Detecting Anonymous Target and Predicting Target Trajectories in Wireless Sensor Networks

: Target Tracking (TT) is an application of Wireless Sensor Networks (WSNs) which necessitates constant assessment of the location of a target. Any change in position of a target and the distance from each intermediate sensor node to the target is passed on to base station and these factors play a crucial role in further processing. The drawback of WSN is that it is prone to numerous constraints like low power, faulty sensors, environmental noises, etc. The target should be detected ﬁrst and its path should be tracked continuously as it moves around the sensing region. This problem of detecting and tracking a target should be conducted with maximum accuracy and minimum energy consumption in each sensor node. In this paper, we propose a Target Detection and Target Tracking (TDTT) model for continuously tracking the target. This model uses prelocalization-based Kalman Filter (KF) for target detection and clique-based estimation for tracking the target trajectories. We evaluated our model by calculating the probability of detecting a target based on distance, then estimating the trajectory. We analyzed the maximum error in position estimation based on density and sensing radius of the sensors. The results were found to be encouraging. The proposed KF-based target detection and clique-based target tracking reduce overall expenditure of energy, thereby increasing network lifetime. This approach is also compared with Dynamic Object Tracking (DOT) and face-based tracking approach. The experimental results prove that employing TDTT improves energy efﬁciency and extends the lifetime of the network, without compromising the accuracy of tracking.


Introduction
TT is a primary and most demanding application of sensor networks that aims to develop models to determine crucial information about the mobility factors, such as the location, velocity, and track of a target [1]. In WSNs, the targets in target tracking algorithms may be in active or passive modes. In active mode, the target is active and forms a part of the employed model, whereas in passive mode the target has no active part in the tracking functionality. This research work concentrates on active target tracking.
The main objective of target tracking is to locate a target and monitor the movement of that target continuously as shown in Figure 1. This may be done with the help of sensors deployed in the sensing environment. The sensors may be placed in the environment, randomly or uniformly, depending on the requirement of the application. This target tracking concept is used in myriad of applications such as agriculture, security, smart homes, and so on. WSN consists of a number of sensor nodes placed in the monitoring area. The sensor nodes are small with low-power sensing unit. There is also a lowcost, low-capacity battery to make the components work. In target tracking, the targets may be positioned statically or may be mobile. The assumption that the position of a The propagation path-loss model is normally used to perform localization of the target, which in turn enables target tracking algorithms to deduce the position of the target. The assumptions made in the path-loss model are that the channel is an ideal free-space medium, or channel measurements are done extensively. Nevertheless, environmental factors, such as attenuation, multipath propagation, and Non-Line-Of-Sight (NLOS) add more complexity to the challenges of TT algorithms [8]. Owing to all these external factors, TT based on RSSI is infeasible in various applications, and requires a thorough list of measurements of channel [9]. Extensive research has been carried out by researchers around the world, focusing on all the external factors in path-loss models. However, the demerit of these approaches is that the models performed reasonably well only in very limited practical scenarios [10]. If these demerits are mitigated, then WSNs can be effectively used for localization and TT.
Apart from WSN, Global Positioning System (GPS) and Bluetooth can be used as required in various applications [11][12][13]. However, they are not considered to be an optimal solution due to incurred cost in installing additional receivers to track the targets, interferences, and limited coverage.
This paper focuses on reducing the level of energy consumption and increasing the accuracy of tracking using combined KF and clique-based approach. This TDTT model is fed with RSSI values as input and output in the relevant location of the target. As the target moves along a trajectory, clique-based approach for target tracking senses the direction and acceleration of the target and reports the new location of the target in a continuous manner.
The main contributions of this paper include the following: The propagation path-loss model is normally used to perform localization of the target, which in turn enables target tracking algorithms to deduce the position of the target. The assumptions made in the path-loss model are that the channel is an ideal free-space medium, or channel measurements are done extensively. Nevertheless, environmental factors, such as attenuation, multipath propagation, and Non-Line-Of-Sight (NLOS) add more complexity to the challenges of TT algorithms [8]. Owing to all these external factors, TT based on RSSI is infeasible in various applications, and requires a thorough list of measurements of channel [9]. Extensive research has been carried out by researchers around the world, focusing on all the external factors in path-loss models. However, the demerit of these approaches is that the models performed reasonably well only in very limited practical scenarios [10]. If these demerits are mitigated, then WSNs can be effectively used for localization and TT.
Apart from WSN, Global Positioning System (GPS) and Bluetooth can be used as required in various applications [11][12][13]. However, they are not considered to be an optimal solution due to incurred cost in installing additional receivers to track the targets, interferences, and limited coverage.
This paper focuses on reducing the level of energy consumption and increasing the accuracy of tracking using combined KF and clique-based approach. This TDTT model is fed with RSSI values as input and output in the relevant location of the target. As the target moves along a trajectory, clique-based approach for target tracking senses the direction and acceleration of the target and reports the new location of the target in a continuous manner.
The main contributions of this paper include the following: (1) TDTT model that uses prelocalization-based KF for target detection and a cliquebased TT methodology; (2) performance evaluation of TDTT via simulations; (3) comparison of TDTT to DOT and FaceTrack; (4) comparison of TDTT to KF, EKF, DOT, and FaceTrack in terms of accuracy.
In this paper, Section 2 explains related work, Section 3 describes WSN model used in our proposed system, Section 4 elaborates our proposed architecture and results of our approach are presented in Section 5.

Related Work
A framework to deal with locating people, finding out their positions, counting people, and tracking their movements was described by Patwari et al. [14]. They also exploited the property of penetrating buildings using radio waves for surveillance [15]. Touvat et al. proposed an RSSI-based trilateration approach to compare ISM868 and Zigbee technique and used path-loss model to map RSSI to distance [16]. However, this did not produce desirable results when used for localization. Bosisio suggested different frequencies for calculating RSSI values for the same distance. These RSSI values were then used to increase the accuracy of the determined distance [17]. This accurate measurement of distance is a crucial factor to achieve an ideal localization and to track the targets more accurately. In [18], various TT techniques based on structure of network were discussed at length. Accuracy is increased by comparing different RSSI values, as enhanced RSSI accuracy leads to increased accuracy in localization and trajectory estimation [19]. Ceylan et al. suggested different frequencies for measuring RSSI [20]. The same distance was used along with different frequencies to measure different RSSI value. A location detection method employing learning methods was explained by Hanen Ahmadi et al. [21]. They employed a group of regression trees to accurately track the location of a target. The regression trees were formed by capturing the association between RSSI and location of anchor node. RSSI-based localization and techniques to improve accuracy were discussed in detail by S.R. Jondhale [22].
Din et al. [23] presented a clustering-based mating method for direct as well as multihop routing to increase the network lifetime in WSN. Sthapit, P et al. [24] suggested using support vector machine and logistic regression to compute the position. Then maximum and minimum error in position estimation were calculated and tabulated. The average error was found to be 50 cm. Banihashemian suggested a range-free localization technique using neural networks and included the concept of Particle Swarm Optimization (PSO) algorithm for optimization [25].
Conventionally, KF [26] is used for tracking a random target. However, KF is constrained to linear and Gaussian assumptions. Thus, linear measurement model is assumed if KF is to be used for tracking in WSNs. However, real-time target motion is nonlinear, so derivatives of KF like Extended Kalman Filter (EKF) and Unscented Kalman Filter (UKF) are used [27]. In all derivatives of KF, after the nonlinear state is made linear, KF is applied. It is always encouraged to use KF for assessing performance in comparisons.
Fayazi et al. combined Generalized Extended Kalman Filter and Genetic Algorithm II, resulting in reduced energy usage and precise position accuracy [28]. In 2019, S.R. Jondhale proposed a framework using two algorithms, Generalized Regression Neural Network (GRNN) KF and GRNN + UKF, to estimate the location of a target in motion [29].The above method is implemented in isotropic and anisotropic networks and the results showed that it resulted in low localization error rate. A localization scheme based on neural network is portrayed by Po-Jen Chuang that used online training and correlated data to calculate internode distance [30]. This scheme increased localization success rate and in turn resulted in low error rate.
A location fingerprinting database composed of Wi-Fi, RSSI, and geomagnetic field intensity calculated with many devices at a multistory building is presented in [31]. Localization and trajectory inference with Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM) network was carried out on this database.
It is possible to locate a target using solitary node but this approach results in depletion of energy and enforces more computation load on that particular node. Multiple sensors serve to reduce load on a particular node and hence, energy depletion will be much lower as the nodes cooperate with each other in tracking the target. This collaboration among multiple sensors is mandatory to increase accuracy factor and to decrease energy usage [32].
DOT [33] approach is used to track mobile targets accurately and convey the location of target to mobile user. This approach does not need frequent queries regarding target location as it uses spatial information stored by neighboring nodes to track a moving target and thus reduces energy consumption. FaceTrack [34] is a target tracking framework which is used to construct faces, using the nodes of a spatial region surrounding a target. A target tracking algorithm based on clique, for binary proximity sensor networks, is presented by Javed et al. [35]. This work formed cliques consisting of sensors and achieved less location error in TT.
By analyzing the outcome of all the above related work, it is evident that the following factors affect the accuracy of target tracking functionality in WSN: faulty sensor nodes losing targets, delays in TT, usage of energy, connectivity, aggregation, and so on. A sensor node may become faulty due to common scenarios, namely, depletion of battery, environmental disasters, and failure of hardware. The factor that affects the performance of TT functionality is missing the targets. Targets may be missed due to barriers in the path of target or due to errors made in prediction of trajectory of the target. All efforts made to track targets should be concentrated on minimizing the probability of losing the targets. The next factor in TT is minimizing the delay incurred while tracking the object. The tradeoff between delay and accuracy of tracking algorithm should not be compromised. The essential feature is that the delay is to be reduced while the accuracy of target tracking should be maintained considerably. Another consideration in tracking is the execution time of the algorithm. If the algorithm takes longer than expected duration, then the target would have relocated to some other position. Coverage refers to number of sensors that are deployed in the sensing area. Coverage directly affects the performance of WSN. When coverage is more, accuracy is considerably improved. This limiting factor necessitates energy efficient, adaptive target detection and tracking methodology. We propose a system that uses KF-based target detection and clique-based target tracking to address the problem of coverage, accuracy, and energy efficiency.

WSN Model for Anonymous Target Tracking
In this section, we describe the representation of the entire wireless sensor network, representation of sensors in various modes, energy levels, and target trajectories.

Rudimentary WSN Representation
A wireless sensor network with 'M' nodes is put into operation, for 'T' duration, in the designated sensing area. A target is assumed to be in motion in the sensing area. An assumption made in this scenario is that sensors deployed in the area belong to the kind of binary sensors that have a prefixed range for sensing. The sensing range of this kind of binary sensor is denoted as 'R'. The implication of binary sensor is that it returns '1' if the object to be tracked is present in the sensing range and returns '0' if the object is out of range of the sensing node. This basic model allows computation of the target's location by obtaining the centroids of reported positions of all sensors within the sensing area at any instant 't'. Consider 'm' sensors are deployed in 'Y t ' locations. Y t = (x j , y j ), where j = 1...m. These 'm' sensors are responsible for detecting the target within the sensing range R. The future position is estimated using Equation (1).

Sensor Representation for Detecting Targets
The basic model works perfectly only if target 't' is within the sensing range 'R' of a sensor as depicted in Figure 2. This assumption does not hold well in real-life scenarios. The target may not always be in detection range of sensors. It is necessary to revise the basic model to include probability of detection of target by a sensor. The mathematical model of this idea is given in Equation (2). where 0 ≤ α ≤ 1 ;(x, y) is the position of the target and R j denotes the detection range of sensor s i . The trajectory of target within the detection range of s i is modeled as a state covariance matrix P(r|r) which is expressed in Equation (3) and the target location at any time instant r is denoted as 'l' and estimated using Equation (4). The sensor s i detects the target with probability p r (s i ) as given in Equation (5).
where p(x,y) is the probability density function of the target whose position is X p = [x, y] T and is computed using Equation (6).

Sensor Representation for Detecting Targets
The basic model works perfectly only if target 't' is within the sensing range 'R' of a sensor as depicted in Figure 2. This assumption does not hold well in real-life scenarios. The target may not always be in detection range of sensors. It is necessary to revise the basic model to include probability of detection of target by a sensor. The mathematical model of this idea is given in Equation (2).
where 0 1 ;( , ) is the position of the target and denotes the detection range of sensor .The trajectory of target within the detection range of is modeled as a state covariance matrix P(r|r) which is expressed in Equation (3) and the target location at any time instant r is denoted as 'l' and estimated using Equation (4). The sensor detects the target with probability ( ) as given in Equation (5).
where p(x,y) is the probability density function of the target whose position is = , and is computed using Equation (6).
Consider 'M' sensors , … . in a WSN covering a target region Y = (x,y), probability of target detection by the sensors present in the network is given by Equation (7).
The joint estimated probability of these 'M' tracking sensors is given by Equation (8). Consider 'M' sensors s i1 , s i2 . . . . s im in a WSN covering a target region Y = (x,y), probability of target detection by the sensors present in the network is given by Equation (7).
The joint estimated probability of these 'M' tracking sensors is given by Equation (8).

Strategies in Target Tracking
The general strategies in TT are naive activation, random activation, selective activation, and periodic activation. The sensor nodes that are deployed in a sensing region for tracking targets work in three modes viz., communication mode, sensing mode, and data processing mode. Figure 3 displays the various operating modes of a sensor.

Strategies in Target Tracking
The general strategies in TT are naive activation, random activation, selective activation, and periodic activation. The sensor nodes that are deployed in a sensing region for tracking targets work in three modes viz., communication mode, sensing mode, and data processing mode. Figure 3 displays the various operating modes of a sensor.

Naive Activation
The sensors that are deployed to sense an event or track an object are always in sensing mode in this strategy. This strategy performs poorly in terms of conserving energy, which is a crucial factor in WSNs. Even though this strategy does not aim to conserve energy, it serves as a basic model for comparing with all other strategies, as it offers good quality of tracking. Equations (9) and (10) model this strategy.

Random Activation
A sensor node is alerted to be in tracking mode with probability 'p'. The merit of this strategy is that not all the sensor nodes are always in sensing mode as in naive activation. Only a portion of sensor nodes deployed in sensing region is activated at any instant 't'. To model this strategy, Equations (11) and (12) are used.

Selective Activation
At any point in time, only a small fraction of sensors are powered on and are in sensing mode. The remaining nodes are made to be in communication mode. This strategy enables the prediction of the next immediate location of the object under tracking.

Naive Activation
The sensors that are deployed to sense an event or track an object are always in sensing mode in this strategy. This strategy performs poorly in terms of conserving energy, which is a crucial factor in WSNs. Even though this strategy does not aim to conserve energy, it serves as a basic model for comparing with all other strategies, as it offers good quality of tracking. Equations (9) and (10) model this strategy.

