Next Article in Journal
Circuit Parameters of a Receiver Coil Using a Wiegand Sensor for Wireless Power Transmission
Previous Article in Journal
Geodesic-Based Method for Improving Matching Efficiency of Underwater Terrain Matching Navigation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Robust, Non-Cooperative Localization Algorithm in the Presence of Outlier Measurements in Ocean Sensor Networks

1
Merchant Marine College, Shanghai Maritime University, Shanghai 201306, China
2
Department of Informatics, Linnaeus University, Växjö 351 06, Sweden
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(12), 2708; https://doi.org/10.3390/s19122708
Submission received: 24 April 2019 / Revised: 13 June 2019 / Accepted: 14 June 2019 / Published: 16 June 2019
(This article belongs to the Section Sensor Networks)

Abstract

:
As an important means of multidimensional observation on the sea, ocean sensor networks (OSNs) could meet the needs of comprehensive information observations in large-scale and multifactor marine environments. In what concerns OSNs, accurate location information is the basis of the data sets. However, because of the multipath effect—signal shadowing by waves and unintentional or malicious attacks—outlier measurements occur frequently and inevitably, which directly degrades the localization accuracy. Therefore, increasing localization accuracy in the presence of outlier measurements is a critical issue that needs to be urgently tackled in OSNs. In this case, this paper proposed a robust, non-cooperative localization algorithm (RNLA) using received signal strength indication (RSSI) in the presence of outlier measurements in OSNs. We firstly formulated the localization problem using a log-normal shadowing model integrated with a first order Taylor series. Nevertheless, the problem was infeasible to solve, especially in the presence of outlier measurements. Hence, we then converted the localization problem into the optimization problem using squared range and weighted least square (WLS), albeit in a nonconvex form. For the sake of an accurate solution, the problem was then transformed into a generalized trust region subproblem (GTRS) combined with robust functions. Although GTRS was still a nonconvex framework, the solution could be acquired by a bisection approach. To ensure global convergence, a block prox-linear (BPL) method was incorporated with the bisection approach. In addition, we conducted the Cramer–Rao low bound (CRLB) to evaluate RNLA. Simulations were carried out over variable parameters. Numerical results showed that RNLA outperformed the other algorithms under outlier measurements, notwithstanding that the time for RNLA computation was a little bit more than others in some conditions.

1. Introduction

Wireless sensor networks (WSNs) are self-organizing networks consisting of numerous sensor nodes connected by some means of communication. Because of their small size, low energy consumption, strong robustness, flexible layout, and rapid networking for nodes, WSNs are now widely used in a large number of fields [1,2,3,4]. One of the vital applications is to conduct ocean sensor networks (OSNs) to monitor ocean environments in the case of forecasting climate changes [5]. To fulfill this task, a tremendous number of sensor nodes, such as buoys that are sensitive to environmental factors, are deployed on the ocean surface. Considering the cost of nodes, only a few sensor nodes are armed with a global positioning system (GPS), called anchor nodes [6,7], while the others are unknown nodes. It should be noted that data collected by sensor nodes are meaningful only when the latter is properly geo-referenced [8]. Hence, the critical issue that needs to be tackled in OSNs is to acquire location information of the unknown nodes with assistance from the anchor nodes.
Regarding localization in OSNs, non-cooperative localization (NCL) and cooperative localization (CL) schemes are considered the major scenarios [9]. In CL, the unknown nodes are able to communicate with the rest of the sensor nodes (anchor nodes and other unknown nodes) within the communication range, whereas they cannot in NCL. In general, the complexity, computational time, and energy consumption in CL are far more than that of NCL, albeit more accurate as well [10]. In order to achieve long-term monitoring of the ocean, the scheme with less energy consumption seems to be a better choice. In this case, we focus more on the NCL scheme in OSNs. Basically, NCL contains five measurement techniques: (1) time of arrival (TOA), (2) time difference of arrival (TDOA), (3) angle of arrival (AOA), (4) time of flight (TOF), and (5) received signal strength indication (RSSI) [8]. As for the localization accuracy, TOA, TDOA, AOA, and TOF may outperform RSSI at the cost of extra apparatuses in some circumstances. Besides, TOA, TDOA, and TOF have to synchronize time during localization. On the contrary, there is no need to arm extra apparatuses and synchronize time in RSSI. Therefore, RSSI is considered a cost-effective and energy-saving method widely used in OSNs [11]. In this case, we used RSSI as the measurement technique in this paper.
Past years have witnessed development of research on localization in OSNs. Considerable efforts have been investigated in recent years [12,13,14,15,16,17,18,19,20,21,22,23,24,25]. To mention a few, an optimal sensor placement strategy that depended on the required task at hand was proposed in [13]. This strategy could run in the presence of Gaussian noise in the range-based scheme. Then, the authors further proposed a multiple underwater target positioning method in [18] with the strategy exploited. The localization problem in [18] was transformed into an optimization problem. Two-phase localization was presented, where convex optimization tools were utilized for single target localization, and Pareto optimization tools were used when it came to multiple target localizations. Similar two-phase work was proposed in [23]. In the first phase, a particle swarm optimization (PSO)-based localization algorithm was employed to locate the unknown nodes. For the sake of avoiding the case that some of the unknown nodes had not been localized in the first phase, a circle-based, range-free localization method was presented in the second phase.
Nevertheless, two-phase localization methods function well only when the anchor nodes are not faulted. In this matter, to avoid anchor node failure, a fault-resilient localization method was proposed in [24]. The authors utilized multiple linear regression to learn mobility behaviors from the neighbors of unknown nodes. The authors in [12] presented a maximum likelihood estimator under Gaussian noise to deal with anchor node uncertainty. In addition, some anchor-free localization methods have been presented to handle anchor node failure localization. Li et al. proposed an anchor-free localization mechanism using belief propagation integrated with dead reckoning [25]. The authors in [16] presented a signal reflection-enabled, acoustic-based localization scheme (UREAL), which was entirely an anchor-free approach. This scheme established the refracted–surface–reflected link for all sensor nodes using RSSI information. Then, the authors utilized AOA ranging in the position estimation. In addition to localization accuracy, energy consumption is considered another limitation in localization. Guo et al. proposed an energy-aware localization method in [15], wherein the authors took ships as anchor nodes to engage in energy-saving. Yan et al. presented an autonomous underwater vehicle (AUV)-aided localization scheme, wherein active nodes and passive nodes were included [14]. Yan et al. proposed an energy-efficient localization algorithm in [17]. The algorithm converted the localization problem into a convex optimization problem using norm relaxation and semidefinite relaxation.
However, it should be emphasized that outlier measurements may occur frequently and inevitably because of the multipath effect, unintentional or malicious attack, and signal shadowing caused by waves [10,26,27]. To the best of our knowledge, only a few papers took outlier measurements into consideration when it came to localization in OSNs. In [28], the authors applied support vector data description (SVDD) to detect outlier measurements and then exploited auto-associative kernel regression (AAKR) to correct deviations. The authors in [29] employed half quadratic minimization to solve the localization problem in the presence of outliers. Soares et al. converted the localization problem into a convex optimization problem using simple fast convex relaxation, and then they tested the method with 10% outlier measurements engaged [30].
It may be noted that the method in [28] is costly and has high complexity. The approaches proposed in [29] and [30] only considered outlier measurements that yielded Gaussian distribution, which was the ideal situation. In this paper, motivated by the above issues, we propose a practical, robust non-cooperative localization algorithm (RNLA) that regards the buoys as sensor nodes and uses RSSI in the presence of outlier measurements in OSNs. Firstly, the localization problem is formulated using RSSI with a log-normal shadowing model and the first-order Taylor series exploited. After considering the dynamics of sensor nodes, the length of the anchor chain of the buoys, and the depth of the water, the moving area is restricted. Moreover, because of the non-Gaussian outlier measurements involved, the maximum likelihood estimator cannot function well. We then convert the original localization problem into an optimization problem using squared range and weighted least square (WLS), albeit in a nonconvex form. Furthermore, the optimization problem is transformed into a generalized trust region subproblem (GTRS) incorporated with robust functions. Despite that GTRS is still a nonconvex framework, we conduct a bisection-based block prox-linear (BPL) method to solve it. Additionally, a Cramer–Rao low bound (CRLB) is acquired to evaluate the proposed method.
The main differences between this paper and the previous works are: (1) We consider the dynamics of all nodes, which is more practical in real situations, especially in such a highly dynamic ocean environment. (2) We take into account the length of the anchor chain of the buoys and the depth of the sea, restricting the moving area. (3) In some previous works, localization in OSNs contains two procedures (i.e., detecting the outliers and then eliminating the outliers before locating the nodes); however, in this paper, we take the outlier measurements into consideration without detecting and eliminating procedures, directly locating the unknown nodes in the presence of outlier measurements, which may save localization time in OSNs. The major contributions of this paper can be concluded as these two aspects: (1) we convert the localization problem into an optimization framework combined with robust functions, and (2) a robust algorithm named RNLA, which figures out the global solution and works well in a highly dynamic ocean environment, is proposed for localization in OSNs.
The remainder of the paper is organized as follows. In Section 2, we introduce the problem formulation of non-cooperative localization. In Section 3, the proposed algorithm is illustrated. In Section 4, comprehensive simulation results are discussed. In the last section, Section 5, we conclude this paper.

