SlideShare a Scribd company logo
1 of 47
Localization in WSN 1
Localization in WSN
Presented by: Yara Ali
Supervised by: Dr. Ahmed
Akl
Localization in WSN 2
Agenda
 Introduction to WSN
 Localization
 Usage
 GPS .. Why not ?
 Localization methods taxonomy
 Classifications of Localization Methods
 Summary
 Future work
 References
Localization in WSN 3
Introduction to WSN
 A large number of self-sufficient nodes
 Nodes have sensing capabilities
 Can perform simple computations
 Can communicate with each other
Localization in WSN 4
Introduction to WSN (Cont.)
 Beacon (Anchor) node:
It’s a node that’s aware of it’s location,
either through GPS or manual pre-
programming during deployment.
Localization in WSN 5
Introduction to WSN (Cont.)
 In a Wireless sensor nodes thousands of
sensors need to know their position
Many applications need position info:
 in-home
 forest-fire detection
 atmospheric (temperature,
pressure, … )
 military (target detection, …)
 police
Localization in WSN 6
Introduction to WSN (Cont.)
 Advantages:
1. It avoids a lot of wiring
2. It can accommodate new devices at
any time
3. It's flexible to go through physical
partitions
4. It can be accessed through a
centralized monitor
Localization in WSN 7
Introduction to WSN (Cont.)
 Disadvantages
1. It's easy for hackers to hack it as we
cant control propagation of waves
2. Comparatively low speed of
communication
3. Gets distracted by various elements
like Blue-tooth
Localization in WSN 8
Localization
 Localization is a process to compute the
locations of wireless devices in a network
 WSN Composed of a large number of
inexpensive nodes that are densely
deployed in a region of interests to measure
certain phenomenon.
 The primary objective is to determine the
location of the target
Localization in WSN 9
Localization (CONT.)
Localization in WSN 10
Localization (CONT.)
Localization in WSN 11
Usage
 Coverage
 Deployment
 Routing
 Location service
 Target tracking
 rescue
Localization in WSN 12
GPS .. Why not ?
 We need to determine the physical
coordinates of a group of sensor nodes in
a wireless sensor network (WSN)
 Due to application context and massive
scale, use of GPS is unrealistic, therefore,
sensors need to self-organize a coordinate
system
Localization in WSN 13
GPS .. Why not ? (Cont.)
1. Expensive
2. GPS satellite signals are weak (when compared to, say,
cellular phone signals), so it doesn't work as well indoors,
underwater, under trees, etc.
3. The highest accuracy requires line-of-sight from the receiver
to the satellite, this is why GPS doesn't work very well in an
urban environment
4. The US DoD (dept of defense) can, at any given time, deny
users use of the system (i.e. they degrade/shut down the
satellites)
Localization in WSN 14
Localization methods taxonomy
Localization in WSN 15
1- Target/Source Localization
 Most of the source localization methods
are focused on the measured signal
strength.
 To obtain the measurements, the node
needs complex calculating process.
Localization in WSN 16
1- Target/Source Localization
(Cont.)
1. The received signal strength of single
target/source localization in WSN during
time interval t:
Localization in WSN 17
1- Target/Source Localization
(Cont.)
2. The received signal strength of multiple
target/source localization in WSN during
time interval t:
Localization in WSN 18
1- Target/Source Localization
(Cont.)
 The Above methods require transmission of a
large amount of data from sensors which may
not be feasible under communication
constraints.
3-4. The binary sensors sense signals
( infrared, acoustic, light, etc. ) from their
vicinity, and they only become active by
transmitting a signal if the strength of the
sensed signal is above a certain threshold.
Localization in WSN 19
1- Target/Source Localization
(Cont.)
 The binary sensor only makes a binary
decision (detection or non-detection)
regarding the measurement.
 Consequently, only its ID needs to be sent to
the fusion center when it detects the target.
Otherwise, it remains silent.
 So, the binary sensor is a low-power and
bandwidth-efficient solution for WSN.
Localization in WSN 20
Taxonomy
Localization in WSN 21
2- Node Self-localization
 Range-based Localization: uses the
measured distance/angle to estimate the
indoor location using geometric principles.
 Range-free Localization: uses the
connectivity or pattern matching method to
estimate the location. Distances are not
measured directly but hop counts are used.
Once hop counts are determined, distances
between nodes are estimated using an
average distance per hop and then geometric
principles are used to compute location.
Localization in WSN 22
2-1 Range based localization
Localization in WSN 23
2-1 Range based localization
(Cont.)
1. Time of arrival: (TOA)
 It’s a method that
tries to estimate
distance between 2
nodes using time
based measures.
 Accurate but needs synchronization
Localization in WSN 24
2-1 Range based localization
(Cont.)
2. Time Difference Of Arrival: (TDOA)
 It’s a method for
determining the distance
between a mobile station
and a nearby synchronized
base station. (Like AT&T)
 No synchronization
needed but costly.
Localization in WSN 25
2-1 Range based localization
(Cont.)
3. Received Signal Strength Indicator:
(RSSI)
 Techniques to translate signal strength
into distance
 Low cost but very
sensitive to noise
Localization in WSN 26
2-1 Range based localization
(Cont.)
4. Angle Of Arrival: (AOA)
 It’s a method that allows
each sensor to evaluate
the relative angles
between received radio
signals.
 Costly and needs
extensive signal processing.
Localization in WSN 27
2-2 Range-free localization
 DV-Hop is the typical representation
 It doesn’t need to measure the absolute
distance between the beacon node and
unknown node. It uses the average hop
distance to approximate the actual
distances and reduces the hardware
requirements.
Localization in WSN 28
2-2 Range-free localization
(Cont.)
 Adv:
Easy to implement and applicable to
large network.
 Disadv:
The positioning error is correspondingly
increased.
Localization in WSN 29
2-2-1 DV-Hop
 It is divided into 3 stages:
1. Information broadcast
2. Distance calculation
3. Position estimation
Localization in WSN 30
1-Information broadcast
 The beacon nodes broadcast their location
information package which includes hop count and is
initialized to zero for their neighbors.
 The receiver records the minimal hop of each beacon
nodes and ignores the larger hop for the same
beacon nodes.
 The receiver increases the hop count by 1 and
transmits it to neighbor nodes.
 All the nodes in a network can record the minimal hop
counts of each beacon nodes.
Localization in WSN 31
2-Distance calculation
 According to the position of the beacon node
and hop count, each beacon node uses the
following equation to estimate the actual
distance of every hop
Localization in WSN 32
3- Position estimation
 The beacon node will calculate the average
distance and broadcast the information to
network.
 The unknown nodes only record the first
average distance and then transmit it to
neighbor nodes.
 The unknown node calculates its location
through.
Localization in WSN 33
2-2-1 DV-Hop (Cont.)
 A-B: 15
Anchors
 flood network with
own position
 flood network with
avg hop distance
Nodes
 count number
of hops to anchors
 multiply with avg hop distance
A
B
1
1
1
1
2
2
2
3
3
4
4
3 hops
avg hop: 5
C
Localization in WSN 34
2-2-1 Modified DV-Hop
Localization in WSN 35
2-2-2 Pattern Matching
Localization
 Also called map-based or finger print algorithm.
 It involves 2 phases:
1. The received signals at selected locations are
recorded in an offline database called radio map.
2. It works at the online state.
 The pattern matching algorithms are used to infer
the location of unknown node by matching the
current observed signal features to the prerecorded
values on the map
Localization in WSN 36
Classifications of Localization
Methods
 The localization techniques can be classified with
respect to various criteria:
1. Centralized vs Distributed
2. Range-free vs Range-based
3. Mobile vs Stationary
4. Coarse-grained vs fine-grained
Localization in WSN 37
Centralized vs Distributed
 Centralized
 Data collected in the whole network are
transmitted to the central unit that calculates the
estimated location of each node in a network.
 Distributed
 Computation is distributed among the nodes
 Each node estimates its own position based on
the local data gathered from its neighbors.
Localization in WSN 38
Range-Free vs Range-Based
 Range-Free (connectivity)
 Makes no assumption about the availability or
validity of such information, and use only
connectivity information to locate the entire sensor
network.
 Hop-Counting Techniques
 Range-Based (distance)
 Defined by protocols that use absolute point to
point distance estimates (range) or angle
estimates in location calculation.
Localization in WSN 39
Mobile vs Stationary
 Mobile Stationary
Localization in WSN 40
Coarse-grained vs fine-
grained
 Coarse-grained:
finding approximate coordinates of
nodes in a network so it provide lower
precision estimates of this coordinates.
 Fine-grained:
Determining precisely the coordinates
but require much more communication
and computation efforts.
Localization in WSN 41
Summary
 WSN .. What & Why ?
 Distance estimation VS position computation VS
localization algorithm
 Single/Multiple localization in WSN/WBSN
 Calculating the distance between sensor nodes
( TOA – TDOA – RSSI – AOA )
Localization in WSN 42
Summary
 Range-based methods require extra hardware therefore have a
higher cost but provide more accurate distance measurements,
whereas range-free methods use only connectivity information
and so are less accurate.
 Range-free localization ( DV-Hop , Modified DV-Hop , pattern
matching localization )
 The localization techniques can be classified with respect to
various criteria. They differ on the assumed localization
precision, hardware capabilities, measurement and calculation
methods, computing organization, the assumed network
configuration, architecture, nodes properties and deployment,
etc.
Localization in WSN 43
Future Work
 Few papers investigate multiple-source
localization in WSN and WBSN
Localization in WSN 44
References
1. http://www.hindawi.com/journals/ijdsn/2012/96
2. http://www.docslide.com/wireless-sensor-netw
3. http://www.docstoc.com/docs/32678966/Loc
alization-in-Wireless-Sensor-Network---
ELEC-619B-Presentation
Localization in WSN 45
References (Cont.)
4.https://www.cs.virginia.edu/~stankovic/psfiles/wsn.pdf
5.http://www.sersc.org/journals/IJCA/vol6_no3/7.pdf
6.http://www.docstoc.com/docs/130374399/Localization
-in-Wireless-Sensor-Networks
7. http://www.degruyter.com/view/j/amcs.2012.22.issue-
2/v10006-012-0021-x/v10006-012-0021-x.xml
Localization in WSN 46
Any Questions?
Localization in WSN 47
Thank You !

More Related Content

What's hot

Topology control protocols for WSNs challenges and research opportunities, 14...
Topology control protocols for WSNs challenges and research opportunities, 14...Topology control protocols for WSNs challenges and research opportunities, 14...
Topology control protocols for WSNs challenges and research opportunities, 14...Mohamed Mostafa
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksAbhijeet Awade
 
Schedule Based MAC Protocol
Schedule Based MAC ProtocolSchedule Based MAC Protocol
Schedule Based MAC ProtocolDarwin Nesakumar
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsVirendra Thakur
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...ArunChokkalingam
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Networkijtsrd
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolArunChokkalingam
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksVishnu Kudumula
 
Sensor Localization presentation1&2
Sensor Localization  presentation1&2Sensor Localization  presentation1&2
Sensor Localization presentation1&2gamalsallam1989
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsDarwin Nesakumar
 
Intro to wireless sensor network
Intro to wireless sensor networkIntro to wireless sensor network
Intro to wireless sensor networkVrince Vimal
 
Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applicationsDeepshika Reddy
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...ArunChokkalingam
 

What's hot (20)

Topology control protocols for WSNs challenges and research opportunities, 14...
Topology control protocols for WSNs challenges and research opportunities, 14...Topology control protocols for WSNs challenges and research opportunities, 14...
Topology control protocols for WSNs challenges and research opportunities, 14...
 
Leach protocol
Leach protocolLeach protocol
Leach protocol
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
 
Schedule Based MAC Protocol
Schedule Based MAC ProtocolSchedule Based MAC Protocol
Schedule Based MAC Protocol
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
Mac
MacMac
Mac
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
 
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC Protocol
 
Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
 
Wsn 08
Wsn 08Wsn 08
Wsn 08
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Sensor Localization presentation1&2
Sensor Localization  presentation1&2Sensor Localization  presentation1&2
Sensor Localization presentation1&2
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocols
 
Intro to wireless sensor network
Intro to wireless sensor networkIntro to wireless sensor network
Intro to wireless sensor network
 
Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applications
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Unit 33-routing protocols for wsn
Unit 33-routing protocols for wsnUnit 33-routing protocols for wsn
Unit 33-routing protocols for wsn
 

Viewers also liked

Distributed network monitoring of wireless networks (Mobility Field Day 1)
Distributed network monitoring of wireless networks (Mobility Field Day 1)Distributed network monitoring of wireless networks (Mobility Field Day 1)
Distributed network monitoring of wireless networks (Mobility Field Day 1)NetBeez, Inc.
 
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...ahmad abdelhafeez
 
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...ahmad abdelhafeez
 
Musée d’orsay
Musée d’orsayMusée d’orsay
Musée d’orsaylorelle58
 
Mobile Ad Hoc Network of Simulation Framework Based on OPNET
Mobile Ad Hoc Network of Simulation Framework Based on OPNETMobile Ad Hoc Network of Simulation Framework Based on OPNET
Mobile Ad Hoc Network of Simulation Framework Based on OPNETateeq ateeq
 
Rapport Stage ingénieur
Rapport Stage ingénieurRapport Stage ingénieur
Rapport Stage ingénieurMhamdi Imed
 
Évaluation des performances du réseau 3G : application à la couche réseau
Évaluation des performances du réseau 3G : application à la couche réseauÉvaluation des performances du réseau 3G : application à la couche réseau
Évaluation des performances du réseau 3G : application à la couche réseauAchraf Trabelsi
 

Viewers also liked (12)

Distributed network monitoring of wireless networks (Mobility Field Day 1)
Distributed network monitoring of wireless networks (Mobility Field Day 1)Distributed network monitoring of wireless networks (Mobility Field Day 1)
Distributed network monitoring of wireless networks (Mobility Field Day 1)
 
Wsn security issues
Wsn security issuesWsn security issues
Wsn security issues
 
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
 
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
 
V5I3_IJERTV5IS031157
V5I3_IJERTV5IS031157V5I3_IJERTV5IS031157
V5I3_IJERTV5IS031157
 
Opnet tutorial
Opnet tutorialOpnet tutorial
Opnet tutorial
 
Musée d’orsay
Musée d’orsayMusée d’orsay
Musée d’orsay
 
Trusted systems
Trusted systemsTrusted systems
Trusted systems
 
opnet
opnetopnet
opnet
 
Mobile Ad Hoc Network of Simulation Framework Based on OPNET
Mobile Ad Hoc Network of Simulation Framework Based on OPNETMobile Ad Hoc Network of Simulation Framework Based on OPNET
Mobile Ad Hoc Network of Simulation Framework Based on OPNET
 
Rapport Stage ingénieur
Rapport Stage ingénieurRapport Stage ingénieur
Rapport Stage ingénieur
 
Évaluation des performances du réseau 3G : application à la couche réseau
Évaluation des performances du réseau 3G : application à la couche réseauÉvaluation des performances du réseau 3G : application à la couche réseau
Évaluation des performances du réseau 3G : application à la couche réseau
 

Similar to Localization Methods in Wireless Sensor Networks

Localization scheme for underwater wsn
Localization scheme for underwater wsnLocalization scheme for underwater wsn
Localization scheme for underwater wsnAkshay Paswan
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor NetworksIOSR Journals
 
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...ijwmn
 
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKS
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKSA NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKS
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKSEditor IJMTER
 
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor NetworksA New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor Networksidescitation
 
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...sipij
 
Detecting proximity events in sensor networks
Detecting proximity events in sensor networksDetecting proximity events in sensor networks
Detecting proximity events in sensor networksBalaSuresh AsaiThambi
 
Optimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor NetworksOptimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor Networkspaperpublications3
 
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...ijwmn
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsmmjalbiaty
 
Modified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNsModified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNsidescitation
 
WIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORS’ ANTENNAS
WIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORS’ ANTENNASWIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORS’ ANTENNAS
WIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORS’ ANTENNASijassn
 
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...ijasuc
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsnElham Hormozi
 
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...IOSR Journals
 
Virtual 2 d positioning system by using wireless sensors in indoor environment
Virtual 2 d positioning system by using wireless sensors in indoor environmentVirtual 2 d positioning system by using wireless sensors in indoor environment
Virtual 2 d positioning system by using wireless sensors in indoor environmentijwmn
 
CIP Based BOND for Wireless Sensor Networks
CIP Based BOND for Wireless Sensor NetworksCIP Based BOND for Wireless Sensor Networks
CIP Based BOND for Wireless Sensor Networksijsrd.com
 

Similar to Localization Methods in Wireless Sensor Networks (20)

Localization scheme for underwater wsn
Localization scheme for underwater wsnLocalization scheme for underwater wsn
Localization scheme for underwater wsn
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks
 
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...
 
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKS
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKSA NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKS
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKS
 
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor NetworksA New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
 
O026084087
O026084087O026084087
O026084087
 
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
 
Detecting proximity events in sensor networks
Detecting proximity events in sensor networksDetecting proximity events in sensor networks
Detecting proximity events in sensor networks
 
Optimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor NetworksOptimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor Networks
 
Bm32410415
Bm32410415Bm32410415
Bm32410415
 
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraints
 
Modified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNsModified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNs
 
WIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORS’ ANTENNAS
WIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORS’ ANTENNASWIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORS’ ANTENNAS
WIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORS’ ANTENNAS
 
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
 
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
 
Virtual 2 d positioning system by using wireless sensors in indoor environment
Virtual 2 d positioning system by using wireless sensors in indoor environmentVirtual 2 d positioning system by using wireless sensors in indoor environment
Virtual 2 d positioning system by using wireless sensors in indoor environment
 
CIP Based BOND for Wireless Sensor Networks
CIP Based BOND for Wireless Sensor NetworksCIP Based BOND for Wireless Sensor Networks
CIP Based BOND for Wireless Sensor Networks
 

More from ahmad abdelhafeez

More from ahmad abdelhafeez (20)

Surveying cross layer protocols in ws ns
Surveying cross layer protocols in ws nsSurveying cross layer protocols in ws ns
Surveying cross layer protocols in ws ns
 
Service level management
Service level managementService level management
Service level management
 
Energy harvesting sensor nodes
Energy harvesting sensor nodes   Energy harvesting sensor nodes
Energy harvesting sensor nodes
 
Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networks
 
Routing
RoutingRouting
Routing
 
Wsn security issues
Wsn security issuesWsn security issues
Wsn security issues
 
Sdn pres v2-Software-defined networks
Sdn pres v2-Software-defined networksSdn pres v2-Software-defined networks
Sdn pres v2-Software-defined networks
 
Intrusion prevension
Intrusion prevensionIntrusion prevension
Intrusion prevension
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
 
Digital forensics.abdallah
Digital forensics.abdallahDigital forensics.abdallah
Digital forensics.abdallah
 
Cloud computing final show
Cloud computing final   showCloud computing final   show
Cloud computing final show
 
Incident handling.final
Incident handling.finalIncident handling.final
Incident handling.final
 
Malewareanalysis presentation
Malewareanalysis presentationMalewareanalysis presentation
Malewareanalysis presentation
 
pentration testing
pentration testingpentration testing
pentration testing
 
Automatic left ventricle segmentation
Automatic left ventricle segmentationAutomatic left ventricle segmentation
Automatic left ventricle segmentation
 
Facial expression recognition based on local binary patterns final
Facial expression recognition based on local binary patterns finalFacial expression recognition based on local binary patterns final
Facial expression recognition based on local binary patterns final
 
Sudoku
SudokuSudoku
Sudoku
 
I pv4 versus ipv6
I pv4 versus ipv6I pv4 versus ipv6
I pv4 versus ipv6
 
8086
8086 8086
8086
 
Malewareanalysis
Malewareanalysis Malewareanalysis
Malewareanalysis
 

Recently uploaded

Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 

Recently uploaded (20)

Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 

Localization Methods in Wireless Sensor Networks

  • 1. Localization in WSN 1 Localization in WSN Presented by: Yara Ali Supervised by: Dr. Ahmed Akl
  • 2. Localization in WSN 2 Agenda  Introduction to WSN  Localization  Usage  GPS .. Why not ?  Localization methods taxonomy  Classifications of Localization Methods  Summary  Future work  References
  • 3. Localization in WSN 3 Introduction to WSN  A large number of self-sufficient nodes  Nodes have sensing capabilities  Can perform simple computations  Can communicate with each other
  • 4. Localization in WSN 4 Introduction to WSN (Cont.)  Beacon (Anchor) node: It’s a node that’s aware of it’s location, either through GPS or manual pre- programming during deployment.
  • 5. Localization in WSN 5 Introduction to WSN (Cont.)  In a Wireless sensor nodes thousands of sensors need to know their position Many applications need position info:  in-home  forest-fire detection  atmospheric (temperature, pressure, … )  military (target detection, …)  police
  • 6. Localization in WSN 6 Introduction to WSN (Cont.)  Advantages: 1. It avoids a lot of wiring 2. It can accommodate new devices at any time 3. It's flexible to go through physical partitions 4. It can be accessed through a centralized monitor
  • 7. Localization in WSN 7 Introduction to WSN (Cont.)  Disadvantages 1. It's easy for hackers to hack it as we cant control propagation of waves 2. Comparatively low speed of communication 3. Gets distracted by various elements like Blue-tooth
  • 8. Localization in WSN 8 Localization  Localization is a process to compute the locations of wireless devices in a network  WSN Composed of a large number of inexpensive nodes that are densely deployed in a region of interests to measure certain phenomenon.  The primary objective is to determine the location of the target
  • 9. Localization in WSN 9 Localization (CONT.)
  • 10. Localization in WSN 10 Localization (CONT.)
  • 11. Localization in WSN 11 Usage  Coverage  Deployment  Routing  Location service  Target tracking  rescue
  • 12. Localization in WSN 12 GPS .. Why not ?  We need to determine the physical coordinates of a group of sensor nodes in a wireless sensor network (WSN)  Due to application context and massive scale, use of GPS is unrealistic, therefore, sensors need to self-organize a coordinate system
  • 13. Localization in WSN 13 GPS .. Why not ? (Cont.) 1. Expensive 2. GPS satellite signals are weak (when compared to, say, cellular phone signals), so it doesn't work as well indoors, underwater, under trees, etc. 3. The highest accuracy requires line-of-sight from the receiver to the satellite, this is why GPS doesn't work very well in an urban environment 4. The US DoD (dept of defense) can, at any given time, deny users use of the system (i.e. they degrade/shut down the satellites)
  • 14. Localization in WSN 14 Localization methods taxonomy
  • 15. Localization in WSN 15 1- Target/Source Localization  Most of the source localization methods are focused on the measured signal strength.  To obtain the measurements, the node needs complex calculating process.
  • 16. Localization in WSN 16 1- Target/Source Localization (Cont.) 1. The received signal strength of single target/source localization in WSN during time interval t:
  • 17. Localization in WSN 17 1- Target/Source Localization (Cont.) 2. The received signal strength of multiple target/source localization in WSN during time interval t:
  • 18. Localization in WSN 18 1- Target/Source Localization (Cont.)  The Above methods require transmission of a large amount of data from sensors which may not be feasible under communication constraints. 3-4. The binary sensors sense signals ( infrared, acoustic, light, etc. ) from their vicinity, and they only become active by transmitting a signal if the strength of the sensed signal is above a certain threshold.
  • 19. Localization in WSN 19 1- Target/Source Localization (Cont.)  The binary sensor only makes a binary decision (detection or non-detection) regarding the measurement.  Consequently, only its ID needs to be sent to the fusion center when it detects the target. Otherwise, it remains silent.  So, the binary sensor is a low-power and bandwidth-efficient solution for WSN.
  • 20. Localization in WSN 20 Taxonomy
  • 21. Localization in WSN 21 2- Node Self-localization  Range-based Localization: uses the measured distance/angle to estimate the indoor location using geometric principles.  Range-free Localization: uses the connectivity or pattern matching method to estimate the location. Distances are not measured directly but hop counts are used. Once hop counts are determined, distances between nodes are estimated using an average distance per hop and then geometric principles are used to compute location.
  • 22. Localization in WSN 22 2-1 Range based localization
  • 23. Localization in WSN 23 2-1 Range based localization (Cont.) 1. Time of arrival: (TOA)  It’s a method that tries to estimate distance between 2 nodes using time based measures.  Accurate but needs synchronization
  • 24. Localization in WSN 24 2-1 Range based localization (Cont.) 2. Time Difference Of Arrival: (TDOA)  It’s a method for determining the distance between a mobile station and a nearby synchronized base station. (Like AT&T)  No synchronization needed but costly.
  • 25. Localization in WSN 25 2-1 Range based localization (Cont.) 3. Received Signal Strength Indicator: (RSSI)  Techniques to translate signal strength into distance  Low cost but very sensitive to noise
  • 26. Localization in WSN 26 2-1 Range based localization (Cont.) 4. Angle Of Arrival: (AOA)  It’s a method that allows each sensor to evaluate the relative angles between received radio signals.  Costly and needs extensive signal processing.
  • 27. Localization in WSN 27 2-2 Range-free localization  DV-Hop is the typical representation  It doesn’t need to measure the absolute distance between the beacon node and unknown node. It uses the average hop distance to approximate the actual distances and reduces the hardware requirements.
  • 28. Localization in WSN 28 2-2 Range-free localization (Cont.)  Adv: Easy to implement and applicable to large network.  Disadv: The positioning error is correspondingly increased.
  • 29. Localization in WSN 29 2-2-1 DV-Hop  It is divided into 3 stages: 1. Information broadcast 2. Distance calculation 3. Position estimation
  • 30. Localization in WSN 30 1-Information broadcast  The beacon nodes broadcast their location information package which includes hop count and is initialized to zero for their neighbors.  The receiver records the minimal hop of each beacon nodes and ignores the larger hop for the same beacon nodes.  The receiver increases the hop count by 1 and transmits it to neighbor nodes.  All the nodes in a network can record the minimal hop counts of each beacon nodes.
  • 31. Localization in WSN 31 2-Distance calculation  According to the position of the beacon node and hop count, each beacon node uses the following equation to estimate the actual distance of every hop
  • 32. Localization in WSN 32 3- Position estimation  The beacon node will calculate the average distance and broadcast the information to network.  The unknown nodes only record the first average distance and then transmit it to neighbor nodes.  The unknown node calculates its location through.
  • 33. Localization in WSN 33 2-2-1 DV-Hop (Cont.)  A-B: 15 Anchors  flood network with own position  flood network with avg hop distance Nodes  count number of hops to anchors  multiply with avg hop distance A B 1 1 1 1 2 2 2 3 3 4 4 3 hops avg hop: 5 C
  • 34. Localization in WSN 34 2-2-1 Modified DV-Hop
  • 35. Localization in WSN 35 2-2-2 Pattern Matching Localization  Also called map-based or finger print algorithm.  It involves 2 phases: 1. The received signals at selected locations are recorded in an offline database called radio map. 2. It works at the online state.  The pattern matching algorithms are used to infer the location of unknown node by matching the current observed signal features to the prerecorded values on the map
  • 36. Localization in WSN 36 Classifications of Localization Methods  The localization techniques can be classified with respect to various criteria: 1. Centralized vs Distributed 2. Range-free vs Range-based 3. Mobile vs Stationary 4. Coarse-grained vs fine-grained
  • 37. Localization in WSN 37 Centralized vs Distributed  Centralized  Data collected in the whole network are transmitted to the central unit that calculates the estimated location of each node in a network.  Distributed  Computation is distributed among the nodes  Each node estimates its own position based on the local data gathered from its neighbors.
  • 38. Localization in WSN 38 Range-Free vs Range-Based  Range-Free (connectivity)  Makes no assumption about the availability or validity of such information, and use only connectivity information to locate the entire sensor network.  Hop-Counting Techniques  Range-Based (distance)  Defined by protocols that use absolute point to point distance estimates (range) or angle estimates in location calculation.
  • 39. Localization in WSN 39 Mobile vs Stationary  Mobile Stationary
  • 40. Localization in WSN 40 Coarse-grained vs fine- grained  Coarse-grained: finding approximate coordinates of nodes in a network so it provide lower precision estimates of this coordinates.  Fine-grained: Determining precisely the coordinates but require much more communication and computation efforts.
  • 41. Localization in WSN 41 Summary  WSN .. What & Why ?  Distance estimation VS position computation VS localization algorithm  Single/Multiple localization in WSN/WBSN  Calculating the distance between sensor nodes ( TOA – TDOA – RSSI – AOA )
  • 42. Localization in WSN 42 Summary  Range-based methods require extra hardware therefore have a higher cost but provide more accurate distance measurements, whereas range-free methods use only connectivity information and so are less accurate.  Range-free localization ( DV-Hop , Modified DV-Hop , pattern matching localization )  The localization techniques can be classified with respect to various criteria. They differ on the assumed localization precision, hardware capabilities, measurement and calculation methods, computing organization, the assumed network configuration, architecture, nodes properties and deployment, etc.
  • 43. Localization in WSN 43 Future Work  Few papers investigate multiple-source localization in WSN and WBSN
  • 44. Localization in WSN 44 References 1. http://www.hindawi.com/journals/ijdsn/2012/96 2. http://www.docslide.com/wireless-sensor-netw 3. http://www.docstoc.com/docs/32678966/Loc alization-in-Wireless-Sensor-Network--- ELEC-619B-Presentation
  • 45. Localization in WSN 45 References (Cont.) 4.https://www.cs.virginia.edu/~stankovic/psfiles/wsn.pdf 5.http://www.sersc.org/journals/IJCA/vol6_no3/7.pdf 6.http://www.docstoc.com/docs/130374399/Localization -in-Wireless-Sensor-Networks 7. http://www.degruyter.com/view/j/amcs.2012.22.issue- 2/v10006-012-0021-x/v10006-012-0021-x.xml
  • 46. Localization in WSN 46 Any Questions?
  • 47. Localization in WSN 47 Thank You !

Editor's Notes

  1. TDOA is the location determination method that AT&T uses to locate a caller when they dial 911 from their mobile phone. TDOA calculates the location of a mobile phone by using the difference in the time of arrival of signals at different cell sites.