Next Article in Journal
Optimization of the Maritime Signaling System in the Lagoon of Venice
Next Article in Special Issue
A Practical Neighbor Discovery Framework for Wireless Sensor Networks
Previous Article in Journal
Reduction of Artefacts in JPEG-XR Compressed Images
Previous Article in Special Issue
Fuzzy-Logic Dijkstra-Based Energy-Efficient Algorithm for Data Transmission in WSNs
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Triple-Filter NLOS Localization Algorithm Based on Fuzzy C-means for Wireless Sensor Networks

1
Department of Computer and Communication Engineering, Northeastern University, Qinhuangdao 066004, China
2
SANY GROUP CO., LTD., Changping, Beijing 102202, China
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(5), 1215; https://doi.org/10.3390/s19051215
Submission received: 21 January 2019 / Revised: 26 February 2019 / Accepted: 4 March 2019 / Published: 10 March 2019
(This article belongs to the Special Issue Intelligent Systems in Sensor Networks and Internet of Things)

Abstract

:
With the rapid development of communication technology in recent years, Wireless Sensor Network (WSN) has become a promising research project. WSN is widely applied in a number of fields such as military, environmental monitoring, space exploration and so on. The non-line-of-sight (NLOS) localization is one of the most essential techniques for WSN. However, the NLOS propagation of WSN is largely influenced by many factors. Hence, a triple filters mixed Kalman Filter (KF) and Unscented Kalman Filter (UKF) voting algorithm based on Fuzzy-C-Means (FCM) and residual analysis (TF-FCM) has been proposed to cope with this problem. Firstly, an NLOS identification algorithm based on residual analysis is used to identify NLOS errors. Then, an NLOS correction algorithm based on voting and NLOS errors classification algorithm based on FCM are used to process the NLOS measurements. Hard NLOS measurements and soft NLOS measurements are classified by FCM classification. Secondly, KF and UKF are applied to filter two categories of NLOS measurements. Thirdly, maximum likelihood localization (ML) is employed to estimate the position of mobile nodes. The simulation result confirms that the accuracy and robustness of TF-FCM are better than IMM, UKF and KF. Finally, an experiment is conducted to test and verify our algorithm which obtains higher localization accuracy.

1. Introduction

The most popular worldwide localization is the Global Positioning System (GPS) which is used to tackle outdoor positioning problems, but its accuracy cannot meet requirements in some areas especially in indoor environments. Therefore, Wireless Sensor Network (WSN) based on indoor localization has attracted attention in recent years.
As a research hotspot, WSN has been widely applied in military applications, environmental monitoring, medical care and space exploration. Moreover, the localization techniques based on a mobile node’s location has vital research significance [1]. Because of the influence of Non-Line-of-Sight (NLOS) propagation, and other factors such as insufficient position signal strength, electromagnetic interference noise and mobile beacon node, the accuracy of localization has become a critical research direction.
According to measuring the distance between nodes, localization algorithms are normally divided into two categories: range-based algorithms and range-free algorithms, and there are many conventional methods in range-based algorithms; for example, time difference of arrival (TDoA), time of arrival (ToA), received signal strength (RSS), direction-of-arrival (DoA) and space-division multiple-access (SDMA) exploiting rich multi-path environment (i.e., NLOS) [2]. There are two categories of nodes in WSN: beacon nodes and mobile nodes. The coordinate information of beacon nodes can be acquired, while the position of mobile nodes is unknown. The position of a mobile node can be estimated by using the algorithms mentioned above.
The biggest challenge of indoor localization is NLOS propagation. The obstacles between beacon nodes and mobile nodes are the major factors generating NLOS errors, mostly because the obstacles block or reflect the spread of the signal. Therefore, in range-based indoor localization, the mitigation of NLOS errors is profoundly critical to improve the indoor localization accuracy. Many strategies have been proposed in order to mitigate NLOS effects [3,4,5,6,7,8,9,10,11,12,13].
In order to tackle the fluctuation problem of range information, many researchers have proposed various filtering algorithms: Average Filtering algorithm (AF), Gauss Filter (GF), Kalman Filter (KF), Extended Kalman Filter (EKF), Unscented Kalman Filter (UKF), Particle Filtering (PF) and so on. This paper proposes a triple filter algorithm based on KF and UKF. Most papers divide measurements into two categories: LOS and NLOS. Actually, the measurements with NLOS errors can be classified more meticulously so as to better cope with the NLOS problem. Considering that KF has limitations in dealing with nonlinear noise, UKF is used to cope with non-linear noise. The main contributions of this paper are as follows:
(1)
A residual analysis based on the NLOS identification algorithm is proposed to identify NLOS errors. A method of mixed UKF and KF is proposed to filter out measurements noise, and no prior information is required in this mixed algorithm, which can better mitigate NLOS errors.
(2)
The NLOS correction algorithm based on voting is proposed to restrict NLOS errors and correct the NLOS measurements, which are used to preprocess the NLOS measurements that need to be classified.
(3)
NLOS measurements are classified into two categories: hard NLOS measurements and soft ones by Fuzzy-C-Means (FCM), which can be extended into more filters to tackle complicated NLOS errors, and it is flexible and robust as well.
(4)
The algorithm is applied to different NLOS conditions, such as Gaussian Distribution, Exponential Distribution, and Uniform Distribution, which make our algorithm robust to a complex environment. An experiment has been conducted, and the result shows that our algorithm has better performance compared with KF, IMM and UKF.
This paper is organized as follows. Firstly, the symbol description will be given in Section 2. The related works are described in Section 3. Then, some descriptions about problem statement and a brief introduction of UKF and KF are described in Section 4. Next, our algorithm is presented in detail in Section 5, and Section 6 will show the simulation and experiment results of contrast in the midst of our algorithm and other methods. Finally, the conclusions are made in Section 7.

2. Symbol Description

Key notions are shown in Table 1.

3. Related Works

With the extensive research on WSN, many researchers have proposed algorithms to deal with the NLOS condition. Among most methods, LOS and NLOS measurements are classified to mitigate the influence of NLOS errors and improve the accuracy of positioning. These methods are mainly range-based algorithms, which need point to point distance or angle information to estimate the location. In [3], Liao proposed the classic Interacting Multiple Model (IMM), which is regarded as the classical algorithm to tackle NLOS problems. The significant contribution of [3] is a two-state Markov switching model, which is used to measure the switching probability of NLOS and LOS measurements. In addition, the combination probability of IMM is updated by Markov switching probability. However, the NLOS identification method of IMM is fuzzy, which is not accurate enough to distinguish between NLOS and LOS errors. Furthermore, more NLOS parameter information and prior information is needed when filtering, which represents a lack of strong robustness. In [4], Huerta proposed a joint PF and an UKF algorithm (RBPF). In this paper, a Bayesian model is used to fully exploit the LOS and NLOS measurements. PF and UKF are used to estimate the trajectory and kinetic variable (position and speed) of a mobile node. Although the experimental result shows great performance, the complex and comprehensive simulation scenario is needed to illustrate the robustness of the algorithm. Tomic proposed a target localization algorithm utilizing integrated measurements; namely, RSS and AoA in [5]. Through convex relaxations and derivation of convex problems, global minima and solutions can be obtained. The most important contribution of his work is combined RSS and AoA, which produces a high-precision and -accuracy of localization, but the device complexity is high, and the identification of NLOS and LOS needs to be improved.
In addition, there are several studies based on ToA [6,7,8]. Tomic proposed a bisection-based approach for exact target localization in NLOS environments [6]. In this paper, he utilized the maximum likelihood (ML) estimator and converted the localization problem into a generalized trust region sub-problem (GTRS) framework. It has the same performance as existing methods, but the computational complexity is better. The great advantage of the proposed algorithm is its linear computational complexity. Nevertheless, its accuracy and precision need to be further improved. Pak proposed distributed hybrid particle/FIR filtering (DHPFF) for mitigating NLOS effects in TOA-based localization using wireless sensor networks in [7]. In this paper, the hybrid particle finite impulse response filter (HPFF) was adopted in order to cope with the cases that NLOS noises generate. The advantage of this algorithm is that it can achieve self-recovery by detecting failures and resetting the algorithm. However, the computational complexity of DHPFF is too high to be applied to computers with poor computational power. Liu proposed a closed form localization method using AoA and ToA measurements based on WSN in NLOS environments in [8]. This paper used a two-step weighted least square (WLS) estimator by means of the first-order error analysis. However, an experiment is needed, because the Gaussian distribution of simulation cannot cover all the complex situation in the real world.
NLOS identification is profoundly significant in most range-based algorithms. Hence, some methods have been proposed to address this issue better [9,10,11,12,13]. Hua proposed an NLOS identification and positioning algorithm based on a localization residual in WSN in [9]. A two-step algorithm to mitigate NLOS errors is proposed, including residual analysis addressing the positioning difference and a threshold hypothesis test. The simulation shows a good performance, but the algorithm needs an experiment based on a real scenario, and the hypothesis based on threshold needs much reliance on people’s subjective experience. Yang proposed NLOS identification for UWB localization based on import vector machine (IVM) in [10]. In his paper, a novel NLOS identification algorithm with feature selection strategy has been put forward so as to ameliorate the classification accuracy. Besides, a localization algorithm based on IVM with high accuracy and low complexity is also a highlight, which produces higher positioning accuracy than Support Vector Machine (SVM) and Relevance Vector Machine (RVM), but the algorithm needs plenty of training data, and will perform poorly with few training sets. Lei come up with a robust cooperative indoor localization based on reliability evaluation in [11]. The algorithm combines the advantages of compressive sensing (CS) in the LOS condition and the PF in the NLOS condition, and a reliability evaluation is also proposed to evaluate the estimation results of CS and PF. However, the NLOS identification of this method is based on reliability evaluation, which is not accurate to distinguish the NLOS and LOS measurements. Aghaie presented localization of WSN nodes based on NLOS identification using AoAs statistical information in [12]. The main idea of this paper is the identification of NLOS nodes based on the statistical model of the measurement and the NLOS errors where they utilized an NP method to judge a threshold. Yu put forward a mean shift-based mobile localization method in mixed LOS/NLOS environments for a wireless sensor network in [13]. A novel mobile localization method is presented in order to overcome the effects of NLOS errors by utilizing the mean shift-based Kalman filter, but the NLOS identification is based on the hypotheses and alternatives methods. These methods need prior thresholds.
Apart from the Maximum Likelihood (ML) based on the parameter estimation methods mentioned above, there are also other popular approaches in the family of ML-based parameter estimation. The iterative Space-Alternative Generalized Expectation Maximization Algorithm (SAGE) introduces some hidden data to simplify the ML estimation [14]. A soft-input soft-output (SISO) version improves robustness, which is applied to joint successive interference cancellation and channel estimation [15]. The iterative method is called multiple-input multiple-output space division multiple access (MIMO-SDMA), which approaches the maximum likelihood estimate with fast convergence and low complexity [16].

4. Problem Statement

This section is made up of three parts: signal model and brief introductions of UKF and FCM. In Section 4.1, some necessary assumptions and important definitions about NLOS are proposed to better describe the algorithm. In Section 4.2 and Section 4.3, a brief presentation about the methods is given, including FCM and UKF. In Section 4.2, a brief description of UKF is made, which is used to cope with NLOS errors. In Section 4.3, an introduction about FCM is used to classify NLOS measurements into two categories: hard NLOS measurements and soft ones.

4.1. Signal Model

In this section, some technical preparations are introduced to describe the algorithm. N beacon nodes are randomly distributed in field with the coordinates given by ( x i , y i ) , i = 1 , , N . The coordinate of unknown node at the time k is ( x ( k ) , y ( k ) ) , t = t 0 , , t n . Hence, the true distance d i ( k ) between the i -th unknown node and the beacon node at time k [17,18,19] can be expressed as:
d i ( k ) = ( x i x ( k ) ) 2 + ( y i y ( k ) ) 2
Due to the existence of measurement errors, the noise of actual measurement distance d ^ i L O S ( k ) under LOS condition can be approximated by Gaussian white noise. So the LOS measurement distance can be expressed as follows:
d ^ i L O S ( k ) = d i ( k ) + n L O S
where n L O S is the measurement noise obeyed Gaussian Distribution with zero mean and σ L O S 2 , i.e., N ( 0 , σ L O S 2 ) . The probability density function of n L O S can be expressed as:
f ( n L O S ) = 1 2 π σ L O S 2 exp ( n L O S 2 2 σ L O S 2 )
In actual scenario, there are obstacles between beacon nodes and mobile node, which result in the propagation distance is longer than true distance. Thus, some NLOS noise n N L O S can be added to measurement distance d ^ i N L O S ( k ) :
d ^ i N L O S ( k ) = d i ( k ) + n L O S + n N L O S
Moreover, the NLOS error n N L O S is usually regarded as positive, which obey Gaussian, Uniform, or Exponential Distribution. The probability density function of n N L O S n o r m obeyed Gaussian Distribution ( n N L O S n o r m N ( μ N L O S , σ N L O S 2 ) ) can be described as follows:
f ( n N L O S n o r m ) = 1 2 π σ N L O S 2 exp ( ( n N L O S n o r m μ N L O S ) 2 2 σ N L O S 2 )
And the probability density function of n N L O S u n i f which obeys to Uniform Distribution ( n N L O S u n i f U ( u min , u max ) ) is given by:
f ( n N L O S u n i f ) = { 1 u max u min , u min n N L O S u n i f u max 0 , e l s e
The probability density function of n N L O S exp which obeys to Exponential Distribution ( n N L O S exp E ( λ ) ) is given by:
f ( n N L O S exp ) = {   1 λ e n N L O S exp λ , n N L O S exp 0 0 , n N L O S exp < 0

4.2. A Brief Introduction to UKF

In our algorithm, UKF is utilized to tackle NLOS measurements including hard NLOS measurements and soft ones. In this section, the advantages of UKF are firstly introduced. Then, an important technique UT transform that is used in UKF will be discussed to better introduce UKF. Finally, the brief implementation steps of UKF will be given.
UKF is an algorithm that uses sampling points to estimate nonlinear distribution and its main frame is based on KF. KF is the most commonly used filter in WSN localization, but KF is proposed to solve problems based on a linear system that the noise is assumed as Gaussian white noise, and it is ineffective when filtering non-linear noise. After that, researchers proposed an algorithm to linearize nonlinear systems, which is known as Extended Kalman Filter (EKF), but the linear processing of EKF causes great calculation errors, even causing the filtering results not to converge. Moreover, EKF needs to calculate Jacobi matrix increasing the amount of calculation. Later, Simon J. Julier introduced Unscented Transformation (UT) to the analysis of KF, which obtained a higher precision and a lower algorithm complexity than EKF.
UT is the most important part of UKF that is different from EKF. UT is a conversion when calculating statistical characteristics of random variables in a nonlinear transformation. UT calculates posterior statistical properties of random vectors by means of weighted statistical linear regression. The selection of the sampling strategy in the UT transform has a vital impact on the estimation results. The sampling strategy of UT includes symmetric sampling, simplex sampling, third-order moment skew sampling, Gaussian distribution fourth-order moment symmetric sampling, etc. The difference between the sigma points produced by the various sampling strategies is the distance and the weight to the center point.
UKF is based on UT, abandoning the traditional method and using KF as its main frame. For one-step prediction equations, UKF uses UT to handle the nonlinear transfer of mean and covariance. More importantly, UKF approximates the probability density distribution of nonlinear function, and uses a series of determined samples to approach the priori probability density of the state, rather than approximating the nonlinear function. UKF does not linearize to ignore high order terms, therefore, the nonlinear distribution statistic has higher calculation accuracy [20,21,22,23].
Above all, UKF is an iterative estimation algorithm selecting sigma points according to feature distribution of sampling points. These sigma points iterate through a state equation and become the prediction points. The results are constantly corrected by Kalman gain and the errors between the true value and the measurements. Finally, the optimal estimated value can be obtained [24].

4.3. A Brief Introduction of FCM

FCM is used to classify the NLOS measurements into two categories: hard NLOS measurements and soft ones. In this section, firstly, the main feature of FCM will be discussed. Then, some basic concepts used in FCM will be explained, namely, fuzzy sets and membership function. Finally, the advantages of FCM are given to illustrate that it is appropriate to use FCM in our algorithm.
FCM is a commonly used clustering algorithm. According to a similarity criterion, a set of sample datasets without class identification is divided into several subsets. The Fuzzy C-Means (FCM) algorithm is a partition-based clustering algorithm. Its main idea is to maximize the similarity among objects divided into the same cluster, and minimize the similarity among different clusters. FCM is the improvement of the ordinary C-Means algorithm. The traditional C-Means is Crisp Partition such as K-Means, while the FCM is based on a fuzzy and flexible division according to the membership of each element. FCM clustering is an unsupervised method of gradual optimization based on iterative thinking. This method is to use the least squares principle to iteratively optimize the objective function so as to realize the fuzzy division of the dataset. On one hand, its local convergence property is very good. On the other hand, the algorithm is also effective for high dimensional characteristic space [25].
Fuzzy sets and membership function are the most important concepts of FCM. The membership function indicates the extent to which an object x belongs to the set A , which is usually expressed as μ A ( x ) . Its independent variable range is all objects that may belong to set A (which means all points in the space where set A is located), and the value range is [0,1], that is 0 μ A ( x ) 1 . Thus, μ A ( x ) = 1 means x is fully affiliated to set A , which is the equivalent of the traditional set concept x A . A membership function defined in space X can be given as a fuzzy set A , or can be called as a fuzzy subset defined in space X . With the concept of fuzzy sets, it is not hard for an element that belongs to a fuzzy set. In the clustering problem, clusters generated by clusters can be regarded as fuzzy sets. As a result, the membership value of each sample point x i is in accordance with the following relationship: 0 μ A ( x i ) 1 .
FCM divides n-dimensional vectors x i ( i = 1 , , n ) into c fuzzy groups, and finds the cluster center of each group, so that the value function (or objective function) of the non-similarity index is minimized. The advantages of FCM mainly include the following aspects:
  • The idea of FCM can objectively reflect the authenticity of things and comply with the characteristics of human cognition of things.
  • After the given initial parameters, FCM does not need manual intervention in clustering, which is an unsupervised process. It can complete clustering only by dataset, which is more suitable for automatic processing.
  • FCM is fuzzy, especially suitable for the problems of uncertainty and ambiguity.