2. Problem Formulation

Assume plenty of sensor nodes (buoys with anchor chain attached) are deployed on the ocean surface of interest. In this paper, we assumed all sensor nodes were movable in the restricted area, which is the base of the cone shown in Figure 1. Without loss of generality, suppose the number of anchor nodes and unknown nodes are N and M respectively. The position of anchor nodes and unknown nodes are A t = [ ( a 1 t ) T , ( a 2 t ) T , , ( a N t ) T ] T and U t = [ ( u 1 t ) T , ( u 2 t ) T , , ( u M t ) T ] T at time t . T presents the transpose. For the i t h anchor node and the j t h unknown node at time t , the positions can be expressed as a i t = [ a i x t , a i y t ] , i N and u j t = [ u j x t , u j y t ] , j M respectively. x and y indicate the corresponding coordinate.
In this paper, we employed RSSI as the ranging method because its time does not need to be synchronized, it is cost-effective, and it saves energy [9]. The localization procedures were executed in a centralized manner, where all information within the communication radius collected was transmitted to the processing center. The tradeoff information at each time slot between anchor nodes and unknown nodes included the RSSI value and corresponding identity number. Suppose all sensor nodes are armed with the signal receiver, which means the nodes are aware of the signal strength. The received RSSI value could be modeled as the propagation path-loss model [10]
R S S I r i t = R S S I s j t P L ( d 0 ) 10 ϑ lg ( d i j t d 0 ) + η i j t ,
where R S S I r i t denotes the signal strength received by the i t h anchor node from the j t h unknown node at time t . R S S I s j t denotes the transmission power of the j t h unknown node at time t . P L ( d 0 ) is the signal strength loss value when the reference distance is d 0 = 1 m. ϑ indicates the path loss factor. d i j t denotes the distance between the i t h anchor node and the j t h unknown node at time t . η i j t is Gaussian white noise, which is rewritten as η for the convenience in the rest of the paper.
Assume R is the matrix that contains all range measurements, R S S I r i t = P r i t , R S S I s j t P L ( d 0 ) = P s j t , and d 0 = 1 m. If the noise follows a zero-mean Gaussian distribution with variance σ , the corresponding probability density function (PDF) can be written as Equation (2) [10].
p ( R t | U t ) = j = 1 M i = 1 N 1 2 π σ 2 exp { { P r i t P s j t + 10 ϑ lg ( d i j t ) } 2 2 σ 2 } .
If the transmission power and the path loss factor are known, Formula (1) could be rewritten as Equation (3) [10].
( d i j t ) 2 = 10 P s j t P r i t 5 ϑ 10 η 5 ϑ .
When the noise is relatively small, the right side of Equation (3) can be approximated using the first-order Taylor series expansion as Equation (4) [20].
10 P s j t P r i t 5 ϑ 10 η 5 ϑ 10 P s j t P r i t 5 ϑ ( 1 + ln 10 5 ϑ η ) .
Equation (4) can be, alternatively, written as Equation (5) [20]
10 P s j t P r i t 5 ϑ 10 η 5 ϑ 10 P s j t P r i t 5 ϑ + η ,
where η = 10 P s j t P r i t 5 ϑ ln 10 5 ϑ η .
Now, the problem in Equation (2) can be reformulated as Equation (6) [20].
p ( R t | U t ) = j = 1 M i = 1 N 1 2 π σ 2 exp { ( a i t u j t d i j t ) 2 2 σ 2 } .
Notably, Equation (6) could be solved by the maximum likelihood (ML) estimator. However, once the outlier measurements exist (the non-Gaussian noise attributes to the noise distribution), the ML estimator, to some extent, malfunctions. Henceforth, the proposed RNLA method was motivated by this case.
In this paper, we took into account a non-Gaussian noise situation. The noise distribution consisted of two parts: (1) Gaussian distribution and (2) uncertain distribution (the distribution of outlier measurements) [31].
p ( η ) = ( 1 β ) Ω ( η ; 0 , σ 2 ) + β φ ( η ) ,
where Ω ( η ; 0 , σ 2 ) denotes the Gaussian distribution. φ ( η ) indicates the outlier measurements distribution. β is the contamination ratio.

3. Proposed Algorithm

3.1. Generalized Trust Region Subproblem (GTRS)

In Section 2, the ML estimator was conducted when the noise was Gaussian. However, the ML estimator was not functional in the presence of non-Gaussian outlier measurements. Therefore, we converted Equation (6) into the optimization problem using squared range and WLS.
U ^ = arg min j = 1 M i = 1 N ω i t { a i t u j t 2 2 ( d i j t ) 2 } 2 ,
where ω i t denotes the weight at time t .
It should be noted that the problem in Equation (8) is nonconvex. Thus, a proper transformation is exploited by reformulating it as a constrained minimization problem [32]. Assume that each unknown node is independent. Here, we took one of the unknown nodes j as an example to demonstrate the rest of the parts. Then, Equation (8) can be rewritten as
( u ^ j t , j t ) = arg min i = 1 N ω i t ( j t 2 ( a i t ) T u j t + a i t 2 ( d i j t ) 2 ) 2 subject   to   u j t 2 = j t .
Now, the problem in Equation (9) can be expressed as a quadratic program as
minimize y j t   ω t ( t y j t b t ) 2 subject   to   ( y j t ) T D y j t + 2 f T y j t = 0 ,
where y j t = [ u j t , j t ] T and the corresponding matrices t , b t , D , and f are defined as
t = [ 2 ( a 1 t ) T 2 ( a N t ) T 1 1 ] , b t = [ ( d i j t ) 2 a 1 t 2 ( d N j t ) 2 a N t 2 ] , D = [ I n 0 1 × n 0 n × 1 0 ] , f = [ 0 n × 1 1 2 ] ,
where n denotes the dimension.
The original localization problem is further transformed into GTRS, a constrained minimization problem, as shown in Equation (10).

3.2. German-McClure (GM) Function with Huber Norm in GTRS

Although the problem has already been transformed into GTRS, large errors may appear in a way, directly using a bisection approach to figure out the solution under outlier measurements. Henceforth, inspired by [33,34], the objective function could be expressed as
J ( y j t , ω t ) = i = 1 N ω i t ( i t y j t b i t ) 2 + i = 1 N ε 2 ω i t ln ω i t ,
where i t = [ 2 ( a i t ) T , 1 ] , b i t = ( d i j t ) 2 a i t 2 , and ε denotes the parameter that needs to be determined.
The former summation of Equation (12) is Equation (10), the latter term of Equation (12) is added to cater for the use of the German-McClure (GM) function, being one of the M-estimators commonly used in robust statistics. The aim of the GM function is to degrade the influence of large errors by interpolating between 2 and 0 norm [35].
The GM function can be expressed as
ρ ε ( e ) = e 2 e 2 + ε 2 ,
where e denotes the residual of the former summation of Equation (12). ρ ε ( ) indicates the function of e .
However, the GM function does not guarantee a unique solution, though it is a robust function. In this case, the Huber norm, being a convex function, is incorporated with the GM function to figure out parameter e .
The Huber norm is introduced in Equation (14).
ρ κ ( e ) = { 1 2 e 2 | e | < κ κ | e | κ 2 2 | e | κ .
If the noise is Gaussian, the Huber function would be 95% asymptotically efficient when the parameter κ is 1.34 σ [34].
Incorporating the GM function with the Huber norm, Equation (14) can be rewritten as
ρ ε ( e ) = { e 2 e 2 + ε 2 | e | < ε 0 1 8 ( 3 ε 0 | e | 1 ) | e | ε 0 ,
where ε 0 = 1.34 σ and ε = 3 ε 0 .
Now, we have obtained the optimal parameter ε = 1.34 3 σ .

