Next Article in Journal
Detection of Steel Fatigue Cracks with Strain Sensing Sheets Based on Large Area Electronics
Next Article in Special Issue
A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks
Previous Article in Journal
Hysteresis Analysis and Positioning Control for a Magnetic Shape Memory Actuator
Previous Article in Special Issue
Design of a Hybrid (Wired/Wireless) Acquisition Data System for Monitoring of Cultural Heritage Physical Parameters in Smart Cities
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Nonlinear Optimization-Based Device-Free Localization with Outlier Link Rejection

School of Automation & Electrical Engineering, University of Science and Technology Beijing, Beijing 100083, China
*
Author to whom correspondence should be addressed.
Sensors 2015, 15(4), 8072-8087; https://doi.org/10.3390/s150408072
Submission received: 5 February 2015 / Revised: 18 March 2015 / Accepted: 25 March 2015 / Published: 7 April 2015
(This article belongs to the Special Issue Sensors and Smart Cities)

Abstract

:
Device-free localization (DFL) is an emerging wireless technique for estimating the location of target that does not have any attached electronic device. It has found extensive use in Smart City applications such as healthcare at home and hospitals, location-based services at smart spaces, city emergency response and infrastructure security. In DFL, wireless devices are used as sensors that can sense the target by transmitting and receiving wireless signals collaboratively. Many DFL systems are implemented based on received signal strength (RSS) measurements and the location of the target is estimated by detecting the changes of the RSS measurements of the wireless links. Due to the uncertainty of the wireless channel, certain links may be seriously polluted and result in erroneous detection. In this paper, we propose a novel nonlinear optimization approach with outlier link rejection (NOOLR) for RSS-based DFL. It consists of three key strategies, including: (1) affected link identification by differential RSS detection; (2) outlier link rejection via geometrical positional relationship among links; (3) target location estimation by formulating and solving a nonlinear optimization problem. Experimental results demonstrate that NOOLR is robust to the fluctuation of the wireless signals with superior localization accuracy compared with the existing Radio Tomographic Imaging (RTI) approach.

1. Introduction

Wireless localization has found extensive applications in Smart Cities in areas such as healthcare at home and hospitals (e.g., for location detection and behavior analysis of patients and old people), location-based services in smart spaces (airports, shopping centres, touristic sites etc.), emergency response (e.g., location detection of firemen in a building on fire), comfortable and energy saving designs for indoor environment monitoring and control, as well as intrusion detection, localization and tracking in infrastructure security.
Various wireless localization techniques have been developed, e.g., based on GPS [1], ultrasound [2], infrared [3], and radio-frequency (RF) [4]. In such techniques, the target must be equipped with an electronic device. Recently device-free localization (DFL), generally based on wireless network RF signal measurements, where the target does not need to have any attached electronic device, has attracted tremendous interest [5]. In DFL, wireless devices are used as sensors that sense the target by transmitting and receiving wireless signals collaboratively, and the target location is estimated by detecting and measuring the RF signal variations induced by the target.
DFL can be implemented in indoor and outdoor environments and remains a challenging problem, mainly due to the uncertain and dynamic wireless propagation environment that suffers from non-line-of-sight, multi-path, and fading phenomena [6,7,8,9,10]. Some links, even without the presence of the targets, may be found to display large received signal strength (RSS) changes and cause erroneous target detection. If such links are used in the location estimation, the accuracy of the localization algorithm will be degraded significantly. However, most existing DFL approaches, such as the Radio Tomographic Imaging (RTI) approach [7,8,9] and the geometrical approach [11,12], do not consider such links explicitly. Although [13] considers the outlier link rejection, only the links without intersections with all the other links are rejected and this may still keep wrong links in many situations.
In this paper, we consider the DFL problem for a single target and will propose a novel optimization approach with outlier link rejection (NOOLR) for DFL by a clustering [14]-based outlier link rejection strategy, followed by formulating and solving a nonlinear optimization problem. In summary, the contributions of this paper are three-fold:
(1)
We present a clustering-based technique to reject the outlier links to reduce the effect of large wireless noise on the DFL.
(2)
We formulate the DFL problem with a nonlinear optimization model and solve it by the convex optimization approach.
(3)
We evaluate NOOLR based on the experimental data provided by the University of Utah, and compare it with the RTI model [7].
The paper is organized as follows: the related work is introduced in Section 2. A motivating application scenario for elder care is described in Section 3. The details of the proposed approach are addressed in Section 4. Experimental results are reported in Section 5 and finally, conclusions and future work are given in Section 6.

