Next Article in Journal
2D Scanning Micromirror with Large Scan Angle and Monolithically Integrated Angle Sensors Based on Piezoelectric Thin Film Aluminum Nitride
Next Article in Special Issue
Performance Evaluation of Attribute-Based Encryption in Automotive Embedded Platform for Secure Software Over-The-Air Update
Previous Article in Journal
Reliability Evaluation of the Data Acquisition Potential of a Low-Cost Climatic Network for Applications in Agriculture
Previous Article in Special Issue
Vehicle Detection in Overhead Satellite Images Using a One-Stage Object Detection Model
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Indoor Robust Localization Algorithm Based on Data Association Technique

1
Department of Computer and Communication Engineering, Northeastern University, Qinhuangdao 066004, China
2
SANY Group CO., Ltd., Changping, Beijing 102202, China
*
Author to whom correspondence should be addressed.
Submission received: 22 September 2020 / Revised: 16 November 2020 / Accepted: 16 November 2020 / Published: 18 November 2020

Abstract

:
As a key technology of the Internet of Things, wireless sensor network (WSN) has been used widely in indoor localization systems. However, when the sensor is transmitting signals, it is affected by the non-line-of-sight (NLOS) transmission, and the accuracy of the positioning result is decreased. Therefore, solving the problem of NLOS positioning has become a major focus for indoor positioning. This paper focuses on solving the problem of NLOS transmission that reduces positioning accuracy in indoor positioning. We divided the anchor nodes into several groups and obtained the position information of the target node for each group through the maximum likelihood estimation (MLE). By identifying the NLOS method, a part of the position estimates polluted by NLOS transmission was discarded. For the position estimates that passed the hypothesis testing, a corresponding poly-probability matrix was established, and the probability of each position estimate from line-of-sight (LOS) and NLOS was calculated. The position of the target was obtained by combining the probability with the position estimate. In addition, we also considered the case where there was no continuous position estimation through hypothesis testing and through the NLOS tracking method to avoid positioning errors. Simulation and experimental results show that the algorithm proposed has higher positioning accuracy and higher robustness than other algorithms.

1. Introduction

In recent years, wireless sensor network (WSN) has been applied to target tracking, navigation, industrial monitoring, emergency services, and other fields due to the simple deployment of nodes, complete functions, and flexible network settings. With the rapid development of embedded systems, it is being applied to a wider range of applications. WSN positioning refers to using pre-deployed sensor nodes (anchor nodes) to obtain data, obtaining the coordinate information of the positioning target through a positioning algorithm. The positioning methods are roughly divided into two categories: ranging and no ranging. The ranging methods include time of arrival (TOA) [1], time difference of arrival (TDOA) [2], received signal strengthen indicate (RSSI) [3], angle of arrival (AOA) [4], and so on. No ranging methods include centroid algorithm, distance vector (DV)-hop [5] algorithm, and so on. The distance information obtained by the sensor is used as the input of the positioning algorithm, and the position of the target is obtained through the algorithm processing to complete the positioning work. In the process of signal propagation, due to various obstacles in the propagation environment, the signal is affected by non-line-of-sight (NLOS) transmission. NLOS transmission refers to when the transmission signal encounters an obstacle during transmission, and the signal reaches the receiving end through reflection, refraction, and diffraction. The distance measured by the sensor is greater than the actual distance. NLOS transmission can reduce positioning accuracy, especially in the indoor positioning, and this effect is particularly serious. Therefore, how to reduce the impact of NLOS on positioning results and obtain higher positioning accuracy is the main research hot spot of indoor positioning algorithms.
The proposed algorithm in this paper aims to solve the effect of NLOS transmission that reduces the accuracy of indoor localization. We used the concept of grouping by dividing the anchor nodes involved in positioning into several subgroups, screened out the position estimation that met the conditions by using the method of hypothesis testing, and then calculated the association probability through the improved data association method and obtained the position estimation of the target with the previous position estimation. In terms of the situation where the number of positions passing the hypothesis testing was zero continuously, an NLOS tracking method was proposed to avoid positioning errors. The advantages of the proposed algorithm are as follows:
  • NLOS identification was performed through hypothesis testing, and some NLOS transmissions were eliminated, effectively reducing the effect of NLOS.
  • The algorithm established the corresponding clustering probability matrix for the position estimation through hypothesis testing with the improved method to calculate the probability, where the positioning accuracy was higher.
  • If the hypothesis testing failed continuously when there was no position estimation obtained from the subgroup that fell into the verification gate, the NLOS tracking method was used to avoid positioning errors.
The paper is organized as follows: Section 2 introduces related work, Section 3 describes the establishment of the signal model, Section 4 analyzes the proposed algorithm, and Section 5 discusses the simulation results.

2. Related Works

The indoor positioning problem has achieved fruitful results since the research began; scholars have proposed many newer algorithms in terms of NLOS recognition and weakening in recent years.
In terms of identifying NLOS, there are many methods. The NLOS signal reaches the receiving end through reflection or diffraction, thus the amplitude of range is longer than the LOS signal usually. In [6], the authors propose an algorithm that classifies and discards NLOS signals for indoor positioning and measurement systems. First, NLOS signals are identified based on the signal amplitude to obtain an initial probability estimate. Then, in the weight update step, iterative re-weighting of the least square regression is used to determine the receiving node position with the measured distance information. The author in [7] identifies the NLOS propagation through distance and angular probability, and a distance and angle probability model is proposed based on the sampling information to identify the NLOS propagation, followed by the maximum likelihood estimation (MLE) method to reduce the distance error in NLOS propagation through the model established previously. The improved Monte Carlo method is used to compute the best location of the mobile node, which reduces the computational complexity. Similar to [6], due to the strengths of the received signals being different between LOS and NLOS, the author in [8] derives an error model by performing a deviation and Cramer–Rao bound (CRB) analysis on the proposed LOS and positioning methods based on conventional radio signal strength. The proposed LOS-based method improves positioning accuracy by eliminating received signals that do not meet the required power. Furthermore, by estimating the LOS component through the fading signal, NLOS interference to the positioning result can be suppressed. Using data analysis to obtain some character of NLOS propagation to identify the NLOS propagation in [9], the author uses machine learning (ML) technology to analyze several sets of actual ultra-wide band (UWB) measurements captured in different situations in an attempt to identify measurements of NLOS propagation conditions. Therefore, the deviation between the measured value and the actual value is reduced. The results show that when LOS exists between the transmitter and the receiver, the ML technology is not only suitable for identifying the NLOS propagation conditions but also can alleviate the estimation error. Ranging residual is always used to identify NLOS. While in [10], the author compares the ranging residual compensation to some NLOS error mutations to identify LOS and NLOS, Kalman filter (KF) is performed within the distance from the LOS environment, and in the NLOS environment, a biased KF based on ranging residual compensation is used. The author in [11] proposes a distributed residual weighted discrimination algorithm. Position estimation for groups containing NLOS propagation errors are always distributed in isolation, and estimations without NLOS propagation errors are mostly concentrated in a small range. Based on this feature, the author proposes a two-step least squares method to determine the optimal location through analyzing the distribution of estimated coordinates.
Combination algorithms that weaken NLOS transmission are becoming a research hotspot. First, getting an estimation of the target node through different filters, which is handled by a different algorithm, is an effective choice. In [12], the authors propose an indoor positioning method based on a track quality-based fusion algorithm. First, extended Kalman filter (EKF) and robust extend Kalman filter (REKF) are used to obtain the position estimation of the mobile node followed by two KFs to further filter the estimates, which is the input of the fusion algorithm to obtain the final position estimation of the mobile target. Similar to [12], the authors propose a hyperbolic weighted centroid algorithm which is based on the TDOA localization model in [13]. The measured value of the TDOA distance difference is filtered by a KF firstly and then through the hyperbolic positioning algorithm to obtain an initial solution. In order to further reduce the influence of NLOS, an effective weighted centroid technique is used to calculate the final target position. In the positioning algorithm, the outlier is a pivotal factor which greatly affects the accuracy of algorithm. The authors in [14] combine EKF and outlier detection for sensor fusion technology to avoid the problem, while the authors in [15] solve this problem by iterative least squares algorithm. The authors in [15] obtain relatively accurate initial values firstly through the genetic algorithm, then, the iterative least square algorithm is used to update the position estimate so that the estimated value converges to the expected value and further improves the positioning accuracy. The authors in [16] propose a novel method that uses a combination of measurements of RSSI and the measurement of AOA two factors to resolve the problem of target localization. If the transmit power is known, by using the polarization identity, the AOA measurements collected are converted into the norm form, and a new relationship is established based on the AOA measurements and the unknown target position by using a second-order method to obtain the location of the target.
Improving the shortcomings of the exiting algorithm is also becoming a popular research topic. In [17], the authors transform the new robust weighted least squares problem into a non-convex optimization problem through the S-Lemma, so that the optimal target position is obtained. Because the frequency of signal is hard to affect during propagation, the authors in [18] establish a frequency and position transfer function by linking the field where a receiver is given to the source, which not only mitigates the NLOS effect but also calibrates the propagation channel back to free space, thus the performance is better than the usual TDOA positioning algorithm. For the purpose of avoiding the shortcomings of the robust least square (RLS) methods and reducing the upper limit of the NLOS error, the source location and the NLOS error in the predicted path are jointly estimated in [19]. To avoid the use of triangular inequality by the S-Lemma, the final target position could be obtained through the optimization problems. In [20], in order to deal with the abnormal row and column structure in the multi-dimensional similarity (MDS) matrix caused by NLOS propagation, the authors propose an improved robust matrix approximation program that uses the 2,1-norm and applies alternating directions of multipliers method to resolve the resulting nonlinear constraint optimization problem. Voting is a good idea that can be used to mitigate the influence of NLOS. In [21,22,23], the author proposes layered voting ideas to perform state detection and distance correction. This method can decrease the impact of NLOS propagation well and employs different filters to filter the values obtained in the previous step by the method of MLE to get the position estimate of the mobile node.

3. Signal Model

Suppose that the mobile node moves in a limited two-dimensional plane, and M anchor nodes are deployed randomly. x ^ ( k ) = [ x ( k ) y ( k ) x ˜ ( k ) y ˜ ( k ) ] T is the state vector of the mobile node, and ( x ( k ) , y ( k ) ) is the coordinate of the mobile node at k-th time. ( x ˜ ( k ) , y ˜ ( k ) ) represents the velocity along the x-axis and the y-axis at k-th time. Therefore, the motion change of the target node can be described by the change of state vector. The change of the state vector of the target node is modeled as:
x ^ ( k ) = G x ^ ( k 1 ) + C ϖ ( k 1 ) G = [ 1 0 0 1 Δ t 0 0 Δ t 0 0 0 0 1 0 0 1 ] C = [ Δ t 2 / 2 0 Δ t 0 0 Δ t 2 / 2 0 Δ t ]
where Δ t represents the sampling interval, and I M is the M × M identity matrix, and the driving noise ϖ ( k ) is modeled as Gaussian white noise with the mean of 0 and a covariance matrix of Q ( k ) = σ ω 2 I 2 , where k = 1 , 2 , , K describes the uncertainty on the motion model at time k . G represents the state transition matrix of the mobile node, and C represents the interference noise input matrix. The distance measurement value between the M anchor nodes and the mobile node at the moment k is expressed as: D ( k ) = [ d 1 ( k ) , , d M ( k ) ] T if the probability that the NLOS measurement occurs is α , the probability that the LOS measurement appears as 1 α , d L ( k ) represents the distance measured from the L-th anchor node to the mobile node, recorded as [24]:
d L ( k ) = { h L ( x ^ ( k ) ) + v ( k )                         i f   L O S   c o n d i t i o n h L ( x ^ ( k ) ) + n N L O S + v ( k )           i f   N L O S   c o n d i t i o n
h L ( x ^ ( k ) ) represents the actual geometric distance from the L-th anchor node which participates in positioning to the target node, which is defined as:
h L ( x ^ ( k ) ) = ( x ( k ) x L ) 2 + ( y ( k ) y L ) 2 L = 1   ,   2   , ,   M
where ( x L , y L ) represents the two-dimensional coordinates of the L-th anchor node, n N L O S represents the NLOS deviation, and v ( k ) is the LOS noise modeled as Gaussian white noise with mean of 0 and standard deviation of σ G 2 . The Euclidean distance set from the mobile node to the M anchor nodes is h ( x ^ ( k ) ) = [ h 1 ( k ) , , h M ( k ) ] T .