3.3. Robust, Non-Cooperative Localization Algorithm (RNLA)

The problem in Equation (12) can be expressed as
minimize y j ( t y j t b t ) T W k 1 t ( t y j t b t )       subject   to   ( y j t ) T D y j t + 2 f T y j t = 0 ,
where W k t denotes the diagonal weight matrix in the k t h iteration at time t , wherein ( ω i t ) k is the i t h diagonal entry of W k t .
At each iteration, the value of ( ω i t ) k is updated by ( y j t ) k and ( ω i t ) k 1 . The value of ( y j t ) k + 1 will be updated by ( y j t ) k and ( ω i t ) k . Hence, the weight of the k t h iteration of i t h diagonal entry at time t is given by
( ω i t ) k = 1 { ( e i t ) k } 2 + ε 2 ,
where ( e i t ) k = i t ( y j t ) k b i t .
It is worth noting that the GTRS has no duality gap, and the optimal solution can be derived from the dual solution [32]. ( y j t ) k would be the optimal solution of Equation (16) within a necessary and sufficient condition:
{ ( t ) T W k 1 t t + λ t D } ( y j t ) k = ( t ) T W k 1 t b t λ t f , { ( y j t ) k } T D ( y j t ) k + 2 f T ( y j t ) k = 0 , ( t ) T W k 1 t t + λ t D _ 0 .
The last term of Equation (18) means that ( t ) T W k 1 t t + λ t D is a positive semidefinite. Under the constraint conditions, the problem of Equation (16) is reformulated to figure out the optimal solution of λ t .
ϕ ( λ t ) = { ( y j t ) k ( λ t ) } T D ( y j t ) k ( λ t ) + 2 f T ( y j t ) k ( λ t ) ;
( y j t ) k ( λ t ) = { ( t ) T t + λ t D } 1 { ( t ) T b t λ t f } .
To ensure ( t ) T W k 1 t t + λ t D _ 0 , the optimal of λ t denoted λ t 1 * should be in the interval ξ [32]
λ t 1 * ξ = 1 λ 1 ,
where λ 1 is the largest eigenvalue of { ( t ) T t } 1 2 D { ( t ) T t } 1 2 .
In pursuance of ( y j t ) k , we should figure out λ t * first, which is solved by a bisection approach.
However, only the theoretical convergence is guaranteed from a bisection approach. For the sake of the global convergence of the solution, we exploit BPL [36] in the bisection procedure.
Suppose the estimate of the j t h unknown node in the k t h iteration at time t is ( y j t ) k , and the corresponding weight is W k t . Inspired by [36], the update rule for y j t can be expressed as
( y j t ) k = arg min y j t y j t J ( ( y ^ j t ) k , W k 1 t ) , y j t ( y ^ j t ) k + l k t y j t ( y ^ j t ) k 2 2 subject   to   ( y j t ) T D y j t + 2 f T y j t = 0
where l k t is the Lipschitz constant of y j t J ( y j t , W k 1 t ) .
υ k t = 1 12 l k 1 t l k t ;
( y ^ j t ) k = ( y j t ) k + υ k + 1 t ( ( y j t ) k 1 ( y j t ) k 2 ) .
In general, BPL is a variant of the gradient descent method. Here we use ( y j t ) k as the initial value to figure out the optimal solution y j t * under the update rule and extrapolation factor υ k t [36]. ( y j t ) k + e is the optimal solution y j t * when the conditions below are satisfied:
( l k + e t I n + 1 + λ t D ) ( y j t ) k + e = ( t ) T υ k + e 1 t ( t ( y ^ j t ) k + e b t ) + l k + e t ( y ^ j t ) k + e λ t f ;
{ ( y j t ) k + e } T D ( y j t ) k + e + 2 f T ( y j t ) k + e = 0 , λ t 2 * max { l k + e t , 1 λ 1 } .
It is apparent that the problem in Equation (26) is GTRS, of which λ t 2 * is obtained through iteration processes. Once λ t 2 * is acquired, the corresponding ( y j t ) k + e could be obtained by the first term of Equation (25).
The proposed RNLA method could be expressed in Algorithm for RNLA. (Algorithm 1)
Algorithm 1. Algorithm for RNLA
1. Initiation: A , ε , maximum number of iterations I t e r a t i o n = I t e r a t i o n 1 + I t e r a t i o n 2 , the convergence tolerance δ and ς , and t i m e
2. Calculate the range measurement matrix R
3. for t = 1 : t i m e do
4.  for j = 1 : M do
5.   for i = 1 : N do
6.    Calculate t , b t , D , and f according to Equation (11)
7.   end
8.   Let ( ω i t ) 0 = 1 , i and k = 1
9.   while STOP = FALSE do
10.    Solve Equation (19) with Equation (20) using the bisection approach to figure out λ t 1 * .
11.    Update ( y j t ) k according to Equation (20)
12.    Update ( ω i t ) k according to Equation (17)
13.     if | J ( ( y j t ) k , W k t ) J ( ( y j t ) k 1 , W k 1 t ) | < δ or reach the number of I t e r a t i o n 1 then
14.       STOP←True
15.     else k = k + 1
16.   end
17.   Let l k t = 0 , υ k t = 0
18.   while STOP = FALSE do
19.      Calculate l k t = 2 ( t ) T W k t t F
20.      Calculate υ k t and ( y ^ j t ) k according to Equations (23) and (24)
21.      Figure out λ t 2 * according to Equation (26)
22.      Update ( y j t ) k according to Equation (25)
23.      Update ( ω i t ) k according to Equation (17)
24.       if | ( y j t ) k ( y j t ) k 1 | < ς or reach the number of I t e r a t i o n then
25.          STOP←True
26.       else k = k + 1
27.     end
28.   end
29. end
In addition, a flowchart is presented, as shown in Figure 2, to better understand the process of RNLA.

3.4. Cramer–Rao Low Bound (CRLB)

In this part we will conduct the CRLB, being a covariance matrix representing a lower bound of any unbiased estimators [37], for the location estimate. Same as the above parts, we take the j t h unknown node at time t as an example. Let u ^ j t = [ u ^ j x t , u ^ j y t ] denote the estimated position of the j t h unknown node at time t , and C o v ( u ^ j t ) denote the covariance matrix. Basically, the covariance will meet
C o v ( u ^ j t ) = E { ( u ^ j t u j t ) T ( u ^ j t u j t ) } _ F 1 ,
where F is the Fisher information matrix (FIM), which can be expressed as
F = [ 2 p ( R t | u j t ) 2 u j t ] .
Only two parameters are included in u j t , thus Equation (28) could be rewritten as
F = [ 2 p ( R t | u j t ) 2 u j x t p ( R t | u j t ) u j x t p ( R t | u j t ) u j y t p ( R t | u j t ) u j y t p ( R t | u j t ) u j x t 2 p ( R t | u j t ) 2 u j y t ] .
It is easy to obtain closed-form expressions of F if the noise yields Gaussian distribution. However, in this paper, the noise is not Gaussian distribution due to outlier measurements are engaged. The closed-form expressions are not available. In this matter, a Monte Carlo simulation is employed. Equation (29) can be rewritten as
F = ( 10 ϑ ln 10 ) 2 I η [ i = 1 N ( u j x t a i x t ) ( u j x t a i x t ) u j t a i t 2 4 i = 1 N ( u j x t a i x t ) ( u j y t a i y t ) u j t a i t 2 4 i = 1 N ( u j y t a i y t ) ( u j x t a i x t ) u j t a i t 2 4 i = 1 N ( u j y t a i y t ) ( u j y t a i y t ) u j t a i t 2 4 ] ,
where I η 1 N C s a m p l e = 1 N C [ η p ( η ) s a m p l e ] 2 p 2 ( ( η ) s a m p l e ) denotes the intrinsic error that can be obtained by Monte Carlo simulation. N C denotes the total number of samples in the Monte Carlo simulation. η p ( η ) is the first gradient operator.
Let u ^ j t u j t 2 = e r r o r . The root mean square error (RMSE) is related to the obtained CRLB through
E ( e r r o r 2 ) T r ( F 1 ) C R L B ( u j t ) ,
where T r ( ) is the trace of a matrix.