Random Activation
A sensor node is alerted to be in tracking mode with probability 'p'. The merit of this strategy is that not all the sensor nodes are always in sensing mode as in naive activation. Only a portion of sensor nodes deployed in sensing region is activated at any instant 't'. To model this strategy, Equations (11) and (12) are used.

Selective Activation
At any point in time, only a small fraction of sensors are powered on and are in sensing mode. The remaining nodes are made to be in communication mode. This strategy enables the prediction of the next immediate location of the object under tracking. This information is passed on to neighboring sensors that are in close proximity to the path of target. The nodes that are in communication mode are made to toggle to sensing mode on receiving alerts from other nodes that are in trajectory of the object as shown in Figure 4.
This information is passed on to neighboring sensors that are in close proximity to the path of target. The nodes that are in communication mode are made to toggle to sensing mode on receiving alerts from other nodes that are in trajectory of the object as shown in Figure 4. Selective activation is done based on previous history of position of the target. It is assumed that the sensing region is circular with radius 'rp'. Let Xb be the original location of the target. Xa = Xs denotes prior location of the target. Xf denotes future location of the target. This strategy uses past history of target's location to arrive at the future position of the target. In other words, Xf is estimated using Xa. Sensors that are enclosed within a circular area of radius 'r' and those that lie around Xf (t + 1) are signaled to toggle to sensing mode. Only sensors that are within sensing range R of the original location Xb (t + 1) are toggled to sense the target. In tracking area, two circular sections may overlap with each other. This causes the sensors that lie within the overlapping area to detect the target. The new future position Xa (t + 1) is estimated by finding out the centroid of locations of all sensors that lie in the overlapping area as shown in Figure 5. The sensors that lie in the covering region with radius 'rp' around the estimated location of target Xf alone need to be switched on and should be in sensing mode at any instant. To model this strategy, Equations (13) and (14) where 'd' is the deployment density of sensors.

Periodic Activation
The strategy of periodic activation is as follows: The entire network is switched on and off on a periodical basis. This periodical awakening of the sensors follows standard rhythmic pattern. This can be easily incorporated into any of the other strategies mentioned above and is found to be the most suitable strategy for TT. Selective activation is done based on previous history of position of the target. It is assumed that the sensing region is circular with radius 'r p '. Let X b be the original location of the target. X a = X s denotes prior location of the target. X f denotes future location of the target. This strategy uses past history of target's location to arrive at the future position of the target. In other words, X f is estimated using X a . Sensors that are enclosed within a circular area of radius 'r' and those that lie around X f (t + 1) are signaled to toggle to sensing mode. Only sensors that are within sensing range R of the original location X b (t + 1) are toggled to sense the target. In tracking area, two circular sections may overlap with each other. This causes the sensors that lie within the overlapping area to detect the target. The new future position X a (t + 1) is estimated by finding out the centroid of locations of all sensors that lie in the overlapping area as shown in Figure 5. The sensors that lie in the covering region with radius 'r p ' around the estimated location of target X f alone need to be switched on and should be in sensing mode at any instant. To model this strategy, Equations (13) and (14) are used.
where 'd' is the deployment density of sensors. Let be cycle period, is active time of the sensors and , is strategy adopted for tracking a target which is expressed in Equations (15) and (16).

Periodic Activation
The strategy of periodic activation is as follows: The entire network is switched on and off on a periodical basis. This periodical awakening of the sensors follows standard rhythmic pattern. This can be easily incorporated into any of the other strategies mentioned above and is found to be the most suitable strategy for TT. Let T D be cycle period, t ON is active time of the sensors and m s,V is strategy adopted for tracking a target which is expressed in Equations (15) and (16).

Representation of Energy in WSN
A sensor node expends energy when it is communicating with other nodes in sensing area, tracking target, and when it is engaged in processing data. A sensor node s i is considered to be sensing in tracking area and cost of energy that is expended by s i at each time step is E rx .
The energy that is expended when a sensor node s i is communicating with another sensor node s j is given in Equation (17).
where e t and e d are dependent on the transmitter. r ij is the distance between si and sj. α denotes characteristics of the channel. Energy expended for receiving n bits of data is expressed as in Equation (18).
where e rx denotes the specification of the receiver s j .

Representation of Target in Motion
A target in motion is modeled using velocity and location in a 2D sensing region as given in Equation (19).
where (x(m), y(m)) are the coordinates of the target's location along x-y plane at time 't m '.
(v x (m)v y (m)) are the target velocities along x direction and y direction at time 't m ', respectively. The model that is used to describe target in motion in x-y plane is of stable velocity and is characterized by Equation (20).
The sampling period between two successive recordings t m+1 and t m is given by Equation (21).
Equation (22) denotes noise sequence whose distribution n is Gaussian. This white Gaussian noise distribution considered here has zero mean and covariance matrix C w . Therefore, noise across x and y axis is modeled using w x and w y . Covariance matrix C w is given by Equation (23).
A few assumptions made in the model are summarized below: • w x is not correlated to w y . • Covariance and mean of multiplicative noise is given.

•
Covariance and mean of additive noise is also given.

•
Another crucial assumption is that if noises are absent, then it is fairly straightforward to determine position of the target.

