Professional Documents
Culture Documents
RSS-Based Sensor Localization in the Presence of techniques based on eliminating the common term [15], [16]. A joint
Unknown Channel Parameters estimation technique based on the SDR and the LLS was proposed
in [17], [18], which shows good performance compared to recently
Mohammad Reza Gholami, Student Member, IEEE, suggested approaches. Although the proposed approaches show good
Reza Monir Vaghefi, Student Member, IEEE, and performance in some scenarios, it is still required to improve the
Erik G. Ström, Senior Member, IEEE performance of the estimators when channel parameters are unknown.
In this study, we consider the RSS-based localization problem when
the channel parameters, i.e., the transmit power or path-loss exponent,
are unknown. Different from [19], we model the unknown transmit
Abstract—This correspondence studies the received signal strength-
based localization problem when the transmit power or path-loss exponent
power and path-loss exponent as fixed nuisance unknown parameters.
is unknown. The corresponding maximum-likelihood estimator (MLE) Similar to our previous work [17] using suitable approximations, we
poses a difficult nonconvex optimization problem. To avoid the difficulty obtain a nonlinear least squares objective function, which is smoother
in solving the MLE, we use suitable approximations and formulate the than the original MLE objective function but still is nonconvex. We,
localization problem as a general trust region subproblem, which can be then, formulate the localization problem as a general trust region sub-
solved exactly under mild conditions. Simulation results show a promising
performance for the proposed methods, which also have reasonable problem. In fact in this step, instead of relaxing the problem to a convex
complexities compared to existing approaches. problem, which has been done, e.g., in [17], [18] when the transmit
power is unknown, we transform the problem to a quadratic program
Index Terms—General trust region subproblem, localization, path-loss
exponent, received signal strength, transmit power, wireless sensor net- and employ a technique developed in the numerical optimization lit-
work. erature for solving such a problem [20], [21]. Under mild conditions,
the proposed approach will attain the optimal solution of the consid-
ered problem. In this paper, we first propose techniques to solve the
I. INTRODUCTION localization problem when either the transmit power or the path-loss
exponent is unknown. We, then, extend the proposed techniques to a
Localizing an unknown sensor node, henceforth called the target general case when both channel parameters are unknown. Simulation
node, using received signal strength (RSS) is a popular technique in results show that the proposed approach outperforms previous tech-
the literature in the context of location aware services [1], [2]. In this niques and demonstrate that the suggested techniques are very close to
approach a number of fixed sensors at known positions, called refer- Cramér-Rao lower bound (CRLB) in some scenarios.
ence nodes, measure the power of the signal transmitted by a target
node and estimate the location of the target node. In the literature the
II. SYSTEM MODEL
received power is commonly modeled by the log-normal shadowing
model [3]. During the past few years a huge number of algorithms have Let us consider a 2D network consisting of a target node at unknown
been proposed to solve the localization problem based on the RSS mea- position, , and reference nodes at known locations,
surements. The maximum likelihood estimator (MLE) derived for this . We assume that the target node transmits a signal
problem is highly nonlinear and nonconvex [4]. To avoid difficulty in and the reference nodes are able to measure the power of the received
solving the MLE, a number of suboptimal estimators have been sug- signal from the target node. The received power (in dBm) of the signal
gested in the literature, e.g., algorithms based on the semidefinite re- transmitted by the target node at the th reference node, , under the
laxation (SDR) [5]–[7], the linear least squares (LLS) [8], [9], the con- log-normal shadowing model, is given by [4], [6], [22], [23]
strained linear least squares [10], and projection onto convex sets [11],
[12], just to cite a few. (1)
The power of the received signal mainly depends on the transmit
power of the target node and the path-loss exponent. The transmit
where (in dBm) is the reference power at distance from the target
power of a target node depends on, e.g., its battery and radiation
node, is the path-loss exponent, is the Euclidean dis-
pattern and the path-loss exponent depends on the environment. A
tance between the target node and the reference node, and are the
number of researchers tackled the localization problem when channel
log-normal shadowing terms modeled as independent and identically
parameters are unknown, e.g., [13], [14], and derived suboptimal
distributed zero-mean Gaussian random variables with standard devia-
estimators. When only the transmit power is unknown, there are a
tion , i.e., . Without loss of generality, we assume
number of approaches to deal with the localization problem, e.g.,
that . We assume that and are fixed unknown parameters
during the localization process. Assuming the transmit power, , or
Manuscript received June 08, 2012; revised November 07, 2012 and February path-loss exponent, , as an unknown parameter, the MLE to estimate
02, 2013; accepted March 19, 2013. Date of publication April 26, 2013; date of the location of the target based on the model in (1) is obtained by the
current version July 02, 2013. The associate editor coordinating the review of
following nonconvex optimization problem [24]:
this manuscript and approving it for publication was Dr. Marius Pesavento. This
work was supported by the Swedish Research Council (contract no. 2007-6363).
M. R. Gholami and E. G. Ström are with the Division of Communica-
tion Systems and Information Theory, Department of Signals and Systems,
(2)
Chalmers University of Technology, SE-412 96 Gothenburg, Sweden (e-mail:
moreza@chalmers.se; erik.strom@chalmers.se).
R. M. Vaghefi is with the Mobile and Portable Radio Research Group, where , , or and the set
Wireless@Virginia Tech, Bradley Department of Electrical and Computer defines a set in which the unknown parameters belong, e.g., if
Engineering, Virginia Polytechnic Institute and State University, Blacksburg, , then . As it is observed,
VA 24061 USA (e-mail: vaghefi@vt.edu).
Color versions of one or more of the figures in this paper are available online the MLE is highly nonconvex and difficult to solve, especially when
at http://ieeexplore.ieee.org. is unknown. In the next section, we propose suboptimal techniques to
Digital Object Identifier 10.1109/TSP.2013.2260330 solve the problem.
III. SUBOPTIMAL ALGORITHMS where the operator diag denotes a diagonal matrix. The problem in (8)
minimizes a quadratic function over a quadratic constraint. This type
We first study the localization problem when either or is un-
of problem is called a generalized trust region subproblem [20]. It is
known. Then, we extend the results to a general case when both
known that the general trust region subproblem has no duality gap and
and are unknown. We formulate different cases as general trust re-
the optimal solution can be extracted from the dual solution [20], [26],
gion subproblems. For details of solving the trust region subproblem,
[29]. A necessary and sufficient condition for to be optimal in (9) is
we refer the reader to, e.g., [20], [25], [26].
that [26]
Note that in the localization literature a fixed transmission power and
path-loss exponent are usually assumed for different links, e.g., see [6],
[22], [23], [27], [28] and references therein.
(9)
A. Unknown Transmit Power
The last expression in (9) means that is a positive
This section describes the procedure of approximating the MLE of semidefinite matrix. Under conditions considered in (9), the solution
(2) for the case when is known (i.e., when ) into a to the problem of (8) is given by
nonlinear least squares (NLS) problem. We divide both sides of (1) by
and reformulate Equation (1) as (10)
where , , and . Taking the
power of 10 on both sides yields In such a situation to find , we simply replace (10) into constraint
, i.e.,
(3)
(11)
For sufficiently small noise, the right hand side of (3) can be approxi-
mated using the first-order Taylor series expansion as1
where the interval consists of all such that . The
interval of is given by [21] with representing
(4) the largest eigenvalue of [20]. In sum-
mary, the solution to (7) is obtained as follows:
Equation (4) can be, alternatively, written as
• Use a bisection search to find a root of , say . Note
(5) that is a strictly decreasing function with respect to [20].
• Replace in (10) to obtain .
where is a zero-mean Gaussian random variable with variance • Estimate the unknown parameters as
. In this step, we apply the nonlinear least squares , with denoting the th to the
criterion to the model in (5) to estimate the unknown parameters. The th elements of vector .
corresponding NLS estimator of the unknown parameters in Note that when , which is called hard case [25], can be
(5) is [24, Ch. 8], suitably handled using techniques introduced in the literature [21], [25].
However, this case occurs rarely in practical situations; we have never
(6) observed it any of our numerous simulations. That the hard case is rare
has also been noted in other studies, e.g., in [21].
The cost function (6) is still nonlinear and noncovex, but it is much
smoother than the MLE objective function in (2) [17]. Let us write the B. Unknown Path-Loss Exponent
problem (6) as
In this section, we assume that the transmit power is known, but
the path-loss exponent is unknown. We propose a two-step estimator
to find estimates of the location and path-loss exponent. We first jointly
estimate the path-loss exponent and the location of the target node.
(7) Then, we update the estimate of both parameters. We assume that
belongs to an interval . In practice the path-loss exponent
Now, we express the problem in (7) as a quadratic program as varies normally from 2 (free space) to 6 (e.g., in an indoor scenario).
We express (1) (assuming ) as .
Similar to (4), we can write
(8) (12)
1Note that .
