This paper considers the localization problem in mobile sensor networks. Such a problem is a challenging task, especially when measurements exchanged between sensors may contain outliers, that is, data not matching the observation model. This paper proposes two algorithms robust to outliers. These algorithms perform a set-membership estimation, where only the maximal number of outliers is required to be known. Using these algorithms, estimates consist of sets of boxes whose union surely contains the correct location of the sensor, provided that the considered hypotheses are satisfied. This paper proposes as well a technique for evaluating the number of outliers to be robust to. In order to corroborate the efficiency of both algorithms, a comparison of their performances is performed in simulations using Matlab.
1. Introduction
Mobile Sensor Networks (MSNs) have recently emerged as a challenging research field. An MSN consists of a large number of low-cost smart sensors with limited computational capacities and energy resources [1]. Due to the lack of a fixed infrastructure in MSNs, the sensors are able to move in an uncontrolled manner. For this reason and since sensed data are related to the locations of the sensors in almost all MSN applications, many researchers have focused on the localization problem. A first solution for sensor localization is to equip all sensors with global positioning systems (GPSs) [2]. However, this solution is nonpractical in MSNs, since GPS are expensive, high energy consuming, and having great sizes. The alternative solution consists of equipping a few number of sensors with GPS receivers. These sensors, aware of their locations, are called anchors. The remaining sensors, called nonanchor nodes or simply nodes, have unknown locations, and hence they need to be localized.
Many anchor-based algorithms have been proposed for sensor localization. For instance, Doherty et al. [3] propose a centralized technique for position estimation. Localization in [3] is formalized as a convex optimization problem, having connectivity measurements between sensors as constraints. In [4–6], different approaches requiring few anchors have been proposed. Local maps with relative positions are constructed using measured distances between nodes and their neighbors. A combination of these maps with known positions of anchors lead to absolute positions. Nevertheless, these techniques are not very robust because of errors accumulation while combining the maps. Authors in [7] propose a distributed static algorithm, where each node defines its position as the center of all observed anchors. In a different scenario [8], Galstyan et al. propose an online distributed technique, where nodes use their detection of a moving target to update their position estimates. Blatt and Hero [9] address the problem of source localization using sensors measurements. The problem is formulated as a convex problem that is solved using the aggregated projection onto convex sets (APOCSs) method. In [10–12], dynamic approaches, on the basis of sequential Monte-Carlo [13], are considered to estimate the positions of the nodes. The posterior distribution of the unknown positions is estimated recursively with a set of particles. Terwilliger et al. [14] propose to cover all possible solutions with the smallest enclosing disk. Alternative dynamic algorithms for sensor localization, using interval analysis [15], have been proposed in [16, 17]. Position estimates are boxes covering the possible locations of the sensors.
Existing methods have mainly considered the localization problem with the hypothesis that all measurements are consistent with the considered measurement model. However, in practical situations, outliers, that is, data not matching the measurement model, are encountered. Previously mentioned estimation techniques are not very robust to such outliers. In [18], Jaulin et al. propose a set-membership estimator robust to outliers based on interval analysis. Savarese et al. [19] present a distributed robust algorithm for sensor localization. The method is separated into two phases: the start-up phase, where first estimates of node positions are computed using hop counts to anchors, and the refinement phase, where nodes communicate with their neighbors to update their positions using a least-squares triangulation technique. Nevertheless, a number of factors influence the convergence of the refinement phase, such as the accuracy of first estimates and the magnitude of ranging errors. In [20], Rabbat et al. introduce a robust localization algorithm of an isotropic energy source using kernel averaging techniques. The proposed estimator is more robust than the least-squares estimator under a variety of conditions. Leger and Kieffer [21] present a distributed version of the estimation algorithm [18], assuming that the maximal number of outliers is known. In particular, a static distributed algorithm is proposed for source localization using received signal strength (RSS) measurements. The proposed method adapts the set inversion via interval analysis (SIVIA) algorithm [15] to evaluate a solution set.
In this paper, we propose an original adaptive approach for sensor localization in the presence of outliers. Assuming only that the maximal number of outliers is given, the proposed approach uses connectivity measurements in addition to a mobility model to address the localization problem. The solution is then given using either SIVIA or an alternative combinatorial technique. Another contribution of the paper is that it proposes a technique for evaluating the maximal number of outliers to be robust to. Moreover, using a connectivity-based observation model, the paper compares the performances of both robust localization algorithms.