Proposed TDTT Model
The architecture of the proposed approach is depicted in Figure 6. The first step in this approach is periodic activation of sensors in sensing area. The activated sensors employ prelocalization and KF to track targets in their surroundings. If target is detected, then sampling interval is varied accordingly and this information is passed onto the cluster head. The next step is to activate sensors based on this sampling interval. This step is followed by identification of successive sensor clusters. These clusters are formed dynamically by constructing cliques.
The prior probability density function of (x,y) that is known to sensor nodes is pb(x,y). However, pb (x,y) does not include any information on the previous position of the target under consideration. pb (x,y) is uniform, always in sensing region. Considering this, ( , | ) is shown in Equation (32). The equation after prelocalization and approximation is given in Equation (34).
where is a constant (36)

Choosing Sampling Period
Assuming sampling period ∆ to be uniform does not make the representation energy efficient and cannot adapt to the trajectory of target. The interval of sampling is denoted by , . This interval is chosen so that is greater than the time taken for communication, sensing, and processing, whereas, should not be arbitrarily larger values, as the model has to deal with changing trajectory of the object. Considering the difficulty of choosing sampling period and predictions made in covariance matrix, for

Pre-Localization
The first step in target detection is prelocalization which uses maximum likelihood for estimation of target's position. Consider an example scenario, in which 'n' sensors (where n ≥ 3) is in sensing mode and they are tracking targets simultaneously at time 't m ' and noises that are measured by different sensors are exclusive and independent of other sensors defined by N = {N i }; i = 1,..., n and P(N|(x, y)) denotes conditional probability density function of N. The idea behind using Maximum Likelihood Estimation (MLE) to predict unidentified target locations (x,y) is that if p(N|(x, y)) is maximized, the location of the target can be identified. The mathematical model for the above explained concept is given in Equation (24), assuming measurement noises of sensor are independent and exclusive.
Assuming that unknown distance between a target and a sensor, d i is very small, probability density function can be rewritten as given in Equation (25). The minor approxi-mation done is negligible in probability density function and it is a well-known fact that KF is very resistant towards small variations in measurement noise.
where N i = N i − µ n and denotes actual calculated measurement. Based on Equation (26), MLE of (x,y) is calculated using Equation (26).
Equation (27) has to be minimized and this is quite difficult as f (x,y) is not linear. Newton-Raphson method, an iterative optimized solution, is used to process this nonlinear function. This step works as follows: Step 1: compute x (i+1) and y (i+1) using Equation (28) where h is step size.
The first and third terms of the estimated valuex m|m−1 of KF arex 1 m|m−1 andx 3 m|m−1 . This iterative method converges and gives a global minimum in successive iterations. The initial values assigned to first and third terms of initial prediction in KF play an important role in making this prediction an accurate one, based on the constraint that the sampling period is limited.

Position Estimation Using KF
After prelocalization, the result is the changed measurement.
Equation (29) has linear representation which is shown in Equation (30).
V m denotes measurement noise that is converted after prelocalization. This N m value is to be used in KF. Equation (31) shows Baye's rule for posterior probability distribution.
The prior probability density function of (x,y) that is known to sensor nodes is p b (x,y). However, p b (x,y) does not include any information on the previous position of the target under consideration. p b (x,y) is uniform, always in sensing region. Considering this, P(x, y|N) is shown in Equation (32).
The equation after prelocalization and approximation is given in Equation (34).

Choosing Sampling Period
Assuming sampling period ∆t m to be uniform does not make the representation energy efficient and cannot adapt to the trajectory of target. The interval of sampling is denoted by [T min , T max ]. This interval is chosen so that T min is greater than the time taken for communication, sensing, and processing, whereas, T max should not be arbitrarily larger values, as the model has to deal with changing trajectory of the object. Considering the difficulty of choosing sampling period and predictions made in covariance matrix, for approximation, a time update is performed to calculate the sampling period. The sampling period is selected as T min . When there is an acceptable accuracy in recent and estimated tracking, tracking management mode is employed. The sampling period is greater than T min and the value is the least value among positive root of Equation (37) and T max .

Choosing Sensors to Be in Sensing Mode
After determining sampling period values, sensors will be chosen for sensing. A related assumption is that sensor nodes store the characteristics of all of its neighboring sensor nodes, namely, position and sensing range. The cluster head chosen now evaluates probability density function of other sensors, considering the estimated position of target and associated covariance matrix. The neighboring sensor nodes are denoted as a set S.
Probability density function is computed and sensor with high probability density function at the next step is chosen as the first and foremost member of cluster at time m+1.
where (m + 1) is the (m + 1)th time step. The second sensor of the cluster is chosen based on is the set of all sensors S exclusive of g (m+1) 1 . This is employed to choose all other sensors. The jth sensor is chosen as, The selection of sensors is ended when joint distribution probability is greater than a specified limit ∅ t . The tasking cluster for the next iteration is given in Equation (41).

Identification of Successive Cliques
A target 't 1 ' is assumed to have unpredictable velocity such that 't 1 ' is assumed to move in a complex way and it is difficult to represent the complexity. The sequence of steps that is required to identify the clique in which the target 't 1 ' is travelling is: • t 1 is detected by s 3 . • s 3 exchanges this information with the neighbors. • s 3 receives the information from all other neighbors and conducts the comparison between its own information and the neighbors' information. • All the neighboring sensor nodes are in sensing mode and t 1 is tracked within the sensing region and the immediate neighbor closest to t 1 maintains the required information.

•
The clique in which t 1 moves is constructed.
t 1 's movement from F 1 to any other clique F j is tracked using monitor and backup operation. This operation is based on all locations of t 1 , considering the current motion trajectory. The next step to be carried out is calculating the direction of target's motion. The clique that is constructed in the previous step is represented by set M n , To calculate the next position of target, it is necessary to calculate S = S j ; j = 1, 2, . . . ;. The median of this set S is calculated and stored in S median . l j+1 is calculated and l j is updated by l j+1 and stored. The moving path is calculated based on l j ; j = 1, 2, . . . ;. t 1 's center of gravity position is used to find t 1 's position. t 1 may follow any dynamic path such as travelling in a linear fashion, turning towards right or left, and performing U turn.
In this scenario, time instance of S is subdivided into discrete series, namely S 1 , S 2 ... In each S i , the duration is set to 1. The direction of movement and target is denoted by θ. The state of motion of target t 1 at time S is denoted by v max t 1 and v max t 1 are the velocity of straight movement and the velocity of maneuvering, respectively.
The distance covered by target t 1 can be calculated by each node in the following ways: Case 1: Straight Line Case 2: Curved Line θ h ∈ (−π, π)&h 1 < 1, this denotes t 1 is moving in random way (curved). In order to calculate the sequence of locations, it is necessary to introduce δ and r, δ denotes the curve made by the manoeuvring of the target and r denotes the distance covered by t 1 in θ h direction.
The length of the path due to straight line movement of t 1 is p, then Knowing the current location of t 1 and h, the estimated location of l j+1 with approximate coordinates x j+1 , y j+1 of t 1 at j + 1 is All positions of t 1 can be calculated by changing θ h between −π and π. Knowing clique F j , where t 1 is in motion currently, the sequence of positions is obtained by the previous step. An alert message is issued to the neighbors of F i . If the node that receives the alert is the requested node, then all those nodes are grouped in F j+1 and other cliques. If it does not receive the signal, then the node is in awakening state. If t 1 is detected and signal is received, then exchange communication with new backup and proceed with calculating the new maneuver of t 1 . Finally, if target t 1 is detected in F j+1 then l j is the new location. F j = F j+1 is the new clique.
The algorithm for TDTT model is given below (Algorithm 1).

Results
In this section, the performance of the proposed approach is evaluated in two different simulation scenarios. The first and second scenario were simulated both in ideal and non-ideal setup to test the performance of tracking the target using KF and clique-based approach. The third scenario was simulated and performance of our approach is compared with DOT and FaceTrack approaches. Both DOT and FaceTrack authors specify an approach that constructs faces to track a target. TDTT constructs cliques similar to Face construction. Therefore, these two approaches are used for comparison. The simulation was performed on a 1000 × 1000 m 2 field with around 950 sensors in a 40 × 40 grid and a sensing range of 100 m per sensor. The monitored area of this simulation was set to 1000 m and parameters were captured by playing the simulation until 2500 s.

Scenario 1
In this scenario, it was decided to have field size as constant and vary density ρ and radius of the sensors. Various trajectories were generated using geometric random walks, setting each walk to 10-15 steps. Each step was assumed to be taken in a random direction and continued in the same direction and was made to turn in the other direction. After multiple simulations, it was found that the estimated trajectory is more or less following the original trajectory of the target as shown in Figure 7. In order to estimate the probability of target detection using TDTT, sensing range of sensor was set to 50 m. It was observed that when the distance between target and the sensor under consideration increased, the target detection rate decreased as shown in Figure 8.  This observation led to another experiment in which we varied the density of sen-  This observation led to another experiment in which we varied the density of sensors and the error in localizing the target and tracking the target was calculated. Fixing  This observation led to another experiment in which we varied the density of sensors and the error in localizing the target and tracking the target was calculated. Fixing the size of the field and the radius as constant, the number of sensors in the field was varied from 100 to 650. Then the simulation was performed for uniform regular and random arrangement of sensors. As per spatial resolution theorem, an increase in density of sensors results in a decrease in error estimation. It was noticed that as the number of sensors increased, error in difference between the original and estimated trajectory decreased as shown in Figure 9. There is a slight deviation between theoretical value and estimated error averaged over 55 rounds of random walk paths. The distribution of sensors was kept constant at 950 sensors but their sensing radius was changed from 50 m to 350 m. Error in estimation was found to be decreasing with increase in radius R as shown in Figure 10. The calculated error was more or less in line with the theoretical value.

