Chapter 6.4

Wireless Body Area Networks

Paolo Barsocchi and Francesco Potortì,    ISTI-CNR, Pisa, Italy

This chapter highlights the importance of localization in relation to on-body area networks and gives a broad overview of localization methods and technologies. Most of the material is relative to indoor localization, because that is where body-area networks are mostly relevant. The chapter provides an overview on criteria used to evaluate the performance of localization systems, followed by an overview of technologies used for different types of sensors and general ways to fuse data generated by sensors. Since we envision a future where the presence of small devices communicating via packet radio is ubiquitous in most indoor and some outdoor environments, the rest of the chapter concentrates on methods and algorithms used in the context of wearable radios, most of which are based on the RSS (received signal strength) indicator available on packet radio devices.

Keywords

Evaluation of localization systems; fingerprinting; Fisher information; multilateration; packet radio localization; pedestrian dead reckoning (PDR); range-based localization; range-free localization; received signal strength (RSS) indicator; simultaneous localization and mapping (SLAM)

1 Introduction

Localization of devices and people has been recognized as one of the main building blocks of context aware systems [14], which have one of their main application fields in ambient assisted living (AAL). Indeed, the user position can be used for detecting user activities, activating devices, opening doors, etc. While in outdoor scenarios GNSS (global navigation satellite systems) constitute a reliable and easily available technology, in indoor scenarios GNSS is largely unavailable.

The indoor environment lacks a system that possesses the excellent performance parameters of outdoor GNSS in terms of global coverage, high accuracy, short latency, high availability, high integrity, and low user costs. Like indoor settings, certain outdoor environments are not well covered by GNSS due to insufficient views to the open sky.

Therefore, the indoor localization problem is solved by means of ad hoc solutions, among which one of the most promising is based on wearable technologies. Improvements in indoor positioning performance have the potential to create opportunities for businesses. However, system performances differ greatly, because the environments have a number of substantial dissimilarities. Indoor environments are particularly challenging for localization systems for several reasons:

• Severe multi-path from signal reflection from walls and furniture

• Non-line-of-sight (NLoS) conditions

• High attenuation and signal scattering due to high density of obstacles

• Fast temporal changes due to the presence of people and opening of doors

• High demand for precision and accuracy

On the other hand, indoor settings facilitate positioning and navigation in many ways:

• Small coverage areas

• Small weather influences such as small temperature gradients

• Fixed geometric constraints from planar surfaces and orthogonality of walls

• Infrastructure such as electricity, Internet access, walls suitable for target mounting

• Low dynamics due to slow walking and driving speeds

Indoor localization systems can be classified based on the signal types and/or technologies (infrared, ultrasound, ultra-wideband, RFID, packet radio), signal metrics (AOA – angle of arrival, TOA – time of arrival, TDOA – time difference of arrival, and RSS – received signal strength) and the metric processing methods (range-based and range-free algorithms) [5]. Each solution has advantages and shortcomings, which, in most cases, can be summarized in a trade-off between several metrics (such as accuracy, installation complexity, etc.).

In the following we will discuss which metrics are important for evaluating indoor localization systems, the technologies, and the main localization algorithms (namely, range-free and range-based algorithms).

2 Evaluation Metrics

In order to evaluate the localization systems a set of criteria weighted according to their relevance and importance for a given applications must be defined. The combination of different metrics makes it possible to evaluate the overall performance of a localization system.

EvAAL (Evaluating AAL Systems through Competitive Benchmarking) [6] is an ongoing effort toward establishing benchmarks and evaluation metrics for comparing ambient-assisted living solutions. Each year one or more international competitions are organized, with the long-term goal of evaluating complete AAL systems. In the last three years an international competition on indoor localization has been organized and five metrics identified.

Two of them are objectively measurable (hard) quantities, namely accuracy and availability. Accuracy is the classical measurement of the goodness of a localization system, based on samples of the distance between the point where the system locates the user and the point where the user really is (error distance). The error series should be reduced to a scalar score, and the literature is rich in methods to reach this result. Of the 195 papers of the first edition of the Indoor Positioning and Indoor Navigation (IPIN, 2010) conference, 115 works describe real or simulated systems that are amenable to being evaluated by measuring some kind of metrics. The metrics taken into account in these works are visual path comparison, usually as a graph that shows the real and the estimated path (32% of cases), mean error (31%), cumulative distribution function CDF (20%), a quantile value (11%), and finally error variance (5%).

Availability is a measure of how well the system performs at providing regularly spaced measurements: this is especially significant for experimental or prototypal systems. In other words, the availability measures the capacity of the systems to produce fresh data continuously. As such, it is simply computed as the ratio between the number of received samples and the number of expected samples (one every half a second for the EvAAL competition).

Besides hard quantities, some soft ones need to be considered, namely installation complexity, user acceptance, and interoperability with AAL systems.

Installation complexity is a measure of effort required to install the AAL localization system in a home. It is measured as a function of the person minutes of work needed to complete the installation.

User acceptance expresses how much the localization system is invasive in the user’s daily life and thereby the impact perceived by the user. This parameter is estimated with a simple questionnaire (available on the EvAAL website) that considers aspects of usability like the presence and invasiveness of the tags, the visibility of the installation within the environment, and the complexity of maintenance procedures.

Interoperability measures how much the system is easy to integrate with other systems. This parameter depends on the scenario in which the localization system is evaluated, since localization can be exploited by other applications to offer advanced services. In EvAAL the interoperability is also measured with a questionnaire that takes into account aspects like the availability of APIs and documentation, the licensing scheme, the presence of testing tools, and the portability among different operating systems.

All these metrics must be taken into account to discuss the performance of an indoor localization system. The rationale behind the choice of these metrics is multi-faceted. First of all, the accuracy is the most important metric to assess the performance of a localization and tracking system. In general indoor applications do not need high precision, and giving accuracy too much importance diminishes the significance of the evaluation performance with respect to real-life systems. The availability is also an important metric because an unresponsive system can be as difficult to manage as an inaccurate one. Therefore, the weight to give to the hard metrics together should not be more than the weight of metrics related to interaction with the main stakeholders for a given system: system integrators, installers, and final users.

3 Technologies

Many different technologies are used for localization purposes. Most of them require the user to be localized to wear or carry some sort of device.

If the on-body devices need to communicate or otherwise respond to external (not on-body) devices we speak of on-body active systems. The external devices are typically part of some infrastructure that is deployed in the environment and which is able to track users. Being infrastructure-based, these systems can be arbitrarily powerful: they can interact with other systems in a variety of ways, they can provide user interfaces (e.g., a graphical web interface), and they can carry on sophisticated computations on data received from on-body devices.

If the on-body devices gather information from the environment and interpret it without the need to actively communicate anything or respond to some external device, we speak of on-body passive systems. The information gathered by the on-body system can be generated by some external devices for the purpose of allowing localization, or else can be opportunistically gathered from the environment and the body movements.

Last, we speak about device-free systems where no on-body device is necessary to achieve localization. In this case, as in the case of active systems, an external infrastructure senses the position and movements of the user.

Each of the above categories can use several different technologies, which are treated in the following sections. Currently, no single low-cost method is accurate or general enough to provide satisfactory performance. Practical systems need to fuse information created by more subsystems in order to obtain satisfactory performance at low cost. This topic is treated in the following section.

3.1 Wearable Active Transducers

Active transducers include those that respond to an external stimulus and those that autonomously generate some sort of beacon signal that is read and interpreted by external devices, which are generally part of an external (not on-body) infrastructure.

Three technologies are treated here: ultrasound capsules, RFID tags, and UWB (ultra-wide band). Of these, RFID are the least obtrusive, since the tags are very small and easily embeddable in clothes. Ultrasound suffers from the size of capsules, the power needed by the associated hardware, and the fact that the signal is blocked by the body itself. UWB systems are still immature and most require bulky equipment, but newer systems promise high precision with small, low-cost devices.

3.1.1 Ultrasound Systems

A number of different methods are available to exploit ultrasound systems. The most common one is to measure the time of flight (TOA, time of arrival) of pulses exchanged by fixed devices installed in the environment (on walls, ceilings, or furniture) and one or more devices carried by the user. The device carried by the user may be an emitter or a receiver. Time synchronization between emitter and receivers is achieved by the use of an ancillary radio channel. Choosing to put the receiver on the user increases the required computational power on the on-body device but addresses privacy concerns. A system using this method is iLoc [7].

Other methods do not require any radio connection, and exploit the difference between received times (TDOA).

3.1.2 RFID Tags

RFID is a technology that uses relatively bulky, high-powered readers and many tags that are very small and inexpensive. Tags are available in tiny cases that allow embedding in clothes or shoes. When the reader sends a radio signal, the tags send a signed radio response, uniquely identifying each tag. Tags can be active (battery operated) or passive (powerless); in the latter case they work by accumulating a tiny fraction of the energy emitted by the reader through a resonant circuit and use it to retransmit back their ID.

RFID systems with on-body tags are generally used as proximity sensors. A very rough estimate of the distance can be obtained by measuring the RSS (received signal strength) from the RFID tag, which is generally not enough to compute the user position. RFID systems with on-body tags are useful as elements of localization systems that fuse information coming from several subsystems.

More accurate positioning based on the various RSS methods discussed further in the chapter has been investigated. Many RFID tags can be installed in the environment, with the user carrying a reader, but as of today readers are too bulky to be considered on-body devices.

3.1.3 Ultra-Wide Band Systems

Devices are expected to appear on the market that follow the ToA positioning method standardized in IEEE 802.15.4a. Such devices would allow accurate trilateration techniques to be applied as long as the user carries a compliant device on-body.

3.2 Packet Radio Systems (Active and Passive)

Packet radio methods are the most flexible methods for active and passive localization. They are treated in greater detail in the next section. Technologies include proprietary systems and those based on the low-power Bluetooth (IEEE 802.15.1) and the ZigBee MAC (IEEE 802.15.4) standards.

Packet radio technologies are built for communications, not localization. Transmitters and receivers are not custom-built, but are standard communications nodes. As such, only methods based on received signal strength and in some cases time of flight are possible. Despite these shortcomings, methods based on packet radio are very popular in research circles and have recently achieved good levels of generality and accuracy. The reason why these devices are attractive is that they are mass-produced, featuring low prices, small size, and long battery life. Moreover, all these characteristics have been constantly improving in the last ten years, and trends suggest that they will keep improving for the foreseeable future. This also means that it is realistic to think that the presence of small devices communicating via packet radios is going to be ubiquitous in indoor and outdoor environments. As a consequence, it is possible to think of forthcoming feature-rich smart environments where localization is a service provided by already existing devices, without the need for any specific hardware installation.

Packet-radio systems generally use methods based on RSS, because all receivers provide this measurement on a per-packet basis, as a means to evaluate the link quality. While it is in principle possible to use time of flight as the basis for localization systems based on packet radios, the current devices do not offer generally available and accurate methods to estimate it.

Bluetooth and IEEE 802.15.4 are standards for low-to-medium bandwidth communication over short distances. They operate in the 2.4 GHz band, which is unlicensed worldwide, and both are designed to be resistant to interference from other devices working in the same unlicensed radio band. While wifi is also in principle usable for the same purpose, it is not commonly adopted for wearable systems, because the power requirements of wifi are currently much higher than that of competing standards. However, the widespread use of smartphones may change this trend; in fact, a wireless network-rich environment such as on office, where many wifi access points are available, can be exploited by passive smartphone-based systems.

Active wearable systems based on packet radio work by exchanging packets with external devices that operate RSS measurements on the exchanged packets and use those measurements as the base data in various RSS-based methods are discussed below. The great majority of proposed systems fall into this category.

On the other hand, passive packet-radio systems only receive packets. In principle, they can work anonymously, by simply sniffing network traffic from the environment without exchanging any data at all with external devices. In order for this to work, the on-body device needs a priori knowledge of the position of the transmitting devices that are installed in the environment.

3.3 Wearable Passive Systems

Passive systems are based on a variety of technologies. One is packet radio, which was discussed in the previous section. One more passive technology that can be described as on-body is the one used in high-level gesture recognition systems that consist of light reflectors on different parts of the body.

In this section we speak about inertial systems (accelerometers and gyroscopes), compasses, and atmospheric pressure sensors. These are low-power sensors that can all be found on high-end smartphones available today, and can be expected to be found on all smartphones in the near future and in many portable and wearable or embedded devices. The low-price availability of these sensors is recent, and is a consequence of the advances in MEMS (micro electro-mechanical systems) manufacturing based on silicon.

Inertial sensors are able to measure 3-D linear acceleration and angular velocity, thus in principle allowing the realization of a complete 3-D dead reckoning localization system, i.e., a system that integrates the velocity to compute position change from a starting point. However, the accuracy of these cheap sensors, especially their output drift characteristics, requires more effort to obtain reliable positioning than simply integrating their output. On the other hand, recent advances in algorithms for PDR (pedestrian dead reckoning) provide an accuracy and a precision that was unthinkable only a few years ago, and permit PDR to be the main building block for practically usable systems, at least in indoor environments.

Electronic compasses are a natural complement to inertial systems. While linear accelerometers provide an absolute reference for the vertical (Earth’s gravity) direction, compasses provide an absolute horizontal reference based on the Earth’s magnetic field. However, the magnetic reference is not as reliable, because the magnetic field in indoor environments is strongly perturbed by many metallic materials used for construction and furniture, thus making it difficult to obtain a reliable measurement of the North direction. Some systems use the perturbations as a stable fingerprinting method [8].

Atmospheric pressure sensors are another recent addition to the array of cheaply available MEMS on consumer devices. Their sensitivity is sufficient to reliably detect fast altitude changes, such as those caused by the user moving to a different floor in a building.

3.4 Device-Free Localization

Device-free systems do not require any device to be worn or carried by the user, so one cannot speak of wearable sensors. We only provide a quick overview of technologies for device-free localization.

Simplest of all are the systems based on traditional PIR (presence infra-red) sensors. These can signal the presence of moving persons in their field of view.

UWB (ultra-wide band) experimental localization systems that are based on the principle of radar have been demonstrated that use one emitter and two receiver antennas (or the other way around) that collect the signal reflected by the user’s body. These systems are purposely built, and thus expensive [9].

Video cameras offer the possibility of very precise localization and user detection by distinguishing among users. Special care should be used in these systems where privacy concerns are of interest.

Multiple microphones deployed in the environment can be used to identify the source of noise. They can be used to detect the position of a person who speaks aloud.

Laser-based systems coupled with a videocamera have found their way to the mass market with affordable prices. The most notable device is the Kinect and similar devices, which include software for ranging and posture identification.

Radio tomographic imaging (RTI) is a technique proposed by Wilson and Patwari that is able to exploit arrays of inexpensive packet-radio sensors to precisely identify the position of users in an indoor environment [10].

3.5 Hybrid Techniques

The above technologies are not necessarily used alone: the responses from each are put together using data fusion techniques. In fact, any working system that is not only for laboratory research is forced to use more than one method to obtain acceptable performance.

3.5.1 Data Fusion

Three main mathematical techniques exist for data fusion techniques: Kalman filters, Bayesian inference, and particle filters; each is, in fact, a wide class of methods that must be adapted to specific needs.

Kalman filters are recursive algorithms using continuous variables that are widely used in navigation, especially in their nonlinear version called the extended Kalman filter. For highly nonlinear problems, such as those commonly found in indoor localization, unscented Kalman filters are typically used instead.

Bayesian inference is a broad class of statistical techniques that use the Bayes rule to update the estimate of a position each time some new information (evidence) is acquired, in a way that depends on a measure of reliability of that information.

Particle filters are methods that have gained a lot of interest for data fusion of information for personal localization, especially in indoor environments. This technique was born in robotics circles; it is based on a Bayesian update rule applied to a discrete localization grid where a particle sworm made of tens or even hundreds of points is located. Time is discrete: at each cycle each particle moves independently of the others, with random velocity and direction. It is then assigned a weight dependent on its probability of belonging to some position distribution. Low-weight particles are removed and replaced with new particles created in proximity to the surviving ones. Particle filters are conceptually simple, and easy to implement and to modify with new constraints and information. However, they are computation heavy, so they are not appropriate for implementation on small devices. Recently, implementation of particle filters for PDR (pedestrian dead reckoning) has been demonstrated on smartphones (see, e.g., [11]), with the help of external references like wifi access point positioning or manual intervention.

3.5.2 SLAM (Simultaneous Location and Mapping)

Like particle filtering, discussed above, this technique comes from robotics. It works by examining the environment and making a picture of it; then, while moving in the environment, by tracing the movement by means of external reference and inertial sensors and simultaneously drawing a map of the environment. Adjustments to past and present estimated position are done every time a location is revisited, thus closing a loop of movements.

This technique is very computation-intensive and thus not currently usable on a small portable device, but it can be used by an external machine that receives data provided by wearable sensors. A method was very recently proposed for SLAM on an indoor environment, which only requires a sensor to be put on the shoe of the user [12]. The authors hope that improvements in the algorithm will make it possible to use the sensors inside a smartphone carried by the user.

4 Wearable Radios

Wearable-based solutions estimate the (unknown) location of the mobile sensors (hereafter also called mobiles) with respect to a set of fixed sensors (called anchors), whose position is known. The position estimation of a mobile can be achieved by using two different approaches, either range-based or range-free. The former consists of protocols that use absolute point-to-point distance estimates for calculating the location. The latter makes no assumption about the availability or validity of such information. The effectiveness of these two localization approaches depends on the accuracy required by the applications that use the location information. Acknowledging that the range-free solutions have a coarse accuracy [13], these techniques are unsuitable in applications where location accuracy is one of the main requirements. On the other hand, range-based localization exploits measurements of physical quantities related to beacon packets exchanged between the mobile and the anchors. Radio signal measurements are typically the received signal strength (RSS), the angle of arrival (AOA), the time of arrival (TOA), or the time difference of arrival (TDOA). Although AOA or TDOA can guarantee a high localization precision, they require specific and complex hardware. This is a major drawback in particular in AAL applications, which are deeply involved with users’ monitoring and thus may suffer from complex and invasive hardware.

There are at least two possible scenarios where RSS techniques are suited better than other radio signal measurement techniques. In the first, futuristic scenario, wireless sensors are ubiquitous in the environment and on the user’s body for health monitoring. In this case, no additional equipment is required to localize the user. In the second scenario, various sensors (i.e., gyroscopes, accelerometers, compass, and pressure sensor) are placed on the user’s body to recognize the movements. In the common case of sensors using wireless communications, exploiting the RSS measurements can give an additional source of information (such as the position of the user) at no additional equipment cost. For these reasons in the following sections of this chapter we will refer only to RSS-based localization techniques.

4.1 Range-Free

In this section we present the most used and referenced range-free localization schemes that use radio connectivity to infer proximity to a set of anchor nodes. These schemes make no assumptions about the availability or validity of point-to-point distance estimation.

4.1.1 Centroid

The centroid scheme was proposed in [14]. This localization scheme assumes that a set of anchor nodes (Ai, 1 ≤in), with overlapping regions of coverage, exist in the deployment area of the WSN. The main idea is to treat the anchor nodes, located at (Xi, Yi), as physical points of equal mass and to find the center of gravity (centroid) of all these masses:

(XG,YG)=(i=1nXin,i=1nYin) (1)

image (1)

An example of how the centroid scheme works is shown in Figure 1, where a sensor node Nk is within communication range to four anchor nodes, A1…A4. The node Nk localizes itself to the centroid of the quadrilateral A1 A2 A3 A4 (for the case of a quadrilateral, the centroid is at the point of intersection of the bimedians – the lines connecting the middle points of opposite sides).

image
Figure 1 Centroid localization-node Nk localized as the centroid of the A1 A2 A3 A4 quadrilateral.

4.1.2 APIT

APIT [15] is an area-based range-free localization scheme. It assumes that a small number of nodes, called anchors, are equipped with high-powered transmitters and know their location, obtained via GPS or some other mechanism. Using beacons from these anchors, APIT employs a novel area-based approach to perform location estimation by marking the environment with triangular regions between anchor nodes as shown in Figure 2. A node’s presence inside or outside of these triangular regions allows a node to narrow down the area in which it can potentially reside. By using different combinations of anchors, the size of the estimated area in which a node resides can be reduced to provide a good location estimate.

image
Figure 2 Area-based APIT algorithm overview.

The method used to narrow down the possible area in which a target node resides is called the point-in-triangulation test (PIT). For three given anchors, A, B, and C, the PIT chooses whether a point M with an unknown position is inside triangle entABC or not. APIT repeats the PIT with different anchor combinations until all combinations are exhausted or the required accuracy is achieved. At this point, APIT calculates the centroid of the intersection of all of the triangles in which a node resides to find its estimated position. In [16] the authors implemented the APIT system on an outdoor experimental testbed showing that at least 80% of nodes lie within a one-hop region of their estimated areas. Both simulation and experimental results have verified that APIT is a promising technique for range-free localization in large outdoor sensor networks.

4.1.3 SeRLoc

SeRLoc [17] is another area-based range-free localization method. SeRLoc assumes two types of nodes: normal nodes and locators (i.e., anchors). Normal nodes are equipped with omnidirectional antennas, while locators are equipped with directional sectored antennas (locations of locators are known a priori). In SeRLoc, a sensor estimates its location based on the information transmitted by the locators. Figure 3 shows the main idea, with node Nk within radio range to locators A1 , A2, and A3.

image
Figure 3 SerLoc Localization.

SeRLoc localizes the sensor nodes in four steps. First, a locator transmits directional beacons within a sector. Each beacon contains the locator’s position and the angles of the sector boundary lines. A normal node collects the beacons from all locators it hears. Second, it identifies an approximate search area within which it is located based on the coordinates of the locators heard. Third, it computes the overlapping sector region using a majority vote scheme. Finally, SeRLoc estimates a node location as the centroid of the overlapping region.

We note that SeRLoc is unique in its secure design. It can deal with various kinds of attacks including wormhole and Sybil attacks. We do not describe its security features here except to note that the authors prove in [17] that their approach is more secure, robust, and accurate in the presence of attacks, compared with other state-of-the-art solutions that largely ignore this issue.

4.2 Range-Based

In this section we make reference to the first scenario described in section 4, where the environment is rich in sensors deployed for reasons other than localization. The idea is to exploit the RSS measurements of these sensors.

The main range-based indoor localization approaches that exploit the RSS are based on fingerprint and on signal propagation models. In both cases a mobile sensor is localized by means of a set of anchors that exchange beacon packets with the mobile in order to collect sequences of RSS values. In particular, at a given instant of time, the system computes a tuple of RSS values (one RSS value obtained from each anchor), which is used to estimate the position of the mobile sensor at that time. The fingerprint schemes, also referred to as pattern matching, require a preliminary system calibration procedure (an offline phase [1822]). This phase is executed after the deployment of the anchors, and it consists of performing a set of RSS measurements at a set of points in the environment. These points correspond to possible locations of the mobile sensors that should be localized. For each point a tuple of RSS values is produced, which is stored in a database. During the localization procedure (the online phase), every time a new RSS tuple associated to a mobile is produced, the localization system compares it with those stored in the database to find the most likely position of the mobile.

4.2.1 Fingerprinting

Location fingerprinting differs from other localization principles. Instead of computing the distances between the user and the anchors and triangulating the user’s location, the location of the user is determined by comparing the obtained RSS values to a radio map. The radio map is constructed in an offline phase and it contains the measured RSS patterns at certain locations. This way the characteristics of the signal propagation in indoor environments are captured and the modeling of the complex signal propagation is avoided. The point of fingerprinting is that it does not require knowledge either of the transmitters’ location or of the characteristics of the environment. Only the measurements, which imply the characteristics of the environment, i.e., the RSS values, are needed. However, the offline phase can be computationally intensive, and the radio maps have to be stored in memory.

4.2.1.1 Radio Map

The construction of the radio map begins by dividing the area of interest into cells with the help of a floor plan. RSSI values of the radio signals transmitted by APs are collected in calibration points inside the cells for a certain period of time and stored in the radio map. The ith element in the radio map has the form Mi=(Bi,aij,θi),i=1,..,Mimage, where Bi is the ith cell, whose center pi is the ith calibration point. Vector aij holds the RSSI values measured from the anchor j. The parameter θi contains any other information needed in the location estimation phase. This can be, for example, the orientation θi=di {north, south, east, west} of the mobile, such as in the RADAR system [23]. We denote the ith fingerprint by Ri and the set of all fingerprints by R={R1,…,RM}, so the ith element of the radio map is Mi=(Bi,Ri).

The radio map can be modified or preprocessed before applying it in the location estimation phase. The motivation can be the reduction of the memory requirements of the radio map or the reduction of the computational cost of location estimation. In addition, the fingerprint can also include information about the distribution, either a histogram for each transmitter or a more simplified parameter such as mean or variance. Once the database of fingerprints exists, a device calculates position by recording a fingerprint and “matching” to the database. This usually consists of measuring a “distance” between the measured RSS fingerprint and each fingerprint in the database.

4.2.1.2 Location Estimation

Given the radio map, the objective of the location estimation phase is to infer the state (location) of the mobile device from the received measurements vector y, which includes RSSI samples yj from several anchors.

4.2.1.2.1 Deterministic Approaches

In the deterministic approaches, the state u is assumed to be a non-random vector [23]. The main objective is to compute the estimate û of the state at every time step. Usually the estimate is a linear combination of the calibration points pi, i.e.,

uˆ=i=1Mwij=1Mwjpi (2)

image (2)

where all weights wi are non-negative. One possible weight wi is the inverse of the norm of the RSSI innovation [24], i.e.,

wi=1||ýái|| (3)

image (3)

where ý is the measurement vector, ái is the vector of the means of the RSSI values of each AP at the ith calibration point, and the norm ||·|| is arbitrary. Examples of possible norms are given in Table 1. The Euclidean norm (2-norm) is widely used, but the Manhattan norm (1-norm) is also common [2325].

Table 1

Possible Norms

Name ||u||(uRn)image
p-norm [23] ||u||p=(i=1n|ui|p)1pimage
modified p-norm [25] ||u||mp=(i=1n1wi|ui|p)1pimage
infinity-norm ||u||=maxi(|ui|)image
Mahalanobis-norm (S is the covariance matrix) [26] ||u||M=uTS1uimage

Image

The estimator, that keeps the K biggest weights and sets the others to zero, is called the weighted K-nearest neighbor method (WKNN) [24]. The WKNN with equal weights is called the K-nearest neighbor method (KNN) [23]. The simplest method, where K=1, is called the nearest neighbor method (NN) [27]. In general, the KNN and the WKNN can perform better than the NN method, particularly with parameter values K=3 and K=4 [24]. However, if the density of the radio map is high, the NN method can perform as well as the more complicated methods.

4.2.1.2.2 Probabilistic Approaches

In the probabilistic (or statistical) approaches the state u is assumed to be a random vector [28]. The idea in the probabilistic framework is to compute the conditional probability distribution function puy(u|y)p(u|y)image (posterior) of the state u given measurements y. The posterior contains all the necessary information to compute an arbitrary estimation of the state. Using the Bayes rule we get

p(u|y)=p(y|u)p(u)p(y) (4)

image (4)

where p(y|u)image is the likelihood, p(u) is the prior and p(y) is a normalizing constant. A conventional choice for the prior [28] is the uniform distribution, i.e.,

p(u)=i=1MψBi(u)j=1M|Bj| (5)

image (5)

where |Bi| is the area of Bi and

ψBi(u)={1,uBi0,uBi (6)

image (6)

Assuming that the measurements collected at the calibration point represent the distribution of the RSSI in the whole cell (i.e., the likelihood is constant inside each cell Bi) the likelihood is

p(y|u)=i=1Mp(y|i)ψBi(u) (7)

image (7)

where p(y|i)=pvi(yai)image and vi=yaiimage. We assume that the components of the random vector vi are independent. Thus,

p(y|i)=j=1npvij(yjaij) (8)

image (8)

where yRnimage.

There are several approaches for computing the likelihood p(y|i). Examples of these methods are given in Table 2 [31].

Table 2

Likelihood Functions

Name of the Method p(y|i)=j=1npvij(yjaij)image
Gaussian [29] pvij(x)=12πσˆij2exp(x2σˆij2)image
Log-normal [30] pvij(x)=1x2πσˆij2exp(log(x)μ2σˆij2)image
Inverse function pvij(x)={2|x|2log(t)+3,|x|11(2log(t)+3)|x|,1<|x|t0,t<|x|image
Exponential pvij(x)=12e|x|image

Image

Substituting prior and likelihood equations into the posterior equation we get

p(u|y)=i=1MβiψBi(u)|Bj| (9)

image (9)

From this posterior we can compute an estimate of the state u. One possible estimate is the maximum a posteriori (MAP) estimate. In this case, it is the same as the maximum-likelihood (ML) estimate, because the prior is uniform. The posterior is piecewise constant, and thus the MAP estimator is ambiguous. If the posterior has the maximum value only in one cell, say Bi, it is reasonable to use the center of the cell as the MAP estimate, i.e.,

uˆMAP=pi (10)

image (10)

Another commonly used estimate is the mean of the posterior, i.e.,

uˆMEAN=i=1Mβipi (11)

image (11)

Clearly, with fingerprinting there is a trade-off between the number of points in the grid (the larger this number, the more accurate the localization is) and the overhead due to the offline phase. In practice, the main drawback of this method is the high number of extensive and accurate measurements required during the offline phase to create the database. In fact, the creation of the database is not automatic: it is a human-based, time-consuming procedure and this is a practical barrier to wide adoption, because it makes the method unsuitable for rapid or ad hoc deployment. For these reasons, methods alternative to fingerprinting make use of signal propagation models, which are analytical models that relate RSS measures with distances [14,23,26,32].

4.2.2 Propagation Model

RSS is dependent on the environment, because the radio frequency signal suffers from reflection, diffraction, and multi-path effects that make the signal strength rather noisy. Consequently, localization systems based on signal propagation models need to calibrate parameters of the propagation model. The calibration procedure works in two phases: the training phase and the estimation phase. In the training phase, a set of RSS values are measured at a set of points in the area of interest; in the estimation phase, this information is used to estimate the propagation model parameters. The relationship between RSS and the reciprocal distance between anchors and mobile is then established by means of the calibrated propagation model.

Once a number of distance estimates between the mobile and the anchors are available, the most used algorithm to infer the mobile position is based on multi-lateration. As for the fingerprinting techniques, the localization based on the signal propagation model is expensive in terms of calibration time, since the calibration is not automatic. Moreover, the described calibration technique does not solve the time-dependent problem, since wireless channel variations affect the propagation model parameters, and this fact can significantly impact on the quality of the localization system. However, in recent works this problem has been solved by an automatic calibration procedure (called virtual calibration) of the signal propagation model that is only based on the RSSIs measured among the anchors and that can be executed periodically and automatically (i.e., without human intervention) [33].

4.2.2.1 Indoor Signal Propagation Model

Signal propagation is affected by many factors such as antenna height, antenna gain, antenna radiation pattern, transmitter-receiver distance, reflection, multi-path transmission, non-line-of-sight, obstructions, vegetation scattering and diffraction, RSS measurement uncertainty, etc. [34]. All these factors have to be considered when the distance estimation is calculated from the signal strength measurement. Several propagation models have been proposed [35]. They are characterized by different levels of complexity, depending on how many physical phenomena are considered. Basically, simpler models can be used when the environment characteristics are close to ideal conditions. Unfortunately, in most cases it is necessary to consider specific features of signal propagation in radio channels. In the literature most researchers model the indoor path loss with the one-slope model [36], which assumes a linear dependence between the path loss (dB) and the logarithm of the distance d between the transmitter and the receiver:

L(d)|dB=l0+10αlog10d (12)

image (12)

where l0 is the path loss at a reference distance of 1 m and α is the power decay index (also called path loss exponent). A generalization of the one-slope model is the two-slope model suggested in [37] to approximate the two-ray propagation model. Usually, in an urban environment, the two-slope model is characterized by a break point that separates the various properties of propagation in near and far regions relative to the transmitter: the path loss exponent changes when the distance d is greater than the break point. In particular, authors in [37] describe the existence of a transition region where the break point b is such that

πhthrλ<b<4πhthrλ (13)

image (13)

where ht is the transmitter antenna height, hr the receiver antenna height, and λ is the wavelength of the radio signal. However, in a typical sensor network scenario, the break point distance is on the order of hundreds of meters; therefore, in practice, the one-slope and the two-slope models are equivalent in indoor scenarios where the rooms are only a few square meters in size. Although the one-slope model is simple to use, it does not adequately account for the propagation characteristics in indoor environments. Indeed, one further generalization of the one-slope model consists of adding an attenuation term due to losses introduced by walls and floors penetrated by the direct path:

L(d)|dB=l0+10αlog10d+WAF|dB+FAF|dB (14)

image (14)

where FAF|db is the floor attenuation factor, and WAF|db is the wall attenuation factor expressed as

WAF|dB=i=1NKili (15)

image (15)

where ki is the number of penetrated walls of type i, and li is the attenuation due to the wall of type i. Without loss in generality, assuming that sensors are all located on the same floor, the attenuation term due to the propagation among different floors can be neglected. A similar model was proposed in [38], where a multi-wall component is introduced, which includes the number of normal and fireproof doors and their status (open/closed) met by the direct paths. The received power RSS is obtained as the difference between the transmitted power Pt and L(d), i.e.,

RSS=PtL(d)|dB=Ptl010αlog10di=1NKili (16)

image (16)

Letting r0=Ptl0image be the RSSI at the reference distance of 1 m,

RSS=r010αlog10di=1NKili (17)

image (17)

This equation is used during the calibration procedure to estimate the propagation model parameters (r0 , α, li ). In [33] the authors show that they are able to estimate the parameters of the chosen propagation model by exploiting the communications among anchors, without performing a preliminary measurement campaign.

4.2.2.2 Multi-Lateration Algorithm

In the last two decades, many localization techniques have been developed for wireless sensor network applications [39,40]. Among them, multi-lateration is seen to be one of the most popular localization techniques. Multi-lateration localization techniques form the basis of many other more sophisticated localization algorithms such as the iterative and the collaborative multi-lateration technique [39,41]. Multi-lateration is a simple localization technique that is based on distance measurements from multiple anchor nodes to the sensor node to be localized.

The sensor node location estimated by the multi-lateration localization technique is the one that minimizes the sum of squared distances between a hypothesized sensor location to all the anchor locations. Multi-lateration is a nonlinear optimization problem, although suboptimal linear optimization approaches can be applied. One of the major limitations of the classical multi-lateration localization approach is that it assumes that the anchor locations are error free and the only errors are in the distance measurements. This assumption is invalid in practice because the locations of anchor nodes are always inaccurate. There are, in general, two sources of errors for anchor location errors. The first source of error is due to the measurement errors of the anchor nodes. The second source of anchor location error arises when the locations of anchor nodes are only estimates. Some localization approaches such as AHLoS (ad-hoc localization system) [39] use an iterative process. For example, in AHLoS, some sensor nodes in the network first estimate their own positions based on broadcasted beacon positions. They then become anchors and broadcast their estimated positions to other nearby nodes for localization. The iterative process can lead to error propagation, resulting in large sensor location estimation errors as networks grow. The classical multi-lateration localization algorithms do not take into account and ignore the anchor location errors even though they exist. Recently, a number of approaches have been proposed to deal with the problem of anchor localization uncertainty for multi-lateration. In [42], the authors formulated the problem of multi-lateration in the presence of anchor position errors using the constrained least square technique (CTLS). The problem is then solved by using the Newton iterative algorithm. In [43], semi-definite programming (SDP) algorithms were proposed for sensor localization in the presence of anchor position uncertainties, and the corresponding Cramér-Rao lower bound (CRLB) was derived. In [44,45], a distributed localization algorithm was proposed based on second-order cone programming relaxation. In [46], an expectation-maximization (EM) estimator for localization of sensor nodes with erroneous anchor positions was proposed, which iteratively refines the anchor positions and estimates the sensor locations. A common disadvantage of the above mentioned approaches is that they all involve solving a nonlinear optimization problem.

Figure 4 shows the geometric relationship between the anchors and the node to be localized, where M anchors are used. In the figure, {x, y} are the unknown coordinates of the sensor node, {um, vm} are the known coordinates of the m-th anchor and dm is the estimated distance between the sensor node and the m-th anchor. Both the anchor locations and the distance measurements are assumed to contain errors. The multi-lateration localization approach is to estimate {x, y} given {um, vm, dm; m=1,2,…,M}. Denote

gm(x¯)=(xum)2+(yvm)2 (18)

image (18)
image
Figure 4 Anchor nodes and node to be localized: (a) the anchors are deployed in the environment; (b) the estimated distance among each anchor and the mobile has been evaluated; (c) the position of the mobile m’ is estimated.

In general, multi-lateration minimizes the following sum of squared errors between the measured distances and hypothetical ones based on the unknown sensor node location [47]:

minxm(gm(x¯)dm)2 (19)

image (19)

Another technique [48] computes the intersection points among the three circles centered in a1, a2, and a3; up to six intersection points can occur. Then, it estimates the position of the mobile {x, y} as the center of mass between these intersection points, i.e.,

(x,y)=(i=1nXin,i=1nYin) (20)

image (20)

In [29] context information provided by smart devices deployed in the environment is exploited by the localization algorithm in order to improve the performance in terms of localization error. In [49] the authors propose a decision tree algorithm to select the candidate intersection points that better provide the location of the mobile.

4.2.2.3 Maximum-Likelihood Distance Estimator and Cramér-Rao Bounds

The Cramér-Rao bound can be used to compute the theoretical attainable performance of localization systems that exploit RSS measurements. In this section, we derive the expression for the maximum-likelihood estimators (MLEs) and the Cramér-Rao bound (CRB) for the estimation of the distance between the mobile and the anchors. The properties of the bound on localization error may help in designing efficient localization algorithms; moreover, it provides suggestions for a positioning system design by revealing error trends associated with the system deployment. We derive the expressions for both the case of a single RSS value and for the more interesting cases of multiple RSS values used to estimate the distance.

4.2.2.3.1 RSS Information: Single Sample Case

The mobile device periodically receives the beacon signal sent by a given anchor and registers its RSS value r, which can be modeled as a Gaussian random variable. Thus, we have

rN(R,o2) (21)

image (21)

and, from the relationship between RSS distance already explained in section 4.2.2.1, i.e., RSS=r010αlog10di=1NKiliimage, the probability density function of r conditioned on the distance d between the mobile and the anchor is

fd(r)1dexp[(rR)22o2] (22)

image (22)

Then, the maximum-likelihood estimator of d is

dˆ=argmaxdfd(r) (23)

image (23)

In order to evaluate such maximum, we differentiate the log-likelihood function, obtaining the following function:

dlnfd(r)=Ai=1N(rR)o2d,beingA=10αlog10e (24)

image (24)

therefore

dlnfd(r)=0rR=0 (25)

image (25)

and thus

dˆ=10(r0rLw)/10α (26)

image (26)

The Fisher information I measures the amount of information that a random variable carries about an unknown parameter. Here the random variable is r, and d is the unknown parameter. The inverse of the Fisher information, known as the Cramér-Rao bound, is the minimum variance that can be achieved when estimating d by using any unbiased estimator. By evaluating the Fisher information for RSS measurements (details to compute the Fisher information are presented in [36]) we can identify the minimum theoretical error for the distance estimation. The Fisher information associated with RSS measurements is

Id=Ed[(dlnfd(r))2]=A2σ2d2Ed[(rR)2]=(Aσd)2 (27)

image (27)

hence, the CRB entails

Var(dˆ)σdA (28)

image (28)
4.2.2.3.2 RSS Information: Multiple Samples Case

In order to improve localization accuracy, multiple RSS samples are normally used to estimate the distance between anchors and mobile; as already stated, we assume that the RSS values r are i.i.d. random variables. We assume that the mobile device did not move significantly in the measurement time span during which the RSS samples are collected. Being (r1, … , rN) independent random variables, the joint PDF conditioned on the distance d is

fd(r1,,rN)i=1N1dexp[(riR)22o2] (29)

image (29)

Following the same steps as in the previous case, we obtain

dlnfd(r1,,rN)=Ai=1N(riR)o2d (30)

image (30)

therefore

dlnfd(r1,,rN)=0i=1NriR=0i=1NriN=R (31)

image (31)

and thus the MLE of the distance is

dˆ=10(r0riLw)/10α (32)

image (32)

The Fischer information is

Id=Ed[(dlnfd(r1,,rN))2]=A2o2d2Ed[i=1N(riR)2]=(Aod)2No2=(Aod)2N (33)

image (33)

hence, the CRB is

Var(dˆ)odAN (34)

image (34)

5 Conclusions

The world of personal localization using wearable devices or no devices at all is rapidly evolving, yet no single solution has yet emerged as the killer application. Working commercial or prototyping solutions that are general enough to be of practical usage in indoor environments are based on RSS measurements of packet radio signals, ultrasound, and MEMS (micro electro-mechanical systems) such as those found in smartphones. A fusion of inputs from more than one technology is commonly used, but the most powerful fusion systems cannot run on the wearable devices: rather, they run on external servers that are part of the local infrastructure.

Exceptions to this rule are starting to appear: PDR (pedestrian dead reckoning) systems have reached a level of maturity that allows them to run on a smartphone at a level of accuracy sufficient for navigating a building even without assistance from the environment, but with the option to fuse information obtained from the local infrastructure.

Any recommendation pointing to a specific technology would be obsolete the moment it is written, as low-price commercial offerings are starting to come out and academic research is fast progressing. As an example, let’s examine the criteria to consider for evaluating a smartphone-based PDR system. Since these systems are resource intensive, it is important to verify the requirements imposed by the application on the smartphone, in terms of CPU power, sensor availability, and most importantly, battery consumption. Systems that do not require a preliminary training phase should be preferred; preference can turn into a requirement if the application is going to be used occasionally, for example, for visitors. It should be possible to have the choice of downloading a complete map of the environment, for offline use, or getting partial maps on demand, in order to speed up starting times and minimize memory and network usage. Some systems are able to track the position even without a map: this can be useful to get back on one’s step, or to superimpose the recorded path once the user obtains a map of the environment, or even to create a map of the unknown environment. The more sources of information the system manages to fuse together, the better: for example, an application could be able to run on a low-range smartphone without a compass or a pressure sensor by exploiting a map of wifi access points in the environment, at the price of lower accuracy and higher battery consumption.

In the future we foresee several methods being used on different devices, and different sources of information being exploited depending on the computing capabilities of the portable or wearable devices. More specifically, we see two trends. The first, consequent to the diffusion of ever more powerful smartphones, will push toward the use of PDR methods fused with compass and atmospheric pressure information for smartphones. The second, because of ubiquity of devices communicating through packet radio in smart environments, will push toward RSS-based methods to be implemented in small devices collaborating with local infrastructure. The two trends will merge and coexist in flexible ways, depending on the capabilities of the wearable devices and on the services offered by the local infrastructure.

References

1. Want R, Hopper A, Falcao V, Gibbons J. The active badge location system. ACM Trans Info Syst. 1992;10(1):91–102.

2. Abowd GD, Atkeson CG, Hong J, Long S, Kooper R, Pinkerton M. Cyberguide: a mobile context-aware tour guide. Wireless Netw. 1997;3(5):421–433.

3. Sumi Y, Etani T, Fels S, Simonet N, Kobayashi K, Mase K. C-map: Building a context-aware mobile assistant for exhibition tours. Community Computing and Support Systems, Lecture Notes in Computer Science London, UK: Springer- Verlag; 1998; pp 137–154.

4. Cheverst K, Davies N, Mitchell K, Friday A, Efstratiou C. Developing a context-aware electronic tourist guide: some issues and experiences. Proceedings of the SIGCHI conference on Human factors in computing systems (CHI ’00) New York, NY, USA: ACM Press; 2000; pp 17–24.

5. Jiménez Ruiz AR, Seco Granja F, Prieto Honorato JC, Guevara Rosas. JI. Accurate pedestrian indoor navigation by tightly coupling foot-mounted imu and RFID measurements. IEEE T Instrum Meas. 2012;61(1):178–189.

6. Paolo B, Stefano C, Francesco F, Francesco P. Evaluating AAL solutions through competitive benchmarking: the localization competition. IEEE Pervasive Comput Mag. 2013;12(No. 4):72–79.

7. Knauth S, Kaufmann L, Jost C, Kistler R, Klapproth A. The iLoc Ultrasound Indoor Localization System at the EvAAL 2011 Competition Evaluating AAL Systems Through Competitive Benchmarking. Indoor Localization Track Commun Comput Info Sci. 2012;309:52–64.

8. Robertson P, Frassl M, Angermann M, Doniec M, Julian, B.J, Garcia Puyol M. Simultaneous Localization and Mapping for pedestrians using distortions of the local magnetic field intensity in large indoor environments, Indoor Positioning and Indoor Navigation (IPIN), 2013 International Conference on, vol., no., pp.1,10, 28-31 2013.

9. Pietrzyk M.M, von der Grun T. Experimental validation of a TOA UWB ranging platform with the energy detection receiver, Indoor Positioning and Indoor Navigation (IPIN), 2010 International Conference on , vol., no., pp.1,8, 15-17, 2010.

10. Wilson J, Patwari. N. Radio Tomographic Imaging with Wireless Networks. IEEE Trans Mobile Comput. 2009;9(5):621–632.

11. <http://movea.com>, (Last Accessed: 03.07.14).

12. Angermann M, Robertson P. FootSLAM: Pedestrian Simultaneous Localization and Mapping Without Exteroceptive Sensors Hitchhiking on Human Perception and Cognition. Proc IEEE. 2012;100:1840–1848.

13. Giorgetti G, Gupta SKS, Manes G. Localization using signal strength: to range or not to range? MELT ’08. Proceedings of the First ACM International Workshop on Mobile Entity Localization and Tracking in GPS-Less Environments New York, NY, USA: ACM; 2008; pp. 91–96.

14. Bulusu N, Heidemann J, Estrin D. GPS-less low cost outdoor localization for very small devices. IEEE Pers Commun Mag. 2000;7(5):28–34.

15. He T, Huang C, Blum B, Stankovic JA, Abdelzaher T. Range-Free localization schemes in large scale sensor networks. ACM Int Conf Mobile Comput Netw. 2003; (Mobicom).

16. V R. Chandrasekhar, W K.G. Seah, Z. A. Eu and A P. Venkatesh. (2010). Range-free Area Localization Scheme for Wireless Sensor Networks. Wireless Sensor Networks: Application - Centric Design, Chapter 17, 14, ISBN 978-953-307-321-7.

17. Lazos, L., and Poovendran, R. SeRLoc: Secure range-independent localization for wireless sensor networks. In ACM Workshop on Wireless Security (WiSe) (2004).].

18. Christ T, Godwin P, Lavigne R. A prison guard duress alarm location system. Int Carnahan Conf Secur Technol. 1993;106–116.

19. Lorincz K, Welsh M. Motetrack: a robust, decentralized approach to RF-based location tracking. Pers Ubiquitous Comput. 2006;11(6):489–503.

20. King T, Kopf S, Haenselmann T, Lubberger C, Effelsberg W. (2006). Compass: a probabilistic indoor positioning system based on 802.11 and digital compasses. Proceedings of the First ACM International Workshop on Wireless Network Testbeds, Experimental evaluation and Characterization (WiNTECH), Los Angeles, CA, USA.

21. Youssef M, Agrawala A. The WLAN location determination system 0MobiSys ’05. Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services New York, NY, USA: ACM; 2005; pp. 205–218.

22. Papapostolou A, Chaouchi H. Wife: wireless indoor positioning based on fingerprint evaluation. 8th Int IFIP-TC 6 Netw Conf. 2009;234–247.

23. Bahl P, Padmanabhan. VN. Radar: An in-building RF-based user location and tracking system, in INFOCOM 2000. Nineteenth Annu Joint Conf IEEE Comput Commun Soc. 2000;2(10):775–784.

24. B. Li, J. Salter, A. G. Dempster, and C. Rizos, (2006). “Indoor positioning techniques based on wireless LAN,” School of Surveying and Spatial Information Systems, UNSW, Sydney, Australia, Tech. Rep.

25. P. Prasithsangaree, P. Krishnamurthy, and P. Chrysanthis. (2002). “On indoor position location with wireless LANs,” Telecommunications Program, University of Pittsburgh PA 15260, Tech. Rep.

26. Yeung WM, Zhou J, Ng JK. Enhanced fingerprint-based location estimation system in wireless LAN environment. In: Denko MK, Shih C-S, Li K-C, eds. Emerging Directions in Embedded and Ubiquitous Computing. Springer 2007;273–284.

27. S. Saha, K. Chauhuri, D. Sanghi, and P. Bhagwat, (2003). “Location determination of a mobile device using IEEE 802.11b access point signals,” Department of Computer Science and Engineering, Tech. Rep.

28. Roos T, Myllymaki P, Tirri H, Misikangas P, Sievanen. J. A probabilistic approach to WLAN user location estimation. Int J Wireless Info Netw. 2002;9(3):155–163.

29. Haeberlen A, Flannery E, Ladd AM, Rudys A, Wallach DS, Kavraki. LE. Practical robust localization over large-scale 802.11 wireless networks. MobiCom’04 2004.

30. Kaemarungsi K. Distribution of WLAN received signal strength indication for indoor location determination. Thailand: National Electronics and Computer Technology Center; 2006; Tech. Rep.

31. Duda RO, Hart PE, Stork. DG. Pattern Classification John Wiley, Sons Inc. 2001.

32. An X, Wang J, Prasad RV, Niemegeers IGMM. Opt: online person tracking system for context-awareness in wireless personal network. Proceedings of the 2nd International Workshop on Multi-Hop Ad Hoc Networks: From Theory to Reality (REALMAN ’06) New York, NY, USA: ACM; 2006; pp. 47–54.

33. Barsocchi P, Lenzi S, Chessa S, Furfari F. Automatic virtual Calibration of Range-Based Indoor Localization Systems. Wireless Commun Mobile Comput. 2012;12(17):1546–1557.

34. Stoyanova T, Kerasiotis F, Prayati A, Papadopoulos G. A Practical RF Propagation Model for Wireless Network Sensors. Third Int Conf Sens Technol Appl SENSORCOMM ’09 2009;194–199.

35. Rappaport T. Wireless Communications: Principles and Practice second Edition Prentice Hall 2001.

36. Patwari N, Hero IAO, Perkins M, Correal N, O’Dea R. Relative location estimation in wireless sensor networks. IEEE Trans Signal Process. 2003;51(8):2137–2148.

37. Green E, Hata M. Microcellular propagation measurements in an urban environment. IEEE Int Symp Pers Indoor Mobile Radio Commun. 1991;324–328.

38. Borrelli A, Monti C, Vari M, Mazzenga F. Channel models for IEEE 802.11b indoor system design. IEEE Int Conf Commun. 2004;6:3701–3705.

39. Savvides A, Han CC, Srivastava. MB. Dynamic fine-grained localization in ad hoc networks of sensors. Proc 7th Annu ACM/IEEE Int Conf Mobile Comput Netw (MobiCom’01) 2001;166–179 Rome, Italy.

40. Mao G, Fidan B, Anderson BDO. Wireless sensor network localization techniques. Comput Netw. 2007;51(issue 10):2529–2553.

41. A. Savvides, H. Park, and M. B. Srivastava. (2002). The bits and flops of the N-hop multilateration primitive for node localization problems. Proc. the First ACM International Workshop on Wireless Sensor Networks and Applications, pp. 112-121, Atlanta, Georgia, USA.

42. Wan J, Yu N, Feng R, Wu Y, Su. C. Localization refinement for wireless sensor networks. Comput Commun. 2009;32(Issues 13-14):1515–1524.

43. Lui KWK, Ma W-K, So HC, Chan FKW. Semi-definite programming algorithms for sensor network node localization with uncertainties in anchor positions and/or propagation speed. IEEE Trans Signal Process. 2009;57(2):752–763.

44. Srirangarajan S, Tewfik AH, Luo ZQ. Distributed sensor network localization with inaccurate anchor positions and noisy distance information. Proc 2007 IEEE Int Conf Acoust Speech Signal Process (ICASSP’07). 2007;3:521–524 Honolulu, HI, USA.

45. Srirangarajan S, Twefic AH, Luo ZQ. Distributed sensor network localization using SOCP relaxation,”. IEEE Trans Wireless Commun. 2008;7(12):4886–4894.

46. Leng M, Wu Y-C. Localization of wireless sensor nodes with erroneous anchors via EM algorithm,”. Proc 2010 IEEE Global Telecom-Munications Conf (GLOBECOM’10) 2010;1–5 Miami, Fl, USA.

47. Zhou Y, Li J, Lamont L. Multilateration Localization in the Presence of Anchor Location Uncertainties. Globecom 2012-Ad Hoc Sens Netw Symp. 2012.

48. Barsocchi P, Chessa S, Potortì F, Furfari F, Ferro. E. Context Driven Enhancement of RSS-based Localization Systems. IEEE Symp Comput Commun (ISCC) 2011;463–468.

49. Khalid K. Almuzaini and T. Aaron Gulliver. (2010). Range-based Localization in Wireless Networks using Decision Trees. IEEE Globecom 2010 Workshop on Heterogeneous, Multi-hop Wireless and Mobile Networks.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset