Professional Documents
Culture Documents
(x1, y1)
ABSTRACT gy for the development and operation of WSNs.
(x2, y2)
In this article we address the localization
d1 Monitoring applications define an important problem from the viewpoint of a WSN. In the
(x, y) d2
class of applications used in wireless sensor net- next two sections we briefly present an overview
(x3, y3) works. In these applications the network per- and definition of localization systems for WSNs
d3 ceives the environment and searches for event and their components. We show the main meth-
(a) occurrences (phenomena) by sensing different ods used by localization systems to estimate dis-
physical properties, such as temperature, humidi- tances and angles. We show the techniques that
ty, pressure, ambient light, movement, and pres- can be used by a node to compute its position,
N ence (for target tracking). In such cases the and how all the estimated information of dis-
(x2, y2) 2 location information of both phenomena and tances and positions can be manipulated in
nodes is usually required for tracking and corre- order to allow most or all of the nodes of a WSN
N (e)
1
lation purposes. In this work we summarize most to estimate their positions. Finally, we present
of the concepts related to localization systems for our conclusions.
(x1, y1)
(x, y) WSNs as well as how to localize the nodes in
these networks (which allows the localization of PROBLEM STATEMENT
phenomena). By dividing the localization systems A WSN can be composed of n nodes with a com-
The authors into three distinct components distance/angle munication range of r, distributed in a two-
estimation, position computation, and localiza- dimensional squared sensor field Q = [0,s]
summarize most of tion algorithm besides providing a didactic [0,s]. For the sake of simplification, we consider
viewpoint, we show that these components can symmetric communication link; that is, for any
the concepts related be seen as subareas of the localization problem two nodes u and v, u reaches v if and only if v
to localization that need to be analyzed and studied separately. reaches u and with the same signal strength w.
Thus, we represent the network by the Euclidean
systems for WSNs INTRODUCTION graph G = (V, E) with the following properties:
V = {v1, v2, , vn} is the set of sensor nodes.
as well as how to The definition of a localization system among i, j if v i reaches v j; that is, the distance
sensor nodes is a fundamental issue for many between vi and vj is less than r.
localize the nodes in applications of wireless sensor networks (WSNs). w(e) r is the weight of edge e = i, j, the dis-
Because sensor networks may be deployed in tance between vi and vj.
these networks inaccessible terrains or disaster relief operations Some terms can be used to designate the
(which allows the [1], the position of sensor nodes may not be pre-
determined. Thus, a localization system is
state of a node:
Definition 1 (Unknown Nodes U): Also
localization of required in order to provide position informa- known as free or dumb nodes, this term refers to
tion to the nodes. the nodes of the network that do not know their
phenomena). The importance of localization information localization information. To allow these nodes to
arises from several factors, many of which are estimate their positions is the main goal of a
related only to WSNs. These factors include the localization system.
identification and correlation of gathered data, Definition 2 (Settled Nodes S): These nodes
node addressing, management and query of were initially unknown nodes that managed to
nodes localized in a determined region, evalua- estimate their positions by using the localization
tion of nodes density and coverage, energy map system. The number of settled nodes and the
generation, geographic routing, object tracking, estimated position error of these nodes are the
and other geographic algorithms. All of these main parameters for determining the quality of a
factors make localization systems a key technolo- localization system.
THE COMPONENTS OF LOCALIZATION SYSTEMS Figure 1. Division of localization systems into three distinct components.
Localization systems can be divided into three
distinct components:
Distance/angle estimation: This component is very accurate, but with higher costs (in terms of
responsible for estimating information about hardware, energy, and processor resources),
the distances and/or angles between two while others are less accurate but already avail-
nodes. This information will be used by the able on most sensor nodes.
other components of the localization system. In the following sections some of the main
Position computation: This component is methods used by localization systems to estimate
responsible for computing a nodes position distances/angles will be studied. These methods
based on available information concerning dis- include received signal strength indication
tances/angles and positions of reference nodes. (RSSI), time of arrival/time difference of arrival
Localization algorithm: This is the main com- (ToA/TDoA), angle of arrival (AoA), and com-
ponent of a localization system. It determines munication range.
how the available information will be manipu-
lated in order to allow most or all of the nodes RECEIVED SIGNAL STRENGTH INDICATOR
of a WSN to estimate their positions. RSSI can be used to estimate the distance
Figure 1 depicts this component division. between two nodes based on the strength of the
Besides providing a didactic viewpoint, the signal received by another node. As depicted in
importance of such a division into components Fig. 2a, a sender node sends a signal with a
comes, as we will see, from the need to recog- determined strength that fades as the signal
nize that the final performance of a localization propagates. The bigger the distance to the
system depends directly on each of these compo- receiver node, the lesser the signal strength
nents. Also, each component has its own goal when it arrives at that node.