The rest of the paper is organized as follows. Section 2 introduces the localization problem. A description of the SIVIA algorithm and the combinatorial technique is then given in Section 3. Section 4 provides simulation results, whereas Section 5 concludes the paper.
2. Problem Statement
The proposed method is an anchor-based method, where each node exchanges information with anchors to localize itself. Consider a network of anchors and mobile nodes. All sensors are assumed to be in the same plane: their locations at time t are given by , , for anchors and , , for nodes. In order to reduce the communication costs during the localization process, the proposed method assumes that each mobile node does not exchange information with other nodes. For this reason and without loss of generality, we focus on the localization of one generic mobile node , and we thus drop the index j.
2.1. Observation Model
At time t, the mobile node receives signals from a set of anchors with specific received signal strengths (RSSs) denoted by , . These RSSs are assumed to follow the Okumura-Hata model [22]
In (1), is in , is the power measured (in ) at a reference distance from the anchor , is the path-loss exponent, is the Euclidian distance between the anchor and the considered node, and is the measurement noise, modeled as zero-mean Gaussian with variance .
In practice, and may vary from one anchor to the other, and may be quite large. Given the RSS values, the proposed model may lead to inaccurate distance estimates. For this reason, only connectivity information are employed and (1) is only used to determine whether the node is in the vicinity of the ith anchor. Let be some RSS threshold corresponding to a distance r, which is the sensing range of the sensors. Then, if , the distance from the anchor i to the node is deemed less than r. Anchors for which are called detected anchors. Only detected anchors are then taken into account for the localization. The observation model is then given by
where is the set of indices of detected anchors, that is, whose emitted signals have RSS at the node larger than . The observation model is thus given by a set of disk equations centered on the detected anchors and having r as radius.
In real environments, measurements may not follow exactly the observation model. Indeed, due to the additive noise and the inaccuracy of the parameter values, a measured RSS could be less than while (2) is satisfied for real and vice versa. In the first case, the anchor is assumed to be out of the vicinity of the node, which is not true, and thus, a correct measurement is omitted, whereas in the second case, an outlier is obtained. The proposed approach takes such outliers into consideration. Using the connectivity-based model, it assumes that the maximal number of outliers is known and denoted by q. In other words, it considers that measurements at minimum are correct at each time step.
2.2. Mobility Model
The proposed method takes also advantage of the mobility of the nodes to improve the estimation accuracy. Any available information about the motion of the node could be used to define the mobility model. This paper proposes a very general mobility model, where only the maximal velocity of the node is assumed to be known. Then, the positions of the generic node at time steps and t satisfy
More generally, the mobility model could be reformulated as follows:
where v is some parameter only known to belong to some known interval (here, ).
2.3. Description of the Robust Set-Membership Localization
Estimating the location of the sensor at time t consists of finding the set of all locations consistent with the mobility model (4) and at least observation constraints (2). In other words, these locations should be in the vicinity of at least detected anchors. A set-membership estimator [23] robust to q outliers [24] at time t is then obtained, since any measurements instead of measurements are considered for the estimator.
Assume that belongs to some set . According to this approach, and to compute , a predicted set is first evaluated using the mobility model
Measurements are then taken into account to correct as follows:
where is the set of all -combinations of indices in , C is a set of indices belonging to , and
Then, denotes the set of locations of that satisfy the specific observation constraints denoted in C, whereas denotes the set of locations of that satisfy any observation constraints. The number of combinations to be considered in (6) is , where denotes the factorial of q.
This definition does not involve any combinatorial. One may easily prove that (6) and (8) are equivalent. This technique would be used in the following to solve the localization problem.
3. Localization Algorithms
Solving the localization problem in a guaranteed way consists of finding the set of all node locations that satisfy the problem constraints while being robust to outliers. In this paper, interval analysis [15] is employed to achieve this goal. At each time step, the proposed method computes a set of nonoverlapping boxes, called subpaving [15], whose union covers the solution set . Assume that is the solution subpaving containing the actual position of the generic node at time t. One has
where is a two-dimensional box and is the number of boxes in . As shown in Section 2.3, finding involves a prediction phase followed by a correction phase.
