SlideShare une entreprise Scribd logo
1  sur  50
Télécharger pour lire hors ligne
Prepared by:
Gamal Sallam
Prepared for:
Dr. Othman Baroudi
 What?
◦ To determine the physical coordinates of a group of sensor nodes in a
wireless sensor network (WSN)
◦ Due to application context, use of GPS is unrealistic
• GPS can work only outdoors.
• GPS receivers are too expensive for wide-range deployment.
• It cannot work in the presence of obstructions.
 Why?
◦ To report data that is geographically meaningful i.e., object tracking
◦ Services such as routing rely on location information; geographic
routing protocols; context-based routing protocols, location-aware
services
◦ coverage area management
◦ Self deployment
 Accuracy: Different applications have different requirements
 Energy constraints: All operations involved in localization and
tracking must be energy efficient
 Signal interference: collisions between packets transmitted by
different nodes at the same time
 Physical Layer Measurements:
- Signal strength, time of arrival, angle of arrival
- Prone to physical layer impairments (multipath
propagation, fading, shadowing, noise, etc.)
 Computational Constraints:
- Sophisticated algorithms cannot be efficiently performed on
wireless sensor nodes because of processing or memory
constraints
 Triangulation
 Finger print
 Centroid localization
 Next: the common follow of the triangulation
approach.
Start
Exist an Unknown Node which has atExist an Unknown Node which has at
least three reference node in its
coverage area
Select an Unknown Node
Reference Node
Estimate the Distance to the
Reference Node
Select Reference Node
Any Selected Reference Node
Without Estimated Distance
Any Selected Reference Node
Without Estimated Distance
Selected Unknown Node
Calculate the Position of the
Selected Unknown Node
Unknown Nod Selection
Distance Estimation
Position Computation
End
 The method used for distance calculation:
i. RSSI
ii. LQI
iii. TOA
iv. TDOA
 Received signal strength indicator.
- The idea:
- transmission power at the transmitting device ( ) directly
affects the receiving power at the receiving device ( ).
- Using Friis’s free space transmission equation:
(1)
(2)
 An ideal distribution of is not applicable
in practice
 In practice, the actual attenuation depends on
multipath propagation effects, reflections,
noise, etc.
 These attenuation degrades the quality of the
RSSI significantly.
 Realistic models replace with (n=3..5)
 Link quality indicator
 it indicates how strong the communications
link is.
 based on the received signal strength as well
as the number of errors received.
 It is only made available by IEEE 802.15.4
compliant devices.
 Distance between sender and receiver of a signal can be
determined using the measured signal propagation time
and known signal velocity
 Sound waves: 343m/s, i.e., approx. 30ms to travel 10m
 Radio signals: 300km/s, i.e., approx. 30ns to travel
10m
 One-way ToA
one-way propagation of signal
dist =(t -t )*v
 Two-way ToA
 round-trip time of signal is measured at
sender device
 requires highly accurate synchronization of
sender and receiver clocks
 two radio signals travelling at different speeds such as
radio frequency (RF) and ultrasound.
 example: radio signal (sent at and received at ),
followed by acoustic signal (sent at and received at
)
 +ve: no clock synchronization
required
 +ve: distance measurements can be very accurate
 -ve: need for additional hardware
 Range-based uses absolute point to-point
distance estimates for calculating the
location.
 more expensive
 Better accuracy
 Range-free doesn’t need such assumption.
 It assume that hop count proportional to the
their distance (less realistic)
 cost-effective
 Less accuracy
 In centralized algorithms,
• nodes send data to a central location where computation is
performed and the location of each node is determined
and sent back to the nodes.
 In distributed algorithms,
• each node determines its location by communication
with its neighboring nodes
• robust and energy efficient
 Centralized:
 expensive because the power supply for each
node is limited.
 latency, as well as consuming network
bandwidth.
 Decentralized
 reduce the power-consumption
 Can be more complex to implement
 At times may not be possible due to the limited
computational capabilities of sensor nodes
 Triangulation
 Fingerprint
 Centroid
 determine the location of a target point by
measuring distances to it from three different
known points.
 Step 1: distribute the beacon
nodes in the area of interest;
 Step 2: determine the distance
between each beacon node and
the target node d1,d2, and d3
based on the RSSI, LQI, ToA, or
TDoA values;
 Step 3: calculate the
intersection point (the target
node) between the three beacon
nodes with radiuses d1, d2, d3.
 We have the following three equations:
 Solve the above equations to get x, y.
 Problem: d1,d2, and d3 will never be
sufficiently accurate.
 Divide the area of interest in grids.
 determining how the signals will be received at every grid point.
 Two phases: offline phase& online phase.
 Offline phase:
 Step 1: distribute the beacon nodes , , in the area of tracking;
 Step 2: divide the area of tracking into several small grids and use the
grid points as reference points (x, y) , (x, y) ,. (x, y) , …in the tracking
area;
 Step 3: get the RSS values at each reference point from beacon nodes
and store them in the DB with the corresponding locations coordinates.
 Online phase:
 Step 1: the mobile target enters the tracking area, and then collects the
RSS values from each beacon node;
 Step 2: compares the collected RSS values with the stored values in the
DB;
 Step 3: retrieve the position from the DB with the closest RSS values.
 Pros:
 Better accuracy
 Less computation overhead on sensor
 Cons:
 Collecting RSS values and send them to the
server requires long period of time especially
if the area is large.
 the searching procedure through the
stored samples is time consuming.
 relies on a high density of beacons.
 every target sensor node can hear from several
beacons.
 each target node estimates its location by
measuring the centre of the location of all nodes
it hears.
 all beacons send their
position , ( = 1 … , )
to all target sensor nodes
within their transmission
range.
 Then all target sensor nodes calculate their
own position (x, y) by averaging the
coordinates of all n positions of the beacons
in range.
 Introduces weight functions to improve the accuracy of
localization.
 depends on the distance and the characteristics of the
target node receivers.
 g depends on the application scenario.
 each node maintains a table { , , ℎ } (location of anchor node
i and distance in hops between this node and anchor node i).
 when an anchor obtains distances to other anchors, it
determines the average hop length (“correction factor” ),
which is then propagated throughout the network.
 given the correction factor and the anchor locations, a node
can perform trilateration by multiply ℎ *c.
 Calculate c:
 C(a1)=100+40/(6+2)=17.5
 C(a2)=(40+75)/(2+5)=16.42.
 C(a3)=(75+100)/(5+6)=16.42.
 Each anchor send its c value.
 Node n will receive first from
A2, and will consider it the avg
Distance per hop.
 so the distance from anchors to node n is calculated by multiplying the
minimum hop number and received c.
 n−>a1=3∗16.42=49.26,
 n−>a2=2∗16.42=32.84,
 n−>a3=3∗16.42=49.26.
 Then use triangulation to compute node n position
 If nodes are randomly distributed DV-HOP results in a large
localization error.
 The uncertainty of the distance determinations due to the
changed application circumstance and the nature of radio
signal propagation.
 Environment Factor
 Eliminating the Outliers of Radio Signals
 Evolutionary Optimization
 The tracking environment in which a target is located is, in most
cases, dynamic, i.e., people waking in an indoor environment, or
weather changes in an outdoor environment.
 computes the environmental factors between beacon nodes with
known positions, based on finding out the relationship between
distances and RSS values.
 The environment factor can be measured between each
beacon node pair and
 The average environmental factor μ can be introduced as
the main characteristics for the tracking environment.
 Where n is the total number of beacon node covering the
mobile target MT.
 Each mobile target receives at least three different factors from
beacon nodes, in addition to the RSS values for each beacon node.
 It compute the average environment factor μ .
 Compute the distance using this equation:
 Then use triangulation to
Calculate the position.
 RSSI and LQI are affected by many environment factors such
as reflections, obstacle, and other electro-magnetic fields.
 Eliminating noise elements will assist in improving the
accuracy of the localization.
 The Dixon method is used here to eliminate the outlier of
RSSI values.
 The standard deviation of all the RSSI values received each
time is recorded as .
 The standard deviation threshold is defined as .
 The RSSI value, noted as , obtained from the RSSI
measurement is as follows:
 m is the number of the RSSI values which are less than or
equal to the mean of q RSSI values, alpha is calculated
according to the following equation:
 In the absence of noise in a system, the intersection of the
circles determines the one and only one target position.
 But it yields ambiguous solutions in the presence of noise in the
system, since the circles may intersect at multiple points
due to erroneous distance determination.
 Consequently, the localization problem
becomes a searching problem.
 the location of the target node
is calculated as follows.
 A popular statistical localization algorithm
is the nonlinear least squares (NLS) techniques
 PSO is a new heuristic method inspired by the social behavior of bird
flocking.
 particles fly through the problem hyperspace with given velocities.
 At each iteration, the velocities of the individual particles are
stochastically adjusted according to the historical best position for
the particle itself (pBest) and the overall swarm best position (gBest).
Both pBest and gBest are derived according to a user defined fitness
function.
 The fitness function can be defined as follows:
 where
 the searching space of the blind node can be defined as follow:
 Where ( , ) is the coordinates of the ith reference node;
 is the measured distance between the blind node and the ith
reference node;
 is the maximum range error of TOF ranging engine in the
tunnel environment;
 N≥3 is the number of the selected reference nodes.
 Then the rectangle defined by ( , ),( ,, ) is the
searching space of the blind node.
 The particles of PSO are randomly initialized in the searching
space at the beginning:
Where ( , ) is the position of the particle, rand(1) generates a
random number with a range of [0,1] and M is the number of the
particles.
 Each particle updates its position based on its own best exploration, the best swarm
overall experience and its previous velocity according to the following model:
 Where ( , ( )) is the current velocity vector of particle j;
 while ( + 1 , ( + 1)) is the velocity vector of particle j for the next iteration;
 ( , ( )) is the current position of particle j;
 ( + 1 , ( + 1)) is the position of particle j of the next iteration;
 (pBest , pBest ( )) is the best position particle j achieved based on its own
experience during previous k iterations;
 (gBest , gBest ( )) is the best particle position based on over swarm’s experience
during previous k iteration; w is the inertia weight; , are two positive constants;
rand(1) is a randomly generated number with a range of [0, 1]; and k is the iteration
index.
 Challenges:
 The space shape is long and narrow: WSN deployed there is of
the line or chain type and has low density, and data
transmission is energy expensive because of the multiple
hops;
 The air is wet and dirty due to water and dust, which
significantly affects the valid wireless communication
distance.
 The surface is usually rough and the multi-path effect on
radio propagation is severe.
 Population 10,
 Max iteration 200
 c1and c2 1.494,
 w 0.729
 Satisfied fitness value 1
 linear least square estimation (LLSE).
 seven potential estimation (SPE)
 particle swarm optimization estimation (PSOE)
 how to enable enough beacons in the neighborhood and if
there are not enough beacons, there how to use some of the
mobile target nodes whose locations have been determined
as additional beacons.
 Mobile target node 1 (Class A) contains three beacons in its
range and can get high accuracy and can be used as a
reference node.
 Mobile target node 2 is covered only by 2 beacon nodes with
known position, and one mobile target node with previously
determined position, less accuracy.
 Class C offers the worst tracking accuracy as the mobile
target nodes is covered by only a single beacon nodes and
the rest of the available reference nodes are the mobile target
nodes with previously determined positions.
 The error will be accumulated in Classes B and C.
 Service Industry:
 robots that perform tasks such as basic patient care in nursing
homes, maintenance and security in office buildings.
 Requires a mechanism for position estimation.
 Skilligent uses a visual localization system based on pattern
matching.
 Pollution Monitoring
 Sensor nodes that measure specific pollutants in the air are
mounted on vehicles.
 As the vehicles move along the roadways, the sensors sample the
air, and record the concentration of various pollutants along with
location and time.
 When the sensors are in the proximity of access points, the data
are uploaded to a server and published on the web.
 Shooter Detection / Weapon Classification:
 a soldier-wearable sensor system is developed that not only
identifies the location of an enemy sniper, but also identifies the
weapon being fired.
 Each sensor consists of an array of microphones mounted on the
helmet of a soldier.
 The sensor observes both the shock wave of the projectile, as
well as the muzzle blast from the weapon, and based on TDOA,
as well as properties of the acoustic signal, is able to triangulate
the enemy position and classify the weapon type.
 Pothole Detection:
 a system is developed to detect potholes on city streets.
Deployed on taxi cabs, the sensor nodes contain an
accelerometer, and can communicate using either opportunistic
Wi-Fi or cellular networks.
1. Shuang-Hua Yang,” Wireless Sensor Networks Principles, Design and
Applications”, chapter 10, Springer, 2014.
2. Tareq Alhmiedat, “Tracking Mobile Targets through Wireless Sensor
Networks”, A Doctoral Thesis, Oct, 2009.
3. Qin Y., Wang F., Zhou, C., Yang, S.H.: A particle swarm optimization
based distributed localization scheme in tunnel environment. Wireless
Sensor Systems—IET Conference, June,London (2012) .
4. M. Keshtgary, M. Fasihy, and Z. Ronaghi,” Performance Evaluation of
Hop-Based Range-Free Localization
MethodsinWirelessSensorNetworks” International Scholarly Research
NetworkISRN Communications and Networking, 2011.
5. Isaac Amundson and Xenofon D. Koutsoukos, “A Survey on
Localization for Mobile Wireless Sensor Networks”, Mobile Entity
Localization and Tracking in GPS-less Environnments, Volume
5801, 2009, pp 235-254.
6. Grossmann, Ralf, et al. "Localization in Zigbee-based sensor
networks."Proceedings of 1st European ZigBee Developers Conference,
EuZDC. 2007.

Contenu connexe

Tendances

Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocolsDarwin Nesakumar
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networksJayesh Rane
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Divya Tiwari
 
localization in wsn
localization in wsnlocalization in wsn
localization in wsnnehabsairam
 
Location Aided Routing (LAR)
Location Aided Routing (LAR) Location Aided Routing (LAR)
Location Aided Routing (LAR) Pradeep Kumar TS
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11Rahul Hada
 
Umts system architecture
Umts system architectureUmts system architecture
Umts system architectureMidhun S
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksSayed Chhattan Shah
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocolnitss007
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Accessanushkashastri
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manetshiujinghan
 
Node localization
Node localizationNode localization
Node localizationad-hocnet
 
Topology control protocols for WSNs challenges and research opportunities, 14...
Topology control protocols for WSNs challenges and research opportunities, 14...Topology control protocols for WSNs challenges and research opportunities, 14...
Topology control protocols for WSNs challenges and research opportunities, 14...Mohamed Mostafa
 
Prioritizing handoffs
Prioritizing handoffsPrioritizing handoffs
Prioritizing handoffsAJAL A J
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkChandra Meena
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewYoav Francis
 

Tendances (20)

Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networks
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
localization in wsn
localization in wsnlocalization in wsn
localization in wsn
 
Location Aided Routing (LAR)
Location Aided Routing (LAR) Location Aided Routing (LAR)
Location Aided Routing (LAR)
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11
 
Leach protocol
Leach protocolLeach protocol
Leach protocol
 
Umts system architecture
Umts system architectureUmts system architecture
Umts system architecture
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocol
 
GSM channels
GSM channelsGSM channels
GSM channels
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Access
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manet
 
Paging and Location Update
Paging and Location UpdatePaging and Location Update
Paging and Location Update
 
Node localization
Node localizationNode localization
Node localization
 
Topology control protocols for WSNs challenges and research opportunities, 14...
Topology control protocols for WSNs challenges and research opportunities, 14...Topology control protocols for WSNs challenges and research opportunities, 14...
Topology control protocols for WSNs challenges and research opportunities, 14...
 
Prioritizing handoffs
Prioritizing handoffsPrioritizing handoffs
Prioritizing handoffs
 
AODV routing protocol
AODV routing protocolAODV routing protocol
AODV routing protocol
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
 

En vedette

A Survey on Localization of Wireless Sensors
A Survey on Localization of Wireless SensorsA Survey on Localization of Wireless Sensors
A Survey on Localization of Wireless SensorsKarthik Mohan
 
Localization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networksLocalization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networksHabibur Rahman
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networksRushin Shah
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor NetworksKarthik
 
Localization scheme for underwater wsn
Localization scheme for underwater wsnLocalization scheme for underwater wsn
Localization scheme for underwater wsnAkshay Paswan
 
GPS [ Global Positioning System ]
GPS [ Global Positioning System ]GPS [ Global Positioning System ]
GPS [ Global Positioning System ]Akshit Gupta
 
An RSS Based Localization Algorithm in Cellular Networks
An RSS Based Localization Algorithm in Cellular NetworksAn RSS Based Localization Algorithm in Cellular Networks
An RSS Based Localization Algorithm in Cellular NetworksIDES Editor
 
Localization of Objects Using Cross-Correlation of Shadow Fading Noise and Co...
Localization of Objects Using Cross-Correlation of Shadow Fading Noise and Co...Localization of Objects Using Cross-Correlation of Shadow Fading Noise and Co...
Localization of Objects Using Cross-Correlation of Shadow Fading Noise and Co...Rana Basheer
 
3D routing algorithm for sensor network in e-health
3D routing algorithm for sensor network in e-health3D routing algorithm for sensor network in e-health
3D routing algorithm for sensor network in e-healthVakhtang Mosidze
 
Real Time Localization Using Receiver Signal Strength Indicator
Real Time Localization Using Receiver Signal Strength IndicatorReal Time Localization Using Receiver Signal Strength Indicator
Real Time Localization Using Receiver Signal Strength IndicatorRana Basheer
 
Trilateration Calculation Program for Location Tracking System
Trilateration Calculation Program for Location Tracking SystemTrilateration Calculation Program for Location Tracking System
Trilateration Calculation Program for Location Tracking SystemNiko Simon
 
Tutorial on c language programming
Tutorial on c language programmingTutorial on c language programming
Tutorial on c language programmingSudheer Kiran
 
Long-Range Wireless Sensor Networks for Geo-location Tracking: Design and Eva...
Long-Range Wireless Sensor Networks for Geo-location Tracking: Design and Eva...Long-Range Wireless Sensor Networks for Geo-location Tracking: Design and Eva...
Long-Range Wireless Sensor Networks for Geo-location Tracking: Design and Eva...Ahmad Muzaffar Baharudin
 
WirelessHart location determination application
WirelessHart location determination applicationWirelessHart location determination application
WirelessHart location determination applicationVaibhav Ukarande
 

En vedette (20)

A Survey on Localization of Wireless Sensors
A Survey on Localization of Wireless SensorsA Survey on Localization of Wireless Sensors
A Survey on Localization of Wireless Sensors
 
Localization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networksLocalization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networks
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Localization scheme for underwater wsn
Localization scheme for underwater wsnLocalization scheme for underwater wsn
Localization scheme for underwater wsn
 
GPS [ Global Positioning System ]
GPS [ Global Positioning System ]GPS [ Global Positioning System ]
GPS [ Global Positioning System ]
 
An RSS Based Localization Algorithm in Cellular Networks
An RSS Based Localization Algorithm in Cellular NetworksAn RSS Based Localization Algorithm in Cellular Networks
An RSS Based Localization Algorithm in Cellular Networks
 
Localization of Objects Using Cross-Correlation of Shadow Fading Noise and Co...
Localization of Objects Using Cross-Correlation of Shadow Fading Noise and Co...Localization of Objects Using Cross-Correlation of Shadow Fading Noise and Co...
Localization of Objects Using Cross-Correlation of Shadow Fading Noise and Co...
 
