Professional Documents
Culture Documents
Ad Hoc Networks
journal homepage: www.elsevier.com/locate/adhoc
a r t i c l e i n f o a b s t r a c t
Article history: This paper proposes a data fusion technique aimed at achieving highly accurate localization in a wireless
Received 30 June 2016 sensor network with low computational cost. This is accomplished by fusing multiple types of sensor
Revised 8 September 2016
measurement data including received signal strength and angle of arrival. The proposed method incorpo-
Accepted 23 September 2016
rates a powerful data fusion technique, one that has never before been used in low cost localization of a
Available online xxx
stationary node, known as Dempster-Shafer Evidence Theory. Many useful functions of this theory, includ-
Keywords: ing sampling, aggregation, and plausibility, are integrated into the localization method. From there, the
Wireless sensor networks algorithm determines whether a set of given measurements belong to a particular county. Motivated by
Localization the flexible nature of Dempster-Shafer Theory, a multitude of network setups and combinations of avail-
Dempster-Shafer theory able measurement features are tested to verify the performance of the proposed method. Performance of
the proposed approach is evaluated using numerical results obtained from extensive simulations. When
compared with the results of existing approaches in similarly constructed scenarios, the proposed lo-
calization technique achieves up to 98% accuracy in less than a tenth of the run-time required under
presently established algorithms.
© 2016 Elsevier B.V. All rights reserved.
Wireless sensor networks have been of great interest in today’s A brief overview of the most common unimodal localization
world due to their wide variety of practical applications and pur- techniques of both low cost and high cost categories is presented
poses. Practicality can range from long distance navigational sys- in Fig. 1. In this scenario, cost refers to the amount for significant
tems and localized contact points for emergency services to indus- computational resources required to achieve accurate localization.
trial detection of carbon monoxide [30] and community detection Some of the most common modern localization techniques are
of social clusters [13]. In addition to emergencies and navigation, well-known even outside of scientific research areas due to their
typical uses of these networks can include tracking, security, and popularity in modern consumer electronics. These include global
information [16]. positioning systems (GPS), wireless local area networks (WLAN),
While the demand for and scope of wireless sensor networks and bluetooth (BT). GPS is perhaps the most widely known method
(or WSNs) continue to grow, the need for identifying a node’s lo- due to its frequent use in navigational assistance through stan-
cation within such a network becomes increasingly vital. However, dalone devices and through embedded navigational capabilities in
achieving localization with a steady balance of minimal power, low smartphones and tablets. Bluetooth is primarily appealing for short
overall cost, and high accuracy [17] remains one of the greatest range solutions and thus can be ideal specifically for local posi-
challenges in the area of WSNs. tioning within a WSN [25]. WLAN, or Wi-Fi, is another short range
solution whose significance lies within its high localization accu-
racy throughout indoor WSN environments [25]. Inertial Naviga-
tion Systems (INS) are not quite as common as the other three
methods but are noteworthy due to their high potential for seam-
less integration with GPS systems [2]. All four of these techniques
share the common characteristic of requiring a high computa-
∗
Corresponding author. tional cost to achieve a desirable level of accuracy. For instance,
E-mail addresses: Danda.Rawat@howard.edu, db.rawat@ieee.org (D.B. Rawat).
http://dx.doi.org/10.1016/j.adhoc.2016.09.020
1570-8705/© 2016 Elsevier B.V. All rights reserved.
Please cite this article as: C. Elkin et al., Localization in wireless sensor networks: A Dempster-Shafer evidence theoretical approach, Ad
Hoc Networks (2016), http://dx.doi.org/10.1016/j.adhoc.2016.09.020
JID: ADHOC
ARTICLE IN PRESS [m5G;October 5, 2016;13:31]
Please cite this article as: C. Elkin et al., Localization in wireless sensor networks: A Dempster-Shafer evidence theoretical approach, Ad
Hoc Networks (2016), http://dx.doi.org/10.1016/j.adhoc.2016.09.020
JID: ADHOC
ARTICLE IN PRESS [m5G;October 5, 2016;13:31]
however, Dempster-Shafer Theory has never before been applied to m. Suppose A1 , . . . , An are all possible sets within a frame of dis-
low cost localization of a stationary node in a large outdoor WSN. cernment, noting that Ai ∈ 2 . Then
n
The overall objective of this research is to develop an algorithm where ∅ denotes the empty set. Each set Ai takes the form of the
for localization in a wireless sensor network that is both highly ac- interval ([x, x̄] ), denoting the lower and upper bounds of an ev-
curate and of low computational cost. Time-critical localization of idence factor, respectively [1]. Each BPA m consists of three vital
WSNs is a topic of increasing concern in today’s world, as a variety properties: a lower bound, an upper bound, and a degree of con-
of civil and military applications are heavily dependent on these fidence μ that lies between the values of 0 and 1 [8]. Thus, igno-
two properties. For instance, many college campuses and some ur- rance can be defined as simply 1 − μ.
ban areas have a network of emergency phones scattered across
town so that individuals in distress can reach emergency services
2.1.1. Belief and plausibility
[20]. Using effective localization techniques such as that proposed
Belief and Plausibility are two of the most vital core functions
in this paper, emergency services can dispatch police, fire, or med-
of an aggregate BPA, as they represent upper and lower bounds in
ical services to a caller’s location at a significantly improved re-
probability, respectively. In a frame of discernment, they are de-
sponse time. In addition, the wireless aspect of these networks
fined as
would ease any infrastructure-based complexities that currently
exist with current wired phone stations. Bel (B ) = m ( Ai ) (2)
Ai ⊂B
Please cite this article as: C. Elkin et al., Localization in wireless sensor networks: A Dempster-Shafer evidence theoretical approach, Ad
Hoc Networks (2016), http://dx.doi.org/10.1016/j.adhoc.2016.09.020
JID: ADHOC
ARTICLE IN PRESS [m5G;October 5, 2016;13:31]
Now suppose m is rearranged and mu1 , mu2 , . . . , mun are renamed the distance thereof by inverse square root RSS calculation. This is
such that enabled primarily in network terrains with smaller area, as each
⎧ l⎫ ⎧ l l l ⎫
⎪m1 ⎪ ⎪{x1 , x̄1 , μ1 }⎪ sensor node’s signal strength must be within range of the standby
⎪
⎨ml ⎪
⎬ ⎪
⎨{xl , x̄l , μl }⎪
⎬ node. Let [xsb , ysb ] be the location of the standby node. Then the
2 2 2 2 standby distance is defined mathematically as
m= .. = .. , (9)
⎪
⎪ ⎪ ⎪ ⎪
⎩ .l ⎪
⎭ ⎪ ⎩ l l. l ⎪ ⎭ dSB = (x2sb − x2n ) + (y2sb − y2n ). (15)
mn {xn , x̄n , μn }
where xl1 < xl2 < · · · < xln and the superscript l indicates that con-
tents of m are now arranged in order of increasing lower bound. 2.3. Proposed representation of distance range as BPA
Hence, all conditions are available to define plausibility as
⎧ l l ⎫ In order to fuse any of the varied measurement types together,
⎪
⎪{x̄1 , μ1,new }⎪
⎪ each measurement must be converted into a common value. Such
⎪
⎪ ⎪
⎪
⎨{x̄2 , μ2,new }⎪
⎪ l l a value in this case is best represented as the distance from a sen-
⎬
P l = {x̄3 , μ3,new } ,
l l sor node to an anchor node, as determined by inverse square root
(10)
⎪
⎪ .. ⎪
⎪ RSS calculation. Due to this method of distance calculation, the ex-
⎪
⎪ ⎪
⎪
⎪
⎩ l l
. ⎪
⎭
perimental setup will require RSS to be enabled at all times. If a
{x̄n , μn,new } distance or range of distances can be found for all available clus-
ter heads, then a node’s location can be estimated by an enhanced
where
process of trilateration, in which enhancement is based on the ef-
μl1,new = μl1 (11) fects of data fusion. The challenge associated with reaching such a
goal becomes the task of estimating such a distance range for each
and
monitor. Thus, the need for effective organization and evaluation of
n−1
optimal distance values is where Dempster-Shafer Theory becomes
μln,new = μli,new . (12)
a mechanism of great interest.
i=1
Because external evidence factors are the primary means by
In other words, the top and bottom rows represent the least which DS-based estimation can occur, it becomes necessary to ob-
and most believable outcomes, respectively. The latter is the row of tain distances and measurement sets that are independent of those
greatest importance, where x̄un is the value of the most believable given as functional inputs. This distinction will be explained at
outcome and μun,new is the belief probability, which in this case is greater length in Subsection 3.2 by means of test data and full
always 100% or 1, since it is the sum of all confidence values. Sim- data sets. Because such data is external, the amounts and ranges
ilarly, the top and bottom rows of the belief set respectively rep- of measurements must be reduced based on feature-specific crite-
resent the least and most plausible outcomes. Also likewise to be- ria. Suppose these range values, r, are defined as
lief, the most believable row is of most significance, as xln signifies
the most plausible outcome and μln,new is another 100% probability. r = {rRSS , rAOA , rSB }, (16)
Due to these powerful methods of outcome prediction, extensive where rRSS > 1, 0 < rAOA < 1, and rSB = −1, the latter value indi-
analysis of belief and plausibility serve as the initial foundations cating that there is no range for standby. If the inverse of a given
and formations of this research. feature measurement is less than the range ri and the range is not
−1, then the lower and upper limits of such ranges are defined as
2.2. Categories of sensor node measurements |0, 1/ri |. Otherwise, if the value is greater than or equal to ri , then
s
the limits are | r s i+1 , si |, where si is the particular feature measure-
The proposed localization technique is dependent on a multi- i i
ment and i is the feature type. A range of −1, on the other hand,
tude of sensor measurements, namely RSS, AOA, and standby. Be-
matching feature measurements between both data sets. The next
fore these values can be mathematically defined, however, the dis-
step is to find external distance values from external feature mea-
tance between any sensor node and any anchor node must also be
surements that lie within the corresponding range. After filtering
evident. Suppose the coordinate [xn , yn ] refers to the position of a
of all such distance values, the minimum and maximum of the re-
sensor node and [xm , ym ] is the position of a monitor, or anchor
maining values become the lower and upper bounds of the resul-
node. Then, the distance d can be defined as
tant BPA. Because all BPAs will aggregate in a later step, the con-
dactual = (x2m − x2n ) + (y2m − y2n ), (13) fidence value can simply be 1 for the time being. Thus, based on
Eq. (4), we have
where all aforementioned variables are measured in meters. For
RSS calculation in outdoor WSN environments, multiple formu- mi = {dmin , dmax , 1}, (17)
las exist for exact calculation but share the common property of
having an inverse proportionality with squared distance [22,29]. where dmin denotes the minimum external distance value and dmax
Hence, in the context of this research, RSS is simply defined as the denotes the maximum.
2
inverse of distance squared, or RSS = 1/dactual . Once a BPA is formed for each active feature, aggregation can
Due to the generic nature of this interpretation, no specific unit then occur. At certain times, manually adding new BPAs can be an
is needed, as long as the generic unit contains the factor of m−1 . exhaustive process, in which case sampling from a distribution be-
AOA, however, is defined in a more specific context as comes an ideal solution. This process, also known as discretization,
⎧ −1 yn −ym involves generating n discrete samples based on a lesser amount of
⎨tan ( xn −xm ) if yn > ym and xn > xm initialized BPAs, which collectively form a cumulative density func-
−1 yn −ym
AOA = tan ( xn −xm ) + 180 if yn = ym and xn < xm (14) tion (CDF) of BPA structures [26]. Thus, to smoothen the transition
⎩ −1 yn −ym between BPAs, sampling each mi by a consistent function handle,
tan ( xn −xm ) + 360 if yn < ym and xn > xm
such as inverse normalization, is recommended. Once sampling has
with resultant units in degrees. Standby is a unique type of dis- been applied, the aggregate BPAs can now be considered as an adi-
tance measurement in which a sensor node with this feature en- mensional, unit neutral entity, as required for mass assignments.
abled is detected by a dedicated standby node, which measures Now each BPA closely fits the parameters of Eq. (4) and is written
Please cite this article as: C. Elkin et al., Localization in wireless sensor networks: A Dempster-Shafer evidence theoretical approach, Ad
Hoc Networks (2016), http://dx.doi.org/10.1016/j.adhoc.2016.09.020
JID: ADHOC
ARTICLE IN PRESS [m5G;October 5, 2016;13:31]
as The resultant software package includes all facets needed for ex-
1
perimental simulation. This includes specific parameters and qual-
mi = x, x̄, , (18) ities of the WSN, selectively randomized generation of data, and a
fn
complete implementation of the technique proposed in Fig. 4. In
where f1n denotes an evenly distributed confidence probability in addition, two auxiliary algorithms designed to aid the execution of
terms of f active features and n BPAs. The resultant aggregate BPA the core technique are also proposed as well as multiple methods
for n samples thus becomes for calculating the algorithm’s accuracy.
λ = {λRSS , λAOA , λSB }, (19) An overview of the default simulation parameters in the exper-
imental setup is as follows:
where
⎧ ⎫ ⎧ ⎫ ⎧ ⎫
⎪m1,RSS ⎪ ⎪m1,AOA ⎪ ⎪m1,SB ⎪ 1. 100 nodes deployed throughout a rectangular region of 10 0 0-
⎪
⎨ ⎪
⎬ ⎪
⎨ ⎪
⎬ ⎪
⎨ ⎪
⎬ by-10 0 0 m
m2,RSS m2,AOA m2,SB
λRSS = .. , λAOA = .. , λSB = .. (20) 2. Two or three anchor nodes (both options tested separately in
⎪
⎪ . ⎪ ⎪ ⎪
⎪ ⎪ ⎪ ⎪
⎩ ⎭ ⎩ . ⎪ ⎭ ⎪
⎩ . ⎪ ⎭ identical networks)
mn,RSS mn,AOA mn,SB 3. Anchor nodes in both two-monitor and three-monitor setups
located at [150,100] and [850,100] m; third anchor node in
This is under the assumption that all three features are enabled.
three-monitor setups located at [50 0,10 0] m
If one or more features are unavailable, then their corresponding
4. Standby node placed at [50 0,80 0] m; location of fusion center
λ values are simply omitted. With all aggregation intact, the next
is negligible
step is the actual data prediction process.
5. One-to-one mapping of counties and nodes
2.3.1. Formulation of proposed algorithm 6. Range criteria of 20, 0.002, and −1 for RSS, AOA, and standby,
Because Dempster-Shafer Theory is a new concept of keen in- respectively
terest in the area of low cost WSN localization, a clear relation be- 7. Setup tested for every combination of features in which RSS
tween actual distance and believed or plausible distance was not is active (as RSS is needed to calculate distance from node to
available in any found literature. Thus, some preliminary exper- monitor)
imentation was needed to understand how Bel and Pl functions 8. Discretization consisting of 10 samples as an inverse normal-
could potentially correlate measured values with calculated val- ized distribution
ues. The resultant analysis from belief and plausibility calculations 9. Differences of −1.5 m or less for actual distance minus pre-
showed that the former method contained little to no effect in dicted distance not considered in determining a minimum dif-
predicting a given distance while the latter showed encouragingly ference between distances
high correlation. Thus, after extensive exploration, we propose a 10. Distance range weights determined through iterative training
completed high accuracy algorithm based on plausibility, as pre- (see Subsubsection 3.4.1) to be 1.3 and 0.95
sented in Fig. 4. 11. Experimental results as the average of ten independent experi-
As a simple example of how the proposed method works, sup- ments in which the WSN is regenerated upon every trial
pose there exists a WSN of five sensor nodes, two sensor nodes, 12. Zero noise factor assumed
a standby node, and a fusion center, as depicted in Fig. 5 that en-
Details of the variables and terminologies above are explained
compasses a one square meter area (details of these node types are
in the proceeding subsections.
explained further in Subsection 3.1). Here, we wish to locate the
sensor node located at [0.4, 0.6] meters, given only a list of pos-
sible node locations and a set of signal measurements (RSS, AOA, 3.1. WSN Setup
and standby, as measured by the standby node). For each anchor
node, or monitor, the technique (via the fusion center) conducts an The sensor network in this simulation consists of four vital
external survey of candidate distance values that satisfy feature- components: the sensor nodes, the anchor nodes, the standby
based constraints. Out of these values, the minimum and maxi- node, and the fusion center. The sensor nodes comprise the vast
mum thereof encompass the bounds of a BPA. After the algorithm majority of the components in this setup, totaling 100 out of 105
repeats this process for every feature type, it aggregates all BPAs. nodes in a three-monitor setup. The anchor nodes, also known as
Next, it executes the plausibility function on the distance BPAs and monitors or cluster heads, are placed strategically throughout the
selects the resultant distance value of greatest confidence. This re- WSN to measure the available properties of each and every sensor
sults in a radius of plausibility for each monitor, as indicated by node, such as RSS, AOA, and operating condition (standby). Such
the lightly colored circles of Fig. 5. data is then transferred from an anchor node to a fusion center
The end goal here is to generate a region of feasibility in which node, which processes all information using the algorithms and
the target node could lie. For this, the algorithm incorporates a methods given in the following subsections. In other words, the
pair of coefficients, determined by preliminary WSN configuration, fusion center assumes the role of the entire localization software,
which forms inner and outer radii, as indicated by the dark cir- minus the data generation stage. In addition, a standby node mea-
cles in the figure. Finally, we inspect the intersection of inner and sures the distance of any sensor nodes that are in standby mode.
outer circles to find that only one node location lies within the re- The complete WSN setup is presented in Fig. 6.
gion and thus matches the given set of measurements. In essence,
this problem can be perceived as a multiple choice exam, and 3.1.1. Data value ranges
while choosing from only five nodes in this case does not seem In this network setup, the origin of the coordinate system is
too daunting, it is in large scale WSNs with more than a hundred positioned at the lower left hand corner of the map, as indicated
nodes that this technique can truly flourish. in Fig. 6. County names and monitor names are given as num-
bers ranging from one to the total number of counties and moni-
3. Simulation setup tors available, respectively. All monitors are horizontally aligned by
having a common latitudinal coordinate of 100 m as well as lon-
A variety of WSN simulation scenarios was created and ana- gitudinal coordinates from 150 to 850 m. Ranges of sensor node
lyzed using the MATLAB scientific programming environment [18]. coordinates are based on the size of the WSN and can be placed
Please cite this article as: C. Elkin et al., Localization in wireless sensor networks: A Dempster-Shafer evidence theoretical approach, Ad
Hoc Networks (2016), http://dx.doi.org/10.1016/j.adhoc.2016.09.020
JID: ADHOC
ARTICLE IN PRESS [m5G;October 5, 2016;13:31]
anywhere more than 30 m from any border. Based on the crite- responds to a particular monitor observing the node and its mea-
ria of the latter two data types, distances between sensor nodes surements. Each category of data, such as county number, distance,
and monitors can vary from 40 to 1360 m. Because RSS is merely or a type of measurement, takes the form of a column. The full
the inverse square root of distance in the case of outdoor environ- data set contains 100 samples of sensor node data for every one of
ments, it can range from 1/13602 to 1/402 . AOA can be any posi- the 100 counties in the WSN, and each county is measured from
tive number of degrees up to 360, and the operating condition, or three monitors, thereby totaling 30,0 0 0 rows overall.
standby, distance can range from 0 to 920 m. A second CSV file known as the test data set contains the
county locations and measurements that are to be tested against
the full data set. The test data contains only one sensor node per
3.2. Data generation
county. The location and measurement values are different from
any of the nodes of the corresponding county in the full data.
A multitude of sensor nodes, counties to which each node be-
Hence, the test data set contains 300 total rows of data for three
longs, and various measurements of nodes relative to various mon-
monitor WSN setups and 200 rows for two monitor setups.
itors have been written to and read from a single comma separated
Each sample of data in each file contains ten columns, deter-
value (CSV) file. This is known as the full data set. Each sensor
mined as follows:
node encompasses multiple rows of data, in which each row cor-
Please cite this article as: C. Elkin et al., Localization in wireless sensor networks: A Dempster-Shafer evidence theoretical approach, Ad
Hoc Networks (2016), http://dx.doi.org/10.1016/j.adhoc.2016.09.020
JID: ADHOC
ARTICLE IN PRESS [m5G;October 5, 2016;13:31]
0.7
The algorithm was programmed by following the flowchart
0.6
provided in Fig. 4 and refining the technique in the form of the
0.5 pseudocode provided in Algorithm 1. The pseudocode was then
converted into MATLAB-specific syntax and thoroughly tested to
0.4 ensure proper functionality and accurate representation of the
proposed algorithm.
0.3
Please cite this article as: C. Elkin et al., Localization in wireless sensor networks: A Dempster-Shafer evidence theoretical approach, Ad
Hoc Networks (2016), http://dx.doi.org/10.1016/j.adhoc.2016.09.020
JID: ADHOC
ARTICLE IN PRESS [m5G;October 5, 2016;13:31]
Please cite this article as: C. Elkin et al., Localization in wireless sensor networks: A Dempster-Shafer evidence theoretical approach, Ad
Hoc Networks (2016), http://dx.doi.org/10.1016/j.adhoc.2016.09.020
JID: ADHOC
ARTICLE IN PRESS [m5G;October 5, 2016;13:31]
Fig. 7. Plots of accuracy versus upper bound weight versus lower bound weight for preliminary weight training.
the maximum upper bound. Matching accuracy follows the most technique that is DS Theory, the algorithm is proven to be con-
uniform distribution of accuracy values, varying from 76.0 0 0% to sistently effective for both two-monitor and three-monitor setups
76.002%, optimizing at multiple possible points. Effectively, this under all feasible combinations of active features. Results of the
form of accuracy can be considered negligible in the attempt to short accuracy test climb even higher with a value range of 97–
find a single best weight combination. The average accuracy is the 100%. Under the matching accuracy test, results span a wider range
primary decision factor of weight selection and optimizes upon a of accuracy results from 56.1% to 94.6%. The average of all three
maximum lower bound of 0.95 and an upper bound of 1.3, located accuracy types indicate a somewhat less diverse range of 83.5%–
in a tightly contained region in which average accuracy narrowly 97.8%. Empirically, county matching can be considered most effec-
exceeds 90%. Hence, the respective upper and lower weights of 1.3 tive when only RSS and operating condition are enabled. The ab-
and 0.95 have been verified to produce the most accurate data and sence of operating condition results in the only accuracy values
are thus used consistently under the implementation detailed in lower than 94% as well as the only short accuracy values below
the following subsection. 100%. In other words, when a WSN is distributed across a small
enough terrain that a standby node is usable, average accuracy of
4.2. Training-independent results over 95% is easily achieved. In contrast, larger terrains in which
standby measurements are unfeasible can only reach average ac-
The training-independent portion of the simulation was tested curacy values of 80–90%.
in 24 different scenarios resultant from four independent variables: The full accuracy test appears to be the only evaluation type
the set of active features, the number of monitors, the type of ac- that results in a higher percentage in the absence of data fusion.
curacy, and the trial-based random generation of the WSN. These While fusing multiple types of data is intended to enhance an ac-
results reflect the overall effectiveness of Dempster-Shafer Theory, curacy relative to that of a single type of data, this test shows that
data fusion, and plausibility, as established in Section 2. This sim- full accuracy is most effective when only RSS data is available. The
ulation used two and three as the desired numbers of monitors, as other evaluation methods, however, clearly demonstrate that fu-
these amounts have been established minimums under unimodal sion of multiple measurement types do in fact enhance accuracy.
RSS and AOA based localization methods. For reliability and re- Combining this observation with the fact that differences in full ac-
dundancy purposes, the simulator regenerated the WSN prior to curacies are minimal (all values for each monitor are within 0.06%
each of the ten experimental trials for each of the above combina- of one another) can easily infer that data fusion in this context is
tions of scenarios. The accuracy results for all test cases are given still an overall success.
in Table 1, and the runtime results are provided in Table 2, where Also worth noting is that RSS as a sole feature forms the weak-
each value for each table is the average run time for all trials. est accuracy and may pale in comparison to traditional RSS-based
localization when only RSS is available. One should keep in mind,
however, that all other remaining feature combinations, that is,
4.2.1. Accuracy
any combination of two or more features, proves that fusion of
As Table 1 indicates, the full accuracy test generates consis-
multiple available types of data in this algorithm is significantly
tently high results in the steady area of 97.0–97.5% accuracy for
more effective than any conventional unimodal technique. Thus,
all eight scenarios. Thanks to the powerful core of the localization
Please cite this article as: C. Elkin et al., Localization in wireless sensor networks: A Dempster-Shafer evidence theoretical approach, Ad
Hoc Networks (2016), http://dx.doi.org/10.1016/j.adhoc.2016.09.020
JID: ADHOC
ARTICLE IN PRESS [m5G;October 5, 2016;13:31]
Table 1
Simulation results for two-monitor and three-monitor WSNs.
Monitors 2 3 2 3 2 3 2 3
Table 2
Runtime results for two-monitor and three-
monitor WSNs.
Please cite this article as: C. Elkin et al., Localization in wireless sensor networks: A Dempster-Shafer evidence theoretical approach, Ad
Hoc Networks (2016), http://dx.doi.org/10.1016/j.adhoc.2016.09.020
JID: ADHOC
ARTICLE IN PRESS [m5G;October 5, 2016;13:31]
Table 3 [4] N. Bulusu, J. Heidemann, D. Estrin, GPS-less low-cost outdoor localization for
Comparison of computational runtime among different very small devices, IEEE Pers. Commun. 7 (5) (20 0 0) 28–34.
localization techniques. [5] O. Cakir, I. Kaya, O. Cakir, Investigation the effect of the time difference of ar-
rival sets on the positioning accuracy for source localization, in: Signal Process-
Algorithm PSO WSLA WSRA DS ing and Communications Applications Conference (SIU), 2014, pp. 2249–2252.
Runtime (μs) 114,570 7800 9700 344 [6] E. Chiodo, G. Mazzanti, Bayesian reliability estimation based on a Weibull
stress-strength model for aged power system components subjected to volt-
age surges, IEEE Trans. Dielectr. Electr. Insul. 13 (1) (2006) 146–159.
[7] A. Clerentin, A localization method based on two omnidirectional perception
systems cooperation, in: IEEE International Conference on Robotics and Au-
reported competing methods, hence solidifying such an algorithm tomation, 2, 20 0 0, pp. 1219–1224.
as a novel low cost technique. [8] Imprecise Probability Propogation Toolbox (IPP Toolbox) (2012) Essen, Ger-
many: University of Duisberg-Essen, Department of Information Logistics,
(https://www.uni-due.de/informationslogistik/ipptoolbox.php). Last accessed
5. Conclusions and future work
March 7, 2016.
[9] M. Garcia, C. Martinez, J. Tomas, J. Lloret, Wireless sensors self-location in an
This paper presented an efficient approach to localization in indoor WLAN environment, in: SensorComm 2007. International Conference on
Sensor Technologies and Applications, 2007, pp. 146–151.
wireless sensor networks. This approach was based heavily upon
[10] M. Garcia, J. Tomas, F. Boronat, J. Lloret, The development of two systems for
the innovative statistical framework known as Dempster-Shafer Ev- indoor wireless sensors self-location, Ad Hoc Sens. Wireless Netw. 8 (3–4)
idence Theory, a novel data fusion technique that has never before (2009) 235–258.
been used in low cost WSN localization. While DS Theory contains [11] P. Kasebzadeh, Indoor localization via WLAN path-loss models and Demp-
ster-Shafer combining, in: International Conference on Localization and GNSS
many unique and powerful properties that can aid in data predic- (ICL-GNSS), 2014, pp. 1–6.
tion and analysis, the concept of prediction by plausibility is of the [12] A. Krogh, J. Vedelsby, Neural network ensembles, cross validation, and active
most vital levels of importance and interest. This is the result of learning, in: G. Tesauro, D. Touretsky, T. Leen (Eds.), Advances in Neural In-
formation Processing Systems (volume 7), MIT Press, Cambridge, MA, 1995,
its consistently high accuracy, ranging up to 98%, under a variety pp. 231–238.
of network setups and feature sets as well as its overwhelmingly [13] S. Li, Z. Qin, H. Song, A temporal-spatial method for group detection, locating
low computational cost requirements when compared to other es- and tracking, in: IEEE Access, 2016, pp. 1–10.
[14] P. Limbourg, R. Savic, J. Petersen, H. Kochs, Fault tree analysis in an early design
tablished techniques. stage using the Dempster-Shafer theory of evidence, in: T. Aven, J.E. Vinnem
(Eds.), European Conference on Safety and Reliability - ESREL 2007, Taylor &
5.1. Future work Francis, Stavenger, 2007, pp. 713–722.
[15] G. Lipeng, J. Juan, D. Laibin, An improved fusion algorithm of evidence theory,
in: Cross Strait Quad-Regional Radio Science and Wireless Technology Confer-
Support vector machines (SVMs) have been of a high level of ence, 2011, pp. 1495–1498.
interest in the field of WSN localization, almost to the same ex- [16] J. Lloret, J. Tomas, M. Garcia, A. Canovas, A hybrid stochastic approach for self-
-location of wireless sensors in indoor environments, Sensors 9 (5) (2009)
tent as DS Theory, due to its fast localization potential and effi-
3695–3712.
cient use of processing resources. Thus, the most likely next step [17] G. Mao, B. Fidan, B. Anderson, Wireless sensor network localization techniques,
in this research will involve the fusion of DS Theory with SVMs. Comput. Netw. 51 (10) (2007) 2529–2553.
As for more specific details of future work, training of the up- [18] MATLAB version 8.1 (2013) Natick, Massachusetts: The MathWorks, Inc.
[19] S. Mazuelas, A. Bahillo, R. Lorenzo, P. Fernandez, F. Lago, E. Garcia, J. Blas,
per and lower bound weights was done from a limited iterative E. Abril, Robust indoor positioning provided by real-time RSSI values in
approach. Although this brief technique resulted in multiple high unmodified WLAN networks, IEEE J. Sel. Top. Signal Process. 3 (5) (2009)
levels of accuracy above 90%, accuracy could be even further en- 821–831.
[20] C. Meyer, Mass notification? there’s an app for that, Security (2012) 2–4.
hanced through more elaborate optimization methods. Possibilities [21] H. Nguyen, E. Walker, On decision-making using belief functions, in: Advances
include biologically inspired methods, such as Genetic Algorithm in the Dempster-Shafer Theory of Evidence, 1993, pp. 311–330.
or Ant Colony Optimization. [22] N. Patwari, J. Ash, S. Kyperountas, A. Hero, R. Moses, N. Correal, Locating the
nodes: cooperative localization in wireless sensor networks, IEEE Signal Pro-
cess. Mag. 22 (4) (2005) 54–69.
Acknowledgment [23] M. Pelant, V. Stejskal, Multilateration system time synchronization via over-de-
termination of TDOA measurements, in: 2011 Tyrrhenian International Work-
shop on Digital Communications - Enhanced Surveillance of Aircraft and Vehi-
This research is supported partly by US National Science Foun-
cles (TIWDC/ESAV), 2011, pp. 12–14.
dation (NSF) under grant NSF CCSS grant # 1309658. The research [24] H. Shen, Z. Ding, S. Dasgupta, C. Zhao, Multiple source localization in wireless
of Danda B. Rawat is supported by NSF CNS grant # 1658972 and sensor networks on time of arrival measurement, IEEE Trans. Signal Process.
62 (8) (2014) 1938–1949.
NSF CNS grant # 1650831. Any opinions, findings, and conclusions
[25] X. Shen, W. Chen, M. Lu, Wireless sensor networks for resources tracking at
or recommendations expressed in this material are those of the building construction sites, Tsinghua Sci. Technol. 13 (1) (2008) 78–83.
authors and do not necessarily reflect the views of the National [26] F. Tonon, Using random set theory to propagate epistemic uncertainty through
Science Foundation. a mechanical system, Reliab. Eng. Syst. Saf. 85 (1–3) (2004) 169–181.
[27] Y. Tseng, S. Kuo, H. Lee, C. Huang, Location tracking in a wireless sensor net-
work by mobile agaents and its data fusion strategies, Comput. J. 47 (4) (2004)
References 448–460.
[28] G. Xing, R. Tan, B. Liu, J. Wang, X. Jia, C. Ji, Data fusion improves the coverage
[1] E. Auer, W. Luther, G. Rebner, P. Limbourg, A verified MATLAB toolbox for the of wireless sensor networks, in: Proceedings of the 15th Annual International
Dempster-Shafer theory, Workshop on the Theory of Belief Functions, 2010. Conference on Mobile Computing and Networking, 2009, pp. 157–168.
[2] D. Bhatt, P. Aggarwal, V. Devabhaktuni, P. Bhattacharya, Seamless navigation [29] J. Xu, W. Liu, F. Lang, Y. Zhang, C. Wang, Distance measurement model based
via Dempster Shafer theory augmented by support vector machines, in: Pro- on RSSI in WSN, Wireless Sens. Netw. 2 (8) (2010) 606–611.
ceedings of the 25th International Technical Meeting of The Satellite Division [30] J. Yang, J. Zhou, J. Lv, W. Wei, H. Song, A real-time monitoring system of in-
of the Institute of Navigation, 2012, pp. 98–104. dustry carbon monoxide based on wireless sensor networks, Sensors 15 (11)
[3] I. Bloch, Some aspects of Dempster-Shafer evidence theory for classification (2015) 29535–29546.
of multi-modality medical images taking partial volume effect into account, [31] Y. Yao, N. Jiang, Distributed wireless sensor network localization based on
Pattern Recognit. Lett. 17 (1996) 905–919. weighted search, Comput. Netw. 86 (2015) 57–75.
Please cite this article as: C. Elkin et al., Localization in wireless sensor networks: A Dempster-Shafer evidence theoretical approach, Ad
Hoc Networks (2016), http://dx.doi.org/10.1016/j.adhoc.2016.09.020
JID: ADHOC
ARTICLE IN PRESS [m5G;October 5, 2016;13:31]
Colin Elkin earned a B.S. degree in Electrical Engineering from The University of Tulsa in 2013. He completed an M.S. degree in Computer Science
and Engineering from The University of Toledo in 2015, where he is now a Ph.D. candidate. In 2016, he became a recipient of the prestigious Dayton
Area Graduate Studies Institute (DAGSI) fellowship for a research project that addresses human effectiveness through machine learning techniques.
In addition, he has undertaken past and present research efforts that have been funded by NSF and AFRL. His research interests include wireless
sensor networks, data science, machine learning, optimization techniques, human factors, and software optimization. He is currently a graduate
student member of IEEE.
Rajika Kumarasiria earned a BS degree in Computer Science and Engineering from the University of Moratuwa, Sri Lanka and an MS degree in CSE
from The University of Toledo, Ohio. Prior to beginning graduate studies, he worked as a software engineer for WSO2 in Sri Lanka. His research
interests include wireless sensor networks, machine learning, and software engineering. Presently, he is a software engineer for GoHealth Insurance
in Chicago, IL. He is a member of IEEE.
Danda B. Rawat is an Associate Professor in the Department of Electrical Engineering & Computer Science at Howard University, Washington, DC,
USA. Prior to Howard University, he was with the College of Engineering & Information Technology of Georgia Southern University, Statesboro, GA as
a faculty member until 2016. Dr. Rawat’s research focuses on wireless communication networks, cyber security, cyber physical systems, Internet of
Things, big data analytics, wireless virtualization, software–defined networks, smart grid systems, wireless sensor networks, and vehicular/wireless
ad-hoc networks. His research is supported by US National Science Foundation, University Sponsored Programs and Center for Sustainability grants.
Dr. Rawat is the recipient of NSF Faculty Early Career Development (CAREER) Award. Dr. Rawat has published over 120 scientific/technical articles
and 8 books. He has been serving as an Editor/Guest Editor for over 10 international journals. He serves as a Web–Chair for IEEE INFOCOM
2016/2017, served as a Student Travel Grant Co-chair of IEEE INFOCOM 2015, Track Chair for Wireless Networking and Mobility of IEEE CCNC 2016,
Track Chair for Communications Network and Protocols of IEEE AINA 2015, and so on. He served as a program chair, general chair, and session
chair for numerous international conferences and workshops, and served as a technical program committee (TPC) member for several international
conferences including IEEE INFOCOM, IEEE GLOBECOM, IEEE CCNC, IEEE GreenCom, IEEE AINA, IEEE ICC, IEEE WCNC and IEEE VTC conferences. He
is the recipient of Outstanding Research Faculty Award (Award for Excellence in Scholarly Activity) 2015, Allen E. Paulson College of Engineering
and Technology, GSU among others. He is the Founder and Director of the Cyber-security and Wireless Networking Innovations (CWiNs) Research
Lab. He received the Ph.D. in Electrical and Computer Engineering from Old Dominion University, Norfolk, Virginia. Dr. Rawat is a Senior Member
of IEEE and member of ACM and ASEE. He served as a Vice Chair of the Executive Committee of the IEEE Savannah Section and Webmaster for the
section from 2013 to 2017.
Vijay Devabhaktuni received the B.Eng. degree in EEE and the M.Sc. degree in Physics from BITS, Pilani, in 1996, and the Ph.D. in Electronics
from Carleton University, Canada, in 20 03. During 20 05–20 08, he held the prestigious Canada Research Chair in Computer-Aided High-Frequency
Modeling & Design at Concordia University. In 2008, he joined the EECS Department at The University of Toledo, where he is a Full Professor.
Additionally, he is the Director of the College of Engineering for Interdisciplinary Research Initiatives. His interests include applied electromagnetics,
biomedical engineering, computer aided design (CAD), data-2-decision, human machine teaming, machine learning, modeling, optimization, and
virtual reality. He secured $5M external funding (sponsors include AFOSR, CFI, ODOT, NASA, NSERC, NSF, and industry). He co-authored 200+
papers and is advising 14 MS and PhD students. He has won several teaching excellence awards. Dr. Devabhaktuni is the Associate Editor of the
International Journal of RF and Microwave Computer-Aided Engineering. He is a Senior Member of the IEEE.
Please cite this article as: C. Elkin et al., Localization in wireless sensor networks: A Dempster-Shafer evidence theoretical approach, Ad
Hoc Networks (2016), http://dx.doi.org/10.1016/j.adhoc.2016.09.020