and methods of solution. They can thus be seen Theoretically, the signal strength is inversely
as subareas of the localization problem that proportional to squared distance, and a known
need to be analyzed and studied separately. radio propagation model can be used to convert
the signal strength into distance. However, in
DISTANCE/ANGLE ESTIMATION real-world environments, this indicator is highly
influenced by noises, obstacles, and the type of
Distance/angle estimation consists in identifying antenna, which makes it hard to model mathe-
the distance or angle between two nodes. Such matically. In these cases it is common to make a
estimates constitute an important component of system calibration [2], where values of RSSI and
localization systems, because they are used by distances are evaluated ahead of time in a con-
both the position computation and localization trolled environment.
algorithm components. This method, like the others, has both advan-
Different methods can be used to estimate tages and disadvantages. The main advantage is
such information. Some of these methods are its low cost, because most receivers are capable
Time
lse of
receivers
t2
Communication range Sensor node
Distance Distance
(a) (b) (c) (d)
Figure 2. a) Decrease in signal strength; b), c) methods to derive the distance from the signal's arrival time; d) angle of arrival of the
signal.
N 104 104
6 5
(x2, y2)
(x2, y2) 2 4
4 3
23
(e) 12 (x3, y3) 2
N 2
(x, y) 1
1 31
0 0 75
80 85 6570
(x1, y1) 90 70 80 5560
(x1, y2) 80 60 75 50
(f) 70 (g) 4045 (h)
(x, y) 6050 40 50 70 65
Figure 3. a) Theoretical model of trilateration; b) a more realistic model of trilateration; c) multilateration; d) bounding box;
e), f) triangulation; g), h) probabilistic approach (from [11]).
tion via the intersection of three circles, as floating point operations (where m is the num-
depicted in Fig. 3a. To estimate its position ber of unknowns and n is the number of equa-
using trilateration, a node needs to know the tions) are required to estimate a position.
positions of three reference nodes and its dis-
tance from each of these nodes. Distances can BOUNDING BOX
be estimated using one of the methods explained The bounding box method proposed in [12] uses
in the previous section. squares instead of circles as in trilateration
The circles formed by the position and dis- to bound the possible positions of a node. An
tance to each of the references can be represent- example of this method is depicted in Fig. 3d.
ed by the formula (x ^ x ) 2 + (y^ y ) 2 = d2, For each reference node i, a bounding box is
i i i
where(x ^, ^y ) is the position we want to compute, defined as a square with its center at the posi-
(xi, yi) is the position of the ith reference node, tion of this node (x i , y i ), with sides of size 2d i
and di is the distance of the ith reference node (where d is the estimated distance) and with
to the unknown node. In this case we have three coordinates (x i d i , y i d i ) and (x i + d i , y i +
equations with two unknowns, which can be di). The intersection of all bounding boxes can
solved, theoretically, in one solution. be easily computed without any need for float-
In real-world applications the distance esti- ing point operations by taking the maximum of
mation inaccuracies as well as the inaccurate the low coordinates and the minimum of the
position information of reference nodes make it high coordinates of all bounding boxes. This is
difficult to compute a position. As depicted in the shaded rectangle in Fig. 3d. The final posi-
Fig. 3b, the circles do not intersect at only one tion of the unknown node is then computed as
point, resulting in an infinite set of possible solu- the center of the intersection of all bounding
tions. boxes.
Furthermore, when a larger number of refer- Despite the final error of this method, which
ence points are available, we can use multilatera- is greater than trilateration, computing the inter-
tion to compute the nodes position. In this case section of squares uses fewer processor resources
an overdetermined system of equations must be than computing the intersection of circles.
solved. Figure 3 depicts this case. Usually,
overdetermined systems do not have a unique TRIANGULATION
solution. When considering n reference points In triangulation [7, 10] information about angles
and also the error of the distance estimations, is used instead of distances. Position computa-
which makes di = d^i , the system of equations tion can be done remotely (Fig. 3e) or by the
becomes (x ^ x )2 + (y^ y )2 = d2 e, where is node itself; the latter is more common in WSNs.
i i i
normally considered to be an independent nor- In this last case, depicted in Fig. 3f, at least
mal random variable with zero mean. This sys- three reference nodes are required. The
tem can be linearized, by subtracting the last unknown node estimates its angle to each of the
equation, into Ax b. This linear system can be three reference nodes and, based on these angles
solved easily using standard methods like the and the positions of the reference nodes (which
least squares approach. form a triangle), computes its own position using
The number of floating point operations simple trigonometrical relationships. This tech-
needed to compute a position depends on the nique is similar to trilateration. In fact, based on
method used to solve the system of equations. In the AoAs, it is possible to derive the distances to
the case of the least square method, (m + n/3)n2 reference nodes [10].
In APS, a reduced PROBABILISTIC APPROACHES algorithms are the Ad Hoc Positioning System
(APS), Recursive Position Estimation (RPE),
number of beacon The uncertainty in distance estimations has moti- and Localization with a Mobile Beacon (LMB).
vated the appearance of probabilistic approaches
nodes (e.g., three or for computing a nodes position. An example of a AD HOC POSITIONING SYSTEM
probabilistic approach is proposed in [11], where In APS [17] a reduced number of beacon nodes
more) is deployed the errors in distance estimations are modeled as (e.g., three or more) is deployed with the
normal random variables. When an unknown unknown nodes. Then each node estimates its dis-
with the unknown node receives a packet from a reference node, it tance to the beacon nodes in a multihop way.
nodes. Then, each can be in any place around the reference node
with equal probabilities. When another packet is
Once these distances are estimated, the nodes can
compute their positions using trilateration. Three
node estimates its received from another reference node, the methods of hop-by-hop distance propagation are
unknown node computes its position again as proposed: Dv-Hop, Dv-Distance, and Euclidean.
distance to the depicted in Fig. 3g. When new position informa- In Dv-Hop APS the beacon nodes start the
tion is received from other nodes, it becomes propagation of their position information (Fig.
beacon nodes in a possible to identify the probable location of the 4a). Working as an extension of the distance vec-
unknown node, as depicted in Fig. 3h. tor algorithm, all nodes receive the position infor-
multihop way. Once The main drawbacks of this approach are the mation of all beacon nodes as well as the number
these distances are high computational cost and the space required
to store the information.
of hops to these beacons. When a beacon node
receives the position information of the other
estimated, the nodes COMMENTS ABOUT POSITION COMPUTATION
beacon nodes, it has enough information to com-
pute the average size of one hop based on its own
can compute their A number of other methods exist that aim to com- position, the position of the other beacon nodes,
pute the position of a node. Location fingerprint- and the number of hops between them (Fig. 4b).
positions using ing is a method in which the signal characteristics This last value is then flooded in a controlled way
obtained from a set of locations are catalogued, into the network as a correction factor. When an
trilateration. and the position computation of a node consists of unknown node receives a correction, it is able to
comparing its current signal characteristics with convert its distance to the beacon nodes from
those catalogued previously. This technique is number of hops to meters (Fig. 4c). The complex-
used by Bahl et al. [13] and other indoor localiza- ity of message exchange in this algorithm is driven
tion systems, but the need to generate a signal sig- by the total number of beacon and normal nodes,
nature database makes this technique unfeasible which is O(n*(m + 1)), where n is the number of
for most scenarios of WSNs. He et al., in the nodes and m is the number of beacon nodes.
APIT algorithm [4], use triangles formed by three An advantage of the APS is that its localiza-
beacon nodes, and a node decides if it is inside or tion algorithm requires a low number of beacon
outside these triangles by comparing its signal nodes in order to work. However, the way dis-
strength measurements with the measurements of tances are propagated, especially in Dv-Hop and
its neighbors. The position of the node is comput- Dv-Distance, as well as the way these distances
ed by finding the centroid of the intersection of are converted from hops to meters in Dv-Hop,
the beacon triangles the node is within. result in erroneous position computation, which
Other work concentrates all information increases the final localization error of the system.
about distances between the nodes into a central
node and uses mathematical optimization tech- RECURSIVE POSITION ESTIMATION
niques to compute the positions of the nodes. As In RPE [16] nodes estimate their positions based
an example, we have the work of Doherty et al. on a set of initial beacon nodes (e.g., 5 percent
[14] who formulate the localization problem as a of the nodes) using only local information. Local-
convex optimization problem based only on con- ization information increases iteratively as newly
nectivity-induced constraints and use a semidefi- settled nodes become reference nodes.
nite program (SDP) to solve the problem. There The RPE algorithm can be divided into four
is also the work of Shang et al. [15], who used phases, as depicted in Fig. 5. In the first phase a
multidimensional scale (MDS). node determines its reference nodes. In the sec-
ond phase the node estimates its distance to
LOCALIZATION ALGORITHM these reference nodes using, for example, RSSI.
In the third phase the node computes its posi-
The localization algorithm is the main compo- tion using trilateration (becoming a settled
nent of a localization system. This component node). In the final phase the node becomes a
determines how the information concerning dis- reference node by broadcasting its newly esti-
tances and positions is manipulated in order to mated position to its neighbors. When a node
allow most or all of the nodes of a WSN to esti- becomes a reference, it can assist other nodes in
mate their positions. computing their positions as well.
Localization algorithms can be classified into An advantage of this algorithm is that the
a few categories: distributed [6, 16, 17] or cen- number of reference nodes increases quickly, in
tralized position computation [14]; with [16, 17] such a way that the majority of the nodes can
or without an infrastructure [6, 7, 18]; relative compute their position. But this technique has the
[19, 20] or absolute positioning [6, 16]; designed disadvantage of propagating localization errors.
for indoor [7, 18] or outdoor scenarios [6]; and This means that the inaccurate position estimation
one hop [6, 18] or multihop [16, 17]. of one node can be used by other nodes to esti-
Here some proposed localization algorithms mate their positions, increasing this inaccuracy.
are discussed to show how this component dif- Furthermore, a node must have at least three ref-
ferentiates from the other components. These erence neighbors in order to compute its position.
2 ho
m ps, 5
4m
s , 68
hop 0m
3 4 hops, 11
AvgHop = 27.3 m
AvgHop = 25.4 m
(c)
Beacon node Unknown node
Settled node