132
LOCATION AND TOPOLOGY DISCOVERY IN WIRELESS SENSOR NETWORKS By CHRISTOPHER JERRY MALLERY A dissertation submitted in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY WASHINGTON STATE UNIVERSITY School of Electrical Engineering and Computer Science MAY 2009 c Copyright by CHRISTOPHER JERRY MALLERY, 2009 All rights reserved

LOCATION AND TOPOLOGY DISCOVERY IN WIRELESS SENSOR NETWORKS

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

By
CHRISTOPHER JERRY MALLERY
A dissertation submitted in partial fulfillment of the requirements for the degree of
DOCTOR OF PHILOSOPHY
MAY 2009
c© Copyright by CHRISTOPHER JERRY MALLERY, 2009 All rights reserved
c© Copyright by CHRISTOPHER JERRY MALLERY, 2009 All rights reserved
To the Faculty of Washington State University The members of the Committee appointed to examine the dissertation of CHRISTOPHER JERRY MALLERY find it satisfactory and recommend that it be accepted. ______________________________ Muralidhar Medidi, Chair ______________________________ Sirisha Medidi ______________________________ Carl H. Hauser
ii
ACKNOWLEDGEMENT
Foremost, I would like to thank my advisor Dr. Murali Medidi. He has been a mentor to me
in all things, both professionally and personally, and most importantly, he has been a valuable
friend. In addition, I would also like to thank the rest of my committee, Dr. Sirisha Medidi and
Dr. Carl Hauser, for their valuable input and advice throughout my research and program of study.
The School of Electrical Engineering and Computer Science also deserves acknowledgement for
funding my graduate studies, without which this dissertation would likely not be possible. I would
also like to acknowledge Dirk Robinson and Rob Rydberg for their infinite patience reviewing the
mathematic content that was crucial to my research. Last, but certainly not least, I would like
to give great thanks to Jack Hagemeister and my wife, Janette Mallery, for having a seemingly
endless supply of faith in me and never doubting that I would finish my Ph.D.
iii
Abstract
May 2009
Although the specifics of sensor network deployment scenarios are entirely application domain
specific, it is envisioned that wireless sensor networks are densely deployed over large monitoring
areas. The post-deployment discovery of location and topological information in arbitrarily de-
ployed wireless sensor network is critical to the effective use of a wireless sensor network. Funda-
mental to wireless sensor networks is the problem of developing a low-cost GPS-free localization
technique. Therefore, we first present ANIML, a straightforward, iterative, anchor-free, range-
aware, relative localization technique for wireless sensor networks. Through simulation, despite
using a non-idealized MAC, we show that ANIML provides good relative localization in uniform,
C-shaped and non-uniform topologies. However, while knowing the physical positions of every
node in the network provides information about the deployed topology of a wireless sensor net-
work, it does not provide a complete view of a network’s topology, such as the shape of the network
deployment. The boundaries of the network have a physical correspondence to the environment
in which the sensors are deployed. Therefore, we next present a robust, distributed technique that
addresses the problem of boundary recognition in wireless sensor networks. We show that our
boundary recognition technique constructs accurate perimeters (i.e. correctly bounding all nodes)
in randomly deployed topologies of varying densities, perturbed grid topologies of varying den-
sities and in sparsely populated/low-density topologies, in addition to highly irregularly shaped
iv
connectivity holes and networks. Lastly, we address the problem of edge detection in wireless sen-
sor networks. Edge detection is the idea of reducing data analysis overhead through the geometric
identification of sensed phenomena within a sensor network. We adapt our boundary recognition
technique to address the more general problem of edge detection in wireless sensor networks. Our
edge detection technique keeps inter-group communication to a minimum, while still constructing
correct outer perimeters in the presence of anomalous perimeter crossings and phenomena wholly
surrounded by other phenomena. We show that our technique constructs accurate perimeters in
randomly deployed topologies of varying densities, perturbed grid topologies of varying densities
and in sparsely populated/low-density topologies, in addition to highly irregularly shaped phenom-
ena and networks.
3. LOCALIZATION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.3 Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
3.3.1 ANIML . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
3.3.2 Improving ANIML . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
3.3.3 ANIML-Abs & ANIML-Hop . . . . . . . . . . . . . . . . . . . . . . . . 26
3.4 Performance Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
3.4.1 Comparison of Basic ANIML using 1-Hop vs. 2-Hop Information . . . . . 27
3.4.2 Basic ANIML vs. Improved ANIML . . . . . . . . . . . . . . . . . . . . 28
3.4.3 Uniform Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
3.4.4 C-shaped Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
3.4.5 Non-Uniform Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
3.5 Sea-ANIML . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
3.5.1 Sea-ANIML . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
4.4.2 Further examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
5.3.3 Inner perimeter(s) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
5.4 Performance Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
5.4.2 Further examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
ix
3.3 Comparison of ANIML using 1-hop and 2-hop Information . . . . . . . . . . . . . 23
3.4 1-Hop ANIML vs. 2-Hop ANIML . . . . . . . . . . . . . . . . . . . . . . . . . . 29
3.5 Enhanced ANIML vs. the Basic ANIML Technique . . . . . . . . . . . . . . . . . 30
3.6 ANIML Convergence Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
3.7 Localization Effectiveness of ANIML in Uniform Topologies . . . . . . . . . . . . 33
3.8 Localization in C-shaped Networks . . . . . . . . . . . . . . . . . . . . . . . . . . 35
3.9 Localization in Irregular Densities . . . . . . . . . . . . . . . . . . . . . . . . . . 36
3.10 Localization with Obstacles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
3.11 Distance Estimates from TwoRayGround Propagation Model . . . . . . . . . . . . 38
3.12 Localization accuracy of Sea-ANIML . . . . . . . . . . . . . . . . . . . . . . . . 40
3.13 Localization accuracy of Zhou et al.’s technique, taken from [95, 96] . . . . . . . . 41
3.14 Localization coverage of Zhou et al.’s technique, taken from [95, 96] . . . . . . . . 41
4.1 Our technique executed on an example topology with one concave hole. . . . . . . 53
4.2 The self-identified boundary nodes (black squares) for (a) a single hole topology
(4050 nodes with an average degree of 10) and (b) a multi-hole topology (4050
nodes with an average degree of 10). . . . . . . . . . . . . . . . . . . . . . . . . . 54
4.3 The initial group for (a) a single hole topology and (b) a multi-hole topology. . . . 55
4.4 Graham’s Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
4.5 The identified convex hull nodes (black squares) for (a) a single hole topology and
(b) a multi-hole topology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
x
4.6 The initial external perimeter for a (a) single hole topology and (b) multi-hole
topology, in addition to the groups of remaining uncaptured nodes. . . . . . . . . . 58
4.7 An example of capturing a small set of nodes left uncaptured by the construction
of the initial rough outer perimeter. . . . . . . . . . . . . . . . . . . . . . . . . . . 59
4.8 The identified perimeters after all nodes are captured for (a) a single hole topology
and (b) a multi-hole topology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
4.9 An example of merging on the of the perimeters identified in Figure 4.7. . . . . . . 60
4.10 The final rough outer perimeter after all perimeters are merged for (a) a single hole
topology and (b) a multi-hole topology. . . . . . . . . . . . . . . . . . . . . . . . 61
4.11 The final external perimeter after refinement for (a) a single hole topology and (b)
a multi-hole topology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
4.12 The first perimeter split for (a) a single hole topology and (b) a multi-hole topology. 65
4.13 The final internal and external perimeters for (a) a single hole topology and (b) a
multi-hole topology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
4.14 Randomly distributed sensor field. . . . . . . . . . . . . . . . . . . . . . . . . . . 68
4.15 Wang et al.’s technique, taken directly from [85], in a uniformly distributed sensor
field. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
4.16 Results for randomly perturbed grids. . . . . . . . . . . . . . . . . . . . . . . . . 70
4.17 Wang et al.’s technique, taken directly from [85], in a randomly perturbed grid. . . 70
4.18 Results when the density of the graph decreases. . . . . . . . . . . . . . . . . . . . 71
4.19 Wang et al.’s technique, taken directly from [85], as the density of the graph de-
creases. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
4.20 Results for more interesting examples, adapted from [85]. . . . . . . . . . . . . . . 73
4.21 Wang et al.’s technique, taken directly from [85], for more interesting examples. . . 73
5.1 Our technique executed on an example topology with one sensed phenomena. . . . 85
xi
5.2 The self-identified boundary nodes (black squares) for (a) a single phenomenon
topology (4050 nodes with an average degree of 10) and (b) a multi-phenomena
topology (4050 nodes with an average degree of 10). . . . . . . . . . . . . . . . . 86
5.3 The initial groups for (a) a single phenomenon topology and (b) a multi-phenomena
topology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
5.4 The identified convex hull nodes for (a) a single phenomenon topology and (b) a
multi-phenomena topology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
5.5 The initial connected perimeters for a (a) single phenomenon topology and (b)
multi-phenomenon topology, in addition to the groups of remaining uncaptured
nodes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
5.6 The identified perimeters after all nodes are captured for (a) a single phenomenon
topology and (b) a multi-phenomena topology. . . . . . . . . . . . . . . . . . . . . 89
5.7 The final rough perimeters after all perimeters are merged for (a) a single phe-
nomenon topology and (b) a multi-phenomena topology. . . . . . . . . . . . . . . 89
5.8 The final outer perimeters after refinement for (a) a single phenomenon topology
and (b) a multi-phenomena topology. . . . . . . . . . . . . . . . . . . . . . . . . . 90
5.9 Possible relationships between constructed outer perimeters. From left to right: (a)
true overlap; (b) surrounding; (c) surrounded; (d) crossing; (e) crossed. . . . . . . . 92
5.10 The first round of perimeter splits for (a) a single phenomenon topology and (b) a
multi-phenomena topology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
5.11 The final internal and external perimeters for (a) a single phenomenon topology
and (b) a multi-phenomena topology. . . . . . . . . . . . . . . . . . . . . . . . . . 95
5.12 An example of our technique mitigating crossings perimeters. . . . . . . . . . . . . 96
5.13 Randomly distributed sensor field. . . . . . . . . . . . . . . . . . . . . . . . . . . 98
5.14 Results for randomly perturbed grids. . . . . . . . . . . . . . . . . . . . . . . . . 99
5.15 Results when the density of the graph decreases. . . . . . . . . . . . . . . . . . . . 100
xii
xiii
Dedication
the greatest gift I have ever known.
xiv
low-cost, resource-constrained immobile nodes equipped with one, or more, external sensors [77].
Wireless sensor networks also contain one or more base stations, which are less resource-constrained
devices that are responsible for connecting the wireless sensor network to the users of the network.
Initially military applications, such as target acquisition/tracking and battlefield surveillance, drove
the development of wireless sensor networking technology [4]. However sensor networks are now
commonplace in civilian monitoring applications, such as environment and habitat monitoring,
healthcare applications, home automation, traffic control and fire detection/control [15]. In many
sensor network applications, such as battlefield surveillance or hostile environment monitoring,
there is no viable node recovery plan making each sensor node a disposable asset [64]. Addition-
ally, some sensor network applications require that the sensor nodes do not influence the deployed
environment, such as habitat monitoring. Therefore, for the practical deployment of many sensor
network applications the cost and physical size of each sensor node is critical, which makes hard-
ware selection crucial. In general, the sensor nodes that compose a typical wireless sensor network
contain five key components: microcontroller, wireless transceiver, external memory, power source
and sensor(s) [84]. While the microcontroller and external memory components of a sensor node
dictate the processing power and storage capacity of a sensor node, these two components are not
key indicators of the suitability of a sensor node to a particular sensor network application. Ad-
ditionally, most sensor node hardware currently in production have a modular sensor interface, so
the choice of sensor node hardware is independent of specific sensor needs. This makes the power
source and wireless transceiver the key indicators of the suitability of a sensor node to a sensor
network application. Since there is no way to replace sensor batteries for many sensor network
applications the correct choice of power supply is critical to the longevity of the wireless sensor
1
network, coupled to the fact that the most energy consuming task on a sensor node is the wireless
transmission of data. Therefore, the selection of the least powerful wireless transceiver, in terms
of data speed and transmission range, to meet the needs of the sensor network application is ideal.
For example, The Mica2 Mote, developed by U.C. Berkeley, has a Atmel ATmega128L microcon-
troller with 128k of program flash memory and 512k of external memory, typically operates on 2
AA batteries, is built upon a 51 pin modular sensor system and capable of wireless transmissions
of 38.4 kbits/sec with an outdoor line-of-sight range of about 500 feet [1].
Although the specifics of sensor network deployment scenarios are entirely application domain
specific, it is envisioned that wireless sensor networks are densely deployed over large monitoring
areas. Deployment scenarios range between manual deployment to completely random scatter-
ing over a specific region, such as aerial or artillery-based deployment. Regardless of deployment
mechanism or application, most general purpose sensor networking services, such as sensor identi-
fication, routing, data fusion and data analysis, require some knowledge of a network’s topology in
order to operate effectively [87]. For example, one or more sensor nodes detecting a fire are useless
if the location of the sensors is unknown. Identifying the positions of each node in a sensor deploy-
ment is considered a fundamental operation in wireless sensor network and almost every wireless
sensor network has some knowledge of node positions, or localization technique in place [85].
There remain many unsolved problems in the field of wireless sensor network research. One
fundamental wireless sensor network problem that remains unsolved is the development of a low-
cost GPS-free localization technique. Localization is the process by which the nodes of a sensor
network self-determine the network’s topology, by identifying the physical coordinates of every
node in the network. The most straightforward methods of localization are GPS and manual entry.
Manually entering the positions of every node in large, dense sensor deployment is not a scalable or
realistic option in most situations [16]. On the other hand, equipping every sensor node with GPS
technology, while obviating the need for localization, increases the cost of each individual node
and greatly increases the deployment costs of deploying a sensor network. Greatly increasing the
2
cost of each sensor node directly conflicts with the overall goal of sensor network nodes becoming
low enough in cost that they are considered disposable [64]. Additionally, depending on GPS
for localization limits the applicability of sensor networks to outdoor environments [61]. The
prohibitive cost of equipping sensors with GPS is the reason many localization techniques restrict
GPS ability to only a small subset of the total network nodes, called anchors [77]. Deploying even
a small set of anchors into a sensor network provides the ability for the network to be localized
absolutely (i.e. estimated positions are directly related to GPS positions), whereas a network with
no deployed anchors can only be localized relatively (i.e. estimated positions are only meaningful
relative to other positions in the same network). However, in most sensor network applications,
absolute localization is not strictly necessary; instead it is overall topology identification, or relative
localization, that is critical for sensor identification, routing, data fusion and data analysis [87].
Considering the cost increase of equipping just a single node with GPS technology, localization
techniques that minimizes the use of anchors become critical [89]. However, an ideal relative
localization technique should take advantage of the additional information provided by anchors in
the event of their availability; just not strictly depend on them.
While knowing the physical positions of every node in the network provides a large amount
of information about the deployed topology of a wireless sensor network, it does not provide a
complete view of a network’s topology. Knowing the coordinates of each node in the network only
allows for the gathering of sensor data values associated with discrete locations. While obtaining
location/value pairs is the purpose of a sensor deployment, it may not provide everything about the
deployed environment of a sensor network. Specifically, the shape of the network deployment can
provide important information about the region under observation. The boundaries of the network,
both the inner (i.e. internal connectivity holes) and the outer (i.e. the network’s external perime-
ter), almost always have a physical correspondence to the environment in which the sensors are
deployed [85]. For example, consider an internal connectivity hole caused by a previously uniden-
tified body of water in the middle of the sensor deployment. Knowing the shape of the connectivity
3
hole provides previously unknown information about the body of water, or other entity, that caused
the hole. The same also goes for the shape of the entire network deployment, for example if the
monitored region is the bottom of a large ravine. Additionally, not being aware of the boundaries
within a sensor network can lead to degradation in performance over time. For example, in shortest
path routing, nodes along the boundary of a hole tend to receive more intermediate route requests,
increasing their overall load and ultimately reducing their power sources faster than other nodes
in the network [27]. This can cause a small hole to grow over the lifetime of the network due to
failing boundary nodes.
Another key aspect of topology discovery is the geometric identification of sensed phenomena
currently within a wireless sensor network. Obtaining how the sensed data relates to the physical
topology is fundamentally the goal of deploying a sensor network. Again, while knowing the co-
ordinates of each node in the network does allow for the gathering of sensor data values associated
with discrete locations, it does not directly provide any relationships between obtained data. For
example, it is difficult to identify whether or not two relatively close nodes in a sensor network
with the same or reasonably similar sensed data are identifying the same sensed phenomena or are
identifying different phenomena that just happen to have the same sensed data value. Traditionally,
each individual sensor node forwards its data to a single less resource-constrained location for cen-
tralized analysis. However, this approach hides or removes any relationships between the gathered
sensed data from the network, can cause high network overhead and even reduce the lifetime of the
network. The potential drawbacks of the centralized collect and analyze paradigm for sensor data
analysis makes the development of more advanced data analysis techniques for sensor networks
important, which has led to several distinct approaches to solve the problem. The most recent
of which is broadly referenced in the literature as edge detection. Edge detection aims to reduce
data analysis overhead by providing a more concise view of sensed data through the geometric
identification of sensed phenomena within a sensor network.