2. Related Work

A number of DFL approaches have been proposed, including fingerprinting approaches based on differential RSS measurements, geometric approach, RTI approach, compressive sensing approach, and Bayesian approach.
Youssef et al., proposed a fingerprinting approach for Wi-Fi-based DFL [15,16]. A radio map is built in the offline phase by recording the differential RSS measurements of links when the target is located at reference points with known locations. In the online phase, the location of the target is estimated by comparing the measured differential RSS signals of the links with the offline radio map. Although the performance of this approach is acceptable, a tedious calibration procedure is required. It is also challenging to efficiently build the radio map.
As a typical geometric approach, Zhang et al., proposed a signal dynamics model to obtain the property of the changing RSS behaviors in WSNs, and three tracking algorithms for the midpoint, the intersection, and the best-cover geometric calculations. Although the best-cover algorithm can achieve high accuracy, it also needs a tedious calibration step [11,12].
Wilson and Patwari proposed the RTI approach based on differential RSS link measurements [7,8,9] between the measured RSS measurements of links and the RSS measurements of links without the target via the reconstruction of the tomography image for the locations of the target, and formulated the DFL problem as a linear ill-posed inverse problem, then solved it by the regularization method. Kaltiokallio et al., presented an on-line recalibration method that allows the system to adapt to the changes in the radio environment [17].
As compressive sensing can deal with the space-domain sparse information, which is a specific feature of the RTI approach for DFL, Wang et al., applied compressive sensing to tackle the ill-posed inverse problem in signal reconstruction in DFL [18,19,20,21].
To reduce the complex computation overhead in solving the ill-posed inverse problem, a Bayesian grid approach (BGA) is proposed in [22] by utilizing the observation information of the shadowed links, the prior information of the previous estimations, and the constraint information of the non-shadowed links. Savazzi et al., proposed a joint model based on the theory of diffraction to deal with the average path-loss and the fluctuations of the RSS induced by the moving target, and derive a novel stochastic Bayesian model for the real-time estimation of the target location [23]. Overall the above-mentioned approaches do not consider the negative effects of the outlier links for the localization, and the localization accuracy is limited.

3. Motivating Application Scenario in Smart Aging

With the constantly increasing aging population with cognitive deficiencies, insuring the autonomy of the elderly at home has become a priority for assisting people and improving their quality of life. The ability to monitor the elder’s activities and provide timely assistance depends highly on the location information for the elder inside the home. Referring to Figure 1 as a motivating scenario, based on the location information, the elder person’s activities can be monitored. For example, he/she can be advised to do more movement exercises if needed. If abnormalities are detected (e.g., suddenly falling down, staying in bed or in toilet for an unusually long time), alarms can be triggered to inform caregivers and family members, while providing the location information.
The elder can be localized by traditional technologies such as cameras, RFID, WiFi, or some other wearable devices. However these may introduce heavy burdens for the elders to carry such devices, and cause privacy and comfort problems. Therefore it is desirable for the elder people not to be equipped with any electronic device, and implement DFL for the localization demands.
Figure 1. DFL application scenario for aging at home.
Figure 1. DFL application scenario for aging at home.
Sensors 15 08072 g001

4. The Details of the Proposed Approach

In this section, we give the detailed description of NOOLR for DFL. It consists of three key strategies implemented sequentially, including the affected link identification by differential RSS detection, outlier link rejection via positional relationships of links, as well as the target location estimation by formulating and solving a nonlinear optimization problem.

4.1. Affected Link Identification

Suppose there are N wireless devices used as transmitters or receivers for detecting the target. If wireless device i and wireless device j can communicate with each other directly, then we denote the link by L n ( i , j ) and L n   for simplicity, with n being the ID of the link. We assume the total number of links in the system is P .
Let X i ( x i , y i ) denote the location of the wireless device i in the Cartesian coordinates, R S S n 0   and R S S 0 = { R S S 1 0 ,   R S S 2 0 , ,   R S S P 0 } denote the RSS measurements of link n and the RSS measurements of all links respectively when the monitoring area is vacant. Also let R S S n and R S S = { R S S 1 ,   R S S 2 , ,   R S S P } denote the RSS measurements of link n and the RSS measurements of all links respectively when the target enters the monitoring area.
The difference between the RSS of the link n with the target and without the target in the monitoring area is:
R S S n =   R S S n   R S S n 0
The main contribution of the R S S n of link n is due to the presence of the target and the noise. We call the links with large differential RSS induced by the target as the affected links.
Finding the affected links is essential for the localization algorithms. In the offline phase, the radio map can be built by collecting the RSS measurements of links, i.e., R S S 0 = { R S S 1 0 ,   R S S 2 0 , ,   RSS P 0 } . RSS can be obtained and the differential RSSs of links ( R S S = { R S S 1 ,   R S S 2 ,   ,   R S S P }   ) can be calculated. A negative scalar threshold γ is used to identify whether a link is an affected link and whether the target is present in the monitoring area [24]. Normally if the link n is affected by the target, R S S n will be less than the threshold γ [25]. The state of the link n can be calculated by:
s n = { 1 ,   i f   R S S n γ   0 ,   i f   R S S n γ    
If s n = 1 , then link n will be considered as the affected link. The states of all links s = { s 1 ,  s 2 ,   , s P } can be obtained according to Equation (2).

4.2. Outlier Link Rejection

Due to the uncertain wireless propagation environment, some links associated with large noise but that are far away from the target may be incorrectly identified as the affected links, and significantly degrade the accuracy of the localization algorithms. They are considered as the outlier links in this paper and shall be rejected in the localization approach. As shown in Figure 2, the affected link that can detect the target shall be around the target and near to each other, and an outlier link is separated and far away from those affected links around the target.
Figure 2. Affected links and outlier links.
Figure 2. Affected links and outlier links.
Sensors 15 08072 g002
In NOOLR, the outlier links are identified and rejected by clustering the identified affected links by transforming the positional relationship of links into one-dimensional distance information. The affected links can be obtained from the states of links s = { s 1 ,   s 2 ,   , s P } . We assume the number of affected links is m. The number of intersections of the affected links is less than or equal to m ( m 1 ) / 2 . We assume the number of intersections is R. Because the coordinates of wireless devices are known, the coordinates of intersections can be calculated. Here we use X i , j ( x i , j , y i , j ) to denote the coordinates of the intersection of link i and link j .
Definition 1. The center of the intersections ( x c ,   y c ) is the average coordinates of the intersections of the affected links, i.e.:
{ x c =   i = 1 P j = 1 P s i s j x i , j R y c =   i = 1 P j = 1 P s i s j y i , j R
The geometrical positional relationship of links is transformed to the distance values d i s = { d i s 1 , d i s 2 , , d i s m } where d i s n denotes the distance between the affected link n and the center of the intersections ( x c ,   y c ). The distance between the outlier link and the center of the intersections is always greater than the distance between the affected links and the center of the intersections. The variance of the distance values is used to detect the outlier links, and the variance of the distance values V d i s is:
V d i s = i = 1 m ( d i s i d i s ) 2 m 1
where d i s is the average value of d i s . A threshold of variance ( δ ) is selected empirically to detect the outlier links. Then the outlier state of links can be calculated as:
o = { 1 ,     V d i s δ 0 ,     o t h e r w i s e
If o = 0 , we consider that there exist no outlier links in the affected links. If o = 1 , the outlier links are detected and shall be rejected from the affected links. The center of the intersections and d i s are mapped to 1-dimension space with the center of the intersections as the origin, as illustrated in Figure 3. Clustering will be performed to identify and reject the outlier links as described below.
Figure 3. Distribution of the mapped distances.
Figure 3. Distribution of the mapped distances.
Sensors 15 08072 g003
Firstly, the distances associated with the links d i s = { d i s 1 , d i s 2 , , d i s m } are considered as a data set { x 1 , x 2 ,   , x m } and clustered by the K-means algorithm [26]. Two clusters are generated for the affected links and the outlier links, respectively, and their corresponding centroids are calculated. Then, each data in the data set is clustered to the nearest centroid, and the centroids will be updated by recalculating the average data in each cluster [26,27]. With the new centroids, a new loop is formed and each data is associated to the nearest new centroid. Finally, the loop stops until the centroids are not changed any more. This approach aims at minimizing an objective function described as:
J =   j = 1 2 i = 1 m x i j c j 2
where x i j is the associated data in the data set, and c j is the centroid. Because the distance between the center of the intersections and an outlier link is larger than the distance between the center of the intersections and the affected link, the centroid with the larger coordinate should belong to the outlier links. Finally, the cluster with the larger centroid is associated with the set of the outlier links. The process that detect and reject outlier links is summarized in Algorithm 1.
Algorithm 1 Detection and rejection of outlier links
  • Get the R S S t according to Equation (1)
  • Get the state of links according to Equation (2)
  • If there are the effected links
  • Calculate the coordinates of the intersections
  • Calculate the center of the intersections ( x c ,  y c ) according to Equation (3)
  • Get the variance of the distances according to Equation (4)
  • Estimate the outlier state of links according to Equation (5)
  • If there are the outlier links (outlier state is 1)
  • Cluster the affected links use K-means algorithm based on the distance values
    d i s = { d i s 1 , d i s 2 , , d i s m }
  • The links in the cluster with the larger centroid coordinate is the outlier links,
  • Eliminate the outlier links.
  • End
  • End

4.3. Nonlinear Optimization for Location Estimation

Definition 2: The projection Q i n from the position i to link n is the point on link L n which is closest to position i , and the distance from position i to link n is the distance D i n   between position i and the projection Q i n . If X i   is on link L n , the projection is itself and D i n =   0 , otherwise the distance D i n can be calculated by:
D i n ( x 0 ,   y 0 ) = min X j ϵ L n dis ( X i ,  X j )
where X i is the coordinate of the position i . For X i and X j with coordinates ( x i , y i ) and ( x j , y j ) , their distance d i s ( X i ,   X j ) is given by:
d i s ( X i ,   X j ) = ( x i x j ) 2 + ( y i y j ) 2
By the clustering algorithm mentioned earlier, the affected links with outlier link rejection can be obtained. In this section, we consider the affected links as the affected links without outlier links, and the number of affected links is M.
The main contribution for the RSS difference of an affected link is caused by the target. Thus, the target must be nearby the affected links or on the affected links. As shown in Figure 4, the affected links intersect with each other, and the target location shall be inside the red circle. We assume the target location is X 0 ( x 0 ,   y 0 ) . The projection Q 0 n from target location X 0 ( x 0 , y 0 ) to the affected link L n ( L n s a l s ) and the distance D 0 n can be obtained. The DFL problem can be translated into an optimization problem according to the relationship between the target location and the affected links. The point with the minimum sum of distance to the affected links is used as the estimation of the target location. Mathematically, the optimal target location X 0 * ( x 0 ,   *   y 0 ,   * ) is obtained by:
X 0 * ( x 0 ,   * y 0 ,   * ) = a r g m i n ( x 0 ,   y 0 ) i = 1 M D 0 i ( x 0 ,   y 0 )
Figure 4. Possible location area of the target.
Figure 4. Possible location area of the target.
Sensors 15 08072 g004
For a given affected link i of the transmitter and receiver with known coordinates, assume its associated linear equation is expressed by:
k i x + c i y + d i = 0
Then the distance D 0 i can be calculated according to Equations (7) and (9) by:
D 0 i ( x 0 ,   y 0 ) =   | k i x 0 + c i y 0 + d i | k i 2 + c i 2 2
Then we can re-write Equation (8) as:
X 0 * ( x 0 ,   * y 0 ,   * ) = a r g m i n ( x 0 ,   y 0 ) i = 1 M | k i x 0 + c i y 0 + d i | k i 2 + c i 2 2
As the above nonlinear optimization problem is difficult to solve. We replace D 0 i   with ( D 0 i ) 2 and re-formulate DFL problem as the following nonlinear optimization problem:
X 0 * ( x 0 ,   * y 0 ,   * ) = a r g m i n ( x 0 ,   y 0 ) i = 1 M ( k i x 0 + c i y 0 + d i ) 2 k i 2 + c i 2
Now we define some notations in Table 1 and give two important theorems.
Table 1. The notations.
Table 1. The notations.
NotationsDescription
d o m   f The domain of function f
f The first-order partial derivatives of x
f x The Hessian matrix of function f
det 2 f The value of Hessian matrix 2 f
Theorem 1 [28]: If the function f is twice differentiable, that is, its Hessian or second derivative 2 f exists at each point in d o m   f , which is open, then f is convex if and only if dom f is convex and its Hessian is positive semidefinite: for all x d o m   f :
2 f 0
Theorem 2 [28]: For the unconstrained optimization:
m i n i m i z e   f ( x )
where f is convex and differentiable, there exists an optimal point x * , and the necessary and sufficient condition for a point x * to be optimal is:
f (   x * ) = 0
Denote the following nonlinear function:
f ( x 0 ,   y 0 ) = i = 1 M ( k i x 0 + c i y 0 + d i ) 2 k i 2 + c i 2
In the DFL problem, the dom  f is the monitoring area and we assume it is convex in this paper. The Hessian matrix of f is:
2 f =   ( i = 1 M 2 k i 2 k i 2 + c i 2 i = 1 M 2 k i c i k i 2 + c i 2 i = 1 M 2 k i c i k i 2 + c i 2 i = 1 M 2 c i 2 k i 2 + c i 2 )
It is obvious that   i = 1 M 2 k i 2 k i 2 + c i 2 0 , and d e t 2 f / 4 =   i = 1 M k i 2 k i 2 + c i 2 ×   i = 1 M c i 2 k i 2 + c i 2   ( i = 1 M k i c i k i 2 + c i 2 ) 2 . We use the notations   A i 2 and B i 2   to stand for k i 2 k i 2 + c i 2 and c i 2 k i 2 + c i 2 respectively, then k i c i k i 2 + c i 2 can be represented as A i B i and we have:
d e t 2 f / 4 =   i = 1 M A i 2 × i = 1 M B i 2 ( i = 1 M A i B i ) 2
The equation by factorization can be written as:
d e t 2 f / 4 = i = 1 M j = 1 M ( A i B i A j B j ) 2
and d e t 2 f / 4 0 .
Because i = 1 M 2 k i 2 k i 2 + c i 2 0 and d e t 2 f 0 , the Hessian matrix 2 f is positive semidefinite, and dom   f   is convex, we know that f is convex according to Theorem 1.
As f is convex and differentiable, according to Theorem 2, the optimal point X 0 * ( x 0 ,   * y 0 ,   * ) for problem Equation (12) exists and can be calculated by:
{ f x = 0 f y = 0
where f x =   i = 1 M 2 k i ( k i x 0 + c i y 0 + d i ) k i 2 + c i 2 ,   f y =   i = 1 M 2 c i ( k i x 0 + c i y 0 + d i ) k i 2 + c i 2 .
The optimal point X 0 * ( x 0 ,   * y 0 ,   * )   of Equations (17) is the estimation of the target location. Now we give the complexity analysis for NOOLR. Assume that the number of loops in the K-means algorithm is   q , and the number of intersections of the initial affected links is R as mentioned earlier, the computational complexity of Algorithm 1 is O ( q R ) , thus according to Equation (17), the computational complexity of the nonlinear optimization based NOOLR approach is O ( q R ) .

5. Experimental Evaluation

5.1. Experimental Setup

To evaluate the performance of the nonlinear optimization model for the DFL, we performed some experiments based on the experimental data that can be acquired [29] from the SPAN Lab of the University of Utah (Salt Lake City, UT, USA). There are 28 wireless devices and a Crossbow base station device, and the total number of links is 378. Each device operates in the 2.4 GHZ frequency band, and uses the IEEE 802.15.4 standard for communication. The base station node listens to all network traffic, then feeds the data to a laptop computer via a USB port for the processing of NOOLR. The RSS of each link is an averaged value of the RSS measurements from bi-directional transmissions. Each wireless device is placed three feet apart along the perimeter of a 21 × 21 feet square, surrounding a total area of 441 square feet, and is placed on a stand at three feet off the ground. In the experiment, the target is a person with the height 1.85 m and the weight 88 kg. As shown in Figure 5, 30 testing locations are selected to compare the nonlinear optimization model for the DFL with RTI reconstruction [7].
In this experiment, the system is calibrated by collecting RSS measurements while the network is vacant from targets. The time for calibration is 30 s. The time for data initialization which processes the calibration data is 2.0759 seconds. We perform experiments to test the running time for NOOLR. The running time t t o t a l _ t i m e contains two portions, including the time t d a t a _ t i m e for processing the real time data and the time t N O O L R _ t i m e for running NOOLR.
Figure 5. The experimental setup.
Figure 5. The experimental setup.
Sensors 15 08072 g005
We repeat the trials for 30 times, and the statistic results are summarized in Table 2.
Table 2. Running time for NOOLR in the experiment.
Table 2. Running time for NOOLR in the experiment.
DescriptionMean(s)Worst(s)Best(s)
t d a t a _ t i m e 1.54201.60511.4917
t N O O L R _ t i m e 0.02040.12440.0052
t t o t a l _ t i m e 1.56241.69731.5130
NOOLR can achieve averaged, worst and best times of 0.0204 s, 0.1244 s and 0.0052 s, which is very low, the average, the worst and the best times for the total running time is 1.5624 s, 1.6973 s and 1.5130 s, respectively, which is acceptable for target location estimation.
In RTI, the monitored area is divided into voxels, aggregately all voxels contribute to the RSS changes of each transmitter-receiver link in the network. The weights of all voxels are computed according to their impacts on all the links, and the voxel with the minimum weight is considered as the location estimation of the target. The RTI reconstruction for obtaining the weights of the voxels uses H1 regularization with the parameters listed in Table 3.
Table 3. The parameters of RTI.
Table 3. The parameters of RTI.
ParameterValueDescription
p 0.5Pixel width(feet)
E0.01Width of weighting ellipse (feet)
A5Regularization parameter
The NOOLR parameters are listed in Table 4. As the analytical relationship between the parameters and the system performance of NOOLR is not clear, we use the trial and error method to determine the parameters.
Table 4. The parameters of NOOLR.
Table 4. The parameters of NOOLR.
ParameterValueDescription
γ −6The threshold for affected link detection
δ 0.5The threshold for the variance
The Euler distance between the “true” location of the target and the estimated location of the target is used as the localization error. The localization errors against different thresholds γ are shown in Figure 6 and Figure 7 when the threshold for the variance δ is 0.5. If γ < 8   dB, there may be not enough affected links for localization, and the average error of the algorithm increases sharply.
Figure 6. The errors when γ changes.
Figure 6. The errors when γ changes.
Sensors 15 08072 g006
Figure 7. Average errors for different γ
Figure 7. Average errors for different γ
Sensors 15 08072 g007
Meanwhile, from Figure 7, due to the uncertain wireless propagation environment, if γ 5.5   dB, some links with large noise are incorrectly identified as the affected links, the average error of localization will also increase. The localization errors against different thresholds of variance δ are shown in Figure 8 when the threshold γ is −6. If δ < 0.3 , the outlier state of links o t may be incorrectly detected, and the error of localization increases. Nevertheless, if δ 0.7 , an outlier link may be missed, and the error of localization is increased.
Figure 8. Average errors for the different thresholds of variance (δ).
Figure 8. Average errors for the different thresholds of variance (δ).
Sensors 15 08072 g008

5.2. Performance Comparison

To evaluate the performance of NOOLR, we compare it with the scheme of nonlinear optimization without outlier link rejection (NOwoOLR), and RTI. The detailed comparison results for 30 testing locations are shown in Figure 9 and Table 5.
Figure 9. Performance comparison of NOOLR, NOwoOLR, and RTI.
Figure 9. Performance comparison of NOOLR, NOwoOLR, and RTI.
Sensors 15 08072 g009
Table 5. Performance comparison of NOOLR , NOwoOLR, and RTI.
Table 5. Performance comparison of NOOLR , NOwoOLR, and RTI.
AlgorithmMean (Feet)VarianceWorst (Feet)Best (Feet)Median (Feet)
NOOLR0.70300.12101.68610.15000.6554
NOwoOLR1.95712.10345.04930.31701.4104
RTI0.82440.42623.88910.35360.7905
The mean localization error and the worst localization error of NOOLR are reduced by 10.6%, 50.2%, respectively, from RTI, which shows a significant improvement. The best localization error of NOOLR can achieve is 0.1197 feet. Statistically the performance of NOOLR is the best, followed by RTI and NOwoOLR, this is because RTI uses all the links, NOwoOLR uses the affected links, and NOOLR uses the affected links with outlier link rejection to calculate the target locations, and the different impacts of the noises and outlier links are reflected in the localization accuracy. The variance of the localization errors reveals the robustness of the DFL systems. The smaller variance of NOOLR illustrates that NOOLR is more robust and reliable. It is obvious that the proposed nonlinear optimization model has better performance than RTI.
Meanwhile it is obvious that NOwoOLR has the worst performance. Outlier links are not eliminated in NOwoOLR. RTI utilizes the RSS measurements of all links at time t. The outlier links can degrade the accuracy of RTI. After the outlier links are rejected, it is beneficial for the localization algorithms using the nonlinear optimization model.

6. Conclusions

This paper proposes a novel nonlinear optimization based approach for DFL called NOOLR as a valuable localization approach for Smart City applications. To decrease the negative impacts of the large noise of the wireless links, outlier link detection and rejection are suggested by considering the geometrical relationship of links and utilizing a the clustering algorithm. A nonlinear optimization model is formulated for the location estimation to minimize the distance of the target location to the affected links. Experimental results show the superior localization performance of NOOLR against RTI. As future work, DFL for multiple targets and a case Smart City study will be considered as important problems to be solved.

Author Contributions

Wendong Xiao supervised the work and revised the paper. Biao Song proposed the NOOLR algorithm and formulated the optimization problem. Xiting Yu and Peiyuan Chen helped in the experimental comparisons.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Jan, S.-S.; Sun, C.-C. Signal Existence Verification (SEV) for GPS Low Received Power Signal Detection Using the Time-Frequency Approach. Sensors 2010, 10, 4717–4738. [Google Scholar] [CrossRef] [PubMed]
  2. Xiao, W.; Wu, J.; Shue, L.; Li, Y.; Xie, L. A Prototype Ultrasonic Sensor Network for Tracking of Moving Targets. In Proceedings of the 2006 IEEE Conference on Industrial Electronics and Applications, Singapore, Singapore, 24–26 May 2006; pp. 1511–1516.
  3. Want, R.; Hopper, A.; Falco, V.; Gibbons, J. The Active Badge Location System. ACM Trans. Inf. Syst. 1992, 10, 91–102. [Google Scholar] [CrossRef]
  4. Chen, Z.; Zou, H.; Jiang, H.; Zhu, Q.; Soh, Y.C.; Xie, L. Fusion of WiFi, Smartphone Sensors and Landmarks Using the Kalman Filter for Indoor Localization. Sensors 2015, 15, 715–732. [Google Scholar] [CrossRef] [PubMed]
  5. Youssef, M.; Mah, M.; Agrawala, A. Challenges: Device-Free Passive Localization for Wireless Environments. In Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking, Montreal, QC, Canada, 9–14 September 2007; pp. 222–229.
  6. Kafrawy, K.E.; Youssef, M.; Keyi, A.E. Impact of the Human Motion on the Variance of the Received Signal Strength of Wireless Links. In Proceedings of the 22nd IEEE Symposium on Personal, Indoor, Mobile and Radio Communications, Toronto, ON, Canada, 11–14 September 2011; pp. 1208–1212.
  7. Wilson, J.; Patwari, N. Radio Tomographic Imaging with Wireless Networks. IEEE Trans. Mob. Comput. 2010, 9, 621–632. [Google Scholar] [CrossRef]
  8. Wilson, J.; Patwari, N. See Through Walls: Motion Tracking Using Variance-Based Radio Tomography Networks. IEEE Trans. Mob. Comput. 2011, 10, 612–621. [Google Scholar] [CrossRef]
  9. Wilson, J.; Patwari, N. A Fade Level Skew-Laplace Signal Strength Model for Device-Free Localization with Wireless Networks. IEEE Trans. Mob. Comput. 2012, 11, 947–958. [Google Scholar] [CrossRef]
  10. Zhao, Y.; Patwari, N.; Phillips, J.M. Radio Tomographic Imaging and Tracking of Stationary and Moving People via Kernel Distance. In Proceedings of the 12th ACM/IEEE Conference on Information Processing in Sensor Networks, Philadelphia, PA, USA, 8–11 April 2013; pp. 229–240.
  11. Zhang, D.; Ma, J.; Chen, Q.; Ni, L.M. An RF-Based System for Tracking Transceiver-Free Objects. In Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, White Plains, NY, USA, 19–23 March 2007; pp. 135–144.
  12. Zhang, D.; Liu, Y.H.; Guo, X.N.; Ni, L.M. Fine-Grained Localization for Multiple Transceiver-Free Objects by using RF-Based Technologies. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 1464–1475. [Google Scholar] [CrossRef]
  13. Wang, J.; Gao, Q.H.; Yu, Y.; Wu, L.F.; Wang, H.Y. Robust Device-Free Wireless Localization Based on Differential RSS Measurements. IEEE Trans. Ind. Electron. 2013, 60, 5943–5952. [Google Scholar] [CrossRef]
  14. Queen, J.M. Some Methods for Classification and Analysis of Multivariate Observations. In Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, San Francisco, CA, USA, 1967; pp. 281–297.
  15. Sabek, I.; Youssef, M. Multi-Entity Device-Free WLAN localization. In Proceedings of the IEEE Global Communications Conference, Anaheim, CA, USA, 3–7 December 2012; pp. 2018–2023.
  16. Seifieldin, M.; Saeed, A.; Kosba, A.E.; Keyi, A.E.; Youssef, M. Nuzzer: A Large-Scale Device-Free Passive Localization System for Wireless Environments. IEEE Trans. Mob. Comput. 2013, 12, 1321–1334. [Google Scholar] [CrossRef]
  17. Kaltiokallio, O.; Bocca, M.; Patwari, N. Follow @grandma: Long-Term Device-Free Localization for Residential Monitoring. In Proceedings of the 37th IEEE Conference on Local Computer Networks, Clearwater, FL, USA, 22–25 October 2012; pp. 991–998.
  18. Wang, J.; Gao, Q.; Zhang, X.; Wang, H. Device-Free Localization with Wireless Networks based on Compressive Sensing. IET Commun. 2012, 6, 2395–2403. [Google Scholar] [CrossRef]
  19. Wang, J.; Gao, Q.H.; Wang, H.Y.; Yu, Y.; Jin, M.L. Time-of-Flight-Based Radio Tomography for Device Free Localization. IEEE Trans. Wirel. Commun. 2013, 12, 2355–2365. [Google Scholar] [CrossRef]
  20. Wang, J.; Fang, D.Y.; Chen, X.J.; Yang, Z.; Xing, T.Z.; Cai, L. LCS: Compressive Sensing Based Device-Free Localization for Multiple Targets in Sensor Networks. In Proceedings of the 32nd IEEE International Conference on Computer Communications, Turin, Italy, 14–19 April 2013; pp. 145–149.
  21. Wang, J.; Gao, Q.; Wang, H.Y.; Cheng, P.; Xin, K. Device-Free Localization with Multi-Dimensional Wireless Link Information. IEEE Trans. Veh. Technol. 2014, 64, 356–366. [Google Scholar] [CrossRef]
  22. Wang, J.; Gao, Q.; Cheng, P.; Wu, L.; Xin, K.; Wang, H.Y. Lightweight Robust Device-Free Localization in Wireless Networks. IEEE Trans. Ind. Electron. 2014, 61, 5681–5689. [Google Scholar] [CrossRef]
  23. Savazzi, S.; Nicoli, M.; Carminati, F.; Riva, M. A Bayesian Approach to Device-Free Localization: Modeling and Experimental Assessment. IEEE J. Sel. Top. Signal Process. 2014, 8, 16–29. [Google Scholar] [CrossRef]
  24. Saeed, A.; Kosba, A.E.; Youssef, M. Ichnaea: A Low-Overhead Robust WLAN Device-Free Passive Localization System. IEEE J. Sel. Top. Signal Process. 2014, 8, 5–15. [Google Scholar] [CrossRef]
  25. Zheng, X.Y.; Yang, J.; Chen, Y.Y.; Gan, Y. Adaptive Device-Free Passive Localization Coping with Dynamic Target Speed. In Proceedings of the 32nd IEEE International Conference on Computer Communications, Turin, Italy, 14–19 April 2013; pp. 485–489.
  26. Jain, A.; Rajavat, A.; Bhartiya, R. Design, Analysis and Implementation of Modified K-Mean Algorithm for Large Data-Set to Increase Scalability and Efficiency. In Proceedings of the 2012 International Conference on Computational Intelligence and Communication Networks, Mathura, India, 26–28 November 2012; pp. 627–631.
  27. Guha, S.; Rastogi, R.; Shim, K. CURE: An Efficient Clustering Algorithm for Large Databases. In Proceedings of the 1998 ACM SIGMOD International Conference on Management of Data, Seattle, Washington, DC, USA, 2–4 June 1998; pp. 73–84.
  28. Boyd, S.; Vandenberghe, L. Convex Optimization; Cambridge University Press: Cambridge, UK, 2004. [Google Scholar]
  29. Sensing and Processing Across Networks at Utah. Available online: http://span.ece.utah.edu/rti-data-set (accessed on 27 March 2015).

Share and Cite

MDPI and ACS Style

Xiao, W.; Song, B.; Yu, X.; Chen, P. Nonlinear Optimization-Based Device-Free Localization with Outlier Link Rejection. Sensors 2015, 15, 8072-8087. https://doi.org/10.3390/s150408072

AMA Style

Xiao W, Song B, Yu X, Chen P. Nonlinear Optimization-Based Device-Free Localization with Outlier Link Rejection. Sensors. 2015; 15(4):8072-8087. https://doi.org/10.3390/s150408072

Chicago/Turabian Style

Xiao, Wendong, Biao Song, Xiting Yu, and Peiyuan Chen. 2015. "Nonlinear Optimization-Based Device-Free Localization with Outlier Link Rejection" Sensors 15, no. 4: 8072-8087. https://doi.org/10.3390/s150408072

Article Metrics

Back to TopTop