3.5. Complexity Analysis

The complexity of the algorithm is strongly relative to N and M , specifically, the function of N and M . Assuming that the network is fully connected, the number of connections in the network could be expressed as C = M N + M ( M 1 ) / 2 [38]. At each time slot, the unknown nodes will be located at a time. Since we utilized a non-cooperative scheme, there were no connections among unknown nodes. In this case, if the network was fully connected, the number of connections of the network should be C = M N . For an unknown node (i.e., M = 1 ), let Iteration be the maximum number of steps. At each time slot, the corresponding complexity of RNLA could be linear (i.e., O ( I t e r a t i o n N ) ). In other words, the overall complexity of the network could be O ( I t e r a t i o n M N ) .

4. Numerical Simulations

In this section, several experiments were carried out in different scenarios in Matlab R2018b to verify the effectiveness of RNLA. The simulation area was 500 × 500 m2, wherein the depth of water was 40 m, and the length of the anchor chain was 50 m. Basically, if data were collected for the wind speed and the level of the wave, the corresponding mobility model for sensor nodes could be acquired after analyzing the interactive force exerted on the nodes. Hence, due to absence of the data, we assumed all nodes were movable in a random walk model in the restricted area with a velocity of 2 m/s. We set the number of outlier measurements as N × β varying from the anchor nodes. The number of Monte Carlo simulations was 100, where N C = 1000 . The distribution of outlier measurements could be a uniform distribution, an exponential distribution, a Rayleigh distribution, etc. Here, in this paper, we assumed the distribution of outlier measurements was a uniform distribution (considering it was convenient) in which the assumption was commonly exploited in many works [39,40,41,42]. For example, the authors in [40] constructed a deep regression model with the use of a Gaussian-uniform mixture model to deal with the outliers. The authors in [41] modeled the distribution of the measurement as a Gaussian-uniform mixture in order to handle the severe performance degradation under interference. In this paper, the uniform distribution follows ( 500 2 , 500 2 ) . CRLB and three methods—the method Directly Squaring Least Square (DS-LS) mentioned in [11], the method Weighted Least Square-Known parameters (WLS-K) proposed in [20], and the method called Weighted Triangle Centroid Algorithm (WTCA) proposed in [43]—as comparisons were involved. The reason that we chose these three methods was that they were proposed for localization using RSSI in OSNs. In addition, DS-LS and WLS-K converted the localization problem into an optimization framework, which was one of the contributions of the paper, though the optimization functions were different. Moreover, WLS-K basically could be recognized as the common solution for GTRS, wherein we combined a bisection approach and the BPL method to solve GTRS in this paper. Although WTCA did not convert the localization problem into an optimization framework, this method was from our previous work that considered the high dynamics of the ocean environment. In this paper, we calibrated localization accuracy by RMSE, which can be expressed as
R M S E = 1 M t i m e t = 1 t i m e j = 1 M ( u j x t u ^ j x t ) 2 + ( u j y t u ^ j y t ) 2 .

4.1. Scenario with Variable Anchor Nodes

In this part, the simulation was executed under variable anchor nodes. The corresponding parameters were as follows: M = 100, σ = 2 m, and β = 0.4.
The performances of different methods under variable anchor nodes are indicated in Figure 3. As expected, the performance of the methods improved by increasing the number of anchor nodes. This was because more measurement information was provided for unknown nodes as the number of anchor nodes grew. However, because there were outlier measurements, the performances of the methods were inconsistent. DS-LS was affected mostly because a direct squaring strategy was utilized in the method, in which the performance depended on relative, accurate measurements. As for WTCA, the method was a microelectromechanical system (MEMS)-aided algorithm, where the accumulated error grew as time passed. Thus, the performance was worse than WLS-K, wherein an iterative reweighed method was used, which alleviated the influence of outlier measurements on localization (in a way). Nevertheless, because robust functions and the BPL method were used, the negative influence of outlier measurements received by the unknown nodes reduced gradually at each iteration. Hence, RNLA outperformed the other three methods and was close to CRLB.

4.2. Scenario with Variable β

In this scenario, the contamination ratio β was changeable. Parameters were set as: N = 20, M = 100, and σ = 2 m.
In Figure 4, we can see that the performances of all methods deteriorated during an increase of β , or equivalently, the rise of outlier measurements. The performance of DS-LS was the worst in comparison because outlier measurements influenced the ranging. The same situation occurred in WTCA, though the performance was better than DS-LS. It should be noted that, because of the accumulated error resulting from MEMS, the deterioration ratio of WTCA was larger than DS-LS. The ratio of WLS-K augmented over the increase of β as well. When the value of β was small, close performances were exhibited between WLS-K and RNLA. This was because the iterative reweighed strategy worked at a few outlier measurements. However, the difference became more distinguishable as β increased. The optimal parameter conducted by robust functions worked at each iteration when β increased. Hence, though localization accuracy was getting worse, the deterioration ratio of RNLA decreased significantly, and the performance was better than others.

4.3. Scenario with Variable σ

In this part, simulations were carried out under variable σ with or without outlier measurements. In addition, to verify the effectiveness of the robust functions, WLS-K-Robust was conducted in the simulations. Parameters were set as: N = 20, M = 100, and β = 0 or β = 0.4.
According to Equation (7), if β = 0, the second term of Equation (7) is equal to zero, meaning that there are no outlier measurements. Hence, the scenario in Figure 5a indicates the localization without outlier measurements. Another one, Figure 5b, is the scenario of localization with outlier measurements.
In Figure 5, the performance of WTCA was significantly worse than others while σ increased if the outlier measurements engaged or not. On the contrary, DS-LS performed well, close to RNLA, and outperformed WLS-K, WLS-K-Robust, and WTCA (Figure 5a), although it performed badly in the presence of outlier measurements shown in Figure 5b. Regarding WLS-K, whether the robust functions engaged had a divergent performance. In Figure 5a,b, WLS-K-Robust worked more steadily or even better than WLS-K. Besides, we knew that the robust functions could alleviate the adverse effect of σ on localization from Figure 5b. Over and above the robust functions, RNLA integrated with BPL, which further improved performance and outperformed the others in the presence or absence of outlier measurements.

