Next Article in Journal
Assessing the Energy-Saving Potential of a Dish-Stirling Con-Centrator Integrated Into Energy Plants in the Tertiary Sector
Next Article in Special Issue
Machine Learning-Based Cooperative Spectrum Sensing in Dynamic Segmentation Enabled Cognitive Radio Vehicular Network
Previous Article in Journal
Analysis of the Inner Fluid-Dynamics of Scroll Compressors and Comparison between CFD Numerical and Modelling Approaches
Previous Article in Special Issue
Off-Grid DoA Estimation via Two-Stage Cascaded Neural Network
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Theoretical Analysis of Mobility Detection in Connectivity-Based Localization for Short-Range Networks

1
KPS Technology Team, Korea Aerospace Research Institute, Daejeon 34133, Korea
2
Korea Railroad Research Institute, Uiwang 16105, Korea
3
Department of Electronics and Computer Engineering, Hanyang University, Seoul 04763, Korea
*
Authors to whom correspondence should be addressed.
Energies 2021, 14(4), 1162; https://doi.org/10.3390/en14041162
Submission received: 7 December 2020 / Revised: 31 January 2021 / Accepted: 18 February 2021 / Published: 22 February 2021
(This article belongs to the Special Issue Designs and Algorithms of Localization in Vehicular Networks)

Abstract

:
This paper presents a theoretical analysis of mobility detection in connectivity-based localization, which exploits connectivity information as range measurements to anchors at a known location, to investigate how well and how precise mobility can be detected with connectivity in short-range networks. We derive mobility detection, miss detection, and false alarm probabilities in terms of a mobility detection threshold, defined as the minimum distance to detect the mobility, under the shadow fading channel and arbitrary mobility models to take into account practical and general scenarios. Based on the derivations, we address the threshold determination with the criteria in the sense of the minimum average error from miss detection and false alarm. Numerical and simulation evaluations are performed to verify our theoretical derivations, to show that increasing anchor numbers can improve the mobility detection probability with a smaller detection threshold, and that the probabilities are bounded by the weights of miss detection and false alarm. This work is the first attempt at addressing the performance of mobility detection using connectivity, and it can be utilized as a baseline for connectivity-based mobility tracking.

1. Introduction

Connectivity-based localization has been highlighted for wireless networks with short-range communications (e.g., WiFi, Bluetooth, and Zigbee) where explicit range measurements such as time-of-arrival, time-difference-of-arrival, and angle-of-arrival are not available due to systematic and/or cost reasons or where the range measurements are likely to be severely corrupted due to environmental reasons [1]. The importance of connectivity-based localization is also increasing with the fast-growing IoT (Internet-of-Things) applications based on device-to-device communication and mesh networking capabilities [2]. Since connectivity is an implicit (on/off) range measurement that tells if one is placed within the communication range of another, connectivity-based localization is known to provide a coarse-grained location. Nevertheless, it is still effective and fascinating for many applications such as environment monitoring, patient monitoring, and theft surveillance that are satisfied with space-level accuracy (depending on the communication range and scenarios, space may correspond to room, building, zone, block, or others), while having strict requirements for simple implementations (the demand on simplicity in implementation generally arises from the limitations on computation power and processing capabilities of devices as well as overall cost) and robustness against non-predictable channel variations. In addition, connectivity-based localization can be utilized to complement range-based localization for reducing the search region and convergence time (i.e., time-to-first-fix) [3,4], which are critical factors for real implementations.
Pioneering efforts focused on the localization problem in static wireless sensor networks, targeting environment monitoring applications where none of the nodes including blueanchors, which are placed at perfectly known locations and act as references for node localization, are moving once deployed. Routers, also referred to as access points in a more general sense, typically play the role of anchor in WiFi networks, while special nodes acting as anchors are called as beacons in Bluetooth and Zigbee. The terms are interchangeably used with seed nodes in the field of wireless sensor networks. The most straightforward approach [5] to the static localization problem is to provide the centroid of directly heard (seen) anchors, which are referred to as one-hop anchors. However, it is well-known that the centroid has low accuracy and low availability. It is worth noting that there is a trade-off between accuracy and availability since accuracy is inversely proportional to and availability is proportional to the transmission ranges of the anchors. To overcome the drawbacks of the centroid, Niculescu and Nath proposed the Distance Vector-Hop (DV-Hop) algorithm [6] applying a multihop fashion and multilateration where the distance to each anchor is computed as the product of the hop counts to the anchor and the average distance per hop, which is the ratio of the sums of distances and hop counts between the anchors. This is feasible in isotropic networks where the shortest path of any node pair forms a linear shape, but fragile in practice due to the network anisotropy (e.g., non-uniform node deployments, irregular radio propagation) [2,7]. Many modifications of the DV-Hop algorithm have been made to deal with the anisotropy issues by deriving new average distances per hop [8,9,10,11,12,13,14], by refining the distance [7,9,15,16] and location estimates [14,17,18,19], and/or by selecting reliable anchors [10,20,21,22] with understanding of the path and topology properties. Further details are available in [7,23,24].
As a variety of mobile applications have been introduced, mobility (location) tracking has become more challenging. To resolve the connectivity-based mobility (location) tracking problem, Hu and Evans [25] proposed a Monte Carlo localization (MCL) algorithm using random particles. More specifically, the MCL algorithm randomly deploys particles within a circle centered at the previous location estimate with a radius of the maximum distance movable in a discrete unit time and computes the centroid of those valid particles that are placed within the coverage of two-hop anchors under the unit disk graph (UDG) model [26], which is an ideal channel model not taking into account any uncertainties during propagation. In [27], the concept of building a bounding box was adopted to reduce the computational complexity from the particles that are filtered out by the anchors and not used for tracking, and further modifications were made to narrow down the bounding box for achieving higher computational efficiency by imposing more constraints from the information of one/two-hop anchors [28,29,30,31], neighboring nodes [28,30], historical anchors [32,33], and/or historical location estimates [31]. It is obvious that as the dimension of the constraints increases, a smaller box is drawn and results in improvement in not only computational efficiency, but also tracking accuracy. However, they all have missed one important point: that the underlying assumption on the maximum movable distance can adversely affect the performance, and the worst case occurs when a node is not moving. To handle this issue, it is necessary to determine whether a node has moved or not, which is referred to as the mobility detection problem in this paper.
Theoretical studies, of which results serve as baselines for designing localization systems in mobile scenarios, have been also made to measure lower bounds on localization errors caused by movements that cannot be detected with connectivity information [34,35,36,37]. The concept of the lower error bound was first defined in [34] as the expectation of a maximum movable distance that does not bring changes in connectivity to the anchors. Here, the maximum movable distance was defined with the areas that other anchors do not exist under a Poisson node distribution and the UDG radio model [26]. MacLean and Datta [35] pointed out that the result of [34] is only applicable for scenarios with small movements, and they presented a new lower bound that incorporates errors from a large movement. The lower bound due to a small movement was revisited under a shadow fading channel model in [36] to consider practical aspects. Gui et al. [37] proposed algorithmic methods to compute lower bounds for real deployments in both UDG and fading models, while the ones derived in [34,35,36] are fully probabilistic bounds. As none of the previous works has addressed the mobility detection problem in connectivity-based localization, no theoretical studies on mobility detection have been done, while the former theoretical studies [34,35,36,37] have focused on the accuracy perspective.
This paper is the first to address the connectivity-based mobility detection problem and to build theoretical foundations which will open up new possibilities in both the academic and industrial fields of research and application. We first provide a general framework of the connectivity-based mobility detection in terms of a mobility detection threshold. Based on this framework, three performance metrics, which are mobility detection, miss detection, and false alarm probabilities, are defined and derived under the shadow fading channel model and arbitrary mobility models. We then discuss the threshold determination from the perspective of minimizing the average error with respect to miss detection and false alarm. The results from this work can serve as a technical guide for designing connectivity-based localization systems in mobile scenarios; for example, deriving the minimum number of anchors to achieve a specific resolution (detection threshold) required for an application.
The remainder of this paper is organized as follows. Section 2 describes the system and channel models. Section 3 provides the definition and derivation of mobility detection, miss detection, and false alarm probabilities. Section 4 addresses the determination of the mobility detection threshold. Section 5 provides numerical results to validate the theoretical foundations. Section 6 concludes this paper along with discussions on future work.
Notation: Throughout the paper, vectors and matrices are denoted by lowercase and uppercase bold letters, respectively. The superscript T denotes the transpose operation. The cardinal number of a set is denoted by | · | . The Euclidean norm of a vector is denoted by | | · | | . E [ · ] represents the expectation of a random vector. N ( u , Σ ) represents a normal distribution with mean u and covariance Σ . ϕ ( · ) denotes the probability density function (PDF) of the standard normal distribution and Φ ( · ) is its cumulative distribution function (CDF).

2. System and Channel Models

We consider a mobile node to be localized with the aid of multiple anchors at known locations in a two-dimensional circular space, denoted by S , with a radius of R [36]. The anchors are randomly deployed according to a Poisson distribution with rate λ . Under the Poisson deployment, the number of anchors is represented by a random variable A with μ A E A = λ π R 2 . The anchors are assumed to be stationary once they are deployed at known points, denoted by { p 1 , p 2 , , p A } where p a = [ x a , y a ] T is the location of the a-th anchor. It is worth noting that a single mobile node is assumed for the sake of simplicity, but the scenario can be simply extended to multiple mobile nodes without any additional assumption.
At any time n, the location of the mobile node is denoted by m n = [ x n , y n ] T , and the distance from the mobile node to the a-th anchor is defined as d a , n = | | p a m n | | . Then, the received signal power (in dBm) is expressed as [38]
r a , n = r a , 0 10 η log 10 d a , n d a , 0 + v a , n ,
where r a , 0 is the received signal power (in dBm) at the reference distance d a , 0 (typically, 1m for short-range communications [39,40]) for the a-th anchor, η is the path loss exponent, and v a , n N ( 0 , σ 2 ) is a zero-mean Gaussian random variable with variance σ 2 representing the shadowing effect. The connectivity between the mobile node and the a-th anchor is assumed to be made if r a , n γ where γ is a signal level threshold, typically corresponding to the required signal-to-noise-ratio for data decoding. This model is typically adopted for both line-of-sight and non-line-of-sight propagation in short-range communications and can be found in related literature [39,40] as well as in the ITU (International Telecommunication Union) recommendations (e.g., ITU-R P.1238 [41] and P.1411 [42]). The parameters in (1) have different values with respect to wireless communications systems and device specifications, and it is also known that the values are different across operational areas and over time due to environmental changes (e.g., temperature, humidity, properties of obstacles) [2,38]. According to the recent works [39,40], it has been reported that r a , 0 [ 68.99 , 56 ] , η [ 1.87 , 2.87 ] , σ [ 0.20 , 4.60 ] for Bluetooth Low Energy (BLE). Typical values of γ are in the ranges of [ 95 , 70 ] for BLE [43] and of [ 100 , 85 ] for IEEE 802.15.4 [44].
It is assumed that the shadow fading effects at subsequent times n and n + 1 are correlated and modeled as a bivariate normal distribution as follows:
f V a , n v a , n = 1 2 π σ 2 1 ρ ( z n ) 2 exp | | v a , n | | 2 2 ρ ( z n ) v a , n v a , n + 1 2 σ 2 ( 1 ρ ( z n ) 2 ) ,
where v a , n = [ v a , n , v a , n + 1 ] T , z n = m n m n + 1 , and ρ ( z n ) is the spatio-tempral correlation between v a , n and v a , n + 1 . According to [38], ρ ( z n ) is given as
ρ ( z n ) = exp z n d dec τ ,
where d dec is the decorrelation distance and τ is a temporal correlation coefficient, normalized by a sampling period.

