ebook img

A Low-Complexity Geometric Bilateration Method for Localization in Wireless Sensor Networks and Its Comparison with Least-Squares Methods. PDF

2.3 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview A Low-Complexity Geometric Bilateration Method for Localization in Wireless Sensor Networks and Its Comparison with Least-Squares Methods.

Sensors2012,12,839-862;doi:10.3390/s120100839 OPENACCESS sensors ISSN1424-8220 www.mdpi.com/journal/sensors Article A Low-Complexity Geometric Bilateration Method for Localization in Wireless Sensor Networks and Its Comparison with Least-Squares Methods JuanCota-Ruiz1,⋆,Jose-GerardoRosiles2,ErnestoSifuentes1 andPabloRivas-Perea3 1 DepartmentofElectricalandComputerEngineering,AutonomousUniversityofCiudadJua´rez (UACJ),Ave. delCharro#450Nte. C.P.32310,CiudadJua´rez,Chihuahua,Me´xico; E-Mail:[email protected] 2 RosilesConsulting,ElPaso,TX79938,USA;E-Mail:[email protected] 3 DepartmentofComputerScience,BaylorUniversity,OneBearPlace#97356,Waco,TX76798, USA;E-Mail:Pablo Rivas [email protected] ⋆ Authortowhomcorrespondenceshouldbeaddressed;E-Mail:[email protected]; Tel.:+52-656-688-4841. Received: 12December2011;inrevisedform: 9January2012/Accepted: 10January2012/ Published: 12January2012 Abstract: This research presents a distributed and formula-based bilateration algorithm that can be used to provide initial set of locations. In this scheme each node uses distance estimates to anchors to solve a set of circle-circle intersection (CCI) problems, solved through a purely geometric formulation. The resulting CCIs are processed to pick those that cluster together and then take the average to produce an initial node location. The algorithm is compared in terms of accuracy and computational complexity with a Least-Squares localization algorithm, based on the Levenberg–Marquardt methodology. Results in accuracy vs. computational performance show that the bilateration algorithm is competitivecomparedwithwellknownoptimizedlocalizationalgorithms. Keywords: distributed-localization; wireless sensor networks; Least Squares (LS); optimization;bilateration Sensors2012,12 840 1.Introduction Recent advances in microelectronics have led to the development of autonomous tiny devices called sensor nodes. Such devices, in spite of their physical limitations, contain the essential components of a computer, such as memory, I/O ports, sensors, and wireless transceivers which are typically battery-powered. Once deployed (randomly or not) over a certain area, sensor nodes have the ability to be in touch via wireless communications with neighboring nodes forming a wireless sensor network (WSN).ThegreatadvantageofusingWSNsisthattheycanbeappliedinimportantareassuchasdisaster and relief, military affairs, medical care, environmental monitoring, target tracking, and so on [1–3]. However, most of WSN applications are based on local events. This means that each sensor node needs todetectandsharelocalphenomenonswithneighboringnodes,implyingthatthelocationofsuchevents (i.e.,sensorlocations)arecrucialfortheWSNapplication. Inthisway,sensorself-positioningrepresents the first startup process in most WSN projects. It is well known that using a GPS in each sensor node represents the primary solution to infer position estimates. However, this option is not suitable to be considered in all nodes if parameters like size, price, and energy-consumption in a sensor node are of concern[4]. Inordertooptimizesuchparameters,agoodoptionconsistsofreducingtoasmallfraction of sensors with GPS, and the remainder sensors (i.e., unknown sensors), commonly above 90% of total deployedsensors,shouldusealternativestoestimateitsownpositionslikeradio-frequencytransmissions orconnectivitywithneighboringsensors[5–7]. In order to provide position estimates many localization algorithms have been proposed, coming from different perspectives as described in [8,9]. Basically, localization algorithms can be categorized according to range-based vs. range-free methods, anchor-based vs. anchor-free models, and distributed vs. centralized processing [10,11]. Range-based methods consist of estimating node locations (using a localization algorithm) based on ranging information among sensor nodes. Range estimation between pairs of nodes is achieved using techniques of Time-of-Arrival (ToA), Receive-Signal-Strength (RSS), or Angle-of-Arrival (AoA) [12]. This approach has the disadvantage of requiring extra-hardware in each sensor board, increasing the cost per sensor. However, as far as is known, this approach provides the best cost-accuracy performance in localization algorithms. A less expensive but more inaccurate alternative consists of using just connectivity among sensor nodes to estimate node locations, called range-free[13]. Ontheotherhand,ifpositionestimatesareobtainedbyconsideringabsolutereferences (e.g., sensors with GPS or Anchors), the resulted position estimates (also with absolute positions) will be closely related to such reference positions, called an anchor-based model. By the contrary, if no reference positions are used to estimate locations, relative coordinates will be obtained, called an anchor-freemodel. One of the most interesting and relevant aspects in WSN localization is associated with the way to compute the location of sensor nodes. For example, if all pairwise distance measurements among sensornodesaresenttoacentralnodetocomputepositionestimates,thelocalizationalgorithmbecomes centralized. This kind of central processing has the advantage of global mapping, but it has basically two important disadvantages which demerit its use in many cases when robustness and saving-energy have high priority in a WSN [14]. Some important centralized schemes are the next. In [15] an iterative descent procedure (i.e., Gauss–Newton method) is used in a centralized way to solve the Non-Linear Sensors2012,12 841 Least-Square (NLLS) problem. Another interesting centralized scheme was proposed in [16] where the WSN localization problem is modeled as linear or semidefinite program (SDP), and a convex optimizationisusedtosolveproblem. In contrast, when each sensor node estimates its own location using available information of neighboringnodes(e.g.,range,connectivity,location,etc.),thelocalizationprocessbecomesdistributed. Distributed processing is much less energy consuming in WSNs than centralized processing because centralized schemes need to collect relevant information from all nodes in the network which implies re-transmissions in multi-hop environments. Also, distributed algorithms are tolerant to node failures due to node redundancy. Thus, basically a distributed algorithm allows robustness, saving-energy, and scalability [14,17,18], which overcomes the limitations imposed by the centralized approach. In [19], a robust least squares scheme (RLS) for multi-hop node localization is proposed. This approach reduces the effects of error propagation by introducing a regularization parameter in the covariance matrix. However, the computational cost to mitigate the adverse effects of error propagation is too high at energy-constrained nodes. Similarly, [20] proposes two weighted least squares techniques to gain robustness when a non-optimal propagation model is considered however they failed to introduceacovariancematrixinthelocalizationprocessthatcaneffectivelydecreasethecomputational complexity. On the other hand, the authors of [21] propose a Quality of Trilateration method (QoT) for node localization. This approach provides a quantitative evaluation of different geometric forms of trilaterations. However, it seems to be that the main idea of this methodology depends on the quality or resolution of geometric forms (i.e., like image processing) which is impractical to be implemented in