4.4. Cumulative Distribution Function (CDF)

In order to demonstrate the effectiveness of the proposed method further, we conducted the simulation of CDF shown in Figure 6. Resulting from the increase of accumulated error by MEMS, it was unfair to make a comparison for WTCA. Accordingly, only WLS-K, WLS-K-Robust, and DS-LS were involved in this part.
Despite the performance of DS-LS, which was strongly sensitive to outlier measurements and the worst one in Figure 6, we focused more on the other three methods. Figure 6 shows that RNLA beat WLS-K and WLS-K-Robust, improving the localization accuracy by more than 12 m and 35 m when N = 50 and N = 20, respectively, on average. We can also see that RNLA achieved error < 20 m and error < 50 m at 100% when N = 50 and N = 20, respectively, whereas others attained the same probability in the case of error 30 m and error 70 m respectively.

4.5. Computation Time

Computation time, or equivalently computation efficiency, was another factor to calibrate the performance of the methods, apart from the localization accuracy. Unfortunately, RNLA was not flawless. In Figure 7, the computation time in some situations was not satisfactory, though it had an outstanding localization accuracy with or without outlier measurements as shown in Figure 3 to Figure 6. It should be noted that WTCA was a MEMS-aided algorithm, wherein only one-time localization was carried out. After one-time localization, acquiring the location was the task of MEMS. Thus, the scheme was almost a real-time one. This was the reason we did not compare WTCA computation times in Figure 7.
The maximum number of iterations of RNLA that we set in the simulation was 1000. In Figure 7, we saw that the robust functions could improve the computation efficiency, besides improving the localization accuracy, in the presence of outlier measurements. DR-LS was the most efficient one in all scenarios, whereas RNLA was the worst one, on average. This was because the BPL, a method to figure out the global solution, involved RNLA, which needed extra time for searching. However, the computation time of RNLA was less than WLS-K and WLS-K-Robust when N 20 (in the first scenario) and less than WLS-K, close to WLS-K-Robust, in the second scenario (variable β ). Hence, if the area of interest did not have enough anchor nodes engaged in localization, expecting to have a good performance in the presence of outlier measurements simultaneously, RNLA seemed to be the better one to locate the unknown nodes. But if the environment was ideal (no outlier measurements), of course, there was no doubt that DR-LS was the best choice. Although the computational efficiency was not satisfactory in comparing DR-LS, WLS-K, and WLS-K-Robust, the average time for computation was 2.4 s, which was far less than our previous cooperative work in [10].

5. Conclusions

In this paper, a practical localization method named RNLA using RSSI in the presence of outlier measurements in OSNs was proposed. The localization problem was formulated firstly using a log-normal shadowing model and the first-order Taylor series. However, there were non-Gaussian outlier measurements, which the maximum likelihood estimator could not function well with. Thus, we then converted the original localization problem into an optimization problem using squared range and WLS, albeit in a nonconvex form. Furthermore, integrated robust functions with the optimization problem, a GTRS framework, was conducted. To obtain the global optimal solution, BPL was incorporated with a bisection procedure. In addition, CRLB was acquired to evaluate the proposed method. Several experiments were executed under variable parameters and compared to other methods. Because the robust functions and the BPL method (a method for searching the global solution) were engaged in the algorithm, the negative influence of outlier measurements on localization gradually reduced after iteration. Therefore, RNLA outperformed the others, though the computation time was a little bit longer than some of them in some scenarios. In future work, we will verify the proposed method in a real situation, considering more dynamic scenarios. In addition, methods with less computation times will be investigated in OSNs in the future.

Author Contributions

X.M. wrote the paper, designed the description framework, and conducted the simulations. H.W. proposed the main ideas, provided guidance for the work, reviewed the paper, and acquired funding. J.X., B.C., and H.Z. assisted in testing the code and checked the paper carefully. X.L. provided guidance for the paper.

Funding

This work was supported by the National Natural Science Foundation of China (Grant No. 51579143, 61701299,51709167), the Ministry of education of Humanities and Social Science project (Grant No. 15YJC630145), the Shanghai Committee of Science and Technology, China (Grant No. 18040501700), and the Postgraduate Innovation Foundation of Shanghai Maritime University (Grant No. 2017ycx030, 2016ycx042).

Acknowledgments

We thank the anonymous reviewers for their critical comments and suggestions to improve the manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Yue, Y.G.; He, P. A Comprehensive Survey on the Reliability of Mobile Wireless Sensor Networks: Taxonomy, Challenges, and Future Directions. Inf. Fusion 2018, 44, 188–204. [Google Scholar] [CrossRef]
  2. Wu, H.; Xian, J.; Mei, X.; Zhang, Y.; Wang, J.; Cao, J.; Mohapatra, P. Efficient target detection in maritime search and rescue wireless sensor network using data fusion. Comput. Commun. 2019, 136, 53–62. [Google Scholar] [CrossRef]
  3. Wu, H.; Xian, J.; Wang, J.; Khandge, S.; Mohapatra, P. Missing data recovery using reconstruction in ocean wireless sensor networks. Comput. Commun. 2018, 132, 1–9. [Google Scholar] [CrossRef]
  4. Chen, X.; Wang, S.; Shi, C.; Wu, H.; Zhao, J.; Fu, J. Robust Ship Tracking via Multi-view Learning and Sparse Representation. J. Navig. 2019, 72, 176–192. [Google Scholar] [CrossRef]
  5. Russell, J. Ocean sensors can track progress on climate goals. Nature 2018, 555, 287. [Google Scholar] [CrossRef] [PubMed]
  6. John, P.; Supriya, M.H.; Pillai, P.R.S. Cost effective sensor buoy for ocean environmental monitoring. In Proceedings of the OCEANS 2010 MTS/IEEE SEATTLE, Seattle, WA, USA, 20–23 September 2010; pp. 1–5. [Google Scholar]
  7. Chen, P.; Ma, H.; Gao, S.; Huang, Y. SSL: Signal Similarity-Based Localization for Ocean Sensor Networks. Sensors 2015, 15, 29702–29720. [Google Scholar] [CrossRef] [Green Version]
  8. Shit, R.C.; Sharma, S.; Puthal, D.; Zomaya, A.Y. Location of Things (LoT): A Review and Taxonomy of Sensors Localization in IoT Infrastructure. IEEE Commun. Surv. Tutor. 2018, 20, 2028–2061. [Google Scholar] [CrossRef]
  9. Luo, J.; Fan, L.; Wu, S.; Yan, X. Research on Localization Algorithms Based on Acoustic Communication for Underwater Sensor Networks. Sensors 2018, 18, 67. [Google Scholar] [CrossRef]
  10. Wu, H.; Mei, X.; Chen, X.; Li, J.; Wang, J.; Mohapatra, P. A novel cooperative localization algorithm using enhanced particle filter technique in maritime search and rescue wireless sensor network. ISA Trans. 2018, 78, 39–46. [Google Scholar] [CrossRef]
  11. Poursheikhali, S.; Zamiri-Jafarian, H. Received signal strength based localization in inhomogeneous underwater medium. Signal Process. 2019, 154, 45–56. [Google Scholar] [CrossRef]
  12. Mridula, K.M.; Ameer, P.M. Localization under anchor node uncertainty for underwater acoustic sensor networks. Int. J. Commun. Syst. 2018, 31, e3445. [Google Scholar] [CrossRef]
  13. Moreno-Salinas, D.; Pascoal, A.; Aranda, J. Optimal Sensor Placement for Acoustic Underwater Target Positioning With Range-Only Measurements. IEEE J. Ocean. Eng. 2016, 41, 620–643. [Google Scholar] [CrossRef]
  14. Yan, J.; Zhang, X.; Luo, X.; Wang, Y.; Chen, C.; Guan, X. Asynchronous Localization With Mobility Prediction for Underwater Acoustic Sensor Networks. IEEE Trans. Veh. Technol. 2018, 67, 2543–2556. [Google Scholar] [CrossRef]
  15. Guo, Y.; Han, Q.; Wang, J.; Yu, X. Energy-aware localization algorithm for Ocean Internet of Things. Sens. Rev. 2018, 38, 129–136. [Google Scholar] [CrossRef]
  16. Emokpae, L.E.; DiBenedetto, S.; Potteiger, B.; Younis, M. UREAL: Underwater Reflection-Enabled Acoustic-Based Localization. IEEE Sens. J. 2014, 14, 3915–3925. [Google Scholar] [CrossRef]
  17. Yan, Y.; Wang, H.; Shen, X.; Leng, B.; Li, S. Efficient Convex Optimization for Energy-Based Acoustic Sensor Self-Localization and Source Localization in Sensor Networks. Sensors 2018, 18, 1646. [Google Scholar] [CrossRef]
  18. Moreno-Salinas, D.; Pascoal, A.M.; Aranda, J. Multiple underwater target positioning with optimally placed acoustic surface sensor networks. Int. J. Distrib. Sens. Netw. 2018, 14. [Google Scholar] [CrossRef] [Green Version]
  19. Mortazavi, E.; Javidan, R.; Dehghani, M.J.; Kavoosi, V. A robust method for underwater wireless sensor joint localization and synchronization. Ocean Eng. 2017, 137, 276–286. [Google Scholar] [CrossRef]
  20. Chang, S.; Li, Y.; He, Y.; Hui, W. Target Localization in Underwater Acoustic Sensor Networks Using RSS Measurements. Appl. Sci. 2018, 8, 225. [Google Scholar] [CrossRef]
  21. Lefort, R.; Real, G.; Drémeau, A. Direct regressions for underwater acoustic source localization in fluctuating oceans. Appl. Acoust. 2017, 116, 303–310. [Google Scholar] [CrossRef]
  22. Gong, Z.; Cheng, L.; Fan, J. AUV-Aided Joint Localization and Time Synchronization for Underwater Acoustic Sensor Networks. IEEE Signal Process. Lett. 2018, 25, 477–481. [Google Scholar] [CrossRef]
  23. Luo, J.; Fan, L. A Two-Phase Time Synchronization-Free Localization Algorithm for Underwater Sensor Networks. Sensors 2017, 17, 726. [Google Scholar] [CrossRef] [PubMed]
  24. Das, A.P.; Thampi, S.M. Fault-resilient localization for underwater sensor networks. Ad Hoc Netw. 2017, 55, 132–142. [Google Scholar] [CrossRef]
  25. Li, Y.; Wang, Y.; Guan, X. Belief Propagation Based Multi-AUV Cooperative Localization in Anchor-free Environments. In Proceedings of the 2018 Fourth Underwater Communications and Networking Conference (UComms), Lerici, Italy, 28–30 August 2018. [Google Scholar]
  26. Mei, X.; Wu, H.; Chen, Y.; Jiang, E. Ship tracking of wireless sensor network based on improved adaptive particle filter. J. Shanghai Marit. Univ. 2018, 39, 12–16. [Google Scholar]
  27. Zaeemzadeh, A.; Joneidi, M.; Shahrasbi, B.; Rahnavard, N. Robust Target Localization Based on Squared Range Iterative Reweighted Least Squares. In Proceedings of the 2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), Orlando, FL, USA, 22–25 October 2017; pp. 380–388. [Google Scholar]
  28. Pinheiro, B.C.; Moreno, U.F.; De Sousa, J.T.B.; Rodriguez, O.C. Kernel-Function-Based Models for Acoustic Localization of Underwater Vehicles. IEEE J. Ocean. Eng. 2017, 42, 603–618. [Google Scholar] [CrossRef]
  29. Saeed, N.; Al-Naffouri, T.Y.; Alouini, M.S. Outlier Detection and Optimal Anchor Placement for 3-D Underwater Optical Wireless Sensor Network Localization. IEEE Trans. Commun. 2019, 67, 611–622. [Google Scholar] [CrossRef]
  30. Soares, C.; Gomes, J.; Ferreira, B.Q.; Costeira, J.P. LocDyn: Robust Distributed Localization for Mobile Underwater Networks. IEEE J. Ocean. Eng. 2017, 42, 1063–1074. [Google Scholar] [CrossRef] [Green Version]
  31. Brockett, P.L.; Hinich, M.; Wilson, G.R. Nonlinear and non-Gaussian ocean noise. J. Acoust. Soc. Am. 1987, 82, 1386. [Google Scholar] [CrossRef]
  32. More, J.J. Generalizations of the trust region problem. Optim. Methods Softw. 1993, 2, 21. [Google Scholar] [CrossRef]
  33. Peng, H.; Fan, Y. A General Framework for Sparsity Regularized Feature Selection via Iteratively Reweighted Least Square Minimization. In Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, San Francisco, CA, USA, 4–9 February 2017. [Google Scholar]
  34. Lerman, G.; Maunu, T. Fast, Robust and Non-convex Subspace Recovery. arXiv 2018, arXiv:1406.6145. [Google Scholar] [CrossRef]
  35. Huber, P.J. Robust statistics. J. Am. Stat. Assoc. 2011, 78, 1248–1251. [Google Scholar]
  36. Xu, Y.; Yin, W. A Globally Convergent Algorithm for Nonconvex Optimization Based on Block Coordinate Update. J. Sci. Comput. 2017, 72, 700–734. [Google Scholar] [CrossRef] [Green Version]
  37. Sengupta, S.K. Fundamentals of Statistical Signal Processing: Estimation Theory. Technometrics 1995, 37, 465–466. [Google Scholar] [CrossRef]
  38. Tomic, S.; Beko, M.; Dinis, R. 3-D Target Localization in Wireless Sensor Networks Using RSS and AoA Measurements. IEEE Trans. Veh. Technol. 2017, 66, 3197–3210. [Google Scholar] [CrossRef]
  39. López-Rubio, E. Restoration of images corrupted by Gaussian and uniform impulsive noise. Pattern Recognit. 2010, 43, 1835–1846. [Google Scholar] [CrossRef]
  40. Lathuilière, S.; Mesejo, P.; Alameda-Pineda, X.; Horaud, R. DeepGUM: Learning Deep Robust Regression with a Gaussian-Uniform Mixture Model. arXiv 2018, arXiv:1808.09211. [Google Scholar]
  41. De Angelis, A.; De Angelis, G.; Carbone, P. Using Gaussian-Uniform Mixture Models for Robust Time-Interval Measurement. IEEE Trans. Instrum. Meas. 2015, 64, 3545–3554. [Google Scholar] [CrossRef]
  42. Nagy, I.; Suzdaleva, E. Clustering Non-Gaussian Data Using Mixture Estimation with Uniform Components BT—Practical Issues of Intelligent Innovations. In Practical Issues of Intelligent Innovations; Sgurev, V., Jotsov, V., Kacprzyk, J., Eds.; Springer International Publishing: Cham, Switzerland, 2018; pp. 313–330. ISBN 978-3-319-78437-3. [Google Scholar]
  43. Wu, H.; Yang, L.; Liu, L.; Xu, M.; Guan, X. Real-time localization algorithm for maritime search and rescue wireless sensor network. Int. J. Distrib. Sens. Netw. 2013, 2013, 188–192. [Google Scholar] [CrossRef]
Figure 1. Restricted area for moving sensor nodes.
Figure 1. Restricted area for moving sensor nodes.
Sensors 19 02708 g001
Figure 2. Flowchart of the robust, non-cooperative localization algorithm (RNLA). RSSI = received signal strength indication.
Figure 2. Flowchart of the robust, non-cooperative localization algorithm (RNLA). RSSI = received signal strength indication.
Sensors 19 02708 g002
Figure 3. Root mean square error (RMSE) under variable anchor nodes. CRLB = Cramer–Rao low bound. Directly Squaring Least Square = DS-LS. Weighted Triangle Centroid Algorithm = WTCA. Weighted Least Square-Known parameters = WLS-K.
Figure 3. Root mean square error (RMSE) under variable anchor nodes. CRLB = Cramer–Rao low bound. Directly Squaring Least Square = DS-LS. Weighted Triangle Centroid Algorithm = WTCA. Weighted Least Square-Known parameters = WLS-K.
Sensors 19 02708 g003
Figure 4. RMSE under variable β .
Figure 4. RMSE under variable β .
Sensors 19 02708 g004
Figure 5. RMSE under variable σ : (a) Localization performance without outlier measurements, and (b) Localization performance with outlier measurements.
Figure 5. RMSE under variable σ : (a) Localization performance without outlier measurements, and (b) Localization performance with outlier measurements.
Sensors 19 02708 g005
Figure 6. Cummulative distribution function (CDF) of different methods.
Figure 6. Cummulative distribution function (CDF) of different methods.
Sensors 19 02708 g006
Figure 7. The computation times of different methods under different conditions: (a) Computation times under variable anchor nodes, (b) Computation times under variable β , (c) Computation times under variable σ without outlier measurements, and (d) Computation times under variable σ with outlier measurements.
Figure 7. The computation times of different methods under different conditions: (a) Computation times under variable anchor nodes, (b) Computation times under variable β , (c) Computation times under variable σ without outlier measurements, and (d) Computation times under variable σ with outlier measurements.
Sensors 19 02708 g007

Share and Cite

MDPI and ACS Style

Mei, X.; Wu, H.; Xian, J.; Chen, B.; Zhang, H.; Liu, X. A Robust, Non-Cooperative Localization Algorithm in the Presence of Outlier Measurements in Ocean Sensor Networks. Sensors 2019, 19, 2708. https://doi.org/10.3390/s19122708

AMA Style

Mei X, Wu H, Xian J, Chen B, Zhang H, Liu X. A Robust, Non-Cooperative Localization Algorithm in the Presence of Outlier Measurements in Ocean Sensor Networks. Sensors. 2019; 19(12):2708. https://doi.org/10.3390/s19122708

Chicago/Turabian Style

Mei, Xiaojun, Huafeng Wu, Jiangfeng Xian, Bowen Chen, Hao Zhang, and Xia Liu. 2019. "A Robust, Non-Cooperative Localization Algorithm in the Presence of Outlier Measurements in Ocean Sensor Networks" Sensors 19, no. 12: 2708. https://doi.org/10.3390/s19122708

APA Style

Mei, X., Wu, H., Xian, J., Chen, B., Zhang, H., & Liu, X. (2019). A Robust, Non-Cooperative Localization Algorithm in the Presence of Outlier Measurements in Ocean Sensor Networks. Sensors, 19(12), 2708. https://doi.org/10.3390/s19122708

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop