- About this Journal
- Abstracting and Indexing
- Aims and Scope
- Annual Issues
- Article Processing Charges
- Articles in Press
- Author Guidelines
- Bibliographic Information
- Citations to this Journal
- Contact Information
- Editorial Board
- Editorial Workflow
- Free eTOC Alerts
- Publication Ethics
- Reviewers Acknowledgment
- Submit a Manuscript
- Subscription Information
- Table of Contents
Journal of Applied Mathematics
Volume 2013 (2013), Article ID 706064, 6 pages
Research on the WSN Node Localization Based on TOA
School of Information Engineering, Shenyang University of Chemical Technology, Shenyang 110142, China
Received 11 August 2013; Accepted 23 September 2013
Academic Editor: Tao Zou
Copyright © 2013 Qing-hui Wang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Regarding the tracking of moving target in the large-scale fixed scene, a new routing algorithm of LAODV in the principle of TOA localization is proposed. Then, the participation field of the fixed node based on the node location information is properly controlled, while the routing request area is reduced through combination of AODV and LAR during transmission of the location information. Simulation results show that the proposed algorithm renders satisfactory performance in terms of average delay reduction from end to end, packet loss rate, and routing overhead. As a result, the delay and system overhead during localization could be minimized.
LBS service is developing along with rapid economic growth and great market potential. Also, wireless localization technology is one of the favorite research topics in recent years, where the position of the event or the node position is crucial for detection of sensor node [1, 2]. Normally, the wireless localization can be realized through satellite technology or ground technology . Due to constraints of the node, such as the limited electric energy, huge quantity, and specific application environments, it is difficult to obtain the node coordinate with artificial measurement or allocation. Thus, implementation of expensive satellite wireless localization seems infeasible . As for the ground wireless localization technology, the target localization is realized through multipoint coordination, the advantages of which include the distributed feature, low complexity, high precision, and good generality. The TOA-based (Time of Arrival) localization technology has been widely applied in the ground wireless localization [5####^~^~^~^~^~^####x2013;7]. Also, the moving node will send the location package to the neighboring node periodically, while the fixed node will respond back to the moving node once received. Therefore, there are alot of fixed nodes participating in the localization process, which will generate heavy communication overhead and reduced localization bandwidth.
There is a high demand for low-cost high-precision localization scheme in various fields, such as industrial field, safety production management, security, and training. In the security monitoring, the current patrol system could be totally replaced, and the real-time position and route of the security personnel are clearly visible, so that prompt action of emergency can be taken. Moreover, the ####^~^~^~^~^~^####x201c;virtual fence####^~^~^~^~^~^####x201d; is set up based on the geographic location of the visitors and the authorized condition to track the visitor. Then, entrance permission to particular region is conditionally issued. With increasing coalmine accidents, safety production situation is highly desired, as the administrative staff can monitor the location and situation of each miner remotely through the electronic tag wear by the miner or equipped on the delivery vehicles . Furthermore, in the training of firemen, the training personnel in the building can be located and tracked through the allocated node in each floor. Such specific subject simulation can significantly improve the training quality and effectiveness.
In this paper, the TOA-based distance measurement method is proposed to localize the moving node. During the distance measurement and localization, limited nodes are chosen, so that the localization delay and system overhead could be reduced. During data transmission, the location information of the node is applied to restrict the routing request region through combination of AODV (Ad hoc On-Demand Distance Vector Routing) with LAR (Location-Aided Routing). As a result, the transmit time of the RREQ (Route Request) package is reduced along with improved system transmission performance, which is verified by simulation study with NS2 emulator.
2. TOA Localization Algorithm
TOA  refers to the time for the signal to travel from the sending node to the receiving node. Given signal transmission speed, by measuring the signal transmission time to calculate the distance between two nodes. In this paper, by measuring RTOF (Roundtrip-Time Of Flight) to calculate the distance between two nodes, as shown in Figure 1 the equation for the distance between two nodes is where is the moment when the sending node sends signals, is the moment when the receiving node receives signals, is the moment when the receiving node sends response signals, is the moment when the sending node receives response signals, and is the distance between the sending node and receiving node.
In the large-scale fixed field, the moving node is required for localization, while the fixed node is the one with known information. The neighboring nodes are those within the radius of sensor node communication. The distance from the moving node to the fixed one can be obtained with TOA distance measurement method, as described earlier. When the distance from the moving node to at least three fixed nodes is known, the location of moving node can be calculated with trilateration .
3. AODV Protocol
AODV is the routing protocol based on the distance vector algorithm, which integrates the target serial number of DSDV and the on-demand routing discovery in DSR . This protocol mainly includes routing discovery and routing maintenance, where the former is only requested upon need to save the routing overdue.
When the source node communicating with other nodes fails to reach the routing of destination node, it requires the grouping of RREQ. After other nodes receive this RREQ, whether such information exists or not is checked. Then, the information should be abandoned when necessary. Otherwise, it should record the RREQ in this routing table and broadcast this RREQ continuously until some central node reaches the routing of destination node, or the routing request grouping reaches the destination node.
4. LAODV Algorithm
In this paper, localization of the moving node is desired, while the fixed one provides assistance. First, the moving node broadcasts a data package with location information of the moving nodes to the neighboring node periodically. Then, the distance between this node and the moving one should be calculated once the fixed nodes receive it within the broadcasting range, and decision of whether response information back to the moving nodes should be sent is made. In this algorithm, only four fixed nodes near to the moving node participate, so that the quantity of the involved nodes is limited. Therefore, the average delay and system overhead of the localization are minimized.
In AODV protocol, the node requests for the routing of the destination node through broadcasting RREQ message gradually. Such a flooding routing method will unfortunately generate substantial RREQ message, resulting in a tremendous signal conflict and protocol overhead. The proposed protocol will add the thought of LAR protocol , which will transfer the data package selectively during the process of routing discovery within the appointed routing area.
As shown in Figure 2, node S is the moving node, D is the gateway, others are fixed nodes, and their location coordinates are known. Each fixed node broadcasts its location information to the whole network, after other fixed nodes receive it, record information to their location information table, so that each fixed node has the position information of the other nodes. The moving node S broadcasts a location package, including the location coordinate of S calculated in the last moment. After the fixed nodes receive this package within the broadcasting scope, it can calculate the distance between the node and other fixed nodes with the moving node S. Through comparison, to judge whether the node is one of the four nodes closest to the moving node S, if it is, just send a response information, including the location coordinates of fixed nodes. In this case, only nodes A, B, P, and M send response information.
Moving node S gets the location coordinates of A, B, P, and M which are , , , and , respectively through the response information, and through the TOA-based distance measurement method can get the distances between them and the moving node S as , , , and , respectively. Given the coordinate of the moving node S by , the following equation can calculate the location coordinate of the moving node:
Meanwhile, the source node S sends its location coordinate to the destination node D. As the routing information of D is not reachable, node S will send RREQ to seek for the routing to D with its location information included in RREQ. At first, a rectangular request region with two apexes of nodes S and D is determined. When node P out of the region receives the request package, decision of whether it is within the request region will be made, and the invalid grouping could be abandoned according to the location information. Then, node M within the region will transfer the grouping in the request region with its own location information included in the RREQ package. The new request region is established by the source node and destination node, until the node within the region reaches the radio-frequency scope of node D and the routing discovery is successful. Hence, the source node could send its own location coordinate information to the gateway according to this new route.
5. The Specific Process of Algorithm
(1)Each fixed nodes broadcasts a location package including its location information to the whole network. After other fixed node receive it, record information to their location information table.(2)The moving node broadcasts a location package, including the location coordinate calculated in the last moment.(3)After fixed nodes receive the package, calculate the distance between the node and other fixed nodes with the moving node.(4)To determine whether the node is one of the four nodes closest to the moving node, if it is, just send a response information.(5)Given four fixed node coordinates, and through the TOA-based distance measurement method can get the distances between them and the moving node, again through the trilateration it can calculate the moving node coordinate.
6. Simulation and Analysis
6.1. Principle of NS2
6.2. The Simulation Scene Set
As shown in Figure 4, a rectangular simulation field of 1000####^~^~^~^~^~^####x2009;m ####^~^~^~^~^~^####x2a; 1000####^~^~^~^~^~^####x2009;m with 33 nodes is assumed, 26 of which are fixed nodes and the others are moving nodes. The distance of the adjacent fixed nodes is 150####^~^~^~^~^~^####x2009;m, and four nodes form the square grid. The highest movement speed of the node is 13####^~^~^~^~^~^####x2009;m/s, and the simulation time is set as 200 seconds. The CBR data flow will be established from every moving node to the gateway, and the data package of 512 bytes will be sent with a speed of 4####^~^~^~^~^~^####x2009;packet/s. More simulation parameters are illustrated in Table 1.
After simulation scene has been setted, writing TCL script simulation is carried out on the protocol. After the simulation will be get trace and nam files, the trace file is a data storage, nam file is the whole process of simulation of dynamic demonstration. In order to analyze a large amount of data of the trace file, we need to write the gawk program for the extraction and processing of effective data (calculate the average end-to-end delay, Package loss probability, etc.). In the end, using gnuplot drawing tools will be extracting data into two-dimensional graphics which can be more intuitive to analyze the protocol performance.
6.3. Analysis of Location Delay and System Overhead
In this paper, average localization delay refers to the average time for the moving node to send localization package until receiving response package, the system overhead refers to the proportion between the fixed nodes send response package number and the moving nodes send localization package number. Figures 5 and 6 show that the average localization delay of the algorithm is 0.00021, the system overhead is 4.8, while the AODV and system overhead are 0.00033 and 7.7, respectively. Obviously, the new algorithm is advantageous in terms of localization delay and system overhead. This is mainly because the quantity of the fixed nodes participating in location is limited, and the relative distance from the fixed nodes to the moving nodes is short.
6.4. Performance Analysis of Data Transmission
In this paper, the performance index, including the average end-to-end delay of the network, the packet loss probability and routing overhead, is evaluated.
(1)####^~^~^~^~^~^####x2009;####^~^~^~^~^~^####x2009;Average End-to-End Delay. The average time for the moving node to send the data package until the gateway receives the data package successfully, which is related to smoothness of the network. The smaller the delay is, the smoother the network will be. The unit is second.
Figure 7 compares the average end-to-end delay of LAODV and AODV. Clearly, the delay of the LAODV protocol is smaller than that of the AODV protocol, as the location information of the node is added into the improved protocol. Through the calculation of the routing request area, it improves the seeking efficiency of the node for routing. When the flexible routing is interrupted due to the moving node, it will establish a new routing towards the destination node rapidly through the discovery mechanism of LAODV. Then, the seeking time for the route could be reduced, and the smoothness of the data transmission in the network is guaranteed.
(2) Package Loss Probability. The proportion of the total lost data grouping is against the sent data grouping in the network. Then, the successful data transmission proportion in the whole network can be known, as well as the proportion of the lost data package during the transmission process due to the link failure. This parameter is related to the efficiency of the data transmission.
Figure 8 shows comparison of the packet loss probability between the two protocols. It can be seen that the packet loss probability decreases gradually after the routes are established, and the packet loss probability of LAODV is smaller than that of AODV.
(3)####^~^~^~^~^~^####x2009;####^~^~^~^~^~^####x2009;Routing Overhead. The proportion between the total number of bytes and total message bytes of all the messages controlled by the route (including RREQ, RREPs and RERR messages). As for the grouping transmitted by various routes, a single bounce will trigger a message transmission. The routing overhead is mainly used for balancing the efficiency of the routing protocol. The smaller the routing overhead is, the narrower bandwidth is needed to reach the destination node.
Figure 9 shows the comparison of the routing overhead for two protocols. The routing overhead of LAODV is obviously smaller than that of AODV, as LAODV sets the routing request region utilizing the node location information. Then, the quantity of the transferred RREQ is smaller than that with AODV protocol, and the redundant routing request information is reduced. As a result, the routing overhead decreases accordingly.
In this paper, an approach for tracking the moving target and transmitting the location information in the large-scale fixed scene is developed. During the localization process, the quantity of fixed nodes participating in location is limited, so that the network overhead is reduced and the bandwidth of the system location by taking advantage of the location information of the located nodes is optimized. During the process of uploading the location information of moving nodes to the gateway, the quantity of request package transferred during the routing discovery with the node location information is also properly controlled. The effectiveness of the algorithm has been verified by the simulation results.
- C. Savarese, J. M. Rabaey, and J. Beutel, “Locationing in distributed ad-hoc wireless sensor networks,” in Proceedings of the IEEE Interntional Conference on Acoustics, Speech, and Signal Processing (ICASSP '01), vol. 4, pp. 2037–2040, IEEE, May 2001.
- F. Viani, P. Rocca, G. Oliveri, D. Trinchero, and A. Massa, “Localization, tracking, and imaging of targets in wireless sensor networks: an invited review,” Radio Science, vol. 46, no. 5, Article ID RS5002, 2011.
- P. Keikhosrokiani, N. Mustaffa, N. Zakaria, et al., “Wireless positioning techniques and location-based services: a literature review,” in Multimedia and Ubiquitous Engineering, pp. 785–797, Springer, Amsterdam, The Netherlands, 2013.
- W. Chen, “Cooperative limiting localization schemes for wireless sensor networks,” in Proceedings of the 1st International Conference on Innovative Computing, Information and Control (ICICIC '06), vol. 2, pp. 425–428, IEEE, September 2006.
- J. Shen, A. F. Molisch, and J. Salmi, “Accurate passive location estimation using TOA measurements,” IEEE Transactions on Wireless Communications, vol. 11, no. 6, pp. 2182–2192, 2012.
- J. He, S. Li, K. Pahlavan, et al., “A realtime testbed for performance evaluation of indoor TOA location system,” in Proceedings of the IEEE International Conference on Communications (ICC '12), pp. 482–486, IEEE, 2012.
- H. Jhi, J. Chen, C. Lin, and C. Huang, “A factor-graph-based TOA location estimator,” IEEE Transactions on Wireless Communications, vol. 11, no. 5, pp. 1764–1773, 2012.
- S. Jiping, “Personnel position monitoring technology and system in underground mine,” Coal Science and Technology, vol. 38, no. 11, pp. 1–4, 2010.
- A. Harter, A. Hopper, P. Steggles, A. Ward, and P. Webster, “The anatomy of a context-aware application,” Wireless Networks, vol. 8, no. 2-3, pp. 187–197, 2002.
- F. Izquierdo, M. Ciurana, F. Barceló, J. Paradells, and E. Zola, “Performance evaluation of a TOA-based trilateration method to locate terminals in WLAN,” in Proceedings of the 2006 1st International Symposium on Wireless Pervasive Computing, pp. 1–6, IEEE, January 2006.
- C. Perkins, E. Belding-Royer, and S. Das, “Ad hoc on-demand distance vector (AODV) routing,” Tech. Rep. RFC 3561, Internet RFCs, 2003.
- Y. Ko and N. H. Vaidya, “Location-Aided Routing (LAR) in mobile ad hoc networks,” Wireless Networks, vol. 6, no. 4, pp. 307–321, 2000.
- A. Tuteja, R. Gujral, and S. Thalia, “Comparative performance analysis of DSDV, AODV and DSR routing protocols in MANET using NS2,” in Proceedings of the International Conference on Advances in Computer Engineering (ACE '10), pp. 330–333, IEEE, Bangalore, India, June 2010.