Scenario 2
This scenario was simulated by making the following assumptions: sensing range of all the sensors was fixed. The number of sensors was varied from 100 to 650. For each variation of sensor density, the target was deployed either closer to or far off from the

Scenario 2
This scenario was simulated by making the following assumptions: sensing range of all the sensors was fixed. The number of sensors was varied from 100 to 650. For each variation of sensor density, the target was deployed either closer to or far off from the sensor arrangement. Initially, the target was deployed closer to the sensor arrangements for all variations in number of sensors and the result was displayed in Figure 9. Then it was decided to vary the position of target deployment for different sensor densities to assess the effect of proximity of sensors on position estimation. Thus, in sensor field with 200 to 400 sensors, the target was deployed closer to the area in which the sensors were concentrated, between 400 to 600 sensors, the sensors were deployed farther away from the target and for the third case, above 600 sensors, we set the target closer to the region where sensors were distributed. It was observed that the simulation yielded predictable results. Even though sensors were populated densely, proximity of sensors close to the target decided the error in position estimation as shown in Figure 11. assess the effect of proximity of sensors on position estimation. Thus, in sensor field with 200 to 400 sensors, the target was deployed closer to the area in which the sensors were concentrated, between 400 to 600 sensors, the sensors were deployed farther away from the target and for the third case, above 600 sensors, we set the target closer to the region where sensors were distributed. It was observed that the simulation yielded predictable results. Even though sensors were populated densely, proximity of sensors close to the target decided the error in position estimation as shown in Figure 11. In Figure 11, when the sensor density was below 400, the target was deployed closer to the sensor arrangement and there was a decrease in error of estimation. However, when the target was deployed farther away from the concentration of sensors, even when the sensor density was increased to between 400 and 600, there was a noticeable increase in error. Above 600 sensors, the target was closer to the sensor arrangement and subsequently, resulted in reduced error. Figure 11. Error with respect to sensor density and target proximity.

Scenario 3
In scenario 3, the nodes in the network are set to have uniform communication range (c) and sensing range (r) with nil background noise. The communication range is set to greater than or equal to twice the sensing range as given in Equation (53).
The sensing range of nodes is set to 100 m and communication range of nodes is 200 m. Node-sink synchronization happens in the first 1-10 ms of the simulation. The target's speed is 1 m/s. Initially, all sensor nodes collect information regarding neighbor nodes. The target is deployed in the simulated network at an arbitrary time and in a random spot. The target moves in random fashion in the sensing area. Target detection is triggered when the target is detected by the sensor nodes in the network and KF is employed to assess the location of the deployed target. Then the clique is constructed as the target moves along a trajectory. Now the sensors are enabled to track the target. Over 150 simulation runs are Figure 11. Error with respect to sensor density and target proximity.
In Figure 11, when the sensor density was below 400, the target was deployed closer to the sensor arrangement and there was a decrease in error of estimation. However, when the target was deployed farther away from the concentration of sensors, even when the sensor density was increased to between 400 and 600, there was a noticeable increase in error. Above 600 sensors, the target was closer to the sensor arrangement and subsequently, resulted in reduced error.

Scenario 3
In scenario 3, the nodes in the network are set to have uniform communication range (c) and sensing range (r) with nil background noise. The communication range is set to greater than or equal to twice the sensing range as given in Equation (53).
The sensing range of nodes is set to 100 m and communication range of nodes is 200 m. Node-sink synchronization happens in the first 1-10 ms of the simulation. The target's speed is 1 m/s. Initially, all sensor nodes collect information regarding neighbor nodes. The target is deployed in the simulated network at an arbitrary time and in a random spot. The target moves in random fashion in the sensing area. Target detection is triggered when the target is detected by the sensor nodes in the network and KF is employed to assess the location of the deployed target. Then the clique is constructed as the target moves along a trajectory. Now the sensors are enabled to track the target. Over 150 simulation runs are carried out and the results are averaged. The initial energy of all nodes is fixed as 50 J. CC2420 radio parameters are used in simulations for communication between the sensor nodes in the network. Three modes of CC2420 radio are transmit, listen, and sleep. The power expended in sleep mode is minimal compared to the other two modes. Based on the clique constructed as the target moves in the sensing region, only those nodes that fall within the clique region are made active and the rest of the nodes that are not in proximity to the target are made to sleep. The comparison of the number of nodes that are asleep during target tracking made by applying DOT, FaceTrack and TDTT approaches is presented in Figure 12. carried out and the results are averaged. The initial energy of all nodes is fixed as 50 J. CC2420 radio parameters are used in simulations for communication between the sensor nodes in the network. Three modes of CC2420 radio are transmit, listen, and sleep. The power expended in sleep mode is minimal compared to the other two modes. Based on the clique constructed as the target moves in the sensing region, only those nodes that fall within the clique region are made active and the rest of the nodes that are not in proximity to the target are made to sleep. The comparison of the number of nodes that are asleep during target tracking made by applying DOT, FaceTrack and TDTT approaches is presented in Figure 12. The proposed TDTT model is compared to FaceTrack and DOT in terms of energy consumed by the nodes as shown in Figure 13. Even though the concept of sleep node is employed in FaceTrack and DOT, the number of sleep nodes in TDTT is comparatively higher than the other two approaches, which results in relatively lower energy consumption, without compromising the accuracy of tracking the target. The proposed TDTT model is compared to FaceTrack and DOT in terms of energy consumed by the nodes as shown in Figure 13. Even though the concept of sleep node is employed in FaceTrack and DOT, the number of sleep nodes in TDTT is comparatively higher than the other two approaches, which results in relatively lower energy consumption, without compromising the accuracy of tracking the target. In order to calculate the network lifetime, we deployed a target to traverse through the network 1000 times in random fashion and applied DOT, FaceTrack, and TDTT approaches for target tracking. As the simulation progressed, we monitored the nodes that went dead and the summarization of dead nodes is presented in Figure 14.  In order to calculate the network lifetime, we deployed a target to traverse through the network 1000 times in random fashion and applied DOT, FaceTrack, and TDTT approaches for target tracking. As the simulation progressed, we monitored the nodes that went dead and the summarization of dead nodes is presented in Figure 14. In order to calculate the network lifetime, we deployed a target to traverse through the network 1000 times in random fashion and applied DOT, FaceTrack, and TDTT approaches for target tracking. As the simulation progressed, we monitored the nodes that went dead and the summarization of dead nodes is presented in Figure 14.

Comparison of TDTT with Other Existing Approaches in Terms of Accuracy
In order to assess the tracking performance of TDTT, we deployed a target to traverse through the network 1000 times in random fashion at random velocity range of (0, 30) m/s. Then we applied KF, EKF, DOT, FaceTrack, and TDTT approaches. The observed

Comparison of TDTT with Other Existing Approaches in Terms of Accuracy
In order to assess the tracking performance of TDTT, we deployed a target to traverse through the network 1000 times in random fashion at random velocity range of (0, 30) m/s. Then we applied KF, EKF, DOT, FaceTrack, and TDTT approaches. The observed accuracy for all the approaches is illustrated in Figure 15. The probability of error in tracking increases as the target moves at a faster rate with increasing velocity. Hence, the accuracy of TDTT decreases as the target moves at a faster pace. It was observed that TDTT and FaceTrack achieved more or less the same accuracy. KF performed poorly compared to EKF in this random movement scenario. DOT performed moderately in terms of accuracy. and 30 m/s randomly. Initially, energy consumed by TDTT with respect to increase in velocity w served. In Figure 16, across the horizontal axis, velocity of target is displayed and a energy consumption is shown across the vertical axis. From the figure, we can s TDTT activates a lower number of sensors for tracking at low velocities. Howe higher velocities, as expected, TDTT may consume more energy. We can conclude lesser velocities, TDTT performs considerably better than at higher velocities.
The next experiment is in regards to accuracy of TDTT at low and high vel Any approach would suffer from loss of accuracy at higher velocities. Howeve Figure 17, we can conclude that the accuracy in TDTT at higher velocities is still ad for the majority of applications. The association between energy saving and accu various scenarios may still pose serious apprehensions. We would like to explo association in greater depths in future work.

Assessment of Energy Consumption and Accuracy
In order to assess energy consumed and accuracy achieved in TDTT, another scenario was simulated with 250 nodes in a 500 × 500 m 2 . The motion of the target was set to linear and around 1000 steps were taken by the target. The velocity was set between 0 m/s and 30 m/s randomly. Initially, energy consumed by TDTT with respect to increase in velocity was observed. In Figure 16, across the horizontal axis, velocity of target is displayed and average energy consumption is shown across the vertical axis. From the figure, we can see that TDTT activates a lower number of sensors for tracking at low velocities. However, at higher velocities, as expected, TDTT may consume more energy. We can conclude that at lesser velocities, TDTT performs considerably better than at higher velocities.

Conclusions and Future Works
This paper focuses only on clique-based single target tracking scenario, where the clique is formed dynamically along the path of the target in motion. At the end of each time step, the sensor nodes around the moving target become activated and the rest of The next experiment is in regards to accuracy of TDTT at low and high velocities. Any approach would suffer from loss of accuracy at higher velocities. However, from Figure 17, we can conclude that the accuracy in TDTT at higher velocities is still adequate for the majority of applications. The association between energy saving and accuracy in various scenarios may still pose serious apprehensions. We would like to explore this association in greater depths in future work.

Conclusions and Future Works
This paper focuses only on clique-based single target tracking scenario, where the clique is formed dynamically along the path of the target in motion. At the end of each time step, the sensor nodes around the moving target become activated and the rest of

Conclusions and Future Works
This paper focuses only on clique-based single target tracking scenario, where the clique is formed dynamically along the path of the target in motion. At the end of each time step, the sensor nodes around the moving target become activated and the rest of the sensor nodes will be deactivated. This results in reducing energy consumption. This paper aims to detect and track a target with maximum accuracy and minimum energy consumption in each sensor node. TDTT uses KF for target detection and clique-based estimation for tracking the target. The results are found to be encouraging. We implemented DOT and face-based tracking approach for comparison with TDTT.
The experimental results prove that employing TDTT improves energy efficiency and extends the lifetime of the network without compromising the accuracy of tracking. This model could be experimented on with multiple targets, as tracking multiple targets poses serious difficulty in associating the trajectory with individual targets in the sensing region.