2011
DOI: 10.4236/wsn.2011.34014
|View full text |Cite
|
Sign up to set email alerts
|

Classification of Object Tracking Techniques in Wireless Sensor Networks

Abstract: Object tracking is one of the killer applications for wireless sensor networks (WSN) in which the network of wireless sensors is assigned the task of tracking a particular object. The network employs the object tracking techniques to continuously report the position of the object in terms of Cartesian coordinates to a sink node or to a central base station. A family tree of object tracking techniques has been prepared.In this paper we have summarized the object tracking techniques available so far in wireless … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2013
2013
2025
2025

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(15 citation statements)
references
References 8 publications
0
15
0
Order By: Relevance
“…With equal responsibility, each sensor independently observes, processes and transmits the monitored data to the sink node (Fayyaz, 2011). Under this centralized approach, the sink node solely undertakes the heavy computation tasks related to tracking and localizing the monitored objects (Sarna and Zaveri, 2010).…”
Section: The Naïve Architecturementioning
confidence: 99%
“…With equal responsibility, each sensor independently observes, processes and transmits the monitored data to the sink node (Fayyaz, 2011). Under this centralized approach, the sink node solely undertakes the heavy computation tasks related to tracking and localizing the monitored objects (Sarna and Zaveri, 2010).…”
Section: The Naïve Architecturementioning
confidence: 99%
“…Target tracking in WSN can be mainly classified into two categories [3]. Hierarichal and peer to peer networks.…”
Section: Classification Of Target Tracking Methodsmentioning
confidence: 99%
“…In [24], the authors proposed a secure localization scheme to defend against some typical attacks that may affect target tracking accuracy. More target tracking protocols can be found in [25,26].…”
Section: Related Workmentioning
confidence: 99%