The Community for Technology Leaders
RSS Icon
Issue No.10 - October (2009 vol.8)
pp: 1326-1338
Sheng-Po Kuo , Telcordia National Chiao Tung University, Taipei
Hsiao-Ju Kuo , MediaTek Inc., Taipei
Yu-Chee Tseng , National Chiao Tung University and Chung-Yuan Christian University, Taiwan
Localization is a critical issue in wireless sensor networks. In most localization systems, beacons are being placed as references to determine the positions of objects or events appearing in the sensing field. The underlying assumption is that beacons are always reliable. In this work, we define a new Beacon Movement Detection (BMD) problem. Assuming that there are unnoticed changes of locations of some beacons in the system, this problem concerns how to automatically monitor such situations and identify such unreliable beacons based on the mutual observations among beacons only. Existence of such unreliable beacons may affect the localization accuracy. After identifying such beacons, we can remove them from the localization engine. Four BMD schemes are proposed to solve the BMD problem. Then, we evaluate how these solutions can improve the accuracy of localization systems in case there are unnoticed movements of some beacons. Simulation results show that our solutions can capture most of the unnoticed beacon movement events and thus can significantly alleviate the degradation of such events.
Context awareness, localization, location-based service, pervasive computing, positioning, wireless sensor network.
Sheng-Po Kuo, Hsiao-Ju Kuo, Yu-Chee Tseng, "The Beacon Movement Detection Problem in Wireless Sensor Networks for Localization Applications", IEEE Transactions on Mobile Computing, vol.8, no. 10, pp. 1326-1338, October 2009, doi:10.1109/TMC.2009.15
[1] M. Addlesee, R. Curwen, S. Hodges, J. Newman, P. Steggles, A. Ward, and A. Hopper, “Implementing a Sentient Computing System,” Computer, vol. 34, no. 8, pp. 50-56, Aug. 2001.
[2] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A Survey on Sensor Networks,” IEEE Comm. Magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002.
[3] P. Bahl and V.N. Padmanabhan, “RADAR: An In-Building RF-Based User Location and Tracking System,” Proc. IEEE INFOCOM, vol. 2, pp. 775-784, Mar. 2000.
[4] M. Brunato and R. Battiti, “Statistical Learning Theory for Location Fingerprinting in Wireless LANs,” Computer Networks, vol. 47, no. 6, pp. 825-845, 2005.
[5] J. Burrell, T. Brooke, and R. Beckwith, “Vineyard Computing: Sensor Networks in Agricultural Production,” IEEE Pervasive Computing, vol. 3, no. 1, pp. 38-45, Mar. 2004.
[6] A. Cerpa, J. Elson, D. Estrin, L. Girod, and M. Hamilton, “Habitat Monitoring: Application Driver for Wireless Communications Technology,” Proc. ACM SIGCOMM Workshop Data Comm., Apr. 2001.
[7] X. Chai and Q. Yang, “Reducing the Calibration Effort for Probabilistic Indoor Location Estimation,” IEEE Trans. Mobile Computing, vol. 6, no. 6, pp. 649-662, June 2007.
[8] T.H. Cormen, C.E. Leiserson, R.L. Rivest, and C. Stein, Introduction to Algorithms. MIT Press/McGraw-Hill, 1990.
[9] F. Evennou, F. Marx, and E. Novakov, “Map-Aided Indoor Mobile Positioning System Using Particle Filter,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC '05), vol. 4, pp. 2490-2494, 2005.
[10] M.R. Garey and D.S. Johnson, Computers and Intractability: A Guide to the Theory of NP-Completeness. W.H. Freeman & Co., 1979.
[11] S.-P. Kuo, H.-J. Kuo, and Y.-C. Tseng, “Detecting Movement of Beacons in Location-Tracking Wireless Sensor Networks,” Proc. IEEE Vehicular Technology Conf. (VTC), Fall 2007.
[12] S.-P. Kuo and Y.-C. Tseng, “A Scrambling Method for Fingerprint Positioning Based on Temporal Diversity and Spatial Dependency,” IEEE Trans. Knowledge and Data Eng., vol. 20, no. 5, pp.678-684, May 2008.
[13] S.-P. Kuo, B.-J. Wu, W.-C. Peng, and Y.-C. Tseng, “Cluster-Enhanced Techniques for Pattern-Matching Localization Systems,” Proc. IEEE Int'l Conf. Mobile Ad-Hoc and Sensor Systems (MASS), 2007.
[14] A. Kushki, K.N. Plataniotis, and A.N. Venetsanopoulos, “Kernel-Based Positioning in Wireless Local Area Networks,” IEEE Trans. Mobile Computing, vol. 6, no. 6, pp. 689-705, June 2007.
[15] S. Misra, G. Xue, and S. Bhardwaj, “Secure and Robust Localization in a Wireless Ad Hoc Environment,” IEEE Trans. Vehicular Technology, vol. 58, no. 3, pp. 1480-1489, Mar. 2008.
[16] D. Moore, J. Leonard, D. Rus, and S. Teller, “Robust Distributed Network Localization with Noisy Range Measurements,” Proc. ACM Conf. Embedded Networked Sensor Systems (ACM SenSys), pp.50-61, 2004.
[17] D. Niculescu and B. Nath, “Ad Hoc Positioning System (APS) Using AoA,” Proc. IEEE INFOCOM, 2003.
[18] E. Olson, J.J. Leonard, and S. Teller, “Robust Range-Only Beacon Localization,” IEEE J. Oceanic Eng., vol. 31, no. 4, pp. 949-958, Oct. 2006.
[19] J.J. Pan, J.T. Kwok, Q. Yang, and Y. Chen, “Multidimensional Vector Regression for Accurate and Low-Cost Location Estimation in Pervasive Computing,” IEEE Trans. Knowledge and Data Eng., vol. 18, no. 9, pp. 1181-1193, Sept. 2006.
[20] R. Peng and M.L. Sichitiu, “Angle of Arrival Localization for Wireless Sensor Networks,” Proc. IEEE Comm. Soc. Conf. Sensor and Ad Hoc Comm. and Networks (SECON), vol. 1, pp. 374-382, Sept. 2006.
[21] N.B. Priyantha, A.K.L. Miu, H. Balakrishnan, and S.J. Teller, “The Cricket Compass for Context-Aware Mobile Applications,” Proc. Seventh ACM/IEEE MobiCom Conf., pp. 1-14, July 2001.
[22] V. Ramadurai and M.L. Sichitiu, “Localization in Wireless Sensor Networks: A Probabilistic Approach,” Proc. Int'l Conf. Wireless Networks (ICWN), pp. 275-281, June 2003.
[23] T. Roos, P. Myllymäki, H. Tirri, P. Misikangas, and J. Sievänen, “A Probabilistic Approach to WLAN User Location Estimation,” Int'l J. Wireless Information Networks, vol. 9, no. 3, pp. 155-164, 2002.
[24] A. Savvides, C.-C. Han, and M.B. Strivastava, “Dynamic Fine-Grained Localization in Ad-Hoc Networks of Sensors,” Proc. ACM/IEEE MobiCom, pp. 166-179, 2001.
[25] V. Seshadri, G.V. Záruba, and M. Huber, “A Bayesian Sampling Approach to Indoor Localization of Wireless Devices Using Received Signal Strength Indication,” Proc. Third IEEE Int'l Conf. Pervasive Computing and Comm. (PERCOM), pp. 75-84, Mar. 2005.
[26] M.L. Sichitiu and V. Ramadurai, “Localization of Wireless Sensor Networks with a Mobile Beacon,” Proc. IEEE Int'l Conf. Mobile Ad-Hoc and Sensor Systems (MASS), pp. 174-183, Oct. 2004.
[27] S. Zhong, M. Jadliwala, S. Upadhyaya, and C. Qiao, “Towards a Theory of Robust Localization against Malicious Beacon Nodes,” Proc. IEEE INFOCOM, pp. 1391-1399, Apr. 2008.
[28] G. Zhou, T. He, S. Krishnamurthy, and J.A. Stankovic, “Impact of Radio Irregularity on Wireless Sensor Networks,” Proc. Int'l Conf. Mobile Systems, Applications, and Services (ACM MobiSys), pp. 125-138, June 2004.
17 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool