You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

16 March 2018

An Obstacle-Tolerant Path Planning Algorithm for Mobile-Anchor-Node-Assisted Localization

and
Institute of Manufacturing Information and Systems, National Cheng Kung University, Tainan City 70101, Taiwan
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Selected Papers from IEEE ICICE 2017

Abstract

The location information obtained using a sensor is a critical requirement in wireless sensor networks. Numerous localization schemes have been proposed, among which mobile-anchor-node-assisted localization (MANAL) can reduce costs and overcome environmental constraints. A mobile anchor node (MAN) provides its own location information to assist the localization of sensor nodes. Numerous path planning schemes have been proposed for MANAL, but most scenarios assume the absence of obstacles in the environment. However, in a realistic environment, sensor nodes cannot be located because the obstacles block the path traversed by the MAN, thereby rendering the sensor incapable of receiving sufficient three location information from the MAN. This study proposes the obstacle-tolerant path planning (OTPP) approach to solve the sensor location problem owing to obstacle blockage. OTPP can approximate the optimum beacon point number and path planning, thereby ensuring that all the unknown nodes can receive the three location information from the MAN and reduce the number of MAN broadcast packet times. Experimental results demonstrate that OTPP performs better than Z-curves because it reduces the total number of beacon points utilized and is thus more suitable in an obstacle-present environment. Compared to the Z-curve, OTPP can reduce localization error and improve localization coverage.

1. Introduction

Wireless sensor networks (WSNs) consist of a number of sensing devices with external physical information and network communication capabilities. WSNs are deployed in an area to be detected, and they collect and report environmental information for users. The scope of application of WSNs includes the military, intelligent h, health care, and ecological detection [1]. In the application of WSNs, localization is a critical technique that enables unknown nodes (or ordinary nodes) to obtain their own location information to further optimize applications such as routing protocols and object tracking [2,3].
The Global Positioning System (GPS) is a tool that obtains location information. However, each unknown node equipped with a GPS transceiver will result in a substantial increase in costs. A viable method is utilizing a few anchor nodes. Anchor nodes are nodes that know their locations, being equipped with GPS transceivers. Anchor nodes broadcast messages including their location information to unknown nodes. Unknown nodes then use distance measurement technology to obtain the relative distance or angle relationship with the anchor nodes. Thereafter, the positions of these unknown nodes are calculated via localization algorithms [2,3,4,5,6]. The minimum number of required anchor nodes must ensure that each unknown node receives at least three messages from different anchor nodes, which is still costly. An alternative is using a dynamic anchor node, also known as a mobile anchor node (MAN), with a pre-planned path to continuously broadcast location information to replace multiple static anchor nodes. The locations where the MAN broadcasts messages are called beacon points. This localization architecture is called mobile-anchor-node-assisted localization (MANAL) [2]. MANAL comprises a GPS-equipped MAN and numerous unknown nodes [7,8], as shown in Figure 1.
Figure 1. Network architecture of MANAL.
Path planning is a critical issue in MANAL. The fundamental requirement for a MAN is to ensure that all the unknown nodes can receive three (non-colinear) packets, thereby enabling unknown nodes to calculate their own positions. Most environments have obstacles that involve communication-signal shadowing. For example, electromagnetic waves collide with obstacles on the transmission path, thereby resulting in reflection, diffraction, and scattering as well as in the unknown nodes being rendered incapable of receiving packets from a MAN.
To solve the problem of obstacle blocking, reference [8] proposed an intuitive method, in which a MAN changes its movement direction when it encounters obstacles, detours around the obstacles, and broadcasts packets to unknown nodes. However, this method cannot guarantee that all the unknown nodes will receive three packets for locating their position. In addition, a MAN is required to additionally broadcast substantial location information when changing the direction of movement, thereby resulting in excessive wastage of power for the MAN and unknown nodes.
To reduce costs and guarantee that all the unknown nodes in the sensing area receive at least three messages from MAN, there are optimal placements for beacon points. The optimal path of MAN is based on the optimal placement of beacon points. Obviously, the MAN’s path problem is one of the Hamiltonian path problems [9] that visits each vertex of the graph exactly once. The Hamiltonian path problem is a well-known NP-complete problem [10,11] and therefore MAN’s path is also an NP-complete problem. Therefore, this study presents an obstacle-tolerant path planning (OTPP) approach, which uses the divide and conquer strategy to divide the entire area into multiple unit squares, thereby optimizing the position of the beacon point and the required number of beacon points for each unit square. Lastly, all the beacon points are visited by MAN. To summarize, the contributions of this study are as follows:
  • In the obstacle-present environment, OTPP guarantees that all the unknown nodes can receive three location information (packets) from a MAN and the number of beacon points of MAN in OTTP is less than in Z-curve.
  • OTPP uses a rectangle as the boundary of each of the obstacles; any convex polygon is transformed into a rectangle, and two path trajectories for MAN are proposed.
  • In the obstacle-present environment, this study is the first to propose a static path planning method to optimize the number of beacon points. OTPP optimizes the number of beacon points, thereby reducing the number of broadcast times of MAN and receiving packet times of unknown nodes to facilitate the reduction in power consumption.
  • OTPP performs better than Z-curve because it uses less total number of beacon points and is thus more suitable in an obstacle-present environment. Compared to the Z-curve, OTPP can reduce localization error and improve localization coverage.
  • Online path planning methods cannot guarantee that all the unknown sensors in the sensing area can be positioned. Compared to them, our approach, OTPP, does not only guarantee full coverage of sensor localization but also has scalability and flexibility to adapt to environmental changes by adopting the divide-and-conquer method.
The rest of this paper is organized as follows: Section 2 reviews the related works and summarizes the existing path planning method for MANAL. Section 3 explains the problems for existing path planning in the obstacle-present environment. Section 4 presents the OTPP approach. Section 5 provides an analysis of the performance of the Z-curve, and OTPP through simulations, and Section 6 contains our conclusions and future works.

3. Overview

3.1. Preliminary

Table 2 presents the terminologies used in this paper.
Table 2. Terminologies.
Definition 1.
Basic square. According to References [7,8], any N × N region can be partitioned into k basic squares. Each basic square must be divided into four sub-squares, Sqh, with a side length of d; where h ∈ {1, 2, 3, 4}, as shown in Figure 2.
Figure 2. Communication radius, CR, must be larger than or equal to ( 5 / 2 ) d to ensure that all the unknown nodes in a basic square receive at least three position packets from the MAN.
The locations of the beacon points of a MAN in a basic square are denoted by c0, c1, c2, c3, and c4, in Figure 2. Lemma 1 ensures that all the unknown nodes in a basic square can receive at least three position packets from the MAN.
Lemma 1.
An unknown node, si, (i ∈ {1,2, …, n}), in a basic square can receive at least three position packets from the MAN if and only if C R ( 5 / 2 ) d , where CR represents the communication range of the MAN [7,8].
Proof. 
This lemma originates from reference [7] where the detailed proof can be found. Here, we give a brief proof. Based on the localization method, an unknown node, s1, inside Sq3 can be localized only if it can receive three non-collinear position packets from the MAN. As C R ( 5 / 2 ) d , dist(c0, s1) ≤ ( 5 / 2 ) d , dist(c3, s1) ≤ ( 5 / 2 ) d , and dist(c4, s1) ≤ ( 5 / 2 ) d , s1 can receive the position packets broadcast by the MAN at locations c1, c3, and c4, thereby being localized, as illustrated in Figure 2. Similarly, all the unknown nodes si (i ∈ {1, 2, .., n}) that are inside Sq1, Sq2, and Sq4 can be localized.
The farthest location from the center of the basic square is the vertex of the square. Assume the unknown node s1 located at the vertex of the square can receive at least three position packets from the three nearest beacon points c1, c3, and c4, the communication range CR must be larger than Max[dist(c0, s1)], dist(c3, s1), dist(c4, s1)] and Max[dist(c1, s1)], dist(c3, s1), dist(c4, s1)] = ( 5 / 2 ) d so C R ( 5 / 2 ) d . ☐

3.2. Problem Description

In an obstacle-present environment, assume that an obstacle exists between s1 and c1 as well as s1 and c2; then, s1 will receive only the position packets broadcast by the MAN at beacon points c3 and c4, as shown in Figure 3.
Figure 3. The unknown node s1 is blocked by an obstacle and thus cannot receive a minimum of three position packets from the MAN.
Without loss of generality, in this work, an arbitrary convex polygonal obstacle is converted into a rectangle, as shown in Figure 4. Lv is the edge of the obstacle and is parallel to the Y-axis; Wv is the edge of the obstacle and is parallel to the X-axis. According to the relationship among Lv, Wv, and d, obstacles may be classified into the following three types:
{ Type   I :   L v < d   and   W v < d . Type   I I :   L v < d     W v . Type   I I I :   W v < d   L v .
Figure 4. For simplicity, rectangles are used to bind obstacles in an obstacle-filled scenario.
k-covered areas are defined to demonstrate the effects of an obstacle on unknown nodes in different areas.
Definition 2.
k-covered area. An area is k-covered if all the unknown nodes within this area can receive k non-collinear position packets from the MAN.
The following two scenarios are feasible in a basic square, in which the unknown nodes that are present in areas where k < 3 cannot be localized:
  • A two-covered area exists inside a basic square; the unknown nodes within this area can receive only two position packets from the MAN, as illustrated in Figure 5a.
    Figure 5. Obstacle shadowing results in the presence of non-three-covered areas in a basic square: (a) two-covered area, (b) one-covered and zero-covered areas where L v < d and Wv ≥ d, and (c) one-covered and zero-covered areas where   L v d   and   W v < d .
  • One-covered and zero-covered areas are present within a basic square; the unknown nodes within these areas can receive only one and zero packets from the MAN, as shown in Figure 5b,c.
Evidently, additional beacon points are required to ensure that the entire basic square is a three-covered area.

