Professional Documents
Culture Documents
Networks
Introduction
Various techniques have evolved over the years, such that sensor nodes can
learn their location automatically.
Scale
Recognition
Cost
Limitations
Using
information
approaches)
about
nodes
neighborhood
(proximity-based
E.g.: Easy to determine location in a room with infrared room number announcements
Using elementary geometry, the distance between two nodes or the angle in a triangle
can be estimated.
When distances between entities are used, the approach is called lateration; when
angles between nodes are used, one talks about angulation.
Received signal
indication (RSSI)
strength
Note: The Friis space equation above does not consider losses
Scene analysis
The RADAR system is one example that uses this approach to determine
positions in a building.
Multilateration
Use
(xu, yu) that minimize mean square error, i.e,
Ax = b,
The normal equation is that which minimizes the sum of the square
differences between the left and right sides:
Active Badge
Active office
RADAR
Cricket
Overlapping Connectivity
RADAR [7]
Both the anchors and the mobile device can be used to send the signal,
which is then measured by the counterpart device(s).
Cricket [8]
In the Active Badge and active office systems described above, the
infrastructure determines the device positions.
No RSSI, TDoA,
Idea 1: Count number of hops, assume length of one hop is known (DVHop)
Iterative multilateration
In many problems one is given a set of points on the plane and it is desired to
find some structure among the points in the form of edges connecting a
subset of the pairs of points.
Edge between nodes u and v if and only if there is no other node w that is
closer to either u or v
Formally:
But: Worst-case
spanning ratio is (|V|)
Gabriel Graph
Formally:
Algo. 1: (1) Compute the distance between all pairs of points d(pi , pj),
i, j
= 1, 2, ... n, i j.
(2) For each pair of points (pi , pj) compute = max {d(pk, pi),
d(pk, pj)} for k = 1, 2, ... n, k i, k j.
(3) For each pair of points (pi, pj) search for a value of that is
smaller than d(pi, pj). If such a point is not found, an edge is
formed between pi and pj.
the
(3) For each pair of points (pi, pj), associated with an edge of
DT, compute = max {d(pk, pi), d(pk, pj)} for k = 1, 2, ... n,
k i, k j.
(4) Same as step 3 of algorithm 1, with edges of DT only.
The RNG tessellates the plane into polygonal shapes called as faces.
If every node is aware of its own location and of all its neighbors in the
faces by using global positioning system (GPS) or other techniques
(already discussed), then, this can be exploited in tracking mobile
targets.
So, for tracking a mobile target, the idea is to use as minimum no. of
sensors as possible.
TTMB Introduction
The tracker queries the sensor network to follow a target, monitor works
on the request of tracker.
Planarization model
Node v1 has only 3 neighbor nodes v2, v3, and v5, but with respect
to the target position, v1 has 2 neighbor nodes, v5 and v2 in F2,
called immediate neighbors.
Typically, in different node states, Pj > Pi, td,i > td,j and
tu,i > tu,j for any i > j, and P = P0 Pk and P = P0+Pk.
When the node changes state from s0 to, say, sk. The
energy savings, Es,k, because of state transition given by
the difference in the face and sleep thresholds Tth,k
corresponding to the states sk are computed as follows:
This achieves two major objectives: high QoT and high energy efficiency of
the WSN.
Basic terms like: target, tracker etc. remains unchanged here, also
assumptions are similar about RNG and query etc.
This protocol consists of seven algorithms, which are used for face prediction
for localization of target. The outputs from one algo. Serves as some input
for the other.
Here also, all nodes are aware of their geographic location, and a RNG is
constructed at the initial step.
As
T wishes, it issues a message to the WSN to assist to track t.
Suppose that vi is any node of the WSN that can detect t as t appears in the vicinity
of vi, e.g., v1. Based on a detection probability (Pd), v1 becomes the monitor.
Then, v1 starts finding face Fi on which t appears. v1 further updates the information
about faces. It corresponds to three adjacent faces, namely, F1, F2, and F18.
F1 and F18 are called neighboring faces. The nodes in the three adjacent faces in
G are(v1, v3, v4, v5), (v1, v5, v6, v7, v2), and (v1, v2, v3).
v1 has only three direct neighboring nodes v2, v3, and v5, but here we only consider
the neighboring nodes with respect to ts location in F2. Thus, the nodes v5, v6, v7,
and v2 in F2, are called v1s face neighbors.
v5 and v2 in F2, are called v1s immediate neighbors. The rest of v1s neighboring
nodes, v6 and v7, are called distant neighbors.
One immediate neighbor (e.g., v2) becomes the backup, as the combined detection
probability, denoted by , between the monitor and the immediate neighbor is the
best.
Measure Si;
if t is found then
Compute Pd;
end for
is
Each
node that already detected t makes a decision on t: in which specific face t is currently
moving and then localize t inside the face for the first time face detection.
Algorithm 2:
Step 1. Node vi, e.g., v1, detects t by using Pd at time instant h somewhere in the WSN.
Similarly, some neighboring nodes, e.g., v5, v3, v4, v6, and so on, of v1 might be able to detect t
at h and have Pd to some extents.
Step 2. v1 first interacts with its adjacent neighbors by issuing a request, containing the
information that t is in the range. The information includes Pd and d(,). There are three adjacent
neighbors of v1: v5, v2, and v3.
Step 3. After receiving the request messages from all of its neighbors (including the adjacent
ones), node vi compares its Pd with another node vj that are paired up with it, e.g., v1<->v2;
v1<->v3; v1<->v5.
Step 4. Among all the neighbors, v5 or v2 has the second best detection probability that are the
immediate neighbors. v3 may have the lower detection probability than that of v5 or v2. Thus, t
should be inside F2, instead of in F18 or in F11. To know the pair of the nodes, which have the
best detection probability, we consider a combine detection probability () of each pair.
Finally, three conditions for any pair of nodes such as v1 and v5 are set, to
be the monitor and backup: (i) should be higher than other pairs of nodes;
(ii) they should be the adjacent and also be the immediate neighbors; (iii)
they should be in the same face Fi, e.g., F2.
Note that the above steps are used for face Fi detection at the first time. ts
tracking can be easier in the WSN afterward, as another two nodes of F2
(e.g., v1 and v5) compute ts movements and face prediction when t moves
from Fi to Fj.
Fig.(a)
Fig.(b)
Here,
based
on
the
movement
sequence, the monitor and backup
compute a probability of direction,
denoted by p, where p is given by:
References
1.
J. Hightower and G. Borriello. A Survey and Taxonomy of Location Systems for Ubiquitous
Computing. Technical Report UW-CSE 01-08-03, University of Washington, Computer
Science and Engineering, Seattle, WA, August 2001.
2.
3.
4.
5.
A. Harter and A. Hopper. A Distributed Location System for the Active Office. IEEE
Network, 8(1): 6270, January 1994.
6.
A. Ward, A. Jones, and A. Hopper. A New Location Technique for the Active Office. IEEE
Personal Communications, 4(5): 4247, 1997.
7.
network
localization
References
8.
9.
10.
N. Bulusu, J. Heidemann, and D. Estrin, GPS-Less Low Cost Outdoor Localization For
Very Small Devices, IEEE Personal Communications Magazine, 7(5): 2834, 2000.
11.
12.
M. Z. A. Bhuiyan, G. Wang, and J. Wu, Target tracking with monitor and backup
sensors in wireless sensor networks, in Proc. IEEE 18th Int. Conf. Comput. Commun.
Netw., pp. 16, 2009.
13.
ANY QUERIES?
THANK YOU!