1. Introduction
Freshwater supply has decreased due to the continuous waste production from industrial sewage, agriculture, and other human and animal activities. Even though around 73% of the Earth’s surface is covered with water, only about 2.1% is available freshwater [
1,
2]. A sufficient clean water supply is essential for producing crops, habitat conservation, soil formation, and the cycling of nutrients [
1]. If drinking water is contaminated due to a biological or a chemical substance, it can lead to the formation of contagious illnesses, such as pneumonia, hepatitis, and gastric ulcers [
3,
4]. Lead (Pb), mercury (Hg), cadmium (Cd), and arsenic (As), and other hazardous heavy metal substances can also be found in water sources. Another area of concern in monitoring water quality is the residence of microbes in the water supply, which can expose humans and the entire water ecology to a significant danger [
1]. Hence, the advancement of ultra-sensitive and rapid detection techniques is critical in effectively safeguard the available clean water supply worldwide.
During the past two decades, numerous research has been done to construct more effective methods to detect contamination with low operating costs and energy. In the past, water supply contaminants were manually detected in water laboratory sites where contamination analysis was carried out at the laboratory level [
5]. Frequently used instruments in detecting contamination are capillary electrophoresis, field-flow fractionation, mass spectrometry, and multiple fermentation tube techniques [
1]. Recent technological advancements in biosensor procedures and analytical chemistry improved the sensitivity and accuracy of detection assays. Some of these technological developments include water quality sensors [
6], model-based event detection [
7], and advanced spectroscopy [
8]. Other contamination detection methods include sensor placement approach [
9], Microfluidics sensors [
10], biosensors [
11], and light emission [
12,
13]. There are several types and applications of touching monitoring systems. Mobile and static sensors are employed to acquire real-time information about the underground and pipeline water supply. The mobile sensors are positioned inside the system at the starting source point and continue to migrate until the sink point has been reached. The data are stored in the memory of the mobile sensor and transmitted to the backend system (central processing system) for more advanced analysis. The collected information can be correlated with the sensor’s location to create a real-time mapping of the observations in the tested system [
2]. As a real-time assessment for sampling and analysis, online sensor monitoring provides a broader data frequency than the traditional sample-based method. Additionally, online monitoring is flexible and can be conducted remotely while still retaining a faster response rate. Online monitoring systems based on Wireless Sensor Network (WSN) provide sufficient datasets, straightforward monitoring assessment, simultaneous data measurements, and higher sensitivity and detection accuracy [
1]. An online monitoring system based on WSN consists of monitoring centers, base stations, and information monitoring nodes [
14]. In addition, the usage of WSN lowers the consumption of power which lowers the operational cost associated with running the system [
15]. The typical design of a sensor network incorporates a low-power processor, a sensor interface, and a wireless communication module [
1]. Some WSN utilizations have been used in monitoring water quality [
1,
16]. For example, Wu et al. [
17] devised a self-powered transportable sensor that detects pH and disinfectant-related ions levels in water distribution pipelines in real-time. For highly dynamic systems, such as biological and chemical contamination monitoring in underground or underwater systems with more diverse topologies, it is recommended to use a centralized processing algorithm that provides more accurate location information when compared to distributed processing algorithms [
2]. The aggregated data can be used to find a time-based pattern of data distribution. The main goal of sensor distribution is to adequately cover the maximal space of the tested system (such as underground water supply). This centralized exploitation technique applies WSNs with sensors dispersed in a small area and has inadequate reliability due to loss in accumulated data resulting from multi-hop transactions [
2]. Moreover, this approach requires an enormous amount of energy and bandwidth consumption [
18].
The reliability of remote sensing devices depends on the lifetime requirements of different applications and the energy storage capacity of sensor nodes [
19]. Therefore, a more compact sensor design with low energy consumption modules is highly appreciated for successful long-term wireless network surveillance. An efficient long-life power source is important to run the different modules in the mobile sensor (sensor interface module, actuation module, and signal transmission module). The interface and actuation systems depend on the application type and nature of the media (liquid/gas).
For successful underground explorations and remote surveillance, the wireless coverage of mobile sensors should be adequate to ensure reliable real-time connectivity. However, devices with very high-frequency (VHF)/ultra-high frequency (UHF) radio equipment may not be as effective underground as aboveground due to signal fading and high multipath propagation [
20]. Theoretically, the amount of power required for successful communications between two network terminals (nodes) is equivalent to the effective aperture of the receiving antenna at a distance
d from the antenna transmitting signal [
21,
22]. The simplest form to predict the best case received signal power is
where:
represents the power fed into the transmitting antenna input terminals,
serves as the power available at receiving antenna output terminals,
is the wavelength of the radio frequency,
n represents the path loss exponent,
and
are the antenna directivities of the transmitting and receiving antennas, respectively.
Many factors can cause the received signal power to be lower than the simple form of the Formula (
1), such as an obstructed link due to buildings, trees, hills, earth curvature, atmospheric attenuation, and antenna misalignment [
23]. By ignoring the noise and interference of the telecommunication signal and assuming that the transmitter/receiver antenna is an absorption-less medium, Equation (
1) can be reduced to the following equation:
where
C is a constant that depends on the antenna directivity and the wavelength. From Equation (
2), it can be concluded that the required transmission power
is directly proportional with at least the square of the distance between the nodes’ antennas, assuming the received power
is more than the minimum threshold power of successful communication for the used sensors.
This work suggests a new generation of wireless low-range transmission sensors with an efficient sequential localization algorithm that can run based on minimal data transmission power rate between the deployed sensors, to estimate a real-time mobile sensor distribution pattern inside the tested system.
WSN Localization Problem
Accurate and seamless localization processes are essential requirements in any positioning method regardless of their applications. In any sensor network, the ability of sensors to use the inter-node measurements to self-localize is a crucial step for its successful application in different fields, such as surveillance, pollution, traffic monitoring, health care, target detection, and water contamination [
24,
25,
26,
27,
28,
29]. Wireless sensor networks can be deployed in varied localization scenarios. The physical observations, inter-node Time of Arrival (TOA) distances, can be exploited to construct the relative positions of the sensor nodes along with the reflection, translation, and rotation uncertainties [
30]. Information about the positions of some reference nodes is often needed to attain the absolute locations of the unknown nodes.
Typically, distributed sensor networks involve hundreds or thousands of robust, tiny, robust, densely distributed, and moving or stationary sensors employed in various modern applications. In addition, efficient sensor devices must satisfy specific essential criteria, such as long battery life, lightweight, affordability, availability, and low manufacturing cost.
Many approaches have been suggested for self-localization techniques in the literature. The authors of [
31] applied a successive closed-form primitive algorithm for a new scheme to improve the positioning of pseudo anchors based on the TOA localization of the entire network. The authors of [
32,
33] proposed an iterative multilateration approach by considering some TOA measurements from the pseudo anchors and anchors to achieve a distributed localization. Sequentially, the sensors that located themselves become pseudo anchors for the following localization process for sensor nodes that exhibit TOA connectivity. For a particular issue, the authors of [
34] introduced an unknown realistic environmental model algorithm that required large sensor networks with minimal communication range with only several reference nodes. The introduced algorithm is based on Gauss–Newton’s approach and reduced the complexity significantly through specific problem assumptions. In more recent applications, the authors of [
35] presented joint synchronization based on time difference of arrival (TDOA) and localization algorithm for asynchronous networks. The suggested approach has been drawn in three stages: least square estimation (LSE) based on TDOA observations, maximum likelihood localization (MLE) of reference nodes, and LSE estimation at clock offsets under the Gaussian noise model. Targets can be located by a single transmission, which leads to a reduction in power emission. For further enhanced observations in radar, microphone array, sonar, and particularly in passive scenarios, the authors of [
36] developed two TDOA algebraic properties in sensor network and simultaneous source–sensor localization problem. Singular value decomposition, geometrical knowledge, and low rank property were exploited to improve the qualities of the TDOA, which led to a higher positioning accuracy. The authors of [
37] applied two stages of WLS based on time delay elliptic observations for MIMO radar systems. Fewer sensors (transmitters or receivers) have been conducted in the implementation and experiments. By exploiting the nuisance parameter from the first stage, applying the second stage improves the performance of the localization process.
This work takes a new path to solve the localization problem by using a new generation of sensors. In particular, we explore a strategy to build a method for finding a solution using (time delay) elliptic and frequency range observations in a two-dimensional case. Closed-form single node localization with sensor position refinement algorithms is proposed for the self-localization scenario, which is extended from the solution in [
38]. We begin with a description of the problem and then propose a processing framework for inaccessible and unknown systems by applying two-step weighted least-squares minimization. Finally, a performance comparison of the proposed approach with the CRLB accuracy is made. To the best of our knowledge, the use of elliptic time delay and frequency observations for discovering unreachable natural environments has not been proposed or investigated before. The proposed solution is simple, accurate, effective and more realistic. The developed single-node closed-form solution is appealing since it does not demand initial guesses (since the system is completely unknown), and it is computationally efficient (suitable for a large number of WSN), making it an ideal candidate approach to solving the problem at hand. Another leverage in applying the proposed method is its localization performance that can reach the Cramer–Rao lower bound (CRLB) accuracy through additional measurements of anchor nodes in low and medium noise levels under inaccessible systems. The proposed solution can also act as an initialization for the iterative MLE for further enhancement as needed.