3754 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 61, NO. 15, AUGUST 1, 2013
A Taylor series expansion around and assuming that is small 2) Second Step: In this step, we refine the estimates derived in the
leads to the approximations and first step. Note that it is possible to estimate the path-loss exponent
from the first step as , but as we have observed,
(13) through simulations, that in the first step, the location is more accurately
estimated compared to the path-loss exponent. Therefore in this step,
we first update the path-loss exponent using a simple estimator based
where . The model in (13) is still nonlinear and
on the estimate of the location of the target obtained in (16). From (1)
difficult to solve. To obtain a linear model based on the unknown pa-
using the method of moment [24], we estimate the path-loss exponent
rameters, we make yet another simplifying assumption. Considering
as
a Taylor series expansion of around , and assuming that
is small, yields the approximation , which in
turn allows us to further approximate as
(17)
(14)
Note that since the true distance is not available, we
The approximation in (14) is valid as long as is small. For ex- instead used the approximate distance in (17), where
ample, if is extremely small, which means is very close to , the is the estimate of the target location obtained in the first step, i.e., (16).
expression in (14) is a valid approximation. Otherwise, we can inves- With an estimate of the path-loss exponent in (17), we back to (12) and
tigate for which networks the approximation in (14) is valid. In the write
shadow-free case, we have
(18)
(23)
Fig. 1. The RMSE of different approaches for (a) the location estimate and (b)
the power estimate. Fig. 2. The RMSE of the proposed approach for transmission power modeled
as a in dBm; (a) the location estimation and (b) the mean of the
power, , estimation.
of the transmit power estimation for different approaches. As can be
observed, both proposed approach and the LLS outperform the SDR
method and the corresponding CRLB. Although there is a gap between
and are close to the CRLB.
the CRLB and the proposed method, the performance of the proposed
To study the robustness of the algorithm against the perturbation
method seems to be acceptable. We have further implemented the MLE
in transmission power, we model the transmit power as a Gaussian
using lsqnonlin [32] initialized with the estimate given by the proposed
random variable with mean and standard deviation , i.e.,
algorithm or with true values of the target location and path-loss ex-
. Then, the algorithm tries to jointly estimate the mean power
ponent for comparison. As it is observed from Fig. 3(b), the estimate
and the location.
can be considerably improved. It is observed that there is a gap be-
Fig. 2 illustrates the RMSE of the location and transmission power
tween the MLE and the CRLB. The reason is that the MLE asymptot-
estimates for different values of standard deviation of perturbation.
ically attains the CRLB. That is, for low variances of noise or large
It is observed that the perturbation in power transmission can be ab-
number of measurements, the MLE is optimal. To study the effect of
sorbed in the showing terms, especially for low standard deviation of
parameter , we first evaluate the validity of the approximation used
perturbation, and the behavior of estimates remains the same. It is ob-
in (14). In Fig. 4, we plot the cumulative distribution function (CDF)
served when the variance of the shadowing is small, the performance
of for different values of . As can
is mainly affected by the perturbation noise.
be seen, the value of considerably affects the validity of the ap-
proximation. For instance, seems a good choice in this sce-
B. Unknown Path-Loss Exponent
nario. In Figs. 5(a) and 5(b), we plot the RMSE of the location and
In the next simulations, we assume that the transmit power is path-loss exponent estimation versus for different variances .
known and we estimate both the path-loss exponent and the location of As it is seen, there is a critical value for such that the estimation
the target node. errors for the location and the path-loss exponent are minimized. This
Fig. 3(a) shows the CRLB and the RMSE of the location estimation phenomena is clearly seen in Fig. 5(b). Considering the definition of
for the proposed technique. In this simulation, we set , that is, , we see that both small and large values of make
. As can be observed, the proposed approach is close be large. Therefore, the approximation in (14) may not be valid. In the
to the CRLB. The gap between the CRLB and the proposed method is next simulation, we compare the performance of the proposed approach
mainly because of the approximations used in different steps. Fig. 3(b) in this study with the one proposed in [35]. Note that in [35], the au-
shows the RMSE of the path-loss exponent estimation for the proposed thors assume different path-loss exponents for every link and propose
IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 61, NO. 15, AUGUST 1, 2013 3757
Fig. 5. The RMSE of the proposed approach for the (a) location estimation, (b)
path-loss exponent.
Fig. 3. The RMSE of the proposed approach and the CRLB for (a) the location
estimation and (b) the path-loss exponent estimation.
needed to have a reasonable interval for the path-loss and an initial es-
timate of the path-loss at the beginning. We set both the initial value
and equal to 5.
Fig. 6 shows the RMSE of the location and path-loss exponent es-
timates for different approaches when the path-loss exponent is uni-
formly distributed over an interval, noted in the title of figures. It is
observed that the proposed approach outperforms the method in [35],
especially for the location estimate.
APPENDIX
CRAMÉR-RAO LOWER BOUND
In this section, we compute the CRLB for the location estimate and
unknown nuisance parameters ( or ). For the Gaussian distribution,
the Fisher information matrix can be computed as [24, Ch. 3]
(31)
(32)
ACKNOWLEDGMENT
Fig. 6. Comparison between the performance of the proposed technique and The authors would like to thank the associate editor and the anony-
the approach proposed in [35] for (a) location estimate for , mous reviewers for their valuable comments and suggestions which
and (b) path-loss exponent for . improved the quality of the paper.
REFERENCES
[1] G. Mao and B. Fidan, “Localization Algorithms and Strategies for
Wireless Sensor Networks,” in Information Science reference. New
York, NY, USA: Hershey, 2009.
[2] D. Dardari, M. Luise, and E. Falletti, Satellite and Terrestrial Radio
Positioning Techniques: A Signal Processing Perspective. New York,
NY, USA: Academic, 2011.
[3] N. Patwari, J. Ash, S. Kyperountas, A. O. Hero, and N. C. Correal, “Lo-
cating the nodes: Cooperative localization in wireless sensor network,”
IEEE Signal Process. Mag., vol. 22, no. 4, pp. 54–69, Jul. 2005.
[4] M. R. Gholami, “Positioning algorithms for wireless sensor net-
works,” Licentiate thesis, Chalmers Univ. of Technol., Gothen-
burg, Sweden, Mar. 2011 [Online]. Available: http://publica-
tions.lib.chalmers.se/records/fulltext/138669.pdf
[5] C. Meng, Z. Ding, and S. Dasgupta, “A semidefinite programming ap-
proach to source localization in wireless sensor networks,” IEEE Signal
Process. Lett., vol. 15, pp. 253–256, 2008.
[6] R. W. Ouyang, A.K.-S. Wong, and C.-T. Lea, “Received signal
strength-based wireless localization via semidefinite programming:
Fig. 7. The RMSE of the proposed approach and the CRLB for location esti- noncooperative and cooperative schemes,” IEEE Trans. Veh. Technol.,
mation versus the variance of shadowing. vol. 59, no. 3, pp. 1307–1318, Mar. 2010.
[7] G. Wang and K. Yang, “A new approach to sensor node localization
using RSS measurements in wireless sensor networks,” IEEE Trans.
Wireless Commun., vol. 10, no. 5, pp. 1389–1395, May 2011.
VI. CONCLUSIONS [8] C. Meesookho, U. Mitra, and S. Narayanan, “On energy-based acoustic
source localization for sensor networks,” IEEE Trans. Signal Process.,
In this paper, we have studied the localization problem based on
vol. 56, no. 1, pp. 365–377, Jan. 2008.
RSS measurements when the transmit power or path-loss exponent is [9] H. C. So and L. Lin, “Linear least squares approach for accurate re-
unknown. The maximum likelihood estimator (MLE) is highly non- ceived signal strength based source localization,” IEEE Trans. Signal
convex and difficult to solve. Using approximations, we have changed Process., vol. 59, no. 8, pp. 4035–4040, Aug. 2011.
IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 61, NO. 15, AUGUST 1, 2013 3759
[10] K. Cheung, H. So, W.-K. Ma, and Y. Chan, “Least squares algo- [23] S. Gezici, “A survey on wireless position estimation,” Wireless Pers.
rithms for time-of-arrival-based mobile location,” IEEE Trans. Signal Commun., vol. 44, no. 3, pp. 263–282, Feb. 2008.
Process., vol. 52, no. 4, pp. 1121–1130, Apr. 2004. [24] S. M. Kay, Fundamentals of Statistical Signal Processing: Estimation
[11] D. Blatt and A. O. Hero, “Energy-based sensor network source local- Theory. Englewood Cliffs, NJ, USA: Prentice-Hall, 1993.
ization via projection onto convex sets,” IEEE Trans. Signal Process., [25] C. Fortin and H. Wolkowicz, “The trust region subproblem and
vol. 54, no. 9, pp. 3614–3619, Sep. 2006. semidefinite programming,” Optim. Methods Softw., vol. 19, no. 1,
[12] M. R. Gholami, H. Wymeersch, E. G. Ström, and M. Rydström, “Wire- pp. 41–67, 2004.
less network positioning as a convex feasibility problem,” EURASIP [26] D. Sorensen, “Newton’s method with a model trust region modifica-
J. Wireless Commun. Netw., 2011 [Online]. Available: http://link. tion,” SIAM J. Numer. Anal., vol. 19, no. 2, pp. 409–426, 1982.
springer.com/content/pdf/10.1186%2F1687-1499-2011-161.pdf [27] N. Patwari, A. O. Hero, M. Perkins, N. S. Correal, and R. J. O’Dea,
[13] C. Liu, K. Wu, and T. He, “Sensor localization with ring overlapping “Relative location estimation in wireless sensor networks,” IEEE
based on comparison of received signal strength indicator,” in Proc. Trans. Signal Process., vol. 51, no. 8, pp. 2137–2148, Aug. 2003.
IEEE MASS, Oct. 2004, pp. 516–518. [28] Y. Qi, H. Kobayashi, and H. Suda, “Analysis of wireless geolocation
[14] M. R. Gholami, M. Rydström, and E. G. Ström, “Positioning of node in a non-line-of-sight environment,” IEEE Trans. Wireless Commun.,
using plane projection onto convex sets,” in Proc. IEEE Wireless vol. 5, no. 3, pp. 672–681, 2006.
Commun. Netw. Conf. (WCNC), Sydney, Australia, Apr. 2010. [29] A. Beck and Y. C. Eldar, “Strong duality in nonconvex quadratic opti-
[15] J. H. Lee and R. M. Buehrer, “Location estimation using differ- mization with two quadratic constraints,” SIAM J. Optim., vol. 17, no.
ential RSS with spatially correlated shadowing,” in Proc. IEEE 3, pp. 844–860, Sep. 2006.
GLOBECOM, 2009, pp. 1–6. [30] R. M. Vaghefi, M. R. Gholami, and E. G. Ström, “Bearing-only target
[16] S. Kim, H. Jeon, and J. Ma, “Robust localization with unknown trans- localization with uncertainties in observer position,” in Proc. IEEE Int.
mission power for cognitive radio,” in Proc. IEEE Mil. Commun. Conf., Symp. Personal, Indoor, obile Radio Commun. (PIMRC), Sep. 2010,
Oct. 2007, pp. 1–6. pp. 238–242.
[17] R. M. Vaghefi, M. R. Gholami, and E. G. Ström, “RSS-based sensor [31] L. Vandenberghe and S. Boyd, “Semidefinite programming,” SIAM
localization with unknown transmit power,” Proc. Int. Conf. Acoust., Rev., vol. 38, no. 1, pp. 49–95, Mar. 1996.
Speech, Signal Process. (ICASSP), pp. 2480–2483, May 2011. [32] The Mathworks Inc, 2012 [Online]. Available: http://www.math-
[18] R. Vaghefi, M. Gholami, R. Buehrer, and E. Strom, “Cooperative re- works.com
ceived signal strength-based sensor localization with unknown transmit [33] M. Grant and S. Boyd, CVX: Matlab Software for Disciplined Convex
powers,” IEEE Trans. Signal Process., vol. 61, no. 6, pp. 1389–1403, Programming. ver. 1.21, Feb. 2011 [Online]. Available: http://cvxr.
Mar. 2013. com/cvx
[19] N. Salman, M. Ghogho, and A. Kemp, “On the joint estimation of the [34] M. R. Gholami, S. Gezici, and E. G. Ström, “Improved position
RSS-based location and path-loss exponent,” IEEE Wireless Commun. estimation using hybrid TW-TOA and TDOA in cooperative net-
Lett., vol. 1, no. 1, pp. 34–37, Feb. 2012. works,” IEEE Trans. Signal Process., vol. 60, no. 7, pp. 3770–3785,
[20] J. J. More, “Generalization of the trust region problem,” Optim. Jul. 2012.
Methods Softw., vol. 2, pp. 189–209, 1993. [35] S. Mazuelas, A. Bahillo, R. M. Lorenzo, P. Fernandez, F. A. Lago, E.
[21] A. Beck, P. Stoica, and J. Li, “Exact and approximate solutions of Garcia, J. Blas, and E. J. Abril, “Robust indoor positioning provided by
source localization problems,” IEEE Trans. Signal Process., vol. 56, real-time RSSI values in unmodified WLAN networks,” IEEE J. Sel.
no. 5, pp. 1770–1778, May 2008. Topics Signal Process., vol. 3, no. 5, pp. 821–831, 2009.
[22] N. Patwari, “Location estimation in sensor networks,” Ph.D. disserta-
tion, Univ. of Michigan, Ann Arbor, MI, USA, 2005.