4. Algorithm of OTPP

4.1. Deployment of Beacon Points in OTPP

Table 3 presents the flow of how to deploy the beacon points by OTPP which is coherent with the following lemmas. The following lemmas prove that OTPP guarantees full coverage of localization of unknown nodes.
Table 3. Deployment of beacon points in OTPP.
Definition 3.
Basic square with obstacles. Assume that each basic square contains a maximum of one obstacle with sides of lengths Ly and Wy, and the center of the obstacle lies on the position of the beacon point c0.
To determine the optimal placement of beacon points in a basic square with obstacles, we adopt divide-and-conquer approach. We first divide a basic square to four sub-squares because it is the maximum number of sub-squares which are identical and with minimum area size. To minimize the number of beacon points, the optimal location of beacon point should be able to cover all the unknown nodes in a sub-square. The union of optimal locations are called reg. As long as there are three non-collinear locations in reg selected as beacon points, all the unknown nodes can be localized in a sub-square. Accordingly, we can obtain the following Lemma 2.
Lemma 2.
If all the unknown nodes si in the sub-square can be localized, then, three non-collinear beacon points need to be present, and all the three beacon points will lie within reg1.
Proof. 
The localization of an unknown node’s position requires at least three non-collinear beacon points [2]. Lemma 1 indicates that all the unknown nodes within the basic square can be localized. Therefore, the communication range (CR) of the MAN and unknown nodes are at least ( 5 / 2 ) d . Since the four sub-squares are identical, we consider sub-square Sq1 as representative. In sub-square Sq1, the maximum distance is 2 d < ( 5 / 2 ) d . Hence, three beacon points are required to localize all the unknown nodes when no obstacles are present. When obstacles are present, to find reg, we extend the sides of the obstacle and hence the sub-squares are divided into three regions. reg is then bounded by the two lines from the extended sides of the obstacle. The other two regions, A1 and A2, cannot guarantee to cover all the unknown nodes in Sq1. To cover all unknown nodes in A1, the locations of three beacon points are bounded to the area on the left of the obstacle which are A1 and reg1. To cover all unknown nodes in A2, the locations of three beacon points are bounded to the area above the obstacle which are A2 and reg1. The intersection of the two areas is reg, as shown in Figure 6. ☐
Figure 6. The layout of beacon points in the OTPP scheme and the dots are the possible locations of beacon points.
We may obtain the following (Corollary 1) to enable the localization of all the unknown nodes si within the entire basic square.
Corollary 1.
Given that each sub-square Sqh (h ∈ {1, 2, 3, 4}) requires three beacon points, twelve beacon points should be added to cover the entirety of a basic square.
Beacon points should be added in reg1reg4 owing to obstacle blocking and to ensure that each sub-square is a three-covered area. For a two-covered area, we can further obtain the following Lemma 3.
Lemma 3.
When a basic square contains two-covered areas, all the unknown nodes in a basic square can be localized, and a minimum of four beacon points should be added.
Proof. 
When a basic square contains two-covered areas; the basic square can be divided into 12 regions based on the sides of the obstacle (i.e., reg1reg4 and A1A8), and two-covered areas lie within Ai, i ∈ {1, 2, …, 8}. Therefore, adding a beacon point to reg1 results in the A1 and A2 regions receiving three beacon packets, thereby enabling the localization of the unknown nodes in these regions. Similarly, the addition of a beacon point to each of reg2reg4 will enable each of the A3A8 regions to receive three beacon packets and enable the localization of all the unknown nodes in these regions. Therefore, four beacon points should be added to enable the localization of all the unknown nodes within the entirety of the basic square. ☐
Lemma 4.
When a basic square contains zero-covered and one-covered areas, twelve beacon points should be added to the entirety of the basic square.
Proof. 
The basic square contains zero-covered and one-covered regions, and can be divided into twelve regions based on the sides of the obstacle (i.e., reg1reg4 and A1A8), in which zero- and one-covered areas are present in A1, A4, A5, and A8. Meanwhile, two-covered regions are present in A2, A3, A6, and A7. Hence, the addition of three beacon points to reg1 will enable the A1 and A2 regions to receive three beacon packets and the localization of the unknown nodes within these regions. Similarly, the addition of three beacon points to each of reg2reg4 enables each of A3A8 to receive three beacon packets. Hence, the addition of twelve beacon points enables the localization of all the unknown nodes in the basic square. ☐
However, in Lemmas 3 and 4, which consider only the number of beacon points that should be deployed within each sub-square and do not consider the optimal deployment location, the excess number of beacon points will cause the MAN and unknown nodes to incur high energy cost.
Lemma 5.
When a basic square contains two-covered areas, a particular layout will enable two beacon points to completely cover the entirety of the basic square.
Proof. 
Lemma 3 indicates that the addition of a beacon point to each sub-square will enable complete coverage of the entirety of a basic square. However, this placement method does not consider the area that can be covered by a beacon point and only places a beacon point in each sub-square. Therefore, if we consider CR ( 5 / 2 ) d , then, A1, A2, A3, and A8 can be covered straightforwardly by placing a beacon point at the position m1. In addition, all the unknown nodes in A1, A2, A3, and A8 will be able to receive at least three beacon packets. Similarly, by placing a beacon point at position m2, A4A7 will be covered, and all the unknown nodes in A4A7 will receive at least three beacon packets. Therefore, two beacon points should be added to completely cover the entirety of the basic square, as shown in Figure 7a. ☐
Figure 7. The results of beacon point simplification in scenarios where (a) the basic square contains two-covered areas and (b) the basic square contains zero-covered and one-covered areas.
Lemma 6.
When a basic square contains zero- and one-covered areas, a particular layout will enable six beacon points to completely cover the entirety of the basic square.
Proof. 
Lemma 4 indicates that the addition of three beacon points to each sub-square will cover the entirety of a basic square. However, this placement method does not consider the area that can be covered by the beacon point and only places three beacon points in each sub-square. Therefore, if we consider CR ( 5 / 2 ) d , then, placing a beacon point in each of m4, m5, and m6 will cover reg1, reg3, A1, A2, A7, and A8. In addition, the unknown nodes in these regions will receive at least three beacon packets. Similarly, adding a beacon point to each of m1m3 will cover reg2, reg4, and A3A6; moreover, the unknown nodes in these regions will also receive at least three beacon packets. Therefore, the addition of six beacon points will enable complete coverage over the entirety of the basic square, as shown in Figure 7b. ☐
We can further calculate the total number of beacon points required for OTPP, NBP, as described by Lemma 7:
Lemma 7.
In OTPP, the entire basic square contains only three-covered areas; the total number of beacon points, N B P , required is five. The basic square contains two-covered areas; the total number of beacon points required is six; the basic square contains zero-covered and one-covered areas, and the total number of beacon points required is ten.
N B P = { 5 ,   when   three-covered 6 ,   when   two-covered 10 , when   one-coverd   and   zero-covered
Proof. 
In an obstacle-free environment, the total number of beacon points, N B P , required for OTPP is five (c0, c1, c2, c3, c4). When the entire basic square contains two-covered areas, which require adding two beacon points, the total maximum number of beacon points required is six (see Figure 7a). When the basic square contains zero-covered and one-covered areas, which require adding six beacon points, the total maximum number of beacon points required is ten (see Figure 7b). ☐

4.2. Path Planning in OTPP

The MAN must visit all the positions of the beacon points if the beacon points c1 and c4 were designated as its first (starting) point and final (ending) point positions for visitation. In the obstacle-free environment, the visit order of the beacon points for MAN is c1, c2, c0, c3, and c4.
1. Basic square containing two-covered areas
When the basic square contains two-covered areas, the MAN first visits c1 and c2. From the four corners of an obstacle, the proximate location from c2 is selected, which is an additional beacon point m1, and its diagonal position is set as m2. Thereafter, the MAN visits m1 and m2. Lastly, the MAN visits c3 and c4, i.e., the MAN completes the travel on the entire basic square, as shown in Figure 8.
Figure 8. The trajectories of OTPP with basic square containing two-covered area. The red arrows are the trajectories while the shadow area is the obstacle.
2. Basic square containing zero- and one-covered areas
When the basic square contains zero-covered and one-covered areas, the MAN verifies whether the path from c1 to c2 is obstructed by an obstacle or if c1 to c2 has a straight path without being obstructed by an obstacle. The MAN first visits c1 and c2. Among the additional beacon points mq (q = 1, 2, …, 6), the additional beacon point proximate to c2 is selected as the next beacon point to be visited following the visit to m1m6. Lastly, the MAN visits c3 and c4, as shown in Figure 9.
Figure 9. The straight-line path from c1 to c2 without blockage by an obstacle. The red arrows are the trajectories while the shadow area is the obstacle.
In another case, if the straight-line path from c1 to c2 is blocked by an obstacle, then, the positions of c2 and c3 are interchanged. The MAN first visits c1 and c2. Thereafter, additional beacon points mq, proximate to c2 are selected as the beacon points to be visited next. The sequential visits to the additional beacon points follow the order m5, m6, m4, m3, m1, and m2. Lastly, the MAN visits c3 and c4, as shown in Figure 10. Figure 10 is considered as the result of the rotation of Figure 9 by 90°.
Figure 10. The straight-line path from c1 to c2 is blocked by an obstacle; therefore, swap the positions of c2 and c3. The red arrows are the trajectories while the shadow area is the obstacle.

5. Performance Evaluation

The performance of OTPP is evaluated by three metrics (1) number of beacon points, (2) average localization errors, and (3) localization coverage. In Section 5.1, we describe the three metrics and compare three common localization techniques. The settings of experimental parameters are introduced in Section 5.2. Finally, we change the shapes of obstacles and the communication range to see the impact of blocking rate and the impact of resolution. The results are presented in Section 5.3.

5.1. Evaluation Metrics and Localization Techniques

  • Number of beacon points: The number of beacon points stand for the number of times that the MAN broadcasts packets. The more the times of MAN broadcasting, the more the packets the unknown nodes receive. An increase in the number of packets received by an unknown node, leads to a corresponding increase in power consumption per unknown node so that the performance of entire sensor networks, decreases.
  • Average localization error: Localization error is defined as the difference between the estimated locations and actual locations of unknown nodes. Equation (2) presents the localization error of an unknown node s i , where ( x i , y i ) is the coordinate of the actual location and ( x e s t i , y e s t i ) is the coordinate of the estimated location. Average localization error is presented in Equation (3) where n is the total number of unknown nodes. The lower the average localization errors, the better the performance of sensor networks:
    e r r o r ( s i ) = ( x i x e s t i ) 2 + ( y i y e s t i ) 2
    A v g E r r o r = i = 1 n e r r o r ( s i ) n
  • Localization coverage: An unknown node can successfully do self-positioning as long as it receives three or more packets from the MAN. The more the unknown nodes successfully self-positions, the better the performance of sensor networks. Therefore, we define the localization coverage as the ratio of the number of unknown nodes that receive three or more MAN packets to the total number of unknown nodes [8].
There are three common localization techniques, weighted centroid localization (WCL) [28], accuracy priority trilateration (APT) [8], and time priority trilateration (TPT) [8]. The descriptions are as follows:
(A)
Weighted Centroid Localization (WCL): WCL defines a weight function R S S i j which is the RSS value of the MAN at different beacon points to indicate the impact of different beacon point coordinates bj(x, y). Equation (4) expresses how an unknown sensor, si calculates its own positions, P(si) based on averaging the coordinates of all Nr received beacon points.
P ( s i ) = j = 1 N r R S S i j × b j j = 1 N r R S S i j
(B)
Time-Priority Trilateration (TPT): TPT calculation starts as soon as three localization packets are received. This enables sensors to save power and the time they need to spend waiting. With these localization packets, the following system of equations needs to be solved to obtain the localization result. For computing the position of si(xi, yi) in a 2-D space, the following system of equations must be solved:
P ( s i ) = { d i s t ( r 1 , s i ) = ( x 1 x i ) 2 + ( y 1 y i ) 2 d i s t ( r 2 , s i ) = ( x 2 x i ) 2 + ( y 2 y i ) 2 d i s t ( r 3 , s i ) = ( x 3 x i ) 2 + ( y 3 y i ) 2
(C)
Accuracy-Priority Trilateration (APT): Accuracy-Priority Trilateration (APT) is very similar to TPT. The difference between APT and TPT is that APT checks whether to start the trilateration calculation within a period of time. If a sensor has received at least three localization packets, it starts the trilateration calculation with three of the nearest keys.
In Figure 11, the experimental results show that the localization errors of APT, TPT, and WCL are 0.265, 0.339, and 0.434 CR, respectively while their corresponding localization coverages are similar. Therefore, we adopt the APT technique in the following experiments because APT is more accurate than TPT and WCL. The experimental parameter settings are shown in Table 4.
Figure 11. Comparison of APT, TPT, and WCL techniques in terms of localization error and coverage.
Table 4. Experimental parameters.

5.2. Simulation Setup

The first experiment aims to investigate the impact of blocking rate which is the ratio of the obstacle area to the entire area. We increase the rate from 0% to 30%. The second experiment aims to investigate the impact of the resolution, which is CR/d. We assume that the entire area size is 128   m × 128   m , and d is fixed at 16 m. The number of MAN is one. The total number of unknown nodes is 500, and the communication range CR of the first experiment is 5 × d . The wireless channel model is the log-normal model [8,16,29], as shown in Equations (6) and (7), where, P r e c denotes the received power, while P t r a n s and P l o s s denote the transmission power of the MAN and the power attenuation during transmission, respectively. X σ is the Gaussian random variable where the standard deviation and mean are set to 2 and 0 according to the environment, which has different set parameters [16]. All the experiments are implemented in C++ programming language and all the results are the average of 100 simulations. Table 4 shows the experimental parameters that reference the Z-curve [8], which is the compared target in this paper:
P r e c = P t r a n s P l o s s
P l o s s ( d ) = P l o s s ( d 0 ) + 10 γ log ( d d 0 ) + X σ

