Abstract
Network virtualization has become pervasive and is used in many applications. Through the combination of network virtualization and wireless sensor networks, it can greatly improve the multiple applications of traditional wireless sensor networks. However, because of the dynamic reconfiguration of topologies in the physical layer of virtualized sensor networks (VSNs), it requires a mechanism to guarantee the accuracy of estimate values by sensors. In this paper, we focus on the distributed Kalman filter algorithm with dynamic topologies to support this requirement. As one strategy of distributed Kalman filter algorithms, diffusion Kalman filter algorithm has a better performance on the state estimation. However, the existing diffusion Kalman filter algorithms all focus on the fixed topologies. Considering the dynamic topologies in the physical layer of VSNs mentioned above, we present a diffusion Kalman filter algorithm with dynamic topologies (DKFdt). Then, we emphatically derive the theoretical expressions of the mean and meansquare performance. From the expressions, the feasibility of the algorithm is verified. Finally, simulations confirm that the proposed algorithm achieves a greatly improved performance as compared with a noncooperative manner.
1. Introduction
With the rising of Big Data analysis and Smart City Conception, a variety of mobile applications such as Multipath Data Transfer [1, 2], target tracking [3–5], environmental monitoring [6, 7], VideoOnDemand Services [8–10], and distributed data storage have reshaped our daily life. In this context, wireless sensor networks (WSNs) as a key technology or such applications have drawn a significant attention from both academia and industry [11–16]. However, traditional WSNs consist of large number of heterogeneous sensors having capability of sensing, computation, and wireless communication, which make them fail to share of infrastructure and support the large scale sensing coverage. Fortunately, the rapid development of network virtualization opens a new opportunity for wireless sensor networks and creates a new sensing paradigm named virtualized sensor networks (VSNs) [17–19]. The salient feature of VSNs is enabling heterogeneous WSNs to coexist on a shared physical substrate. This allows VSNs to be more scalable and flexible, and, therefore, VSNs have become a promising solution for large scale sensing task. Despite the unprecedented opportunities brought about by the VSNs, how to guarantee the sensing accuracy is a critical issue since mobile sensors in VSNs are highly dynamic and fully distributed without central control. To resolve this problem, we focus on the distributed Kalman filter algorithms, which is the combination of distributed algorithms and Kalman algorithms.
On the one hand, in distributed algorithms, a set of nodes can estimate the target state accurately through a cooperation manner. These nodes can be PCs, laptops, cell phones, sensors, and actuators [20]. Applications of distributed estimation algorithms are in several contexts, including wireless and sensor networks, where scalability, robustness, and low power consumption are desirable [21–23].
On the other hand, Kalman filter algorithms are one of the most popular methods for estimating the states of dynamic system from an incomplete and noisy measurement. As a recursion algorithm, Kalman filter has little requirements on calculation and memory space, which makes it more favorable in the realtime system application. Since it was proposed in 1960s, Kalman filter has been widely applied in many fields, such as navigation, signal processing, control system, and information fusion [24].
As one strategy of distributed Kalman filter algorithms, diffusion Kalman filter algorithm has a better performance on the state estimation by diffusing information through a sequence of Kalman iterations and dataaggregation. In [25, 26], diffusion Kalman filtering has been introduced. According to them, a diffusion Kalman filter algorithm is comprised of the incremental update step and the diffusion update step. In the incremental update step, each node receives the observations from its neighbors and combines these observations to update its existing estimate to an intermediate value. In the diffusion update step, every node combines its neighbors intermediate estimates produced by the last step to update its own estimate. It is worth mentioning that all nodes perform these two steps similarly at the same time. The algorithm has an excellent performance in tracing a moving target as well as a good performance in convergence.
All of the literatures above assumed the links between nodes were ideal. However, in VSNs, the performance of the physical layer is strongly affected by the presence of such link state, where nodes and links may be subject to failure. These issues motivated the study of adaptive networks in dynamic scenarios. In [27], the author proposed a method to analyze the least meansquare (LMS) filter algorithm with changing topologies and normalized data. Similarly, a novel distributed affine projection algorithm (APA) with dynamic diffusion networks was presented in [28]. Although these algorithms give a good performance in dynamic topologies, they are all one kind of Wiener filtering. As we know, Wiener filtering required that the signal and noise must be a smooth process, which greatly restricts its application. And because of the limited shortage of these filters, they fail to obtain accurate measurement for moving targets. Considering these problems, we present a diffusion Kalman filter algorithm with dynamic topologies (DKFdt) to solve them. However, in order to analyze the rationality of the algorithm, we further need to consider the complexity and convergence of the algorithm under certain reasonable assumptions. Therefore, after proposing the new algorithm, our objective is to study whether the algorithm will have a good convergence and whether the performance of diffusion strategies in this scenario is still well. So in this article, we detailedly study the steadystate performance of the mean and the mean square of our algorithm based on link instabilities. All of these will be the basis of our future research into VSNs.
In comparison, we derive the models for the transient and steadystate behavior of the diffusion algorithm. From the results, we can obtain an interesting observation that although communication between nodes is limited to a small fraction, which is due to a probabilistic diffusion protocol, the meansquare performance does not present a significant decrease compared to a theory diffusion strategy.
The remainder of this paper is organized as follows. Section 2 lays the related work about our study and Section 3 describes the background of our research and lays the foundation of this article. The analysis of the DKFdt algorithm is presented in Section 4. In Section 5, we analyze the mean and meansquare performance of the estimate errors based on the proposed algorithms and then simulation is given in Section 6. The conclusion and future work are described in Section 7.
We summarize the key symbols used in this paper in Notation.
2. Related Work
2.1. Framework of VSNs
Wireless sensor networks (WSNs) have been used in many application domains (e.g., temperature monitoring, security, and trajectory tracking) and become more and more popular in the last few years. However, as WSNs consist of large number of heterogeneous sensor nodes having capability of sensing, computation, communication and so forth, multiple applications sharing the very same WSNs infrastructure become a problem to be solved. Virtualization is a technology that can potentially enable this sharing.
Actually, network virtualization may bring nothing new in terms of technical capabilities and theoretical performance, but it provides a way of organizing networks such that it is possible to overcome some of the practical issues in traditional Internet. Now, in the field of virtualized sensor networks, research mainly focuses on the design and analysis of the VSNs framework [17, 18, 29–31]. In this part, we analyze previous work and summarize overall VSNs architecture shown in Figure 1. As can be seen from it, the VSNs consist of three layers: physical layer, virtualization layer, and user layer.
Physical Layer (PL). This layer consists of large number of heterogeneous sensor nodes for different purposes of sensing the environment like temperature, sound, and trajectory tracking. It offers their resources and observations through programmable interfaces to virtualization layer.
Virtualization Layer (VL). According to the needs of the upper user layers, VL integrates information provided by the physical layers to format a new virtual topology and provide variety of services for end users. It can also create child VLs by partitioning its resources and act as a virtual PL by leasing those child networks to other VLs (Figure 1).
User Layer (UL). The user layer is very similar to the application layer of the traditional network; users will request resource and information from the VL according to their own needs and meanwhile measure the QOS of the whole network.
From the analysis above, we can see that information or estimate value provided by PL affects the whole network performance. And because of the dynamic and distribute properties in VSNs, we should focus on how to get the accuracy estimation value in PL under the dynamic and distributed scenario firstly.
2.2. Distributed Algorithms
We review related research on distributed algorithms about distributed estimate problems. In distributed algorithms, nodes with processing and learning abilities are linked together to solve distributed optimization and estimation in real time through cooperating with each other.
The existing distributed algorithms are mainly composed of consensus algorithms, gossipy algorithms, and diffusion algorithms.
Average consensus and gossip algorithms have been studied extensively in recent years, especially in distributed optimization [32, 33] and distributed estimation problems [34–36]. The consensus strategy was originally proposed in the statistics literature [37] and has since then been developed into an elegant procedure to enforce agreement among cooperating nodes. Consensus Kalman filer algorithm has been studied in [38–40] where it consists of two steps. At first step, nodes collect the measurements across the network and, at the second step, it will iterate enough over the collected data to attain agreement. Unfortunately, consensus strategy hinders the ability to perform realtime recursive estimation and adaptation when measurement data keep streaming in, which is needed in VSNs.
Besides, [41, 42] propose distributed Kalman filters where the agents communicate among themselves using the gossip protocol [34]. At every sensing time step in a gossip Kalman filter, there is a communication round between a single pair of connected sensors, chosen according to the gossip protocol, when these two sensors exchange their current state estimate and their current error covariance matrix provided by the local Kalman filter Riccati equation. Although gossip filters require very low communication bandwidth, their mean square deviation (MSD) is higher and their convergence rate is lower.
Considering problems mentioned above, in this paper, we focus on diffusion strategies, where nodes communicate with their neighbors only. There are plenty of researches on the diffusion strategies in the last more than ten years [25–28, 43–45]. The initial research is mainly focused on the application and convergence performance of some Wiener filtering algorithms in the fixed topology scenarios [43, 44, 46, 47]. In these articles, each node in the network has individual compute and sensor abilities. When nodes cooperate to estimate the performance of a target, each node will combine information from its neighbors firstly to update its own estimate to an intermediate value. After that, the node combines the intermediate value of its neighbors to obtain its update estimate again. Furthermore, in diffusion algorithms, the stepsize parameters are not required to depend on the time index and do not vanish as compared with consensus algorithms, which implies networks with continuous adaptation and learning abilities. As the limitation of Wiener filter mentioned in Section 1, research for Kalman filter becomes increasing. In [25, 26, 45], diffusion mechanisms are used in Kalman filter, in which the problem of distributed Kalman filtering is studied. Nodes in these literatures are working directly in a linear dynamic system in a collaborative manner. The same with other diffusion algorithms, nodes in diffusion Kalman filtering algorithm communicate only with their neighbors, and the information is diffused across the network through a sequence of Kalman iterations and dataaggregations. Meanwhile, the mean and meansquare performance are analyzed to study the convergence of the diffusion Kalman filtering in the fix network topology.
In [27, 28], diffusion strategies are used in a changing topology which greatly expand the practicality in wireless environment. Because of the instability of links, a dynamic topology model is given in these literatures, which provides a new way to study these problems. In this paper, considering dynamic topologies and distributed environment in physical layer of VSNs, we provide the diffusion Kalman filter algorithm in dynamic topologies and study the performance of its convergence through analyzing the value of mean and mean square. We will discuss this algorithm in detail in later sections.
3. System Model
In this section, we provide several fundamental models. First of all, the problem setup is described in Section 3.1. Then, in Section 3.2, the algorithm DKF (diffusion Kalman filter) given in [25] is briefly reviewed. Finally, to facilitate later analysis, the dynamic model is available in Section 3.3.
3.1. Problem Setup
In this part, we describe the dynamical system, local observations, and modeling assumptions, respectively, firstly and then give the wellknown Kalman filter algorithm as the basis of the whole article.
Dynamical System. Consider tracking a moving object (assume its trajectory is an ellipse) in WSNs. We use to define the state of this object with property at time , , of properties (like position coordinates, velocity, and direction). To describe this problem well, we will introduce a discrete control process of the system. The system can use a linear stochastic difference equation by stack variables in a position state vector , defined aswhere is a sparse localized model matrix, is the state noise vector, and is the state noise matrix. The signal is a deterministic input and is usually equal to zero.
Local Observations. We assume that the random field (1) is observed by sensors, where each sensor observes only a few properties of the target. We use to denote the number of properties observed by sensor , . Then, observations at sensor can be represented by a linear model:where denotes measurements by sensor at time , is the local observation matrix, and is the local observation noise to reflect the inaccuracy in measurements due to sensor precision and other unavoidable constraints.
We can get the global observation model by stacking the observations as follows:
Then, the global observation matrix is given by
Modeling assumptions are as follows.
Assumption 1. It is customary to assume that the noise signals and are temporally white and spatially independent with covariance matrices denoted as [28]where denotes conjugate transposition.
Assumption 2. We assume the initial state vector , with zero mean and covariance matrix , is also temporally and spatially independent with the state and measurement noises.
Kalman Filter Algorithm. Based on the analysis above, let denote the linear minimum meansquare error estimate of given observations up to and including time . And let denote the covariance matrix of the estimation error . Therefore, the Kalman filter algorithm can start from and as the following equations [48]:(1)Measurement update:(2)Time update: in which is the kalman filtering gain.
3.2. Algorithm DKF
Neighborhood Communication Model. In diffusion strategies, sensors exchange their current estimates of the object state with their neighbors only to reduce communications costs. Formally, we model the communication structure with a simple, undirected, connected graph , where is the set of sensors and is the set of allowable communication links among the sensors. The neighborhood of sensor is defined by ; then, we can obtain the adjacency matrix with entries as follows:
We assume that the diagonal elements of are identically 1, indicating that a sensor can always communicate with itself. At a particular instant, each sensor aggregates the observation information of its neighbors to have an accurate estimation to the target traction. However, due to the influence of the observation noise , we provide a transfer coefficient for each neighbor to adjust the impact of noise. For definiteness, we assume the following transfer coefficient matrix, which is a leftrandom matrix and has a detailed description in literature [20]. Define the coefficient matrix with the properties:
We call the diffusion matrix, since it governs the diffusion process and plays an important role in the steadystate performance of the network. The entries in represent the weights that are used by the diffusion algorithm to combine nearby estimates and have a variety of rules for its value. In this article, we will adopt Metropolis rule like [26] to express the set of nonnegative coefficients . We use to denote the degree of node and we can get as follows:
The values of the weights may be chosen as shown in Figure 2.
The Diffusion Kalman Filter. In diffusion implementation, nodes cooperate with their direct neighbors only and diffuse the information across the entire network through a sequence of Kalman iterations and dataaggregation. In [25], diffusion Kalman filter algorithms have been proposed, which contain two steps in information exchange (local information exchange and global information exchange, resp.) and are summarized in Algorithm 1.

The algorithm has better adaptation and tracking abilities. However, in the wireless environment, the probability of link failure will increase significantly. We will discuss this situation detailedly in next section.
3.3. Dynamic Topology Scheme
We extend the diffusion Kalman filter to the dynamic topologies by assuming the links between any two points are dynamically linked. We assume that, at any time , the link weight (now randomly related to time ) will be either a nominal value with probability or zero with probability :
For simplification, we assume an node network with a fixed topology. We adopt to denote the maximum number of its links. Then, with different probabilities , the network can be divided up to different subnetworks . A simple example is shown in Figure 3, which describes a 3node network with = 2. For instance, the subnetwork happens with probability .
In this manner, we can get the mean topology matrices and ; namely,where denotes the block Kronecker product. And , in which denotes Kronecker product, denotes the identity matrix of size , and the definition of is now related to time with the form .
4. Analysis for DKFdt Algorithm
Based on the analysis above, we propose our diffusion Kalman filter with dynamic topologies (DKFdt) algorithm (see Algorithm 2). In our algorithm, we can see the definition of the neighbors of node ; is now varied with time . At the same time, the diffusion weight matrix is also related to time compared with Algorithm 1.

Then, we divide the DKFdt algorithm into three steps. To begin with, node collects the measurements , the measurement matrices , and the noise covariance matrices from its neighbors at time to update its intermediate estimate . And other nodes in the whole network will do the same incremental update operations like node .
Secondly, after all nodes complete the first step, they step into the diffusion update stage. In this stage, nodes combine the intermediate estimates produced in the first step through a coefficient matrix .
The last step is the prediction update stage. The main objective of this step is to predict next state estimate values by using present values; for example, estimate value at time can be predicted by that at time using the state model in (1); covariance matrix of the estimation error can be predicted by as well.
In the DKFdt algorithm, we combine the DKF algorithm and the dynamic topologies model together. Through this process, the network will be more close to the actual situation, where links between nodes are always instable. To prove the effectiveness of the algorithm, we need to ensure that the algorithm is convergent. So we will analyze its performance in mean and mean square to obtain its convergence behavior. These will be detailedly stated in the following sections.
5. Performance Analysis for Convergence
We now move on to examining the behavior of the DKFdt algorithm. Due to the random nature of the perturbations, it becomes necessary to evaluate the behavior of the algorithms on average. Therefore, we will study the convergence of the weight estimates in both the mean and meansquare performances.
At first, let denote estimation error at the end of the incremental update. Let denote estimation error at node at the end of the diffusion update, where is the real objective value. Then, we can obtain the following expressions:where the second equation follows (2):
Combining (13) into the diffusion update step of Algorithm 2, we obtain
5.1. Mean Performance
Assuming that the noise signals and are temporally white and spatially independent with each other, we obtain the following formulation when we take expectations of both sides of (14) and (15):Here, .
Since and as defined in Section 2, (17) indicates the mean performance of the DKFdt algorithm is unbiased.
5.2. MeanSquare Stability
To analyze meansquare stability, we will introduce filter mean square deviation (MSD) as the steadystate measure for node [20]:
Then, we give the definition of the global vectors as follows:
Consider the matrices . We may now express (14) and (15) in a global form:Here,where denotes the transpose of matrix , is a blockdiagonal matrix with defined in (4), and is the vector of size and whose entries are all equal to one.
Let denote the covariance matrix of . Then, the recursion can be obtained by (21) as follows:
In order to analyze the meansquare stability, we also adopt the same assumption in [26] as follows.
Assumption 3. The matrices in model (1) are timeinvariant; that is, the matrices , and do not depend on .
Assumption 4. A Kalman filter that uses data from a neighborhood converges for every neighborhood (see [49] for conditions on Kalman filter convergence).
Based on the assumptions, the matrix (21) can be denoted as the steadystate value as follows:
Then, (22) can be denoted as follows:
From (12) and the temporally and spatially independent assumptions on the state and measurement noises, (24) converges to the unique solution of the Lyapunov equation [50]:Here,
Now, based on the DKFdt algorithm, we can get the same solution from the analysis of the meansquare stability as the existing DKF algorithms. Then, we also express the solution by using the operator, which is obtained by stacking the columns of a matrix. Then, (22) can be written asHere, we use the property that
According to (27) and using the following equalities for arbitrary matrices of compatible dimensions,
the steadystate at node and the average steadystate across the network may now be expressed aswhere and is an dimension matrix with all unit entries and is the dimension unit matrix.
Then, we can draw a conclusion that the DKFdt algorithm is unbiased and stability based on analysis of the mean and meansquare performance.
6. Number Evaluation
In this section, we give the simulation to illustrate the performance of the proposed algorithm. Consider the case that a set of sensors in WSNs attempts to track the trajectory of an ellipse object. We numerically evaluate the MSD performance of the DKFdt and compare it against the noncooperate Kalman filter (KF) and the diffusion Kalman filter (DKF) in [25]. To achieve this objective, we build a timevarying random system.
For simplicity, at first we use a smallscale network model to verify our algorithm. This network consists of six sensors with the topology shown in Figure 4, in which the connection lines between nodes only represent the information communication with two agents rather than the real link. At the same time, each sensor node can independently obtain the target status and communicate with its neighbors.
In our simulation, the matrices in (1) areand the initial conditions are
Because the nodes take measures of the unknown position of the object, the measurement matrix is chosen to be either or .
In Figure 5, we present the global MSD evolution for (Algorithm 1), (DKFdt, Algorithm 2), and (without cooperation), where variable represent the probability of the connection between any two points defined as or in Section 3.3. In the figure, the coordinate represents the iteration index and the coordinate represents the MSD value. From it, we can see that, with the passage of time, all the algorithm can converge to a limited range with different convergence speed and MSD values. Through comparison and analyzing the simulation among three different algorithms, we can conclude that when , which indicates the low utilization of the links, there is still a significant improvement over the situation without cooperation. These results confirm advantages of diffusion strategies for adaptive networks. Moreover, in order to embody the characteristics of our algorithm, we illustrate the performance of MSD of each node. As shown in Figure 6, although performance of convergence in each node is not different because of the effect of noise, they all can reach convergence through communication with each other.
(a)
(b)
(c)
In order to further illustrate the characteristics of our algorithm, we simulate another example in a larger network topology with in Figure 7 and other parameters remain the same with that of sixpoint topology network. In Figure 8, we take the same simulation to illustrate the performance of MSD with different probability of link connections. We have observed that values of diffusion algorithm with are closer with diffusion algorithm in reliable link (with ) than that in sixpoint network, which reflect that collaboration among more sensors can reduce the effect on instability of links.
At last, we demonstrate the result of the nodes cooperating together to track the position of an ellipse object in Figure 9. And we show the result through 2D and 3D model, respectively. As we can see, the networks still have a good performance in estimating the position of the target through nodes diffusing information with each other continuously, although nodes are affected greatly by noises.
(a)
(b)
7. Conclusion and Further Work
In this paper, we provide a diffusion Kalman filter algorithm with dynamic topologies (DKFdt) to achieve this requirement in physical layer of VSNs. We also analyze the mean and the meansquare performance in dynamic scenarios. The result shows that the global estimation error can converge to a unique solution well. Through the simulation, our proposed diffusion strategy with cooperative method performs well in dynamic networks. It achieves an improved performance over the noncooperative strategy () even at a high dynamic environment with low link probability ().
Although the algorithm is provided under the background of VSNs, its applications are not confined to this field. Based on what is mentioned above, we will further study other problems on the distributed Kalman filter algorithms and, at the same time, their applications in other fields are also the emphasis of our studies.
Notation
The real domain  
The complex domain. 
State vector of object at time  
Observation value at sensor at time  
Dynamical system matrix  
Observation matrix at sensor  
System noisy covariance  
Observation noise covariance  
Kalman filtering gain  
The covariance matrix of the estimation error  
The adjacency matrix  
The diffusion leftrandom matrix  
The diffusion leftrandom matrix varied with time  
The mean topology matrix. 
Competing Interests
The authors declare that they have no competing interests.
Acknowledgments
This work is supported by the National Science and Technology Major Project (Grant no. 2015ZX03003002002), in part by the National Natural Science Foundation of China (NSFC) under Grant nos. 61522103, 61372112, and 61232017, in part by the National Key Basic Research Program of China (973 Program) under Grant 2013CB329102, and in part by the Beijing Natural Science Foundation under Grant 4142037.