GLT: Grouping Based Location Tracking for Object Tracking Sensor Networks

. The use of wireless sensor networks (WSN) in tracking applications is growing rapidly. In these applications, the nodes detect, monitor, and track a target, object, or event. In this paper, we consider the problem of tracking mobile objects in wireless sensor networks (WSN). We present a novel tracking model, named Grouping based Location Tracking (GLT), scaling well with the number of nodes and the number of mobile objects. GLT is based on the Grouping Hierarchy Structure, GHS. In GHS, nodes are partitioned into groups (not clusters) according to their maximum covered region (MCR) such that each group contains a number of nodes and a number of leaders. GLT consists of two tiers. The first tier, which is called the Notification Tree (NT), enhances the activation mechanism, the data cleaning mechanism, and the energy balancing mechanism. On the other hand, the second tier, which is called the Hierarchical Spanning Tree (HST), supports the data reporting mechanism and the lifetime prolonging mechanism. Simulations results show that GLT reduces the communication node selections overhead without diminishing object tracking accuracy and achieves a significant energy consumption reduction and network lifetime extension compared with the state-of-the-art approaches.


Introduction
In contrast to sophisticated surveillance technologies such as RADARS, which are in fact reliable, robust, and accurate but expensive, WSN enable a cheap technology which do not rely on any centralized infrastructure [1,2].WSN is a collection of nodes, which are of low cost, low power, and small size, carrying out the task of sensing, performing simple data processing, and communicating wirelessly over a short distance.The node contains three main subsystems: (1) the sensing subsystem contains one or more physical sensor devices and one or more analog-to-digital converters as well as the multiplexing mechanism to share them.(2) The processing subsystem executes instructions pertaining to sensing, communication, and self-organization.(3) The communication subsystem contains the transmitter and receiver for sending or receiving information [3][4][5].
Location tracking has many applications in our daily life in different areas, for example, military intrusion detection, vehicular networks, and habitat monitoring [6].These applications must periodically collect the sensory data (locations, velocities, and trajectories) and use it to reconstruct the overall status of the monitored area through data aggregation.When the sensor nodes detect an event, they record it and rely on a distributed routing protocol to send the relevant information toward a base station or sink.The target events must be detected with an acceptable degree of accuracy.In addition, the event report should be received by the sink in a very short time, especially for time-critical events [7].
In object tracking sensor networks, power consumption is a key issue, which directly affects network lifetime.The power can be conserved in object tracking sensor networks by switching a sensor node to sleep when there is no object in the node's sensing range and turn on a sensor node when an object is to enter the node's sensing range [8].Energy conservation can be achieved using different methods: prediction and nonprediction [1].In prediction-based
In case of prediction-based tracking [9][10][11], the next location of mobile object is calculated using distributed structure or using the historical data or the information of object.During each defined time step, only some nodes near the predicted location are activated while the other nodes stay in sleep mode to save energy.Different approaches with different types of measurements have been used in target tracking systems, such as Angle of Arrival (AOA), Received Signal Strength (RSS), Time of Arrival (TOA), and the Time Difference of Arrival (TDOA).Additionally, Variational Filter (VF), Kalman Filter, Extended Kalman Filters (EKF) [9], Distributed Kalman Filter, Particle Filter, and data mining [10,11] are the most commonly used models to predict the next location of object.
The prediction-based models have a shortcoming such as missing the trajectory of object and the predictions may not be entirely correct.This leads to loss of object, and large amount of energy may be wasted in the recovery mechanism for the object.In tree-based target tracking [17][18][19][20], nodes in a network organized in a hierarchical tree or represented as a graph in which vertices represent sensor nodes and edges link between nodes that can directly communicate with each other.Scalable Tracking Using Networked Sensors (STUN) [17] is a tree-based tracking algorithm that scales well to large numbers of sensors and moving objects by using hierarchy.It utilizes drain-and-balance (DAB) method to build an efficient tracking hierarchies implemented in 1D and 2D sensor network topologies.The total communication cost of STUN is reduced in [18] by extending the location part.In [19] the authors improved about 9.9% of energy consumption compared with shortest path tree (SPT).They utilized heuristic object tracking algorithm that formulates the problem as 0/1 integer programming.STUN has a drawback; the drainand-balance tree does not replicate physical sensor network as it is in the logical tree; hence an edge may consist of multiple communication hops.
In cluster-based tracking [12][13][14][15]21], the nodes are organized into clusters, with each cluster consisting of a cluster head (CH) and several neighboring sensors (members).The cluster-based tracking is further divided into static clusterbased tracking and dynamic cluster-based tracking.In static cluster-based target tracking, the clusters are formed when the nodes are deployed and the clustering nodes and CHs are defined before target tracking.However, in the dynamic clustering, the sensor nodes are from different clusters at different times according to the movement of the target.Clustering-based networks suffer from more traffic due to cluster members and cluster heads intercommunication.Additionally, more energy will be dissipated when the nodes, which belong to multiple clusters, detect one target.This leads to redundant data transmissions from cluster heads to the sink.This issue is avoided in [12] (CAICS) and this is why it archives better energy saving compared to DLC [13,14] and HMC [15,21].In DLC, the packets are transmitted to the sink over a long distance since each cluster head aggregates the sensed data from its cluster members and directly transmits it to the sink.This issue is managed in HMC; HMC adopts a hierarchical cluster heads model and the data can be transmitted to the sink hop by hop through multiple intermediate cluster heads.In [12] a coordinated and adaptive information collecting strategy (CAICS) for target tracking WSN is proposed.CAICS uses a joint distance weighted measurement to estimate the information utility of sensing nodes.CAICS achieves a very good performance in terms of number of control packets and energy saving.However, due to the frequent selection of aggregation node in CAICS, the transmission delay is increased as the number of nodes increases.In addition, when the velocity of the target is getting higher the transmission delay in CAICS will be increased.

Proposed GLT Model
GLT is a tree-based tracking model.It consists of two tiers.The first tier, the activation zone (Notification Tree), enhances the activation mechanism, data cleaning mechanism, and the energy balancing mechanism.The second tier is called Hierarchical Spanning Tree.It supports data reporting mechanism and lifetime prolonging mechanism.The first and second tiers are based on the GHS [16].Before going any further, we first explain GHS, which is explained comprehensively in [16].
Definition 1 (neighbor list).For any node   ∈ , its neighbor list is defined as a set of nodes nl(  ) = {  |   ∈  and √(   −    ) 2 + (   −    ) 2 <   +   }, where   and   are the sensing ranges for   and   , respectively;  is the set for all sensor nodes in the network.nl() = {nl(  ) |   ∈ } is an array of neighbor lists.Definition 2 (group).A set of nodes, noted as   = { 0 , . . .,   } ∀  ∈ , is said to be a group of size  (i.e., contains  nodes) if and only if   = { 0 , . . .,   } occurs exactly  times as a subset in the array nl().The array of all groups in the network is denoted by  * .For example, the six nodes in Figure 2 are partitioned into three groups Definition 3 (associated groups).The associated groups for   are defined as a set of groups  * (  ) = {  |   ∈  * and   ∈   }.For example, in Figure 2, the associated groups for each node are

Activation Zone Model.
Given a set of mobile objects   = { 0 ,  1 ,  2 , . . .,   }; at a given time, each   ∈   moves in the field randomly and should be tracked by one node   ∈ .To continuously track   , the node   set up an activation zone (Notification Tree).This tree is rooted at   and contains all nodes in  * (  ).The nodes in  * (  ) are partitioned into subtrees and these subtrees are attached to the Notification Tree NT(  ).The nodes in  * (  ) are partitioned into subtrees as follows: given graph   = (  ,   ), where   = {  |   ∈  * (  )} and   ⊆ [  ] 2 , take   as cut vertex in  3.1.3.Object Tracking Model.We define three states for each node: active, idle, and sleep.In active state, the node collects the sensory data and reports it to the aggregation node, while in idle state, the node gets ready to track object and waits for an activation from the currently selected proxy node.In the sleep state, no sensory data could be collected.We assume that the nodes support two types of messages (i.e., control packets): (1) INSERT control packet: this control packet is sent from the currently selected proxy node (the node that detects the object).The main role of this control packet is to let the receiver nodes change their state from sleep to idle and be ready for the object when the object crosses their sensing ranges.The other role of this control packet is to let all nodes in the activation zone know that there is a proxy node that has been selected, and they should not be activated until the proxy node send them DELETE packet.(2) DELETE control packet: this control packet is sent from the proxy node to let the nodes in its NT know that the object is out of its range currently, and one of NT nodes should be selected as a new proxy node.All the receiver nodes should change their state from idle to sleep excluding the new selected proxy node.We consider that any   ∈   has only one proxy node   ∈  at any given moment.When the object   moves in -V area ( > 1,  ∈ Z), the proxy node can be selected upon three main parameters: (1) the residual energy of node (i.e., the node with more energy wins), (2) the distance to object (i.e., the nearest node wins), and (3) the current state of node (i.e., busy or free).For   ∈ , we assume that it has a Sensed Objects Table denoted by SOT(  ) to save the information of the sensed object (i.e., current position, image, etc.) and a Notifications Messages Table denoted by NMT(  ) to store the notification sent/received to/from other nodes (see Figure 3).When   ∈   is detected by   ,   will create a new entry in SOT(  ) for   if and only if   has no notification record received from other   ∈  * (  ).When   creates a new entry in SOT(  ) it will send an INSERT notification message to its activation zone  * (  ) via its Notification Tree NT(  ).  will notify all nodes in its activation zone and ask them to add the notification message to their NMT tables; hence the other nodes in  * (  ) will not sense   until   sends a DELETE notification message indicating that   has gone out of its range.After receiving DELETE, all nodes in  * (  ) will delete the notification messages and   will enter any other node in  * (  ).The tracking model is explained in the main objectives of NT below.

First Tier:
The Notification Tree.In this subsection, we introduce the first tier of GLT.We first explain how to build the NT and then explain its main goals.Note that each vertex is a group of nodes according to Definition 2. Let the vertex set of subgraph  , be denoted by  , ; the process to build the subtree  , for the subgraph  , is as follows:

Notifications Message Table
(1) Select a vertex V min ∈  , with the minimum degree ( , ).
(2) Assume that V min = { 0 ,  1 , . . .,   }.Select a node   ∈ V min ( ≤ ,   is not a leader) to be the root of  , and then link them; that is, if we select  0 to be the root then the linking operation will be as follows:  0 is the parent of  1 ,  1 will be the parent of  2 , . .., and  −1 will be the parent of (3) Select a leader node   from V min and then link it to the tail of   : If   is empty then   will be the root node of  , .
(4) Mark V min as visited.Then select V  as an incident of V min such that   ∈ V  and   ∈ V min .
(5) Repeat the steps from ( 2) to (4) for V  until all nodes are marked.
The main objectives of NT are as follows.
(1) Activation Mechanism.In GLT, the activation zone is the nodes in the NT only.When any object   ∈   moves within the range of   ∈ , all nodes in NT(  ) will be in idle state except   that will be in active state.That is to say, the root of NT(  ) (namely,   ) will be in active state, while the other nodes will be in idle state.When   moved out the range of   , it will move to one node, say   , in NT(  ).  will be selected as new proxy node and will be activated by the last proxy   , while the other nodes in NT(  ) will be in the idle state.After selecting   as proxy node,   will be tracked by NT(  ).Unlike GLT, in the predictionbased protocols [1,8], the previous active nodes predict the activation zone in which not all nodes can detect the target but only a subset of them.On the other hand, in the nonprediction-based protocols which define a schedule or a plan for nodes activation and/or sleeping, following the object trajectory, some of the nodes are woken up to execute the sensing and the communication tasks for a scheduled time, and then they change their states to the sleep state.Both of prediction-based protocols and nonprediction-based protocols may contain some prediction errors that may lead to more energy dissipation.Although a recovery mechanism is provided [10], the recovery mechanism consumes much energy.In GLT, there is no need for recovery mechanism since the NT is not prediction based.
(2) Data Cleaning Mechanism.NT provides a dynamic data cleaning mechanism by avoiding the redundant sensed data.
When the proxy node is selected, it will send an INSERT message to its children and its children will pass the message to their children downward until all nodes in the activation zone are notified and change their state to idle.However, when the nodes received the message, they will get ready for the mobile target and will not start sensing and collecting the location of the target.When the target goes out the range of current proxy, the proxy node will send a DELETE notification to all nodes in the activation zone (the nodes in the NT of the current proxy).When any node received a DELETE notification, it will not execute the DELETE command immediately.Nevertheless, it will check first whether the object is currently in its range.When the object moves in -V area ( > 1,  ∈ Z), the proxy node can be selected upon three main parameters: the residual energy of node (i.e., the node with more energy wins), the distance to object (i.e., the nearest node wins), and the status of the node (i.e., busy or free).
(3) Energy Balancing Mechanism.When there is a notification message (i.e., INSERT, DELETE) to be sent from   to its associated groups (i.e., activation zone  * (  )),   will not send it to all nodes in  * (  ) separately.However,   sends the notifications to its children in NT(  ).Additionally, the needed energy per notification will be distributed among all the nodes in  * (  ).To clarify the importance of the Notification Tree, we use the First-Order Model [16] to evaluate the consumed energy by each node during intercommunications.The First-Order Model is explained in (see [16] for symbols used in the equations) When   has a notification to be sent to  * (  ), without using NT, it will dissipate the energy of   according to (2).  is the total energy needed to send the notifications message to all nodes in  * (  ).In (2),   is consumed by node   : where | * (  )| is the number of nodes in  * (  ).By using NT, the energy, which is needed to let all nodes in  * (  ) know that   detects the object, is distributed among the nodes in  * (  ) as shown in (3)

The Second Tier: The Hierarchical Spanning Tree (HST).
In this section, we explain the second tier of GLT, which is called Hierarchical Spanning Tree (HST).The data reporting mechanism and the lifetime prolonging mechanism are the two main objectives of this tier.The first tier achieves data collection process.However, the length of the first tier is not enough to reach the sink due to the limited height of NT.On the contrary, the height of HST expands to reach all nodes in the network.Nevertheless, the NT tree plays an important role in the data reporting mechanism; NT excludes the nodes, which have lower energy than threshold; this is an important role, which enhances the lifetime prolonging mechanism of HST.We first show how to construct the HST; second, we explain the reporting mechanism using HST.Finally, we show how HST and NT cooperate to achieve network lifetime prolonging.
(1) Construction Process of HST.Here we explain how to use the Notification Tree and Notification Spanning Tree to build the Hierarchical Spanning Tree (HST); see Figure 4.The process of building HST tree is based on NT.For the convenience, let HST = { 0 ,  1 ,  2 , . . .,   } be the levels of the tree, 1 ≤  ≤ /2, where  = || is the number of nodes in the network.Each level contains a set of nodes such that   = { 0 ,  1 , . ..}.We assume that the root node (sink node) is located in the first level of the tree; for example, in Figure 4,  0 = { 15 }.For the nodes already existing in HST we mark them by AIT.The process of building of HST tree runs from the sink to the leaves (top-down) as follows.
(1) For the root node, it will be added to  0 = {  }, and then for each node in the Notification Tree NT(  ) = {  →  +0 →  +1 → ⋅ ⋅ ⋅ }; if  + is not marked by AIT, then add  + to  1 and  + will be a child of   .For example, in Figure 4,  0 = { 15 }, NT( 15 ) = {15 → 14 → 16 → 17 → 27 → 25 → 13} (all nodes in NT( 15 ) are not marked by AIT; thus, all of them will be added to  1 , and  15 will be the parent of them).( 2) For the other nodes in other levels, the processing method is the same as the first level.The only difference is that the first level contains only a node, namely, the root.
(2) Data Reporting Mechanism Using HST.In GLT, NT aggregates the data and the proxy node will start the forwarding process.Any node in the path from the proxy to the sink forwards the collected data to its parent in HST or its parent in NT.The parent in HST is the default.If the energy of the parent in HST is greater than the threshold value, then the parent in HST is selected.Otherwise, the parent in NT is selected (see Algorithm 1).
(3) Lifetime Prolonging Mechanism.From GLT structure, each node may have two parents; one parent for NT and the other for HST.The routing mechanism is based on HST tree and NT tree; two of them are working together in order to maximize the lifetime of the network.Although the main task of NT is to avoid the data redundancy and duplication, it plays an important role in maximizing the lifetime of network.
When the HST parent of the reporter node has a lower power (i.e., lower than the threshold value), the reporter node should switch its parent according to the switch-operation.
The switch-operation of the parent is managed by NT, which is entirely based on the remaining energy of the nodes in NT.The node with the greatest energy will be selected as parent for the reporter node.For example, in Figure 4, NT will switch the routing path from node 10 to node 20 if node 8 is busy or it has a lower battery power.
The HST is the default tree for reporting the data to the sink; however, it should be updated according to energy distribution and consumption requirements.The energy threshold value for the nodes in NT will be reduced per switch-operation.With the assistance of NT, the nodes in HST consume their energy as evenly as possible (see Algorithm 2).