5.3. Simulation Results

5.3.1. Impact of Blocking Rate

In an obstacle-free environment, OTPP performs as the Z-curve. The MAN travels the entire basic square with five beacon points. However, in the obstacle-present environment, the number of beacon points varies with the shapes of obstacles. Without loss of generality, shapes of obstacles are categorized into three types which are described in Section 3.2. Table 5 displays the experimental results which show the average number of beacon points needed by OTPP and Z-curve for different types of obstacles. The average number of beacon points needed by OTPP is observed to be less than that needed by the Z-curve in all obstacle-present environments.
Table 5. Average number of beacon points.
Figure 12a is the result of comparing the Z-curve and OTPP, with respect to the impact of blocking rate on localization error. Both the localization errors of OTPP and Z-curve increase with an increase in blocking rate. The higher the blocking rate, the higher the difference between the localization errors of the Z-curve and OTPP schemes. The difference is more obvious when the blocking rate is higher than 10%. When the blocking rate is 30%, the difference between the localization errors reaches a value of 0.072 CR.
Figure 12. Impact of blocking rate on (a) localization error and (b) coverage ratio.
Figure 12b is the result of comparing the Z-curve and OTPP, with respect to the impact of blocking rate on localization coverage. The coverage of the Z-curve decreases with an increase in the blocking rate while OTPP maintain almost full coverage. When the ratio is 30%, the difference in localization coverage between the Z-curve and OTPP reaches 15%.
We then analyzed the OTPP in terms of the localization accuracy and coverage with a different communication range by fixing d as 16 m and changing the resolutions (CR/d). Figure 13a,b illustrate the localization accuracy and coverage with different resolution values (CR/d = 1.25d, 1.5d, 1.75d, and 2d, respectively), in OTPP.
Figure 13. Impact of blocking rate on (a) localization error and (b) coverage ratio.
In an obstacle-free environment which is blocking rate = 0, the localization accuracy and coverage ratio with resolution = 1.25d is lower than the others because its communication range is less than 1.6 d which violates lemma 1, resulting in insufficient location messages received by unknown nodes. When the resolution is higher than 1.6 d, the localization error then decreases to 0.2 CR and the coverage ratio is 100%. As the blocking rate of obstacles increases, the beacon points are added in OTPP according to the obstacle types and therefore shorten the distance between unknown nodes and beacon points so the localization error with resolution 1.25d and blocking rate decreases and the coverage ratio increases when blocking rate is under 5%. As the blocking rate increases to more than 5%, the localization accuracy and coverage both increase. However, for those whose resolution > 1.6d, their localization error and coverage are almost not affected by blocking rates.
In summary, compared to Z-curve, OTPP has less number of beacon points, lower localization errors and higher localization coverage. OTPP therefore performs better in obstacle-present environments. When the communication range C R ( 5 / 2 ) d , 100% localization coverage ratio is achieved.

5.3.2. Impact of Resolution

Figure 14a,b show the impact of resolution (CR/d) on localization errors and coverage. The field size is 128 m × 128 m and the communication range increases from d to 2.25d. According to Lemma 1, the minimum communication range, CR must be equal to or larger than ( 5 / 2 ) d   1.6 d to ensure that all unknown nodes in a basic square can receive at least three position packets from the MAN in an obstacle-free environment. In Figure 14a, with an increase in resolution, the localization errors of the OTPP decreases together with that of the Z-curve, with both stabilizing when the resolution is larger than 1.6d. OTPP performs better than Z-curve with respect to localization errors even though the resolutions are not large enough to fully cover a basic square. In Figure 14b, with an increase in resolution, the coverage of the OTPP increases together with that of the Z-curve. The coverage of the OTPP stabilizes when resolution is sufficient ( 1.6 d ) but the coverage of the Z-curve does not stabilize until the resolution is 2 d .
Figure 14. Impact of resolution on (a) localization error and (b) coverage ratio.

5.3.3. OTPP vs. Online Path Planning Algorithm

Figure 15a,b show the OTPP compared with online path planning algorithms in terms of localization errors and coverage. The online path planning algorithms of interest are MMN [19], Li [20], and MBL [21], with unknown nodes randomly deployed over a square sensing field of 1000   m × 1000   m , and communication range, set to 35 m, 50 m, 70 m, and 90 m, respectively. It is observed that the localization error of the OTPP   0.2CR is less than that of MBL, MMN, and Li. Although the localization accuracy of MMN and Li are close to that of OTPP, the localization coverage of these online path planning algorithms is less than 50%, whereas OTPP can achieve 95%. As the communication range increases, the coverage area is also improved (e.g., MBL); however, the MAN will determine the direction and path of the trajectory based on the number of location request messages from unknown nodes, and there is no guarantee that all the unknown nodes can receive three packets from the MAN.
Figure 15. OTPP compared with online path planning in terms of (a) localization error and (b) coverage ratio. The unit of communication range is meter (m).

6. Summary and Future Work

Mobile-anchor-node-assisted localization (MANAL) has becomes more popular because it not only saves the power consumption of unknown nodes in sensor networks, but also adapts to various environments. The key problem of MANAL is the path planning of the MAN. Many path planning schemes have been proposed for MANAL; however, most of them only adapt to obstacle-free environments, which is not practical. In this paper, we propose an obstacle-tolerant path planning algorithm, called OTPP. Compared to the other path planning algorithms for MANAL, OTPP ensures that all unknown nodes are covered by at least three beacon points by using minimum beacon points in a unit square area. The experimental results show that OTPP performs better than the Z-curve as the total number of beacon points is reduced, localization errors lowered and coverage increased. This implies that OTPP is more adaptive to obstacle-present environments. In the future, we will consider more practical environments, such as obstacles with mobility or 3D spaces in path planning for application in unmanned aerial vehicles or detection of marine resources.

