Professional Documents
Culture Documents
QoS-aware Sensor Allocation
QoS-aware Sensor Allocation
Ad Hoc Networks
journal homepage: www.elsevier.com/locate/adhoc
a r t i c l e i n f o a b s t r a c t
Article history: This work addresses the problem of Quality of Service (QoS) aware sensor allocation for
Received 11 October 2014 target tracking in a sensor-cloud environment. In a sensor-cloud environment, whenever
Received in revised form 17 April 2015 a target enters within a sensor deployed zone, physical sensor nodes are dynamically
Accepted 18 April 2015
scheduled and allocated for the corresponding target. In this work, specifically, we address
Available online xxxx
the issue of selection of an optimal set of sensors to track a particular target. However, in
sensor-cloud the underlying physical sensor nodes are heterogeneous with respect to their
Keywords:
owner, their sensing ability, transmission range, and the unit cost of usability. Considering
Wireless Sensor Network (WSN)
Cloud computing
the heterogeneity of the nodes, we propose the QoS-aware Sensor Allocation Algorithm
Target tracking (Q-SAA) that takes into account an assortment of parameters that determine QoS.
Quality of service Thereafter, using an auction-based mechanism we find the optimal solution for allocation
Auction theory of a subset of available sensors to achieve efficient target tracking. Experimental results on
implementation of our solution show that in comparison with the considered benchmark,
the proposed scheme schedules approximately 20–30% less number of sensors for target
tracking applications and still achieves the desired QoS while tracking the target.
Ó 2015 Elsevier B.V. All rights reserved.
http://dx.doi.org/10.1016/j.adhoc.2015.04.009
1570-8705/Ó 2015 Elsevier B.V. All rights reserved.
Please cite this article in press as: S. Misra et al., QoS-aware sensor allocation for target tracking in sensor-cloud, Ad Hoc Netw. (2015),
http://dx.doi.org/10.1016/j.adhoc.2015.04.009
2 S. Misra et al. / Ad Hoc Networks xxx (2015) xxx–xxx
having a number of sensors owned by different sensor The work formulates a direct revelation based auction
owners [9]. Services of these sensors are managed by cloud mechanism in which the members of the maximal set
controller/administrator to meet the dynamic demands of of sensor nodes place a bid based on the provisioned
the end users. Consequently, the end-users can dynami- QoS. The end-user acts as an auctioneer and chooses
cally demand and obtain Se-aaS. Different allocated sets the subset of sensors that optimizes his/her cost and
of sensors forming a virtual sensor group within the cloud ensures a threshold QoS, simultaneously.
are used by the users for their disparate application. In
such a framework, the end-users are unaware of the exact Apart from the design issues of Q-SAA, the work also
physical location of the sensors. analyses the real-time computing ability of the algorithm,
thereby inferring to implement Q-SAA in areal-world
1.1. Motivation application scenario.
Please cite this article in press as: S. Misra et al., QoS-aware sensor allocation for target tracking in sensor-cloud, Ad Hoc Netw. (2015),
http://dx.doi.org/10.1016/j.adhoc.2015.04.009
S. Misra et al. / Ad Hoc Networks xxx (2015) xxx–xxx 3
[19] theoretically characterized the aspects of virtualiza- on a QoS aware sensor allocation while tracking a target
tion and justified for a paradigm shift from conventional in a sensor-cloud environment.
WSNs through their experimental results. In a very recent In this work, we propose a sensor scheduling and allo-
work, Chatterjee and Misra [10] explored the issues of tar- cation algorithm to be executed within the sensor-cloud
get tracking within sensor-cloud and conceptualized the environment for serving a mobile target. The work ensures
architecture for the virtualization of sensors serving a to provide a threshold QoS by scheduling an optimal num-
target tracking application. ber of physical sensors. However, for an optimal allocation
Target tracking in WSNs are quite common and of nodes, the proposed algorithm Q-SAA, utilizes the bene-
explored. A good number of research works [12,8] have fits of auction theory. There exists lot of literature on appli-
thoroughly investigated target tracking and the perfor- cation of auction theory for the selection of required
mance issues associated with it. Some of the works focused resources keeping in mind the usefulness and limitations
on target localization policies. In [24], Wang et al. of certain parameters and finding an optimal solution to
addressed the problem of posterior target location distri- the addressed problem [20,27,6]. After successful alloca-
bution from the knowledge of the sensor network, thereby tion of sensor nodes to targets, the work considers the exe-
maintaining the accuracy in estimation. In [23], the cution of a standard tracking algorithm, Probability-based
authors have employed a general state evolution model Target Prediction and Sleep Scheduling Protocol (PPSS) [15].
to define the dynamics of the target. The work obtains a It is to be noted here that, the work explicitly focuses of
reduction in the consumption of resources as well as the sensor scheduling and allocation prior to tracking a target.
precision in localization. Few works [13,3] have focused The results of Q-SAA are fed to PPSS for comparison and
on the issues of energy efficiency within sensor networks. analysis.
A good number of research works also focuses on the
aspect of sensor scheduling. Maheswararajah et al. [18]
proposed a sensor scheduling algorithm (for tracking tar- 3. System model
gets) that minimizes measurement error and sensor usage.
In another work, Huber [14] propounded a pruning based In this work, we consider a scenario where a number of
sensor scheduling. However, the work schedules a single sensors from different sensor service providers are avail-
sensor node at a particular time to reduce the measure- able in a given area. These sensors are used to provide ser-
ment error. The mentioned works on sensor scheduling vices to the end users through the sensor-cloud
find their applicability within traditional WSNs. However, infrastructure. We consider that the service of target track-
the proposed work focuses on a sensor-cloud environment ing is being provided by the sensor-cloud and a user wants
in which the underlying sensor network is subjected to to track a target using this sensor cloud infrastructure. The
dynamic allocation policies following the Service Level overall layered architecture is shown in and for the sake of
Agreement (SLA). In some cloud-based works [16,11], the convenience the notational details are illustrated through
authors proposed a scheduling within WSNs to optimize Table 1. In this case, we consider the problem of selection
the tracking accuracy with the sensor usage. Few works of an optimal set of sensors from the available set in the
[31,30] have addressed the implementation of blind sensor-cloud infrastructure for tracking a single target
scheduling algorithms for multimedia cloud service provi- moving in a two-dimensional field covered by sensors
ders. The works are independent of the demand of the deployed by different owners and form part of
cloud service providers. In [30], the authors focused on sensor-cloud, as shown in Fig. 1(b). When the target moves
scheduling appropriate service providers, whereas our
work focuses on the selection of physical sensor nodes.
Table 1
The former is based on a post packet-transmission scenar- Table of notation.
io, whereas the our work concerns the relevant tracking
Parameters Values
issues (availability of sensors, detection probability of sen-
sors, accuracy of detection, and dwelling time of a target ðx; yÞ Coordinates of target
ðxi ; yi Þ Coordinates of sensor node si
within a sensors coverage) that arises while tracking a
ri Distance of target from si
mobile target. However, from the perspective of physical Nt Maximal subset of N sensor nodes of a particular
sensor scheduling for moving targets, it is necessary to target
have the knowledge of the availability, accuracy, and the nt Optimal subset of sensor nodes of a particular target
coordinates of the underlying sensors. In [31], the authors P sp Probability of detection
Pn Cumulative probability of detection by n sensors
of this work have proposed a Blind Online Multimedia
Pðkj jðx; yÞÞ Conditional probability of noise, given ðx; yÞ
Scheduling algorithm (BOSA). The architecture proposed P acc Probability of accuracy in detection
in this work focuses on task division and virtualization sk Dwelling time of sk
aspects within the cloud environment. However, our archi- b Available time for a sensor
tecture considers the communication between physical bi Bid of si
wij Weight associated with jth QoS parameter of si
sensor networks and sensor-cloud. In such environment,
kij Price associated with jth QoS parameter of si
as targets enter within a sensor deployed zone, multiple hi Value estimate by si
sensor nodes in the vicinity of the target are allocated to pi ðÞ Probability of servicing a target by si
serve the target. The data from the set of allocated sensors U i ðÞ Utility of si
are reported to the cloud end, which in turn, transmit the U 0 ðÞ Utility of auctioneer
Q threshold Measure of QoS to be provided to the end-user
data to the end-users. The proposed architecture focuses
Please cite this article in press as: S. Misra et al., QoS-aware sensor allocation for target tracking in sensor-cloud, Ad Hoc Netw. (2015),
http://dx.doi.org/10.1016/j.adhoc.2015.04.009
4 S. Misra et al. / Ad Hoc Networks xxx (2015) xxx–xxx
through the monitored area, it is under the coverage of and s3 , respectively. On solving these equations, we get the
multiple sensors. The cloud service provider allocates an coordinates ðx; yÞ of the detected target position at time t,
optimal number of sensors from the set of sensors covering as given below:
that target. While doing so, we aim to meet the QoS
ðy1 y2 ÞX x ðy1 y3 ÞX y
requirements of the user who wants to run his target track- x¼ ð4Þ
ing application through the sensor-cloud. For allocation of
2ððx1 x3 Þðy1 y2 Þ ðx1 x2 Þðy1 y3 ÞÞ
the sensors, we consider the following QoS parameters: ðx1 x2 ÞX x ðx1 x3 ÞX y
y¼ ð5Þ
2ððx1 x2 Þðy1 y3 Þ ðx1 x3 Þðy1 y2 ÞÞ
Availability of the sensors
where, X x ¼ ðx21 x23 Þ þ ðy21 y23 Þ þ ðr23 r21 Þ and
Detection probability of the sensors
X y ¼ ðx1 x2 Þ þ ðy21 y22 Þ þ ðr 22 r 21 Þ. After the target is
2 2
Accuracy of detected location
Dwelling time of a target in a sensor’s sensing range detected, it is needed to find a set of sensors N t , at time t,
such that,
The QoS parameters chosen relate very closely to the ðx xj Þ2 þ ðy yj Þ2 < R2maxj ð6Þ
target tracking application. The availability of sensors is
required for any application and sensors should sustain where ðx; yÞ and ðxj ; yj Þ are the coordinates of the detected
for the time it is required to provide service. The accuracy target position and the known location of the jth sensor
in locating a target’s position and the probability of detec- respectively, and Rmaxi is the maximum sensing radius of
tion form crucial factors for achieving higher efficiency in the jth sensor. Thus, we have, N t ¼ fs1 ; s2 ; . . . ; sN g.
target tracking. The more time a sensor is available for Once the target is detected, it is required to find the
tracking a target, the more beneficial it is to employ that next predicted location, so that N tþ1 can be determined at
sensor for the application. Each sensor tries to get selected time instant t þ 1. it is assumed that the present and past
by the cloud service provider to provide the service of positions of the target are known. Let the present location
tracking so that it can maximize its payoffs. of the target be denoted by ðxi ; yi Þ at a given time t i , and the
Initially, the target is required to be detected by ni sen- previous location of the target be represented by ðxi1 ; yi1 Þ
sors (where ni P 3) at time t. The position of the target can at a given time t i1 . let the next actual location of the target
be determined by finding the point of intersection of at be represented by ðxiþ1 ; yiþ1 Þ at time t þ 1. The speed v of
least three circles formed by taking the distance between
the target is computed as:
the sensors and target as the radius with center at the sen-
qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
sor location.
ðxi xi1 Þ2 þ ðyi yi1 Þ2
v¼ ð7Þ
ti ti1
ðx x1 Þ2 þ ðy y1 Þ2 ¼ r21 ð1Þ
ðx x2 Þ2 þ ðy y2 Þ2 ¼ r22 ð2Þ The direction of motion h is computed as:
2
ðx x3 Þ þ ðy y3 Þ ¼2
r23 ð3Þ xi xi1
h ¼ cos1 qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi ð8Þ
ðxi xi1 Þ2 þ ðyi yi1 Þ2
In Eqs. (1)–(3), ðx1 ; y1 Þ; ðx2 ; y2 Þ and ðx3 ; y3 Þ denote the coor-
dinates of the sensors s1 ; s2 , and s3 , respectively, and r 1 ; r 2 , Therefore, the predicted location of the target at point
and r 3 are the distances of the target from the sensors s1 ; s2 , ðx0iþ1 ; y0iþ1 Þ is given as follows:
Please cite this article in press as: S. Misra et al., QoS-aware sensor allocation for target tracking in sensor-cloud, Ad Hoc Netw. (2015),
http://dx.doi.org/10.1016/j.adhoc.2015.04.009
S. Misra et al. / Ad Hoc Networks xxx (2015) xxx–xxx 5
Please cite this article in press as: S. Misra et al., QoS-aware sensor allocation for target tracking in sensor-cloud, Ad Hoc Netw. (2015),
http://dx.doi.org/10.1016/j.adhoc.2015.04.009
6 S. Misra et al. / Ad Hoc Networks xxx (2015) xxx–xxx
Definition 3.3. The dwelling time sk for a target at a ð1 þ Dp2 Þx2 2xðxk þ x0iþ1 Dp2 þ Dpyk Þ þ x2k þ y2k
predicted position ðx0iþ1 ; y0iþ1 Þ with respect to a sensor sk at þ x02 2 0 2
iþ1 Dp þ 2xxþ1 yk Dp r ¼ 0 ð22Þ
position ðxk ; yk Þ is defined as the time the target takes to
traverse a path formed by extending a straight line joining where Dp ¼ vvtt cos hþDx
sin hþDy
þ y0iþ1 . The above equation is of the
the present location ðxi ; yi Þ and the next predicted position quadratic form and can be solved to get the value of coor-
ðx0iþ1 ; y0iþ1 Þ to the point where it intersects the sensing circle dinates x where the predicted path intersects with the cir-
of sensor sk in the direction of motion. cle on x-axis. Similarly we get the values of y where the
predicted path intersects with the circle on y-axis.
