Primene UWB Localization in Wireless Sensor Networks
Primene UWB Localization in Wireless Sensor Networks
Primene UWB Localization in Wireless Sensor Networks
ABSTRACT
Localization has many important applications in wireless sensor networks, such as object searching and
tracking, remote navigation, location based routing etc. The distance measurements have been based on a
variety of technologies, such as acoustic, infrared, and UWB (ultra-wide band) media for localization purposes. In this paper, we propose UWB-based communication protocols for distance estimation and location
calculation, namely a new UWB coding method, called U-BOTH (UWB based on Orthogonal Variable
Spreading Factor and Time Hopping), an ALOHA-type channel access method and a message exchange
protocol to collect location information. U-BOTH is based on IEEE 802.15.4a that was designed for WPANs
(wireless personal area networks) using the UWB technology. We place our system in coal mine environments, and derive the corresponding UWB path loss model in order to apply the maximum likelihood estimation (MLE) method to compute the distances to the reference sensors using the RSSI information, and to
estimate the coordinate of the moving sensor using least squares (LS) method. The performance of the system is validated using theoretic analysis and simulations. Results show that U-BOTH transmission technique
can effectively reduce the bit error rate under the path loss model, and the corresponding ranging and localization algorithms can accurately compute moving object locations in coal mine environments.
Keywords: Orthogonal Variable Spreading Factor (Ovsf), Time Hopping (Th), Ultra-Wide Band (Uwb),
Localization, Ranging
1. Introduction
Large-scale economic wireless sensor networks (WSNs)
become increasing attractive to environmental monitoring,
control and interaction applications. Object tracking and
localization is one of the key challenges for these applications [1]. Various solutions have been proposed based on
two ranging techniques: 1) time of arrival (TOA) [2],
such as GPS, 2) the path loss model based on radio RSSI
signal strength [3] or acoustic signal strength [4] attenuation in relation to the signal propagation distance. Sometimes, range-free techniques are also applied to estimation
locations, such as hop count or centroid methods [5].
However, most of these localization methods require
*
generic signal propagation and network formation assumptions. In this paper, we place our localization method in coal mine environments for monitoring and tracking human and vehicle locations using multiple reference points installed in the WSNs. This approach is especially valid given the practical value of the localization
system in helping people in the frequent emergency
situations and reducing the high costs of coal mine operations.
Coal mine environments present extremely harsh conditions for wireless communications. First, the power of
the transmitter underground must be reduced to the lowest level to avoid sparkling gas explosions. Secondly,
signal propagations are especially prone to multipath
effects. Third, wireless networks are more dynamic than
surface networks due to signal attenuation, movements
etc. Last but not the least, wireless sensor network in
Int. J. Communications, Network and System Sciences
408
D. WU ET AL.
coal mines is a multiple users system, and the MUI (multiple users interference) has dramatic impacts on the
precision of a localization system. Coding is an important method to depress MUI.
UWB (ultra-wide band) transmission and coding
technologies provide an ideal solution to the coal mine
environment. On one hand, UWB systems can provide
high bandwidth data transmissions; on the other hand,
UWB exhibits excellent characteristics to reduce
co-channel interference. IEEE 802.15.4a is the de facto
standards to provide low power long distant low data rate
service for real-time communication and precise ranging
and localization applications [6,7].
There are many UWB localization algorithms proposed in the past [8-11]. Wang et al. demonstrated the
use of UWB in coal mines to realize short-distance
high-rate applications such as video monitoring, as well
as localization and monitoring [12].
Of the different UWB transmission techniques, Impulse Radio Ultra-wideband (IR-UWB) provides a desirable platform to enable efficient and precise localization solutions in coal mines environments [13]. Different
coding algorithms for IR-UWB communication systems
have been proposed so far, such as DS-UWB (Direct
Sequence UWB) and TH-UWB (Time Hopping UWB)
[14]. However, none was shown to guarantee high quality localization. The simple DS-UWB cannot even meet
the localization requirements when the multipath and
multi-user interference exist. In this paper, we apply the
Orthogonal Variable Spread Factor (OVSF) coding algorithm in IR-UWB networks to solve the multi-user interference problem.
Other than TOA (time-of-arrival), TDOA (time difference of arrival) and AOA (angle of arrival) based
ranging techniques, ranging based on the path loss model
is an intuitive method, especially in low-cost WSNs. The
path loss model defines the signal propagation characteristics, and determines the received signal strength.
Therefore, given the received signal strength (RSSI), we
can estimate the distance between the receiving node and
other reference points using computational methods,
rather than expensive hardware [15]. Several channel
models were proposed to evaluate UWB systems in different propagation environments in the IEEE 802.15.4a.
However, these models relied on insufficient measurements and fixed parameters, and cannot reflect the real
channel characteristics. In [16], a statistical path loss
model was established for channels in the residential
areas based on over 300,000 frequency response measurements. This approach shows good agreement with
measured data, but requires a highly complex modeling
and simulation procedures, as mentioned in IEEE
802.15.4a. Li et al. analyzed the propagation mode of
Copyright 2009 SciRes.
409
Tc
Tb
Ns
Nc
n
j
SF
Ns
n
TX
n
RX
E
E
p0 (t )
c nj
n
j / N s
r (t )
rmui (t )
n(t )
m(t )
Z mui
Zn
N0
erfc( x)
Prb
Meaning
410
D. WU ET AL.
n
j
n
anj / N s ETX
p0 t jT f c nj Tc ,
(1)
riod N s and anj / N s indicates the data stream bit. If the data
bit is 1, anj / N s 1 . Otherwise, anj / N s 1 .
At the receiver side, the received signal consists of
three source of information:
r t ru t rmui t n t ,
da
1 1
j j / N s
1
ERX
p0 t jT f c1j Tc .
(2)
( i 1) N s 1
j iN s
d 1j p0 t jT f c1j Tc ; i , .
(3)
r t n t m t dt .
Z Z Zn
Tb
(4)
411
N s 1
j 0
jT f c1j Tc Tc
1
d 1j d 1j a1 j / N s ERX
t dt ,
jT f c1j Tc
N s 1
Tc
j 0
1
a1 j / N s ERX
p0 t p0 t dt
1
N s a1 j / N s ERX
Tc
p0 t p0 t dt
j 0
Tc
d 1j p0 t n t dt
N s 1
d n
j 0
1
j
N
D Z n D d 1j n j N s 0 ,
2
j 0
Zn ~ N 0, N 0 N s / 2 .
1
Prb P Z 0 | b 0 P N s ERX
Zn 0
P Zn Ns E
1
RX
Prb
N E1
1
s RX
erfc
2
N0
exp t 2 dt .
SF E1
1
RX
erfc
2
N
0
64 R E1
1
0
RX
erfc
2
R
N
0
b
, (5)
bit2
Ns
Tf
Tf
n
ERX
d 1j d in p0 t n p0 t dt
Tc
d
2
2
from all
Therefore, the total interference variance mui
other transmitters is:
N
n2
n
N s ERX
1
a1 j / N s N s ERX
.
Zn
where erfc x
Tf
Tf
Tc
d 1j din p0 t n p0 t dt
d
2
mui
Ns
Tf
E
n2
n
RX
Tf
0
Tc
d 1j din p0 t n p0 t dt d n
412
D. WU ET AL.
Ns
Tf
M2
E
n2
n
RX
in which,
M2
Tf
Tc
d 1j din p0 t n p0 t dt
d
2
Tf
R 2 d .
1
N sT f
and
64 R0
, Equation (6) gives the BER in
Rb
multi-user interference environments.
N s = SF =
1
1
N s ERX
1
1 2 N s ERX
Prb erfc
Nu
2
2 N0
n
2 1
ERX
M
2
f
1
1
128
R
E
ERX
1
1
0 RX
erfc
2 N n
2
2 Rb N 0
M Rb ERX
n2
(6)
413
5. Ranging Algorithm
Ranging is to estimate the approximate distance between
the target node and the reference nodes. We use the
maximum likelihood estimation for such calculations.
First of all, we need to establish the path loss model of
the UWB channel in order to inversely derive the distance information from received signal qualities.
d
PL d PL0 10 log10
d0
S ; d d 0 ,
(7)
in which
d0 is the reference distance (e.g. 1 meter in UWB
medium),
PL0 means the path loss in dB at d0,
d is the distance between the transmitter (Tx) and
receiver (Rx),
414
D. WU ET AL.
The tunnels environment in coal mine can be regarded as a special type of indoor environments, considering various kinds of concrete environmental factors in
coal mine [17]. Thus, we adopt the UWB path loss
model in coal mine based on residential indoor propagation model.
According to the residential indoor models, the values
of
, and S in Equation (7) are specific in each propagation environment, and could be treated as random variables [16].
Accordingly, the UWB path loss is commonly modeled as:
PL d
dB
PL0 10 log10 d
10n
1
log10 d n2 n2 n3 ,
(8)
p PL d
PL PL0 10 log10 d
2 100
log10 d 2
2
2 100 2 log10 d 2 2
2
(9)
n2 .
Then, the indoor UWB path loss could be expressed
as:
PL d
dB
n1 n1n2 is
not ex-
PL d ~ N PL0 10 log10 d , 2 2 .
p( PL d )
PL PL0 10 log10 d
2 2 2
2 2 2
(11)
415
PL d PL0 n1 n1n2
10
Receiver computes the distance between the transmitter Tx and the receiver Rx using random values n1 and
n2 in the truncated range. This method takes into account
the influence of real log-normal shadow fading on rang ln p PL | d
d
1
10 N
PL0
PL 10
PLi
PL0
10
2 2 2
(12)
(13)
due to ranging errors from thermal noise and other interferences. The least squares algorithm uses multiple reference nodes and the corresponding ranges to improve
accuracy in the presence of error. It first creates following equations:
(14)
6. Localization Algorithm
When computing the location of a wireless sensor node,
there are two types of nodes, the reference node and the
target node. Suppose that we have three reference nodes
with coordinates ( x1 , y1 ) , ( x2 , y2 ) and ( x3 , y3 ) , respectively. The target node computes its coordinate ( x, y ) using trilateration method with the coordinates of reference
nodes and their ranges d1 , d 2 , d 3 , to the target node using
the following equations:
x1 x 2 y1 y 2 d12
2
2
2
x2 x y2 y d 2
2
2
2
x3 x y3 y d3
In practical situations, three reference nodes are usually insufficient to accurately derive the target coordinate
Copyright 2009 SciRes.
i 1
2 2 2
1 N
d ln10 i 1
i 1
p PL | d
10 N
x1 x 2 y1 y 2 d12
x2 x 2 y2 y 2 d 22
2
2
2
xn x yn y d n
(15)
x x
A 2 2 n
xn 1 xn
y1 yn
y2 yn
yn 1 yn
x
I ,
y
Int. J. Communications, Network and System Sciences
416
D. WU ET AL.
x12 xn2 y12 yn2 d n2 d12
2
2
2
2
2
2
xn 1 xn yn 1 yn d n d n 1
I A A A b .
1
M ( AT A) 1 AT
b b1
M 1, n 1
,
M 2, n 1
M 1,3
M 2,2
M 2,3
....
....
bn 1
b2
b3
....
2d n n 2d 2
.
2n 2d n n 2n 1 2d n 1 n 1
2n 2d n n 12 2d11
2
n
2, i
2
i
2d i i .
(18)
n 1
D( x) 2 n4 4d n2 n2 M 1,i
1
n 1
M 2
i 1
2
1,i
4
i
4di2 i2 .
(19)
n 1
D( y ) 2 n4 4d n2 n2 M 2,i
i 1
M 2
n 1
i 1
2
2, i
4
i
4di2 i2 .
(20)
2
2
7. Simulation Results
2
n
2
i
2
n
2
n
n 1
n 1
i 1
i 1
2
i
x M 1,i Bi 2n 2 d n n M 1,i
M
n 1
i 1
i 1
i 1
(16)
M 1,2
i 1
n 1
M 1,1
M 2,1
n 1
n 1
y M 2,i Bi 2n 2d n n M 2,i
1, i
2
i
2di i .
(17)
Copyright 2009 SciRes.
417
100
90
80
70
Y (m)
60
50
40
30
20
10
0
20
40
60
80
100
X (m)
U-BOTH
DS-UWB
TH-UWB
10
BER
10
-1
UWB [23].
Secondly, we let Eb = N0 = 0 dB, Ns = 4 and generated
2000 bits randomly. Figure 6 shows the relative performance of U-BOTH, TH-UWB and DS-UWB systems
in multiple access scenarios. In this case, the received
signal includes by noise and co-channel interference. In
Figure 6, although both the BER and the variance of error bits increase as the number of users increases, the
performance of our U-BOTH system is still better than
DS-UWB and TH-UWB, proving that the UWB coding
based OVSF-TH effectively handle the burst errors.
2
2
MSE d E d d E d E d var d . (21)
-2
10
-3
10
2 ln p( PL | d )
2 2 d 2 ln 2 10 .
CRLB d E
100 N 2
d 2
-10
-5
0
Eb/No (dB)
10
10
10
U-BOTH
DS-UWB
10
BER
TH-UWB
-1
-2
10
10
10
U-BOTH
DS-UWB
TH-UWB
-3
10
4
7
10
15
Numbers of Interfering Users
10
20
4
7
10
15
Numbers of Interfering Users
20
418
D. WU ET AL.
ln p( PL | d )
can
d
2
2
E d d d d p PL | d dPL .
(22)
2 2 2 ln 2 10
100 N 2
2 log10 d ln10
2de
2 ln 2 10
200 N 2
log10 d ln 10
MSE
20
d .
(23)
10
d=15
d=10
3
4
5
6
7
8
The Number of Iterations N
10
10
Value
LOS NLOS
1m
1m
47 dB 51 dB
1.7
3.5
2.7
0.98
10
Ranging Error (m)
d0
PL0
d=20
d=5
15
Notation
CRLB
-1
10
-2
10
N=1
N=5
10
CRLB,N=5
MSE,N=20
3.5
CRLB,N=20
N=20
-3
MSE,N=5
7
9 11 13
Real Distance (m)
15
17
19
2.5
2
1.5
1
0.5
2
8 10 12 14
Real Distance (m)
16
18
20
Figure 7. Comparisons between the cramer-rao lower bound (CRLB) and the mean square error (MSE) of ranging
estimations at different distances.
Copyright 2009 SciRes.
419
20
15
10
55
60
65
70
75
80
85
90
X (m)
Figure 12. Localization result of estimation time N=1 (localization error is 1.2547m).
45
10
d=5
40
d=10
d=15
35
30
10
Y (m)
CRLB (m2)
25
25
20
LOS
15
-1
10
NLOS
2
10
55
6 8 10 12 14 16 18 20
The Number of Iterations N
60
65
70
75
80
85
90
X (m)
Figure 13. Localization result of estimation time N=20 (localization error is 0.2464m).
45
d=16.13 m
40
35
30
Y (m)
1.5
25
20
15
0.5
10
1 2 3 4 5 6 7 8 9 10 11121314
MSE (m2)
55
60
65
70
75
80
85
90
X (m)
420
D. WU ET AL.
Localization Error
N=1
1.2547m
N = 20
0.2464m
N = 50
0.1253m
N = 100
0.0885m
away, which shows that the impact of N increments decreases when N is greater than a few dozen.
8. Conclusions
We proposed a group of communication protocols and
localization algorithms for wireless sensor networks in
coal mine environments, namely a new UWB coding
method, called U-BOTH (UWB based on Orthogonal
Variable Spreading Factor and Time Hopping), an
ALOHA-type channel access method and a message exchange protocol to collect location information. Then we
derived the corresponding UWB path loss model in order
to apply the maximum likelihood estimation (MLE)
method to compute the distances to the reference sensors
using the RSSI information, and provided least squares
(LS) method to estimate the coordinate of the moving
target. The performance of U-BOTH communication
system and the localization algorithms are analyzed using communication theories and simulations. Results
show that UBOTH transmission technique can effectively reduce the bit error rate under the path loss model,
and the corresponding ranging and localization algorithms can accurately compute moving object locations
in coal mine environments.
9. Acknowledgment
We would like to express our sincere appreciation to Prof.
Fanzi Zeng, and Prof. Juan Luo for their insightful feedbacks during the preparation of this manuscript, and of
the anonymous reviewers for their helpful comments.
This work has been generously sponsored in parts by the
National Natural Science Foundation of China under
Grant No. 60673061 and the Raytheon Company under
Grant No. RC-42621.
10. References
[1]
[2]
[3]
[4]
[6]
[7]
[8]
[9]
421