4. Proposed Algorithm

4.1. General Concept

The flow chart of the proposed algorithm is shown in Figure 1. In this paper, we divided the M anchor nodes into N = C M 3 different subgroups and through the MLE method to obtain the position estimation of the target node z n ( k ) = [ x n ( k ) , y n ( k ) ] T in each subgroup. Because the propagation environment from the anchor node to the target node in the subgroup n was unknown, if it was NLOS, the position estimation accuracy of the target node calculated by the corresponding position estimation was decreased, and the position estimation in the LOS state had higher accuracy. Therefore, we performed hypothesis testing on the position estimates obtained for each subgroup and reduced the effect of NLOS errors through hypothesis testing in advance. When performing hypothesis testing at time k , Kalman prediction state vector x ^ ( k | k 1 ) and covariance matrix P ( k | k 1 ) were needed to obtain the predicted position estimate z ( k | k 1 ) of the target node. A statistical test T i ( k ) was calculated using the obtained predicted position estimate z ( k | k 1 ) , and the value was compared with a preset threshold. If the statistical test value was less than the threshold, the assumption was true, and the position estimate was used in subsequent positioning calculations. If the statistical test value was larger than the threshold set previously, the assumption was not true, and the corresponding position estimation was discarded. The selection of the threshold was decided on the threshold probability P G . The number of statistically estimated position estimates through hypothesis testing was N V ( k ) . If N V ( k ) was greater than 0, a corresponding clustering probability matrix was established, the associated probability was calculated using an improved method, and the state of the target node was updated using the associated probability and the position estimation through hypothesis testing. If N V ( k ) equaled 0, it meant that the position estimates had not passed the hypothesis testing, and then it was detected whether the number of position estimates that passed the hypothesis testing at the previous moment was 0 or not. If it was 0, the position estimate of the mobile node was calculated by the NLOS tracking method; otherwise, the predicted position estimate was used as the position estimation of the mobile node. In this way, it was possible to avoid the situation of continuous positioning errors caused by hypothesis testing without position estimation and strengthen the robustness. The components of the algorithm are described in detail below.

4.2. Grouping and Hypothesis Testing

This article assumed that there were M anchor nodes participating in the positioning of the target node, and that M was greater than 3. Anchor nodes were grouped into groups of three, with a total of N subgroups. When sampling was performed at k moment, the distance measurement from the anchor node to the target node was also divided into N subgroups. The MLE was performed on the distance measurement obtained by each subgroup to get the position estimate of the target node. The specific process of hypothesis testing is described in detail below.

4.2.1. Kalman Prediction

We used the state vector x ^ ( k 1 | k 1 ) and the covariance matrix P ( k 1 | k 1 ) of the mobile node at time k 1 to predict the state vector and the covariance matrix of the mobile node at time k through the next formula:
x ^ ( k | k 1 ) = G x ^ ( k 1 | k 1 )
P ( k | k 1 ) = G P ( k 1 | k 1 ) G T + C Q C T
The predicted position estimation of the mobile node is:
z ( k | k 1 ) = B x ^ ( k | k 1 ) B = [ 1 0 0 0 0 1 0 0 ]
B is the observation matrix. The difference between the estimated position of the target node and the position estimation of the target node obtained by the nth subgroup is defined as innovation:
v n ( k ) = z n ( k ) z ( k | k 1 ) n = 1   ,   2   , ,   M

4.2.2. NLOS Identification

At time k , if the anchor nodes in the n-th subgroup are all in LOS environment, the innovation meets:
v n ( k ) ~ N ( 0 , S n ( k ) ) n = 1   , ,   N
The covariance of the innovation is:
S n ( k ) = B P ( k | k 1 ) B T + σ G 2 I 2 ( H n T ( k ) H n ( k ) ) 1 H n ( k ) = h n ( x ^ ( k ) ) x ^ ( k )
In order to identify (8), we defined the following assumptions:
H 0 , n : ν n ( k ) ~ N ( 0 , S n ( k ) ) n = 1   , ,   N
H 1 , n : n o n H 0 , n n = 1   , ,   N
If the anchor nodes in the n-th subgroup are all in the LOS environment, the assumption H 0 , n is true. If at least one anchor node in the n-th subgroup is in the NLOS environment, the H 1 , n is true, and the position estimate obtained by the subgroup will have a large error. If the anchor nodes in the n-th subgroup are in the LOS environment, the obtained position estimation will fall into the verification gate. In order to identify the position estimates obtained for each subgroup, we defined a statistical test as:
T n ( k ) = v n T ( k ) S n 1 ( k ) v n ( k ) n = 1   , ,   N
We compared the statistical test value with a preset threshold value. If the statistical test value was larger than the threshold, the corresponding hypothesis was invalid, otherwise, it was true. The selection of the threshold of the correlation gate is related to the threshold probability P G :
0 γ f χ 2 ( 2 ) ( x ) d x = P G = 1 P F A
Threshold probability P G is the probability that the position estimate from the LOS environment falls into the verification gate. f χ 2 ( 2 ) ( ) is a chi-square distribution with a degree of freedom of 2, and P F A is the alert probability when the probability that the position estimation falls into the verification door is estimated to be an LOS environment no less than 0.99, and the threshold of the chi-square distribution with a degree of freedom of 2 is γ = 9.21 . x represents the location estimation to be tested. We then calculated the number of position statistics that passed the hypothesis testing and recorded as N v ( k ) . If it was greater than 0, the subsequent calculation of the correlation probability was performed in addition to updating the state estimation and the covariance matrix. If N v ( k ) was 0, and N v ( k 1 ) was 0, at this time, the final position estimate was obtained by the NLOS tracking method. Otherwise, the predicted position estimate was used as the final position estimate.

4.3. Association Probability Updating

This article used the improved probability data association method to calculate the association probability. First, the correlation event was defined:
  • The LOS environment and the NLOS environment from the target node to the anchor node had position estimates;
  • Each position estimation was from LOS or NLOS environments.
Defining the associated event:
ξ l t : {Hypothesis-tested position estimates from LOS environment}, l = 1   , ,   N V ( k ) , t = 1. The event ξ 01 indicates that the position estimation from the LOS environment does not fall into the verification gate, ξ l 0 indicates that the position estimation z l ( k ) is from a NLOS environment, and ξ 00 indicates that there is no position estimation in the NLOS environment that is meaningless. The correct position at time k is estimated as: Z ( k ) = { z l ( k ) } l = 1 N v ( k ) , Z k = { Z ( 1 ) , Z ( 2 ) , , Z ( k ) } represents correct positions from start time to current time. The probability density function of the event ( l = 1 , , N v ( k ) , t = 1 ) is modeled as:
f l 1 ( z l ( k ) | ξ l 1 ( k ) , N v ( k ) , Z k ) = = P G 1 N ( z l ( k ) ; z ( k | k 1 ) , S l ( k ) ) = = P G 1 exp { 1 2 v l T ( k ) S l 1 ( k ) v l ( k ) } 2 π | S l ( k ) | 0.5
The probability density function of the event ξ l 0 ( l = 1   , ,   N v ( k ) ) is assumed as:
f l 0 ( z l ( k ) | ξ l 0 ( k ) , L ( k ) , Z k ) = N v ( k ) V ( k ) l = 1   , ,   N v ( k )
V ( k ) = π τ | S ( k ) | 0.5
V ( k ) is the acreage of the verification area corresponding to the accepted hypothesis. The probability density function of the event ξ 01 is:
f 01 ( z l ( k ) | ξ 01 ( k ) , N v ( k ) , Z k ) = ( 2 V ) 1 ( 1 P d P G )
where P d is the detected probability, which represents the probability that the position estimation falls into the verification area which can be detected by the verification gate.
The probability density function of the event ξ 00 is:
f 00 ( z l ( k ) | ξ 00 ( k ) , N v ( k ) , Z k ) = 0
Association probability is modeled as:
β l 1 ( k ) = 1 c [ ε l 1 ( k ) t r = 0 t r 1 1 r = 0 r l N v ( k ) ε r t r ( k ) + ζ l 1 ( k ) r = 0 r l N v ( k ) t r = 0 t r 1 1 ζ r t r ( k ) ]
where t r = 0 , 1 , r = 0 , 1 , L ( k )
ε l t ( k ) = f l t ( z l ( k ) | ξ l t ( k ) , N v ( k ) , Z k ) / l = 0 N v ( k ) f l t ( z l ( k ) | ξ l t ( k ) , N V ( k ) , Z k )
ζ l t ( k ) = f l t ( z l ( k ) | ξ l t ( k ) , N v ( k ) , Z k ) / t = 0 1 f l t ( z l ( k ) | ξ l t ( k ) , N v ( k ) , Z k )
where c is the normalization factor. Kalman gain K ( k ) needs to be calculated during the state updating:
K ( k ) = P ( k | k 1 ) B T S 1 ( k )
and the updated state estimate of the mobile node and the updated covariance matrix are obtained by the associated probability:
x ^ ( k | k ) = x ^ ( k | k 1 ) + K ( k ) l = 1 L ( k ) β l 1 ( k ) v l ( k )
P ( k | k ) = β 01 ( k ) P ( k | k 1 ) + ( 1 β 01 ( k ) ) P c ( k ) + P ˜ ( k )
P c ( k ) = ( I 4 K ( k ) B ) P ( k | k 1 )
P ˜ ( k ) = K ( k ) [ l = 1 N v ( k ) β l 1 ( k ) v l ( k ) v l T ( k ) v ( k ) v T ( k ) ] K T ( k )
v ( k ) = l = 1 N v ( k ) β l 1 ( k ) v l ( k )

4.4. NLOS Tracking

When the hypothesis test occurred and there was no position estimation passing the hypothesis testing continuously, if the final position estimation was also calculated by the above method at this time, it caused a positioning failure. Therefore, if such a situation occurred, the final position estimation needed to be corrected by the NLOS tracking method. After each hypothesis testing was completed, a corresponding flag was set. If the number of position estimates passed by the hypothesis testing was greater than 0, the corresponding flag was recorded as 1. If it was 0, the corresponding flag bit was recorded as 0. If two 0′s appeared consecutively, REKF was used to calculate the target’s position estimate. We wrote the EKF into linear regression and rewrote Equations (1) and (2) as:
[ I 4 H ( k ) ] x ^ ( k ) = [ G x ^ ( k 1 | k 1 ) y ( k ) h ( x ^ ( k | k 1 ) ) + H ( k ) x ^ ( k | k 1 ) ] + e ( k )
e ( k ) = [ G ( x ( k 1 ) x ^ ( k 1 | k 1 ) ) + C ϖ ( k 1 ) v ( k ) ]
H ( k ) = h ( x ( k ) ) x ( k )
E [ e ( k ) e T ( k ) ] = [ P ( k | k 1 ) 0 0 R ( k ) ] = C ( k ) C T ( k )
Utilizing the bridge Cholesky decomposition, C ( k ) can be solved, and the linear regression model can be written as:
y ˜ = D x + b f ˜ v + v ˜
y ˜ = C 1 ( k ) [ x ^ ( k | k 1 ) y ( k ) h ( x ^ ( k | k 1 ) ) + H ( k ) x ^ ( k | k 1 ) ]
D = C 1 ( k ) [ I 4 H ( k ) ]
x = x ( k )
v ˜ = C 1 ( k ) e ( k )
From the linear model, with the probability density function of v ˜ , the maximum likelihood estimation of x could be obtained by solving the following equations:
i = 1 M + dim ( x ) [ D ] ij × φ ( y ˜ i j = 1 dim ( x ) [ D ] i j x j ) = 0 j = 1 , , dim ( x )
where dim ( x ) means the dimension of x ^ ( k ) , φ ( υ ) = f v ( υ ) f v ( υ ) . With the least square method to solve the above linear model, we obtained x ^ ( k | k ) = ( D T D ) 1 D T y ˜ . In order to avoid the sensitivity of the least squares method to outliers and increase the robustness of the algorithm, the following methods were used to improve:
(1)
Let l = 0 , getting the initial position estimate x ^ 0 .
(2)
Calculate the residual: v ˜ ^ = y ˜ D x ˜ l
(3)
Use the v ˜ ^ to estimate the range of σ ^ V ˜
(4)
Update the μ and x ^ :
μ = 1 / ( 1.25 max ( | ψ ( v ˜ ^ / σ ^ V ) | ) )
x ^ l + 1 = x ^ l + μ ( D T D ) 1 D T ψ ( v ˜ ^ / σ ^ V )
(5)
Calculate | | x ^ l + 1 x ^ l | | , if the value is less than the ε set previously, the loop is stopped to obtain the final position estimation value. Otherwise, go to the second step and continue the cycle until it stops:
where ψ ( υ ) = { υ b tanh [ 0.5 b ( c 2 | υ | ) ] 0 sgn ( υ ) , | υ | c 1 c 1 < | υ | < c 2 | υ | c 2

5. Experiment Simulation

This section shows the simulation results of the algorithm we proposed. In the experiment, anchor nodes were randomly installed in the simulation region, and one target node moved along a fixed trajectory; the simulation scene was 100   m × 100   m . The target node moved 100 steps at a time, the sampling interval was Δ t = 0.5   s , the initial state vector was x ^ ( 0 ) = [ 1   m 19.99   m 1   m / s 0.5   m / s ] T , and the covariance matrix was P ( 0 ) = I 4 . I 4 was the 4 × 4 identity matrix. The initial state vector of each subgroup was x ^ n , j ( 0 ) = x ^ ( 0 ) , and the initial covariance matrix of the subgroup was P n , j ( 0 ) = P ( 0 ) . The threshold probability was P G = 0.99 , and the alert probability was P F A = 0.01 , P d = 0.95 . The probability of NLOS measurement occurred was P N L O S . In this paper, robust interacting multiple model (RIMM) algorithm [25], REKF algorithm [26], and modified probabilistic data association (MPDA) algorithm [27] were used as comparison. In this paper, the root mean square error (RMSE) in (38) and the cumulative distribution function (CDF) were used as indicators to assess the algorithm.
R M S E = 1 K 1 M C j = 1 M C k = 1 K ( ( x ^ j ( k ) x j ( k ) ) 2 + ( y ^ j ( k ) y j ( k ) ) 2 )
( x ^ j ( k ) , y ^ j ( k ) ) was the position estimation obtained during the j -th operation, and ( x j ( k ) , y j ( k ) ) was the real position of the mobile node during the j -th operation. K = 100 was the number of movements in each Monte Carlo simulation, and M C = 1000 was the number of Monte Carlo runs. The simulation results of NLOS errors under different distributions are discussed below.

5.1. The NLOS Errors Obeys Gaussian Distribution

The measurement noise is modeled to be a Gaussian distribution N ( 0 , σ G 2 ) , and the NLOS error is a Gaussian distribution N ( μ N L O S , σ N L O S 2 ) . The parameters of the Gaussian distribution are listed in Table 1.
Figure 2 shows the change of the RMSE of the REKF algorithm, the RIMM algorithm, the MPDA algorithm, and the robust data association technique (RDAT) algorithm with the increase of the number of anchor nodes. The RMSEs of REKF, RIMM, MPDA, and RDAT all decreased as the number of anchor nodes increased. It can be concluded from the simulation diagram that the RMSEs of MPDA and RDAT dropped significantly. The average positioning errors of REKF, RIMM, MPDA, and RDAT were 4.710 m, 3.684 m, 3.036 m, and 2.619 m. The average positioning accuracies of RDAT were 44.39%, 28.91%, and 13.74% higher than those of REKF, RIMM, and MPDA, respectively.
Through Figure 3, the higher the probability of NLOS error that occurred, the larger the RMSE was, thus lowering the positioning accuracy. The average localization accuracies of REKF, RIMM, MPDA, and RDAT were 3.563 m, 2.565 m, 2.825 m, and 2.189 m, respectively. The positioning accuracies of RDAT were about 38.56%, 14.66%, and 22.51% higher than those of REKF, RIMM, and MPDA, respectively. Compared to the MPDA, due to the NLOS tracking method in the RDAT, the disadvantage of MPDA was alleviated.
The mean value of the NLOS error changed from 3 to 10, and the RMSEs of REKF, RIMM, MPDA, and RDAT increased continuously in Figure 4, but RDAT increased more slowly than others with smaller positioning error. It can be concluded that the larger the average value of NLOS error was, the larger the error of positioning was; the performance of RDAT was still superior in the condition where the NLOS noise was higher.
It can be seen from the simulation in Figure 5 that when the standard deviation of NLOS error changed between 3 and 10, the RMSEs of the REKF and the RIMM algorithms rose steadily, while the RMSE of the MPDA algorithm decreased firstly and then increased. The RMSE of the RDAT algorithm was decreasing until the standard deviation reached nine, when it started to increase because the algorithm we proposed is sensitive to outliers. The average positioning accuracies of REKF, RIMM, MPDA, and RDAT were 4.398 m, 3.066 m, 3.466 m, and 2.075 m, respectively.
Figure 6 shows the cumulative error distribution of REKF, RIMM, MPDA, and RDAT. When the value of cumulative distribution function was 90%, the average localization accuracies of REKF, RIMM, MPDA, and RDAT did not exceed 7.569 m, 6.417 m, 6.463 m, and 5.168 m, respectively. This indicates the performance of RDAT was better than the others in most cases, as the accuracy of RDAT was significantly higher than REKF, RIMM, and MPDA.

5.2. The NLOS Errors Obey Uniform Distribution

Assuming that the measurement noise obeys the Gaussian distribution N ( 0 , σ G 2 ) , and the NLOS error is modeled as uniform distribution U ( a , b ) , a and b are the minimum and the maximum of the uniform distribution, respectively. The default parameters of the uniform distribution are shown in Table 2.
With the occurrence probability of NLOS propagation changes between 0.1 and 0.7 in Figure 7, the position accuracy decreased while the RMSE increased. Compared with REFK and RIMM algorithms, MPDA and RDAT increased slowly; before 0.4, the change was small, and RDAT was better than MPDA. The average positioning accuracies of REKF, RIMM, MPDA, and RDAT were 5.241 m, 4.300 m, 3.473 m, and 2.775 m, respectively. The positioning accuracies of RDAT were about 47.05%, 35.47%, and 20.10% higher than REKF, RIMM, and MPDA, respectively.
From Figure 8, with the increase of the maximum value of the NLOS error, compared to REKF, RIMM, and MPDA, the RDAT increased more slowly and did not change much. The average localization accuracies of REKF, RIMM, MPDA, and RDAT were 4.772 m, 4.397 m, 4.505 m, and 3.926 m, respectively.

5.3. The NLOS Errors Obey Index Distribution

The measurement noise is assumed to be a Gaussian distribution N ( 0 , σ G 2 ) , and the NLOS errors obey the index distribution E ( λ ) in this section. The default parameters of the index distribution are shown in Table 3.
Referring to Figure 9, when the parameter of the index distribution increased from 3 to 10, REKF and RIMM increased faster, and the root mean square errors of MPDA and RDAT increased less. Compared with MPDA, RDAT was more stable. The average positioning errors of REKF, RIMM, MPDA, and RDAT were 4.676 m, 3.585 m, 2.305 m, and 1.603 m, respectively.
Figure 10 shows the average positioning error distribution of REKF, RIMM, MPDA, and RDAT when the NLOS errors followed an index distribution. The average positioning errors of 90% of REKF, RIMM, MPDA, and RDAT were not less than 9.459 m, 7.753 m, 4.208 m, and 2.833 m. When the cumulative distribution function approached one, the average positioning accuracy of RDAT did not exceed 6 m, which was a higher improvement than REKF, RIMM, and MPDA.

5.4. Experimental Result

For the purpose of verifying the actual performance of the proposed algorithm, we conducted an experiment in our laboratory. Due to the high accuracy, we applied UWB to collect the information of distance. Figure 11 shows we deployed eight anchor nodes, and the pedestrian who held the UWB in hand moved uniformly through the trajectory from the red mark point to the blue mark point; the green mark point was the anchor node, and the black mark point was the sample point. The coordinates of the beacon nodes were (0.4 m 4.1 m), (3.3 m 0.6 m), (3.6 m 3.0 m), (4.2 m 1.2 m), (5.4 m 4.2 m), (9.1 m 1.2 m), (9.6 m 3.6 m), and (11.40 m 5.18 m), respectively. The initial state vector was x ^ = [ 1.8   m 6.0   m 0   m / s 0.6 / s ] . In order to avoid the receiver receiving the UWB signal reflected from the ground, the pedestrian took the mobile node in hand, which was 1.2 m above the ground. The laboratory was 12.6 m long and 6.6 m wide. Because there were obstacles such as persons, desks, and so on in the room, the measured values interfered with NLOS factors. In addition, when someone was walking in the room during the measurement, it aggravated the interference of NLOS factors. Each time the mobile node moved 0.6 m, a sampling was performed at the black point in Figure 11 and was done 30 times for each anchor node. Each anchor node collected 20 measurements at each sample interval with the average value as the final measurements handled by localization algorithm.
The localization error distribution of each sample point is shown in Figure 12; the x-axis represents the order of the sample point, and the y-axis represents the positioning error at the corresponding sampling point in meters. The CDF is shown in Figure 13. From Figure 12, the positioning performance of the RDAT was better than REKF, RIMM, and MPDA in most sample points, and the corresponding positioning error was less than one meter. From Figure 13, the 90% error of the RDAT was less than 1.036 m, and the CDF tended to one at a localization error of less than 1.67 m, while the 90% errors of REKF, RIMM, and MPDA were achieved at 1.297 m, 1.442 m, and 1.051 m, respectively. Through the CDF, the location error of RDAT was less than 1.67 m in the whole track. Although the performance of RDAT in a real experiment was not as outstanding as in simulation, it was just because there were too many types of noise in the real environment; the algorithm we proposed still has excellent performance in most cases. Thus, there is improvement to be made on this question in the future.

6. Conclusions

This paper proposes am NLOS identification and suppression indoor localization algorithm. The anchor nodes participating in the positioning were divided into several subgroups, and the position estimates of the target nodes obtained by each subgroup were checked through hypothesis testing. The position estimates polluted by NLOS errors were discarded, thereby improving subsequent positioning accuracy. For the position estimation that passed the hypothesis test, the clustering probability matrix was used to improve the method of calculating the association probability to get the final target position estimation. For the case where no position estimation passed the hypothesis testing continuously, the NLOS tracking method was used to obtain the position estimation, which increased the robustness of the algorithm. Simulation results verify that the performance of the proposed algorithm was better than REKF, RIMM, and MPDA, and RDAT had high positioning accuracy when the NLOS error probability was relatively small. When the NLOS error probability was large, the positioning accuracy was reduced, thus there is improvement to be achieved in the future.

Author Contributions

L.C. and Y.W. conceived and designed the experiment; Y.W. and Y.B. performed the experiment; L.C. and M.X. analyzed the data; L.C and Y.W. wrote the paper. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China under Grant No. 61803077; Natural Science Foundation of Hebei Province under Grant No. F2020501012; Fundamental Research Funds for the Central Universities under Grant No. N172304024.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Shi, Q.; Cui, X.; Zhao, S.; Lu, M. Sequential TOA-Based Moving Target Localization in Multi-Agent Networks. IEEE Commun. Lett. 2020, 24, 1719–1723. [Google Scholar] [CrossRef]
  2. Cao, S.; Chen, X.; Zhang, X.; Chen, X. Combined Weighted Method for TDOA-Based Localization. IEEE Trans. Instrum. Meas. 2019, 69, 1962–1971. [Google Scholar] [CrossRef]
  3. Yang, B.; Guo, L.; Guo, R.; Zhao, M.; Zhao, T. A Novel Trilateration Algorithm for RSSI-Based Indoor Localization. IEEE Sens. J. 2020, 20, 8164–8172. [Google Scholar] [CrossRef]
  4. Zheng, Y.; Sheng, M.; Liu, J.; Li, J. Exploiting AoA Estimation Accuracy for Indoor Localization: A Weighted AoA-Based Approach. IEEE Wirel. Commun. Lett. 2018, 8, 65–68. [Google Scholar] [CrossRef]
  5. Gui, L.; Val, T.; Wei, A.; Dalce, R. Improvement of range-free localization technology by a novel DV-hop protocol in wireless sensor networks. Ad Hoc Netw. 2015, 24, 55–73. [Google Scholar] [CrossRef] [Green Version]
  6. Haigh, S.; Kulon, J.; Partlow, A.; Rogers, P.; Gibson, C. A Robust Algorithm for Classification and Rejection of NLOS Signals in Narrowband Ultrasonic Localization Systems. IEEE Trans. Instrum. Meas. 2018, 68, 646–655. [Google Scholar] [CrossRef]
  7. Tian, X.; Wei, G.; Wang, J.; Zhang, D. A Localization and Tracking Approach in NLOS Environment Based on Distance and Angle Probability Model. Sensors 2019, 19, 4438. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  8. Wang, L.; Zawodniok, M. New Theoretical Limit Analysis of LoS and RSS Based Positioning Methods for Ricean Fading Channel in RF Systems. IEEE Trans. Mob. Comput. 2019, 18, 2401–2414. [Google Scholar] [CrossRef]
  9. Barral, V.; Escudero, C.J.; García-Naya, J.A.; Maneiro-Catoira, R. NLOS Identification and Mitigation Using Low-Cost UWB Devices. Sensors 2019, 19, 3464. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  10. Zhang, G.; Deng, Z.; Wen, L.; Ge, L.; Ke, H.; Jiao, J. An UWB Location Algorithm for Indoor NLOS Environment. In Proceedings of the 2018 Ubiquitous Positioning, Indoor Navigation and Location-Based Services (UPINLBS), Wuhan, China, 22–23 March 2018; Institute of Electrical and Electronics Engineers (IEEE): New York, NY, USA; pp. 1–6. [Google Scholar]
  11. Yuan, Y.; Li, Y.; Liu, Z.; Chan, K.Y.; Zhu, S.; Guan, X. A three dimensional tracking scheme for underwater non-cooperative objects in mixed LOS and NLOS environment. Peer-to-Peer Netw. Appl. 2018, 12, 1369–1384. [Google Scholar] [CrossRef]
  12. Wang, Y.; Jie, H.; Cheng, L. A Fusion Localization Method based on a Robust Extended Kalman Filter and Track-Quality for Wireless Sensor Networks. Sensors 2019, 19, 3638. [Google Scholar] [CrossRef] [Green Version]
  13. Zhang, X.; Lin, W. Hyperbolic-Weighted Centroid Indoor Location Algorithm based on Kalman Filter. In Proceedings of the 2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, China, 12–14 October 2018; pp. 2520–2523. [Google Scholar]
  14. Dwek, N.; Birem, M.; Geebelen, K.; Hostens, E.; Mishra, A.; Steckel, J.; Yudanto, R. Improving the Accuracy and Robustness of Ultra-Wideband Localization Through Sensor Fusion and Outlier Detection. IEEE Robot. Autom. Lett. 2020, 5, 32–39. [Google Scholar] [CrossRef]
  15. Tomic, S.; Beko, M. A Robust NLOS Bias Mitigation Technique for RSS-TOA-Based Target Localization. IEEE Signal Process. Lett. 2019, 26, 64–68. [Google Scholar] [CrossRef]
  16. Chang, S.; Li, Y.; Yang, X.; Wang, H.; Hu, W.; Wu, Y. A Novel Localization Method Based on RSS-AOA Combined Measurements by Using Polarized Identity. IEEE Sens. J. 2019, 19, 1463–1470. [Google Scholar] [CrossRef]
  17. Chen, H.; Wang, G.; Ansari, N. Improved Robust TOA-Based Localization via NLOS Balancing Parameter Estimation. IEEE Trans. Veh. Technol. 2019, 68, 6177–6181. [Google Scholar] [CrossRef]
  18. Yang, M.N.; Jackson, D.R.; Chen, J.; Xiong, Z.B. A TDOA Localization Method for NLOS Scenarios. IEEE Trans. Antennas Propag. 2019, 67, 2666–2676. [Google Scholar] [CrossRef]
  19. Wang, G.; Zhu, W.; Ansari, N. Robust TDOA-Based Localization for IoT via Joint Source Position and NLOS Error Estimation. IEEE Internet Things J. 2019, 6, 8529–8541. [Google Scholar] [CrossRef]
  20. Xiong, W.; So, H.C. TOA-Based Localization with NLOS Mitigation via Robust Multidimensional Similarity Analysis. IEEE Signal Process. Lett. 2019, 26, 1334–1338. [Google Scholar] [CrossRef]
  21. Cheng, L.; Hang, J.; Wang, Y.; Bi, Y. A Fuzzy C-Means and Hierarchical Voting Based RSSI Quantify Localization Method for Wireless Sensor Network. IEEE Access 2019, 7, 47411–47422. [Google Scholar] [CrossRef]
  22. Cheng, L.; Li, Y.; Wang, Y.; Bi, Y.; Feng, L.; Xue, M. A Triple-Filter NLOS Localization Algorithm Based on Fuzzy C-means for Wireless Sensor Networks. Sensors 2019, 19, 1215. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  23. Wang, Y.; Hang, J.; Cheng, L.; Li, C.; Song, X. A Hierarchical Voting Based Mixed Filter Localization Method for Wireless Sensor Network in Mixed LOS/NLOS Environments. Sensors 2018, 18, 2348. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  24. Liu, N.; Xu, Z.; Sadler, B.M. Geolocation Performance with Biased Range Measurements. IEEE Trans. Sinal Process. 2012, 60, 2315–2329. [Google Scholar] [CrossRef]
  25. Li, D.; Sun, J. Robust Interacting Multiple Model Filter Based on Student’s t-Distribution for Heavy-Tailed Measurement Noises. Sensors 2019, 19, 4830. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  26. Hammes, U.; Zoubir, A.M. Robust MT Tracking Based on M-Estimation and Interacting Multiple Model Algorithm. IEEE Trans. Signal Process. 2011, 59, 3398–3409. [Google Scholar] [CrossRef]
  27. Hammes, U.; Zoubir, A.M. Robust Mobile Terminal Tracking in NLOS Environments Based on Data Association. IEEE Trans. Signal Process. 2010, 58, 5872–5882. [Google Scholar] [CrossRef]
Figure 1. The flow chart of the algorithm.
Figure 1. The flow chart of the algorithm.
Sensors 20 06598 g001
Figure 2. Performance comparison between the RIMM, robust extend Kalman filter (REKF), MPDA, and RDAT under different number of anchor nodes M , where P N L O S = 0.5 , N ( 0 , 1 2 ) and N ( 5 , 6 2 ) .
Figure 2. Performance comparison between the RIMM, robust extend Kalman filter (REKF), MPDA, and RDAT under different number of anchor nodes M , where P N L O S = 0.5 , N ( 0 , 1 2 ) and N ( 5 , 6 2 ) .
Sensors 20 06598 g002
Figure 3. Simulation comparison between RIMM, REKF, MPDA, and RDAT with different probability of NLOS errors P N L O S , N ( 0 , 1 2 ) and N ( 5 , 6 2 ) .
Figure 3. Simulation comparison between RIMM, REKF, MPDA, and RDAT with different probability of NLOS errors P N L O S , N ( 0 , 1 2 ) and N ( 5 , 6 2 ) .
Sensors 20 06598 g003
Figure 4. Performance comparison between RIMM, REKF, MPDA, and RDAT under different mean values of NLOS error μ N L O S , where P N L O S = 0.5 , and N ( 0 , 1 2 ) , N ( 5 , 6 2 ) .
Figure 4. Performance comparison between RIMM, REKF, MPDA, and RDAT under different mean values of NLOS error μ N L O S , where P N L O S = 0.5 , and N ( 0 , 1 2 ) , N ( 5 , 6 2 ) .
Sensors 20 06598 g004
Figure 5. Performance contrast of RIMM, REKF, MPDA, and RDAT with different standard deviation of NLOS errors σ N L O S , P N L O S = 0.5 , N ( 0 , 1 2 ) and N ( 5 , 6 2 ) .
Figure 5. Performance contrast of RIMM, REKF, MPDA, and RDAT with different standard deviation of NLOS errors σ N L O S , P N L O S = 0.5 , N ( 0 , 1 2 ) and N ( 5 , 6 2 ) .
Sensors 20 06598 g005
Figure 6. The cumulative distribution function (CDF) result of the localization error.
Figure 6. The cumulative distribution function (CDF) result of the localization error.
Sensors 20 06598 g006
Figure 7. Performance comparison between RIMM, REKF, MPDA, and RDAT with the probability of NLOS errors P N L O S , N ( 0 , 1 2 ) and U ( 0 , 14 ) .
Figure 7. Performance comparison between RIMM, REKF, MPDA, and RDAT with the probability of NLOS errors P N L O S , N ( 0 , 1 2 ) and U ( 0 , 14 ) .
Sensors 20 06598 g007
Figure 8. Performance comparison between RIMM, REKF, MPDA, and RDAT with different maximum value of NLOS error, where P N L O S = 0.5 , N ( 0 , 1 2 ) and U ( 0 , 14 ) .
Figure 8. Performance comparison between RIMM, REKF, MPDA, and RDAT with different maximum value of NLOS error, where P N L O S = 0.5 , N ( 0 , 1 2 ) and U ( 0 , 14 ) .
Sensors 20 06598 g008
Figure 9. Performance contrast between RIMM, REKF, MPDA, and RDAT with different parameters of index distribution, where P N L O S = 0.5 , N ( 0 , 1 2 ) and E ( 8 ) .
Figure 9. Performance contrast between RIMM, REKF, MPDA, and RDAT with different parameters of index distribution, where P N L O S = 0.5 , N ( 0 , 1 2 ) and E ( 8 ) .
Sensors 20 06598 g009
Figure 10. The CDF result of the localization error.
Figure 10. The CDF result of the localization error.
Sensors 20 06598 g010
Figure 11. Deployment of experiment.
Figure 11. Deployment of experiment.
Sensors 20 06598 g011
Figure 12. The localization error of sample points.
Figure 12. The localization error of sample points.
Sensors 20 06598 g012
Figure 13. The CDF result of localization error.
Figure 13. The CDF result of localization error.
Sensors 20 06598 g013
Table 1. Gaussian distribution parameter.
Table 1. Gaussian distribution parameter.
ParameterSignValues
The number of anchor nodes M 6
NLOS error probability P N L O S 0.5
The measurement noise N ( 0 , σ G 2 ) N ( 0 , 1 2 )
The NLOS errors N ( μ N L O S , σ N L O S 2 ) N ( 5 , 6 2 )
NLOS: non-line-of-sight.
Table 2. Uniform distribution parameter.
Table 2. Uniform distribution parameter.
ParameterSignValues
The number of anchor nodes M 6
NLOS error probability P N L O S 0.5
The measurement noise N ( 0 , σ G 2 ) N ( 0 , 1 2 )
The NLOS errors U ( a , b ) U ( 0 , 14 )
Table 3. Index distribution parameter.
Table 3. Index distribution parameter.
ParameterSignValues
The number of anchor nodes M 6
NLOS error probability P N L O S 0.5
The measurement noise N ( 0 , σ G 2 ) N ( 0 , 1 2 )
The NLOS errors E ( λ ) E ( 8 )
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Cheng, L.; Wang, Y.; Xue, M.; Bi, Y. An Indoor Robust Localization Algorithm Based on Data Association Technique. Sensors 2020, 20, 6598. https://0-doi-org.brum.beds.ac.uk/10.3390/s20226598

AMA Style

Cheng L, Wang Y, Xue M, Bi Y. An Indoor Robust Localization Algorithm Based on Data Association Technique. Sensors. 2020; 20(22):6598. https://0-doi-org.brum.beds.ac.uk/10.3390/s20226598

Chicago/Turabian Style

Cheng, Long, Yong Wang, Mingkun Xue, and Yangyang Bi. 2020. "An Indoor Robust Localization Algorithm Based on Data Association Technique" Sensors 20, no. 22: 6598. https://0-doi-org.brum.beds.ac.uk/10.3390/s20226598

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop