- About this Journal ·
- Abstracting and Indexing ·
- Aims and Scope ·
- Annual Issues ·
- Article Processing Charges ·
- Articles in Press ·
- Author Guidelines ·
- Bibliographic Information ·
- Citations to this Journal ·
- Contact Information ·
- Editorial Board ·
- Editorial Workflow ·
- Free eTOC Alerts ·
- Publication Ethics ·
- Reviewers Acknowledgment ·
- Submit a Manuscript ·
- Table of Contents
International Journal of Distributed Sensor Networks
Volume 2011 (2011), Article ID 172902, 8 pages
Total Least Squares Method for Robust Source Localization in Sensor Networks Using TDOA Measurements
1College of Mathematics, Sichuan University, Chengdu 610064, China
2Networking Protocols Department, Institute for Infocomm Research, Singapore 138632
3School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore 639798
Received 31 March 2011; Accepted 15 June 2011
Copyright © 2011 Yang Weng et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
The TDOA-based source localization problem in sensor networks is considered with sensor node location uncertainty. A total least squares (TLSs) algorithm is developed by a linear closed-form solution for this problem, and the uncertainty of the sensor location is formulated as a perturbation. The sensitivity of the TLS solution is also analyzed. Simulation results show its improved performance against the classic least squares approaches.
Driven by many practical applications such as environment monitoring, traffic management in intelligent transportation, healthcare for the older and disabled, cyber-physical system (CPS) has emerged as a new advanced system to link the virtual cyber world with the real physical world [1, 2]. Sensor network is crucial to enable CPS by efficient monitoring and understanding the physical world. The main purpose of a sensor network is to monitor an area, including detecting, identifying, localizing, and tracking one or more objects of interest. These networks may be used by the military in surveillance, reconnaissance, and combat scenarios or around the perimeter of a manufacturing plant for intrusion detection. The problem of source localization involves the estimation of the position of a stationary transmitter from multiple noisy sensor measurements, which can be time-of-arrival (TOA), time-difference-of-arrival (TDOA), or angle-of-arrival (AOA) measurements or a combination of them [3–5].
Source localization methods using TDOA measurements locate the source at the intersection of a set of hyperboloids. Finding this intersection is a highly nonlinear problem [6, 7]. Over the years, many iterative numerical algorithms have been proposed for the problem, including the maximum likelihood estimation methods [8, 9] and the constrained optimization methods [10, 11]. In these approaches, linear approximation and iterative numerical techniques have to be used to deal with the nonlinearity of the hyperbolic equations. However, it is difficult to select a good initial guess to avoid a local minimum for them; therefore the convergence to the optimal solution cannot be guaranteed. The closed-form solution methods are widely used since no initial solution guesses are required and have no divergence problem compared with the iterative techniques [12–16]. For real-time application in WSNs, the iterative procedure for iterative algorithm is time consuming while the closed-form method is computational efficient.
The aforementioned approaches need the precise location of sensors. In practice, the receiver locations may not be known exactly. For example, in sensor network applications, the receivers can be with airplanes or unmanned aerial vehicles (UAVs) whose positions and velocities may not be precisely known. Hence, the inaccuracy in receiver locations needs to be taken into account in practical applications which is challenging and difficult as the estimation performance of source location can be very sensitive to the accurate knowledge of the receiver positions and a slight error in a receiver's location can lead to a big error in the source location estimate. In , a closed-form solution is proposed that takes the receiver error into account to reduce the estimation error. The proposed solution is computationally efficient and does not have the divergence problem as in the iterative techniques. In , the maximum likelihood formulation of source localization problem is given and an efficient convex relaxation for this nonconvex optimization problem is proposed. A formulation for robust source localization in the presence of sensor location errors is also proposed. Both the above methods assume that the measurement noise is Gaussian and characterize the uncertainty by stochastic approach with the perturbation being white and Gaussian.
However, such white and Gaussian assumptions are unrealistic in many practical applications [19–21]. Usually, if the Gaussian assumption are not met, the maximum-likelihood-based results under Gaussian assumption may lead to poor estimation performance, which means that the estimation performance is sensitive to the exact knowledge of the parameters of the system (see, e.g., ). These facts motivate us to further research on robust source localization method without any distribution assumption for measurements noise and sensor location error.
In this paper, we will develop a total least squares (TLSs) algorithm for location estimation of a stationary source. TLS is a least squares data modeling technique in which observational errors on both dependent and independent variables are taken into account. The uncertainty of the sensor location is formulated as a perturbation on the given sensor location. The sensitivity of the TLS solution will also be analyzed to show the superiority of our proposed algorithm. Compared with the existing methods which need the Gaussian assumption for both measurements noise and sensor location error, the TLS approach does not depend on any assumed distribution of the noise and errors. Simulation results support the above analysis and show good performance of the proposed method.
The rest of this paper is organized as follows. In Section 2, a linear closed-form solution is given for source localization problem using TDOA measurements. The total least squares method for source localization with sensor location uncertainty is given in Section 3, and the corresponding sensitivity analysis is derived in Section 4. Simulation results are presented in Section 5 to show the improved performance of the proposed method against the classic least squares approaches. Concluding remarks are made in Section 6.
2. A Linear Closed-Form Solution
Assume that sensor is located at point . Denote the unknown source location by . Let be the signal propagation speed and the number of sensor nodes distributed in the network. A reference node, denoted as , exists in the field. We define the distance from the source to sensor as . The TDOA that we derive from the data, , for each sensor node relative to the reference sensor is Denote the distance difference of arrival (DDOA) data for the ith sensor as We have Group all the known terms together and denote Rearranging and substituting give which is a linear model for unknown parameters , and. Stacking the sensor measurements, we have the linear system in matrix form where When the location of sensor nodes can be precisely known and the TDOA measurements are noise-free, linear system (6) is compatible. The solution is unique while the data matrix is of full rank.
In , a noise is considered at the right side of (6): The least squares (LSs) problem seeks to where denote the vector space spanned by the column vector of matrix . Once a minimizing is found, then any satisfying is called an LS solution and the corresponding LS correction. The unique LS solution can be obtained while the data matrix is of full rank:
The ordinary LS problem amounts to perturbing the observation vector by a minimum amount . The underlying assumption is that errors only occur in the vector and that the matrix is exactly known. However, the TDOA measurements always have noise, that is, is perturbed by a noise. Hence, both sides of (5) have perturbation according to term . Besides, in practice, the receiver locations may not be known exactly. As a result, the inaccuracy in receiver locations needs to be taken into account in practical environments. Therefore, considering only the perturbation at the right side of (6) is not enough. We should consider the perturbations at both sides.
3. Total Least Squares Solution
The definition of the total least squares method is motivated by the asymmetry of the least squares method that is corrected while A is not. Provided that both and are given data, it is reasonable to treat them symmetrically. One important application of TLS problem is parameter estimation in errors-in-variables models, that is, considering the measurements in [23, 24]. We assume that the measurement in and by where , , and , is compatible. The total least squares (TLSs) problem seeks to where denotes the Frobenius norm of matrix , that is, Once a minimizing is found, then any satisfying is called a TLS solution and the corresponding TLS correction .
When is of full rank, the closed-form expression of the basic TLS solution can be obtained as the following: where is the smallest singular value of . It can be proved that the TLS solution estimates the true parameter consistently, that is, Xtls converges to the solution of as the number of measurements tends to infinity, where denotes the Moore-Penrose pseudoinverse of matrix . This property of TLS estimates does not depend on any assumed distribution of the errors. Note that the LS estimates are inconsistent in this case.
In the following, the algorithm computation complexity is analyzed by considering the number of floating-point operations (FLOPS). The calculation of FLOPS is briefly described as follows: additions and multiplications count as one FLOP each. Adding matrices of sizes requires FLOPS. Multiplying matrices of sizes and requires FLOPS. Matrix inverse of size requires FLOPS. Singular value decomposition of matrix with size requires FLOPS. The computation overhead of three closed-form algorithms is investigated, that is, least squares (LSs) method in , two-stage weighted least squares (WLSs) method in  and the proposed TLS method. For -deployed nodes and dimension of source location parameter, the numbers of FLOPS in the LS, WLS, and the proposed TLS algorithms are , , and , respectively. It is to show that LS method is the most computationally efficient, whereas WLS method is two-stage least square and TLS method has singular value decomposition for matrix. It is clear that they all have comparable computation complexity since or for source localization problem.
