A survey of secure target tracking algorithms for wireless sensor networks

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

13 Citations (Scopus)

Abstract

Tracking a target as it moves in monitored area has become an increasingly important application for wireless sensor networks (WSNs). Target tracking algorithms continuously report the position of the target in terms of its coordinates to a sink node or a central base station. Due to the rapid development of WSNs, there is no standardized classification of target tracking algorithms. Some of those classifications consider scalability, energy consumption and accuracy; other classification considers network topology, position of target, mobility of target/object etc. In this paper, we have considered target tracking algorithms of WSNs from the security point of view. We have compared and discussed problem of security in the most important target tracking algorithms for WSNs. To the best of our knowledge, this is the first study that analyses the target tracking algorithms in terms of security.

Original languageEnglish
Title of host publication2014 World Congress on Computer Applications and Information Systems, WCCAIS 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781479933518
DOIs
Publication statusPublished - 3 Oct 2014
Externally publishedYes
Event2014 World Congress on Computer Applications and Information Systems, WCCAIS 2014 - Hammamet, Tunisia
Duration: 17 Jan 201419 Jan 2014

Publication series

Name2014 World Congress on Computer Applications and Information Systems, WCCAIS 2014

Conference

Conference2014 World Congress on Computer Applications and Information Systems, WCCAIS 2014
Country/TerritoryTunisia
CityHammamet
Period17/01/1419/01/14

Keywords

  • classification of target tracking algorithms
  • security
  • survey
  • target tracking algorithms
  • wireless sensor networks

Fingerprint

Dive into the research topics of 'A survey of secure target tracking algorithms for wireless sensor networks'. Together they form a unique fingerprint.

Cite this