resource-constraineddeviceswithlimitedmemoryandprocessingcapabilities(i.e.,nodes). In this paper, we analyze a range-based bilateration algorithm (BL) that can be used in a distributed waytoprovideinitialestimatesforunknownsensorsinawirelesssensornetwork(ouranalysisconsider thateachunknownsensorcandetermineitsinitialpositioncommunicatingdirectlywithseveralanchors). In this case, each node uses a set of two anchors and their respective ranges at a time to solve a set of circleintersectionproblemsusingageometricformulation. Thesolutionsfromthesegeometricproblems areprocessedtopickthosethatclusteraroundthelocationestimateandthentaketheaveragetoproduce an initial node location. Finally, we present a computational/accuracy comparison between the BL algorithm,basedonclosed-formulas,andaclassicalLeastSquares(LS)approachforlocalization,based ontheiterativeLevenberg–Marquardtalgorithm(LM). The outline of this paper is as follows. In Section 2 we examine a popular ranging technique for WSNsusedinoursimulations. InSection3weexplorethelocalizationproblemfromtheLeastSquares point of view. In Section 4 we analyze in detail the BL algorithm. In Sections 5 and 6 we evaluate the accuracyandcomputational-complexityperformancerespectivelybetweenthebilaterationalgorithmvs. LSschemes. Finally,wepresentourconclusions. 2.RangingTechniques This section presents a brief overview of an existing ranging technique used to estimate the true distance between two sensor nodes using power measurements, called Received Signal Strength (RSS). This technique is popular because sensor nodes do not require special hardware support to estimate distances. Asafirstapproximation,consideringthefreespacepathlossmodel,thedistanced between ij Sensors2012,12 842 two sensors s and s can be estimated by assuming that the power signal decreases in a way that is i j inversely proportional to the square of the distance (1/d2). However, in real environments the signal ij power is attenuated by a factor d−ηp. The path-loss factor η is closely related to geometrical and p environmental factors, and it varies from 2 to 4 for practical situations [22]. In noiseless environments thepowersignaltravelingfromasensors toasensor s canbemeasuredaccordingtotherelation[23] j i ( ) η d p 0 P =P (1) ij 0 d ij where the path-loss factor (η ) depends directly on the environmental conditions. P is the received p 0 power at the short reference distance of d =1m from the transmitter. Also, P can be computed by the 0 0 Friisfreespaceequation[24]. Thelog-distancepathlossmodel d P(ij)(dB)=P −10η log ij (2) L 0 p d 0 measures the average large-scale path loss between sensors s and s . The actual path-loss (in dB) is a i j normallydistributedrandomvariable: P(ij) sN(P(ij),σ2 ) (3) L L SH whereσ isgivenindBandreflectsthedegradationsonsignalpropagationduetoreflection,refraction, SH diffraction, and shadowing. It can be seen that the linear measurements and distance estimates have a log-normaldistributionwithamultiplicativeeffectonthemeasurements. Thenoisyrangemeasurement R canbeobtainedfromEquations(2)and(3)as ij P0−PL(ij) Rij =10 10·ηp (4) 3.Least-SquaresMultilaterationLocalizationAlgorithms In this section, we describe multilateration schemes that provide solutions to the Least-Square (LS) problem for location estimates using noisy ranging information derived from ToA or RSS ranging techniques. Consider a set of N wireless sensor nodes S = {s ,s ,...,s }, randomly distributed over 1 2 N a 2-D region whose locations are unknown. We represent these unknown locations with vectors z = [x,y]T. Further, we assume the presence of a set A = {a ,a ,...,a } of M reference or anchor i i i [ ] 1 2 M T nodeswithknownpositionq = x ,y . Anchornodes,a,areequippedwithGPSorasimilarscheme j j j i to self localize. Also, for practical situations M ≪N with M >2. We develop our discussion assuming a2-Dscenario,butitcanbeeasilygeneralizedtothe3-Dcase. Moreover, we assume that any sensor can estimate pairwise ranges with its neighbors using time-of-arrival(ToA)orradiosignalstrength(RSS)techniques[24]. Denotetherangeestimatebetween thenodes andanchora as i j R =d +e (5) ij ij ij Sensors2012,12 843 where d is the true distance between a and s, and e represents the measurement error introduced ij j i ij by environmental noise, propagation distortion, and the ranging technique. Then the solution to the localization problem for a node s consists of minimizing the sum of certain weighted error-distance i functione (·)asfollows: w M ((cid:13) (cid:13) ) p =argmin∑e (cid:13)q −x(cid:13)−R =argminF (x) (6) i w j ij x j=1 x wherep =[x,y]T representsthemostlikelypositionforthesensors thatminimizesF,∥·∥represents i i i i the Euclidean norm, and e (x) represents a function that provides a specific weight to the argument x w (i.e., error distance). For example, the function e (x)=(x)2, the LS formulation, is commonly used to 2 solve Equation (6) due its tractability and efficiency in both mathematical and computational analysis. TheLSproblemcanbesolvedeitherbyclosed-formsolutionsorbyiterativemethods. Nextwedescribe bothmethodologiesindetail. 3.1.Closed-FormLSMultilateration Closed-Form methods have the advantage of fast time processing, which is useful for constrained devices (i.e., motes) where the energy conservation represents one of the major concerns. However, this approachisalsosubjecttoinaccurateestimatesduetonoisyrangingmeasurements,soinmostcasesthis approachisnotasuitableoptioninrealWSNscenarioswherecurrentrangingtechniquesarenotableto provide the required accuracy on the ranging measurements. For example, Spherical Intersection (SX), Spherical Interpolation (SI), and Global Spherical Least Squares (GSLS) [25] can solve a nonlinear set ofequationsusingclosed-formulas. Theseapproachesprovidegoodaccuracyintheestimatedpositions under conditions like small biases and small standard deviations, but they also provide meaningless estimates under noisy environments [26]. A more robust closed-form scheme consists of using the classicalLSmultilaterationdiscussednext[19,27,28]. Considerthatasensors withCartesianpositionp =[x,y]T hasalreadyestimateditsrangeR toM i i i i (cid:13) (cid:13) ij anchors. For each anchor a with position q = [x ,y ]T, an equation (cid:13)q −p(cid:13)2 =R2 is generated as j j j j j i ij shownthenextformulas: ∥q −p∥2 =R2 (x −x)2+(y −y)2 =R2 1 i i1 1 i 1 i i1 ∥q −p∥2 =R2 ⇔ (x −x)2+(y −y)2 =R2 2 i i2 2 i 2 i i2 . . (7) . . . . ∥q −p∥2 =R2 (x −x)2+(y −y)2 =R2 M i iM M i M i iM The system of Equations (7) can be linearized by subtracting the first equation (j =1) from the last M−1equationsarrivingtoalinearsystemthatcanberepresentedinamatrixformas Ap =b (8) i Sensors2012,12 844 where   x −x y −y  2 1 2 1   x −x y −y  A=−2 3 . 1 3 . 1  (9)  .. ..  x −x y −y M 1 M 1 (M−1)×2   R2 −R2 +x2+y2−x2−y2  i2 i1 1 1 2 2   R2 −R2 +x2+y2−x2−y2   i3 i1 1 1 3 3  b= .  (10)  ..  R2 −R2 +x2+y2−x2 −y2 iM i1 1 1 M M (M−1)×1 NowtheleastsquaressolutiontoEquation(8)istodetermineanestimatefor p thatminimizes i { } 1 f(p)=min ∥Ap −b∥2 i i pi {2 } (11) 1 =min (Ap −b)T(Ap −b) i i pi 2 Aftersomemanipulationsweobtainthefollowing: { } 1 1 f(p)=min pTATAp −pTATb+ bTb (12) i i i i pi 2 2 andthegradientof f atp is i ▽f(p)=ATAp −ATb=0 (13) i i whichprovidestheestimate(i.e.,normalequations)toEquation(8): pˆ =(ATA)−1ATb (14) i Solving for Equation (14) may not work properly if ATA is close singular, so a recommended approachistouseaTikhonovregularizationasfollows: Forµ>0(e.g.,closetozero) { } 1 µ f (p)=min ∥Ap −b∥2+ ∥p∥ µ i i i pi {2 2 } (15) 1 1 µ =min pTATAp −pTATb+ bTb+ pTp i i i i i pi 2 2 2 Thenthegradientof f atp is µ i ▽f (p)=ATAp −ATb+µp =0 (16) µ i i i Sensors2012,12 845 FactorizingwearrivetoarobustestimatefortheLSproblemwheretheideaistomodifyeigenvalues toavoidworkingwithzeroeigenvalues[19,29]. pˆ =(ATA+µI)−1ATb (17) i 3.2.IterativeLSAlgorithms Iterativemethodsareusuallyemployedeitherwhenlarge-datasetofinformationneedtobeprocessed orwhenanexactsolutiontoacertainproblemisnotfeasible(e.g.,non-linearsystemsofequations)[30]. Optimization techniques represent a good alternative to solve such non-linear equations using an iterative procedure. Optimization algorithms that solve Non-Linear Least-Square (NLLS) problems (i.e.,theWSNlocalizationproblem)havebeenextensivelyproposedwheretheNewtonorQuasi-Newton methodsareiterativelyusedtominimizingsomeresiduals[15,31,32]. Thenextparagraphsdescribetwo well known iterative algorithms that are used to solve the NLLS problem: the Levenberg–Marquardt (LM)andtheTrust-Region-Reflective(TRR). Assuming that a node denoted s, with Cartesian position p = [x,y]T, estimates its distance R to i i i i ij M anchors denoted a , with positions q =[x ,y ]T, with j=1, ..., M. Consider the following residual j j j j errorvector:   R −∥p −q ∥  i1 i 1   R −∥p −q ∥   i2 i 2  R(pi)= ...  (18) R −∥p −q ∥ iM i M Therefore,tofindthemorelikelypositionof p,theprogram i ( ) 1 minf(p)=min R(p)TR(p) (19) i i i pi pi 2 issolved,whichistheleastsquaresproblem. To solve Equation (19) we employ the TRR algorithm and the LM algorithm. The TRR algorithm uses a sub-space trust-region method to minimize a function f(x). Here, approximations to f inside of a trust-region are iteratively required. The three main concerns in this algorithm are how to choose and compute the approximation to the function, how to choose and modify the trust region, and, finally, how to minimize over the sub-space trust-region. Even though the TRR algorithm provides an accurate solutionfortheWSNinitialestimates,itisexpensive(computationallyspeaking)forconstrainedsensor nodes[33]. On the other hand, the LM algorithm uses the search direction approach (a mix between the Gauss–Newton direction and the steepest descent direction) to find the solution to Equation (19). This algorithm outperforms the simple gradient descent methodology [34], and also it avoids dangerous operations with singular matrices as the pure Newton method does, so this methodology represents a good algorithm for comparison with the bilateration approach due to its robustness, speed, and accuracy [35]. Following the procedure presented in [29], Equation (19) can be solved by the Line Search Levenberg–Marquardt methodology shown in Algorithm 1, where ∥·∥ is the ℓ-2 norm, I is the Sensors2012,12 846 identitymatrix,R istheestimateddistancebetweenthemotes andtheanchora ,J(p )representsthe ij i j k JacobianofR(p )attheiterationk,and M (p )isthemeritfunctiongivenby k f k 1 RT(p )R(p ) (20) k k 2 Thederivativeofthemeritfunctionattheiteration k is ′ M (p )=JT(p )R(p ) (21) f k k k ∆ istheLevenberg–Marquardtdirection, LM (cid:13) (cid:13) µ =ρ(cid:13)JT(p )R(p )(cid:13) (22) k k k whereρ∈(0,1),andfinally 1 ∑M p = q (23) 0 j M j=1 providestheinitialguessrequiredfortheTRRandLMiterativealgorithms. Algorithm1 Levenberg–Marquardtmethodology. Require: aninitialpositionp 0 Ensure: asolutionp k+1 1: Initialize: k=0,τ=Threshold,ρ=0.05 2: do 3: Solve: (JT(pk)J(pk)+µkI)∆LM =−JT(pk)R(pk) 4: Findthesufficientdecrease(Armijo’scondition): 5: suchthat αk =(12)tfor t =0,1,... 6: satisfiesMf(pk+αk∆LM)≤Mf(pk)+10−4αkM′f(p)T∆LM 7: Updateposition: pk+1 =p+αk∆LM 8: Updateµk: µk =ρ∥JT(pk)R(pk)∥ 9: while(∥pk+1−pk∥≤τork≤100) 4. ABilaterationLocalizationMethod In this section we present the bilateration method for WSN localization which can be used as the initializationstepforiterativelocalizationschemes. Thisalgorithmavoidsiterativeprocedures,gradient calculations, and matrix operations that increase the internal processing in a constrained device. This research was done independently of the work presented in [36]. Even though both schemes share the same idea (i.e., bilateration), the procedure and the scope of both works are different as shown in Subsection 4.1. We show that it is possible to obtain a position estimate by solving a set of bilateration problemsbetweenasensornodeanditsneighboringanchors,andthenfusingthesolutionsaccordingto the geometrical relationships among the nodes. Our aim is to find a scheme that can be deployed on a computationally constrained node. We argue that bilateration is an attractive option as the localization problem is divided on smaller sub-problems which can be efficiently solved on a mote. Next we Sensors2012,12 847 start our development by introducing the typical assumptions and definitions considered in a WSN localizationproblem. { } Let us define anchor subsets A ⊂A such that A = a ,a with j ̸=k. Hence, there is a total of ( ) jk jk j k Q= M anchor subsets. Without loss of generality, consider the case for one node s that receives from 2 i a subset A the anchor positions q and q , and computes the respective ranges R and R using RSS jk j k ij ik or ToA measurements. A possible geometrical scenario for this configuration is shown in Figure 1. We canappreciatefromthisexamplethattherangeestimatesR islargerthand andR isshorterthand . ij ij ik ik Now, consider the two range circles shown in the figure; one with its origin at q and radius R , and the j ij jk jk second with center in q and radius R . Next, define the two circle intersection points as g and g , k ik i i jk jk whereg isthereflectionofg withrespecttothe(imaginary)linethatconnectsq andq . Inthiscase, i i j k thesuperscript jkrepresentstheanchorsubsetA . Tosimplifyourdiscussion,wedropthesuperscripts, jk andonlyusethemwhenmorethanoneanchorsubsetisinvolvedinourdiscussion. F(igure)1. Sensor si finding its two feasible solutions (gi(,gi) base)d on the anchors locations q ,q andtheirrespectiveanchorrangemeasurements R ,R . k j ij ik In our approach, node s determines the circle-circle intersections (CCI) g and g by solving the i i i closed-form expression reported in [37]. For instance, consider the two right triangles formed by the coordinates(q ,g,f )and(q ,g,f )inFigure1,whichsatisfythefollowingrelationships: j i t k i t d2 +h2 =R2 (24a) jt ij d2 +h2 =R2 (24b) kt ik respectively. Thedistance d canbeobtainedbysolvingforh2 inEquations(24a)and (24b): jt R2 −d2 =R2 −d2 (25) ij jt ik kt (cid:13) (cid:13) andlettingd =(cid:13)q −q (cid:13)=d +d resultingin j k jt kt R2 −d2 =R2 −(d−d )2 (26a) ij jt ik jt Sensors2012,12 848 R2 =R2 −d2+2·d·d (26b) ij ik jt R2 −R2 +d2 ij ik d = (26c) jt 2·d wherethepositionf =[x ,y ]T isobtainedasfollows: t t t ( ) d f =q + jt q −q (27) t j k j d Finally,thecircleintersection g =[x,y]T iscomputedas i i i h x =x ± (y −y ) (28a) i t k j d h y =y ∓ (x −x ) (28b) i t k j d where q = [x ,y ]T,q = [x ,y ]T, and h is easily obtained from Equation (24). The complementary j j j k k k signsofEquations(28a)and (28b)areusedtoobtainthesolutionforg. i jk jk Eachnodes appliestheCCI procedureusingallQsubsetsA . Forinstance,g andg areobtained i jk i i jℓ jℓ from the subset A , g and g are obtained from the subset A , and so on. Hence, a sensor node will jk i i jℓ have 2Q possible initial position estimates where half are considered mirror solutions which should be eliminated through the selection process described next. Geometrically, we expect that the true location will be located around the region where solutions form a cluster (i.e., half of the circle intersections shouldideallyintersectatthesolution). LetustoconsidertheexampleshowninFigure2. F(igure 2.) Sensor si getting its initial estimation Pi0 from three non-collinear anchors a ,a ,a . j k ℓ There are three anchors named a ,a and a and a node s that needs to be localized. The range j k ℓ i estimate R is larger than d , the range estimate R is shorter than d , and the range estimate R is ij ij ik ik iℓ shorterthand . Hence,s computesasetofofsixlocationcandidatesgivenby{gjk,gjk,gjℓ,gjℓ,gkℓ,gkℓ}. iℓ i i i i i i i

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.