- About this Journal ·
- Abstracting and Indexing ·
- Advance Access ·
- Aims and Scope ·
- Annual Issues ·
- Article Processing Charges ·
- Articles in Press ·
- Author Guidelines ·
- Bibliographic Information ·
- Citations to this Journal ·
- Contact Information ·
- Editorial Board ·
- Editorial Workflow ·
- Free eTOC Alerts ·
- Publication Ethics ·
- Reviewers Acknowledgment ·
- Submit a Manuscript ·
- Subscription Information ·
- Table of Contents

International Journal of Distributed Sensor Networks

Volume 2012 (2012), Article ID 303895, 7 pages

http://dx.doi.org/10.1155/2012/303895

## Robust Interval-Based Localization Algorithms for Mobile Sensor Networks

^{1}Institut Charles Delaunay (ICD)—LM2S (STMR UMR CNRS 6279), Université de Technologie de Troyes, 12 rue Marie Curie, 10010 Troyes, France^{2}L2S—CNRS—SUPELEC, Université Paris-Sud, 91192 Gif-sur-Yvette, France^{3}LTCI—CNRS—Telecom-ParisTech, 75013 Paris, France^{4}Laboratoire FIZEAU (UMR CNRS 6525), Université de Nice Sophia-Antipolis, Parc de Valrose, 06108 Nice, France

Received 16 June 2011; Accepted 27 August 2011

Academic Editor: Yuhang Yang

Copyright © 2012 Farah Mourad et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

#### Abstract

This paper considers the localization problem in mobile sensor networks. Such a problem is a challenging task, especially when measurements exchanged between sensors may contain outliers, that is, data not matching the observation model. This paper proposes two algorithms robust to outliers. These algorithms perform a set-membership estimation, where only the maximal number of outliers is required to be known. Using these algorithms, estimates consist of sets of boxes whose union surely contains the correct location of the sensor, provided that the considered hypotheses are satisfied. This paper proposes as well a technique for evaluating the number of outliers to be robust to. In order to corroborate the efficiency of both algorithms, a comparison of their performances is performed in simulations using Matlab.

#### 1. Introduction

Mobile Sensor Networks (MSNs) have recently emerged as a challenging research field. An MSN consists of a large number of low-cost smart sensors with limited computational capacities and energy resources [1]. Due to the lack of a fixed infrastructure in MSNs, the sensors are able to move in an uncontrolled manner. For this reason and since sensed data are related to the locations of the sensors in almost all MSN applications, many researchers have focused on the localization problem. A first solution for sensor localization is to equip all sensors with global positioning systems (GPSs) [2]. However, this solution is nonpractical in MSNs, since GPS are expensive, high energy consuming, and having great sizes. The alternative solution consists of equipping a few number of sensors with GPS receivers. These sensors, aware of their locations, are called *anchors*. The remaining sensors, called *nonanchor nodes* or simply *nodes*, have unknown locations, and hence they need to be localized.

Many anchor-based algorithms have been proposed for sensor localization. For instance, Doherty et al. [3] propose a centralized technique for position estimation. Localization in [3] is formalized as a convex optimization problem, having connectivity measurements between sensors as constraints. In [4–6], different approaches requiring few anchors have been proposed. Local maps with relative positions are constructed using measured distances between nodes and their neighbors. A combination of these maps with known positions of anchors lead to absolute positions. Nevertheless, these techniques are not very robust because of errors accumulation while combining the maps. Authors in [7] propose a distributed static algorithm, where each node defines its position as the center of all observed anchors. In a different scenario [8], Galstyan et al. propose an online distributed technique, where nodes use their detection of a moving target to update their position estimates. Blatt and Hero [9] address the problem of source localization using sensors measurements. The problem is formulated as a convex problem that is solved using the aggregated projection onto convex sets (APOCSs) method. In [10–12], dynamic approaches, on the basis of sequential Monte-Carlo [13], are considered to estimate the positions of the nodes. The posterior distribution of the unknown positions is estimated recursively with a set of *particles*. Terwilliger et al. [14] propose to cover all possible solutions with the smallest enclosing disk. Alternative dynamic algorithms for sensor localization, using interval analysis [15], have been proposed in [16, 17]. Position estimates are boxes covering the possible locations of the sensors.

Existing methods have mainly considered the localization problem with the hypothesis that all measurements are consistent with the considered measurement model. However, in practical situations, outliers, that is, data not matching the measurement model, are encountered. Previously mentioned estimation techniques are not very robust to such outliers. In [18], Jaulin et al. propose a set-membership estimator robust to outliers based on interval analysis. Savarese et al. [19] present a distributed robust algorithm for sensor localization. The method is separated into two phases: the start-up phase, where first estimates of node positions are computed using hop counts to anchors, and the refinement phase, where nodes communicate with their neighbors to update their positions using a least-squares triangulation technique. Nevertheless, a number of factors influence the convergence of the refinement phase, such as the accuracy of first estimates and the magnitude of ranging errors. In [20], Rabbat et al. introduce a robust localization algorithm of an isotropic energy source using kernel averaging techniques. The proposed estimator is more robust than the least-squares estimator under a variety of conditions. Leger and Kieffer [21] present a distributed version of the estimation algorithm [18], assuming that the maximal number of outliers is known. In particular, a static distributed algorithm is proposed for source localization using received signal strength (RSS) measurements. The proposed method adapts the set inversion via interval analysis (SIVIA) algorithm [15] to evaluate a solution set.

In this paper, we propose an original adaptive approach for sensor localization in the presence of outliers. Assuming only that the maximal number of outliers is given, the proposed approach uses connectivity measurements in addition to a mobility model to address the localization problem. The solution is then given using either SIVIA or an alternative combinatorial technique. Another contribution of the paper is that it proposes a technique for evaluating the maximal number of outliers to be robust to. Moreover, using a connectivity-based observation model, the paper compares the performances of both robust localization algorithms.

The rest of the paper is organized as follows. Section 2 introduces the localization problem. A description of the SIVIA algorithm and the combinatorial technique is then given in Section 3. Section 4 provides simulation results, whereas Section 5 concludes the paper.

#### 2. Problem Statement

The proposed method is an anchor-based method, where each node exchanges information with anchors to localize itself. Consider a network of anchors and mobile nodes. All sensors are assumed to be in the same plane: their locations at time are given by , , for anchors and , , for nodes. In order to reduce the communication costs during the localization process, the proposed method assumes that each mobile node does not exchange information with other nodes. For this reason and without loss of generality, we focus on the localization of one generic mobile node , and we thus drop the index .

##### 2.1. Observation Model

At time , the mobile node receives signals from a set of anchors with specific received signal strengths (RSSs) denoted by , . These RSSs are assumed to follow the Okumura-Hata model [22] In (1), is in , is the power measured (in ) at a reference distance from the anchor , is the path-loss exponent, is the Euclidian distance between the anchor and the considered node, and is the measurement noise, modeled as zero-mean Gaussian with variance .

In practice, and may vary from one anchor to the other, and may be quite large. Given the RSS values, the proposed model may lead to inaccurate distance estimates. For this reason, only connectivity information are employed and (1) is only used to determine whether the node is in the vicinity of the th anchor. Let be some RSS threshold corresponding to a distance , which is the sensing range of the sensors. Then, if , the distance from the anchor to the node is deemed less than . Anchors for which are called *detected anchors*. Only detected anchors are then taken into account for the localization. The observation model is then given by
where is the set of indices of detected anchors, that is, whose emitted signals have RSS at the node larger than . The observation model is thus given by a set of disk equations centered on the detected anchors and having as radius.

In real environments, measurements may not follow exactly the observation model. Indeed, due to the additive noise and the inaccuracy of the parameter values, a measured RSS could be less than while (2) is satisfied for real and vice versa. In the first case, the anchor is assumed to be out of the vicinity of the node, which is not true, and thus, a correct measurement is omitted, whereas in the second case, an outlier is obtained. The proposed approach takes such outliers into consideration. Using the connectivity-based model, it assumes that the maximal number of outliers is known and denoted by . In other words, it considers that measurements at minimum are correct at each time step.

##### 2.2. Mobility Model

The proposed method takes also advantage of the mobility of the nodes to improve the estimation accuracy. Any available information about the motion of the node could be used to define the mobility model. This paper proposes a very general mobility model, where only the maximal velocity of the node is assumed to be known. Then, the positions of the generic node at time steps and satisfy More generally, the mobility model could be reformulated as follows: where is some parameter only known to belong to some known interval (here, ).

##### 2.3. Description of the Robust Set-Membership Localization

Estimating the location of the sensor at time consists of finding the set of all locations consistent with the mobility model (4) and at least observation constraints (2). In other words, these locations should be in the vicinity of at least detected anchors. A set-membership estimator [23] robust to outliers [24] at time is then obtained, since any measurements instead of measurements are considered for the estimator.

Assume that belongs to some set . According to this approach, and to compute , a *predicted* set is first evaluated using the mobility model
Measurements are then taken into account to correct as follows:
where is the set of all -combinations of indices in , is a set of indices belonging to , and
Then, denotes the set of locations of that satisfy the specific observation constraints denoted in , whereas denotes the set of locations of that satisfy any observation constraints. The number of combinations to be considered in (6) is , where denotes the factorial of .

An alternative definition of inspired by [24] is where This definition does not involve any combinatorial. One may easily prove that (6) and (8) are equivalent. This technique would be used in the following to solve the localization problem.

#### 3. Localization Algorithms

Solving the localization problem in a guaranteed way consists of finding the set of all node locations that satisfy the problem constraints while being robust to outliers. In this paper, interval analysis [15] is employed to achieve this goal. At each time step, the proposed method computes a set of nonoverlapping boxes, called *subpaving* [15], whose union covers the solution set . Assume that is the solution subpaving containing the actual position of the generic node at time . One has
where is a two-dimensional box and is the number of boxes in . As shown in Section 2.3, finding involves a prediction phase followed by a correction phase.

##### 3.1. Prediction Phase

Assume that is the subpaving obtained at time . Computing the predicted set may be done by evaluating (5), where is replaced by , which is quite difficult. Nevertheless, for each box , the corresponding box has to be compliant with the mobility model (3), leading to the following constraint: Relaxing (11) yields the following expressions of and : Let be the set of all boxes evaluated with (12). One may prove that . The convex hull [15] of is the smallest box containing . Its components are defined as where and are the low and high endpoints of , respectively. is a rectangular area that covers all possible locations that could be taken by the node at time according to its mobility model. The convex hull is used in the correction phase instead of to reduce the computational complexity.

##### 3.2. Correction Using the SIVIA Algorithm

The SIVIA algorithm [15] performs a succession of bisections and selections of boxes compliant with the localization constraints. Let be a box, set initially to . The following test function is evaluated: where is equal to 1 if and 0 otherwise, while is equal to 1 if and 0 otherwise. Graphically, means that the box is entirely included in the connectivity disk centered on the anchor , whereas means that the box is entirely outside the connectivity disk centered on the anchor .

The box is added to the solution if , meaning that all satisfy at least observation constraints. Boxes inconsistent with more than observation constraints () are withdrawn, whereas others having a nonempty intersection with the solution set () are bisected. The box is bisected into two subboxes of equal area and along the dimension having the largest width. The subboxes are then tested, kept in the solution, withdrawn, or bisected until the maximal width of the resulting subboxes is less than a given threshold . An illustration of the proposed method is given in Figure 1. It shows four detected anchors, one of them being an outlier (). The exact solution of the problem is given in light gray, whereas the subpaving provided by SIVIA is given in both light and dark gray.

##### 3.3. Correction Using the Combinatorial Technique

In this algorithm, both the combinatorial formulation (6) and the convex hull including all propagated boxes using (13) are considered. Based on (6), the proposed algorithm consists of contracting the initial domain with each combination of observations. For this reason, all observation equations indicated in are iterated in the *forward-backward* contractor [15]. This contractor iterates all constraints without any prior order until no contraction is possible. The resulting region is the smallest box covering the intersection of with all the observation disks of . In order to use each constraint of (2) in the forward-backward contractor, one should express as a function of , and vice versa as follows:
for each detected anchor where and . Using intervals and having an initial box , these inequalities would lead to the contracted box defined as follows:
where and . Then, considering the combination of constraints, and starting with the predicted domain (initially ), the contracted box would be obtained by performing the following steps (Algorithm 1).

Each nonempty box , , is added to the solution at time . The boxes in may have nonempty intersections. Consequently, in order to obtain nonoverlapping boxes, one could apply the following procedure. (i)Consider an empty final set.(ii)Sort all boxes of according to their decreasing areas. (iii)Add the largest box to the final set.(iv)Select the following box in the sorted list. (v)Deprive it from all boxes already added to the final set. (vi)Add the result to the set.

Steps (iv) to (vi) are repeated until all sorted boxes are considered. Recall that depriving a box from a box yields a set of nonoverlapping boxes covering all the points of not included in . An illustration of the proposed method is given in Figure 2. It shows four detected anchors, one of them yielding an erroneous observation. The first solution leads to two boxes, the box *①* and the one in dashed line. Using the depriving technique, three nonoverlapping boxes *①*, *②*, and *③* (in bold line) are then selected covering the exact solution (in light gray).

##### 3.4. Evaluation of the Number of Outliers to Tolerate

Consider the vector of RSS measurements. Determining from the maximal number of outliers , which have to be tolerated, may be done by choosing such that , where is the probability that or less outliers have occurred knowing and is some tuning parameter. One has where is some pattern indicating whether anchor is providing an outlier () or a reliable measurement (). Now, Let and be the noisy and noiseless RSS measurements provided by the th anchor. The probability that the th anchor provides an outlier is null () if , since in this case, the anchor is not detected and will thus not provide any outlier. Otherwise, is given as follows: where is the th measurement noise. Then, assuming that all measurement noise samples are independent, Now, since one is able to evaluate and to choose .

#### 4. Simulations

In this section, we compare the SIVIA-based method (SBL) to the combinatorial-based one (CBL). We consider a group trajectory model, where sensors are moving along similar trajectories over . We deploy 31 sensors in a area, 30 of them being anchors. Since nodes use only anchors information to localize themselves, we consider the localization of a single mobile node. The simulated trajectory of the node is with a maximal velocity of and a localization step of . RSS measurements are generated using the distances between the considered node and all anchors and model (1) with , , and . Moreover, is set to and to . In order to compare the SBL algorithm to the CBL algorithm, we take different values of the variance of the measurement noise, leading to different numbers of outliers. In fact, for each value of , is evaluated using the results in Section 3.4, with .

Note that the initial position of the node is supposed to be known. One may also use the whole deployment area as initial domain. All simulations are performed on an Intel(R) Core(TM)2 CPU at and RAM, using MATLAB 6.1.

We first set , yielding either none or only one outlier per time step. Applying the results of Section 3.4 one obtains , , and . With , one gets . With , one would take , which leads to less accurate estimates (less measurements are taken into account) but still containing the solution set. Note that if too less outliers are tolerated, one may obtain empty solution sets or sets not containing the actual location of the node.

With , Figure 3 shows the subpavings obtained with both SBL and CBL methods. Note that the threshold of SIVIA is set to . The plot shows that both results cover the actual position of the node. The average ratio of the areas of subpavings obtained with SBL over those obtained with CBL is equal to 0.827. SBL leads to a more accurate estimate. However, the average time required for the localization process is equal to per time step with SBL and to with CBL. This difference is due to the limited number of combinations considered in CBL at each time step ( with ). The average number of boxes per subpaving is equal to 120 with SBL, whereas it is equal to 3 with CBL. Here, CBL is less memory consuming. Note that with a precision parameter higher than in SIVIA, SBL needs less computing time but provides larger subpavings.

In a second set of experiments, varies from to . Figure 4 shows the maximal number of outliers , the total number of considered anchors , the average computing time per step, and the ratio of the average subpaving areas obtained with SBL over CBL as a function of . The simulated data are generated ten times for each , and the results are thus average values over the set of simulations. The plot shows that CBL is faster than SBL when the standard deviation is less than . In these cases, is less than 4, and the maximal number of considered anchors is less than 13. When the noise variance increases, the computation time of the CBL method becomes quite large compared to SBL. Choosing one algorithm or the other depends on the anchor density and on the proportion of outliers.

#### 5. Conclusion

This paper proposes and compares two techniques for mobile sensor localization that are robust to any fixed number of erroneous measurements. Using interval analysis, the estimates are sets of nonoverlapping boxes containing the actual location. The SIVIA-based algorithm (SBL) bisects the search region leading to many boxes describing efficiently the solution set; the combinatorial method (CBL) leads to larger boxes including the solution as well. In terms of computing time, CBL is more efficient than SBL for a small number of outliers, whereas the complexity of SBL is almost constant whatever the number of tolerated outliers.

#### References

- I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: a survey,”
*Computer Networks*, vol. 38, no. 4, pp. 393–422, 2002. View at Publisher · View at Google Scholar · View at Scopus - B. Hofmann-Wellenhof, H. Lichtenegger, and J. Collins,
*Global Positioning System: Theory and Practice*, Springer, New York, NY, USA, 1994. - L. Doherty, K. S. J. Pister, and L. El Ghaoui, “Convex position estimation in wireless sensor networks,” in
*Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies*, pp. 1655–1663, Anchorage, Alaska, USA, April 2001, http://www.citeulike.org/group/7128/article/3014236. View at Publisher · View at Google Scholar · View at Scopus - S. Capkun, M. Hamdi, and J.-P. Hubaux, “GPS-free positioning in mobile ad-hoc networks,” in
*Proceedings of the 34th Annual Hawaii International Conference on System Sciences (HICSS-34 '01)*, pp. 3481–3490, Maui, Hawaii, January 2001. - D. Niculescu and B. Nath, “Ad-hoc positioning system (APS),” in
*Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '01)*, vol. 5, pp. 2926–2931, San Antonio, Tex, USA, 2001, http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=965964. - C. Savarese, J. M. Rabaey, and J. Beutel, “Locationing in distributed ad-hoc wireless sensor networks,” in
*Proceedings of the IEEE Interntional Conference on Acoustics, Speech, and Signal Processing (ICASSP '01)*, vol. 4, pp. 2037–2040, Salt Lake City, Utah, USA, May 2001, http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=940391. View at Publisher · View at Google Scholar · View at Scopus - D. Moore, J. Leonard, D. Rus, and S. Teller, “Robust distributed network localization with noisy range measurements,” in
*Proceedings of the Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys '04)*, pp. 50–61, ACM, Baltimore, Md, USA, November 2004, http://doi.acm.org/10.1145/1031495.1031502. View at Publisher · View at Google Scholar - A. Galstyan, B. Krishnamachari, K. Lerman, and S. Pattem, “Distributed online localization in sensor networks using a moving target,” in
*Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks (IPSN '04)*, pp. 61–70, April 2004, http://ieeexplore.ieee.org/xpls/abs all.jsp?arnumber=1307324&tag=1. View at Scopus - D. Blatt and A. O. Hero, “APOCS: a rapidly convergent source localization algorithm for sensor networks,” in
*Proceedings of the IEEE/SP 13th Workshop on Statistical Signal Processing*, pp. 1214–1219, July 2005, http://ieeexplore.ieee.org/xpls/abs all.jsp?arnumber=1628781. View at Scopus - L. Hu and D. Evans, “Localization for mobile sensor networks,” in
*Proceedings of the 10th Annual International Conference on Mobile Computing and Networking (MobiCom '04)*, pp. 45–57, ACM, Philadelphia, Pa, USA, 2004, http://doi.acm.org/10.1145/1023720.1023726. View at Publisher · View at Google Scholar - A. Baggio and K. Langendoen, “Monte Carlo localization for mobile wireless sensor networks,”
*Ad Hoc Networks*, vol. 6, no. 5, pp. 718–733, 2008. View at Publisher · View at Google Scholar · View at Scopus - Y. Jiyoung, Y. Sungwon, and C. Hojung, “Multi-hop-based Monte Carlo localization for mobile sensor networks,” in
*Proceedings of the 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON '07)*, pp. 162–171, San Diego, Calif, USA, June 2007, http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=04292828. View at Publisher · View at Google Scholar - A. Doucet, S. Godsill, and C. Andrieu, “On sequential Monte Carlo sampling methods for Bayesian filtering,”
*Statistics and Computing*, vol. 10, no. 3, pp. 197–208, 2000. View at Scopus - M. Terwilliger, C. Coullard, and A. Gupta, “Localization in ad hoc and sensor wireless networks with bounded errors,” in
*Proceedings of the 15th International Conference on High Performance Computing (HiPC '08)*, pp. 295–308, Springer, Bangalore, India, 2008, http://portal.acm.org/citation.cfm?id=1791889.1791922. - L. Jaulin, M. Kieffer, O. Didrit, and E. Walter,
*Applied Interval Analysis*, Springer, 2001. - F. Mourad, H. Snoussi, F. Abdallah, and C. Richard, “Anchor-based localization via interval analysis for mobile ad-hoc sensor networks,”
*IEEE Transactions on Signal Processing*, vol. 57, no. 8, pp. 3226–3239, 2009. View at Publisher · View at Google Scholar · View at Scopus - F. Mourad, H. Snoussi, F. Abdallah, and C. Richard, “Model-free interval-based localization in manets,” in
*Proceedings of the IEEE 13th Digital Signal Processing Workshop and 5th IEEE Signal Processing Education Workshop (DSP/SPE '09)*, pp. 474–479, Marco Island, Fla, USA, January 2009. View at Publisher · View at Google Scholar · View at Scopus - L. Jaulin, E. Walter, and O. Didrit, “Guaranteed robust nonlinear parameter bounding,” in
*Proceedings of the IMACS Multiconference: Symposium on Modelling, Analysis and Simulation (CESA '96)*, pp. 1156–1161, Lille, France, 1996. - C. Savarese, J. M. Rabaey, and K. Langendoen, “Robust positioning algorithms for distributed ad-hoc wireless sensor networks,” in
*Proceedings of the General Track of the Annual Conference on USENIX Annual Technical Conference*, pp. 317–327, 2002, http://portal.acm.org/citation.cfm?id=647057.713854. - M. Rabbat, R. Nowak, and J. Bucklew, “Robust decentralized source localization via averaging,” in
*Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '05)*, pp. V1057–V1060, March 2005. View at Publisher · View at Google Scholar · View at Scopus - J. Leger and M. Kieffer, “Guaranteed robust distributed estimation in a network of sensors,” in
*Proceedings of the 35th IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '10)*, pp. 3345–3381, Dallas, Tex, USA, March 2010, http://www.lss.supelec.fr/~publi/TWljaGVsIEtJRUZGRVI=_ICASSP_Leger_10.pdf. - A. Medeisis and A. Kajackas, “On the use of the universal Okumura-Hata propagation prediction model in rural areas,” in
*Proceedings of the 51st Vehicular Technology Conference (VTC '00)*, pp. 1815–1818, Tokyo, Japan, May 2000. View at Scopus - M. Milanese, J. Norton, H. Piet-Lahanier, and E. Walter, Eds.,
*Bounding Approaches to System Identification*, Plenum Press, New York, NY, USA, 1996. - H. Lahanier, E. Walter, and R. Gomeni, “OMNE: a new robust membership-set estimator for the parameters of nonlinear models,”
*Journal of Pharmacokinetics and Biopharmaceutics*, vol. 15, no. 2, pp. 203–219, 1987. View at Scopus