3. Theoretical Foundations of Mobility Detection in Connectivity-Based Localization

3.1. Definition of Mobility Detection, Miss Detection, and False Alarm Probabilities

The fundamental idea behind connectivity-based localization is to provide the feasible region where the mobile node can be located by translating γ into the maximum achievable distance d max to communicate with an anchor based on (1). The location is then typically estimated to be the centroid of the feasible region drawn by multiple anchors in the least squares sense [45]. This yields that mobility can be detected from a change in the feasible region. In other words, the mobile node is considered having moved if the node finds at least one anchor whose connectivity has changed in a subsequent time interval. Making a decision with only information in a subsequent time interval (he dimension of measurements is two) may be inappropriate in practice where the changes in connectivity can occur due to sudden appearance/disappearance of moving obstacles and radio interference, even though the mobile node has not moved. A practical strategy to handle this issue is to increase the number of measurements by extending the observation period and to test if the number of changes exceeds a threshold. This strategy is simple and effective to mitigate the effect of such unexpected cases so that it is typically adopted in many studies and designs [7,46,47]. However, in this paper, we consider a system using two subsequent measurements for mobility detection to build a theoretical framework providing foundations for further research.
To provide intuitive insights on the connectivity-based mobility detection, a simple example is presented in Figure 1 where the mobile node is tracked with three anchors of which the maximum achievable distances are denoted by the dashed line under the absence of uncertainties in signal levels. As long as the mobile node moves within the colored area where the node maintains the connectivity with all the anchors, its mobility cannot be detected; otherwise, the mobility can be simply detected by any connectivity-based localization algorithms. The minimum distance to detect the mobility for a certain level of performance is typically defined as the resolution, denoted by ϵ , which is determined depending on propagation characteristics and system configurations including anchor numbers, anchor deployments, and others. It is also worth noting that ϵ can be understood as the threshold to decide if the node is moving for a subsequent time period from the detection interpretation.
By defining ϵ , we can construct the following simple hypothesis in terms of the movement, denoted by z n , during the time interval of n and n + 1 :
H 0 : z n [ 0 , ϵ ] , H 1 : z n ( ϵ , R ] .
From the connectivity establishment condition r a , n γ , we have two cases that change connectivity in the subsequent time interval: i) r a , n γ and r a , n + 1 < γ ; and ii) r a , n < γ and r a , n + 1 γ . Let T be the set of anchors whose connectivity with the mobile node changes, and it can be defined as
T { a | ( r a , n γ ) ( r a , n + 1 γ ) < 0 , a } .
When the mobile node moves by z n , the probability that connectivity between the mobile node and the a-th anchor does not change is simply derived from (2), which is given by
Pr a T | Z = z n Pr r a , n γ , r a , n + 1 γ + Pr r a , n < γ , r a , n + 1 < γ = 1 Q r ¯ a , n γ σ Q r ¯ a , n + 1 γ σ + 2 F V a , n ( γ a , n ) .
where Q ( · ) is the Q-function, F V a , n ( v a , n ) is the CDF of V a , n , γ a , n = [ γ r ¯ a , n , γ r ¯ a , n + 1 ] T , and r ¯ a , n = E [ r a , n ] .
Recall that in the connectivity-based localization, the node is considered in moving when the connectivity with at least one anchor changes. Mathematically, it can be expressed as | T | > 0 . Accordingly, the probabilities of mobility detection P D ( ϵ ) , miss detection P M ( ϵ ) , and false alarm P F ( ϵ ) are respectively defined as
P D ( ϵ ) Pr | T | > 0 | H 1 = 1 P M ( ϵ ) , P M ( ϵ ) Pr | T | = 0 | H 1 , P F ( ϵ ) Pr | T | > 0 | H 0 = 1 Pr | T | = 0 | H 0 correct rejection .

3.2. Derivation of P D , P M , and P F

Given the PDF f Z ( z ) and CDF F Z ( z ) for the movement 0 Z R , Pr ( H 0 ) = Pr ( 0 Z ϵ ) = F Z ( ϵ ) and Pr ( H 1 ) = Pr ( ϵ < Z R ) = 1 F Z ( ϵ ) . Then, the three probabilities are simply derived as
P D ( ϵ ) = 1 Pr | T | = 0 , ϵ < Z R 1 F Z ( ϵ ) ,
P M ( ϵ ) = Pr | T | = 0 , ϵ < Z R 1 F Z ( ϵ ) ,
P F ( ϵ ) = 1 Pr | T | = 0 , 0 Z ϵ F Z ( ϵ ) ,
where (8) and (9) hold for F Z ( ϵ ) < 1 , and (10) is feasible for F Z ( ϵ ) > 0 . Here,
Pr | T | = 0 , ϵ < Z R = ϵ R Pr | T | = 0 , Z = z n d z n = ϵ R f Z ( z n ) Pr | T | = 0 | Z = z n d z n ,
Pr | T | = 0 , 0 Z ϵ = 0 ϵ Pr | T | = 0 , Z = z n d z n = 0 ϵ f Z ( z n ) Pr | T | = 0 | Z = z n d z n .
Under the Poisson anchor deployment, Pr | T | = 0 | Z = z n and h ( z n ) are given as [36]
Pr | T | = 0 | Z = z n = exp μ A ( h ( z n ) 1 ) ,
h ( z n ) = S d a , n π R 2 Pr a T | Z = z n d S .
h ( z n ) cannot be expressed in a closed form, but it can be calculated with computer simulations using a Monte Carlo method and simple curve fitting methods. Figure 2 shows the changes of h ( z n ) with respect to z n and σ , computed with Monte Carlo simulations, where R = 100 , d a , 0 = 1 , d cor = 2 , τ = 1 , and η = 2.2 . It is obviously seen that h ( z n ) decreases with larger z n and higher σ , which lead to a larger difference in received signal power in the subsequent time interval. After the computation of h ( z n ) , P D ( ϵ ) , P M ( ϵ ) , and P F ( ϵ ) derived in (8)–(10) can be further computed.
For F Z ( ϵ ) = 1 , P D ( ϵ ) and P M ( ϵ ) are defined as
P D ( ϵ ) = 1 exp { μ A ( h ( ϵ ) 1 ) } P M ( ϵ )
using the L’Hospital’s rule (see Appendix A for the proof) and P F ( ϵ ) becomes
P F ( ϵ ) = 1 E exp μ A ( h ( z n ) 1 )
since f Z ( z ) > 0 only for 0 z ϵ . Similarly, for F Z ( ϵ ) = 0 ,
P D ( ϵ ) = 1 E exp μ A ( h ( z n ) 1 ) P M ( ϵ )
and
P F ( ϵ ) = 1 exp { μ A ( h ( ϵ ) 1 ) } .
The proof of (18) appears in Appendix B.

3.3. Asymptotic Analysis

When σ , (2) is approximated to a uniform distribution over all feasible values of v a , n and both (6) and (14) converge to 1 / 2 . In other words, the probabilities of connectivity to any anchor being maintained and being changed are exactly half and half regardless of the movement, even if the separation to the anchor is very small. This yields
Pr | T | = 0 , ϵ < Z R = ϵ R f Z ( z n ) exp μ A 2 d z n = 1 F Z ( ϵ ) exp μ A 2 ,
Pr | T | = 0 , 0 Z ϵ = 0 ϵ f Z ( z n ) exp μ A 2 d z n = F Z ( ϵ ) exp μ A 2 .
By substituting (19) and (20) into (8)–(10), the asymptotic performance of P D ( ϵ ) , P M ( ϵ ) , and P F ( ϵ ) is given as
P D ( ϵ ) = P F ( ϵ ) = 1 exp μ A 2 and P M ( ϵ ) = exp μ A 2 .
It is a general principle that the probability of connectivity being changed increases as the channel variation becomes more severe due to multipath and other interference. In addition, the more anchors there are, the lower probability that | T | = 0 . As a consequence, the probability that the mobile node says in moving gradually increases with the number μ A of anchors even though z n ϵ and F Z ( ϵ ) 1 . This implies the reduction in the probability of determining H 0 . Thus, it can be clearly seen in (21) that the detection and false alarm probabilities increase while the miss detection probability decreases with increasing the anchor numbers.

4. Threshold Determination for Minimizing the Average Error

A threshold in a detection problem is typically determined as the likelihood ratio, while the detection threshold ϵ in our problem is a design parameter to be set properly depending on system settings and applications. In this section, we discuss how to set the best ϵ , denoted by ϵ 0 , from the perspective of minimum average error cost under zero cost for making right decisions.
Given a priori probabilities Pr ( H 0 ) and Pr ( H 1 ) , the average error cost C e ( ϵ ) arising from the wrong decisions (i.e., miss detection and false alarm) is
C e ( ϵ ) α Pr ( H 1 ) P M ( ϵ ) + ( 1 α ) Pr ( H 0 ) P F ( ϵ ) ,
where 0 α 1 is the cost for miss detection, and 1 α corresponds to the cost for false alarm. In addition to ϵ , the cost α is another factor that controls the overall cost and further detection probabilities. We show that the probabilities are bounded by α at the end of this section. The selection of α is also discussed with numerical analysis in Section 5. Substituting (8)–(10) into (22) yields
C e ( ϵ ) = α ϵ R f Z ( z n ) exp { μ A ( h ( z n ) 1 ) } d z n + ( 1 α ) F Z ( ϵ ) 0 ϵ f Z ( z n ) exp { μ A ( h ( z n ) 1 ) } d z n .
As the cost changes in terms of ϵ , which determines the integration region, the problem is then formulated to find ϵ 0 minimizing (23), which is either increasing or decreasing or convex with respect to ϵ . The behavior of (23) can be determined by using the first derivative test:
C e ( ϵ ) ϵ = f Z ( ϵ ) ( 1 α ) exp { μ A ( h ( ϵ ) 1 ) } 0 .
(23) is increasing if (24) has always a positive value for any ϵ , which is given as
( 1 α ) exp μ A ( h ( ϵ ) 1 ) > 0 .
Since h ( ϵ ) 1 is a probability and is a decreasing function, as shown in Figure 2, (25) should hold for ϵ = 0 at which h ( ϵ ) has the maximum value to (23) to be an increasing function, and this gives the condition for (23) being increasing:
μ A > ln ( 1 α ) h ( 0 ) 1 .
Similarly, from C e ( ϵ ) / ϵ < 0 , we can say that (23) is decreasing when
μ A < ln ( 1 α ) h ( R ) 1 .
In addition, the average cost function is said to be convex and has the minimum value at
ϵ 0 = h 1 1 + ln 1 α μ A
when
ln ( 1 α ) h ( R ) 1 μ A ln ( 1 α ) h ( 0 ) 1 .
Because h ( ϵ ) is decreasing, the convexity of (23) is guaranteed since the first derivative has a negative value in ϵ ( 0 , ϵ 0 ) and a positive value in ϵ ( ϵ 0 , R ) if the derivative becomes zero at ϵ 0 . Therefore, we have
ϵ 0 = { R , for μ A < ln ( 1 α ) h ( R ) 1 , h 1 1 + ln 1 α μ A , for ln ( 1 α ) h ( R ) 1 μ A ln ( 1 α ) h ( 0 ) 1 , 0 , for μ A > ln ( 1 α ) h ( 0 ) 1 .
Figure 3 presents simulation results that show how ϵ 0 changes with respect to μ A and α under the uniform random walk with a uniform direction (refer to (34)) and the settings as the same as in Figure 2. It is clearly shown that ϵ 0 decreases exponentially with μ A as expected from Figure 2 and (30). This indicates that increasing the number of anchors improves the detection resolution. In other words, the more anchors we use, the smaller movement we can detect. Another interesting observation is that α controls the change rate of ϵ 0 . As α is set to a larger value, ϵ 0 decreases slowly with the increase of μ A . This is because Pr ( H 1 ) P M ( ϵ 0 ) remains dominant against Pr ( H 0 ) P F ( ϵ 0 ) in (22) for a large value of α . For any f Z ( z ) , Pr ( H 1 ) P M ( ϵ 0 ) returns (11), which integrates a probability over ( ϵ 0 , R ] . Thus, ϵ 0 is required to be larger to minimize Pr ( H 1 ) P M ( ϵ 0 ) .
Furthermore, the following propositions can be made with the results in Section 3 and show that the probabilities with (30) are bounded by α for ln ( 1 α ) h ( R ) 1 ) μ A ln ( 1 α ) h ( 0 ) 1 .
Proposition 1.
As F Z ( ϵ 0 ) approaches zero ( ϵ 0 0 is a sufficient condition for F Z ( ϵ 0 ) 0 ), P F ( ϵ 0 ) converges to α.
Proof of Proposition 1. 
By substituting (28) into P F ( ϵ 0 ) in (18),
lim F Z ( ϵ 0 ) 0 P F ( ϵ 0 ) = 1 exp μ A 1 + ln ( 1 α ) μ A 1 = α .
 □
Proposition 2.
As F Z ( ϵ 0 ) approaches one ( ϵ 0 R is a sufficient condition for F Z ( ϵ 0 ) 1 ), P D ( ϵ 0 ) and P M ( ϵ 0 ) converge to α and 1 α , respectively.
Proof of Proposition 2. 
By substituting (28) into P D and P M in (15),
lim F Z ( ϵ 0 ) 1 P D ( ϵ 0 ) = 1 exp μ A 1 + ln ( 1 α ) μ A 1 = α ,
lim F Z ( ϵ 0 ) 1 P M ( ϵ 0 ) = lim F Z ( ϵ 0 ) 1 ( 1 P D ( ϵ 0 ) ) = 1 α .
 □

5. Numerical Results and Discussion

This section verifies and analyzes the theoretical results derived in Section 3 and Section 4 through simulations and numerical evaluations using MATLAB. The settings for simulations and numerical evaluations are listed in Table 1. All the anchors are assumed to be homogeneous, and the propagation characteristics are assumed to be the same such that d 1 , 0 = d 2 , 0 = = d A , 0 and r 1 , 0 = r 2 , 0 = = r A , 0 . We adopt random walk mobility models for f Z ( z ) , which are generally used to emulate tracking scenarios with a broad range of targets in nature move [48]. For simulations, a mobile node is placed at the origin, and anchors are randomly deployed with a Poisson distribution with varying μ A in S centered at the origin with an area of π R 2 . In each simulation, the mobile node moves along a random direction from the uniform probability over [ 0 , 2 π ] by a step length (travel distance) randomly drawn from random walk mobility models. In this paper, we assume a uniform random walk model whose PDF is given as
f Z U ( z ) = { 1 d max , for 0 z d max , 0 , for d max < z R ,
and a truncated Gaussian random walk model whose PDF is given as
f Z G ( z ) = ϕ z μ Z σ Z σ Z Φ R μ Z σ Z Φ μ Z σ Z for 0 z R
where μ Z and σ Z denote the mean of the travel distance and its standard deviation, respectively. Since anchors are assumed to be deployed with a Poisson distribution in this paper, the detection performance in all directions is almost the same in the case of node’s movement made in a random direction with the uniform probability over [ 0 , 2 π ] , and thus the effect of movement direction becomes negligible in our work.
Figure 4 presents comparisons in P D ( ϵ 0 ) , P M ( ϵ 0 ) , and P F ( ϵ 0 ) between theoretical and simulation results to verify the theoretical calculations derived in Section 3. A total of 100,000 simulations were conducted for α = 0.5 under the uniform random walk model. According to (29), μ A was set to be between 3 and 14 to meet the convexity of (23), and the other parameters were set to the values in Table 1. We have clearly seen in Figure 4 that the theoretical calculations and simulations provide almost the same results. It is also seen that the increase in μ A leads to both P D ( ϵ 0 ) and P F ( ϵ 0 ) increasing, but P M ( ϵ 0 ) decreases.
Assuming a Poisson distribution, a larger number of anchors indicates increasing the dimension of the constraints on the area where a node can be located. Here, the area is the region, denoted by the colored area in Figure 1, that connectivity to any anchor is not changing. Thus, as the dimension of the constraints is getting higher, we have a smaller area and higher detection resolution, that is, ϵ 0 becomes smaller as seen in Figure 3. The smaller area also implies that the node is nearly d max away from some anchors, and the connectivity with those anchors is likely to change with signal fluctuations. In this sense, for Pr ( H 0 ) Pr ( H 1 ) , P D ( ϵ 0 ) and P F ( ϵ 0 ) increase with the increase of μ A , but P F ( ϵ 0 ) is upper-bounded by α as proved in the Proposition 1. For Pr ( H 0 ) > Pr ( H 1 ) , P M ( ϵ 0 ) increases while P D ( ϵ 0 ) and P F ( ϵ 0 ) decrease. Nevertheless, since P D ( ϵ 0 ) is lower-bounded by α and P M ( ϵ 0 ) is upper-bounded by 1 α as proved in the Proposition 2, we can still control the detection performance by varying α .
The relevant results are presented in Figure 5 that shows the three probabilities under truncated Gaussian random walk models with μ Z [ 0 , 50 ] . In this analysis, it is assumed that α = 0.5 , μ A = 4 , and σ Z = 5 . ϵ 0 is then given to be 25.8 (near the median of the range of μ Z ) according to (28). As μ Z becomes smaller compared to ϵ 0 , Pr ( H 0 ) = F Z ( ϵ 0 ) approaches one, and P D ( ϵ 0 ) has the minimum, but not goes to below α , referred to as the Proposition 2. Not only P D ( ϵ 0 ) , but also P F ( ϵ 0 ) , which is upper-bounded by α (referred to as the Proposition 1), has the maximum values for μ Z = 50 at which Pr ( H 0 ) = F Z ( ϵ 0 ) becomes near zero. From the results, we can establish directions for selection of α depending on z min that is a smallest value of z satisfying F Z ( z min ) = 1 compared to ϵ 0 . When z min ϵ 0 , α should have a value larger than 0.5 to ensure P D ( ϵ 0 ) > P M ( ϵ 0 ) ; otherwise, a lower value of α is preferable to minimize the upper bound of P F ( ϵ 0 ) . Maximizing the overall performance such as the ratio Pr ( H 1 ) P D ( ϵ 0 ) to Pr ( H 1 ) P M ( ϵ 0 ) plus Pr ( H 0 ) P F ( ϵ 0 ) may be a good option for selecting α . It is worth noting that approaches to the selection of α should be determined according to the system policy.
Figure 6 shows the cost function and the detection probability under the uniform random walk model with varying μ A and α . All the other settings are the same as in Table 1. As discussed above, the decrease in ϵ 0 results in the increase in the gap between Pr ( H 0 ) , which goes to zero, and Pr ( H 1 ) , which goes to one, for a larger number of anchors under the uniform random walk model. Consequently, the concern of the miss detection remains dominant while the false alarm becomes insignificant in our mobility detection problem, which is reformulated as the problem of minimizing the miss detection. α also raises the weight on the miss detection. Thus, the cost function decreases and the detection probability increases over μ A , and both increase with the increase in α . The corresponding Pr ( H 1 ) P D ( ϵ 0 ) , Pr ( H 1 ) P M ( ϵ 0 ) , and Pr ( H 0 ) P F ( ϵ 0 ) are presented in Figure 7, which clearly shows that the overall detection performance is improved by increasing μ A and setting a smaller value for α .

6. Conclusions

In this paper, the theoretical foundations of connectivity-based mobility detection were developed by defining and deriving P D ( ϵ ) , P M ( ϵ ) , and P F ( ϵ ) in terms of a mobility detection threshold ϵ under the shadow fading channel and arbitrary mobility models. The determination of the optimal detection threshold was made with respect to the anchor number from the perspective of the average error cost minimization. Through the numerical evaluations, we showed that the detection resolution and the mobility detection probability are improved by increasing the number of anchors, and that the probabilities are bounded by the costs of miss detection and false alarm, which was also theoretically proven. We believe that our results can be used as potential foundations upon which others facilitate the design, development, and deployment of connectivity-based localization supporting mobility.

Author Contributions

Conceptualization, S.L. and S.K. (Sunwoo Kim); methodology, S.L. and S.K. (Sungjin Kim); software, I.B. and S.K. (Sungjin Kim); validation, S.L., I.B., S.K. (Sungjin Kim) and S.K. (Sunwoo Kim); formal analysis, I.B. and S.K. (Sungjin Kim); investigation, I.B. and S.K. (Sungjin Kim); resources, I.B. and S.K. (Sungjin Kim); data curation, S.L.; writing—original draft preparation, S.L. and S.K. (Sungjin Kim); writing—review and editing, S.L., I.B. and S.K. (Sunwoo Kim); visualization, S.K. (Sungjin Kim); supervision, S.L. and S.K. (Sunwoo Kim); project administration, S.K. (Sunwoo Kim); funding acquisition, S.K. (Sunwoo Kim). All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the ICT Research and Development Program of MSIP/IITP (Standard technology development and its international standardization for T2X services based on 5G) under Grant 2020-0-00505.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
BLEBluetooth Low Energy
CDFCumulative Distribution Function
DV-HopDistance Vector-Hop
IoTInternet-of-Things
ITUInternational Telecommunication Union
MCLMonte Carlo Localization
PDFProbability Density Function
UDGUnit Disk Graph

Appendix A. Proof of (15)

Assuming F Z ( ϵ ) 1 , f Z ( z n ) is approximated to zero when z n ϵ . From the L’Hospital’s rule, P D ( ϵ ) in (8) and P M ( ϵ ) in (9) can be expressed as follows:
lim F Z ( ϵ ) 1 P D ( ϵ ) = 1 lim F Z ( ϵ ) 1 ϵ f Z ( z n ) exp { μ A ( h ( z n ) 1 ) } d z n 1 F Z ( ϵ ) = 1 lim F Z ( ϵ ) 1 f Z ( ϵ ) exp { μ A ( h ( ϵ ) 1 ) } f Z ( ϵ ) = 1 exp { μ A ( h ( ϵ ) 1 ) } .
lim F Z ( ϵ ) 1 P M ( ϵ ) = lim F Z ( ϵ ) 1 1 P D ( ϵ ) = exp { μ A ( h ( ϵ ) 1 ) } .

Appendix B. Proof of (18)

Assuming F Z ( ϵ ) 0 , f Z ( z n ) is approximated to zero when 0 z n ϵ . From the L’Hospital’s rule, P F ( ϵ ) in (10) can be expressed as follows:
lim F Z ( ϵ ) 0 P F ( ϵ ) = 1 lim F Z ( ϵ ) 0 0 ϵ f Z ( z n ) exp { μ A ( h ( z n ) 1 ) } d z n F Z ( ϵ ) = 1 lim F Z ( ϵ ) 0 f Z ( ϵ ) exp { μ A ( h ( ϵ ) 1 ) } f Z ( ϵ ) = 1 exp { μ A ( h ( ϵ ) 1 ) } .

References

  1. Wang, X.; Wang, Z.; O’Dea, B. A TOA-based location algorithm reducing the errors due to non-line-of-sight (NLOS) propagation. IEEE Trans. Veh. Technol. 2003, 52, 112–116. [Google Scholar] [CrossRef]
  2. Laoudias, C.; Moreira, A.; Kim, S.; Lee, S.; Wirola, L.; Fischione, C. A survey of enabling technologies for network localization, tracking, and navigation. IEEE Commun. Surv. Tutor. 2018, 20, 3607–3644. [Google Scholar] [CrossRef] [Green Version]
  3. Wang, Z.; Zhang, H.; Lu, T.; Gulliver, T.A. A grid-based localization algorithm for wireless sensor networks using connectivity and RSS rank. IEEE Access 2018, 6, 8426–8439. [Google Scholar] [CrossRef]
  4. Burda, R.; Lewandowski, A.; Wietfeld, C. A hybrid indoor localization using beacon enabled meshing and TOA in IEEE 802.15.4 networks. In Proceedings of the IEEE Vehicular Technology Conference (VTC) Spring, Marina Bay, Singapore, 11–14 May 2008; pp. 118–122. [Google Scholar]
  5. Bulusu, N.; Heidemann, J.; Estrin, D. GPS-less low-cost outdoor localization for very small devices. IEEE Pers. Commun. 2000, 7, 28–34. [Google Scholar] [CrossRef] [Green Version]
  6. Niculescu, D.; Nath, B. Ad hoc positioning system (APS). In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM), San Antonio, TX, USA, 25–29 November 2001; Volume 5, pp. 2926–2931. [Google Scholar]
  7. Lee, S.; Jin, M.; Koo, B.; Sin, C.; Kim, S. Pascal’s triangle-based range-free localization for anisotropic wireless networks. Wirel. Netw. 2016, 22, 2221–2238. [Google Scholar] [CrossRef]
  8. Wang, Y.; Wang, X.; Wang, D.; Agrawal, D.P. Range-free localization using expected hop progress in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 2009, 20, 1540–1552. [Google Scholar] [CrossRef]
  9. Xiao, Q.; Xiao, B.; Cao, J.; Wang, J. Multihop range-free localization in anisotropic wireless sensor networks: A pattern-driven scheme. IEEE Trans. Mob. Comput. 2010, 9, 1592–1607. [Google Scholar] [CrossRef]
  10. Xiao, B.; Chen, L.; Xiao, Q.; Li, M. Reliable anchor-based sensor localization in irregular areas. IEEE Trans. Mob. Comput. 2009, 9, 60–72. [Google Scholar] [CrossRef]
  11. Lee, S.; Lee, D.; Lee, C. Enhanced DV-Hop algorithm with reduced hop-size error in ad hoc networks. IEICE Trans. Commun. 2011, E94.B, 2130–2132. [Google Scholar] [CrossRef]
  12. Zhao, J.; Xi, W.; He, Y.; Liu, Y.; Li, X.; Mo, L.; Yang, Z. Localization of wireless sensor networks in the wild: Pursuit of ranging quality. IEEE/ACM Trans. Netw. 2013, 21, 311–323. [Google Scholar] [CrossRef] [Green Version]
  13. Assaf, A.E.; Zaidi, S.; Affes, S.; Kandil, N. Range-free localization algorithm for heterogeneous Wireless Sensor Networks. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Istanbul, Turkey, 6–9 April 2014; pp. 2805–2810. [Google Scholar]
  14. Chen, J.; Zhang, W.; Liu, Z.; Wang, R.; Zhang, S. CWDV-Hop: A hybrid localization algorithm with distance-weight DV-Hop and CSO for wireless sensor networks. IEEE Access 2021, 9, 380–399. [Google Scholar] [CrossRef]
  15. Li, M.; Liu, Y. Rendered Path: Range-free localization in anisotropic sensor networks with holes. IEEE/ACM Trans. Netw. 2010, 18, 320–332. [Google Scholar]
  16. Lee, S.; Park, C.; Lee, M.J.; Kim, S. Multihop range-free localization with approximate shortest path in anisotropic wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2014, 2014, 80. [Google Scholar] [CrossRef] [Green Version]
  17. Sheu, J.; Chen, P.; Hsu, C. A distributed localization scheme for wireless sensor networks with improved grid-scan and vector-based refinement. IEEE Trans. Mob. Comput. 2008, 7, 1110–1123. [Google Scholar] [CrossRef]
  18. Lee, S.; Woo, H.; Lee, C. Wireless sensor network localization with connectivity-based refinement using mass spring and Kalman filtering. EURASIP J. Wirel. Commun. Netw. 2012, 2012, 152. [Google Scholar] [CrossRef] [Green Version]
  19. Gui, L.; Xiao, F.; Zhou, Y.; Shu, F.; Val, T. Connectivity based DV-Hop localization for Internet of Things. IEEE Trans. Veh. Technol. 2020, 69, 8949–8958. [Google Scholar] [CrossRef]
  20. Liu, X.; Zhang, S.; Wang, J.; Cao, J.; Xiao, B. Anchor supervised distance estimation in anisotropic wireless sensor networks. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Cancun, Mexico, 28–31 March 2011; pp. 938–943. [Google Scholar]
  21. Woo, H.; Lee, C.; Oh, S. Reliable anchor node based range-free localization algorithm in anisotropic wireless sensor networks. In Proceedings of the International Conference on Information Networking (ICOIN), Bangkok, Thailand, 27–30 January 2013; pp. 618–622. [Google Scholar]
  22. Lee, S.; Koo, B.; Kim, S. RAPS: Reliable anchor pair selection for range-free localization in anisotropic networks. IEEE Commun. Lett. 2014, 18, 1403–1406. [Google Scholar] [CrossRef]
  23. Saeed, N.; Nam, H.; Al-Naffouri, T.Y.; Alouini, M. A state-of-the-art survey on multidimensional scaling-based localization techniques. IEEE Commun. Surv. Tutor. 2019, 21, 3565–3583. [Google Scholar] [CrossRef] [Green Version]
  24. Zazali, A.A.; Subramaniam, S.K.; Zukarnain, Z.A. Flood control distance vector-hop (FCDV-Hop) localization in wireless sensor networks. IEEE Access 2020, 8, 206592–206613. [Google Scholar] [CrossRef]
  25. Hu, L.; Evans, D. Localization for mobile sensor networks. In Proceedings of the 10th Annual International Conference Mobile Computing Networking (MobiCom), Philadelphia, PA, USA, 26 September-1 October 2004; pp. 45–57. [Google Scholar]
  26. Gao, D.; Chen, P.; Foh, C.H.; Niu, Y. Hop-distance relationship analysis with quasi-UDG model for node localization in wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2011, 2011, 99. [Google Scholar] [CrossRef] [Green Version]
  27. Baggio, A.; Langendoen, K. Monte Carlo localization for mobile wireless sensor networks. Ad-hoc Netw. 2008, 6, 718–733. [Google Scholar] [CrossRef]
  28. Rudafshani, M.; Datta, S. Localization in wireless sensor networks. In Proceedings of the 6th IEEE International Symposium Information Processing Sensor Networks (IPSN), Cambridge, MA, USA, 25–27 April 2007; pp. 51–60. [Google Scholar]
  29. Sheu, J.P.; Hu, W.K.; Lin, J.C. Distributed localization scheme for mobile sensor networks. IEEE Trans. Mob. Comput. 2010, 9, 516–526. [Google Scholar] [CrossRef]
  30. Zhang, S.; Cao, J.; Li-Jun, C.; Chen, D. Accurate and energy-efficient range-free localization for mobile sensor networks. IEEE Trans. Mob. Comput. 2010, 9, 897–910. [Google Scholar] [CrossRef]
  31. Bochem, A.; Yuan, Y.; Hogrefe, D. Tri-MCL: Synergistic localization for mobile ad-hoc and wireless sensor networks. In Proceedings of the IEEE 41st Conf. Local Computer Networks (LCN), Dubai, United Arab Emirates, 7–10 November 2016; pp. 333–338. [Google Scholar]
  32. Wang, Z.; Wang, Y.; Ma, M.; Wu, J. Efficient localization for mobile sensor networks based on constraint rules optimized Monte Carlo method. Comput. Netw. 2013, 57, 2788–2801. [Google Scholar] [CrossRef]
  33. Huang, J.F.; Chang, G.Y.; Chen, G.H. A historical-beacon-aided localization algorithm for mobile sensor networks. IEEE Trans. Mob. Comput. 2014, 14, 1109–1122. [Google Scholar] [CrossRef]
  34. Nagpal, R.; Shrobe, H.; Bachrach, J. Organizing a global coordinate system from local information on an ad hoc sensor network. In Proceedings of the 2nd International Workshop on Information Processing in Sensor Networks (IPSN), Palo Alto, CA, USA, 22–23 April 2003; pp. 333–348. [Google Scholar]
  35. MacLean, S.; Datta, S. A lower bound on range-free node localization algorithms. In Proceedings of the IEEE International Symposium on Wireless Commun. Systems (ISWCS), Reykjavik, Iceland, 21–24 October 2008; pp. 628–632. [Google Scholar]
  36. Chan, Y.W.E.; Soong, B.H. A new lower bound on range-free localization algorithms in wireless sensor networks. IEEE Commun. Lett. 2010, 15, 16–18. [Google Scholar] [CrossRef]
  37. Gui, L.; He, B.; Xiao, F.; Shu, F. Resolution limit of positioning error for range-free localization schemes. IEEE Syst. J. 2020, 14, 2980–2989. [Google Scholar] [CrossRef]
  38. Goldsmith, A. Wireless Communications; Cambridge University Press: Cambridge, UK, 2005. [Google Scholar]
  39. Nikoukar, A.; Abboud, M.; Samadi, B.; Güneş, M.; Dezfouli, B. Empirical analysis and modeling of Bluetooth low-energy (BLE) advertisement channels. In Proceedings of the 17th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), Capri, Italy, 20–22 June 2018; pp. 1–6. [Google Scholar]
  40. Spachos, P.; Plataniotis, K.N. BLE beacons for indoor positioning at an interactive IoT-based smart museum. IEEE Syst. J. 2020, 14, 3483–3493. [Google Scholar] [CrossRef] [Green Version]
  41. Propagation Data and Prediction Methods for the Planning of Indoor Radiocommunication Systems and Radio Local Area Networks in the Frequency Range 300 MHz to 450 GHz; Recommendation ITU-R P.1238-10; International Telecommunication Union: Geneva, Switzerland, 2019.
  42. Propagation Data and Prediction Methods for the Planning of Short-Range Outdoor Radiocommunication Systems and Radio Local area Networks in the Frequency Range 300 MHz to 100 GHz; Recommendation ITU-R P.1411-10; International Telecommunication Union: Geneva, Switzerland, 2019.
  43. Bluetooth SIG, Inc. 3 Key Factors That Determine the Range of Bluetooth. Available online: https://www.bluetooth.com/blog/3-key-factors-that-determinethe-range-of-bluetooth/ (accessed on 15 January 2021).
  44. Sum, C.S.; Zhou, M.T.; Kojima, F.; Harada, H. Experimental performance evaluation of multihop IEEE 802.15.4/4g/4e smart utility networks in outdoor environment. Wirel. Commun. Mob. Comput. 2017, 2017, 7137406. [Google Scholar] [CrossRef] [Green Version]
  45. Behnad, A.; Wang, X.; Hanzo, L.; Willink, T.J. Connectivity-based centroid localization using distributed dense reference nodes. IEEE Trans. Veh. Technol. 2018, 67, 6685–6689. [Google Scholar] [CrossRef] [Green Version]
  46. Fascista, A.; Ciccarese, G.; Coluccia, A.; Ricci, G. A change-detection approach to mobile node localization in bounded domains. In Proceedings of the 52nd Annual Conference on Information Sciences and Systems (CISS), Princeton, NJ, USA, 21–23 March 2018; pp. 1–6. [Google Scholar]
  47. Robinson, M.; Ghrist, R. Topological localization via signals of opportunity. IEEE Trans. Signal Process. 2012, 60, 2362–2373. [Google Scholar] [CrossRef]
  48. Camp, T.; Boleng, J.; Davies, V. A survey of mobility models for ad hoc network research. Wirel. Commun. Mob. Comput. 2002, 2, 483–502. [Google Scholar] [CrossRef]
  49. Vuran, M.C.; Akan, Ö.B.; Akyildiz, I.F. Spatio-temporal correlation: Theory and applications for wireless sensor networks. Comput. Netw. 2004, 45, 245–259. [Google Scholar] [CrossRef]
Figure 1. A conceptual illustration of mobility detection in connectivity-based localization.
Figure 1. A conceptual illustration of mobility detection in connectivity-based localization.
Energies 14 01162 g001
Figure 2. The changes of h ( z n ) with respect to z n and σ .
Figure 2. The changes of h ( z n ) with respect to z n and σ .
Energies 14 01162 g002
Figure 3. ϵ 0 under different μ A and α .
Figure 3. ϵ 0 under different μ A and α .
Energies 14 01162 g003
Figure 4. Comparisons in P D ( ϵ 0 ) , P M ( ϵ 0 ) , and P F ( ϵ 0 ) between theoretical and simulation results.
Figure 4. Comparisons in P D ( ϵ 0 ) , P M ( ϵ 0 ) , and P F ( ϵ 0 ) between theoretical and simulation results.
Energies 14 01162 g004
Figure 5. P D ( ϵ 0 ) , P M ( ϵ 0 ) , and P F ( ϵ 0 ) for μ A = 4 and α = 0.5 under truncated Gaussian random walk models with different means of the travel distance.
Figure 5. P D ( ϵ 0 ) , P M ( ϵ 0 ) , and P F ( ϵ 0 ) for μ A = 4 and α = 0.5 under truncated Gaussian random walk models with different means of the travel distance.
Energies 14 01162 g005
Figure 6. C e and P D ( ϵ 0 ) under different μ A and α .
Figure 6. C e and P D ( ϵ 0 ) under different μ A and α .
Energies 14 01162 g006
Figure 7. Pr ( H 1 ) P D ( ϵ 0 ) , Pr ( H 1 ) P M ( ϵ 0 ) , and Pr ( H 0 ) P F ( ϵ 0 ) under different μ A and α .
Figure 7. Pr ( H 1 ) P D ( ϵ 0 ) , Pr ( H 1 ) P M ( ϵ 0 ) , and Pr ( H 0 ) P F ( ϵ 0 ) under different μ A and α .
Energies 14 01162 g007
Table 1. Parameters used in simulations and numerical evaluations.
Table 1. Parameters used in simulations and numerical evaluations.
ParametersDescriptionsValuesReferences
RRadius of space S 100 m-
η Path loss exponent2.2[39,40]
σ Noise level1 dB[39,40]
d a , 0 Reference distance for the a-th anchor1 m[40]
r a , 0 Received signal power for the a-th anchor at d a , 0 68.99  dBm[40]
d dec Decorrelation distance2 m[49]
τ Temporal correlation coefficient, normalized by the sampling period1[49]
γ Signal level threshold 100  dBm[44]
d max Maximum communication range∼50 mCalculated by (1)
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Lee, S.; Byun, I.; Kim, S.; Kim, S. A Theoretical Analysis of Mobility Detection in Connectivity-Based Localization for Short-Range Networks. Energies 2021, 14, 1162. https://doi.org/10.3390/en14041162

AMA Style

Lee S, Byun I, Kim S, Kim S. A Theoretical Analysis of Mobility Detection in Connectivity-Based Localization for Short-Range Networks. Energies. 2021; 14(4):1162. https://doi.org/10.3390/en14041162

Chicago/Turabian Style

Lee, Sangwoo, Ilmu Byun, Sungjin Kim, and Sunwoo Kim. 2021. "A Theoretical Analysis of Mobility Detection in Connectivity-Based Localization for Short-Range Networks" Energies 14, no. 4: 1162. https://doi.org/10.3390/en14041162

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop