communicatewith the sensors, and a high rate wireless interface for CH-CH communication.

In our analysis, we assume to know the position ofthe CH (static node) and to estimate the distance of eachneighbor with respect the CH.Many types of sensors providemeasurements that are function of the relative distancebetween the sensor and the sensed object (e.g., acousticsensors, sonar, etc.). We consider a common example, newlyin [4], where sensors measure the power of a radio signalemitted by the object.

Therefore, we assume the log-normal shadowing modelfor the channel and we suppose that the power of a receivedsignal decreases exponentially with the propagation distance:

Pr(d) = Pr(do) ·(dod

)α+ Xσ , (4)

where Pr(d) is the received power at a receiver at distanced from a transmitter, Pr(do) is the transmitted power at areference distance do, α is the path loss exponent (2 ≤ α ≤ 5),and Xσ is the shadow fading component, with Xσ GaussiandistributionN (0, σ).

Hence, the distance from the ith sensor of the clusterto the CH can be estimated as d = (Pr/Pa)

−1/α, where Pris the received signal strength in the sensor, and Pa is the(unknown) strength of the signal from the sensor.

3. Basic Concepts and Theoretical Bound

We begin our analysis with a concise review of some basicconcepts and the models of a nonlinear dynamical system.

We consider the state estimation of a nonlinear dynami-cal system:

xk+1 = fk(xk,wk),

zk = hk(xk , vk),(5)

where, k is the discrete time index; xkεRn is the statevector; zkεRm is the observation vector; wk is the zero-meanwhite Gaussian process noise with nonsingular covariancematrixQk; vk is the zero-mean white Gaussian measurementnoise independent of wk with nonsingular covariance matrixRk; fk and hk are the (in general) nonlinear functions.The functions fk and hk may depend on time k. Furtherwe assume that the initial state x0 has a known probabilitydensity function p(x0). Let∇ and Δ be operators of the first-and second-order partial derivatives, respectively,

∇xk =[

∂x1, . . . ,

∂xr

]T,

Δxkxk = ∇xk∇T

xk .

(6)

Using this notation, the Fisher Information Matrix (FIM)given by [24] for this problem can be written as

J(xk) = −E[Δxkxk log p(zk, xk)

], (7)

where p(zk, xk) represents the joint probability density of(zk, xk) In the following sections J(xk) is denoted by Jk forbrevity. The following proposition [25] gives an efficientmethod for computing Jk recursively.

Proposition 1. The sequence {Jk} of Fisher information sub-matrices for estimating state vectors {xk} obeys the recursion:

Jk+1 = D22k −D21

k

(Jk +D11

k

)−1D12

k , (8)

where

D11k = E

{−∇xk∇T

xk log p(xk+1 | xk)},

D12k = E

{−∇xk+1∇T

xk log p(xk+1 | xk)},

D21k = E

{−∇xk∇T

xk+1 log p(xk+1 | xk)}=[D12

k

]T,

D22k = E

{−∇xk+1∇T

xk+1 log p(xk+1 | xk)}

+ E{−∇xk+1∇T

xk+1 log p(zk+1 | xk+1)}.

(9)

3.1. Time-Invariant Model. We assume that the functionsfk(·, ·) and hk(·, ·) are time invariant (independent of k).Using this assumption and according to [25], the matricesD11

k , . . . ,D22k do not depend on k, and additionally for k →

∞, the matrix Jk converges to a matrix J∞, which is given as asolution to the following equation:

J∞ = D22k −D21

k

(J∞ +D11

k

)−1D12

k . (10)

Note that (10) is a discrete-time algebraic Riccati equation.A common form of the Riccati equation is obtained if therecursion (8) is equivalently written as

Jk+1 = D21k

(D11

k

)−1Jk(D11

k

)−1D12

k −D21k

(D11

k

)−1

· Jk(Jk +D11

k

)−1Jk(D11

k

)−1D12

k

+D22k −D21

k

(D11

k

)−1D12

k ,

(11)

which can be easily proved by simple algebraic manipula-tions. Then, put Jk+1 = Jk = J∞.

3.2. Model for State Estimation of a Nonlinear DynamicalSystem. The problem of estimating the state vector of anonlinear dynamical system (i.e., single target tracking) canbe formulated as follows. The state and the observations ofthe target of interest are assumed to follow the followingmodel:

xk+1 = Fkxk + Akwk,

zk = Hk(xk) + Bkvk,(12)

Page 5: AnInformation-TheoreticApproachforEnergy-Efficient

EURASIP Journal on Wireless Communications and Networking 5

where xk, zk, wk, and vk were introduced in Section 3. Thematrices Fk, Ak, and Bk are independent of the state vectorwhereas Hk is a function dependent of the state vector xk.From the assumption that the noises wk and vk are Gaussianwith zero mean and invertible covariances matrices Qk andRk, respectively, and that the elements of the noise vectorswk

and vk are independent and identically distributed (IID) itfollows that the conditional densities can be written as

p(xk+1 | xk) = 1√2π|Qi| · e

−(1/2)[xk+1−Fkxk]TQ−1k [xk+1−Fkxk],

p(zk | xk) = 1√2π|Qi| · e

−(1/2)[zk−Hk(xk)]TR−1k [zi−Hk(xk)]

(13)

In the derivation above, we assume that the system model istime-invariant, implying thatQ1 = Q2 = · · · = Qk = Q andR1 = R2 = · · · = Rk = R. Consequently, from (13), we have

− log p(xk+1 | xk) = c1 +12[xk+1 − Fkxk]

TQ−1k [xk+1 − Fkxk],

− log p(zk | xk) = c2 +12[zk −Hk(xk)]

TR−1k [zk −Hk(xk)],

(14)

where c1and c2 are constants, and

D11k = E

{∇xk [xk+1 − Fkxk]

TQ−1k · ∇Txk [xk+1 − Fkxk]

},

D12k = −E

{∇xk [xk+1 − Fkxk]

T},

D22k = Q−1k + E

{−∇xk+1 [zk+1 −Hk+1(xk+1)]

T

·R−1k+1∇Txk+1 [zk+1 −Hk+1(xk+1)]

}.

(15)

4. Tracking Algorithms

The aim of this section is to describe the proposed cross-layer predictive tracking algorithm and to discuss that it canconsistently reduce the energy consumption on sensors withrespect to existent one-level location algorithms. As statedabove, in this paper we use sequential Monte Carlo (SMC)approaches, also known as particle filtering [26, 27], fortracking a moving target while Kaplan [8, 9] estimates thetarget location using a Kalman filter based on the currentmeasurement at a sensor and the past history at other sen-sors. The particle filter provides simulation-based solutionsto estimate the posterior distribution of nonlinear discretetime dynamic models. The main idea of particle filtering is torepresent the required posterior distribution density by a setof random samples with associated weights and to computeestimates based on these samples and weights, updating themrecursively in time using the sequential importance sampling(SIS) algorithm. As the number of samples becomes verylarge, the SIS filter approaches the optimal Bayesian estimate.A common problem with the SIS particle filter is thedegeneracy phenomenon, since after a few iterations all theparticles, with exception of one of them, will have negligibleweight. Because of this phenomenon, resampling techniques

are used to eliminate particles that have small weights and toconcentrate on particles with large weights. The particle filterusing sequential importance resampling (SIR) techniques isknown as bootstrap filter or SIR particle filter (PF). Therefore,in the following we use the SIR filter to achieve the trackingtask. Moreover, we compare the performance of bootstrapfilter with the unscented particle filter. Indeed, unfortunatelyeven when resampling schemes are used, degeneracymay stillbe a problem. Using the prior distribution as importancedistribution could lead to the degeneracy problem of theparticles because the most recent observations are ignored.Samples may eventually collapse to a single point if, duringthe resampling stage, samples with high importance weightsare duplicated an extremely large number of times. Therehave been numerous proposals to rectify the degeneracyproblem improving the performance of the SIR particlefilter [28]. Notable techniques include local linearizationusing the extended Kalman filter (EKF) [29, 30] or theunscented Kalman filter (UKF) to estimate the importancedistribution [31]. A particle filter which uses UKF to generatethe importance distribution is referred as unscented particlefilter (UPF) or sigma-point particle filter [31].

In this paper, we analyze the energy efficiency of particlefiltering looking at collaborative and distributed schema fortracking a moving target.

4.1. Node Selection. We formulate the problem of distributedtracking as a sequential Monte Carlo estimation problem.Assume that the state of a target we wish to estimate isxk. Each new sensor measurement zk is combined with thecurrent estimate p(xk | z1, . . . , zk−1), hereafter called beliefstate, to form a new belief state of the target p(xk | z1, . . . , zk).The problem of selecting a sensor in order to provide greatestimprovement to the estimation at the lowest cost becomesan optimization problem. We let Zk be all measurementsthat have already been used at time k in the inference ofthe current belief state and refer the sensor which holds thebelief state as the leader node. The objective function for thisoptimization problem can be defined as a mixture of bothinformation gain and cost. In the remainder of the sectionwe consider the information gain, while the computation ofthe energy consumption cost is discussed in the next section.

The information gain to select the sensor s can be definedas Φs(p(xk | Zk)) = ΦUtility(p(xk+1 | Zk, zk+1,s)), where zk+1,sis the new measurement from sensor s at time k + 1. Theutility function can be defined as the uncertainty of the targetstate reduced by the additional measurements zk+1,s [6], thatis, Φs(p(xk | Zk)) = Htarget(Zk) − Htarget(Zk, zk+1,s). Further-more, the utility function can be defined with the mutualinformationΦUtility(p(xk+1, zk+1,s | Zk)) = I(xk+1, zk+1,s | Zk),which means the information of xk+1 conveyed by the newmeasurements zk+1,s [18].

The utility function based on the entropy is difficult tocompute in practice since we need to have the measurementbefore deciding how useful it is. Instead of the true a posteri-ori distribution, a more practical alternative is to computethe entropy based on the expected posterior distribution.In the ideal case when a real new measurement zk+1,s is

Page 6: AnInformation-TheoreticApproachforEnergy-Efficient

6 EURASIP Journal on Wireless Communications and Networking

available, the new belief or posterior is evaluated usingsequential Bayesian filtering p(xk+1 | zk+1,s,Zk) ∝ p(zk+1,s |xk+1)p(xk+1 | Zk).Without having the data zk+1,s, we need tocompute the expected posterior distribution Ezk+1,s(p(xk+1 |zk+1,s,Zk)). We can estimate the measurement zk+1,s fromthe predicted belief and compute the expected likelihoodfunction p(zk+1,s | xk+1) =

∫p(zk+1,s(νk+1) | xk+1) × p(νk+1 |

Zk)dνk+1. Then, the expected posterior belief can be definedas follows:

p(xk+1 | zk+1,s,Zk

) = p(zk+1,s | xk+1

)p(xk+1 | Zk). (16)

The entropy of expected posterior distribution can be com-

pute based on the discrete belief state {x jk,w

jk}Nj=1 [32], where

wjk is the importance sampling weight in the resampling

step of the particle filters and N represents the number ofweights namely the number of particles. According to (16),the expected posterior belief for sensor s can be represented

by the discrete belief state {x jk, w

jk+1,s}Nj=1 with the weights

wjk+1,s given by

wjk+1,s = p

(zk+1,s | x j

k+1

)w

jk+1. (17)

The entropy of the discrete belief state {x jk+1, w

jk+1,s}Nj=1 can

be computed by

H = −N∑

j=1w

jk+1,s log w

jk+1,s. (18)

This expected posterior entropy can be used as a criteriato select the best among the sensor candidates to maximizethe information gain. The objective function expected toimprove the estimation of the target is given by

Ns = argmaxs∈Na

Φs(p(xk | Zk)

)

= argmaxs∈Na

(Htarget(Zk)−Htarget

(Zk, zk+1,s

)),

(19)

where Na indicates the set, with cardinality Na, of activenodes in the cluster that receive from the CH a signalexceeding a predetermined RSS threshold.

5. Energy Efficient Tracking

Let us consider the following location discovery protocol fora given snapshot. With reference to Figure 2, the target Tperiodically sends discovery signal, with period TM , to allthe sensors of the network. We indicate with Ns the set ofactive neighbor nodes that maximize the utility function asin (19). The subset Nd of desired anchor nodes needed forthe localization algorithm will be chosen so as to minimizethe energy consumption of the location discovery protocol.Then, each node i ∈ Ns transmits the sensing information(the distance of the node i from the target) to the CH whichprocesses the data and updates the current target location.

CHi

didj

ri r j

j

T

Figure 2: Location discovery protocol.

According to metric (2), the energy cost in the commu-nication with one sensor i ∈ Ns is given by

Ei(ri,di) =[Eelec(Nd + 2) + Eamp · dαi

]· l

TM

+[Eelec(Nd + 1) + Eamp · rαi

]· b,

(20)

where b represents the bit rate (bit/s) between the CH andthe neighbor i, TM (s) is the period between two consecutivediscovery signal of the target, ri and di are, respectively, thedistance of the node i from the CH and the target, and Nd

is the number of desired neighbors of the CH. Finally, in(20) EelecNd represents the energy needed at the neighborsto receive one bit. In the energy cost we have omitted theenergy consumption in the path between the target and theCH due to the calibration phase of the clustering and we haveconsidered only the communication between each node ofthe cluster and its cluster head.

On the other hand, according to the metric (3) and thelocation discovery protocol herein discussed, the energy costin the communication with the sensor iεNs, based on (20),is given by

Ui(ri,di) = 2Er(i)− Ei(ri,di). (21)

The total utility function, for all nodes in the set Ns, is givenby

UTOT(Ns) =∑

i∈Ns

Ui(ri,di). (22)

As stated above, our objective is to select the optimalsubset Nd ⊂ Ns which maximizes the total utility functionin (22), subject to a constraint of the cardinality Nd of saidsubset. This gives formally the following objective functionand associated constraint:

Nd = arg maxN⊆Ns

UTOT(N ) subject to Nd ≥ 2 (23)

A unique solution to this problem exists, since the objectivefunction is strictly concave and the feasible set is convex. Thesolution of this optimization problem is illustrated in thefollowing subsections.

Page 7: AnInformation-TheoreticApproachforEnergy-Efficient

EURASIP Journal on Wireless Communications and Networking 7

Synopsis: [Nd ,C,Etot,node,Eb, k] = Greedy(Ns,Nd).Given: Set of nodes in the clusterNs, number of desired

nodesNd.Output: Set of desired nodesNd , new set of candidate

nodes in the cluster C, total energy of the desired setEtot, last node selected in the current snapshot node,energy of this node Eb, time k.

Initialize the candidate set:C = Ns

Ncand = 0Initialize the objective function:

Etot = 0Randomly select a candidate node i ∈ C

Emin = E(i)NodeMin = i

while |Ncand| < Nd dofor each j ∈ C \ {i} do

if E( j) < EminthenEmin = E( j)NodeMin = j

end ifend fornode = NodeMinEb = Emin

Etot = Etot + Emin

Ncand = Ncand ∪ {NodeMin}C = C \ {NodeMin}

end whileNd = Ncand

Algorithm 1: Greedy random node selection.

5.1. The Solution in the Static Scenario. To find the optimalsolution for such problem it is theoretically possible toenumerate the solutions and evaluate each with respect tothe stated objective. However, from a practical perspective,it is infeasible to follow such a strategy because the num-ber of combinations grows exponentially with the size ofproblem.

Indeed, if we formulate our combinatorial optimizationproblem as an integer linear programming problem, thecomputational complexity consists of enumerating all theNd-node subsets, O(NNd

a ), and adding the computationalcomplexity of the assignment problem,O(N3

d ). In such cases,heuristic methods are usually employed to find good, butnot necessarily guaranteed optimal solutions. More than onetechnique is applicable, that is, integer linear programming,graph theory, genetic algorithms, and greedy heuristics; see[33] for further details. Here we adopt the meta-heuristicgreedy randomized adaptive search procedures (GRASP)[34], in which each iteration consists of two phases, aconstruction phase, in which a feasible solution is produced,and a local search phase, in which a local optimum in theneighborhood of the constructed solution is sought. The bestoverall solution is kept as the result.

The implementation of the optimal Greedy node selec-tion procedure is described in Algorithm 1. It provides the set

Synopsis: [Nd ,C′,Etot] = BranchBound(Nd ,C,Eb,node).Given: Number of desired nodes Nd , candidate nodes

set of the clusterNa, energy bound Eb, node relatedto the energy bound node.

Output: Set of desired nodesNd , new set of candidatenodes in the cluster C′, total energy of the desired setEtot.

Initialize the candidate set:Ncand = {node}

Initialize the objective function:Etot = Eb

while |Ncand| < Nd dofor each j ∈ C \ {i} do

if E( j) < Eb thenbreak

elseEmin = E( j)NodeMin = j

end ifend forNcand = Ncand ∪ {NodeMin}C = C \ {NodeMin}Etot = Etot + Emin

end whileNd = Ncand

Algorithm 2: Branch and bound algorithm.

of desired nodesNd, new set of candidate nodes in the clusterC, total energy of the desired set Etot, last node selected inthe current snapshot node, energy of this node Eb, and timek.

5.2. The Solution in the Dynamic Scenario. In previous sec-tions, we have considered the static version of the problem,namely, a snapshot model. In this section we extend theGreedy node selection procedure over multiple snapshots,so that we can select active nodes for the next measurementintervals. In a dynamic scenario, due to the target mobility,the distance di in (20) varies with the time and hence thetotal utility function (22) is a function of time k.

In the dynamic version of the optimization problem weuse the Dynamic Programming [35], that is based on theidea of breaking down the problem into stages at whichthe decisions take place and finding a recurrence relationthat takes us backward from one stage to the previous stage.For this purpose, a branch-and-bound method is developed,in which the branch refers to the partitioning process intostages, that are repeatedly decomposed until a solution isfound or infeasibility is proved, and the bound refers tolower bounds that are used to construct a proof of optimalitywithout exhaustive search. We introduce an energy bound asin the following definition.

Definition 1. The energy bound is the maximum energyreferred to the energy costs associated to the nodes selectedin the previous their snapshot.

Page 8: AnInformation-TheoreticApproachforEnergy-Efficient

8 EURASIP Journal on Wireless Communications and Networking

Synopsis: [Nd ,C,Etot] = DynamicSelection(Na,Nd).Output: Set of desired nodesNd , new set of candidate

nodes in the cluster C,total energy of the desiredset Etot .

(1) The initial leader node does the following step:

(a) draw initial samples {x j0,w

j0 = 1}Nj=1 of the target

from the prior information; (b) update the belief state

{x j1,w

j1}Nj=1 by the sensor fusion algorithm

based on the new measurement z1 at the leader nodein the setNa; (c) compute the expected posterior

belief state {x j2,w

j2,i}Nj=1 for each neighboor node i

with the weights wj2,i computed by (17); (d) compute

the entropy of the expected posterior belief state

{x j2,w

j2,i}Nj=1 for each neighboor node i by(18)

and determine the next best sensor, say (b) in the setNs.

(2) [Nd ,C,Etot,node,Eb, k] = Greedy(Ns,Nd)(3) Loop until time runs out:(4) Prediction step and Update step of particle

filtering to estimate the target’s trajectory.(5) Update the candidate set C during the dynamic of

the target.(6) [Nd ,C′,Etot] = BranchBound(Nd ,C,Eb,node)

Algorithm 3: Tracking algorithm.

Table 1: Computational complexity of the node selection algo-rithms.

Number of desired nodes Greedy Kaplan

1 O(Na − 1) O((Na − 1)2)

2 O(Na − 2) O((Na − 2)2)

· · · · · · · · ·Nd O(Na −Nd) O((Na −Nd)

2)

Algorithm 2 shows pseudocode of an efficient implemen-tation of our branch-and-bound approach. It provides theset of desired nodes Nd, the new set of candidate nodes inthe cluster C′, and the total energy of the desired set Etot.Note that the total utility function of the desired set can beobtained from the following equation:

UTOT(Nd) = 2ErNd − ETOT(Nd), (24)

assuming that the nodes of the cluster have an evenremaining energy, that is,

Er(i) = Er ∀iεNd. (25)

Finally, in Algorithm 3 has been reported the overall trackingalgorithm which combines the node’s selection procedureswith the particle filtering algorithm.

6. Performance Evaluation

In this section, we investigate the performance of the overalltarget tracking system looking first at the node selection

Table 2: Time to process greedy and Kaplan algorithms.

Number of desired nodes Greedy Time Kaplan Time

2 6.6639e − 5 13.9816e − 4

3 7.8829e − 5 32.5238e − 4

4 1.0095e − 4 10.0543e − 3

5 1.2099e − 4 23.1352e − 3

6 1.4041e − 4 52.2764e − 3

algorithm and then at the tracking algorithm and energyconsumption.

6.1. Optimal Node Selection. In the following we compareour greedy node selection algorithm with the Kaplan algo-rithm in [8, 9]. The only difference between [8] and [9] isthat in [8] the global topology knowledge is assumed, inwhich every active node reaches the entire network, whilein [9] the only knowledge of the relative position to thetarget and the active nodes from the previous snapshot isrequired. Table 1 shows the computational complexity of theproposed node selection algorithm and the Kaplan algorithmfor each iteration. Hence, the computational complexity forall iterations is given by the following.

(i) Greedy computational complexity:∑Nd

i=0(Na − i) =NaNd +Na − (N2

d /2)− (Nd/2).

(ii) Kaplan computational complexity:∑Nd

i=0(Na − i)2 =N2

a (Nd+1)+(Nd(Nd+1)(2Nd+1))/(6)−2Na(Nd(Nd+1))/2.

Indeed, in the above analysis we have omitted thecomputational complexity of the initialization step of theSimplex algorithm, in which two nodes are chosen byexhaustive search. Definitely, due to computational com-plexity and because the simplex does not always find theglobal minimum, our approach outperforms the Kaplanalgorithm.

As stated in Section 4.1, the node selection procedureis combined with the maximization of the utility function.Hence in our analysis the computational complexity ofthe problem in (19) needs to be considered, namely,O(NdN logN) where N is the number of weights. Finally,the computational complexity for all iterations is given by∑Nd

i=1 iN logN .In Table 2 the results of a runtime measurement are

illustrated, conducted on a system with AMD OpteronXP Processor 250, approximately 2400MHz frequency, and4,00GB RAM. Table 2 provides the execution time of thenode’s selection algorithm versus the number of desirednodes using Na equal to 10 and N equal to 100.

6.2. Estimation Bound for Range-Based Tracking. In thispaper we assume as dynamic model of the target theconstant velocity model [36]. Hence, denoting by xk =[αk, αk,βk, βk]

T the state vector (coordinates along x, y axesand the velocities) of a target, the state-space model is

Page 9: AnInformation-TheoreticApproachforEnergy-Efficient

EURASIP Journal on Wireless Communications and Networking 9

Table 3: Parameters of the model used for simulations.

Parameters Scenario 1 Scenario 2

Size 20m2 200m2

velocity 0.1m/s 0.3m/s

K 9 dB 9 dB

α 3 3

Eelec 10 nJ/bit 10 nJ/bit

Eamp 100 pJ/bit/m3 100 pJ/bit/m3

TM 2 sec 2 sec

b 10 bit/sec 10 bit/sec

l 8 bits 8 bits

ΔT 1 sec 1 sec

Process variance 1.0 1.8

Observation variance 0.3 0.3

particle number 100, 500 100, 500

given by

xk+1 =

⎛⎜⎜⎜⎝

1 ΔT 0 00 1 0 00 0 1 ΔT0 0 0 1

⎞⎟⎟⎟⎠xk +

⎛⎜⎜⎜⎜⎜⎜⎜⎜⎜⎝

ΔT2

20

ΔT 0

0ΔT2

2

0 ΔT

⎞⎟⎟⎟⎟⎟⎟⎟⎟⎟⎠

wk, (26)

where vk ∼ N (0, diag(σ2x , σ2y)) denotes the motion noise and

ΔT the length of the measurement interval.Additionally, as observation model of the measurements,

we use the log-normal shadowing model [37]. Hence, let{αs,βs} be the fixed position of sensor s and let dk = ‖xk −s‖1/2 = [(αk − αs)2 + (βk − βs)2](1/2) be the distance betweenthe sensor s and the target; in a logarithmic scale the target-originated measurements are modeled by

Hk(xk) = K − 10α log(dk),

zk = Hk(xk) + Bkvk,(27)

where the measurement noise vk accounts for the shadowingeffects and other uncertainties. The noise vk is assumed tobe a zero-mean Gaussian with covariances values σ2x = σ2y =σ2o , and the sensor noises are assumed uncorrelated; K is thetransmission power, and α ∈ [2, 5] is the path loss exponent.

Consequently, a straightforward calculation of (15) gives

D11k = FTkQ

−1k Fk,

D12k = −FTkQ−1k ,

D22k = Q−1k + E

{∇xk+1H

Tk+1(xk+1)R

−1k+1 · ∇T

xk+1Hk+1(xk+1)}.

(28)

From (11), the recursion of information matrix can bewritten as

Jk+1 =(Qk + FkJ−1k FTk

)T+ E{∇xk+1H

Tk+1R

−1k+1∇T

xk+1Hk+1

},

(29)

where

∇xkHk = −10α

⎡⎢⎢⎢⎢⎢⎢⎢⎢⎢⎢⎢⎢⎢⎣

αk√‖xk − s1‖ 0βk√‖xk − s1‖ 0

αk√‖xk − s2‖ 0βk√‖xk − s2‖ 0

· · · · · · · · · · · ·αk√‖xk − sm‖ 0

βk√‖xk − sm‖ 0

⎤⎥⎥⎥⎥⎥⎥⎥⎥⎥⎥⎥⎥⎥⎦

.

(30)

Substituting (30) in (29) the recursion of information matrixis given by

Jk+1 =(Qk + FkJ−1k FTk

)−1+100α2

σo

·

⎡⎢⎢⎢⎢⎢⎢⎢⎢⎢⎢⎢⎢⎢⎣

mα2k∑mi=1 ‖xk − si‖2

0αmk β

mk∑m

i=1 ‖xk − si‖20

0 0 0 0

αmk βmk∑m

i=1 ‖xk − si‖20

mβ2k∑mi=1 ‖xk − si‖2

0

0 0 0 0

⎤⎥⎥⎥⎥⎥⎥⎥⎥⎥⎥⎥⎥⎥⎦

.

(31)

The initial information matrix required for the recursion iscalculated from the prior probability density function p(x0).We assume that the initial target state is a Gaussian randomvariable and x0 ∼ N (x0,P0). Then, if the state is Gaussianwith covariance P0, Jk can be recursively computed from theinitial condition J0 = P−10 .

6.3. Tracking Accuracy. We implemented the node’s selectionalgorithms and the particle filters in a Matlab simulator.We present simulation results for the scenarios illustratedin Table 3. Figure 3 shows the target trajectories for twodifferent velocities, equal to 0.1 and 0.3m/s, used in theexperiment.

In Figures 4 and 5, we have shown the PCRBs for theposition, meaning that the (1,1) and (3,3) elements of J−1

are considered. Furthermore, we compare the PCRB with theroot mean square errors of PF andUPF for different numbersm of active nodes. It should be noted that the empirical errorcurves for the PF and the UPF closely match the theoreticalPCRB for the problem considered. This means that the PFand the UPF appear to be efficient sequential estimators ofthe target state vector. The simulation results provide thatthe PCRB decreases as the number of active nodes increases.Note that in Figure 4(d), contrarily to the PCRB, the rootmean square error of the two filters shows a divergence fromthe expected decreasing behavior. We believe it is due tothe degeneracy phenomenon of particle filters; however, anadditional investigation is needed.

Figure 6 shows the root-mean-squared error (RMSE) onthe position of the target of different filters versus the numberof desired nodes using 100 runs. The bootstrap particle filter

Page 10: AnInformation-TheoreticApproachforEnergy-Efficient

10 EURASIP Journal on Wireless Communications and Networking

0 2 4 6 8 10 12 14 16

18

20

T = 1

T = 200

x (meters)

y(m

eters)

Actual trajectorySensor nodes

0

2

4

6

8

10

12

14

16

(a) Scenario 1: target velocity = 0.1m/s

−250

−200

−150

−100

−50

0T = 1

T = 200

x (meters)

y(m

eters)

Actual trajectorySensor nodes

−30 −20 −10 0 10 20 30 40 50

(b) Scenario 2: target velocity = 0.3m/s

Figure 3: Actual track of the target with different velocity.

0 20 40 60 80 100 120 140 160 180 2000.05

0.15

0.25

0.1

0.2

Time (seconds)

RMSE

ofprediction

(m)

(a) 3 nodes

0 20 40 60 80 100 120 140 160 180 200

Time (seconds)

RMSE

ofprediction

(m)

0.06

0.08

0.12

0.14

0.16

0.18

0.1

0.2

(b) 4 nodes

RMSE PFRMSE UPFPCRB

0 20 40 60 80 100 120 140 160 180 200

Time (seconds)

RMSE

ofprediction

(m)

0.06

0.08

0.12

0.14

0.16

0.18

0.22

0.1

0.2

(c) 5 nodes

RMSE PFRMSE UPFPCRB

0 20 40 60 80 100 120 140 160 180 200

Time (seconds)

RMSE

ofprediction

(m)

0.06

0.08

0.12

0.14

0.16

0.18

0.22

0.1

0.2

(d) 6 nodes

Figure 4: Compared tracking error versus time with target velocity = 0.1m/s.

Page 11: AnInformation-TheoreticApproachforEnergy-Efficient

EURASIP Journal on Wireless Communications and Networking 11

0 20 40 60 80 100 120 140 160 180 2000

0.5

1

1.5

2

2.5

3

3.5

4

RMSE

ofprediction

(m)

Time (seconds)

(a) 3 nodes

0 20 40 60 80 100 120 140 160 180 200

RMSE

ofprediction

(m)

Time (seconds)

0

0.5

1

1.5

2

2.5

(b) 4 nodes

0 20 40 60 80 100 120 140 160 180 200

RMSE

ofprediction

(m)

Time (seconds)

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

1.1

1.2

RMSE PFRMSE UPFPCRB

(c) 5 nodes

0 20 40 60 80 100 120 140 160 180 200

RMSE

ofprediction

(m)

Time (seconds)

RMSE PFRMSE UPFPCRB

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

(d) 6 nodes

Figure 5: Compared tracking error versus time with target velocity = 0.3m/s.

2 3 4 5 6

0.12

0.14

0.16

0.18

0.2

0.22

0.24

0.26

0.28

Number of selected nodes

RMSE

(meters)

PFDPFDSPIF

UPFDUPF

(a)

3 4 5 6

0.4

0.5

0.6

0.7

0.8

0.9

1

Number of selected nodes

RMSE

(meters)

PFDPFDSPIF

UPFDUPF

(b)

Figure 6: Performance accuracy comparison of particle filters: (a) target velocity = 0.1m/s, σo = 0.3, and σp = 1.0; (b) target velocity =0.3m/s, σo = 0.3, and σp = 1.8.

Page 12: AnInformation-TheoreticApproachforEnergy-Efficient

12 EURASIP Journal on Wireless Communications and Networking

2 3 4 5 6

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Number of selected nodes

Energy

consumption(J)

GreedyKaplan

(a) Energy consumption of Kalpan and Greedy algorithms versusnumber of nodes

0.2 0.3 0.4 0.5 0.6

0.1

0.2

0.3

Energy consumption (J)

RMSE

(meters)

PFUPF

DPFDUPF

(b) RMSE versus Energy consumption for different tracking algorithmsusing Greedy selection

Figure 7: Energy consumption comparison.

and the unscented particle filter have been implementedin both centralized and distributed manner using the nodeselection rules. The performance of the distributed PF(DPF) and distributed UPF (DUPF) is compared with theperformance of the distributed sigma-point informationfilter (DSPIF) from [4]. Confidence intervals are not shownfor the sake of clarity.

In Scenario1, nodes are randomly deployed on an area of20m× 20m and the target speed is 0.1m/s (see Figure 3(a)).In Figure 6(a) a process variance σp equal to 1.0 has beenused for the trajectory 3(a). Clearly, the centralized filter PFoutperforms the distributed filter DPF in tracking qualitybecause in the distributed algorithms nodes only have localknowledge. Also the RMSE of DUPF is always larger thanthat for UPF. On the other hand, as we will show, the energyconsumption is higher for the centralized approach. Finally,DPF and DUPF outperform DSPIF.

In Scenario2, nodes are randomly deployed on an areaof 200m × 200m and the target speed is 0.3m/s (seeFigure 3(b)). Figure 6(b) illustrates the root-mean-squarederror (RMSE) on the position of the target, depending on thenumber of active nodes in the network. Figure 6(b) showsthe RMSE for a process variance σp equal to 1.8. Again theunscented particle filter with 100 particles gives best resultsthan the bootstrap particle filter using 100 particles as it isclear in Figure 6(b). Simulation results indicate a decreasein tracking performance with increase of noise and fasttarget movement. Note that, in Figure 6(b), the values ofthe error when the number of desired nodes is equal twoare omitted because in this case the filter diverges. Othersimulation results that we have not reported, with targetvelocity equal to 0.5 and 1.0m/s, show that to estimate thetrack when the velocity increases a high number of anchornodes are needed. For each value of Nd, 10000 differentrandom configurations were generated, where, for eachconfiguration, we assume a maximum range between nodeand target equal to 30meters, and amaximum range betweennode and cluster head equal to 10 meters. The DPF andDUPF computational complexity is given by O(N3), while

the Kaplan computational complexity is given by O(N2) asthe Kalman filter has been used. Particularly, the time toprocess the bootstrap particle filter with 100 and 500 particlesis equal to 1,605 seconds and 8,052 seconds, respectively, withthree active nodes, while the time to process the unscentedparticle filter with 100 particles is equal to 3,281 seconds. Inconclusion, the UPF is less computational efficient than thePF but performs a more accurate estimation of the target’sposition compared to the UPF.

6.4. Energy Consumption. Figure 7 shows the energy con-sumption of node selection algorithms. In Figure 7(a), wecompare the energy consumption of the proposed greedyalgorithm and Kaplan algorithm as the number of selectednodes increases, using the the residual energy-based metricsdefined in (3). Simulation results indicate an increase ofthe energy consumption with growing number of nodes.We highlight that the rise of the greedy algorithm energyconsumption is superlinear using the energy-based metricintroduced by Heinzelman in [10] while the rise is linearusing our proposed residual energy-based metric. Defini-tively can be concluded that the greedy selection algorithmoutperforms the Kaplan selection algorithm to select the sen-sors that would give the most prolonged life to the network.In Figure 7(b), RMSE versus energy consumption of PF, DPF,UPF, and DUPF algorithms using greedy selection has beenshown.

In conclusion, the energy consumption increases withthe number of active nodes; on the other hand the trackingerror decreases as the the number of active nodes increases. Atradeoff between the performance and the number of nodesis needed to save energy.

7. Conclusion

The focus of the article was the energy-efficient andcollaborative target tracking in wireless sensor networks.The tracking problem was formulated as a cross-layeroptimization with the aim of maximizing the total utility

Page 13: AnInformation-TheoreticApproachforEnergy-Efficient

EURASIP Journal on Wireless Communications and Networking 13

function in the cluster. The node selection procedures wereintegrated into a particle filter and tested on simulateddata. The optimal greedy-based algorithm was extended atthe real scenario to consider the energy consumption overmore measurement intervals. A lower bound was also intro-duced. The experiments indicate that the proposed approachoutperforms the existing algorithms in literature. Extensivesimulations showed that the target tracking system yieldsgood accuracy for lower velocity of the target. The trackingperformances get worse as the noise and the target velocityincrease. The bootstrap particle filter and the unscentedparticle filter for the centralized and distributed schemeand the distributed sigma-point information filter [4] havebeen implemented and the accuracies have been compared.Furthermore, we have presented a closed-form derivationof PCRB as a performance criterion, eliciting the influenceof the number of active nodes, the channel parametersand the model parameters. The formula has been derivedand the tracking protocol has been evaluated for lineardynamic’s models and for a nonlinear Gaussian observation’smodel. Finally, in this study we assumed an intra-clustercommunication and limited ourselves to consider a singlecluster in which an even energy consumption by the sensornodes has been assumed. Future work is investigating theimplementation of algorithms to report tracking samples tomultiple cluster heads.

Acknowledgement

The author would like to thank Professor Ian Akyildiz for thehelpful suggestions.

References

[1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci,“Wireless sensor networks: a survey,” Computer Networks, vol.38, pp. 393–422, 2002.

[2] A. T. Ihler, J. W. Fisher III, R. L. Moses, and A. S. Willsky,“Nonparametric belief propagation for self-localization ofsensor networks,” IEEE Journal on Selected Areas in Commu-nications, vol. 23, no. 4, pp. 809–819, 2005.

[3] J. Lee, K. Cho, S. Lee, T. Kwon, and Y. Choi, “Distributedand energy-efficient target localization and tracking in wirelesssensor netwoks,” Computer Communications, vol. 29, pp.2494–2505, 2006.

[4] T. Vercauteren and X. Wang, “Decentralized sigma-pointinformation filters for target tracking in collaborative sensornetworks,” IEEE Transactions on Signal Processing, vol. 53, no.8, pp. 2997–3009, 2005.

[5] D. Estrin, R. Govindan, J. Heidemann, and S. Kumar, “Nextcentury challenges: Scalable coordination in sensor networks,”in Proceedings of 5th ACM/IEE International Conference onMobile Computing and Networking (MobiCom ’99), pp. 263–270, Seattle, Washington, August 1999.

[6] E. Ertin, J. W. Fisher, and L. C. Potter, “Maximum mutualinformation principle for dynamic sensor query problems,”in Proceedings of the International Workshop on InformationProcessing in Sensor Networks (IPSN ’03), pp. 405–416, PaloAlto, Calif, USA, April 2003.

[7] H. Wang, G. Pottie, K. Yao, and D. Estrin, “Entropy-basedsensor selection heuristic for target localization,” in Proceedingof the 3rd International Symposium on Information Processingin Sensor Networks (IPSN ’04), pp. 36–45, Berkeley, Calif, USA,April 2004.

[8] L. M. Kaplan, “Global node selection for localization in adistributed sensor network,” IEEE Transactions on Aerospaceand Electronic Systems, vol. 42, no. 1, pp. 113–135, 2006.

[9] L. M. Kaplan, “Local node selection for localization in adistributed sensor network,” IEEE Transactions on Aerospaceand Electronic Systems, vol. 42, no. 1, pp. 136–146, 2006.

[10] W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrish-nan, “Energy-Efficient Communication Protocol forWirelessMicrosensor Networks,” in Proceedings of 33rd Hawaii Inter-national Conference on System Sciences (HICSS ’00), Maui,Hawaii, January 2000.

[11] L. Arienzo and M. Longo, “Energy-efficient tracking strategyfor wireless sensor networks,” in Proceeding of the 5th IEEEInternational Conference on Mobile Ad-Hoc and Sensor Systems(MASS ’08), pp. 595–602, Atlanta, Ga, USA, September 2008.

[12] H. T. Kung and D. Vlah, “Efficient location tracking usingsensor networks,” in Proceedings of the IEEE Wireless Commu-nications & Networking Conference (WCNC ’03), March 2003.

[13] C.-Y. Lin and Y.-C. Tseng, “Structures for in-network movingobject tracking in wireless sensor networks,” in Proceedingof the 1st International Conference on Broadband Networks(BroadNets ’04), pp. 718–727, October 2004.

[14] W. Zhang and G. Cao, “DCTC: dynamic convoy tree-basedcollaboration for target tracking in sensor networks,” IEEETransactions on Wireless Communications, vol. 3, no. 5, pp.1689–1701, 2004.

[15] W. Zhang and G. Cao, “Optimizing tree reconfiguration formobile target tracking in sensor networks,” in Proceedings ofthe 23rd Annual Joint Conference of the IEEE Computer andCommunications Societies (INFOCOM ’04), vol. 4, pp. 2434–2445, 2004.

[16] Q. Wang, W.-P. Chen, R. Zheng, K. Lee, and L. Sha,“Acoustic target tracking using tiny wireless sensor devices,”in Proceedings of the International Workshop on InformationProcessing in Sensor Networks (IPSN ’03), pp. 642–657, 2003.

[17] W.-P. Chen, J. C. Hou, and L. Sha, “Dynamic clustering foracoustic target tracking in wireless sensor networks,” IEEETransactions on Mobile Computing, vol. 3, no. 3, pp. 258–271,2004.

[18] J. Liu, J. Reich, and F. Zhao, “Collaborative in-networkprocessing for target tracking,” EURASIP Journal on AppliedSignal Processing, vol. 2003, no. 4, pp. 378–391, 2003.

[19] F. Zhao, J. Shin, and J. Reich, “Information-driven dynamicsensor collaboration for tracking applications,” IEEE SignalProcessing Magazine, vol. 19, no. 2, pp. 61–72, 2002.

[20] C. M. Kreucher, A. O. Hero, K. D. Kastella, and M. R.Morelande, “An Information-based approach to sensor man-agement in large dynamic networks,” Proceeding of IEEE, vol.95, pp. 978–999, 2007.

[21] W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan,“An application-specific protocol architecture for wirelessmicrosensor networks,” IEEE Transactions on Wireless Com-munications, vol. 1, no. 4, pp. 660–670, 2002.

[22] J. H. Chang and L. Tassiulas, “Energy conserving routing inwireless ad-hoc networks,” in Proceedings of the 19th AnnualConference on Computer Communications (INFOCOM ’00),vol. 1, pp. 22–31, Tel Aviv, Israel, March 2000.

Page 14: AnInformation-TheoreticApproachforEnergy-Efficient

14 EURASIP Journal on Wireless Communications and Networking

[23] I. Stojmenovic and X. Lin, “Power-aware localized routingin wireless networks,” IEEE Transactions on Parallel andDistributed Systems, vol. 12, no. 11, pp. 1122–1133, 2001.

[24] H. Van Trees, Detection, Estimation, and Modulation Theory,Part I, John Wiley & Sons, New York, NY, USA, 1968.

[25] P. Tichavsky, C. H. Muravchik, and A. Nehorai, “Posteriorcramer-rao bounds for discrete-time nonlinear filtering,” IEEETransactions on Signal Processing, vol. 46, no. 5, pp. 1386–1396,1998.

[26] A. Doucet, N. De Freitas, and N. Gordon, Sequential MonteCarlo Methods in Practice, Springer, London, UK, 2001.

[27] N. J. Gordon, D. J. Salmond, and A. F. M. Smith, “Novelapproach to nonlinear/non-Gaussian Bayesian state estima-tion,” IEE Proceedings-F, vol. 140, no. 2, pp. 107–113, 1993.

[28] M. S. Arulampalam, S. Maskell, N. Gordon, and T. Clapp, “Atutorial on particle filters for online nonlinear/non-GaussianBayesian tracking,” IEEE Transactions on Signal Processing, vol.50, no. 2, pp. 174–188, 2002.

[29] Y. Bar-Shalom, X. R. Li, and T. Kirubarajan, Estimation withApplications to Tracking and Navigation, John Wiley & Sons,New York, NY, USA, 2001.

[30] A. H. Jazwinski, Stochastic Processes and Filtering Theory,Academic Press, New York, NY, USA, 1970.

[31] R. Van der Merwe, A. Doucet, N. De Freitas, and E. Wan, “Theunscented particle filter,” in Advances in Neural InformationProcessing Systems, pp. 548–590, 2000.

[32] D. Guo and X. Wang, “Dynamic sensor collaboration viasequential Monte Carlo,” IEEE Journal on Selected Areas inCommunications, vol. 22, no. 6, pp. 1037–1047, 2004.

[33] C. H. Papadimitriou and K. Steiglitz,Combinatorial Optimiza-tion: Algorithms and Complexity, Prentice-Hall, EnglewoodCliffs, NJ, USA, 1982.

[34] T. A. Feo andM. G. C. Resende, “Greedy randomized adaptivesearch procedures,” Journal of Global Optimization, vol. 6, no.2, pp. 109–133, 1995.

[35] W. L. G. Koontz, P. M. Narendra, and K. Fukunaga, “Abranch and bound clustering algorithm,” IEEE Transactions onComputers, vol. 24, no. 9, pp. 908–915, 1975.

[36] L. Arienzo, Energy-efficient target tracking through wirelesssensor networks. Cross-layer design and optimization, Ph.D.thesis, School of Electrical and Information Engineering,University of Salerno, Salerno, Italy, March 2008.

[37] T. S. Rappaport, Wireless Communications: Principles andPractice, Prentice Hall, Englewood Cliffs, NJ, USA, 2ndedition, 2001.