Professional Documents
Culture Documents
net/publication/305001659
Article in International Journal of Information Technology and Computer Science · July 2016
DOI: 10.5815/ijitcs.2016.07.07
CITATIONS READS
0 98
2 authors, including:
Eric Gamess
Jacksonville State University
83 PUBLICATIONS 337 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Eric Gamess on 04 January 2020.
Eric Gamess
Laboratory of Communications and Networks, Central University of Venezuela, Los Chaguaramos, Caracas, Venezuela
E-mail: eric.gamess@ciens.ucv.ve
Abstract—In this paper we introduce a novel algorith m [1]. The GPS system is already heavily used in the
for counting nodes based on wireless communicat ions automobile industry and it is becoming also very popular
and their actual position, which works for stationary in smartphones.
nodes and in scenarios where nodes are moving at high The development of these technologies is promising
speeds. For this, each node is endowed with a Global and has attracted much interest from different entities that
Positioning System (GPS) receptor, allo wing it to do research in these fields because of the multitude of
periodically send its actual position and speed through possible applications that could involve their use.
beacon messages. These data will be received by the first- However, most of the possible applications require new
hop neighboring nodes (which are within its scope or algorithms and tools for their development. One such
propagation range) that will have the ability to compute algorithm is the counting of objects (people, animals,
the actual position of the sending node based on the last devices, vehicles, etc.) with a specific characteristic or
broadcasted position and speed. The algorith m is within a specified geographical area. Counting objects has
constructed on the propagation of a count request interested the scientific community since time
message from the originator node toward nodes that are immemorial [2]. According to [3][4][5], there are many
far away fro m it, and response messages traveling back to alternatives or solutions to count objects main ly based on
the originator, in the reverse path when it is possible, ―in situ‖ technologies, such as turnstiles, barrier arms,
otherwise using the closest node on the way to the digital cameras, video cameras, thermal cameras,
originator. To validate and evaluate the performance of pneumatic road tubes, magnetic sensors, infrared beams,
our proposal, we simulate the algorith m using a famous etc. However, since the installation and maintenance of
network simulat ion tool called OMNeT++/INET. The these solutions are complex and have a high economic
results of our simulations show that the proposed cost, it is necessary to propose alternatives. According to
algorith m efficiently co mputes a number of nodes very trends, in the near future, most of the mobile objects will
close to the real one, even in the case of scenarios of be equipped of a wireless interface and a GPS receptor,
mobile nodes moving at high speeds, with an acceptable hence a new possibility has been opened to develop
response time. counting algorithms based on these emerging technologies.
In this research work, we propose a novel algorithm to
Index Terms—Wireless Networks, Node Counting, count nodes using wireless communications and their
OMNeT++, INET, Network Simulator, GPS. actual position. With the aim of validating the proposed
algorithm, we use a discrete event simulator called
OMNeT++/INET to test and analyze our proposal in
I. INT RODUCT ION different scenarios, where we varied different parameters
such as nodes’ speed, nodes’ density, signal propagation
In the last few years, we have seen the growing and
range, etc. The simulation results show that our novel
consolidation of two important technologies that are algorithm performs efficient node counting even when the
becoming ubiquitous. On one hand, wireless
nodes are moving at high speeds.
communication networks have revolutionized the way to
The rest of this paper is organized as follows. In Section
send and receive information since they allow users’ II, we review the related work. In Section III, we
mobility and lower the cost of network deployment .
introduce our novel algorithm to count nodes using
Nowadays, it is common to have access to communication
wireless technologies and their actual position. Section IV
networks fro m d ifferent devices such as smartphones, briefly describes the simulation tools and scenarios that
PDAs, tablets, notebooks, etc. On the other hand, the
we use to validate the proposed algorithm. Section V
Global Positioning System (GPS) is a space-based satellite
presents an analysis of the performance results of our
navigation system that provides location and time simulations. Finally, Section VI concludes the paper and
information, anywhere on the Earth where there is an
presents future work.
unobstructed line of sight to four or more GPS satellites
Copyright © 2016 MECS I.J. Information Technology and Computer Science, 2016, 7, 43-52
44 An Algorithm to Count Nodes in Wireless Networks Using their Actual Position
Copyright © 2016 MECS I.J. Information Technology and Computer Science, 2016, 7, 43-52
An Algorithm to Count Nodes in Wireless Networks Using their Actual Position 45
t2 = t1 + RBCT_TIME
t3 = t1 + RBCT_TIME + 1*INT_BTW_REQ
t4 = t1 + RBCT_TIME + 2*INT_BTW_REQ
t5 = t1 + REQ_TO
t6 = Time when the actual node receives a possible delayed
COUNT_REPLY message from another node.
t7 = Time when the actual node sends a possible asynchronous
COUNT_REPLY message.
Fig. 1 also shows that the nodes will rebroadcast three INT_BTW_REQ (Interval Between Request):
COUNT_REQUEST messages in row and also send a Time interval between the sending of
synchronous COUNT_REPLY message after a specific COUNT_REQUEST messages. In other words, it
time. It is necessary to send several times (3 times in our also represents the time between two consecutive
algorithm) the COUNT_REQUEST message since it is a COUNT_REQUEST messages sent by the actual
broadcast message that can collide with other messages node.
without this being detected. REQ_TO (Request Timeout): It is the time
In this new algorithm, each node sends its between the reception of the first
COUNT_REPLY message to another node, using the COUNT_REQUEST and the mo ment when the
following considerations. If the nodeToGoBack is still on actual node has to send the synchronous
the list of 1-hop neighbors and if it is still in the node COUNT_REPLY message to nodeToGoBack
propagation range (according to the computation of the toward the originator.
distance between the node and nodeToGoBack ), the node TIME_TO_WAIT: It is the time a node waits after
will send its COUNT_REPLY message to nodeToGoBack. the rebroadcast of the third COUNT_ REQUEST
Otherwise (when nodeToGoBack is out of range), the message and the sending of the synchronous
node determines the closest neighboring node toward the COUNT_REPLY message to nodeToGoBack
originator fro m its list of neighboring nodes (1-hop away toward the originator. This time must be big
nodes), by calculating the distance between the actual enough to allow the propagation of
position of the 1-hop neighbor and the actual position of COUNT_REQUEST messages from the actual
the originator, before sending the COUNT_REPLY node toward nodes that are far away fro m the
message to this node. Additionally, the node updates its originator, and the propagation of the
nodeToGoBack variable to point the calculated closest 1- COUNT_REPLY messages from the nodes that are
hop neighbor. Now, if the node does not have any 1-hop far away fro m the originator toward the actual node.
neighbor in this mo ment (i.e., the list of 1-hop neighbors By the way, TIME_TO_WAIT is not a constant
is empty), it will plan a new attempt to send its value and will be computed by every node
COUNT_REPLY message in the near future. according to HopLimit and how far away it is fro m
An asynchronous COUNT_REPLY message is sent by the originator (called HopAway in the algorithm).
a node with a slight delay called DELA Y_ASYNC, after DELA Y_ASYNC: A small random t ime that a
receiving a delayed COUNT_REPLY message. This node waits after the reception of a delayed
approach forces the cooperating nodes to update the actual COUNT_REPLY message, and before the sending
node count, reaching a more accurate result. of the asynchronous COUNT_REPLY message.
The other parameters used in our algorithm are
described here (see Fig. 1).
B. COUNT_REQUEST and COUNT_REPLY Messages
RBCT_TIM E (Rebroadcast Time): Time between COUNT_REQUEST and COUNT_ REPLY messages
the reception of the first COUNT_REQUEST, and have the same Protocol Data Unit (PDU) and are
the first rebroadcast of the COUNT_ REQUEST by composed of 10 fields (see Fig. 2).
the actual node.
Copyright © 2016 MECS I.J. Information Technology and Computer Science, 2016, 7, 43-52
46 An Algorithm to Count Nodes in Wireless Networks Using their Actual Position
The field Message Type can be either 0 or 1. It is used neighboring nodes, the node chooses its new destination
to identify the type of message. A value of 0 is for a as the node that is currently closest (in distance) to the
COUNT_REQUEST, while 1 is for a COUNT_ REPLY. originator, using the information (Timestamp, PosX, PosY,
Sequence Number is used to match requests with replies SpeedX, SpeedY) gotten in the BEA CON messages (see
and to distinguish between different requests Fig. 3), and the information of the originator (OrgTS,
(COUNT_REQUEST). OrgTS (Originator Timestamp) is OrgX, OrgY, OrgSX, OrgSY) received in the
set by the originator when it s ends a COUNT_REQUEST COUNT_REQUEST messages (see Fig. 2). Th is distance
message. It is a timestamp taken by the originator at the is computed applying the following formula:
mo ment of sending the COUNT_ REQUEST message and
is aimed to control out-of-date messages and replay distanceOrigin =
attacks. (OrgX, OrgY) is the position of the originator at √( ) ( )
the moment of sending the COUNT_ REQUEST message.
(OrgSX, OrgSY) is the speed of the originator at the Where:
mo ment of sending the COUNT_ REQUEST message. newPosX = PosX+(SpeedX*(ActualTime-Timestamp))
The originator and the nodes broadcast newPosY = PosY+(SpeedY*(ActualTime-Timestamp))
COUNT_REQUEST messages along with the argument newOrgX = OrgX+(OrgSX*(ActualTime-OrgTS))
HopAway which represents the number of hops -away the newOrgY = OrgY+(OrgSY*(ActualTime-OrgTS))
receiver of the COUNT_ REQUEST message is from the
originator. The originator, which starts the process, must distanceOrigin is the variable that stores the result of the
specify a value of HopAway equal to 1. Each node that calculation of the d istance fro m a 1-hop neighbor node to
rebroadcasts the message will select the smallest the originator and ActualTime represents the actual time.
HopAway received up to now and will increment this field The synchronization of time between the different nodes
by 1. Every time a node updates its HopAway field due to is solved with the time received from the GPS satellites.
the reception of a better COUNT_ REQUEST (closer to
the originator), it has to update its nodeToGoBack variable. D. Algorithm
nodeToGoBack is a reference to the node with the lowest The originator first sends three messages of type
HopAway from which the actual node has received a COUNT_REQUEST as broadcast with a HopAway equal
COUNT_REQUEST message. HopLimit field is a way to to 1 (separated by INT_BTW_REQ). When a node
control how far away COUNT_REQUEST messages are receives the first COUNT_ REQUEST message, it will do
propagated from the orig inator toward the other nodes. It the following after (see Fig. 1):
delimits the counting range. The field Total is filled with
the number of nodes counted up to now. In RBCT_TIM E: the node rebroadcasts the
COUNT_REQUEST messages, it is always equal to 0. COUNT_REQUEST with a HopAway equal to the
Before sending a COUNT_ REPLY message, a node must minimu m HopAway received by this time +1. The
update this field according to the COUNT_REPLY node also registers the ID of the node that sent the
messages received so far, and add 1 to the sum that COUNT_REQUEST with the minimu m HopAway,
represents itself. in variable nodeToGoBack .
C. BEACON Messages RBCT_TIM E + 1 * INT_ BTW_REQ: the node
rebroadcasts the previous COUNT_ REQUEST
The PDU of BEACON messages are composed of 5 message (because of possible collision with the
fields as shown in Fig. 3. first COUNT_REQUEST sent). If required, the
fields of the COUNT_ REQUEST message are
updated.
RBCT_TIM E + 2 * INT_ BTW_REQ: the node
Fig.3. BEACON Message rebroadcasts the previous COUNT_ REQUEST
message (because of possible collision with the
Timestamp is the current time set by the node when it first and second COUNT_ REQUEST sent). If
sends a BEACON message. (PosX, PosY) represent the required, the fields of the COUNT_ REQUEST
position of the node when it sends the BEACON message, message are updated.
while (SpeedX, SpeedY) is its speed at this time. REQ_TO: If the node did receive
When a node cannot send its COUNT_ REPLY message COUNT_REPLY messages, then the node
to its nodeToGoBack node because it is out of its computes the total of nodes based on variable Total
propagation range, it has to select a new destination node received in COUNT_ REPLY messages (+1 to
in the path toward the originator. Fro m its list of 1-hop represent itself in the total count) and sends the
result to nodeToGoBack or the closest node in the
Copyright © 2016 MECS I.J. Information Technology and Computer Science, 2016, 7, 43-52
An Algorithm to Count Nodes in Wireless Networks Using their Actual Position 47
path to the originator, as a unicast message. If after both nodes and originator are mobile. We also execute
REQ_TO the node did not receive any simulations where we vary the size of the rectangular area
COUNT_REPLY message, then it generates a where the nodes and the originator are placed and can
COUNT_REPLY with Total equal to 1 (this 1 move. We co mpare the results of our experiments with the
represents itself) and sends it to nodeToGoBack or ones obtained with the algorithm presented in [2].
the closest node in the path to the originator, as a
A. Mobile Nodes and Stationary Originator Scenarios
unicast message.
DELA Y_ASYNC: If the node receives a delayed In this section, we look at the performance of our
COUNT_REPLY message, then it recalculates the algorithm when nodes are mobile, but the originator is
total number of nodes based on variable Total static and placed in the center of an 800m x 800m squared
received in the COUNT_REPLY messages (+1 to area. For the movement of nodes, we use the random way
add itself to the total count) and then sends the point mobility model (RandomWPMobility) varying the
result to its nodeToGoBack node or the closest speed of the nodes from 25 mps (meters per second) to 80
node in the path to the originator, as an mps, with a wait time of 0s (time interval between
asynchronous COUNT_REPLY message. reaching a target and moving toward the new one).
In Table 1, we varied the propagation range of the
nodes and the originator (100m, 150m, 200m, 250m, and
IV. ENVIRONMENT S AND SCENARIOS OF SIMULAT ION 300m). For all these scenarios, we chose 100 mob ile
nodes that are initially randomly placed with value of
The algorithm that we present in this paper was RBCT_TIM E=0.2s, INT_BTW_REQ=0.2s, and
implemented in OMNeT++/INET. OMNeT++ 1 is an open
DELAY=0.4s. The originator starts the counting process
source, C++ based, multiplatform (W indows, MacOS, and with hopLimit=3.
Unix), discrete event simulator for modeling any system The results are represented as values a/b/c, where a
composed of devices interacting with each other. One of
denotes the number of nodes that are within the scope of
the main strengths of OMNeT++ is its Graphical User the originator using multihop routing (i.e., nodes that
Interface (GUI). Through the GUI, users can create NED should be counted), b the number of nodes actually
files (a description language to define the structure of the
counted by the algorithm of [2] (that fro m now on we will
model) and inspect the state of each component during call Algorithm I), and c the nu mber of nodes actually
simulations. counted by our novel algorithm (which we will call
For simulations of data networks, OMNeT++ relies on
hereinafter Algorithm II). According to these results, we
external extensions, such as INET. The INET Framework can observer that we have high accuracy in the nodes
is an open-source communication network simu lation counting with algorithm II. We can see that the best
package for the OMNeT++ simulation environment. It
results are obtained with values of propagation range
contains models for several wired and wireless networking equal to 200m, 250m, and 300m. For example, Table 1
protocols, including UDP, TCP, SCTP, IP, IPv6, Ethernet, shows that for a scenario of 100 nodes , a propagation
PPP, 802.11, MPLS, OSPF, and many others.
range equal to 200m, and a speed equal to 55 mps (198
We chose OMNeT++/INET because of its powerful km/h), the originator should count 100 nodes. Now when
GUI that facilitates the traceability and debugging of we run the simu lation, algorithm I counted 50 nodes,
simulation models, by displaying the network graphics,
instead of 100 nodes, which is a good approximat ion.
animat ing the message flow and letting users peek into However, algorithm II counted 90 nodes, being much
objects and variables within the model. Also, it is a very more effective.
active project with many models that are constantly
In Table 2, we chose a fixed propagation range of 250m,
updated, making OMNeT++ a good candidate for both but we varied the speed of the nodes (from 25 mps to 80
research and educational purposes [18]. mps) and the number of nodes . Based on these results, we
For all our simu lations, we selected WiFi (IEEE
can see that for a number of nodes up to 100, algorithm II
802.11g) for the wireless communication standard, with a performs an effective counting even for very high speeds
bitrate of 54 Mbps. The free space propagation model was compared with algorithm I. Now, in both algorithms when
chosen for path loss. We simulate different scenarios
there is a high density of nodes (when the total number of
where nodes are randomly distributed over a rectangular nodes is equal to 150, 200, and 250), the accuracy of the
area. The random waypoint mobility model was selected counting degrades. This is due to the numerous collisions,
to reflect the most general scenario of node movements.
since there are many nodes in a small area try ing to send
messages at the same time. It is worth mentioning that
algorithm II is still performing a more effective counting
V. PERFORMANCE RESULT S OF OUR SIMULAT IONS than the other one, even in these adverse conditions.
In this section, we present and analyze some of the B. Mobile Nodes and Originator Scenarios
performance results of our simu lations that were executed
in scenarios with mobility: (1) in scenarios with mobile In this section, we report results of experiments when
nodes and stationary originator and (2) in scenarios where both the nodes and the originator are mobile. At the
beginning of the simulations, the nodes are randomly
positioned in an 800m x 800m squared area, while the
1
http://www.omnetpp.org
Copyright © 2016 MECS I.J. Information Technology and Computer Science, 2016, 7, 43-52
48 An Algorithm to Count Nodes in Wireless Networks Using their Actual Position
originator is initially p laced at its center. Both, the nodes nodes and the originator, we chose RBCT_TIM E=0.2s,
and the originator are moving according to the random INT_BTW_REQ=0.2s, and DELAY=0.4s. The originator
way point mobility model, without making stops at the starts the counting process with a hopLimit=3.
visited positions, i.e., with a wait time of 0s. For both,
T able 1. Nodes Counted when Varying the Speed of the Nodes and the Propagation Range (Speed O riginator = 0 mps)
Table 2. Nodes Counted when Varying the Speed of the Nodes and the Number of Nodes (Speed Originator = 0 mps)
T able 3. Nodes Counted when Varying the Speed of the Nodes and the Originator as well as the Number of Nodes
Copyright © 2016 MECS I.J. Information Technology and Computer Science, 2016, 7, 43-52
An Algorithm to Count Nodes in Wireless Networks Using their Actual Position 49
T able 4. Nodes Counted when Varying the Speed of Nodes and the Originator as well as the Propagation Range
In Table 3, we chose a fixed propagation range of our novel algorithm in 3.17s, with a total number of sent
250m, but we varied the speed of the nodes and the messages equal to 519 and a counting error of 2%.
originator (fro m 25 mps to 80 mps), as well as the In Table 6, we varied the speed of the nodes and the
number of nodes. As in the experiments of Table 2, the originator (fro m 25 mps to 80 mps). For all these
novel algorith m performs a most effect ive counting than scenarios, we chose 150 mobile nodes and a fixed
algorithm I for a nu mber of nodes up to 100. Now, for propagation range value of 250m. Similarly to Table 5 the
high density of nodes, in both algorithms the accuracy of simulation results show good response times with a small
the counting degrades due to the numerous collisions, but number of messages. For example, as reported in Table 6,
being significantly more efficient in algorithm II. for a speed of nodes and the originator equal to 65 mps
Table 4 shows the results of the simulat ions for (234 km/h), a total number of nodes equal to 150, and a
scenarios with 100 nodes, where we varied the speed of propagation range of 250m, 144 out of 150 reachable
the nodes and the originator, as well as their propagation nodes were counted by our novel algorithm in 3.07s, with
range. Similarly to Tab le 1, we can see that algorithm II a total number of sent messages (COUNT_REQUEST and
has a higher precision in the counting of nodes than COUNT_REPLY) equal to 896 and a counting error of
algorithm I, specifically when the propagation range 4%.
values are equal to 200m, 250m, and 300m. We also performed some experiments by changing the
size of the rectangular area with a density of 100
C. Other Simulations
nodes/km2 (see Table 7) with the aim of evaluating how
In this section, we study the performance of the the size of the area can affect the algorith m, and thus
proposed algorithm on the perspective of the response check if it presents scalability issues . At the beginning of
time and the number of messages sent by the nodes , in the simulations, the nodes are randomly positioned in a
scenarios where both the nodes and the originator are rectangular area, while the orig inator is placed at its center.
mobile. At the beginning of the simulations, the nodes are Both, the nodes and the originator are moving according
randomly positioned in an 800m x 800m squared area, to the random way point mobility model, without making
while the originator is initially placed at its center. stops at the visited positions, i.e., with a wait time of 0s
Table 5 shows the results of the experiments for and a speed of 55 mps (198 km/h). For both, nodes and
scenarios where we varied the total number of nodes the originator, we chose RBCT_TIM E=0.2s,
(fro m 60 to 250) and chose a fixed propagation range INT_BTW_REQ=0.2s, and DELA Y=0.4s and a fixed
value of 250m and a speed of the nodes and the originator propagation range of 250m. The originator starts the
equal to 55 mps (198 km/h). We can observe that counting process with a hopLimit=3. In general terms,
algorithm II performs an effective counting for a number simulation results show that our algorithm also performed
of nodes up to 100 with a s mall nu mber of messages and a well, in different sized areas, at high speeds, with a small
short response time. For example, for a total of 100 nodes, number of messages and an acceptable response time.
98 out of 100 reachable nodes were counted effectively by
Copyright © 2016 MECS I.J. Information Technology and Computer Science, 2016, 7, 43-52
50 An Algorithm to Count Nodes in Wireless Networks Using their Actual Position
T able 5. Response T ime and Number of Sent Messages when Varying the Number of Nodes
T able 6. Response T ime and Number of Sent Messages when Varying the Speed of Nodes and the Originator
T able 7. Nodes Counted when Varying the Size of the Rectangular Area (Mobil Nodes and Originator)
Size of the T otal number Reachable Nodes count Response Counting T otal messages
area of nodes nodes algorithm time error sent
500m x 500m 25 25 20 2.04 s 20.0% 128
500m x 750m 38 38 38 2.96 s 0.0% 161
500m x 1000m 50 50 50 4.91 s 0.0% 495
500m x 1250m 63 63 58 3.18 s 7.9% 529
500m x 1500m 75 71 64 3.65 s 9.9% 639
750m x 800m 60 60 59 3.26 s 1.7% 414
750m x 1000m 75 64 64 5.78 s 0.0% 441
750m x 1250m 94 89 70 3.55 s 21.3% 614
800m x 800m 64 64 59 2.83 s 7.8% 276
800m x 1000m 80 80 73 2.85 s 8.8% 355
800m x 1250m 100 97 83 3.06 s 14.4% 607
1000m x 1000m 100 100 90 2.72 s 10.0% 399
1000m x 1250m 125 109 99 3.65 s 9.2% 936
1250m x 1250m 156 141 124 2.84 s 12.1% 671
1500m x 1500m 225 182 162 4.19 s 11.0% 1238
2000m x 2000m 400 197 178 5.14 s 9.6% 1279
Copyright © 2016 MECS I.J. Information Technology and Computer Science, 2016, 7, 43-52
An Algorithm to Count Nodes in Wireless Networks Using their Actual Position 51
REFERENCES
VI. CONCLUSIONS AND FUT URE W ORK [1] E. Huerta, A. M angiaterra, and G. Noguera, GPS: Satellite
In this paper, we described a novel algorith m to count Positioning. UNR Editora (Editorial of National
University of Rosario), Rosario, Argentina, 2005.
nodes using wireless communication and their actual
[2] E. Gamess and M . Contreras, A Proposal for an
position, based on the ideas raised by the algorithms
Algorithm to Count Nodes using Wireless Technologies.
proposed in [2]. The new algorithm differs fro m the International Journal of High Performance Computing and
previous one with the addition of position and speed Networking. Vol 8, No. 4, pp. 345-357, 2015.
information, to make wiser decisions when sending [3] E. Kell and E. M ills, Traffic Detector Handbook. U.S.
COUNT_REPLY messages back to the originator. For Department of Transportation, Federal Highway
that, a discovery protocol was implemented where Administration, 2nd Edition, pp. 1–39. USA, 1990.
BEACON messages are sent periodically, allowing nodes [4] L. Klein, Sensors Technologies and Data Requirements
to discover their 1-hop neighbors and infer their actual for ITS Applications. Artech House Publishers, Norwood,
USA, June 2001.
position at any time. Another enhancement of the
[5] L. M imbela and L. Klein, A Summary of Vehicle
algorithm is the introduction of late COUNT_REPLY
Detection and Surveillance Technologies Used in
messages, in order to recalculate the total number of nodes, Intelligent Transportation Systems. Handbook, Federal
and obtain a better counting. Highway Administration, Intelligent Transportation
To validate and evaluate the performance of our novel Systems, USA, 2007.
algorithm, we performed simulat ions where fast mobility [6] G. Leduc, Road Traffic Data: Collection M ethods and
is involved in the experiments, resulting in frequent Applications. European Commission, Joint Research
topological changes between devices, specifically: (1) in Center, Institute for Prospective Technological Studies,
scenarios with mobile nodes and stationary originator and Seville, Spain, 2008.
[7] L. Sweeney and R. Gross, M ining Images in Publicly
(2) in scenarios where both nodes and the originator are
Available Cameras for Homeland Security. AAAI Spring
mobile. We compare our new algorith m with an algorithm
Symposium on AI Technologies for Homeland Security ,
proposed in [2]. Simu lation results indicate that our novel Palo Alto, California, USA, M arch 2005.
algorithm efficiently computes a total number of nodes [8] S. Cho, T. Chow, and C. Leung, A Neural-Based Crowd
very close to the real one, even in scenarios when the Estimation by Hybrid Global Learning Algorithm. IEEE
nodes are moving at very high speed, with a small number Transactions on Systems, M an and Cybernetics, Part B:
of messages and a short response time. However, for Cybernetics, Vol. 29, No. 4, pp. 535–541. August 1999.
scenarios with a high density of nodes , the accuracy of the [9] A. Bayona, People Counting by Laser Illumination and
counting degrades for both algorithms, due to the great Image Processing Techniques. M aster's Thesis.
Department of Electronics and Communications,
amount of collisions that occur in the sending of
Autonomous University of M adrid, M adrid, Spain, M ay
messages, but still significantly more efficient in the
2011.
algorithm proposed in this investigation. [10] C. Yan-Yan, C. Ning, Z. Yu-Yang, W. Ke-Han, and Z.
Moreover, we also performed some experiments where Wei-Wei, Pedestrian Detection and Tracking for Counting
we varied the size of the rectangular area where nodes and Applications in M etro Station, Discrete Dynamics in
the originator are placed and moved, with the aim of Nature and Society, Vol. 2014, Article ID 712041, 2014.
evaluating how the size of the area can affect the [11] K. Kopaczewski, M. Szczodrak, A. Czyzewski, and H.
algorithm, and test it for scalability issues. In this case also, Krawczyk, A M ethod for Counting People Attending
simulation results show that our new algorithm also Large Public Events, M ultimedia Tools and Applications,
Springer US, pp. 1–13, August 2013.
performs a more efficient counting, in different sized areas,
[12] A. Knaian, A Wireless Sensor Network for Smart
at high speeds.
Roadbeds and Intelligent Transportation Systems, M aster
As possible future work, we plan to adapt our algorithm Thesis, Department of Electrical Engineering and
to wireless networks with multichannels with the intention Computer Science, M assachusetts Institute of Technology,
of reducing the collisions that occur between the counting Cambridge, M assachusetts, USA, June 2000.
PDUs (BEA CON, COUNT_ REQUEST, and [13] Q. Chen, M . Gao, J. M a, D. Zhang, L. Ni, and Y. Liu,
COUNT_REPLY) and users’ traffic, and thus, possibly M oving Object Counting using Ultrasonic Sensor
improve the accuracy of the counting in scenarios with Networks. International Journal of Sensor Networks, Vol.
high density of nodes. We are also interested in studying 3, No. 1, pp. 55–65, 2008.
[14] P. Zappi, E. Farella, and L. Benini, Enhancing the Spatial
the application of our algorithm in the vehicular context
Resolution of Presence Detection in a PIR based Wireless
(motorways, urban roads, rural roads, parkings, etc) using
Surveillance Network. In Proceedings of 2007 IEEE
Wireless Access in Vehicular Environment (WA VE) [19], International Conference on Advanced Video and Signal
which could be used in applications to improve the safety based Surveillance (AVSS 2007), pp. 295–300, London,
and comfort of drivers and passengers. United Kingdom, September 2007.
[15] E. M athews and A. Poigné, Evaluation of a Smart
A CKNOWLEDGMENT Pedestrian Counting System based on Echo State
Networks. Journal on Embedded Systems, EURASIP, Vol.
We thank the CDCH-UCV (Consejo de Desarrollo 2009, Article 9, pp. 1–9, January 2009.
Científico y Hu maní stico) which partially supported this [16] L. Gu, D. Jia, P. Vicaire, T. Yan, L. Luo, A. Tirumala, Q.
research under grant number: PG 03-8066-2011/1. Cao, T. He, J. A. Stankovic, T. Abdelzaher, and B. Krogh,
Lightweight Detection and Classification for Wireless
Copyright © 2016 MECS I.J. Information Technology and Computer Science, 2016, 7, 43-52
52 An Algorithm to Count Nodes in Wireless Networks Using their Actual Position
Authors’ Profiles
Copyright © 2016 MECS I.J. Information Technology and Computer Science, 2016, 7, 43-52