4
Our research efforts target the discovery of location and topological information in arbitrar-
ily deployed wireless sensor network in the absence of any accessible global information about
the deployed topology. The first topic addressed in this dissertation is the design of an anchor-
free relative localization for wireless sensor networks. The creation of a distributed boundary
recognition requiring only a relative coordinate system is address next. Lastly, we generalize our
boundary recognition technique into a general edge detection technique. The organization of this
dissertation follows. Chapter 2 provides some background information specific to our localiza-
tion, boundary recognition and edge detection techniques in WSN. The contents of Chapters 3–5
provided presents our anchor-free relative localization technique, distributed boundary recogni-
tion technique and unified technique for both edge detection and boundary detection, respectively.
Chapter 6 presents conclusions and discusses possible future work.
5
2.1 Overview
In this chapter, we provide a brief required background on wireless sensor networks. These topics
are discussed as they directly relate to the research presented later in this dissertation. They are
included for the purpose of completeness and are not intended as exhaustive discussions on the
topics. This chapter is organized as follows. Section 2.2 presents a brief introduction to geographic
forwarding in wireless ad-hoc networks. Section 2.3 discusses the basic technique behind distance
estimation using received signal strength in a wireless network.
2.2 Geographic Routing
Traditional routing techniques in wireless sensor networks depend heavily on network flooding to
determine suitable paths between two non-neighboring nodes. Unfortunately, floods are a source
of high communication overhead, which in turn increases the energy expenditure of the entire net-
work deployment. Flooding in of itself is not necessarily a bad thing and in some cases it is the
most effective and efficient way to disseminate information throughout a sensor network, however
requiring a flood for every route request, considered a fundamental operation in ad-hoc sensor net-
works, can be incredibly detrimental to the health of a network consisting of resource-constrained
sensor nodes. The newest class of ad hoc routing protocols are geographical, or location aware,
routing protocols. The general principles of geographical routing have been widely applied in other
types of networks, such as cellular networks [45]. Geographic routing protocols take advantage of
knowing the physical location of hosts in order to facilitate efficient, effective and scalable routing
in ad hoc networking environments. This is accomplished through various approaches from simply
using location information to reduce the overhead of traditional ad hoc routing protocols to the de-
sign of completely coordinate-dependent routing protocols. The limitation of geographic routing
6
protocols is their complete dependence on every host in the network having the ability to ascertain
its own physical location. However, unlike mobile ad-hoc networks, most sensor networks have
some form of localization in place [85]. This allows them to take advantage of geographic routing
protocols.
The most basic geographic routing technique is simple geographic forwarding. In simple geo-
graphic forwarding there is no route identification process, instead nodes simply forward packets
to their neighboring host that is located closer to the intended receivers than they are. In uniformly
dense ad hoc networks, simple geographic forwarding works extremely well. However, in net-
works that contain large voids, simple geographic forwarding does a terrible job routing packets
around the void [70]. GPSR [43], or greedy perimeter stateless routing, is a routing protocol that
consists of two packet forwarding methods: greedy and perimeter forwarding. GPSR’s greedy for-
warding technique is just simple geographic routing and the protocol tries to take advantage of this
form of forwarding as much as possible. GPSR switches to perimeter forwarding when it deter-
mines that greedy forwarding is unable to get a packet to its destination. Perimeter forwarding uses
the graph traversal concept of the right-hand rule. The right hand rule states that when arriving at
a vertex x from a vertex y the next edge that is traversed is the edge that is next counterclockwise
edge from yx leaving x. Using the right-hand rule the traversal of the outside of a polygon, or
face, is possible. The idea is that a void in an ad hoc network is simply a face that to be routed
around. GPSR then forwards a packet along faces trying to keep on a line from the last host where
perimeter forwarding was required and the known position of the destination.
2.3 Simple Distance Estimation using RSSI
There are many methods by which wireless receivers are capable of estimating their distance from
a transmitter. The simplest of which is using the received signal strength (RSSI) of a transmission
to infer the distance the transmission traveled between the receiver and the sender. In order to
accurately determine the distance between a transmitter and receiver using RSSI requires that the
7
original transmission power used by the transmitter to send the transmission is known [47]. In
traditional wireless networks assuming to know the transmission power of a received transmission
is not safe due to differing transmission power settings, however in wireless sensor networks where
it is usually assumed that all nodes use the same wireless transmitters, or at the very least, that any
differing hardware is known prior to deployment. Since it is nearly impossible to completely
quantify the propagation characteristics of any uncontrolled environments due to unknown sources
of interference, in order to get an estimated distance between the sender and receiver, freespace
propagation of radio signals is often assumed. In freespace only distance traveled causes a loss
to signal strength, therefore easily allowing for the calculation of distance from RSSI. Obviously,
using the distance traveled in freespace only provides an estimate in real environments. In order to
calculate distance traveled, in freespace, of a transmission, assuming we know the received signal
strength and the original transmission strength, we use Friis Equation [47]:
PRx = PTx
GTxGRxλ 2
16π2d2L , (2.1)
where GTx is transmitter antenna gain, GRx is receiver antenna gain, λ is wavelength, d is distance
separating Tx and Rx antennas and L is the system loss factor (≥ 1). Solving for d we get:
d =
√ PTxGTxGRxλ
2
16π2LPRx
. (2.2)
Simplifying, we assume perfect antennas, GRx = GTx = 1, and no external signal loss, L = 1,
leaving us with:
d =
√ PTxλ
2
16π2PRx
. (2.3)
Despite being error-prone, this equation is usable as a means to estimate the distance between a
sender and a receiver knowing only minimum required information.
8
3.1 Overview
Localization is the process by which the nodes of a sensor network self-determine the network’s
topology. This typically involves identifying the physical coordinates of every node in the network.
Equipping every node in a wireless sensor deployment with GPS or manually placing every node
in predetermined locations does technically solve the problem of localization. However, a well-
designed localization technique should minimize the cost of localizing a network. Unfortunately,
equipping every node with GPS is financially costly and manual placement is labor intensive. A
significant challenge faced in the design of a cost effective localization techniques is the depen-
dence on globally available information (i.e. network-wide flooded information). While using
globally available information provides a technique with more information on which to base its
solution, it also introduces the problem of cascading errors. Cascading errors are the result of
compounding estimation errors propagating through the network. Since many localization tech-
nique depend on estimated inter-node distances in order to localize the network, cascading ranging
errors significantly affect the accuracy of many localization techniques [90]. A common approach
to reduce the effects of cascading ranging errors is to restrict information propagation to only lo-
cal neighborhoods. ILS [55] implements this strategy to control the effects of cascading ranging
errors. However, the restriction of information propagation to handle cascading ranging errors
creates another problem. Information propagation restrictions introduce the problem of nodes in a
single neighborhood getting stuck at a local optimum. That is, there is not enough external infor-
mation to keep a single neighborhood from choosing wildly inaccurate final positions in a global
sense, while the positions are accurate in a local sense. This tends to happen in neighborhoods that
not well surrounded by other neighborhoods, such as corner and edge neighborhoods. ILS [55] is
9
the only localization technique in the literature to address this phenomenon. It deals with it using
an error control mechanism that prevents “bad seeds” from contaminating the position estimation
of other nodes. Championed as not requiring additional message overhead to implement, control
mechanisms are not without cost. The computational overhead of error control mechanisms can
be significant depending on the underlying filtering technique used.
While wireless sensor networks have become commonplace in many different areas of monitor-
ing, current wireless sensor networking technology is not necessarily suitable for all environments.
In recent years, there has been increasing interest in the extensive monitoring of large-scale un-
derwater environments. The ideal solution to extensive monitoring of large-scale environments is
the deployment of wireless sensor networks. However, terrestrial sensor networking technology
is not readily deployable in aquatic environments. The need for large-scale monitoring in aquatic
locations has given rise to the research field of underwater sensor networks [96]. Many different
fields of research benefit from the use and continued improvement of underwater sensor network-
ing technology. Archeology, seismic research and ocean life observations are just a few of the fields
that directly benefit from the use of underwater sensor networks [22]. While the overall goal and
basic operation of underwater sensor networks is the same as terrestrial wireless sensor networks,
there are several important differences. Foremost, underwater sensor nodes are deployable into
true three-dimensional topologies, capable of controlling and measuring their own depth. Also,
communications between underwater sensor nodes is done using acoustic communication, which
has much lower bandwidth, higher propagation delay and higher bit error rates than traditional RF
wireless communication [60]. Most research topics of importance to the development of terres-
trial wireless sensor networks remain important in the development underwater sensor networks,
with some even being more important to the development of underwater sensor networks due to
the adverse nature of underwater environments. Localization is a critical challenge in underwater
sensor networks, even more so than in terrestrial networks, because GPS is not readily available
due to GPS signals not propagating correctly through water [22]. Additionally, the differences
10
impractical or infeasible [82].
In this chapter, we present a straightforward, iterative, anchor-free, range-aware relative lo-
calization technique for wireless sensor networks, called Anchor-free, local Neighborhood-based,
Iterative MultiLateration (ANIML). ANIML is capable of providing accurate relative localization
without making assumptions about a deployed topology. ANIML does not depend on globally
flooded information, reducing the effects of cascading ranging errors by restricting its derived
distance estimates to a node’s 1- and 2-hop neighbors. While least-squares minimization is a
mathematically simple constraint optimization technique, by utilizing 1- and 2-hop neighbor in-
formation as constraints, ANIML provides accurate relative localization without the need for an-
chors, sophisticated error control and/or global information. In addition to presenting ANIML, we
also introduce three ANIML variants: ANIML-Abs, ANIML-Hop and Sea-ANIML. While AN-
IML does not require anchors in order to provide accurate relative localization, ANIML-Abs takes
advantage of any deployed anchor nodes to allow for absolute localization. ANIML-Hop is capa-
ble of localizing a network using only hop counts, in the absence of ranging equipment. Neither
ANIML-Abs nor ANIML-Hop requires changes to the underlying ANIML technique. Extensive
performance analysis shows that ANIML, ANIML-Abs and ANIML-Hop provide accurate local-
ization and scale well. Lastly, we adapted ANIML into a range-aware localization technique for use
in underwater wireless sensor networks, called Sea-ANIML. Simulations show that Sea-ANIML is
able to provide accurate localization in three-dimensional deployments where each sensor directly
measures its own depth.
The rest of this chapter’s organization follows. Section 3.2 presents related work on localization
in wireless sensor network and underwater sensor networks. Section 3.3 introduces our ANIML
technique as well as ANIML-Abs and ANIML-Hop. Section 3.4 contains performance analysis.
Section 3.5 presents Sea-ANIML and Section 3.6 presents a summary of the chapter.
11
3.2 Related Work
Previous attempts at solving the problem of localization in sensor networks can be categorized into
two groups: range-aware and hop-based. In range-aware techniques a distance metric is somehow
derived and used to estimate node positions. In hop-based localization no ranging hardware is
needed, and in many ways the distance estimates between nodes are simplified to the number of
hops in the shortest path. Both range-aware and hop-based approaches often employ traditional
methods, such as triangulation or optimization techniques, in order to calculate node positions.
However, localization techniques are often overburdened by constraints, such as specific node dis-
tribution and approximated transmission ranges in order to reduce the problem so that traditional
mathematical techniques can be applied. Additionally, most localization techniques for WSN pro-
vide absolute localization, however there are some techniques that do provide relative localization
for use when absolute localization is not strictly necessary, such as MDS-MAP [78], SPA [83], Rao
et al.’s localization technique for mobile ad-hoc networks [70], the convex optimization technique
in [21], the distributed Kalman filter approach [74], VCap [13], CBL [58] and nQUAD [87].
The rest of this section’s organization follows. Sections 3.2.1 and Section 3.2.2 present brief
related work on range-aware and hop-based localization techniques, respectively. Section 3.2.3
provides a more detailed survey of iterative multilateration localization techniques, which is the
class of localization approaches that are the most closely related to ANIML. Section 3.2.4 presents
related work on localization in underwater sensor networks.
3.2.1 Range-Aware Localization
Range-aware localization techniques typically derive inter-node distances based on received signal
strength measurements from another transmitting node [3, 6–8, 10, 16, 21, 23, 31, 33, 41, 50, 53,
55, 61, 65, 68, 71–74, 79–81, 83]. Most techniques calculate the distances that transmissions have
supposedly traveled between two nodes in the network directly from signal strength [3, 7, 10, 16,
33, 41, 50, 55, 65, 68, 71–74, 79, 83]. However, inter-node distances may also be estimated by other
12
means, such as the time required for a packet to travel from a node at a known network location [6,
81], the angle of arrival of a packet from a known network location [12] or interferometric ranging
[39]. The problem with directly calculating distances by means of signal strength observations is
that since all possible sources of signal interference cannot be accurately anticipated, prior to sensor
deployment, the estimated distances can become wildly inaccurate due to multi-path interference,
line-of-sight obstructions, etc. A common assumption, which can provide more accurate location
estimations, is an estimation of the distance between a normal sensor node and one, or more,
beacons or three, or more, anchor nodes [3, 7, 16, 33, 41, 53, 55, 65, 72, 74, 79, 80]. The exact duties
of an anchor node vary, but often it is assumed that anchors are less resource-constrained than
ordinary sensor nodes, deployed at known specific locations, deployed in a specific density within
the network, have different radio characteristics and/or are capable of determining their absolute
positions. Anchor nodes are also often assumed to provide some absolute positions within a sensor
network in order to improve the general performance of a localization technique. MAL [68] and
ADO [88] even involves a mobile rover, a sort of anchor node, that helps localize a network in the
event that terrain or deployment prevent stationary nodes from communicating distance estimates
to each other.
3.2.2 Hop-Based Localization
Hop-based localization techniques aim to overcome the inherent difficulties of accurately deter-
mining exact inter-node distances in sensor networks. While hop-based techniques do not require
inter-node distance information, many hop-based techniques have the ability to take advantage of
such information, if available, to provide more accurate results. One of the primary hop-based
methods is APS [61], a distributed, hop-by-hop positioning algorithm. The algorithm works as an
extension of both distance vector routing and GPS positioning, providing position estimates for all
unknown nodes in a sensor network, assuming a subset of nodes in the network have the ability
to determine their own positions. The accuracy of the position estimates in APS will be improved
13
as the number of anchor nodes increase. Notable extensions of APS are Hop-TERRAIN [42] and
differential APS [66]. Another approach of hop-based localization is the use of multi-dimensional
scaling (MDS). Sang et al. proposed MDS-MAP which uses mere network connectivity and MDS
in order to localize a sensor network [78]. The extensions of MDS-MAP, MDS-MAP(P) [77]
and MDS-MAP(R) [76] are distributed versions of MDS-MAP. Wong et al. [86] and Medidi et
al. [58] also depend on MDS as the mathematical basis in their proposed hop-based localization
techniques. Another hop-based localization technique, but for ad-hoc networks, has been proposed
by Rao et al. which dynamically determines a network’s perimeter nodes, using only hops, as the
initial step in using neighborhood coordinate averaging to localize internal network nodes [70].
Caruso et al. propose VCap which is a hop-based, GPS-free localization method that first local-
izes three sensor nodes to act as pseudo-anchors for the rest of the localization [13]. Yang et al.
have proposed HCRL [89] which uses single flooding and Apollonius Circles to localize a sensor
network, while providing a significant reduction in power consumption. Yi et al. [90] propose
using Monte Carlo methods to reduce the overestimation that they observe in many hop-based lo-
calization schemes. nQUAD [87] uses a hop-based cooperative quadrant prediction technique to
improve upon hop-based lateration techniques for relative positioning.
3.2.3 Iterative Multilateration
The class of localization techniques that iteratively converge on a network topology using only
ranging estimates are known as “iterative multilateration” techniques [2]. Capkun et al. [83] have
shown that MANETs with no anchor nodes can be localized by means of iteration, using their
range-aware Self-Positioning Algorithm (SPA), using only local neighborhood information. In
SPA each node first constructs a local coordinate system containing just its 1- and 2-hop neighbor-
hoods and then each node’s local coordinate space is mapped into a larger global coordinate space,
by aligning overlapping nodes between nodes’ local coordinate spaces. Similar to our technique,
SPA is designed to provide relative positioning, however SPA does not attempt to provide position
14
estimates that necessarily correlate with the true physical network topology, since the goal of SPA
is to only provide non-GPS equipped ad hoc networks the ability to take advantage of geographical
routing. Additionally, SPA is not designed for use on resource-constrained sensor nodes.
Robinson and Marshall [71] present a distributed iterative multilateration approach for MANETs
in which nodes guess and re-guess their position estimates with a constantly improving perceived
error metric. This series of guesses and re-guesses, by means of linear regressions, will eventually
converge to a topology that satisfies all distance estimates measured within the network. Robinson
and Marshall’s approach assumes that a small subset of nodes are GPS-enabled. This approach
uses iterations to perfect the localization of the network, even in the event of zero mobility. Unlike
ANIML, the accuracy of Robinson and Marshall’s approach is heavily dependent on the accuracy
of the distance estimates it makes and can require as many as 100,000 iterations to ensure an accu-
rate solution even with perfect distance estimates, which are rarely available in practice. Another
approach towards iterative multilateration, although computationally expensive, is Savvides’ et
al. [74] approach of using a distributed Kalman filter and having a subset of anchor nodes handle
localization in both the static and mobile cases. Doherty et al. [21] explain how localization can be
done through convex optimization on the definition of local neighborhood geometric constraints.
The algorithm provides accurate node positioning, given tight enough constraints. However, this
method requires centralized computation and a significant density of anchors is needed, in order to
provide the tight constraints needed for an accurate localization result.
Liu et al. have recently proposed ILS which is a neighborhood-based, iterative least-squares
localization technique, which controls cascading ranging errors by scoring distance estimates [55].
This allows only known good estimates to be used for localization and the “bad seeds” to be filtered
out. ILS strictly requires anchors in order to perform its localization and the localization proceeds
out, in a synchronized fashion, from the anchors to the non-localized nodes in the network. Also
recently proposed is Sweeps [33] which is similar to ILS with the exception that it is designed to be
used in sparse networks and uses graph theoretical methods instead of least-squares calculations.
15
As with terrestrial wireless sensor networks localization techniques, localization techniques for un-
derwater sensor networks can be categorized as either range-aware or hop-based. However, with-
out a readily available accurate localization infrastructure, such as GPS, for use in the case that
accuracy is more important than deployment costs, hop-based localization techniques designed
specifically for underwater sensor networks are not widely researched. The fundamental aspect of
range-aware localization techniques in UWSN require identifying inter-node distances, however
the number of ranging options are more limited than in terrestrial wireless sensor networks, due to
the unique properties of acoustic communication channels. The most common approach to deter-
mine inter-node distance in terrestrial wireless sensor networks is measuring the Received Signal
Strength Indicator (RSSI) of a transmission. Other common ranging techniques are measuring the
Angle of Arrival (AoA), Time of Arrival (ToA) or Time Difference of Arrival (TDoA) of a received
transmission. Distance estimation using RSSI is much more unreliable in aquatic environments us-
ing acoustic communication than in traditional wireless sensor networks. Both the surface of the
water and the seafloor act as reflectors, causing significant interference to acoustic signals. Addi-
tionally, air bubbles and noise, such as shrimp noises, cause significant and unpredictable signal
loss in acoustic signals. Due to the larger number of unpredictable source of signal interference and
loss that are present in aquatic environments distance estimation using RSSI is not the preferred
distance estimation technique in underwater sensor networks. Distance estimation using AoA typ-
ically require special antenna configurations that are suited for aquatic deployment. The drawback
of distance estimation using ToA or TDoA is that all nodes must be tightly time synchronized. Un-
fortunately, common time synchronization techniques used in terrestrial wireless networks are not
feasible in underwater sensor networks since they often assume low latency RF communication.
Despite the need for tight time synchronization, the preferred methods of distance estimation in
underwater sensor networks is ToA or TDoA [17].
16
Othman et al. propose an anchor-free relative localization technique for underwater sensor
networks [63]. Othman et al.’s technique begins with a single seed node, which becomes the ori-
gin of the relative coordinate system, and expands outwards until all nodes are localized. This
technique requires an initial node discovery phase, which can require a high number of message
exchanges [22]. Zhou et al.’s localization technique for underwater sensor networks [95, 96], sim-
ilar to ILS [55], is a hierarchical range-aware technique and requires three types of nodes: surface
buoys, anchor nodes and ordinary nodes. The technique then proceeds in two phases. In the
first phase, the surface buoys accurately localize the anchor nodes. Anchor nodes are uniformly
distributed throughout the entire topology, in order to enable scalable localization. Then the or-
dinary nodes use the anchor nodes to localize themselves. Clearly, the accurate localization of
anchors from the surface buoys is the most difficult part of the technique and it is not discussed
in detail [22]. Teymorian et al. propose USP, a localization technique for underwater sensor net-
works which non-degeneratively projects reference nodes onto the plane containing non-localized
nodes [82]. However, Mirza and Schurgers show that the localization accuracy of reducing the
problem of three-dimensional localization in underwater sensor networks to two-dimensions, when
the depth is known, is still greatly affected by the topology’s three-dimensional geometry [60].
Some localization techniques for underwater sensor networks aim to provide ongoing accu-
rate localization in the case where currents cause nodes to drift from their initial deployed posi-
tions. Erol et al. have proposed Dive’N’Rise (DNR) positioning, a novel range-aware localization
technique using Dive’n’Rise (DNR) beacons and takes into account node mobility due to ocean
currents [22]. DNR beacons are buoys that rise to the surface to obtain GPS coordinate and then
slowly sink relaying the new position information to the sensor deployment. Zhou et al. adapted
their localization technique previously discussed hierarchical localization technique [95, 96] into
SLMP, a localization technique that takes advantage of past location information in order to predict
future mobility, aiming to allow nodes to estimate their future positions [93,94]. Mirza and Schurg-
ers take motion-aware localization to the next step by proposing a technique that keeps fields of
17
underwater drifters localized while they travel freely with ocean currents [59, 60].
3.3 Approach
This section presents ANIML, our anchor-free localization technique. Section 3.3.1 presents the
basic ANIML technique. While Section 3.3.2 discusses limitations of the basic ANIML tech-
niques. Section 3.3.2 also presents our improvements to the basic ANIML technique to address
the discussed limitations. Lastly, Section 3.3.3 discusses the ANIML variants: ANIML-Abs and
ANIML-Hop, that extend ANIML’s applicability to WSN with anchors and without ranging capa-
bility, respectively.
3.3.1 ANIML
The basic idea behind ANIML is for nodes to expand their positions outward, from their starting
positions at the origin, closer towards their actual relative positions in the network, with each itera-
tion. Since there are no anchors to provide known absolute positions in the network, the localizing
sensor nodes have no predefined coordinate system available on which they can converge. ANIML
handles this by choosing a single node, the reference node, to remain “stationary” at the origin
through all iterations. This gives nodes a common “absolute” position from which to expand out-
wards. Other than remaining at the origin, the reference node is identical in capability to all other
sensor nodes in the network. ANIML assumes the use of sensors equipped with ranging hardware
that is capable of making distance estimates from received transmissions.
Figure 3.1 outlines ANIML’s iterative localization process, run independently on each node.
Note that these ANIML iterations across the nodes do not require any tight synchronization. The
underlying mathematical technique in ANIML is least-squares multilateration. Given that a node
recalculates its position estimate x knowing only the estimated positions xi and distances di of n
1- and 2-hop neighbors, we can formulate n constraints of the form:
||x− xi|| = di. (3.1)
Node k: while termination condition not met do
BroadcastMessage() collect messages from neighbors for each message rcvd from a node i do
dk,i ← measured distance estimate from node i update stored information for node i for each node j in rcvd list of i’s neighbors do
dk,j ← dk,i+ rcvd dist of node j from i update stored information for node j
end for end for RecalculateCoordinates()
end while
Figure 3.1: Basic Iterative ANIML Technique
From these n non-linear constraints, we can approximate n linear constraints. Assuming x ≈ x0, where x0 is the current estimated position of the recalculating node, we get x = x − x0.
Substituting x into (3.1) and expanding, we get:
√ ||x0 − xi||2 + 2(x0 − xi)T x + ||x||2 = di. (3.2)
Taking the first order Taylor series expansion of (3.2) with respect to x, in order to approximate
the square root, ignoring the ||x||2 term (x is assumed to be small), re-substituting for x and
simplifying we obtain: (x0 − xi)
T (x− xi)
||x0 − xi|| = di. (3.3)
With the equation of the unit vector from xi to x0 being ri = (x0 − xi)/ ||x0 − xi||, (3.3) can be
simplified to:
Here ri T is a 2× 1 vector and ri
Txi + di is a single scalar.
19
Thus, we have obtained n linear constraints, expressed in matrix form:
Ax = b, (3.5)
T , · · · , rn T )T and b = (r1
Tx1 + d1, r2 Tx2 + d2, · · · , rn
Txn + dn)T . The least-
squares solution to the linear system (3.5) is x = (ATA)−1ATb. Note that if A is collinear we
simply perturb x a small amount, which usually makes it noncollinear in the next iteration. This

Figure 3.2: Least-squares Multilateration (k = 4)
Initially every node will only be aware of its own estimated position, making it unable to re-
calculate a new estimated position, in which case it will broadcast its current estimated position
to its 1-hop neighbors. In the next iteration, every node will be aware of their estimated position,
those of its 1-hop neighbors and the estimated distances of its 1-hop neighbors made through direct
ranging. This information allows a node to begin recalculating its own position estimate. Since
each node’s initial position is the origin, this first recalculation will place a node roughly the av-
erage estimated distance it is from all of its 1-hop neighbors away from the origin in an arbitrary
20
direction. Every node then broadcasts its new position estimate, in addition to the position esti-
mates it has received from its 1-hop neighbors and the distance estimates it has made for its 1-hop
neighbors. The size of an ANIML packet depends on the node’s 1-hop neighborhood. ANIML’s
total message complexity is the product of the number of nodes and iterations. In most randomly
deployed topologies ANIML usually requires only 10 to 15 iterations.
In the third, and subsequent iterations, every node is aware of their own estimated position,
those of its 1- and 2-hop neighbors, the estimated distance of its 1-hop neighbors made through
direct ranging and the estimated distances of its 2-hop neighbors. ANIML infers a node’s distance
from a 2-hop neighbor by adding the received distance estimate between the intermediate 1-hop
neighbor and the 2-hop neighbor to the directly calculated distance estimate of the intermediate
1-hop neighbor. While there are possibly other ways to obtain a more accurate distance to a node’s
2-hop neighbors, since the sum of distances provides a gross overestimate due to triangular in-
equalities, we chose the straightforward sum of distances in ANIML. In addition, since a node can
receive duplicate information about any 1- or 2-hop neighbor, ANIML always utilizes the smallest
inferred distance it has estimated to any node. Now every node is fully able to take advantage of
least-squares multilateration to recalculate a more accurate position estimate, at least relative to
its immediate neighbors, because its immediate neighbors’ estimated positions have spread apart
and not all located at in the same spot. Additionally, the availability of 2-hop neighbor infor-
mation allows the nodes of a neighborhood to begin moving closer towards their actual distance
away from the reference node and any adjoining 1-hop neighborhoods. This is possible because
ANIML explicitly provides nodes with a sense of how they should line up globally with adjacent
neighborhoods, while remaining consistent with their 1-hop neighbors.
In a network where every distance estimate was perfect and the only unknowns in the net-
work were positions, ANIML would not require an explicit termination condition. Each node will
converge to a single location. However, having only estimated knowledge of distance requires an
explicit termination condition. With only estimated distance estimates, there is no single solution
21
to the localization, so any one slight position estimate change can cause an unending cascade of
changes in the position estimate of every node in the network. This makes determining the correct-
ness of ANIML difficult. The termination condition we have most used is a node keeps its current
position estimate when it has not moved more than 5% of its transmission range in 5 successive
iterations. Once a node stops, it simply acts as a forwarder for the messages it receives from still
actively localizing nodes. Unfortunately, it is possible, although rare, for some nodes to never settle
near a single position. These nodes flip back and forth between two relatively far apart positions
estimates. In these cases, we employ a cap on the maximum number of iterations to insure that a
node does not attempt to localize itself indefinitely.
3.3.2 Improving ANIML
By restricting distance estimates to only 1- and 2-hop neighbors, instead of globally propagated
information, such as the positions of anchors, we reduce the effects of cascading ranging errors;
such cascading errors significantly affect the accuracy of many range-aware localization techniques
[90]. Naturally, to control the message and computation complexity, we would have preferred to
restrict ANIML to use only 1-hop neighbor information. However, we found that while this can
provide accurate localization in some cases, in many cases individual neighborhoods localize too
rapidly based on only their own 1-hop neighborhood’s information, fold onto themselves, and get
stuck at a local optimum. This problem is also encountered in ILS [55] and other techniques
[61, 74]. Such folding of neighborhoods cannot be either detected or rectified with only 1-hop
neighbor information. Fig. 3.3(a) shows the localization of a network by ANIML using only 1-
hop neighbor information (estimated positions are denoted by circles with the arrows pointing to
the true positions). The accuracy of the localization is poor with an average positioning error
of 90 meters; however the average pair wise distance error is only 21 meters. Several different
ways to address local optima are presented in the literature. For instance, DV-Hop [61] favors
positioning information from physically closer nodes. ILS [55] by spreading the localization out
22
in successive stages, scoring the error estimates, and controlling the error propagation. On the
other hand, Savvides et al. [74] presented Kalman filtering-based localization technique that uses
weighting. However, by simply basing nodes’ position calculations on 1- and 2-hop information
ANIML can prevent the folding of neighborhoods and from getting stuck at a local optimum. Two-
hop neighbor information acts as a natural dampener to the localization process, slowing down the
changes of nodes in each iteration which allows neighborhoods that would otherwise rapidly reach
a local optimum extra time to receive additional information that could prevent it from getting
stuck. Fig. 3.3(b) shows the same topology as Fig. 3.3(a) localized by ANIML using 1- and 2-hop
neighbor information. The localization has an average localization error of only 8 meters with an
average pairwise distance error of 3 meters.
-300
-200
-100
0
100
200
300
400
0 1
2 3
0
Figure 3.3: Comparison of ANIML using 1-hop and 2-hop Information
One issue with ANIML’s iterative localization approach is that it can be slow to complete. In
the initial ANIML iterations, nodes’ positions are in a state of flux; ANIML’s iterative behavior
causes the nodes to settle down, but slowly. However by having nodes include its number of
hops from the network’s reference node in its broadcasts, it is possible to increase the speed of
convergence. From the hop-distance, h, to the reference node at the origin, a node can check if its
position is within the distance range of [r × h, r × (h− 1)] to the origin, where r is the maximum
23
transmission range. Otherwise, the node is able to either push or pull its position to the closer of
the two bounds in the above range, along the same angle from the reference node as before. This
push-pull refinement, done prior to broadcasting its new position estimate, allows a node to place
itself closer to its final position much faster, allowing the localization to converge more rapidly.
The basic ANIML technique requires no explicit error control mechanisms, since error control
mechanisms are implicitly built into each step of the technique. Using a node’s 1- and 2-hop
neighborhood allows for some prevention against neighborhoods getting stuck at local optima,
without needing to resort to scoring or weighting of received information. Also, restricting to 2-
hop neighborhood information prevents cascading of ranging errors over multiple hops. Iteratively
refining a node’s position naturally provides error control by allowing any transient errors to be
smoothed away over several iterations. Using least-squares multilateration, on a node’s entire 2-
hop neighborhood, to recalculate a node’s position smoothes out the affects of error prone distance
estimates. This is even more critical considering that using triangle inequalities for the 2-hop
distance estimates are gross overestimates. Even after introducing significant ranging error in the
2-hop neighbor distances, due to triangular inequality, least-square multilateration is still able to
smooth over these affects and provide good position estimates. The push-pull technique used to
speed convergence also provides further error control, since it keeps nodes from drifting too far or
remaining too close to the reference node. This is important not only for the accuracy of a node’s
own position estimate, but also for the nodes located around it.
The iterative nature of ANIML naturally places a node into its correct position when it neigh-
borhood is well distributed around it, the problem occurs when a node’s neighbors are biased in one
direction from the node (i.e. corner and edge nodes). Corner and edge nodes can end up estimating
their position on the “wrong” side of their 1-hop neighborhood. Since least-squares multilateration
depends on unit vectors from a node’s neighbors to the current estimate, a node will continue es-
timating its position to be on the “wrong” side of its 1-hop neighborhood. These corner and edge
nodes that have been placed on the “wrong” side of their 1-hop neighborhood appear “flipped” into
24
their 2-hop neighbors, towards the center of the network. Additionally our push-pull refinement
cannot help push these flip nodes closer to their proper position on the boundary of the network
since it is a conservative push. ANIML is naturally capable of preventing flipped nodes, however
as the network diameter increases the propagation of information from within the network gets
progressively slower to the edges of the network allowing some neighborhoods to still move too
rapidly into a local optimum, which is the underlying cause of flipped nodes.
In order to combat the problem of anomalous flipped nodes we extended ANIML with a simple
sanity check technique to detect a flip and correct it if necessary. We could have used known tech-
niques to detect nodes on the periphery of the network and then treated them differently in ANIML
than internal nodes, however only a small number of boundary nodes flip and our simple flipped
node sanity check provides effective correction. A node cannot be sure whether it has flipped or
one, or more, of its 2-hop neighbors being flipped. Without access to global knowledge of the sen-
sor network it is impossible for a node to be absolutely positive that it has flipped. However, based
on two observations: corner nodes have much smaller 1-hop neighborhoods than other nodes and
nodes closer to the reference node are more likely to be well represented by their neighbors than
nodes farther away from the reference node, this simplistic sanity check is able to identify most of
the flipped nodes. If a node detecting a flip has a smaller 1-hop neighborhood than its identified
inconsistent 1-hop neighbors then it is most likely a flipped corner node and needs to have its own
position corrected. Correction for this case is flipping the node’s position 180 around the centroid
of its “inconsistent” 1-hop neighbors. Unfortunately, neighborhood size does not sufficiently iden-
tify flipped edge nodes. Instead, if a majority of a detecting node’s inconsistent 1-hop neighbors
are closer to the reference node then the node assumes it is the offending flipped node. Correction
is done by placing the node in the center of its inconsistent 1-hop neighbors that are closer to the
reference node. In both correction cases, subsequent iterations would let the previously flipped
node identify better position estimates on the correct side of its biased neighborhood. This san-
ity check is independently executed at a much lower frequency than the basic ANIML iterations,
25
roughly once for every 10 iterations of ANIML. In most cases, the sanity check is able to identify
and correct flipped nodes within two such executions.
3.3.3 ANIML-Abs & ANIML-Hop
There are two obvious variants of ANIML: ANIML-Abs and ANIML-Hop. While ANIML is a
range-aware, anchor-free relative localization technique, the ability to use anchors to provide ab-
solute localization (ANIML-Abs) and to provide localization in the absence of ranging equipment
(ANIML-Hop) are both attractive options. Neither variant requires any changes to the underlying
ANIML technique. For ANIML-Abs there must be at least three anchor nodes, one of which is
selected to be the network’s reference node. Other anchors act no differently than the location-
unaware nodes in the network, they just do not need to update or refine their own coordinates.
Note that ANIML could have taken advantage of the other anchors as additional reference nodes
to improve ANIML-Abs further. ANIML-Hop, applicable when no ranging equipment is available,
simply selects the estimated distance for each hop to be 3r/4, where r is the maximum transmis-
sion range. This value is slightly higher than the expected inter-node distance in random uniform
distributions of r/ √
(2). ANIML-Hop provides also provides absolute localization, but does not
require ranging equipment.
3.4 Performance Evaluation
We implemented ANIML (with and without our flipped node sanity check), ANIML-Abs and
ANIML-Hop in ns-2. We compared ANIML’s effectiveness to APS (DV-Hop) [61], a popular
technique for baseline comparisons. Since the authors’ own results show that DV-Hop outper-
forms DV-Distance, we compare against DV-Hop instead of the range-aware DV-Distance. The
simulation environment for ANIML uses 802.11 MAC. We obtained all DV-Hop data by replicat-
ing the experiments using the DV-Hop authors’ CAML implementation of APS. We used both 5%
and 10% anchor distributions in the DV-Hop, ANIML-Abs and ANIML-Hop experiments. We
generated topologies in four different sizes (250 by 250, 500 by 500, 750 by 750 and 1000 by 1000
26
m2) and two different node densities (400 and 800 nodes/km2) in order to investigate ANIML’s
scalability. The maximum transmission range of each sensor is 250 meters, although our presented
results scale to smaller transmission ranges. This makes the hop distance used in ANIML-Hop ex-
periments 187.5m (3/4 of 250m). Distance estimates for ANIML and ANIML-Abs are obtained
by adding a uniformly distributed error (0-90%) to the true distance between two neighboring
nodes to mimic experiments reported in [61]. Each data point presented in our plots is the average
of ten runs with differing random seeds, with no discarding of outliers.
The metric for localization effectiveness, used in the literature, is the average distance away
their estimated positions are from the nodes’ actual positions in the network. We give the measure-
ment of effectiveness as a percentage of the transmission range of the sensor nodes in the network.
Since ANIML produces relative localization, the determined network coordinates may have un-
dergone a global flip, rotation and/or shift making direct comparisons to the actual coordinates
difficult. Therefore, comparisons are done post localization by (i) shifting the real coordinates by
the difference between the origin and the reference node’s true position, (ii) globally rotating both
the real and relative coordinates to place node 1 on the y-axis and (iii) then, if needed, flipping the
relative set of coordinates to place them in the same coordinate space. Please note that no scaling
of position estimates is involved in this transformation.
3.4.1 Comparison of Basic ANIML using 1-Hop vs. 2-Hop Information
Providing only 1-hop neighbor information to ANIML for localization can lead to poor overall
localization due to neighbors getting stuck at local optima. Figure 3.4 shows the localization effec-
tiveness of ANIML using 1-hop information compared to ANIML using 1- and 2-hop information.
Please note that data points are shifted slightly left and right of the real values (0.0625, .25, .5625,
1) on the x-axis to allow for clear presentation of the error bars. Figure 3.4 shows that ANIML
using 1- and 2-hop information provides better overall localization accuracy than ANIML using
27
only 1-hop information. However, using only 1-hop information does not necessarily prevent AN-
IML from accurately localizing a network, as can be seen by the best case (i.e. lower error bars)
inaccuracy for ANIML (1hop/400) and ANIML (1hop/800). In fact, the best case using only 1-hop
information is comparable to the best case using 1- and 2-hop information. The problem with using
only 1-hop information compared to using both 1- and 2-hop information, since potential accuracy
is not the issue, is the potential inaccuracy of the resulting localization. In the 1-hop ANIML cases
the difference between the best case results and the worst case results (i.e. upper error bars) are
at least two times larger than the 2-hop ANIML cases. A large difference between the best and
worst case localization of 1-hop ANIML alone does not necessarily imply inaccurate localization
results, since the worst case results could be isolated outliers (e.g. the end localization contains
one or more neighborhoods that got stuck at a local optima). However, if the worst case results
of 1-hop ANIML were outliers the overall mean inaccuracy would be located closer to the best
case result in all 1-hop ANIML cases, not near the middle of the error bars, as is the case with the
mean inaccuracy of the 2-hop ANIML cases. Therefore, while 1-hop ANIML has the potential to
provide as accurate localization as 2-hop ANIML, there is much larger potential for 1-hop ANIML
to produce wildly inaccurate localization.
3.4.2 Basic ANIML vs. Improved ANIML
Figure 3.5 shows the localization effectiveness of the basic ANIML technique compared to the
basic ANIML technique extended with our flipped node sanity check. Again note that data points
are shifted slightly left and right of the real values on the x-axis to allow for clear presentation
of the error bars. The data shows that ANIML augmented with our flipped node sanity check
provides better overall localization than the basic ANIML technique. The worst case localizations
(i.e. upper error bars) of the non-enhanced ANIML cases are caused directly by end localizations
in which 2-hop information was not completely sufficient to prevent one or more neighborhoods
from getting stuck at local optima. These outliers cause a larger difference between the best case
28
0
20
40
60
80
100
120
In ac
cu ra
Figure 3.4: 1-Hop ANIML vs. 2-Hop ANIML
localizations (i.e. lower error bars) and the worst case localizations, which demonstrates increased
potential inaccuracy. The introduction of our flipped node sanity check allows ANIML to identify
and repair neighborhoods stuck at local optima that adding 2-hop information could not prevent,
therefore decreasing the potential of ANIML producing an inaccurate localization. This prevention
of anomalous localization due to unresolved local optima can be seen by the enhanced ANIML
cases having much tighter error bars than the non-enhanced ANIML cases. Therefore, ANIML
augmented with our flipped node sanity check greatly reduces the potential inaccuracy of ANIML
by resolving any remaining local optima that using 2-hop information did not prevent. The data
also demonstrates that ANIML is robust in the presence of less information on which to base its
localization, since 400 nodes/km2 (the number of nodes ranges from 25-400) provides comparable
localization to 800 nodes/km2 (the number of nodes range from 50 to 800). By comparison, if
ANIML had three perfectly accurate distances from three nodes knowing their true positions then
it would be able to localize a node perfectly. Since ANIML does not have the benefit of anchors
or perfect distance estimates, it requires more information than three nodes, but after a certain
threshold of available information, adding more information provides only a small increase in
29
accuracy.
0
5
10
15
20
25
30
35
40
45
In ac
cu ra
ANIML (enhanced/400) ANIML (enhanced/800)
Figure 3.5: Enhanced ANIML vs. the Basic ANIML Technique
Figure 3.6 shows the number of iterations ANIML, with and without our push-pull mechanism,
performed to localize a network. The results show, as expected, that ANIML with push-pull con-
verges faster than ANIML without push-pull, particularly as the diameter of the network increases.
The data also shows that the convergence time of ANIML is not directly dependent on the number
of nodes in the network and, as expected, increases with the diameter of the network. The conver-
gence does not depend on the total number of nodes in the network because ANIML is distributed
and uses only local information. For the localization results to be globally consistent any node’s
position estimate should be influenced by all other nodes; the farther apart they are, the longer
ANIML should need before converging. The network diameter, a measure of this farthest number
of hops, should contribute to convergence linearly.
3.4.3 Uniform Networks
Figure 3.7 shows the localization effectiveness of ANIML, ANIML-Abs and ANIML-Hop com-
pared to DV-Hop in uniform topologies. The results show that ANIML provides accurate relative
localization in uniform topologies, since it only incurs very low single digit inaccuracies in both
30
10
20
30
40
50
60
70
80
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
N um
be r
of It
er at
io ns
Figure 3.6: ANIML Convergence Time
the 400 and 800 nodes/km2 results. Additionally, the results show as expected, higher node density
allows ANIML to provide slightly better localization accuracy since there is more data to provide
more constraints for the underlying least-squares calculation. However, the lower density cases
still provide exceptionally high accuracy demonstrating that ANIML, while being able to use high
node densities to its advantage, does not need highly dense topologies to provide effective local-
ization. Additionally, the inaccuracies incurred by ANIML increase nearly linearly as the network
area increases. The reason being that as the network area increases so does the diameter of the
network, which leads to an increase in small positioning errors due to the implicit cascading of
position estimates.
Figure 3.7 also shows that ANIML-Abs provides accurate absolute localization in uniform
topologies, since it also only incurs very low single digit inaccuracies in both the 400 and 800nodes/km2
and 5% and 10% anchor density results. ANIML-Abs shows similar properties as ANIML, such
as increases in node density directly increase localization accuracy, but it does not require high-
density deployments in order to provide accurate localization. As expected, ANIML-Abs also
shows the same linear increase in localization inaccuracy as the network area increases as ANIML.
31
While adding a small percentage of anchor nodes will result in the propagation of less position es-
timates, 5 and 10 percent is not a large enough percentage of anchor nodes to eradicate cascading
positioning errors. The results also show, the addition of anchors into ANIML serves only to pro-
vide absolute localization and does not significantly improve the accuracy of ANIML, since the
accuracy of ANIML and both ANIML-Abs cases are nearly the same. Therefore, it is to be ex-
pected that increasing the anchor density does not increase the accuracy of ANIML-Abs, since
ANIML-Abs with 5% anchors and ANIML-Abs with 10% anchors provide the same localization
inaccuracies.
Lastly, Figure 3.7 shows that ANIML-Hop also provides accurate absolute localization in uni-
form topologies, in all simulations, once the network diameter is greater than one. While the 15%
to 10% inaccuracy of ANIML-Hop is clearly higher than ANIML and ANIML-Abs measured
inaccuracies, it shows that even without ranging equipment, on which ANIML and ANIML-Abs
highly depend upon, the basic ANIML technique is still able to provide good localization. The rea-
son that ANIML-Hop and DV-Hop incur a large decrease in localization in accuracy between the
first two network areas is because without a multiple hop network, neither technique has any avail-
able information upon which to localize the network. In other words, in a one-hop network both
ANIML-Hop and DV-Hop place every node in a random position. Overall, Figure 3.7 shows AN-
IML, ANIML-Abs and ANIML-Hop all outperform DV-Hop in all simulations. However, while
its excepted that ANIML and ANIML-Abs would provide higher accuracy than DV-Hop, since
they depend on ranging equipment, the data more importantly shows that ANIML-Hop, despite its
simple static hop distance estimation, is able to provide better overall accuracy than DV-Hop and
its dynamic hop distance technique.
For qualitative assessment only, since others do not have a readily available implementation for
direct experimentation, ANIML’s localization effectiveness is compared against the localization
effectiveness of MDS-MAP(P), ILS and SDP in uniform topologies using the data provided in
32
0
20
40
60
80
100
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
In ac
cu ra
0
20
40
60
80
100
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
In ac
cu ra
Figure 3.7: Localization Effectiveness of ANIML in Uniform Topologies
[77], [55] and [10]. This data is summarized in Table 3.1. ANIML, ANIML-Abs and ANIML-
Hop incur less inaccuracy than SDP, ILS and hop-based MDS-MAP(P). ANIML and ANIML-Abs
provide comparable localization to range-aware MDS-MAP(P). However, while range-aware and
computationally expensive MDS-MAP(P)’s accuracy is comparable to ANIML and ANIML-Abs,
the distance measurements used were the true distance plus 5% error whereas our simulations used
true distance plus a uniformly distributed error between 0 and 90%. Also, although ANIML-Hop
provides slightly less accuracy than range-aware MDS-MAP(P), ANIML-Hop requires no ranging
equipment.
Table 3.1: Reported Results of ILS, MDS-MAP(P) and SDP Reported
Method Range Error Inaccuracy ILS 20m 4m 20% MDS-MAP(P) Range-aware N/A N/A 5% Hop-based N/A N/A 15− 20% SDP 0.2− 0.3m <= .08m <= 40%
33
Figure 3.8 shows the localization effectiveness of ANIML, ANIML-Abs, ANIML-Hop and DV-
Hop in C-shaped networks. We created our C-shaped topologies by first creating a random uni-
form deployment over the desired network size of n × n and then removing all nodes located in
the square (n/2, n/4), (n, 3n/4). ANIML-Abs and ANIML-Hop having the benefit of anchors do
as well in C-shape topologies as they did in uniform topologies, while DV-Hop’s accuracy incurs a
small decrease in accuracy compared to uniform networks. Additionally, most of the relationships
between ANIML, ANIML-Abs, ANIML-Hop and DV-Hop identified from the results shown in
Figure 3.7 remain true, such as increased anchor density not significantly increasing the accuracy
of ANIML-Abs and increased node density slightly increasing localization accuracy. However,
ANIML’s accuracy decreases significantly as the network area increases. This happens because
in relative localization schemes C-shaped topologies are isomorphic to S-shaped topologies. Any
application that needs only relative localization, such as geographic routing, will find the resulting
S-shaped topology to be identical to a C-shaped topology and will benefit equally in either topol-
ogy. However, the inaccuracy metric used does not accurately capture this isomorphism and only
sees that the coordinates in one arm of the C, in a global sense, are in the wrong place. The reason
that this S-shaped localization result could occur in ANIML, and not in DV-Hop, ANIML-Abs
and ANIML-Hop, is that there are no anchors to keep the two arms of the C “in place.” However,
the results of ANIML-Abs and ANIML-Hop in C-shape topologies show that adding anchors to
ANIML completely avoids this C-to-S transformation.
3.4.5 Non-Uniform Networks
Figure 3.9 shows the localization effectiveness of ANIML and DV-Hop in networks with irregu-
lar node densities. We generated our topologies with non-uniform node densities by first creating
a random uniform deployment over the desired network area and then moving half of the nodes
from a random quadrant to another random quadrant of the network. ANIML and ANIML-Abs
34
0
20
40
60
80
100
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
In ac
cu ra
0
20
40
60
80
100
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
In ac
cu ra
Figure 3.8: Localization in C-shaped Networks
in networks with irregular node densities provides comparable accuracy to that of ANIML and
ANIML-Abs in uniform topologies, while DV-Hop and ANIML-Hop as expected incur a slight
reduction in accuracy. ANIML-Hop’s decrease in accuracy is due to the simplistic selection of a
static hop distance. A hop distance estimate of 187.5m was selected based on a node’s neighbors
likely being about 3/4 the maximum transmission range away from the node in uniformly dis-
tributed networks, but with irregular node densities this likelihood is no longer the same. However,
despite not dynamically adjusting its hop distance estimate (as done in DV-Hop), ANIML-Hop
still performs at least as well as DV-Hop in networks with irregular node densities.
3.4.6 In the Presence of Obstacles
Overall, our experimentation shows ANIML provides effective localization in the presence of
error-prone range estimates, irregular shapes and densities. However, in realistic environments,
any localization method must be effective even in the presence of obstacles. In our simulation ex-
periments, obstacles are incorporated by randomly placing RF opaque “walls” of length between
25 and 50 meters within uniform network topologies at a density of 16 obstacles per square kilo-
meter (translates to 4 obstacles in the smallest test scenario). Nodes obstructed by such obstacles
cannot receive each other’s communications.
35
0
20
40
60
80
100
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
In ac
cu ra
0
20
40
60
80
100
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
In ac
cu ra
Figure 3.9: Localization in Irregular Densities
Figure 3.10 shows the results of localization inaccuracy of ANIML in networks containing
“RF”-opaque obstacles. There is no comparisons to DV-Hop since the DV-Hop simulator did not
allow for the simulation of obstacles. The results show that obstacles do not affect the accuracy of
ANIML and ANIML-Abs. While ANIML-Hop does incur the effects of obstacles in the network
the results are only slightly worse than ANIML-Hop’s performance in uniform topologies. The
increase in inaccuracy in ANIML-Hop not seen in ANIML or ANIML-A