Therefore, the distance d the target travels on the predicted
Theorem 3.1. The dwelling time sk with respect to a sensor path with the sensing circle of sensor sk is given by:
sk is given by: qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
d¼ ðx0iþ1 xÞ2 þ ðy0iþ1 yÞ2 ð23Þ
ðx0iþ1 xÞ2 þ ðy0iþ1 yÞ2
sk ¼ ð17Þ
v Hence, the dwelling time sk for a target in the sensing
range of sensor sk is formulated as given below
qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
Proof. Fig. 2 shows the next predicted position ðx0iþ1 ; y0iþ1 Þ
ðx0iþ1 xÞ2 þ ðy0iþ1 yÞ2
found with the help of the present position ðxi ; yi Þ and pre- sk ¼ ð24Þ
vious positions ðxi1 ; yi1 Þ. We assume a straight line v
motion for the target on the line connecting the coordi- This concludes the proof. h
nates ðxi ; yi Þ and ðx0iþ1 ; y0iþ1 Þ and extended to intersect the
periphery of the sensing circle at point ðx; yÞ. The line join-
3.4. Availability of sensor
ing ðx0iþ1 ; y0iþ1 Þ and ðx; yÞ gives the distance a target covers in
the sensing area of sensor sk . The equation of the sensing The availability of the sensor is calculated on the basis
circle of the kth sensor is given by: of the residual energy in the sensor.
Please cite this article in press as: S. Misra et al., QoS-aware sensor allocation for target tracking in sensor-cloud, Ad Hoc Netw. (2015),
http://dx.doi.org/10.1016/j.adhoc.2015.04.009
S. Misra et al. / Ad Hoc Networks xxx (2015) xxx–xxx 7
work is based on the direct revelation auction mechanism The probability that a user may get a chance to provide
[20]. the service to a target can be derived, on the basis of the
In the auction mechanism, user C is the auctioneer and dwelling time of the target in a sensors coverage area,
there are N t ¼ f1; 2; 3; . . . ; ng sensors as the bidders in the and can be described as:
auction. N t sensors place their bids, bi , on the basis of the si
evaluation of cost they would incur for providing the ser- pi ðhÞ ¼ PN ð33Þ
vice, as follows: i¼1 n i s
where and n are constants.
bi ¼ wi1 ki1 P spi þ wi2 ki2 Pacci þ wi3 ki3 si ð26Þ
In the direct revelation auction mechanism, the bidders
where wij and kij are the weights and prices associated with declare their value estimates to the auctioneer secretively
every QoS parameter, respectively. Pspi ; Pacci and si are the and concurrently. Based on these evaluations submitted
values of probability of detection, probability of accuracy by the bidders the auctioneer decides which bidder wins
and the dwelling time of a sensor i, respectively. Let hi be the auction and what he/she has to pay. Thus, the utility
the value estimate of the bidder i, which he/she is going of a direct revelation auction mechanism is given by two
to reveal to all the other bidders. A continuous probability outcome functions ðp; bÞ such that, if h is the vector of
distribution over a finite interval gives the users an value estimates declared by the bidders, pi ðhÞ is the prob-
estimate of bidder i. Let /i represent the possible range ability that i services the target, and bi ðhÞ is the expected
of values which i might assign to the object. / for a partic- cost which bidder i incurs in providing this service to the
ular bidder can be estimated by knowing the previous user. Thus, the expected utility from direct revelation auc-
value ranges in the previous auctions. Let the set of all pos- tion mechanism, as given in [20], described by ðp; bÞ for
sible combinations of bidders values estimates be denoted bidder i is given by:
by H. We have Z
U i ðp; b; hi Þ ¼ ðv i ðhÞpi ðhÞ bi ðhÞÞf i ðhi Þdhi ð34Þ
H ¼ ½/1 ½/2 ½/n ð27Þ Hi
To find all possible assessment values by all the bidders where dhi ¼ dh1 ; . . . ; dhi1 ; dhiþ1 ; . . . ; dhn .
except i, we remove the ith estimate from H to get Hi . Similarly, the expected utility for the auctioneer from
Hi ¼ ½/1 ½/2 ½/i1 ½/iþ1 ½/n ð28Þ this auction mechanism is:
Z X X
The joint density function on H for the vector U 0 ðp; bÞ ¼ ðv 0 ðhÞð1 pj ðhÞÞ þ bj ðhÞÞf ðhÞdh ð35Þ
h ¼ ðh1 ; . . . ; hn Þ of individual value estimates is: H j2Nt j2N t
ðhlj Þ2
where dh ¼ dh1 ; . . . ; dhn .
1 2r2
f ðhÞ ¼ qffiffiffiffiffiffiffiffiffiffiffiffi e j ð29Þ
2pr2j Algorithm 1. QoS-Aware Sensor Allocation Algorithm
(Q-SAA)
Bidder i’s his value estimate is a known quantity. Both the
user and the bidder i assess the joint density function on Hi
for the vector hi ¼ ðh1 ; . . . ; hi1 ; hiþ1 ; . . . ; hn Þ of values for
Input:
all bidders other than i to be as follows:
Present location of target ðxi ; yi Þ at time t i .
ðhi lj Þ2
Past location of the target ðxi1 ; yi1 Þ at time t i1 .
1 2r 2
f i ðhi Þ ¼ qffiffiffiffiffiffiffiffiffiffiffiffi e j ð30Þ Output: Selected subset of sensors nt at time t.
2pr2j
Step 1: Compute the next predicted target position
All the value estimates are made available to the ðx0iþ1 ; y0iþ1 Þ
bidders. On revelation of these estimated values for Step 2: Select N t sensors
providing a service to the user, bidder i compares his/her Step 3: Compute b; s; P sp ; P acc for all nt 2 N t
evaluation with the others. Therefore, bidder i may Step 4: Compute U i for all nt 2 N t
reassess his/her own evaluation and change the own value Step 5: Arrange N t in the ascending order of their U i
of providing service by a factor K i ðhj hi Þ, where K i is an Step 6: Select nt N t jðQ n P Q threshold Þ _ ðnt P v N t Þ
experimental constant. Thus, if bidder i has the value Step 7: t i = tiþ1
estimates initially held by the n bidders h ¼ ðh1 ; . . . ; hn Þ Step 8: xi1 ¼ xi ; yi1 ¼ yi
available to him, then i revises his/her own evaluation of Step 9: xi ¼ xiþ1 ; yi ¼ yiþ1
providing the service to: Step 10: Goto Step 1
X
v i ðhÞ ¼ hi þ K i ðhj hi Þ where j – i ð31Þ
j2Nt
In this case, it is needed to select multiple bidders as
Similarly, user may also reassess his estimated value on winners in the ascending order of their utilities U i such
the basis of bidders evaluation, as follows: that it meets the desired QoS criteria of accuracy and
X
v 0 ðhÞ ¼ h0 þ K i ðhj h0 Þ ð32Þ detection of the user. With the help of this negotiation,
j2Nt the user gets the desired QoS, and at the same time has
Please cite this article in press as: S. Misra et al., QoS-aware sensor allocation for target tracking in sensor-cloud, Ad Hoc Netw. (2015),
http://dx.doi.org/10.1016/j.adhoc.2015.04.009
8 S. Misra et al. / Ad Hoc Networks xxx (2015) xxx–xxx
to pay the least possible cost. The aim of the bidder i is to the other two parameters for better results from the algo-
acquire the opportunity to serve the user so as to make rithm. On the basis of bids, the utility for each sensor is
profit from the cost of usage and also to provide the computed for the first nt sensors with highest utility,
desired QoS to the user. which satisfies the QoS requirement for the user. This opti-
mizes resource allocation in the sensor-cloud. This process
Q threshold is the measure of QoS required to be delivered
is repeated at the next step if the chosen set of sensors in
to the user. Therefore, the task is to select nt sensors
the last position cannot meet the QoS requirements of
(where nt N t ) so that we may get the desired quality of
the user. Thus, a new group of sensors is formed, other-
service.
wise, we continue with the same set of sensors.
Definition 4.1. The threshold QoS, Q threshold , is defined as
Theorem 4.1. There exists a Nash Equilibrium (NE) for the
the weighted mean of the probability of detection, P sp , and
bid of every sensor of the maximal subset N t .
the probability of accuracy, P acc , as desired by the end user.
w01 PspðnÞ þ w02 PaccðnÞ Proof. Wang et al. [26] proved the existence of NE in an
Q threshold ¼ ð36Þ
2 auctioned system. Wang et al. and Rosen [21] character-
where w01 and w02 are the weights of the cumulative prob- ized the existence of NE for a negative second order deriva-
abilities of detection and accuracy desired by the user. tive of the utility function. From Eq. (35), for every si 2 N t ,
we obtain,
!
Definition 4.2. An optimal set of sensors nt at a time d2 U i ðhÞ X X X 0
¼ v i ðhÞ v i ðhÞ pj ðhÞ v i ðhÞ pj ðhÞ þ
0 0 0
bj ðhÞ f ðhÞ
instant t is defined as nt N t such that the cumulative dh
2
j2N t j2N t j2N t
QoS, Q n , provided by the first n sensors is arranged in their ! !
X X
increasing order of utility U i . 0
þ f ðhÞ v i ðhÞ 1 pj ðhÞ þ bj ðhÞ
U i is higher than the threshold QoS Q threshold and the j2Nt j2Nt
number of sensors n is greater than a minimum predefined ð38Þ
percentage of sensors.
Therefore, it can be inferred that the problem is reduci- Now, we see that,
ble to selecting nt sensors with lowest utilities U i , such 0
ðhi lj Þ2
Q n P Q threshold and n P v Nt ð37Þ c2 being a negative constant. From Eq. (39) and the values
0
of K i , we observe that f ðhÞ and v 0i ðhÞ are negative quanti-
where Q n is the set of cumulative values of probability of d2 U i ðhÞ
detection and the probability of accuracy for the first nt ties. From this, we can directly infer that dh2
< 0, as
sensors, v is a predefined percentage of sensors which f ðhÞ > 0. This concludes the proof. h
which should be employed for tracking the target out of
the total available sensors at that point. This forms the sub-
5. Performance evaluation
set of nt sensors that meets the requirements of the user.
The proposed steps of execution are presented in
In this Section, we discuss and analyze the performance
Algorithm 1. The proposed algorithm, Q-SAA, requires an
of the proposed system and the algorithm under several
input of the present ðxi ; yi Þ, and previous ðxi1 ; yi1 Þ target
categories as follows:
positions to start localizing of all sensors that are available
to the sensor-cloud in that region. On the basis of the loca-
5.1. Scheduling of sensor nodes
tion information of the target and the sensing radius of
each node, a set of N t sensors is formed for tracking the tar-
The simulation setup considering a 10,000 10,000
get. All the four parameters are evaluated only for this set
units 2-D terrain with 1000 sensors randomly deployed,
of N t sensors and further filtering is performed on the basis
is depicted in Fig. 3(a). The dotted line depicts the trajec-
of availability of sensors. Availability is measured in terms
tory of the target over the actual path with correction
of battery life that is sufficient to give lifetime for a sensor
and the solid line the trajectory of the target on the pre-
more than the dwelling time of the target in that particular
dicted path. Rhombus markers represent the set of N t sen-
sensor’s coverage area. After omitting the sensors which
are unavailable, from N t , all sensors evaluate their cost sors that satisfy the condition ðx xj Þ2 þ ðy yj Þ2 < R2maxj .
incurred for providing tracking service and place their bids. These sensors have the target within their sensing range
Bids can be based on the assessment of each sensor and the at a given time instant for a target position. The depicted
weightage it gives to all three parameters. In case a target rhombuses correspond to the third position of the target
is likely to have a longer dwelling time in a sensors area of in the figure. Simulation experiments were executed by
coverage, it will be beneficial for the user to choose such a changing different parameters over a period of time and
sensor, as it may not have to disengage the sensor for long also varying the weights associated with them to see their
time, thereby, reducing the overheads for forming a virtual effect on the selection of sensors.
sensor, which can generate revenue by providing service Fig. 3(b) shows the variation in the percentage of sen-
for a longer time. Therefore, it may be inferred that the sors in subset nt , which is undertaken by taking the range
weightage of dwelling time can be higher as compared to of values for Psp ¼ Pacc = (0.1–0.6), P sp ¼ P acc = (0.1–0.5),
Please cite this article in press as: S. Misra et al., QoS-aware sensor allocation for target tracking in sensor-cloud, Ad Hoc Netw. (2015),
http://dx.doi.org/10.1016/j.adhoc.2015.04.009
S. Misra et al. / Ad Hoc Networks xxx (2015) xxx–xxx 9
3 6
Psp = Pacc = 0.1-0.6 N
Psp = Pacc = 0.1-0.5 n
Percentage of sensor nodes
1.5 3
1 2
0.5 1
0 0
1 2 3 4 5 6 7 8 9 10 1 2 3 4 5 6 7 8 9 10
Time instant Time instant
P sp ¼ P acc = (0.1–0.4), P sp ¼ Pacc = (0.1–0.3) and Psp ¼ Psp and P acc for each sensor. Fig. 3(c) shows a comparison
P acc = (0.1–0.2) for allocating a subset of sensors. Rmaxj si between the percentage of sensors allocated ðnt Þ to the
randomly assigned within the interval [150 m, 200 m]. percentage of sensors available ðN t Þ in that area that can
P sp ¼ P acc = (0.1–0.6) implies that the value of P sp and P acc engage the target at the given time instant. In this experi-
for all sensors which are part of N t is randomly selected ment we allocate v% of the available sensors as per their
within the range of 0.1–0.6 for the first set of experiments, utility and meet the Q threshold of the user. If the selected
i.e., the maximum value of P sp and P acc for a sensor is 0:6, v% of sensors does not satisfy the Q threshold , then in such a
and similarly, for the other set of experiments, the maxi- case more than v% of sensors are allocated till the
mum value of the two parameters is 0:5; 0:4; 0:3, and 0:2. Q threshold is satisfied. In this experiment, we take v as 30%.
Let us consider the percentage of sensors in the subset nt It can be seen from the graph that with the use of this algo-
at the 3rd time instant. The percentage of allocated sensors rithm, the requirement of sensors varies with the available
is 0.2, 0.6, 0.8, 0.9, or 1.1 for different decreasing values in set of sensors at a given point. Here, we can also infer that
the range of Psp and P acc . It can be seen that on decreasing by using this approach, we can find an optimal number of
sensors that can be allocated to utilize the resources in the
the range of parameters P sp and P acc , the required percent-
sensor-cloud, thereby saving lot of sensor resources.
age of sensors increases. The subset with square markers
which has a range of values for P sp ¼ Pacc = (0.1–0.6)
requires 4–5 sensors to fulfill the requirement of the user. 5.2. Utility behavior
However, the subset with star markers (P sp ¼ P acc = (0.1–
0.2)) requires 11–12 sensors to meet the QoS parameters We also analyzed the behavior of the value of utility for
of the user. This is because the cumulative probability of a sensor by varying different parameters. Some of the
accuracy and detection requires more number of sensors results are explained as follows. The weights for these
to reach Q threshold due to the smaller individual values of experiments are kept the same for each of the parameters.
Please cite this article in press as: S. Misra et al., QoS-aware sensor allocation for target tracking in sensor-cloud, Ad Hoc Netw. (2015),
http://dx.doi.org/10.1016/j.adhoc.2015.04.009
10 S. Misra et al. / Ad Hoc Networks xxx (2015) xxx–xxx
−25 −26
x 10 x 10
1 1.2
Dwell time = 0.3 Psp = 0.3
Dwell time = 0.5 1 Psp = 0.4
0.8 Dwell time = 0.8 Psp = 0.5
Dwell time = 1.1 Psp = 0.6
0.8 Psp = 0.7
Utility (Ui)
Utility (Ui)
0.6 Dwell time = 1.4
0.6
0.4
0.4
0.2
0.2
0 0
0 0.2 0.4 0.6 0.8 1 0 0.2 0.4 0.6 0.8 1
Probability of accuracy (Pacc) Dwelling time
(a) Ui vs Probability of Accuracy (b) Ui vs Dwelling time
−26
x 10
8
Pacc = 0.3
7 Pacc = 0.4
6 Pacc = 0.5
Pacc = 0.6
Utility (Ui)
5 Pacc = 0.7
0
0 0.2 0.4 0.6 0.8 1
Detection probability (Psp)
(c) Ui vs Detection Probability
Fig. 4. Variation of U i with change in different parameters.
Table 2
Fig. 4(a) shows the graph plotted between the probability Simulation parameters.
of accuracy and the utility for different values of dwelling
time, while keeping the detection probability as constant. S. no. P sp P acc si U i ð1027 Þ
As we see, the graph shows an upward trend with the 1 0.6 0.5 1 4.858
increase in the values of dwelling time. 2 0.6 0.6 1 10.46
In Fig. 4(b) a plot between dwelling time and utility is 3 0.65 0.5 1 7.295
4 0.65 0.6 1 14.376
plotted. The graph is plotted for different values of detec- 5 0.7 0.5 1 10.45
tion probability, while keeping the probability of accurate 6 0.7 0.6 1 19.046
detection constant. The behavior shows a lower utility
value for most of the graph, followed by which there is a
steep rise in utility specially on higher values of detection desired quality of service. For example in the third case,
probability. In Fig. 4(c) a plot between the probability of where the dwelling time is kept constant, a user for lower
detection and utility is plotted. The weightage of all the values of Pacc and Psp will get lower utility sensors, i.e.,
three parameters is kept the same, the graph is plotted these sensors are more beneficial to the user in monetary
for different values of probability of accuracy, while keep- terms but more number of sensors will be required for
ing the dwelling time as constant. The curve shows that achieving higher QoS. Also, the weights associated with
initially there is very little effect on the value of utility, the parameters will have a bearing on the behavior of
but after a certain point, the value of utility takes a linear utility.
rise. The experimental values for the above mentioned plot
are given out in Table 2 for better understanding. The 5.3. Comparison with PPSS
results show how the three parameters affect the utility
U i associated with different sensors and a user can get an To verify the efficiency of Q-SAA, we compared it with
idea how to set his/her preferences for obtaining the an existing sensor management algorithm for target
Please cite this article in press as: S. Misra et al., QoS-aware sensor allocation for target tracking in sensor-cloud, Ad Hoc Netw. (2015),
http://dx.doi.org/10.1016/j.adhoc.2015.04.009
S. Misra et al. / Ad Hoc Networks xxx (2015) xxx–xxx 11
tracking application. The algorithm we chose to compare is online connectivity thereby reducing the location depen-
the Probability-based Target Prediction and Sleep Scheduling dence. The users get on-demand scalable and elastic
Protocol (PPSS) [15]. The methodology of PPSS concerns resources and they are priced as usage-sensitive or
the duty cycling and activation of a set of physical sensor pay-per-use model. The economics of using a
nodes, followed by the prediction of the target trajectory. sensor-cloud for target tracking is justified as follows.
PPSS focuses on duty cycling of sensor nodes within the Firstly, by using Q-SAA, we reduce the the number of
vicinity of the target, thereby reducing the consumption sensors actually required by a traditional algorithm.
of resources. In our work, we propose Q-SAA for a QoS Secondly, the cost of ownership of a WSN vis-a-vis the
aware sensor scheduling and activation. Q-SAA not only pay-as-per-usage for a set of sensors from the
activates sensor nodes within the vicinity of the predicted sensor-cloud works out to be cheaper, specially on a longer
target location, but also focuses on the QoS of the provi- run. The cost of ownership of a sensor network accounts
sioned service, unlike PPSS. To investigate the difference for the cost of investment of setting up a privately owned
in the objectives of PPSS and Q-SAA, and the consequent WSN. On the other hand, in a sensor-cloud, the cost of
effects in their performance, we choose PPSS as the bench- investment is zero. However, the user has to pay as per
mark. Also, as the authors have also executed PPSS in his/her usage. The experimental setup is indicated in
TelosB motes [1] and TinyOS [2], PPSS finds its credibility Table 3.
even from an implementation point of view. This is also A comparison between cost of ownership and cloud
one of the primary reasons because of which we follow usage cost [22] shows that the cost of ownership evaluated
the tracking algorithm of PPSS (during performance evalu- for 3 years is approximately 1.58 times the cost of usage of
ation), after executing Q-SAA for sensor scheduling and cloud infrastructure. If the cost of buying a sensor is C s the
allocation. For simulation of PPSS, we have used the exper- cost of buying n sensors to form a WSN is ns C s . However,
imental setup as indicated by the authors of the work. For in case of a sensor cloud cost, the of ownership is negligi-
the simulation of utility of Q-SAA, the simulation settings ble. But, we need to pay for the time we have used a sensor,
are illustrated in subsections 5:1 and 5:2. i.e., the cost is incurred on the basis of rate based on per
Fig. 5(a) shows the comparison of selection of a super- unit time per sensor, given by C r , such that C s C r . The
set of sensors ðN t Þ by both the algorithms. We see that in cost of ownership further includes additional costs such
Q-SAA, the percentage of sensors in N t is approximately as maintenance cost and cost of supporting infrastructure
one-third the percentage of sensors in N t in case of PPSS, required for setting up a WSN. We term all these costs as
thereby saving lot of computational overhead in selecting C m . On the contrary, in case of a user of sensor-cloud, these
nt from N t , because all sensors in N t need to be analyzed costs do not exist or they are negligible. Another factor that
for selecting the best sensors. In Fig. 5(b), we show the
comparison of nt , i.e., the allocated or active sensors from
both the algorithms. Results show that the percentage of Table 3
sensors selected to be part of nt in Q-SAA is lesser than that Experimental setup.
in PPSS. Therefore, Q-SAA gives an optimal set of sensors Parameters Values
and saves on the sensor resource.
Time period (T) 3 104 units
Number of sensor nodes (ns ¼ nsc ) 1000
5.4. Economics of the model Unit cost price of a node (C r ) Rs. 20/unit
Unit cost due to maintenance in WSN (C m1 ) Rs. 20/unit
Unit cost due to maintenance in WSN (C m2 ) Rs. 10/unit
The very basic idea that motivates the use of
g1 0.85
sensor-cloud is the economy of scale. There are common g2 0.85
resources that are utilized by different users through
10 3
N in PPSS n in PPSS
N in Q-SAA n in Q-SAA
Percentage of sensor nodes
2.5
8
2
6
1.5
4
1
2
0.5
0 0
1 2 3 4 5 6 7 8 9 10 1 2 3 4 5 6 7 8 9 10
Time instant Time instant
(a) Comparison of for PPSS and Q-SAA (b) Comparison of for PPSS and Q-SAA
Fig. 5. Comparison of PPSS and Q-SAA.
Please cite this article in press as: S. Misra et al., QoS-aware sensor allocation for target tracking in sensor-cloud, Ad Hoc Netw. (2015),
http://dx.doi.org/10.1016/j.adhoc.2015.04.009
12 S. Misra et al. / Ad Hoc Networks xxx (2015) xxx–xxx
comes into play is the efficiency g, which is defined as the as per usage in the sensor-cloud. However, the mainte-
amount of resources utilized at a given time. It can be nance in private WSN will be undertaken irrespective of
understood that a lot of resources of a privately-owned the level of usage. Also, it can be predicted that after every
WSN are under-utilized because of the fact that once a tar- 5–6 years, there will arise a requirement of major upgrada-
get is being tracked, all the sensors are not used at any time tion in the infrastructure of the privately owned WSN,
instant and there may not be target to be tracked through- whose cost may be assumed to be similar to the initial
out the life-cycle of a the WSN. On the contrary, in setup of the infrastructure. The above mentioned reasons
sensor-cloud, the resources have higher utilization due to further justify the rationale for using a sensor-cloud.
elastic and scalable nature of resources. Therefore, the effi- Hence, we observe that by using sensor-cloud we reduce
ciency of a WSN is low, as compared to a sensor-cloud. the cost of usage, firstly, by cutting down on initial pur-
Also, in a sensor-cloud, there is more flexibility, scalability, chase of infrastructure, secondly, by getting over the main-
and reduced chances of failure. Therefore, the total cost of tenance and upgradation costs and effort required for the
ownership C of a WSN is calculated as follows: same and thirdly, just paying for what the user uses.
ns C s X
T
5.5. Complexity analysis of Q-SAA
C¼ þ C m1 ð40Þ
g1 t¼0
In this subsection, we discuss and analyze the runtime
where T is the time of usage, ns is the number of sensors complexity analysis of Q-SAA as presented below.
deployed, g1 is the efficiency and C m1 is the cost of mainte-
nance per unit time for privately-owned WSN. The cost of Lemma 5.1. The worst case asymptotic computational com-
using the sensor resource as a part of sensor-cloud C sc is plexity for evaluation of the cumulative detection probability
given by the number of sensors used at a given rate for a is OðjN t j2 ÞÞ; N t being the maximal subset of physical sensor
given time duration. Hence, C sc is represented as; nodes for tracking a target.
T
X
nsc C r
C sc ¼ þ C m2 ð41Þ
t¼0
g2 Proof. Let us assume that T 0 ðkÞ is the computational com-
plexity for obtaining the cumulative detection probability
where T is the time of usage, nsc is the number of sensors involving k sensor nodes, such that, jN t j ¼ k. From the
allocated in the sensor-cloud, g2 is the efficiency, and C m2 cumulative probability of detection, as shown in Eq. (12),
is the cost of maintenance per unit time for a we obtain,
sensor-cloud. Fig. 6 shows a graph of comparison between
cost of ownership and the cost of using the sensor-cloud. T 0 ðkÞ ¼ T 0 ðk 1Þ þ c0 ; T 0 ð1Þ ¼ Oð1Þ ð42Þ
The graph compares the cost of usage for using 2
c being a constant. Therefore, T 0 ðkÞ ¼ Oðk Þ which
sensor-cloud vis-a-vis a privately owned WSN for approx- 0 2
imately 30,000 h, which corresponds to three years and implies that T ðjN t jÞ ¼ OðjN t j Þ. This completes the proof. h
four months of continuous usage. It is worth noting that
Theorem 5.1. The worst case asymptotic computational
the graph is plotted keeping the number of sensors the
complexity of Q-SAA involving jN t j number of sensors in the
same for both WSN and sensor-cloud. Using Q-SAA we fur-
ther reduce the number of sensors required and widen this maximal subset is TðjN t jÞ ’ OðjN t j2 Þ.
gap between the two lines of sensor-cloud and private
WSN. We can be intuited that this gap will increase further Proof. We assume TðkÞ as the computational complexity
if the usage is not continuous. This is because the user pays of Q-SAA in which jN t j ¼ k. From a step by step analysis
of Q-SAA, as illustrated in Algorithm 1, and using the
6
results of Lemma 5.1, the recursive equation for analysis
x 10
8 of computational complexity can be derived as,
Cost of ownership 2
7 Cost in sensor−cloud
TðkÞ ¼ c1 OðkÞ þ c2 Oðk Þ þ c3 ðT 0 ðk 1Þ þ c0 Þ þ c4 ; Tð1Þ ¼ c
ð43Þ
6
2
5 Therefore, we infer, TðkÞ ¼ Oðk Þ which implies TðjN t jÞ ’
2
OðjN t j Þ. h
Cost
3 6. Conclusion
2
In this paper, an auction-based scheme for autonomous
1 allocation of sensors to a particular target through
sensor-cloud service provider was formalized. The
0
0 0.5 1 1.5 2 2.5 3 sensor-cloud architecture is able to retrieve and process
Time x 10
4 sensor data in a cost-effective, timely, and easily accessible
manner. In other words, due to visualization in
Fig. 6. Cost comparison of WSN vs sensor-cloud. sensor-cloud, a particular sensor becomes usable to
Please cite this article in press as: S. Misra et al., QoS-aware sensor allocation for target tracking in sensor-cloud, Ad Hoc Netw. (2015),
http://dx.doi.org/10.1016/j.adhoc.2015.04.009
S. Misra et al. / Ad Hoc Networks xxx (2015) xxx–xxx 13
multiple end-users and its employability becomes applica- [14] M. Huber, Optimal pruning for multi-step sensor scheduling, IEEE
Trans. Autom. Control 57 (5) (2012) 1338–1343.
tion independent. We specifically addressed the problem
[15] B. Jiang, B. Ravindran, H. Cho, Probability-based prediction and sleep
of resource allocation in a target tracking scenario and uti- scheduling for energy-efficient target tracking in sensor networks,
lized the resources of multiple sensor network providers IEEE Trans. Mobile Comput. 12 (4) (2013) 735–747.
for achieving the aim while being agnostic about the phys- [16] J. Lin, W. Xiao, F. Lewis, L. Xie, Energy-efficient distributed adaptive
multisensor scheduling for target tracking in wireless sensor
ical locations of the nodes. It can be seen from the results networks, IEEE Trans. Instrum. Measur. 58 (6) (2009) 1886–1896.
that this algorithm enables the sensor-cloud service provi- [17] S. Madria, V. Kumar, R. Dalvi, Sensor cloud: a cloud of virtual sensors,
der to autonomously allocate the optimal number of sen- IEEE Softw. 31 (2) (2014) 70–77.
[18] S. Maheswararajah, S. Halgamuge, M. Premaratne, Sensor scheduling
sors based on QoS parameters to achieve the desired for target tracking by suboptimal algorithms, IEEE Trans. Vehic.
efficiency. The selection is based on direct revelation auc- Technol. 58 (3) (2009) 1467–1479.
tion mechanism, in which all the bidders reassess their [19] S. Misra, S. Chatterjee, M. Obaidat, On theoretical modeling of sensor
cloud: a paradigm shift from wireless sensor network, IEEE Syst. J. PP
evaluation of the object based on the evaluation of other (99) (2014) 1–10.
bidders before placing a bid. This auction mechanism helps [20] R.B. Myerson, Optimal auction design, Math. Oper. Res. 6 (1) (1981)
the user to get a better value of the service being offered to 58–73.
[21] J. Rosen, Existence and uniqueness of equilibrium points for concave
him. We evaluated the results to find the effect of quality n-person games, Econometrica 33 (1965) 520–534.
of service parameters on the utility in auction process [22] G. Shroff, Enterprise Cloud Computing, Cambridge University Press,
and effect on of selection of optimal number of sensors. 2010.
[23] J. Teng, H. Snoussi, C. Richard, R. Zhou, Distributed variational
In the future, we plan to consider scenarios involving
filtering for simultaneous sensor localization and target tracking in
multiple targets in a sensor-cloud environment. This wireless sensor networks, IEEE Trans. Vehic. Technol. 61 (5) (2012)
improvement will further enhance the usability of 2305–2318.
sensor-cloud for more applications and their concurrent [24] H. Wang, K. Yao, D. Estrin, Information-theoretic approaches for
sensor selection and placement in sensor networks for target
use by a number of users. Also, the sensor selection proce- localization and tracking, J. Commun. Netw. 7 (4) (2005) 438–449.
dure may be made more efficient by incorporating applica- [25] X. Wang, M. Fu, H. Zhang, Target tracking in wireless sensor
tion dependent QoS. networks based on the combination of kf and mle using distance
measurements, IEEE Trans. Mobile Comput. 11 (4) (2012) 567–576.
[26] X. Wang, Z. Li, P. Xu, Y. Xu, X. Gao, H.-H. Chen, Spectrum sharing in
cognitive radio networks – an auction-based approach, IEEE Trans.
Acknowledgments Syst. Man Cybernet. Part B: Cybernet. 40 (3) (2010) 587–596.
[27] C.-H. Yu, B. Mumey, O. Tirkkonen, Distributed multiple relay
This work was partially supported by a fellowship spon- selection by an auction mechanism, in: IEEE Global
Communications Conference (GLOBECOM), Anaheim, CA, 3–7
sored by the Tata Consultancy Services (TCS), India.
December 2012, pp. 4392–4397.
[28] M. Yuriyama, T. Kushida, Sensor-cloud infrastructure – physical
sensor management with virtualized sensors on cloud computing,
References in: 13th International Conference on Network-Based Information
Systems, Takayama, 14–16 September 2010, pp. 1–8.
[1] Telosb data sheet, 2012. <http://www.willow.co.uk>. [29] M. Yuriyama, T. Kushida, M. Itakura, A new model of accelerating
[2] Tinyos, 2012. <http://www.tinyos.net>. service innovation with sensor-cloud infrastructure, in: SRII Global
[3] S. Aeron, V. Saligrama, D.A. Castanon, Efficient sensor management Conference (SRII), 2011 Annual, March 2011, pp. 308–314.
policies for distributed target tracking in multihop sensor networks, [30] L. Zhou, H. Wang, Toward blind scheduling in mobile media cloud:
IEEE Trans. Signal Process. 56 (6) (2008) 2562–2574. fairness, simplicity, and asymptotic optimality, IEEE Trans.
[4] N. Aitsaadi, N. Achir, K. Boussetta, G. Pujolle, Heuristic deployment to Multimedia 15 (4) (2013) 735–746.
achieve both differentiated detection and connectivity in WSN, in: [31] L. Zhou, Z. Yang, J. Rodrigues, M. Guizani, Exploring blind online
IEEE Vehicular Technology Conference (VTC), Singapore, 11–14 May scheduling for mobile cloud multimedia services, IEEE Wireless
2008, pp. 123–127. Commun. 20 (3) (2013) 54–61.
[5] A. Alamri, W.S. Ansari, M.M. Hassan, M.S. Hossain, A. Alelaiwi, M.A.
Hossain, A survey on sensor-cloud: architecture, applications, and
approaches, Int. J. Distrib. Sensor Netw. (November) (2013).
[6] M.W. Baidas, A.B. MacKenzie, Auction-based power allocation for Sudip Misra is an Associate Professor in the
multi-source multi-relay cooperative wireless networks, in: IEEE School of Information Technology at the
Global Telecommunications Conference (GLOBECOM), Houston, TX, Indian Institute of Technology Kharagpur.
USA, 5–9 December 2011, pp. 1–6. Prior to this he was associated with Cornell
[7] M.Z.A. Bhuiyan, G.-J. Wang, Z. Li, P. Yong, Prediction-based energy- University (USA), Yale University (USA),
efficient target tracking protocol in wireless sensor networks, J. Nortel Networks (Canada) and the
Central South Univ. Technol. 17 (2) (2010) 340–348. Government of Ontario (Canada). He received
[8] W. Blair, T. Bar-Shalom, Tracking maneuvering targets with multiple his Ph.D. degree in Computer Science from
sensors: does more data always mean better estimates?, IEEE Trans Carleton University, in Ottawa, Canada, and
Aerospace Electron. Syst. 32 (1) (1996) 450–456. the masters and bachelors degrees respec-
[9] S. Chatterjee, S. Misra, Dynamic and adaptive data caching
tively from the University of New Brunswick,
mechanism for virtualization within sensor-cloud, in: IEEE ANTS
Fredericton, Canada, and the Indian Institute
2014, December 2014.
[10] S. Chatterjee, S. Misra, Target tracking using sensor-cloud: sensor- of Technology, Kharagpur, India. He has several years of experience
target mapping in presence of overlapping coverage, IEEE Commun. working in the academia, government, and the private sectors in research,
Lett. PP (99) (2014) 1. teaching, consulting, project management, architecture, software design
[11] A. Chhetri, D. Morrell, A. Papandreou-Suppappola, On the use of and product engineering roles.
binary programming for sensor scheduling, IEEE Trans. Signal His current research interests include algorithm design for emerging
Process. 55 (6) (2007) 2826–2839. communication networks. He is the author of over 180 scholarly research
[12] K. Dogancay, Bias compensation for the bearings-only pseudolinear papers (including 90 journal papers). He has won eight research paper
target track estimator, IEEE Trans. Signal Process. 54 (1) (2006) 59– awards in different conferences. He was awarded the IEEE ComSoc Asia
68. Pacific Outstanding Young Researcher Award at IEEE GLOBECOM 2012,
[13] Y. Hamouda, C. Phillips, Adaptive sampling for energy-efficient Anaheim, California, USA. He was also the recipient of several academic
collaborative multi-target tracking in wireless sensor networks, IET awards and fellowships such as the Young Scientist Award (National
Wireless Sensor Syst. 1 (1) (2011) 15–25.
Please cite this article in press as: S. Misra et al., QoS-aware sensor allocation for target tracking in sensor-cloud, Ad Hoc Netw. (2015),
http://dx.doi.org/10.1016/j.adhoc.2015.04.009
14 S. Misra et al. / Ad Hoc Networks xxx (2015) xxx–xxx
Academy of Sciences, India), Young Systems Scientist Award (Systems Subarna Chatterjee is presently working as a
Society of India), Young Engineers Award (Institution of Engineers, India), Junior Research Fellow and pursuing her Ph.D.
(Canadian) Governor General’s Academic Gold Medal at Carleton from the School of Information Technology,
University, the University Outstanding Graduate Student Award in the Indian Institute of Technology, Kharagpur,
Doctoral level at Carleton University and the National Academy of India. She received her B.Tech. degree in
Sciences, India – Swarna Jayanti Puraskar (Golden Jubilee Award). He was Computer Science and Technology from West
also awarded the Canadian Government’s prestigious NSERC Post Bengal University of Technology, India in
Doctoral Fellowship and the Humboldt Research Fellowship in Germany. 2012. Her current research interests include
He is the Editor-in-Chief of the International Journal of Communication networking and communication aspects of
Networks and Distributed Systems (IJCNDS), Inderscience, U.K. He has Cloud Computing in Wireless Sensor
also been serving as the Associate Editor of the Telecommunication Networks.
Systems Journal (Springer), Security and Communication Networks
Journal (Wiley), International Journal of Communication Systems (Wiley),
and the EURASIP Journal of Wireless Communications and Networking.
He is also an Editor/Editorial Board Member/Editorial Review Board
Member of the IET Communications Journal, IET Wireless Sensor Systems, Amit Kumar Mandal is currently pursuing his
and Computers and Electrical Engineering Journal (Elsevier). Ph.D. from the Department of Coral
He has edited 6 books in the areas of wireless ad hoc networks, wireless Engineering, Indian Institute of Technology,
sensor networks, wireless mesh networks, communication networks and Kharagpur. His current research interests
distributed systems, network reliability and fault tolerance, and infor- include cloud computing, underwater sensor
mation and coding theory, published by reputed publishers such as networks, and target tracking.
Springer, Wiley, and World Scientific.
He was invited to chair several international conference/workshop pro-
grams and sessions. He served in the program committees of several
international conferences. He was also invited to deliver keynote/invited
lectures in over 20 international conferences in USA, Canada, Europe, Asia
and Africa.
Please cite this article in press as: S. Misra et al., QoS-aware sensor allocation for target tracking in sensor-cloud, Ad Hoc Netw. (2015),
http://dx.doi.org/10.1016/j.adhoc.2015.04.009