Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

747 sensor network operation-1-187-6

.pdf
Скачиваний:
2
Добавлен:
13.12.2023
Размер:
202.41 Кб
Скачать

48 SENSOR DEPLOYMENT, SELF-ORGANIZATION, AND LOCALIZATION

r

S A

B

C

D

G F E

Figure 2.31 Broadcast initialized by node A collects 34 pairwise distances.

extra 24 pairwise distances, while the flooding in Figure 2.31 only collects extra 6 pairwise distances.

2.3.7 Simulations

We simulated our proposed distributed and centralized positioning methods with 2 ns. In order to exam the performance of our distributed positioning method, different sensor deployment strategies are considered to model anisotropic network topology and complex terrain. The first strategies is that 400 nodes are randomly placed in a square region, and the average node connection degree is 8.5. The second strategies is that 400 nodes are randomly placed in the T -shaped region as in Figure 2.19. The average node connection degree is 7.4. The third strategy is that 400 nodes are randomly placed in a square region, and the region is equally divided into four nonoverlapped square regions. Sensors have different hop distances. The average connection degrees in different small square regions are 6.2, 7.4, 8.9, and 13.4. All of above numbers are determined by randomly generated data sets. We also consider the errors of neighboring sensor distance estimation with RSSI. The measurement error is in the range 0 to 50% of the average hop distance, uniformly distributed.

We measure the performance of the algorithm with mean error, which has been widely used in previous research works:

 

 

n

 

xesti xreali 2

 

Error =

(n

i =m+1

(2.8)

m)

×

(radio

range)

 

 

 

 

 

 

where n and m are the total number of sensors and the number of anchors, respectively. A low error means good performance of the method.

Considering the limited pages, we only present some of our results. Figures 2.32, 2.33, and 2.34 are the experimental results with distributed method. Simulation results show that our distributed sensor positioning method outperforms previous research methods. The similarity of the performance in Figures 2.33 and 2.34 indicates that our algorithm is robust in position estimation under different network topologies and terrain conditions. We also

 

0.7

 

 

 

 

 

 

.00

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

.05

 

0.6

 

 

 

 

 

 

.25

 

 

 

 

 

 

 

.50

 

 

 

 

 

 

 

 

 

0.5

 

 

 

 

 

 

 

error

0.4

 

 

 

 

 

 

 

Location

0.3

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

0.2

 

 

 

 

 

 

 

 

0.1

 

 

 

 

 

 

 

 

0

0.05

0.1

0.15

0.2

0.25

0.3

0.35

 

0

Anchor ratio

Figure 2.32

Location error

Errors when applying the distributed method to sensors in square region.

0.7

 

.00

 

.05

0.6

.25

.50

 

0.5

0.4

0.3

0.2

0.1

0

0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 Anchor ratio

Figure 2.33 Errors when applying the distributed method to sensors in T sharp region.

 

0.7

 

 

 

 

 

 

.00

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

.05

 

0.6

 

 

 

 

 

 

.25

 

 

 

 

 

 

 

.50

 

0.5

 

 

 

 

 

 

 

error

0.4

 

 

 

 

 

 

 

Location

0.3

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

0.2

 

 

 

 

 

 

 

 

0.1

 

 

 

 

 

 

 

 

0 0

0.05

0.1

0.15

0.2

0.25

0.3

0.35

 

 

 

 

Anchor ratio

 

 

 

Figure 2.34 Errors when applying the distributed method to sensors in a region with different signal attenuation factors.

50 SENSOR DEPLOYMENT, SELF-ORGANIZATION, AND LOCALIZATION

 

9

 

 

 

 

 

 

 

.00

 

 

 

 

 

 

 

 

 

 

8

 

 

 

 

 

 

 

.05

 

 

 

 

 

 

 

 

.25

 

 

 

 

 

 

 

 

 

.50

 

7

 

 

 

 

 

 

 

 

error

6

 

 

 

 

 

 

 

 

5

 

 

 

 

 

 

 

 

Location

 

 

 

 

 

 

 

 

4

 

 

 

 

 

 

 

 

3

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

2

 

 

 

 

 

 

 

 

 

1

 

 

 

 

 

 

 

 

 

0

 

 

 

 

 

 

 

 

 

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

Percentage of pairwise distances collected

Figure 2.35 Errors when varying the percentage of collected pairwise distances.

use the centralized MDS positioning method to estimate randomly deployed sensor nodes on a square area, in which the available pairwise distances are varying. The experimental results are presented in Figure 2.35. The results indicate that more pairwise distances will bring better performance of our algorithm. In order to demonstrate the scheme we proposed for source nodes selection, we compare the number of collected pairwise distances based on random source nodes selection and our selection scheme. The results are shown in Figure 2.36 and indicates that our source nodes selection scheme is efficient in pairwise distance collection.

Figure 2.36 for flooding.

 

0.35

 

 

 

 

 

Our selection principle

distances

 

 

 

 

 

 

 

 

 

 

 

 

Random selection

 

0.3

 

 

 

 

 

 

 

 

 

0.25

 

 

 

 

 

 

 

 

 

pairwise

 

 

 

 

 

 

 

 

 

0.2

 

 

 

 

 

 

 

 

 

of collected

 

 

 

 

 

 

 

 

 

0.15

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Percentage

0.1

 

 

 

 

 

 

 

 

 

0.05

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

0

 

 

 

 

 

 

 

 

 

 

1

2

3

4

5

6

7

8

9

10

Number of source nodes

Percentage of collected pairwise distances when increasing the number of source nodes

2.4 TRIGONOMETRIC K CLUSTERING (TKC) FOR CENSORED DISTANCE ESTIMATION

51

2.3.8 Conclusion and Future Work

We address shortcomings, which are caused by anisotropic network topology and complex terrain, of existing sensor positioning methods. Then, we explore the idea of using multidimensional scaling (MDS) technique to compute relative positions of sensors in a wireless sensor network. A distributed sensor positioning method based on MDS is proposed to get the accurate position estimation and reduce error cumulation. The method works in the manner of estimation–comparison–correction. Comparing with other positioning methods, with very few anchors, our approach can accurately estimate the sensors’ positions in networks with anisotropic topology and complex terrain as well as eliminate measurement error cumulation. We also study the position estimation based on MDS in a centralized paradigm. Experimental results indicate that our distributed method for sensor position estimation is very effective and efficient.

However, we did not analyze the communication costs during the operation of our methods yet. We are doing experiments related to message complexity and power consumption. Results will be reported very soon. We would also like to investigate the positioning problem for mobile sensors in wireless ad hoc sensor networks.

2.4 TRIGONOMETRIC K CLUSTERING (TKC) FOR CENSORED DISTANCE ESTIMATION

Duke Lee, Pravin Varaiya, and Raja Sengupta

The location estimation or localization problem in wireless sensor networks is to locate the sensor nodes based on ranging devices measurements of the distances between node pairs. These ranging measurements typically become unreliable when the distance is large; we say that such distances are censored. The section compares several approaches for estimating censored distances with a strategy proposed here called trigonometric k clustering, or TKC.

2.4.1 Background Information

Recent advances in microelectronic and mechanical structures (MEMS) sensors and lowpower radios have inspired proposals to deploy wireless sensor networks for monitoring a spatially distributed physical process such as the environment in a building or the traffic on a highway. In these applications, the network comprises a set of nodes, each consisting of one or more sensors, a processor, and a radio. The sensor measurements are locally processed and forwarded to a central place. To understand the received data, it is necessary to associate the measurements from each node with its physical location.

A significant literature is devoted to localization in wireless sensor networks. Bulusu et al. proposed localization using a grid of landmarks [52]. Niculescu and Nath [53, 54] introduced distributive censored distance estimation with an information exchange strategy similar to the distant vector routing algorithm. Doherty et al. [51] developed localization based on convex optimization. Simic and Sastry [55] devised a simple, distributive method for localization by restricting the connectivity area to a rectangular box. Savvides et al. [56], Savarese and Langendoen [57], and Whitehouse [58] among others called for

52 SENSOR DEPLOYMENT, SELF-ORGANIZATION, AND LOCALIZATION

iterative refinement of position estimates using gradient descent algorithms. Nguyen and Sinopoli [59] proposed the use learning theory to cope with noisy observations.

In some situations the locations of the nodes may not be known or may be too costly to determine manually. However, the nodes may have ranging devices used to measure the distances between node pairs. One common way is to use the strength of a signal received by a node to estimate its distance from the transmitter. Another way is to measure the sound wave’s time of flight to infer the distance between transceivers by transmitting ultrasonic wave.

However, measurements from these ranging devices are unreliable when the distance between transmitting and receiving nodes is large. We then say that the distance is censored. In these cases, indirectly estimating the censored distance is a better option. For example, if there are three nodes, A, B, and C, and the distances between A and B and between B and C are not censored but the distance between A and C is censored, it may be better to estimate the latter as the sum of the two previous distances.

This section focuses on algorithms for censored distance estimation, also called multihop distance estimation. These algorithms estimate censored distances using distance measurements of neighboring node pairs. Three algorithms, DV-hop, DV-distance, and Euclidean method, are discussed in [54]. We expand on the discussion of censored distance estimation and introduce new concepts based on trigonometric constraints. In particular, we introduce a new algorithm, called trigonometric k clustering, or TKC. Furthermore, we will compare the performance of various censored distance estimation algorithms using data from a testbed that uses Berkeley Motes [60] and generated using both radio signal strength and ultrasonic wave flight time.

System Model and Notations An anchor node, or an anchor, can measure its position reliably. A floating node is a nonanchor node. We estimate location of target nodes in M- dimensional physical space, Y; V is the set of all nodes; and A is the set of all anchors. The position of node i is p(i ) Y; its measurement is p˜(i ); and the measurement error is

e(i ) = p˜

˜

(i ) − p(i ). The distance between i and j is d(i, j ); its measurement is d(i, j ); and

= ˜

its measurement error is e(i, j ) d(i, j ) d(i, j ). The neighbors of node i, N (i ), is the set of all nodes when the distance from i can be measured reliably. The distance between node i and j is censored if the distance cannot be measured reliably. The following summarizes the notation for the measurements.

p˜i

=

pi + ei

 

 

i A

 

NULL

 

 

otherwise

d˜(i, j )

=

d(i, j )

+

e(i, j )

j Ni

 

NULL

 

 

otherwise

dˆ(i, j )

=

p˜i p˜ j

 

i, j A

 

NULL

 

 

 

otherwise

 

 

 

 

 

 

˜

where δ(i, j ) is a distance estimate of d(i, j ) obtained from measurements {d(i, j )|i, j V }

{ ˆ | } =

and d(i, j ) i, j A . We assume that δ(i, j ) δ( j, i ), i, j V . The network topology is the graph (V , E) where E is the set of distance estimations between nodes labeled by δ(i, j ): An edge exists between node i and node j if δ(i, j ) =NULL.

2.4 TRIGONOMETRIC K CLUSTERING (TKC) FOR CENSORED DISTANCE ESTIMATION

53

2.4.2 Distance Measurements

Ranging technologies are ways of measuring the distance between a pair of nodes. We investigate four popular ranging technologies—network connectivity, radio signal strength, RF time of flight, and acoustic time of flight; these differ in their range, accuracy, directionality, and response to obstacles. We conclude this section with a strategy to combine various measurements.

Network Connectivity Network connectivity can be used to approximate the distance between a pair of nodes. For instance, the range of an omnidirectional communication device can be simplified as a circle centered at the device with radius RANGE; this yields,

d(i, j )

≤ RANGE

if(i, j ) E

 

> RANGE

otherwise

Network connectivity information can be readily obtained from on-board radios. However, modeling range accurately is difficult due to obstacles and atmospheric conditions. In fact, the range can be quite irregular in shape as shown in [58]. Second, the range may be too coarse for reliable distance estimation—an IEEE 802.11 radio, for example, can communicate over 1-km distance in an open area; in this case, the connectivity information is ineffective for finer-grained localization.

Signal Strength A receiver can estimate its distance from a transmitter by measuring the signal attenuation. Similar to the network connectivity-based solutions, on-board RFbased communication devices can be readily used. However, inaccuracies can result from unpredictable power attenuation due to multipath, interference, fading, and shadowing. This is seen in Figure 2.37, a log–log plot of received signal strength between a pair of Cisco IEEE 802.11b wireless cards with respect to the distance between the cards. The measurements were taken from a slow-moving vehicle with respect to a fixed transmitter in an open area at the UC Berkeley Richmond Field Station. Furthermore, the direction and altitude of the antenna can affect signal strength greatly. According to [56], raising the antenna 1.5 m above ground can increase the radio transmission range from 20 to 100 m.

RF Time of Flight The Global Positioning System (GPS) [61], a widely available technology for localization, uses RF time difference of arrival from four GPS satellites synchronized with atomic clocks. GPS technology is scalable and has a resolution of 2 to 3 m with an error of up to 10 to 20 m. However, there are three main concerns when using GPS technology in wireless sensor networks. First, each GPS receiver needs line-of-sight connections to at least four GPS satellites. Thus localization solutions solely based on GPS readings may not work well indoors or near tall buildings. Second, each receiver needs an accurate clock—an inaccuracy of 1 Ms corresponds to a 300-m error. Third, GPS receivers are still too costly for many sensor network applications and consume a great deal of power. A typical GPS receiver costs around $100 and consumes power in the order of watts [52].

However, with single-chip GPS solutions, such as [62], cost and power consumption are expected to decrease dramatically. Furthermore, if the mobility of sensors is limited, sensors can further reduce the impact of the high-energy consumption by running localization algorithms sparingly. This leads us to believe that the GPS solution can be viable in the

54 SENSOR DEPLOYMENT, SELF-ORGANIZATION, AND LOCALIZATION

Figure 2.37 Signal-strength-based ranging.

future for outdoor sensor network applications with moderate accuracy requirement for position estimation.

Acoustic Time of Flight Ranging technologies using acoustic time of flight is used in MIT’s Cricket [42], ActiveBat [63], UCLA’s AHLoS [56, 64], and UC Berkeley’s Motes [58]. This technology is robust against fluctuating received signal strength. Savvides et al. [56] observed error less than 2 cm up to a range of 3 m. Data collected by Whitehouse [65] also showed reliability of the measurement—less than a 10-cm error up to the distance of 5 m in the best case. The error varied somewhat between calibration locations and measurement locations (Section 2.4.5). However, compared to RF technologies, acoustic time-of-flight technologies are more susceptible to atmospheric conditions, shorter in range, higher in reflection coefficients, and less able to penetrate into solid objects such as walls.

Furthermore, acoustic time-of-flight technology needs time synchronization between transceivers. Because a global time synchronization is difficult to achieve, most wireless sensor network systems including [42], [63], [56], and [58] use an RF signal as a time synchronizing signal. A transmitter sends an RF signal and an acoustic signal at the same time; and a receiver measures the time difference of arrival of the two signals. For this to work, the algorithm must correctly identify which acoustic signal corresponds to which RF signal.

Calibration Calibration is one major challenge of ranging in wireless sensor networks. As mentioned in [66], an uncalibrated wireless communication radio can transmit twice the power of another radio. In addition, the characteristics of acoustic and RF signals vary

2.4 TRIGONOMETRIC K CLUSTERING (TKC) FOR CENSORED DISTANCE ESTIMATION

55

significantly depending on the terrain. As noted earlier, raising the antenna 1.5 m above ground can increase the radio transmission range from 20 to 100 m.

Furthermore, the cost of each wireless sensor must be kept at a minimum; and in many applications on-site calibration is difficult due to the inaccessibility of the terrain. One approach is to predict the calibration coefficient from simulated settings. Whitehouse [58] advocates calibration of transmission and reception gains for each transceiver by linear regression using all transmission and reception information.

Distance Estimation According to the model in Section 2.4.1, we have up to three mea-

ˆ

˜

˜

 

 

 

surements for d(i, j ) : d(i, j ), d(i, j ), and d( j, i ). If the joint probability density function

f is known, the maximum-likelihood estimate of δ(i, j ) of d(i, j ) is

 

 

max

ˆ

˜

˜

(2.9)

δ(i, j ) = arg d(i, j )

f [d(i,

j ), d(i, j ), d( j, i )|d(i, j )]

Suppose that e(i ), e(i, j ), and e( j, i ) are independent Gaussian random variables, that

= = = ˆ

is, e(i ) N (0, σp ), e(i, j ) N (0, σdi j ), and e( j, i ) N (0, σd ji ). Then VAR[d(i, j )] is

 

 

 

 

 

ˆ

 

 

 

 

 

 

 

 

VAR[e(i )] + VAR[e j ]. Thus, d(i, j ) = N [d(i, j ), 2σp ]. The maximum-likelihood estimate

for d(i, j ) is δ(i, j ) such that

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

ˆ

˜

˜

 

 

 

 

 

 

∂δ(i, j ) ln f (d(i, j ), d(i, j ), d( j, i )|δ(i, j )) = 0

 

 

This reduces to

 

 

 

 

 

 

 

 

 

 

 

 

ˆ

 

 

j )

 

˜

 

 

 

˜

 

 

 

d(i, j ) − δ(i,

+

d(i, j ) − δ(i, j )

+

 

d( j, i ) − δ(i, j )

=

0

2σp

 

 

σd ji

 

 

 

σdi j

 

 

And we get an explicit expression for δ(i, j ):

 

 

 

 

 

 

 

 

 

 

 

ˆ

 

 

˜

 

˜

 

 

 

δ(i, j )

=

σdi j σd ji d(i, j ) + 2σp σd ji d(i

, j ) + 2σp σdi j d( j, i )

 

 

 

 

 

 

σdi j σd ji + 2σp σdi j + 2σp σd ji

 

 

2.4.3 Censored Distance Estimation

A ranging device for localization is useful within a limited range. Distance estimates outside this range are censored. The following example demonstrates the importance of censored distance estimation. Suppose the (i, j )th element of matrix (2.10) is the estimated distance between nodes i and j , 1 ≤ i, j ≤ 4. The censored distances are marked NULL in the matrix. If we ignore the knowledge that δ(1, 2) is censored, it would be impossible to distinguish between the two configurations of Figure 2.38 using the distance estimates (2.10):

 

 

0NULL δ(1, 3) δ(1, 4)

 

NULL

0

δ(2, 3)

δ(2, 4)

 

(2.10)

 

δ(3, 1)

δ(3, 2)

0

δ(3, 4)

 

 

 

 

 

δ(4, 1)

δ(4, 2)

δ(4, 3)

0

 

56 SENSOR DEPLOYMENT, SELF-ORGANIZATION, AND LOCALIZATION

3

 

3

 

d(1,3)

 

 

 

d(3,2)

 

 

d(3,2)

1

d(3,4)

d(1,3)

 

d(3,4)

 

2

 

d(4,2)

2

d(1,4)

 

 

 

 

 

d(4,2)

 

d(1,4)

1

4

4

Figure 2.38 Two acceptable configurations specified by (2.10).

Simple Substitution Method A censored distance between a pair of nodes can be replaced by a value based on prior knowledge about topology and ranging technologies. We call this the simple substitution method. For instance, we can replace censored distances with an average of {d(i, j )|d(i, j ) > RANGE}. Suppose δ(i, j ) = [({d(i, j )|d(i, j ) > RANGE}] and δ(i, j ) < d(1, 2). We estimate location of nodes in two-dimensional physical space (M = 2). If all measurements are accurate, node placements that satisfies the censored distance estimate δ(i, j ) and (2.10) requires a three-dimensional space as in Figure 2.39. Projecting this three-dimensional placement onto the two-dimensional physical space reduces estimated distances between nodes: In the figure, node 1 is projected closer to node 3 and node 4 than indicated by δ(1, 3) and δ(1, 4), respectively. One can do better by incorporating more observations from neighboring nodes, as we discuss next.

Shortest-Hop Method In a network with evenly distributed nodes, the shortest-hop count in (V , E) multiplied by an estimated hop length can effectively estimate the distance between nodes. One challenge is to restrict the connectivity to achieve a good resolution while maintaining a set of core neighbors. To see the reason for restricting connectivity, consider a fully connected network. In that network, connectivity information is ineffective in discriminating between nearby nodes from far-away nodes. Another challenge is to estimate the average hop length. DV-hop [53] is a distributed algorithm, wherein anchors

d(1,3)

 

 

3

r

d(3,2)

1

d(1,4)

 

d(3,4)

2

d(4,2)

4

Figure 2.39 Inaccuracies in simple substitution.

2.4 TRIGONOMETRIC K CLUSTERING (TKC) FOR CENSORED DISTANCE ESTIMATION

57

 

3

 

d(1,3)

d(3,2)

 

1

2

 

d(1,4)

d(4,2)

 

4

Figure 2.40 Preference of negative error for shortest-path algorithm.

estimate the hop length by averaging hop length to other anchors; and nodes obtain average hop length from their nearest anchor.

Shortest-Path Method For dense networks with relatively accurate ranging devices, the shortest-path length [along the graph (V , E)] between any two nodes can be used to approximate the distance between them. Because the shortest path length is greater than or equal to the straight-line distance between them, there is a tendency for the shortestpath method to overestimate the distance. However, this tendency is partly balanced by the algorithm’s tendency toward negative error when minimizing over various paths. To illustrate, the shortest path estimate of d(1, 2) in Figure 2.40 is

δ(1, 2)

=

δ(1, 3)

+ δ(3, 2)

if δ(1, 3) + δ(3, 2) < δ(1, 4) + δ(4, 2)

 

δ(1, 4)

+ δ(4, 2)

otherwise

If δ(1, 3), δ(3, 2), δ(1, 4), and δ(4, 2) are unbiased, the shortest-path algorithm tends to underestimate path lengths because it always picks the shorter of the two equal-length paths.

Lemma 2.4.1 If δ(i, j ) is an unbiased estimate of d(i, j ) for all i, j V , the expected value of the output of the shortest-path algorithm is less than or equal to the shortest-path length.

PROOF

We

denote 2pk = [k1, k2, . . . , kMk ]

to be

kth path between two fixed

nodes. Since

min : R R is a

concave

function, Jensen’s inequality implies

E{mink [

l δ(kl , kl+1)]} ≤ mink {E[

l δ(kl , kl+1)]}. But

since E[δ(i, j )] = d(i, j ), we

have E{mink [

l δ(kl , kl+1)]} ≤ mink [

l d(kl , kl+1)].

 

 

 

 

2.4.4 Trigonometric Censored Distance Estimation

We discuss strategies to estimate censored distances using trigonometric constraints from two adjoining triangles. We focus on techniques on two-dimensional physical space. As shown in Figure 2.38, δ(1, 3), δ(1, 4), δ(3, 2), δ(4, 2), and δ(3, 4) in (2.10) form two adjoining triangles (δ(3, 2), δ(4, 2), δ(3, 4)) and (δ(3, 4), δ(1, 3), δ(1, 4)). Using the law of cosine, δ(1, 2) can be identified up to the ambiguity shown in the figure. This trigonometric constraint of two adjoining triangles is the basis for the trigonometric censored distance