The 𝑘-Covered Regions.
To analyze the GLT, we assume that the nodes are deployed systemically (i.e., using the deployment methods in [3,4]).With considering that in all nodes deployment schemes there will be regions covered by more than one node, such regions are called -V regions (covered by  nodes).Without managing internotification between the nodes, the -V regions will be monitored by multiple nodes, which lead to duplicated packets.For example, in Figure 5(b), suppose the object is appearing in the region marked as 4-V, which means the four nodes will sense and report the same data for the same object in the same region.NT provides a solution to avoid the packet duplication and data redundancy.Nevertheless, sometimes it sends unnecessary notifications.The number of INSERT notification messages depends on the number of -V regions, so here we can find the number of -V regions where  = 0, 1, 2, . ..; here  is the number of sensors in a group.A group   ∈  * contains (  ) = 1+(−1) regions (e.g., Figure 5(a)).We can count (  ) easily by considering the number of regions in   with no repetition; that is to say, among (  ) there will be one area which is -V,  areas are 1-V,  areas are 2-V . .., and  areas are  − 1 V.Let  , be the notation for -V region in (  ) and let Φ( , ) be the number of  , in (  ).Then Φ ( , ) = , where ( − 1 ≥  ≥ 1) . Thus, Furthermore, among (  ∈   ) there will be one area which is -V, 1 area is 1-V, 2 areas are 2-V, 3 areas are 3-V . .., and  − 1 areas are  − 1 covered; for example, see Figure 5(b).We denote to the -V regions in the range of node   by  , ( ≥ 0), and let ( , ) be the number of  , regions; then for any   ∈   , ( , ) = , where ( − 1 ≥  ≥ 0).We can obtain that ( 0, ) = 0 and ( , ) = 1.It is easy to see that Therefore, we can get number of regions (  ∈  * (  )), where  * (  ) is the set of associated groups of   such that Any object   ∈  moves in a group   ∈  * ; its location should be detected within the group range with respect to  the probability space Ω(  ∈  * ) = { 1, ,  2, , . . .,  , }.However, any object   ∈  moves in the range of node   ∈  * (  ); its location should be detected with respect to the probability space Ω(  ∈  * (  )) = { 1, ,  2, , . . .,  , }.For networks deployment using [3], Ω(  ∈  * (  )) = { 1, ,  2, ,  3, }.The Maximum Coverage Efficiency is shown in (9), while the Minimum Coverage Redundancy is shown in (10).

Optimal Coverage Pattern for NT and HST.
The size of NT is strongly related to the number of groups while the number of groups is related to the deployment pattern of network.In what follows, we will find the number of groups that can be created by  = || nodes.For the convenience, let   be a group that contains  nodes.We define the plug operation     ( ≥  > 0) as follows:   : a group of  nodes;  : plugging a new node to   .The new node should cross any -V region in the group   .The results of plug operation     ( ≥  > 0) are expressed as shown in (12).Figure 6(a) shows the set of patterns for  = 1, 2, 3, 4, while Figure 6(b) shows  3  .
The average communication cost of HST for the network that contains 1, 2, 3, . . .,  nodes is A() = G()/Ψ().Any network of  nodes ( > 1) randomly or systemically deployed will match one pattern of the patterns sets () (Ψ() is the number of all possibilities of nodes deployments).Since the number of hops depends on the number of groups of each pattern G() (the nodes of any group can communicate with only one hop), then the average communication cost of the network, obviously, is A() = ⌊G()/Ψ()⌋.Figure 7 shows the number of groups and patterns for network of size  = (1, 13).In GHS, the deployment pattern of network plays an important role in terms of energy consumption and balancing.Both of HST and NT are based on GHS.To demonstrate the impact of deployment pattern, the relation between the number of deployment patterns and the energy consumption levels is shown in Figure 8.As shown in Figure 8, the network of eight nodes can be deployed in Ψ(8) = 98 different deployment patterns.In order to maximize the lifetime of each node and to balance the energy consumption of the nodes, the average Table 1: The plug operation of  (4).cost should be A(8) = 3; this indicates that the network of eight nodes should be divided into three groups.Among Ψ(8) = 98 there are 28 patterns fit with the average cost and the other patterns lead to either more data redundancy or to more energy consumption.Let ℓ() be the number of patterns that fit with the overage cost as shown in Figure 9; it showed that only about 23% of patterns fit with average cost.Table 2: The partitions of  (6).

Energy Model.
We assume a simple model called (First-Order Radio Model).This model is discussed in [16].As shown in ( 14) and ( 15), the sensor node will consume  Tx (, ) of energy to transmit - packet over distance  and consume  Rx (, ) of energy to receive - size message.
5.1.2.Target Mobility Model.We used Gauss-Markov Mobility Model [24,25].It was designed to adapt to different levels of randomness via one tuning parameter.Gauss-Markov Mobility Model generates the next position depending on the previous position and conserving the speed and direction.
Suppose the initial position of target is ( 1 ,  1 ); then the next position can be found according to where  −1 and  −1 are the speed and direction, respectively;  −1 ,  −1 , and   ,   are the old and the new positions of the target, respectively.The th position, direction, and speed are calculated using Gauss-Markov model from the ( − 1)th position, direction, and speed.  and   are calculated by s and d are the values representing the main of speed and direction as  → ∞.   −1 and   −1 are random variables from Gauss-Markov distribution. is the level of randomness 1 ≤  ≤ 0. [16] is affected by the deployment pattern of nodes, in our simulation we choose four types of deployment schemes as shown in Figure 10.These networks have different number of groups.GLT does not have any MAC layer requirements except the support for broadcasts.The default parameters we used are shown in Table 3.For each configuration, the results are collected, averaged, and shown in their respective figures.The performance metrics we used are as follows: (1) Average Total Energy Consumption: the average energy (in joules) which is consumed by the sensor node for transmit/receiving data/control packets during the simulation time; (2) Average Traffic Load: the average number of generated control packets by NT and the number of routing packets, which are generated by HST during the simulation time; (3) End-to-End Delay: the average time from the moment the source node generates the data packet to the moment the sink received the data packet.

Simulations Parameters. Since the GHS
The Hierarchical Spanning Trees (HST) shown in Figure 10 are the default routing trees.However, the process of updating the HST tree is based on NT tree nodes (switchoperation).That is to say, when any node   ∈ HST requires a switch-operation (i.e., when the parent node of   has an energy lower than threshold), the new node   will be selected by NT to be the new parent of   (see Algorithms 1 and 2).

Grouping Structure and Notification
Tree.The number of control packets (i.e., INSERT and DELETE packets) depends on the size of NT tree, while the size of NT depends on the number of groups (the maximum covered regions in the field).Similarly, the number of groups is strongly related to the deployment scheme of nodes.The greater the size of NT is, the greater the number of control packets will be and the more the energy consumption will be.As shown in Figures 11(a) and 11(b), the number of groups affects the size of NT.When the number of groups is getting greater, the size of NT will be smaller.The size of NT plays an essential role that affects directly the number of control packets.To show this, we used different number of targets and different speeds (Figures 11(e) and 11(f)).When the speed is getting higher, the number of control packets will be increased (see Figures 11(c) and 11(d)).

Grouping Structure and HST.
Figure 12 shows the evaluation of HST during data routing process.The performance of HST is affected by the number of groups in the network, the size of the group, and the deployment scheme of nodes.The evaluation shows that Net 4 has the worst performance in terms of energy consumption, delay, and shortest path selection.However, Net 4 shows the best performance in terms of energy consumption during the activating of nodes for tracking.HST shows that the number of groups in the network affects the average number of hops and delay.The greater the number of groups, the shorter the path to the sink and the lesser the energy consumption (see Figure 8).

Grouping Structure and Target Tracking.
In GLT, the tracking quality is based on NT.The quality of tracking is based on the size of NT and its coverage around the current proxy node.Therefore, to guarantee the tracking process continuously, all the nodes in NT will be in the idle state in order to be ready for tracking.The size of NT tree is shown in Figure 11(b).In Figure 13, we deployed 20 objects in the network topology shown in Figure 10(a).The speed of each object is 5 m/second.The simulation time is 60 seconds.The NT tree ensures a very high performance in avoiding data redundancy such that the reported messages to the sink node will not be duplicated; and at any given time, there will be one proxy node for each object.For example, as shown in Figure 13(a), in the time interval [1-6 s], target 1 will be tracked by node 18 even if the object is crossing an overlapping region.In the case of the object appearance for the first time in an overlapped area, there will be one duplicated message.For example, as shown in Figure 13(a) in second 25, the packet is reported by node 84 and node 87.After reporting the first packet, both nodes will discover that they have the same Notification Message Record in their NMT (see Figure 3).At this time, node 84 (with higher energy) will be selected as the proxy for object 1, while node 87 will send a DELETE notification message to its NT tree. Figure 13(b) illustrates the trajectory of mobile target 2.

Grouping Structure and Network Lifetime.
To evaluate the performance of GLT, HST, and NT, we conducted a series of simulation experiments using our simulator in the network topologies explained in Figure 10.We assume that the maximum lifetime of network is the number of rounds until the first node is dead.Here, one round means that each node in the network sends a packet of data with size of 1024 bits; that is to say, in each round there will be || × 1024 bits or || packets.Figure 14 shows the network lifetime of GLT with different topologies.

Number of Packets.
In GLT, the packets include data routing, building HST, building NT, activation, and switchoperation.Figure 15 shows the number of packets for GLT, which is Grouping Hierarchy Structure based [16], and the number of packets for different clustering-based protocols (i.e., CAICS [12], DLC [13,14], and MHC [15,21]).In GLT, the number of control packets including HST packets and NT packets does not change per time.On the other hand, the number of activation packets, data routing packets, and switch-operation packets will change per time according to the mobility pattern of the target.In GLT, the location of sink affects the number of switch-operation packets, while it has no impact on the number of other control packets.When the sink is located in the center of the interested field, the lifetime of the network is getting longer, and the number of switch-operation packets is reduced.In contrast, when the sink's location is getting closer to the sides of the interested field, network lifetime is getting shorter and as a result the number of the switch-operation packets will increase in order to prolong the network's lifetime as long as possible.

Energy Consumption.
In GLT, HST consumes most of the energy during data routing toward the sink.On the other hand, NT consumes a smaller amount of energy.Figure 16 shows the average energy consumption of the sensor nodes over different simulation times.GLT achieves better energy saving compared to DLC, HMC and CAICS.The nodes in NT will be activated to guarantee the tracking accuracy, but their collected data will be transmitted to the proxy node by one and only one hop.Although each node belongs to more than one group, each node has only one permanent NT tree.Therefore, the nodes in NT will transmit their collected data to the correct proxy even if the node is activated by more than one proxy node in the same time (in case of more than one object is found).In contrast, clustering-based protocols suffer from more traffic due to cluster members and cluster heads intercommunication.Additionally, more energy will be dissipated when the nodes, which belong to multiple clusters, detect the same target.This leads to redundant data transmissions from cluster heads to the sink.This issue is avoided in [12] and this is the reason why CAICS archives better energy saving compared to DLC and HMC.
In DLC, the packets are transmitted to the sink over a long distance, since each cluster head aggregates sensed data from its cluster members and directly transmits it to the sink.
This issue is solved in HMC; HMC adopts a hierarchical cluster heads model and the data can be transmitted to the sink hop by hop through multiple intermediate cluster heads.The sink location has an impact on the energy consumption of GLT, CAICS [12], DLC [13,14], and MHC [15,21]; the closer the sink to the center of the interested field is the shorter the path from source to the sink will be and the lesser the energy will be consumed (see Figure 16).shows that in GLT, CAICS, DLC, and MHC, the speed of the object has an impact on the consumed energy; higher speed of target always leads to greater energy consumption.Our proposed approach is influenced by the target's speed due to the increment in the number of NT's control packets.However, HST is not affected by the target's speed since the number of sensed data packets is not affected by the target's velocity.Like CAICS, which suffers from the frequent selection of aggregation nodes, GLT consumes more energy due to frequent transmission of control packets in NT.Unlike CAICS, the transmission delay is not getting longer in GLT.The frequent selections of aggregation nodes in CAICS affect both of the transmission delay and the energy consumption.In GLT, the transmission delay is not affected or increased due to the permanent structure of NT.Nevertheless, NT will increase the transmission delay during the switch-operation.The impact of target velocity on the average transmission delay is shown in Figure 18.
The size of the network (i.e., the number of nodes in the network) has an impact on the transmission delay and power consumption in all four approaches (i.e., GLT, CAICS, DLC, and MHC).In case of GLT, the larger the size of the network, the greater the number of groups.Thus, the size of NT and HST will be greater.On the other hand, in cluster-based networks, the number of cluster members will be increased in each cluster, which leads to more nodes involved in sensing and tracking.The average energy consumption and average transmission delay of data gathering versus the nodes number are shown in Figures 19 and 20, respectively.

Network Lifetime.
We assume that the maximum lifetime of the network is the number of rounds until the first node dies in the network.Here, one round means that each node in the network sends a packet of data with size of 2048 bits.That is to say, in each round there will be || × 2048 bits or || packets.In each round, every node in the network (600 nodes) is elected as an aggregation node and transmits the aggregated data to the sink either directly or via multihops.In GLT, the network lifetime is managed by the switch-operation, which is a combination between the Wireless Communications and Mobile Computing HST and NT trees.In each round, during data routing, the NT and HST select the node with maximum residual energy.CAICS selects the node which has the most residual energy and this is the reason why the network lifetime is maximized compared to DLC and MHC.However, CAICS suffers from frequent selection of aggregation nodes.In DLC and MHC the packets are transmitted over a long distance and that is the reason why their lifetime is shorter compared to GLT and CAICS.The network lifetime is shown in Figure 21.(a) shows a shorter lifetime compared to (b), since the location of the sink is further from the center of the interested field.Generally, the closer the sink to the center of the interested field, the shorter the path to the sink.

Conclusion
The system of this article is still an ongoing project and there are some issues under resolving.One of the main issues is the energy dissipation in NT tree, which is affected by the overlapped regions.We are investigating to combine the geometric and machine deep learning to identify the overlapped regions of WSN networks in order to clarify the overlapped regions for each node in the network.In this paper, the Grouping based Location Tracking (GLT) algorithm is proposed, which is based on the Grouping Hierarchy Structure (GHS) [16].GLT algorithm ensures a high performance by the support of NT tree and HST tree to aggregate and report the date to the sink node using the minimum number of hops considering the energy balancing.The data reporting process of GLT is totally based on the reporting algorithm HST.On the other hand, the NT tree is managing the notifications between the nodes to avoid the duplication messages and data redundancy.
The number of groups and the number of deployment patterns in GHS affect the communication overhead.We have tried to find a closed form for G() but we failed due to the complicated combinations of G().Nevertheless, one contribution of this work is finding the number of deployment patterns.The readers are very welcome to solve the issue of G(); in the future, we will try to find closed form for G().

Figure 1 :
Figure 1: Random network and corresponding groups.(a) 8 randomly deployed nodes (the arrows indicate the maximum covered areas).(b) The groups according to maximum covered areas.

Figure 4 :
Figure 4: Hierarchical Spanning Tree, assuming that node 15 is the sink node.

Figure 8 :
Figure 8: The energy consumption for all possible different deployment patterns of eight nodes Ψ(8) = 98.

Figure 10 :
Figure 10: Default network topologies of simulation.(a) Net 1: Hierarchical Spanning Tree (HST) of 100 nodes deployed randomly.The sensing range is 25 m while the communication range is 50 m.The progress bar indicates the capacity of the battery (initially full).The sink node is 0. (b) Net 2: Hierarchical Spanning Tree (HST) of 138 nodes deployed using zigzag scheme [3].The sensing range is 25 m and the communication range is 50 m.The progress bar indicates the battery capacity.The sink node is 56.(c) Net 3: Hierarchical Spanning Tree (HST) of 182 nodes deployed using grid scheme 1 [4].The sensing range is 25 m and the communication range is 50 m.The progress bar indicates the battery capacity.The sink node is 90.(d) Net 4: Hierarchical Spanning Tree (HST) of 181 nodes deployed using grid scheme 2 [4].The sensing range is 25 m and the communication range is 50 m.The progress bar indicates the battery capacity.The sink node is 140.

4 (
e) Impact due to the number of targets

Figure 11 : 14 Wireless
Figure 11: Impact of grouping structure and NT.

Figure 13 :Figure 14 :
Figure 13: The nodes detected and reported the motion of objects 1 and 2. (a) The trajectory for object 1 within the network (Net 1): the speed of object is 5 m/1 s; the simulation time is 60 seconds.(b) The trajectory for target 2 within the network (Net 1): the speed of object is 5 m/1 s; the simulation time is 60 seconds.

Figure 15 :Figure 16 :Figure 17 :
Figure 15: Comparison of the number of transmitted data packets.

Figure 20 :Figure 21 :
Figure 20: Average transmission delay of data gathering versus the node number.

Table 3 :
Default parameters to evaluate the performance of GLT.