3D routing algorithm for sensor network in e-health
3D routing algorithm for sensor network in e-health3D routing algorithm for sensor network in e-health
3D routing algorithm for sensor network in e-health
 
Real Time Localization Using Receiver Signal Strength Indicator
Real Time Localization Using Receiver Signal Strength IndicatorReal Time Localization Using Receiver Signal Strength Indicator
Real Time Localization Using Receiver Signal Strength Indicator
 
C language tutorial
C language tutorialC language tutorial
C language tutorial
 
Trilateration Calculation Program for Location Tracking System
Trilateration Calculation Program for Location Tracking SystemTrilateration Calculation Program for Location Tracking System
Trilateration Calculation Program for Location Tracking System
 
Rssi report
Rssi reportRssi report
Rssi report
 
bin'Abdullah_JACM 2015
bin'Abdullah_JACM 2015bin'Abdullah_JACM 2015
bin'Abdullah_JACM 2015
 
Undergrad thesis - Vivekananda S
Undergrad thesis - Vivekananda SUndergrad thesis - Vivekananda S
Undergrad thesis - Vivekananda S
 
Tutorial on c language programming
Tutorial on c language programmingTutorial on c language programming
Tutorial on c language programming
 
Long-Range Wireless Sensor Networks for Geo-location Tracking: Design and Eva...
Long-Range Wireless Sensor Networks for Geo-location Tracking: Design and Eva...Long-Range Wireless Sensor Networks for Geo-location Tracking: Design and Eva...
Long-Range Wireless Sensor Networks for Geo-location Tracking: Design and Eva...
 
WirelessHart location determination application
WirelessHart location determination applicationWirelessHart location determination application
WirelessHart location determination application
 

Similaire à Sensor Localization presentation1&2

Environmentally Corrected RSSI Based Real Time Location Detection System
Environmentally Corrected RSSI Based Real Time Location Detection SystemEnvironmentally Corrected RSSI Based Real Time Location Detection System
Environmentally Corrected RSSI Based Real Time Location Detection SystemAIRCC Publishing Corporation
 
Modified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNsModified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNsidescitation
 
ENVIRONMENTALLY CORRECTED RSSI BASED REAL TIME LOCATION DETECTION SYSTEM
ENVIRONMENTALLY CORRECTED RSSI BASED REAL TIME LOCATION DETECTION SYSTEMENVIRONMENTALLY CORRECTED RSSI BASED REAL TIME LOCATION DETECTION SYSTEM
ENVIRONMENTALLY CORRECTED RSSI BASED REAL TIME LOCATION DETECTION SYSTEMijcsit
 
CUBOID-BASED WIRELESS SENSOR NETWORK LOCALIZATION ALGORITHM
CUBOID-BASED WIRELESS SENSOR NETWORK LOCALIZATION ALGORITHM CUBOID-BASED WIRELESS SENSOR NETWORK LOCALIZATION ALGORITHM
CUBOID-BASED WIRELESS SENSOR NETWORK LOCALIZATION ALGORITHM ijassn
 
Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...Dr. Amarjeet Singh
 
WIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORS’ ANTENNAS
WIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORS’ ANTENNASWIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORS’ ANTENNAS
WIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORS’ ANTENNASijassn
 
Direct_studies_report13
Direct_studies_report13Direct_studies_report13
Direct_studies_report13Farhad Gholami
 
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor NetworksA New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor Networksidescitation
 
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...sipij
 
Optimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor NetworksOptimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor Networkspaperpublications3
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor NetworksIOSR Journals
 
IOT-WSN: SURVEY ON POSITIONING TECHNIQUES
IOT-WSN: SURVEY ON POSITIONING TECHNIQUESIOT-WSN: SURVEY ON POSITIONING TECHNIQUES
IOT-WSN: SURVEY ON POSITIONING TECHNIQUESijassn
 
MULTI-ANTENNA LOCALIZATION METHOD
MULTI-ANTENNA LOCALIZATION METHODMULTI-ANTENNA LOCALIZATION METHOD
MULTI-ANTENNA LOCALIZATION METHODijwmn
 
Accurate indoor positioning system based on modify nearest point technique
Accurate indoor positioning system based on modify nearest point techniqueAccurate indoor positioning system based on modify nearest point technique
Accurate indoor positioning system based on modify nearest point techniqueIJECEIAES
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...Alexander Decker
 
Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...
Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...
Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...TELKOMNIKA JOURNAL
 
Indoor localization in sensor network with
Indoor localization in sensor network withIndoor localization in sensor network with
Indoor localization in sensor network witheSAT Publishing House
 

Similaire à Sensor Localization presentation1&2 (20)

Environmentally Corrected RSSI Based Real Time Location Detection System
Environmentally Corrected RSSI Based Real Time Location Detection SystemEnvironmentally Corrected RSSI Based Real Time Location Detection System
Environmentally Corrected RSSI Based Real Time Location Detection System
 
Modified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNsModified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNs
 
ENVIRONMENTALLY CORRECTED RSSI BASED REAL TIME LOCATION DETECTION SYSTEM
ENVIRONMENTALLY CORRECTED RSSI BASED REAL TIME LOCATION DETECTION SYSTEMENVIRONMENTALLY CORRECTED RSSI BASED REAL TIME LOCATION DETECTION SYSTEM
ENVIRONMENTALLY CORRECTED RSSI BASED REAL TIME LOCATION DETECTION SYSTEM
 
CUBOID-BASED WIRELESS SENSOR NETWORK LOCALIZATION ALGORITHM
CUBOID-BASED WIRELESS SENSOR NETWORK LOCALIZATION ALGORITHM CUBOID-BASED WIRELESS SENSOR NETWORK LOCALIZATION ALGORITHM
CUBOID-BASED WIRELESS SENSOR NETWORK LOCALIZATION ALGORITHM
 
Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...
 
WIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORS’ ANTENNAS
WIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORS’ ANTENNASWIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORS’ ANTENNAS
WIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORS’ ANTENNAS
 
2015LISAT_pathloss1
2015LISAT_pathloss12015LISAT_pathloss1
2015LISAT_pathloss1
 
Direct_studies_report13
Direct_studies_report13Direct_studies_report13
Direct_studies_report13
 
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor NetworksA New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
 
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
 
Optimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor NetworksOptimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor Networks
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks
 
IOT-WSN: SURVEY ON POSITIONING TECHNIQUES
IOT-WSN: SURVEY ON POSITIONING TECHNIQUESIOT-WSN: SURVEY ON POSITIONING TECHNIQUES
IOT-WSN: SURVEY ON POSITIONING TECHNIQUES
 
MULTI-ANTENNA LOCALIZATION METHOD
MULTI-ANTENNA LOCALIZATION METHODMULTI-ANTENNA LOCALIZATION METHOD
MULTI-ANTENNA LOCALIZATION METHOD
 
Accurate indoor positioning system based on modify nearest point technique
Accurate indoor positioning system based on modify nearest point techniqueAccurate indoor positioning system based on modify nearest point technique
Accurate indoor positioning system based on modify nearest point technique
 
Localization in wsn
Localization in wsnLocalization in wsn
Localization in wsn
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...
 
Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...
Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...
Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...
 
Indoor localization in sensor network with
Indoor localization in sensor network withIndoor localization in sensor network with
Indoor localization in sensor network with
 

Dernier

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Dernier (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

Sensor Localization presentation1&2

  • 1. Prepared by: Gamal Sallam Prepared for: Dr. Othman Baroudi
  • 2.  What? ◦ To determine the physical coordinates of a group of sensor nodes in a wireless sensor network (WSN) ◦ Due to application context, use of GPS is unrealistic • GPS can work only outdoors. • GPS receivers are too expensive for wide-range deployment. • It cannot work in the presence of obstructions.  Why? ◦ To report data that is geographically meaningful i.e., object tracking ◦ Services such as routing rely on location information; geographic routing protocols; context-based routing protocols, location-aware services ◦ coverage area management ◦ Self deployment
  • 3.  Accuracy: Different applications have different requirements  Energy constraints: All operations involved in localization and tracking must be energy efficient  Signal interference: collisions between packets transmitted by different nodes at the same time  Physical Layer Measurements: - Signal strength, time of arrival, angle of arrival - Prone to physical layer impairments (multipath propagation, fading, shadowing, noise, etc.)  Computational Constraints: - Sophisticated algorithms cannot be efficiently performed on wireless sensor nodes because of processing or memory constraints
  • 4.  Triangulation  Finger print  Centroid localization  Next: the common follow of the triangulation approach.
  • 5. Start Exist an Unknown Node which has atExist an Unknown Node which has at least three reference node in its coverage area Select an Unknown Node Reference Node Estimate the Distance to the Reference Node Select Reference Node Any Selected Reference Node Without Estimated Distance Any Selected Reference Node Without Estimated Distance Selected Unknown Node Calculate the Position of the Selected Unknown Node Unknown Nod Selection Distance Estimation Position Computation End
  • 6.  The method used for distance calculation: i. RSSI ii. LQI iii. TOA iv. TDOA
  • 7.  Received signal strength indicator. - The idea: - transmission power at the transmitting device ( ) directly affects the receiving power at the receiving device ( ). - Using Friis’s free space transmission equation: (1) (2)
  • 8.  An ideal distribution of is not applicable in practice  In practice, the actual attenuation depends on multipath propagation effects, reflections, noise, etc.  These attenuation degrades the quality of the RSSI significantly.  Realistic models replace with (n=3..5)
  • 9.
  • 10.  Link quality indicator  it indicates how strong the communications link is.  based on the received signal strength as well as the number of errors received.  It is only made available by IEEE 802.15.4 compliant devices.
  • 11.
  • 12.  Distance between sender and receiver of a signal can be determined using the measured signal propagation time and known signal velocity  Sound waves: 343m/s, i.e., approx. 30ms to travel 10m  Radio signals: 300km/s, i.e., approx. 30ns to travel 10m  One-way ToA one-way propagation of signal dist =(t -t )*v
  • 13.  Two-way ToA  round-trip time of signal is measured at sender device  requires highly accurate synchronization of sender and receiver clocks
  • 14.  two radio signals travelling at different speeds such as radio frequency (RF) and ultrasound.  example: radio signal (sent at and received at ), followed by acoustic signal (sent at and received at )  +ve: no clock synchronization required  +ve: distance measurements can be very accurate  -ve: need for additional hardware
  • 15.
  • 16.  Range-based uses absolute point to-point distance estimates for calculating the location.  more expensive  Better accuracy  Range-free doesn’t need such assumption.  It assume that hop count proportional to the their distance (less realistic)  cost-effective  Less accuracy
  • 17.  In centralized algorithms, • nodes send data to a central location where computation is performed and the location of each node is determined and sent back to the nodes.  In distributed algorithms, • each node determines its location by communication with its neighboring nodes • robust and energy efficient
  • 18.
  • 19.  Centralized:  expensive because the power supply for each node is limited.  latency, as well as consuming network bandwidth.  Decentralized  reduce the power-consumption  Can be more complex to implement  At times may not be possible due to the limited computational capabilities of sensor nodes
  • 21.  determine the location of a target point by measuring distances to it from three different known points.  Step 1: distribute the beacon nodes in the area of interest;  Step 2: determine the distance between each beacon node and the target node d1,d2, and d3 based on the RSSI, LQI, ToA, or TDoA values;  Step 3: calculate the intersection point (the target node) between the three beacon nodes with radiuses d1, d2, d3.
  • 22.  We have the following three equations:  Solve the above equations to get x, y.  Problem: d1,d2, and d3 will never be sufficiently accurate.
  • 23.  Divide the area of interest in grids.  determining how the signals will be received at every grid point.  Two phases: offline phase& online phase.  Offline phase:  Step 1: distribute the beacon nodes , , in the area of tracking;  Step 2: divide the area of tracking into several small grids and use the grid points as reference points (x, y) , (x, y) ,. (x, y) , …in the tracking area;  Step 3: get the RSS values at each reference point from beacon nodes and store them in the DB with the corresponding locations coordinates.  Online phase:  Step 1: the mobile target enters the tracking area, and then collects the RSS values from each beacon node;  Step 2: compares the collected RSS values with the stored values in the DB;  Step 3: retrieve the position from the DB with the closest RSS values.
  • 24.
  • 25.
  • 26.  Pros:  Better accuracy  Less computation overhead on sensor  Cons:  Collecting RSS values and send them to the server requires long period of time especially if the area is large.  the searching procedure through the stored samples is time consuming.
  • 27.  relies on a high density of beacons.  every target sensor node can hear from several beacons.  each target node estimates its location by measuring the centre of the location of all nodes it hears.  all beacons send their position , ( = 1 … , ) to all target sensor nodes within their transmission range.
  • 28.  Then all target sensor nodes calculate their own position (x, y) by averaging the coordinates of all n positions of the beacons in range.
  • 29.  Introduces weight functions to improve the accuracy of localization.  depends on the distance and the characteristics of the target node receivers.  g depends on the application scenario.
  • 30.  each node maintains a table { , , ℎ } (location of anchor node i and distance in hops between this node and anchor node i).  when an anchor obtains distances to other anchors, it determines the average hop length (“correction factor” ), which is then propagated throughout the network.  given the correction factor and the anchor locations, a node can perform trilateration by multiply ℎ *c.
  • 31.  Calculate c:  C(a1)=100+40/(6+2)=17.5  C(a2)=(40+75)/(2+5)=16.42.  C(a3)=(75+100)/(5+6)=16.42.  Each anchor send its c value.  Node n will receive first from A2, and will consider it the avg Distance per hop.  so the distance from anchors to node n is calculated by multiplying the minimum hop number and received c.  n−>a1=3∗16.42=49.26,  n−>a2=2∗16.42=32.84,  n−>a3=3∗16.42=49.26.  Then use triangulation to compute node n position  If nodes are randomly distributed DV-HOP results in a large localization error.
  • 32.  The uncertainty of the distance determinations due to the changed application circumstance and the nature of radio signal propagation.  Environment Factor  Eliminating the Outliers of Radio Signals  Evolutionary Optimization
  • 33.  The tracking environment in which a target is located is, in most cases, dynamic, i.e., people waking in an indoor environment, or weather changes in an outdoor environment.  computes the environmental factors between beacon nodes with known positions, based on finding out the relationship between distances and RSS values.
  • 34.  The environment factor can be measured between each beacon node pair and  The average environmental factor μ can be introduced as the main characteristics for the tracking environment.  Where n is the total number of beacon node covering the mobile target MT.
  • 35.  Each mobile target receives at least three different factors from beacon nodes, in addition to the RSS values for each beacon node.  It compute the average environment factor μ .  Compute the distance using this equation:  Then use triangulation to Calculate the position.
  • 36.  RSSI and LQI are affected by many environment factors such as reflections, obstacle, and other electro-magnetic fields.  Eliminating noise elements will assist in improving the accuracy of the localization.  The Dixon method is used here to eliminate the outlier of RSSI values.  The standard deviation of all the RSSI values received each time is recorded as .  The standard deviation threshold is defined as .  The RSSI value, noted as , obtained from the RSSI measurement is as follows:
  • 37.  m is the number of the RSSI values which are less than or equal to the mean of q RSSI values, alpha is calculated according to the following equation:
  • 38.  In the absence of noise in a system, the intersection of the circles determines the one and only one target position.  But it yields ambiguous solutions in the presence of noise in the system, since the circles may intersect at multiple points due to erroneous distance determination.  Consequently, the localization problem becomes a searching problem.  the location of the target node is calculated as follows.  A popular statistical localization algorithm is the nonlinear least squares (NLS) techniques
  • 39.  PSO is a new heuristic method inspired by the social behavior of bird flocking.  particles fly through the problem hyperspace with given velocities.  At each iteration, the velocities of the individual particles are stochastically adjusted according to the historical best position for the particle itself (pBest) and the overall swarm best position (gBest). Both pBest and gBest are derived according to a user defined fitness function.  The fitness function can be defined as follows:  where  the searching space of the blind node can be defined as follow:
  • 40.  Where ( , ) is the coordinates of the ith reference node;  is the measured distance between the blind node and the ith reference node;  is the maximum range error of TOF ranging engine in the tunnel environment;  N≥3 is the number of the selected reference nodes.  Then the rectangle defined by ( , ),( ,, ) is the searching space of the blind node.  The particles of PSO are randomly initialized in the searching space at the beginning: Where ( , ) is the position of the particle, rand(1) generates a random number with a range of [0,1] and M is the number of the particles.
  • 41.  Each particle updates its position based on its own best exploration, the best swarm overall experience and its previous velocity according to the following model:  Where ( , ( )) is the current velocity vector of particle j;  while ( + 1 , ( + 1)) is the velocity vector of particle j for the next iteration;  ( , ( )) is the current position of particle j;  ( + 1 , ( + 1)) is the position of particle j of the next iteration;  (pBest , pBest ( )) is the best position particle j achieved based on its own experience during previous k iterations;  (gBest , gBest ( )) is the best particle position based on over swarm’s experience during previous k iteration; w is the inertia weight; , are two positive constants; rand(1) is a randomly generated number with a range of [0, 1]; and k is the iteration index.
  • 42.
  • 43.  Challenges:  The space shape is long and narrow: WSN deployed there is of the line or chain type and has low density, and data transmission is energy expensive because of the multiple hops;  The air is wet and dirty due to water and dust, which significantly affects the valid wireless communication distance.  The surface is usually rough and the multi-path effect on radio propagation is severe.
  • 44.  Population 10,  Max iteration 200  c1and c2 1.494,  w 0.729  Satisfied fitness value 1
  • 45.  linear least square estimation (LLSE).  seven potential estimation (SPE)  particle swarm optimization estimation (PSOE)
  • 46.  how to enable enough beacons in the neighborhood and if there are not enough beacons, there how to use some of the mobile target nodes whose locations have been determined as additional beacons.
  • 47.  Mobile target node 1 (Class A) contains three beacons in its range and can get high accuracy and can be used as a reference node.  Mobile target node 2 is covered only by 2 beacon nodes with known position, and one mobile target node with previously determined position, less accuracy.  Class C offers the worst tracking accuracy as the mobile target nodes is covered by only a single beacon nodes and the rest of the available reference nodes are the mobile target nodes with previously determined positions.  The error will be accumulated in Classes B and C.
  • 48.  Service Industry:  robots that perform tasks such as basic patient care in nursing homes, maintenance and security in office buildings.  Requires a mechanism for position estimation.  Skilligent uses a visual localization system based on pattern matching.  Pollution Monitoring  Sensor nodes that measure specific pollutants in the air are mounted on vehicles.  As the vehicles move along the roadways, the sensors sample the air, and record the concentration of various pollutants along with location and time.  When the sensors are in the proximity of access points, the data are uploaded to a server and published on the web.
  • 49.  Shooter Detection / Weapon Classification:  a soldier-wearable sensor system is developed that not only identifies the location of an enemy sniper, but also identifies the weapon being fired.  Each sensor consists of an array of microphones mounted on the helmet of a soldier.  The sensor observes both the shock wave of the projectile, as well as the muzzle blast from the weapon, and based on TDOA, as well as properties of the acoustic signal, is able to triangulate the enemy position and classify the weapon type.  Pothole Detection:  a system is developed to detect potholes on city streets. Deployed on taxi cabs, the sensor nodes contain an accelerometer, and can communicate using either opportunistic Wi-Fi or cellular networks.
  • 50. 1. Shuang-Hua Yang,” Wireless Sensor Networks Principles, Design and Applications”, chapter 10, Springer, 2014. 2. Tareq Alhmiedat, “Tracking Mobile Targets through Wireless Sensor Networks”, A Doctoral Thesis, Oct, 2009. 3. Qin Y., Wang F., Zhou, C., Yang, S.H.: A particle swarm optimization based distributed localization scheme in tunnel environment. Wireless Sensor Systems—IET Conference, June,London (2012) . 4. M. Keshtgary, M. Fasihy, and Z. Ronaghi,” Performance Evaluation of Hop-Based Range-Free Localization MethodsinWirelessSensorNetworks” International Scholarly Research NetworkISRN Communications and Networking, 2011. 5. Isaac Amundson and Xenofon D. Koutsoukos, “A Survey on Localization for Mobile Wireless Sensor Networks”, Mobile Entity Localization and Tracking in GPS-less Environnments, Volume 5801, 2009, pp 235-254. 6. Grossmann, Ralf, et al. "Localization in Zigbee-based sensor networks."Proceedings of 1st European ZigBee Developers Conference, EuZDC. 2007.