3.1. Prediction Phase
Assume that is the subpaving obtained at time . Computing the predicted set may be done by evaluating (5), where is replaced by , which is quite difficult. Nevertheless, for each box , the corresponding box has to be compliant with the mobility model (3), leading to the following constraint:
Relaxing (11) yields the following expressions of and :
Let be the set of all boxes evaluated with (12). One may prove that . The convex hull [15] of is the smallest box containing . Its components are defined as
where and are the low and high endpoints of , respectively. is a rectangular area that covers all possible locations that could be taken by the node at time t according to its mobility model. The convex hull is used in the correction phase instead of to reduce the computational complexity.
3.2. Correction Using the SIVIA Algorithm
The SIVIA algorithm [15] performs a succession of bisections and selections of boxes compliant with the localization constraints. Let be a box, set initially to . The following test function is evaluated:
where is equal to 1 if and 0 otherwise, while is equal to 1 if and 0 otherwise. Graphically, means that the box is entirely included in the connectivity disk centered on the anchor a, whereas means that the box is entirely outside the connectivity disk centered on the anchor a.
The box is added to the solution if , meaning that all satisfy at least observation constraints. Boxes inconsistent with more than q observation constraints () are withdrawn, whereas others having a nonempty intersection with the solution set () are bisected. The box is bisected into two subboxes of equal area and along the dimension having the largest width. The subboxes are then tested, kept in the solution, withdrawn, or bisected until the maximal width of the resulting subboxes is less than a given threshold δ. An illustration of the proposed method is given in Figure 1. It shows four detected anchors, one of them being an outlier (). The exact solution of the problem is given in light gray, whereas the subpaving provided by SIVIA is given in both light and dark gray.
Robust localization with the SIVIA algorithm.
3.3. Correction Using the Combinatorial Technique
In this algorithm, both the combinatorial formulation (6) and the convex hull including all propagated boxes using (13) are considered. Based on (6), the proposed algorithm consists of contracting the initial domain with each combination of observations. For this reason, all observation equations indicated in C are iterated in the forward-backward contractor [15]. This contractor iterates all constraints without any prior order until no contraction is possible. The resulting region is the smallest box covering the intersection of with all the observation disks of C. In order to use each constraint of (2) in the forward-backward contractor, one should express as a function of , and vice versa as follows:
for each detected anchor i where and . Using intervals and having an initial box , these inequalities would lead to the contracted box defined as follows:
where and . Then, considering the combination C of constraints, and starting with the predicted domain (initially ), the contracted box would be obtained by performing the following steps (Algorithm 1).
Algorithm 1: Computation of the contracted box using the forward-backward contractor.
while is contracted do
fordo
;
;
;
;
end
end
Each nonempty box , , is added to the solution at time t. The boxes in may have nonempty intersections. Consequently, in order to obtain nonoverlapping boxes, one could apply the following procedure.
Consider an empty final set.
Sort all boxes of according to their decreasing areas.
Add the largest box to the final set.
Select the following box in the sorted list.
Deprive it from all boxes already added to the final set.
Add the result to the set.
Steps (iv) to (vi) are repeated until all sorted boxes are considered. Recall that depriving a box from a box yields a set of nonoverlapping boxes covering all the points x of not included in . An illustration of the proposed method is given in Figure 2. It shows four detected anchors, one of them yielding an erroneous observation. The first solution leads to two boxes, the box ① and the one in dashed line. Using the depriving technique, three nonoverlapping boxes ①, ②, and ③ (in bold line) are then selected covering the exact solution (in light gray).
Robust localization with the combinatorial technique.
3.4. Evaluation of the Number of Outliers to Tolerate
Consider the vector of RSS measurements. Determining from the maximal number of outliers q, which have to be tolerated, may be done by choosing q such that , where is the probability that q or less outliers have occurred knowing and is some tuning parameter. One has
where s is some pattern indicating whether anchor is providing an outlier () or a reliable measurement (). Now,
Let and be the noisy and noiseless RSS measurements provided by the ith anchor. The probability that the ith anchor provides an outlier is null () if , since in this case, the anchor i is not detected and will thus not provide any outlier. Otherwise, is given as follows:
where is the ith measurement noise. Then, assuming that all measurement noise samples are independent,
Now, since
one is able to evaluate and to choose q.
4. Simulations
In this section, we compare the SIVIA-based method (SBL) to the combinatorial-based one (CBL). We consider a group trajectory model, where sensors are moving along similar trajectories over . We deploy 31 sensors in a area, 30 of them being anchors. Since nodes use only anchors information to localize themselves, we consider the localization of a single mobile node. The simulated trajectory of the node is with a maximal velocity of and a localization step of . RSS measurements are generated using the distances between the considered node and all anchors and model (1) with , , and . Moreover, r is set to and to . In order to compare the SBL algorithm to the CBL algorithm, we take different values of the variance of the measurement noise, leading to different numbers of outliers. In fact, for each value of , q is evaluated using the results in Section 3.4, with .
Note that the initial position of the node is supposed to be known. One may also use the whole deployment area as initial domain. All simulations are performed on an Intel(R) Core(TM)2 CPU at and RAM, using MATLAB 6.1.
We first set , yielding either none or only one outlier per time step. Applying the results of Section 3.4 one obtains , , and . With , one gets . With , one would take , which leads to less accurate estimates (less measurements are taken into account) but still containing the solution set. Note that if too less outliers are tolerated, one may obtain empty solution sets or sets not containing the actual location of the node.
With , Figure 3 shows the subpavings obtained with both SBL and CBL methods. Note that the threshold δ of SIVIA is set to . The plot shows that both results cover the actual position of the node. The average ratio of the areas of subpavings obtained with SBL over those obtained with CBL is equal to 0.827. SBL leads to a more accurate estimate. However, the average time required for the localization process is equal to per time step with SBL and to with CBL. This difference is due to the limited number of combinations considered in CBL at each time step ( with ). The average number of boxes per subpaving is equal to 120 with SBL, whereas it is equal to 3 with CBL. Here, CBL is less memory consuming. Note that with a precision parameter higher than in SIVIA, SBL needs less computing time but provides larger subpavings.
An illustration of the subpavings obtained with the SBL and the CBL algorithms.
In a second set of experiments, σ varies from to . Figure 4 shows the maximal number of outliers q, the total number of considered anchors , the average computing time per step, and the ratio of the average subpaving areas obtained with SBL over CBL as a function of σ. The simulated data are generated ten times for each σ, and the results are thus average values over the set of simulations. The plot shows that CBL is faster than SBL when the standard deviation σ is less than . In these cases, q is less than 4, and the maximal number of considered anchors is less than 13. When the noise variance increases, the computation time of the CBL method becomes quite large compared to SBL. Choosing one algorithm or the other depends on the anchor density and on the proportion of outliers.
An illustration of q and at (a), the computing times are in (b) and the ratio of the subpavings areas (SBL over CBL) in (c).
5. Conclusion
This paper proposes and compares two techniques for mobile sensor localization that are robust to any fixed number of erroneous measurements. Using interval analysis, the estimates are sets of nonoverlapping boxes containing the actual location. The SIVIA-based algorithm (SBL) bisects the search region leading to many boxes describing efficiently the solution set; the combinatorial method (CBL) leads to larger boxes including the solution as well. In terms of computing time, CBL is more efficient than SBL for a small number of outliers, whereas the complexity of SBL is almost constant whatever the number of tolerated outliers.
References
1.
AkyildizI. F.SuW.SankarasubramaniamY.CayirciE.Wireless sensor networks: a surveyComputer Networks20023843934222-s2.0-003708689010.1016/S1389-1286(01)00302-4
2.
Hofmann-WellenhofB.LichteneggerH.CollinsJ.Global Positioning System: Theory and Practice1994New York, NY, USASpringer
3.
DohertyL.PisterK. S. J.El GhaouiL.Convex position estimation in wireless sensor networksProceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications SocietiesApril 2001Anchorage, Alaska, USA16551663http://www.citeulike.org/group/7128/article/301423610.1109/INFCOM.2001.9166622-s2.0-0035013232
4.
CapkunS.HamdiM.HubauxJ.-P.GPS-free positioning in mobile ad-hoc networksProceedings of the 34th Annual Hawaii International Conference on System Sciences (HICSS-34 '01)January 2001Maui, Hawaii34813490
SavareseC.RabaeyJ. M.BeutelJ.Locationing in distributed ad-hoc wireless sensor networks4Proceedings of the IEEE Interntional Conference on Acoustics, Speech, and Signal Processing (ICASSP '01)May 2001Salt Lake City, Utah, USA20372040http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=94039110.1109/ICASSP.2001.9403912-s2.0-0034854451
7.
MooreD.LeonardJ.RusD.TellerS.Robust distributed network localization with noisy range measurementsProceedings of the Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys '04)November 2004Baltimore, Md, USAACM5061http://doi.acm.org/10.1145/1031495.103150210.1145/1031495.1031502
8.
GalstyanA.KrishnamachariB.LermanK.PattemS.Distributed online localization in sensor networks using a moving targetProceedings of the 3rd International Symposium on Information Processing in Sensor Networks (IPSN '04)April 20046170http://ieeexplore.ieee.org/xpls/absall.jsp?arnumber=1307324&tag=12-s2.0-3042819146
9.
BlattD.HeroA. O.APOCS: a rapidly convergent source localization algorithm for sensor networksProceedings of the IEEE/SP 13th Workshop on Statistical Signal ProcessingJuly 200512141219http://ieeexplore.ieee.org/xpls/absall.jsp?arnumber=16287812-s2.0-33947095999
10.
HuL.EvansD.Localization for mobile sensor networksProceedings of the 10th Annual International Conference on Mobile Computing and Networking (MobiCom '04)2004Philadelphia, Pa, USAACM4557http://doi.acm.org/10.1145/1023720.102372610.1145/1023720.1023726
11.
BaggioA.LangendoenK.Monte Carlo localization for mobile wireless sensor networksAd Hoc Networks2008657187332-s2.0-4154908869010.1016/j.adhoc.2007.06.004
12.
JiyoungY.SungwonY.HojungC.Multi-hop-based Monte Carlo localization for mobile sensor networksProceedings of the 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON '07)June 2007San Diego, Calif, USA162171http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=0429282810.1109/SAHCN.2007.4292828
13.
DoucetA.GodsillS.AndrieuC.On sequential Monte Carlo sampling methods for Bayesian filteringStatistics and Computing20001031972082-s2.0-0001460136
14.
TerwilligerM.CoullardC.GuptaA.Localization in ad hoc and sensor wireless networks with bounded errorsProceedings of the 15th International Conference on High Performance Computing (HiPC '08)2008Bangalore, IndiaSpringer295308http://portal.acm.org/citation.cfm?id=1791889.1791922
MouradF.SnoussiH.AbdallahF.RichardC.Anchor-based localization via interval analysis for mobile ad-hoc sensor networksIEEE Transactions on Signal Processing2009578322632392-s2.0-6824914608710.1109/TSP.2009.2020018
17.
MouradF.SnoussiH.AbdallahF.RichardC.Model-free interval-based localization in manetsProceedings of the IEEE 13th Digital Signal Processing Workshop and 5th IEEE Signal Processing Education Workshop (DSP/SPE '09)January 2009Marco Island, Fla, USA4744792-s2.0-6364914146610.1109/DSP.2009.4785970
18.
JaulinL.WalterE.DidritO.Guaranteed robust nonlinear parameter boundingProceedings of the IMACS Multiconference: Symposium on Modelling, Analysis and Simulation (CESA '96)1996Lille, France11561161
19.
SavareseC.RabaeyJ. M.LangendoenK.Robust positioning algorithms for distributed ad-hoc wireless sensor networksProceedings of the General Track of the Annual Conference on USENIX Annual Technical Conference2002317327http://portal.acm.org/citation.cfm?id=647057.713854
20.
RabbatM.NowakR.BucklewJ.Robust decentralized source localization via averagingProceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '05)March 2005V1057V10602-s2.0-3364680163110.1109/ICASSP.2005.1416489
21.
LegerJ.KiefferM.Guaranteed robust distributed estimation in a network of sensorsProceedings of the 35th IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '10)March 2010Dallas, Tex, USA33453381http://www.lss.supelec.fr/~publi/TWljaGVsIEtJRUZGRVI=_ICASSP_Leger_10.pdf
22.
MedeisisA.KajackasA.On the use of the universal Okumura-Hata propagation prediction model in rural areasProceedings of the 51st Vehicular Technology Conference (VTC '00)May 2000Tokyo, Japan181518182-s2.0-0033684711
23.
MilaneseM.NortonJ.Piet-LahanierH.WalterE.Bounding Approaches to System Identification1996New York, NY, USAPlenum Press
24.
LahanierH.WalterE.GomeniR.OMNE: a new robust membership-set estimator for the parameters of nonlinear modelsJournal of Pharmacokinetics and Biopharmaceutics19871522032192-s2.0-0023260075