Author Contributions

R.-G. Tsai and P.-H. Tsai conceived and designed the experiments; R.-G. Tsai performed the experiments; P.-H. Tsai analyzed the data; and R.-G. Tsai and P.-H. Tsai wrote the paper.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Table A1. Values of Figure 12 (Average localization error/Standard deviation).
Table A1. Values of Figure 12 (Average localization error/Standard deviation).
Blocking Rate (%)OTPPZ-Curve
0%0.072642/0.0024730.072548/0.002266
5%0.07423/0.0028350.080395/0.003239
10%0.075144/0.0031570.080409/0.003066
15%0.075517/0.0032610.088176/0.002725
20%0.082042/0.0033230.109765/0.002742
25%0.092433/0.0047090.142201/0.005814
30%0.099022/0.0045420.162859/0.007393
Table A2. Values of Figure 13 (Average localization error/Standard deviation).
Table A2. Values of Figure 13 (Average localization error/Standard deviation).
Blocking Rate (%)CR = 1.25dCR = 1.5dCR = 1.75dCR = 2d
0%0.522736/0.0115860.229271/0.0045820.196305/0.0026560.198529/0.002546
5%0.288306/0.0062620.243143/0.0049560.260096/0.0033090.265602/0.002699
10%0.333439/0.0063730.269417/0.0046460.275515/0.0031110.272391/0.002974
15%0.374983/0.0073590.304929/0.0054160.290966/0.0045870.270626/0.003400
20%0.488731/0.0098950.341111/0.0050220.311428/0.0041270.281862/0.003496
25%0.658398/0.0112340.383832/0.0065950.316821/0.0054440.286928/0.004905
30%0.913244/0.0135790.449443/0.0078210.346859/0.0063460.300728/0.005595
Table A3. Values of Figure 14 (Average localization error/ Standard deviation).
Table A3. Values of Figure 14 (Average localization error/ Standard deviation).
Resolution (CR/d)OTPPZ-Curve
1d1.279855/0.0217201.465825/0.025145
1.25d0.463241/0.0113670.766297/0.018753
1.5d0.245316/0.0075510.455239/0.013257
1.75d0.262951/0.0062840.283528/0.011040
2.d0.242452/0.0054150.259893/0.010880
2.25d0.215318/0.0050890.219514/0.008451

References

  1. Akyildiz, I.F.; Su, W.; Sankarasubramaniam, Y.; Cayirci, E. A survey on sensor networks. IEEE Commun. Mag. 2002, 40, 102–114. [Google Scholar] [CrossRef]
  2. Han, G.; Jiang, J.; Zhang, C.; Duong, T.; Guizani, M.; Karagiannidis, G. A Survey on Mobile Anchor Node Assisted Localization in Wireless Sensor Networks. IEEE Commun. Surv. Tutor. 2016, 18, 2220–2243. [Google Scholar] [CrossRef]
  3. Isbitiren, G.; Akan, O.B. Three-Dimensional Underwater Target Tracking with Acoustic Sensor Networks. IEEE Trans. Veh. Technol. 2011, 60, 3897–3906. [Google Scholar] [CrossRef]
  4. Chaurasiya, V.K.; Jain, N.; Nandi, G.C. A novel distance estimation approach for 3D localization in wireless sensor network using multi dimensional scaling. Inf. Fusion 2014, 15, 5–18. [Google Scholar] [CrossRef]
  5. Shao, H.; Zhang, X.; Wang, Z. Efficient closed-form algorithms for AOA based self-localization of sensor nodes using auxiliary variables. IEEE Trans. Signal Process. 2014, 62, 2580–2594. [Google Scholar] [CrossRef]
  6. Xiong, H.; Chen, Z.; An, W.; Yang, B. Robust TDOA Localization Algorithm for Asynchronous Wireless Sensor Networks. Int. J. Distrib. Sens. Netw. 2015, 2015, 1–10. [Google Scholar] [CrossRef]
  7. Koutsonikolas, D.; Das, S.M.; Hu, Y.C. Path planning of mobile landmarks for localization in wireless sensor networks. Comput. Commun. 2007, 30, 2577–2593. [Google Scholar] [CrossRef]
  8. Rezazadeh, J.; Moradi, M.; Ismail, A.S.; Dutkiewicz, E. Superior Path Planning Mechanism for Mobile Beacon-Assisted Localization in Wireless Sensor Networks. IEEE Sens. J. 2014, 14, 3052–3064. [Google Scholar] [CrossRef]
  9. Garey, M.R.; Johnson, D.S. Computers and Intractability: A Guide to the Theory of NP-Completeness; W.H. Freeman: New York, NY, USA, 1979; ISBN 0-7167-1045-5. [Google Scholar]
  10. DeLeon, M. A study of sufficient conditions for Hamiltonian cycles. Rose-Hulman Undergrad. Math. J. 2000, 1, 6. [Google Scholar]
  11. Garey, M.R.; Johnson, D.S.; Stockmeyer, L. Some simplified NP-complete problems. In Proceedings of the 6th Annual ACM Symposium on Theory of Computing, Seattle, WA, USA, 30 April–2 May 1974; pp. 47–63. [Google Scholar]
  12. Huang, R.; Zaruba, G.V. Static path planning for mobile beacons to localize sensor networks. In Proceedings of the 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops, White Plains, NY, USA, 19–23 March 2007; pp. 323–330. [Google Scholar]
  13. Hu, Z.; Gu, D.; Song, Z.; Li, H. Localization in wireless sensor networks using a mobile anchor node. In Proceedings of the IEEE/ASME International Conference on Advanced Intelligent Mechatronics, Xi’an, China, 2–5 July 2008; pp. 602–607. [Google Scholar]
  14. Zhang, B.; Yu, F.; Zhang, Z. Collaborative localization algorithm for wireless sensor networks using mobile anchors. In Proceedings of the 2nd Asia-Pacific Conference on Computational Intelligence and Industrial Applications, Wuhan, China, 28–29 November 2009; pp. 309–312. [Google Scholar]
  15. Han, G.; Xu, H.; Jiang, J.; Shu, L.; Hara, T.; Nishio, S. Path planning using a mobile anchor node based on trilateration in wireless sensor networks. Wirel. Commun. Mob. Comput. 2011, 14, 1324–1336. [Google Scholar] [CrossRef]
  16. Guo, Z.; Guo, Y.; Hong, F.; Yang, X.; He, Y.; Feng, Y.; Liu, Y. Perpendicular intersection: Locating wireless sensors with mobile beacon. IEEE Trans. Veh. Technol. 2010, 59, 3501–3509. [Google Scholar] [CrossRef]
  17. Ou, C.; He, W. Path planning algorithm for mobile anchor-based localization in wireless sensor networks. IEEE Sens. J. 2013, 13, 466–475. [Google Scholar] [CrossRef]
  18. Ssu, K.F.; Ou, C.H.; Jiau, H.C. Localization with mobile anchor points in wireless sensor networks. IEEE Trans. Veh. Technol. 2005, 54, 1187–1197. [Google Scholar] [CrossRef]
  19. Yang, Y.; Zhang, L. Dynamic path planning of mobile beacon for localization in wireless sensor network. In Proceedings of the International Conference on Wireless Communications & Signal Processing (WCSP), Hangzhou, China, 24–26 October 2013. [Google Scholar]
  20. Li, J.; Yang, K. Improvement of path planning in mobile beacon assisted positioning. In Proceedings of the 7th International Conference on Intelligent Computing, Liverpool, UK, 7–10 August 2011; Springer: Heidelberg, Germany, 2011; pp. 309–316. [Google Scholar]
  21. Zhao, F.; Luo, H.; Lin, Q. A mobile beacon-assisted localization algorithm based on network-density clustering for wireless sensor networks. In Proceedings of the 5th International Conference on Mobile Ad-hoc and Sensor Networks, Fujian, China, 14–16 December 2009; pp. 304–310. [Google Scholar]
  22. Kim, K.; Lee, W. MBAL: A mobile beacon-assisted localization scheme for wireless sensor networks. In Proceedings of the 16th International Conference on Computer Communications and Networks, Honolulu, HI, USA, 13–16 August 2007; pp. 57–62. [Google Scholar]
  23. Li, X.; Mitton, N.; Simplot-Ryl, I.; Simplot-Ryl, D. Dynamic beacon mobility scheduling for sensor localization. IEEE Trans. Parallel Distrib. Syst. 2012, 23, 1439–1452. [Google Scholar] [CrossRef]
  24. Rashid, A.T.; Ali, A.A.; Frasca, M.; Fortuna, L. Path planning with obstacle avoidance based on visibility binary tree algorithm. Robot. Auton. Syst. 2013, 61, 1440–1449. [Google Scholar] [CrossRef]
  25. Li, H.; Wang, J.; Li, X.; Ma, H. Real-time path planning of mobile anchor node in localization for wireless sensor networks. In Proceedings of the International Conference on Information and Automation, Changsha, China, 20–23 June 2008; pp. 384–389. [Google Scholar]
  26. Mazinani, S.M.; Farnia, F. Localization in wireless sensor network using a mobile anchor in obstacle environment. Int. J. Comput. Commun. Eng. 2013, 2, 438–441. [Google Scholar] [CrossRef]
  27. Ding, Y.; Wang, C.; Xiao, L. Using mobile beacons to locate sensors in obstructed environments. J. Parallel Distrib. Comput. 2010, 70, 644–656. [Google Scholar] [CrossRef]
  28. Blumenthal, J.; Grossmann, R.; Golatowski, F.; Timmermann, D. Weighted centroid localization in zigbee-based sensor networks. In Proceedings of the IEEE International Symposium on Intelligent Signal Processing, Alcala de Henares, Spain, 3–5 October 2007; pp. 1–6. [Google Scholar]
  29. Rappaport, T.S. Wireless Communications: Principles and Practice, 2nd ed.; Prentice-Hall: Upper Saddle River, NJ, USA, 2001. [Google Scholar]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.