4. Sensitivity Properties of the Solution
In this section, we will first examine how perturbations in and affect the solution . In this analysis the condition number of the matrix plays a significant role. The following definition generalizes the condition number of a square nonsingular matrix .
Definition 1. Let have rank . The condition number of is
where are the singular values of by decreasing order.
Matrices with small condition numbers are said to be well conditioned while the ones with large condition numbers are said to be ill-conditioned. Analyzing the effect of perturbation on the solution of linear system , we introduce the following lemma .
Lemma 1. If and , then
Theorem 1. Denote as the LS solution of unperturbed system , and is the LS solution of perturbed system with , . One further assumes that , , . Then, one has
Proof. Noting that and are full rank and since , we have Therefore, . Dividing by at both sides, we have
From the theorem we can see that, only when the perturbations are sufficiently small, the LS solution is a good estimator of the true solution of .
Additionally, we will show when the TLS solution has better performance than the LS solution for the perturbed model . Denote the singular value decomposition (SVD) of by where denote the singular value decomposition (SVD) of by where and denote the SVD of by where
The accuracy of TLS and LS solutions related to the perturbation effects on singular values and associated singular subspaces . Several papers have analyzed the bounds on the perturbation effects related to singular subspaces [28–30]. The most interesting results for sensitivity analysis of TLS solution are given in .
Definition 2. Denote two subspaces as and . For any unitary invariant norm, the distance between two subspaces is defined as the sine of the largest canonical angle where and are the projection operators [29, 30].
Recall the perturbed system ; LS projects and into the singular subspaces while the TLS projects and into the singular subspaces Furthermore, the real source location , since . Therefore, it is important to analyze the distance between , and . Assumeing that and have full rank, we can obtain the following corollary according to Theorem 2.
Corollary 1. One has
The interlacing theorem (see ) implies that Therefore, From Corollary 1 we can see that the upper bound of the distance between and is smaller than the upper bound of distance between and . This implies that the TLS solution is expected to be closer to its corresponding unperturbed subspace. Hence, the TLS solution is expected to be more accurate than the LS solution.
5.1. Simulation Setup
In this section, simulations are carried out to show the effectiveness of the proposed method. Two scenarios are investigated for their effects on localization performance, including Gaussian distribution and truncated Gaussian distribution for measurement noise and sensor node location error. In our simulation, unless otherwise specified, sensors are randomly deployed in a area with uniform distribution. An example is shown in Figure 1, where 30 nodes are uniformly distributed. The source is denoted as a triangle with red and the reference node is denoted as a square in blue. The exact location of the reference node can be known.
In order to show the improved performance of our proposed method with the existing closed-form method, we investigate LS method in  and WLS method in . Root mean square error (RMSE) is used as the criterion for localization performance. The following simulations are performed with 500 Monte Carlo trials. In all figures, the red solid line with square, black dash line with circle, and blue dotted dash line with triangle represent the results of TLS, WLS, and LS solutions, respectively.
5.2. Gaussian Case
In this case, we consider the Gaussian distribution for both measurement noise and sensor node location error. The effect on estimation performance for different measurement noise variance value is investigated. Measurement noise variance is changed in the range 10–100. The variance of perturbation is set to be a constant number 25. The localization performance variation with noise variance is depicted in Figure 2. As noise variance increases, localization performance degrades in all LS, WLS, and TLS algorithms. The TLS algorithm outperforms the LS and WLS algorithms.
In the second simulation, the effect on estimation performance with different variance of perturbation is investigated. The variance of perturbation is set to be varied from 10 to 100 and sensors are deployed uniformly. The measurement noise variance is set to be 50. The localization performance variation with variance of perturbation is depicted in Figure 3. The TLS algorithm outperforms the LS and WLS significantly with high-level variance of perturbation.
The estimation performance of three algorithms is also investigated with different numbers of deployed nodes. Figure 4 shows the RMSEs versus the number of nodes. Fifty nodes are uniformly generated in the field. Localization starts by using five randomly selected nodes for each algorithm, followed by adding more nodes of five in a group until all fifty nodes are used. The number of FLOPS is considered to evaluate the algorithm computational complexity with variation of the number of nodes. Results are given in Figure 5 with 2-dimensional source location parameter and 5–50 nodes. It can be seen that LS required the fewest FLOPS while TLS required the most FLOPS with SVD of matrix. Although the estimation performance is improved with more nodes for all algorithms, the computation overhead is also increased. is to show that LS method is the most computationally efficient, whereas WLS method is two-stage least square method and TLS method has singular value decomposition for matrix.
5.3. Truncated Gaussian Case
Since the white and Gaussian assumptions are unrealistic in many applications, we consider the truncated Gaussian distribution for both measurement noise and sensor node location error in this case. Let be a random variable with zero mean Gaussian distribution truncated in the interval ; its probability density function (pdf) is given by where is a normalizing constant, is the variance, and is the factor to extend the interval that the random variable lies at.
Compared with the Gaussian case, similar results can be obtained and are shown in Figures 6, 7, and 8. The estimation performance for the WLS algorithm distinctly degrades significantly. This is because the weight matrix for this WLS method is calculated according to the Gaussian assumption for the measurements noise and sensor node location error. The proposed TLS algorithm still maintains good estimation performance.
In this paper, the TDOA model for source localization in sensor networks has been considered. The total least squares (TLSs) algorithm has been developed for location estimation of a stationary source with sensor location uncertainty in which the uncertainty of the sensor location has been formulated as a perturbation. The sensitivity of the TLS solution has also been analyzed to show the advantages of our proposed algorithm. Compared with the existing methods which need the Gaussian assumption for both measurements noise and sensor location error, the TLS approach does not depend on any assumed distribution of the noise and errors. Simulation results show the superior performance of the proposed method.
- A. Hande, D. Yunus, and E. Cem, “Wireless healthcare monitoring with RFID-enhanced video sensor networks,” International Journal of Distributed Sensor Networks, vol. 2010, Article ID 473037, p. 10, 2010.
- F. Xia, L. Ma, J. Dong, and Y. Sun, “Network qos management in cyber-physical systems,” in Proceedings of the International Conference on Embedded Software and Systems Symposia (ICESS '08), pp. 302–307, IEEE, 2008.
- Y. Chan, H. Hang, and P. Ching, “Exact and approximate maximum likelihood localization algorithms,” IEEE Transactions on Vehicular Technology, vol. 55, no. 1, pp. 10–16, 2006.
- E. Weinstein, “Optimal source localization and tracking from passive array measurements,” IEEE Transactions on Acoustics, Speech, and Signal Processing, vol. 30, no. 1, pp. 69–76, 1982.
- R. O. Schmidt, “Multiple emitter location and signal parameter estimation,” IEEE Transactions on Antennas and Propagation, vol. 34, no. 3, pp. 276–280, 1986.
- J. Chen, K. Yao, and R. Hudson, “Source localization and beamforming,” IEEE Signal Processing Magazine, vol. 19, no. 2, pp. 30–39, 2002.
- Y. Huang, J. Benesty, G. Elko, and R. Mersereati, “Real-time passive source localization: a practical linear-correction least-squares approach,” IEEE Transactions on Speech and Audio Processing, vol. 9, no. 8, pp. 943–956, 2001.
- W. Hahn and S. Tretter, “Optimum processing for delay-vector estimation in passive signal arrays,” IEEE Transactions on Information Theory, vol. 19, no. 5, pp. 608–614, 1973.
- M. Wax and T. Kailath, “Optimum localization of multiple sources by passive arrays,” IEEE Transactions on Acoustics, Speech, and Signal Processing, vol. 31, no. 5, pp. 1210–1218, 1983.
- K. Cheung, H. So, W. Ma, and Y. Chan, “A constrained least squares approach to mobile positioning: algorithms and optimality,” Eurasip Journal on Applied Signal Processing, vol. 2006, Article ID 20858, p. 23, 2006.
- K. Yang, J. An, X. Bu, and G. Sun, “Constrained total least-squares location algorithm using time-difference-of-arrival measurements,” IEEE Transactions on Vehicular Technology, vol. 59, no. 3, Article ID 5342476, pp. 1558–1562, 2010.
- B. Friedlander, “A passive localization algorithm and its accurancy analysis,” IEEE Journal of Oceanic Engineering, vol. 12, no. 1, pp. 234–245, 1987.
- H. C. Schau and A. Z. Robinson, ““Passive source localization employing intersecting spherical surfaces from time-of-arrival differences,” IEEE Transactions on Acoustics, Speech, and Signal Processing, vol. 35, no. 8, pp. 1223–1225, 1987.
- J. O. Smith and J. S. Abel, “Closed-form least-squares source location estimation from range-difference measurements,” IEEE Transactions on Acoustics, Speech, and Signal Processing, vol. 35, no. 12, pp. 1661–1669, 1987.
- Y. T. Chan and K. C. Ho, “Simple and efficient estimator for hyperbolic location,” IEEE Transactions on Signal Processing, vol. 42, no. 8, pp. 1905–1915, 1994.
- M. D. Gillette and H. F. Silverman, “A linear closed-form algorithm for source localization from time-differences of arrival,” IEEE Signal Processing Letters, vol. 15, pp. 1–4, 2008.
- K. C. Ho, X. Lu, and L. Kovavisaruch, “Source localization using TDOA and FDOA measurements in the presence of receiver location errors: analysis and solution,” IEEE Transactions on Signal Processing, vol. 55, no. 2, pp. 684–696, 2007.
- K. Yang, G. Wang, and Z. Q. Luo, “Efficient convex relaxation methods for robust target localization by a sensor network using time differences of arrivals,” IEEE Transactions on Signal Processing, vol. 57, no. 7, pp. 2775–2784, 2009.
- S. Kay, Fundamentals of Statistical Signal Processing: Estimation Theory, Prentice Hall, 1993.
- A. Renaux, P. Forster, E. Boyer, and P. Larzabal, “Unconditional maximum likelihood performance at finite number of samples and high signal-to-noise ratio,” IEEE Transactions on Signal Processing, vol. 55, no. 5, pp. 2358–2364, 2007.
- K. K. Mada, H. C. Wu, and S. S. Iyengar, “Efficient and robust EM algorithm for multiple wideband source localization,” IEEE Transactions on Vehicular Technology, vol. 58, no. 6, pp. 3071–3075, 2009.
- U. Theodor, U. Shaked, and C. E. de Souza, “A game theory approach to robust discrete-time -estimation,” IEEE Transactions on Signal Processing, vol. 42, no. 6, pp. 1486–1495, 1994.
- S. van Huffel and J. Vandewalle, The Total Least Squares Problem: Computational Aspects and Analysis, Society for Industrial Mathematics, 1991.
- X. Zhang, Matrix Analysis and Application, Tsinghua University Press and Springer, 2004.
- I. Markovsky and S. van Huffel, “Overview of total least-squares methods,” Signal Processing, vol. 87, no. 10, pp. 2283–2302, 2007.
- G. Golub and C. van Loan, Matrix Computations, Johns Hopkins University Press, Baltimore, Md, USA, 1996.
- P. Wedin, “Perturbation theory for pseudo-inverses,” BIT Numerical Mathematics, vol. 13, no. 2, pp. 217–232, 1973.
- G. Stewart, “Error and perturbation bounds for subspaces associated with certain eigenvalue problems,” SIAM Review, vol. 15, no. 4, pp. 727–764, 1973.
- C. Davis and W. M. Kahan, “The rotation of eigenvectors by a perturbation. III,” SIAM Journal on Numerical Analysis, vol. 7, no. 1, pp. 1–46, 1970.
- P. Wedin, “Perturbation bounds in connection with singular value decomposition,” BIT, vol. 12, no. 1, pp. 99–111, 1972.
- R. C. Thompson, “Principal submatrices IX: interlacing inequalities for singular values of submatrices,” Linear Algebra and Its Applications, vol. 5, no. 1, pp. 1–12, 1972.