The paper is structured as follows.
Section 2 formulates the localization problem.
Section 3 proposes the method that applies the nonlinear least squares technique.
Section 4 depicts the framework of the sequential localization.
Section 5 reports the performance evaluation and the simulation results in the 2-D case.
Section 5 also presents the performance comparison with the CRLB accuracy.
Section 6 draws the conclusion and future work.
2. Problem Formulation
Our goal is to identify the positions of many unknown sensors
M as accurately as possible using time delay and frequency range measurements amidst the challenging narrow number of reference points and the low-range transmission signal. Time delay elliptic and frequency range measurements are utilized to locate the unknown nodes. Elliptic positioning is an active localization technique that requires a transmitter to send out a signal. The asynchronous mode is an important advantage of elliptic positioning over TOA and TDOA [
29]. TDOA can be obtained by cross-correlating the two received signals and used for non-cooperative and passive positioning [
39]. However, in both methods, differences in the frequency measurements can be exploited to enhance the accuracy of the localization process. The proposed method employs wireless sensors deployed on a 2-D plane. This method has a straightforward extension for the more general 3-D case. The problem is to determine sequentially the positions of
M unknown sensors with
N known reference/anchor nodes in the
K dimensional space,
or 3, where all unknown sensors are identical and have the same communication range
R. The anchors can be placed in the system’s entrance and/or exit points and have the same communication range as the other nodes in the sensor network. Our scenario uses single sensor node localization, followed by a refinement stage to enhance its accuracy. This process is repeatedly applied for each unknown sensor inside a certain cluster, as discussed in the following sections, until the last unknown sensor has been localized, which ultimately leads to an exploration of the hidden tunnel environment.
For simplicity of the presentation, the position and velocity of the unknown sensor to be localized are denoted by
and
. The noisy time delay elliptic measurement can be written as follows
where
and
.
In Equation (
3),
represents reference transmitter,
is the elliptic distance which is a summing of two TOAs between
and the
sensor through unknown sensor
, the symbol
denotes the Euclidean norm,
means the true value of measurement, and
is a realization of an independent and identically distributed (i.i.d.) Gaussian random variable with zero mean that represents the measurement noise. Each measurement in Equation (
3) generates an ellipse/ellipsoid with foci at
and
that tracks the possible locations of the object in the 2-D/3-D case, respectively [
28,
39].
Figure 1 illustrates an elliptic scenario. The source reflects the emitted signal from a transmitter, and a receiver captures the reflected signal to locate the source after detection and classification processes [
29]. For the 2-D case, the reflected signal’s propagation time defines an ellipse shape of possible source locations foci that represent the transmitter and receiver positions, as shown in the following figure. As the time delay elliptic measurement and distance are equivalent, we will use them interchangeably for our problem.
These measurements are taken and internally stored when the swarm of sensors fully captures the unknown system’s topology. The above elliptic technique can operate without synchronization requirement between the transmitter and the receiver [
30,
40].
The intersection of three or more ellipses yields the target location estimate. However, obtaining the intersection is not straightforward due to the highly nonlinear relationship between the measurements and the unknown target location [
28,
29,
38]. When the frequency differences of the measurements are available, resulting from the relative motion between the source and receivers, we can improve the accuracy of the position estimate and identify the source velocity [
38,
39].
3. Proposed Node Localization Method
This method is an extension of the work [
38] that employed the TDOA and FDOA measurements. In our sensor network application, we have applied time delay and frequency range (elliptic) techniques. The sensor network consists of
M unknown sensors that need to be determined and
N anchors that are placed at precisely known positions, where
. The proposed method uses several assumptions: (i) at least three anchors/pseudo anchors do not lie on a straight line, (ii) at least three noncollinear anchors have a connection with the sensor that needs to be localized, (iii) the noises in the range of measurements are independent of each other, (iv) the standard deviation of the noise is marginal compared to the actual time delay and frequency range (elliptic) values for simplification purpose. We have followed the same steps in [
38] starting from Equation (
3) for the two-dimensional case. The true elliptic distances of Equation (
3) can be written as
The transmitter
is assumed to be any node in the anchor group. Connectivity knowledge is important when grouping the anchors in the range of unknown sensors that need to be localized. Upon rewriting Equation (
4) as
, squaring both sides, and substituting for
and
, we arrive at a set of elliptic equations:
The above elliptic equations alone allow computing the estimation of source position without the velocity, and they may not be sufficient to provide adequate accuracy to the position estimation [
38,
41]. Hence, the frequency range measurements are used to enhance the position estimate accuracy and evaluate the unknown sensor velocity.
The time derivative of
expresses the relationship between sensor location parameters and the rate of the range [
38]:
Taking the time derivative of Equation (
5) and rearranging it again, we arrive at a set of frequency range measurement equations:
In the presence of elliptic range and frequency range noise, replacing the true range and range rate in Equations (
5) and (
7) by their noisy values and rearrangement, leads to an error vector equation:
where the vector
contains the unknown source location parameters and two nuisance variables
and
, and
where
is a
zero vector. Notice that second-order error terms have been disregarded. Hence, in the first stage processing, the weighted LS solution of
is
and
where
expresses a positive definite weighting matrix. According to the assumption (iv), the
is zero mean asymptotically at
. Hence,
is asymptotically unbiased. Next, we use Equations (
10) and (
11) to enhance the accuracy of the sensor node position estimate
.
From the first stage of WLS, we have
is an estimator of
and
is an estimator of
. To this end, we construct another set of equations after applying the second stage of WLS and rearranging them by some simplification yields:
where
and
where
is the Hadamard product operator,
are zero and unity vectors of
, respectively, and
are identity and zero matrices of
, respectively. Applying WLS again to minimize the weight of the second norm of
, with a positive definite matrix
, produces
The
that attains the minimum parameter variance of
is
[
42]. After ignoring the second-order error terms, multiplying Equation (
13) with its transpose, taking the expectation value and inverting it, gives the weighting matrix
.
We have
. Hence, subtracting both sides of Equation (
15) by
gives
From Equation (
13),
and applying the assumption (iv) in
Section 3 makes the G2 matrix constant. Hence, post-multiplying Equation (
17) by its transpose and taking expectation gives the covariance matrix of
as shown in the following equation:
From the definition of
in Equation (
14), the final source position and velocity estimate of
after the refinement process is
where
with the aim of removing the sign ambiguity from the square root operation. It is worth mentioning that: (i) the above elliptic technique can operate without synchronization requirement between the transmitter and receiver [
30,
40], (ii) using different reference transmitters neither affects the information quality from the measurements nor affects the location precision since the weighting matrices
and
in Equations (
11) and (
16) are introduced. (iii) since the near-field scenario is applied, then, the proposed algorithm may need one or two iterations to give an accurate solution that reaches the CRLB under Gaussian noise [
38]. (iv) The elliptic-based localization problem is challenging because the source location parameters and the sensor positions are nonlinearly related to the elliptic measurements. Therefore, the proposed closed-form solution is developed to handle the nonlinearity in the elliptic equation. (v) The thresholding effect can happen due to the nonlinear nature of the problem when the variance of the node position error increases [
42]. This thresholding phenomenon in the proposed method is due to ignoring the second-order error terms in deriving the solution, which is not valid when the noise is significant.
4. Sequential Localization Framework
Challenging real-world sensor network sequential-localization configurations are considered here, in which the network comprises a large number of unknown wireless sensor nodes and has only several anchors. Our task is to explore and identify some unreachable system properties, which can be performed by determining the underlying sensor localization.
The developed single-node closed-form solution is suitable to resolve the obstacle of unknown remote systems in the WSN since it does not need an initial guess solution, and it is computationally less complex.
Figure 2 describes the anchor-based sensors network that considers two positioning parameters: time delay and range frequency elliptic techniques, where anchors, unknown sensors, and the transmitter are represented by solid blue circles, brown stars, and solid black circle, respectively. This network is rated as a partially connected network. The line connected in the plot is used to interpret the existence of specific measurements. In the figure, the unknown nodes at
,
, and others are invisible as they are not in the communication range of the reference nodes. Hence, it is considered a second tier in the offline localization process. This scenario is more realistic for a large-scale sensor network where some anchors can only communicate with a few neighboring sensor nodes. Thus, the connectivity information can also be exploited to cluster anchors and unknown sensors for the localization process.
In the first tier, which is similar to a fully connected network case, the unknown nodes (
) within the communication range of the anchors are localized first. While in the second tier, and according to the connectivity, the unknown nodes with estimated positions and velocities are considered pseudo anchors to determine the following unknown sensor positions under some uncertainty of position and velocity. The uncertainty is eliminated by applying the refinement process of the second WLS minimization. This procedure is repeated for the next cluster until all the unknown sensors in the network are localized successfully. We emphasize that the number of
N omits the transmitter node. Due to the sequential framework process, the number of
N may vary according to the number of pseudo anchors in each cluster. In this context, increasing the number of anchors can improve the localization accuracy by raising the average node degree. More accurate position estimates will be obtained when the network has a large average node degree [
43].