Professional Documents
Culture Documents
net/publication/311803947
CITATIONS READS
14 390
7 authors, including:
Suat Ozdemir
Hacettepe University
124 PUBLICATIONS 2,396 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
Fog Computing Based Complex Event Processing and Content Curation for Internet of Things View project
All content following this page was uploaded by Suat Ozdemir on 11 July 2020.
Jianying Zheng1, Qing Wang1, Bin Xu1, Wei Bi1, Yanyun Tao1,
Yang Xiao2,3,* and Suat Ozdemir4
1
School of Urban Rail Transportation, Soochow University, China.
2
School of Computer & Software, Nanjing University of Information Science & Technology,
Nanjing, 210044, China
3
Department of Computer Science, The University of Alabama, Box 870290,
Tuscaloosa, AL 35487–0290 USA
4
Computer Engineering Department, Gazi University, Maltepe, Ankara, TR-06570, Turkey
Emails: zhengjianying@suda.edu.cn, wangqing9115@163.com, xubin0924@foxmail.com,
1073974005@qq.com, taoyanyun@suda.edu.cn, yangxiao@ieee.org, suatozdemir@gazi.edu.tr
41
42 Jianying Zheng et al.
1 Introduction
Many related work exist in wireless sensor networks. In [1], the authors
deploy sensors along critical lines (such as transportation systems) instead
of all over the region. In [2], mobile robots, static sensors, and RFID are used
to deploy along roads (such as transportation systems), but the focus is on
bio-inspired communication and cooperation among robots, sensors, and
RFID tags. In [3], a divide- and conquer-based surveillance framework is
proposed to divide the surveillance area into small areas that sensors can
easily monitor. In [4], the authors study location information to achieve
intelligent monitoring and control via range-based localization algorithms
in wireless sensor networks. In [5], random scheduling for sensing coverage
with consideration of connectivity in sensor network is studied. In [6], the
authors provide a survey of data aggregation in wireless sensor networks.
In [7, 11], the authors study routing protocols in wireless sensor networks. In
[8], the authors study lightweight deployment-aware scheduling in wireless
sensor networks. In [9], a comprehensive survey of energy-efficient schedul-
ing mechanisms in wireless sensor networks is provided. In [10], the authors
study key management in wireless sensor networks. In [17], the collision-free
multichannel superframe scheduling problem for the IEEE 802.15.4 standard
is studied for wireless sensor networks. In [12], the authors study traffic sur-
veillance systems for intelligent transportation systems, in which the mag-
netic sensors are deployed in the middle of the freeway or intersection road,
and the deployment time is about ten minutes. In [13], the authors study
vehicle classification data for wireless sensor networks. In [14], the authors
study the real time traffic measurement from single loop inductive signatures.
In [18–19], routing and data delivery via multiple hops are studied.
This paper applies wireless sensor networks to collect traffic flow data.
The traffic information is sensed and sent to the control center by the wireless
Zigbee protocol. This way can avoid the complex wiring. In addition, the
magnetic sensors are deployed beside the road instead of in the middle
of the road, which can avoid interrupting the traffic when these wireless
systems are used to collect traffic flow data.
The rest of the paper is organized as follows. Section 2 describes the hard-
ware platform of the wireless surveillance system used to collect traffic flow
data. Then software of signal processing is illustrated in Section 3. Experi-
mental results are provided in Section 4. Finally, conclusions and future work
are discussed in Section 5.
Figure 1
The hardware platform of the wireless surveillance system
signal when the vehicles pass by. Then this magnetic signal is sent to the
sink node by the wireless Zigbee protocol. Once the sink node receives this
magnetic signal, it will transmit it to the PC by the serial communication
protocol. The magnetic signal will be displayed in real-time, based on
which decisions are made to determine the number of vehicles passing
by. The following subsection will introduce each part of the wireless
surveillance system briefly.
Figure 2
The sensing module-HMC5883L
Figure 3
The block diagram of the magnetic sensor-HMC5883L
Figure 4
Magneto resistance changes with respect to the angle θ
In the wireless surveillance system, sensor nodes are deployed beside the
road in order to reduce the traffic interference. This way will increase the dif-
ficulty of signal acquisition and processing. This section will give the method
of signal processing and decision-making algorithms to calculate the vehicle
flow precisely.
Non-intrusive Traffic Data Collection with WSNs 47
G3 = Gx 2 + Gy 2 + Gz 2 (2)
where Gx, Gy, Gz represent three directions, and G3 represents the scalar.
∑x
i=1
i
x0 = , i = 1, 2,…, n (3)
n
48 Jianying Zheng et al.
where x0 represents the initial value, xi represents the xth sampling value from
the magnetic sensor, n represents the sample times.
The threshold value is set to be (x0 + Dx). The magnetic signal value is x,
and it is related to time t. The relationship can be formulated as follows.
x = f (t ) (4)
Figure 5
The flow chart of the wireless surveillance system
Non-intrusive Traffic Data Collection with WSNs 49
4 Experimental Results
Figure 7
Three places where experiments were performed
50 Jianying Zheng et al.
Figure 8
The deployment of the wireless surveillance system in the intersection of Huayuan Road and
S227 Road
Figure 9
The magnetic signal when a bicycle passed by
Non-intrusive Traffic Data Collection with WSNs 51
Figure 10
The magnetic signal when a motor bicycle passed by
The magnetic signal is shown in Fig.11 when a small vehicle passed by.
The magnetic intensity changes from 0.437 gauss to 0.425 gauss. This
magnetic signal is bigger than that of bicycle passing by and motor bicycle
passing by. When a large vehicle passed by, the corresponding magnetic
signal changed and the results are shown in Fig.12. The magnetic intensity
changes from 0.437 gauss to 0.405 gauss. This magnetic signal is much
bigger than that of three kinds of traffic tools previously mentioned passing
by. In order to show more details, the magnetic signals detected in four
kinds of traffic tools are shown together in Fig.13. Based on the compari-
son, it is not hard to determine the vehicle flow according to the magnetic
signal. Especially, the bigger vehicle flow can be accurately estimated.
In order to demonstrate the wireless surveillance system, long-time experi-
ments are performed. Fig.14 shows one of the examples when five vehicles
passed by the wireless surveillance system during a period of time. The statis-
tic results are shown in Table 1. The detected vehicle flow is calculated by the
magnetic signal detected, and the actual vehicle flow is calculated by human
beings. In Table 1, the accuracy of the vehicle flow is calculated as follows.
d
Accuracy = ×100% (6)
a
where d represents the detected vehicle flow and a represents the actual
vehicle flow.
52 Jianying Zheng et al.
Figure 11
The magnetic signal when a small vehicle passed by
Figure 12
The magnetic signal when a large vehicle passed by
Non-intrusive Traffic Data Collection with WSNs 53
Figure 13
The comparison of four kinds of traffic tools
Figure 14
The magnetic signal when five vehicles passed by during a period of time
54 Jianying Zheng et al.
The serial number Actual vehicle flow Detected vehicle flow Accuracy
1 38 35 92.1%
2 18 16 88.9%
3 20 18 90%
Table 1
The accuracy of vehicle flow detection with wireless surveillance systems
Figure 15
The magnetic signal in the T-intersection of Huayuan Road and Jixue Road during a period
of time
Non-intrusive Traffic Data Collection with WSNs 55
Figure 16
The magnetic signal in the T-intersection of Xuzhuang community Road during a period of time
Actual Detected
Detected place vehicle flow vehicle flow Accuracy
Table 2
The accuracy of vehicle flow detection in two other places
56 Jianying Zheng et al.
efficiently. The accuracy can reach more than ninety percent. This accuracy
can satisfy almost all applications in urban intelligent transportation systems.
In the future, the wireless surveillance systems are needed to improve.
Complex roads are planned to test, such as two-lane roads. In complex roads,
the magnetic signal is also sensitive to the distance between the sensor nodes
and the traffic tools. How to distinguish the types of traffic tools becomes a
difficult problem. The detection model and the decision-making optimal
algorithms are two key points.
Acknowledgments
This work was supported in part by the Natural Science Foundation of China
under grant number 61203218, 61374200, and the Natural Science Founda-
tion of Jiangsu Province under grant nunber BK2011318, and Science Project
of Suzhou (Industrial Foundation Research) under grant number SYG201407
References
[1] Y. Xiao and Y. Zhang, “A Critical Line based Boundary Surveillance Strategy in Wireless
Sensor Networks,” Telecommunication Systems Journal (Springer), Vol. 52, No. 2, 2013,
pp. 423–434.
[2] Y. Xiao, Y. Zhang, and X. Liang, “Primate-inspired Communication Methods for Mobile
and Static Sensors and RFID Tags,” ACM Transactions on Autonomous and Adaptive
Systems, Vol. 6, No. 4, Article 26, pp. 26:1–26:37, Dec. 2011, DOI 10.1145/2019591.
2019595
[3] Y. Xiao and Y. Zhang, “Divide- and conquer-based surveillance framework using robots,
sensor nodes, and RFID tags,” (Wiley) Wireless Communications and Mobile Computing
(WCMC), Vol. 11, No. 7, pp. 964–979, Jul. 2011.
[4] J. Zheng, Y. Huang, Y. Wang, Y. Xiao, and C. Chen, “Range-based localisation algorithms
integrated with the probability of ranging error in wireless sensor networks,” International
Journal of Sensor Networks, Vol. 15, No. 1, 2014, pp. 23–31.
[5] C. Liu, K. Wu, Y. Xiao, and B. Sun,” Random Coverage with Guaranteed Connectivity:
Joint Scheduling for Wireless Sensor Networks,” IEEE Transactions on Parallel and Dis-
tributed Systems, Vol. 17, No. 6, June 2006, pp. 562–575.
[6] S. Ozdemir and Y. Xiao, “Secure Data Aggregation in Wireless Sensor Networks: A Com-
prehensive Overview,” Computer Networks, Vol. 53, No. 12, Aug. 2009, pp. 2022–2037.
[7] Le. Yu, D. Chen, and X. Huang, “Robust node-disjoint multipath routing for wireless
sensor networks,” International Journal of Sensor Networks, Vol. 15, No. 2, 2014, pp.
112–120.
[8] K. Wu, Y. Gao, F. Li, and Y. Xiao, “Lightweight Deployment-Aware Scheduling for
Wireless Sensor Networks,” ACM/Springer Mobile Networks and Applications (MONET),
Vol. 10, No.6, pp. 837–852, Dec. 2005.
[9] L. Wang and Y. Xiao, “A Survey of Energy-Efficient Scheduling Mechanisms in Sensor
Networks,” ACM/Springer Mobile Networks and Applications (MONET), Vol. 11, No. 5,
2006, pp. 723–740.
[10] Y. Xiao, V. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, “A Survey of Key Management
Schemes in Wireless Sensor Networks,” Computer communications Journal, Vol. 30 No.
11–12, Sep. 2007. pp. 2314–2341.
Non-intrusive Traffic Data Collection with WSNs 57
[11] K. Xing, W. Wu, L. Ding, L. Wu, and J. Willson, “An efficient routing protocol based on
consecutive forwarding prediction in delay tolerant networks,” International Journal of
Sensor Networks, Vol. 15, No. 2, 2014, pp. 73–82.
[12] Sing-Yiu Cheung, Pravin Varaiya. Traffic Surveillance by Wireless Sensor Networks:
Final Report. ISSN 1055–1425. January 2007.
[13] X. Zhang, Y. Wang and N. L. Nihan. Monitoring a freeway network in real-time using
single-loop detectors: System design and implementation. 83rd TRB Annual Meeting,
January, 2004, Washington, D.C.
[14] S. Oh, S. G. Ritchie and C. Oh. Real time traffic measurement from single loop inductive
signatures. 81st TRB Annual Meeting, January, 2002, Washington, D.C.
[15] David Schrank, Tim Lomax, 2005 Urban Mobility Report, Texas Transportation Institute,
the Texas A&M University System, 2005.
[16] D. Estrin, D. Culler, K. Pister, and G. Sukhatme, Connecting the Physical World
with Pervasive Networks, IEEE Pervasive Computing, vol. 1, no. 1, pp. 59–69, January
2002.
[17] X. Jin, Q. Zhang, P. Zeng, F. Kong, and Y. Xiao, “Collision-free multichannel superframe
scheduling for IEEE 802.15.4 cluster-tree networks,” International Journal of Sensor Net-
works, Vol. 15, No. 4, 2014, pp.246- 258.
[18] J. Shen, H. Tan, J. Wang, J. Wang, and S. Lee, “A Novel Routing Protocol Providing Good
Transmission Reliability in Underwater Sensor Networks,” Journal of Internet Technol-
ogy, vol. 16, no. 1, pp. 171–178, 2015.
[19] S. Xie and Y. Wang, “Construction of Tree Network with Limited Delivery Latency in
Homogeneous Wireless Sensor Networks,” Wireless Personal Communications, vol. 78,
no. 1, pp. 231–246, 2014.
[20] J. Mu, W. Song, W. Wang, and B. Zhang, “Self-healing hierarchical architecture for
ZigBee network in smart grid application,” International Journal of Sensor Networks,
Vol. 17, No. 2, 2015, pp. 130–137.
[21] T. Yang, Q. Yang, and L. Cheng, “Experimental study: a LQI-based ranging technique in
ZigBee sensor networks, “International Journal of Sensor Networks, Vol. 19, No. 2, 2015,
pp. 130–138.
[22] Y. Xiao, H. Chen, B. Sun, R. Wang, and S. Sethi, “MAC Security and Security Overhead
Analysis in the IEEE 802.15.4 Wireless Sensor Networks,” EURASIP Journal on Wireless
Communications and Networking, vol. 2006, Article ID 93830, 12 pages, 2006.
doi:10.1155/WCN/2006/93830.