Error analysis of range-based localisation algorithms in wireless sensor networks

Location information is essential when dealing with Wireless Sensor Networks (WSNs). This paper focuses on the error analysis of range-based localisation algorithms in WSNs. The error of range-based localisation algorithms is mainly derived from the measurement error. As seen through prior literature, researchers often assume similar measuring noise, which is not rational in practice. However, the attempt in this process is to locate the error characteristic when the measurement noise is different. By a large number of simulation experiments, this paper has obtained the quantitative relationship between the location accuracy and the measurement errors occurring when all measurement data meets the same noise conditions. In addition, we provide analysis of the different effects of distance measurement error on the location estimation error of unknown sensor nodes. Users are able to recognise the effect of the measurement error characteristic on the localisation accuracy, and to design localisation algorithms more effectively.

[1]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[2]  Deborah Estrin,et al.  Scalable, Ad Hoc Deployable, RF-Based Localization , 2002 .

[3]  Shouling Ji,et al.  Data caching-based query processing in multi-sink wireless sensor networks , 2012, Int. J. Sens. Networks.

[4]  Gaetano Borriello,et al.  SpotON: An Indoor 3D Location Sensing Technology Based on RF Signal Strength , 2000 .

[5]  Ying Zhang,et al.  Robust distributed node localization with error management , 2006, MobiHoc '06.

[6]  Wei Wang,et al.  Constructing minimum interference connected dominating set for multi-channel multi-radio multi-hop wireless network , 2012, Int. J. Sens. Networks.

[7]  Hamid Gharavi,et al.  Special issue on sensor networks and applications , 2003 .

[8]  Jan M. Rabaey,et al.  Robust Positioning Algorithms for Distributed Ad-Hoc Wireless Sensor Networks , 2002, USENIX Annual Technical Conference, General Track.

[9]  Thomas Magedanz,et al.  Intrusion Detection System for Denial-of-Service flooding attacks in SIP communication networks , 2009, Int. J. Secur. Networks.

[10]  Mohamed F. Younis,et al.  Exploiting architectural techniques for boosting base-station anonymity in wireless sensor networks , 2012, Int. J. Sens. Networks.

[11]  Peng Liu,et al.  Secure and privacy-preserving information aggregation for smart grids , 2011, Int. J. Secur. Networks.

[12]  M. W. Raad A ubiquitous mobile telemedicine system for the elderly using RFID , 2010, Int. J. Secur. Networks.

[13]  Ju Wang,et al.  A cross-layer authentication design for secure video transportation in wireless sensor network , 2010, Int. J. Secur. Networks.

[14]  Paramvir Bahl,et al.  RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[15]  Abdelsalam Helal,et al.  Optimal and distributed algorithms for coverage hole healing in hybrid sensor networks , 2012, Int. J. Sens. Networks.

[16]  Gaurav S. Sukhatme,et al.  Connecting the Physical World with Pervasive Networks , 2002, IEEE Pervasive Comput..

[17]  Maurizio A. Spirito,et al.  On the accuracy of cellular mobile station location estimation , 2001, IEEE Trans. Veh. Technol..

[18]  Rachid Beghdad Efficient coverage protocol without location information , 2012, Int. J. Sens. Networks.

[19]  David C. Moore,et al.  Robust distributed network localization with noisy range measurements , 2004, SenSys '04.

[20]  Yang Xianhui Reduction of wireless sensor node localization errors , 2008 .

[21]  Xuemin Shen,et al.  Energy-efficient transmission and bit allocation schemes in wireless sensor networks , 2012, Int. J. Sens. Networks.

[22]  Yunhao Liu,et al.  Location, Localization, and Localizability , 2010, Journal of Computer Science and Technology.

[23]  David E. Culler,et al.  The effects of ranging noise on multihop localization: an empirical study , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[24]  Jie Wu,et al.  Friendship-based location privacy in Mobile Social Networks , 2011, Int. J. Secur. Networks.

[25]  Kiseon Kim,et al.  Security assessments of IEEE 802.15.4 standard based on X.805 framework , 2010, Int. J. Secur. Networks.

[26]  Prasant Mohapatra,et al.  Rendezvous based trust propagation to enhance distributed network security , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[27]  B. R. Badrinath,et al.  Error characteristics of ad hoc positioning systems (aps) , 2004, MobiHoc '04.

[28]  Andy Hopper,et al.  A new location technique for the active office , 1997, IEEE Wirel. Commun..

[29]  Christian Callegari,et al.  Detecting anomalies in backbone network traffic: a performance comparison among several change detection methods , 2012, Int. J. Sens. Networks.

[30]  Hari Balakrishnan,et al.  6th ACM/IEEE International Conference on on Mobile Computing and Networking (ACM MOBICOM ’00) The Cricket Location-Support System , 2022 .

[31]  Yang Xiao,et al.  The effect of leaders on the consistency of group behaviour , 2012, Int. J. Sens. Networks.

[32]  Djamel Djenouri,et al.  Black-hole-resistant ENADAIR-based routing protocol for Mobile Ad hoc Networks , 2009, Int. J. Secur. Networks.

[33]  Koen Langendoen,et al.  Distributed localization in wireless sensor networks: a quantitative compariso , 2003, Comput. Networks.

[34]  Ameer Ahmed Abbasi,et al.  A least-movement topology repair algorithm for partitioned wireless sensor-actor networks , 2012, Int. J. Sens. Networks.

[35]  Nadjib Badache,et al.  On the use of passive clustering in wireless video sensor networks , 2012, Int. J. Sens. Networks.

[36]  Sylvie Perreau,et al.  Detect DDoS flooding attacks in mobile ad hoc networks , 2010, Int. J. Secur. Networks.

[37]  Yunhao Liu,et al.  Quality of Trilateration: Confidence-Based Iterative Localization , 2008, IEEE Transactions on Parallel and Distributed Systems.

[38]  Sumit Kundu,et al.  Optimal transmit power and packet size in wireless sensor networks in lognormal shadowed environment , 2012, Int. J. Sens. Networks.

[39]  Yunhao Liu,et al.  Beyond Triangle Inequality: Sifting Noisy and Outlier Distance Measurements for Localization , 2010, INFOCOM.

[40]  Manikanden Balakrishnan,et al.  Preemptive emergency medium access for wireless sensor networks: performance under realistic network conditions , 2012, Int. J. Sens. Networks.