Affiliation:
1. Department of Computer Science, Princess Sumaya University of Technology, 1438 Al-Jubaiha, Amman, Jordan
Abstract
Background:
In the last decade, with the advancement of big data technology and the
internet of things, Wireless Sensor Networks (WSN) have become fundamental for the success of
a different range of applications especially those demanding massive data processing.
Objective:
This paper investigates several tracking methods to introduce a novel cluster-based target
tracking analysis model.
Methods:
Some crucial factors of the cluster-based routing protocols are demonstrated, and a
comparison among these different methods is conducted according to our taxonomy, such as cluster
formation, predicate/proactive, target speed, single or multi-object tracking, boundary problem,
scalability, energy efficiency, and communication cost. This can help the community of researchers
by providing clear information for further study.
Results and Conclusion:
The proposed paper compares the differences and similarities between
the available approaches across different categories in terms of the cluster construction, clustering
method, object speed, number of objects, boundary problem, and scalability. Finally, we can recognize
some open issues that have so far gained little attention or are unexplored yet.
Publisher
Bentham Science Publishers Ltd.
Subject
Electrical and Electronic Engineering,Control and Optimization,Computer Networks and Communications,Computer Science Applications
Reference41 articles.
1. Abbasi A.A.; Younis M.; A survey on clustering algorithms for wireless sensor networks. Comput Commun 2007,30(14-15),2826-2841
2. Al-Karaki J.N.; Kamal A.E.; Routing techniques in wireless sensor networks: A survey. IEEE Wirel Commun 2004,11(6),6-28
3. Biswas S.; Das R.; Chatterjee P.; 2018,Springer,411-421
4. Priller P.; Entinger A.; Berger A.; inventors; AVL List GmbH, assignee. Method for reconstructing a data packet incorrectly received in a wireless sensor network. United States patent US 10,193,572 2019 Jan 29
5. Bhatti S.; Xu J.; Fifth International Conference on Wireless and Mobile Communications 2009; IEEE,110-115
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Cryptographic Solutions;Advances in Information Security, Privacy, and Ethics;2024-06-30
2. Mitigating DDoS Attacks in Cloud Computing Environments: Challenges and Strategies;2023 International Conference on Electrical, Computer and Energy Technologies (ICECET);2023-11-16
3. Efficient Email phishing detection using Machine learning;2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC);2022-01-26
4. Commiteam: Committee Management System;2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC);2022-01-26
5. Privacy and Security in Mobile Health Technologies: Challenges and Concerns;2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC);2022-01-26