5. Proposed Method

The flow chart of our algorithm is shown as Figure 1. The input of TF-FCM is d ^ i ( k ) ( i = 1 , 2 , 3 , , N ). d ^ i ( k ) indicates the measurement at time k , and N indicates the number of the beacon nodes. The output of TF-FCM is the prediction coordinate P ^ i ( k ) ( x ( k ) , y ( k ) ) . Firstly, the NLOS identification algorithm based on residual analysis is proposed to identify the propagation conditions. Then, if the propagation is NLOS condition, KF is presented to cope with the measurements. For the NLOS situation, NLOS correction algorithm based on voting is proposed to deal with it in advance, and the processed measurements after voting will be classified by NLOS classification based on FCM. Hard NLOS measurements and soft ones will be classified after FCM. Hard NLOS measurements will be processed by UKF1, and the soft NLOS measurements will be processed by UKF2. The NLOS measurements after filtering can be obtained by calculating arithmetic average. Finally, the LOS and NLOS processed measurements will be combined by weights. The processed measurements are used to calculate coordinates of a mobile node by maximum likelihood (ML) localization.

5.1. NLOS Identification Based on Residual Analysis

In case that the NLOS errors data is unknown, this paper assumes that there are N ( N 3 ) measured distances from N beacon nodes. If each group has no more than three distances, N C different combinations can be calculated to group N measurements:
N C = i = 3 N C N i
Then, the index of every combination is defined as { S k | k = 1 , 2 , , N C } . After estimating each node’s coordinate by location estimation, the estimated position X ^ i of every combination S k and corresponding residual R e s can be obtained. The residual of S k is given by:
R e s ( X ^ k , S k ) = i S k ( d i X ^ k P i ) 2 N C
And the average residual can be defined as:
R e s ¯ ( X ^ k , S k ) = k = 1 N C R e s ( X k , S k ) N C
Average residual R e s ¯ ( X ^ k , S k ) is utilized to compare with the process noise σ i to identify the propagation status of the measurements.
s ^ i ( k ) = { 1 , R e s ¯ ( X ^ k , S k ) σ i 2 , R e s ¯ ( X ^ k , S k ) > σ i
where the s ^ i indicates the state (1:LOS, 2:NLOS) of the measurements.
The description of residual analysis is as follows (Algorithm 1):
Algorithm 1. Description of Residual Analysis
Input: d ^ k i
Output: s ^ i
begin
for i = 1 : Size of S k do
   R e s = R e s + ( d ^ i ( k ) X ^ k P i ) 2 / s i z e ( S k )
end for
for i = 1: N C do
R e s ¯ = R e s ¯ + R e s k
end for
R e s ¯ = R e s ¯ N C
if R e s ¯ σ i then
   s ^ i = 2
else
   s ^ i = 1
end if
end

5.2. NLOS Correction Algorithm Based on Voting

If measurement d ^ i is identified as NLOS, which means d ^ i contains many NLOS errors, a voting algorithm is used to mitigate the influence NLOS errors. The voting matrix is constructed to provide the initial estimated location to obtain the correction distance. To begin with, assume the area of the field is M × M , and it can be divided into X × X cells which depend on the estimation accuracy and computational complexity of the algorithm [22], and the location of each grid can be expressed as C ( m , n ) , for m , n = 1 , 2 , , X . The resolution of each grid is defined as w = M X . For instance, if the field is 100 × 100 and X = 100 , the resolution of cells is equal to: 100 100 = 1 .
The algorithm consists of the following steps.
Step 1: An X × X voting matrix V is constructed to estimate the distance, and the elements representing voting results can be expressed by:
V ( m , n ) = i = 1 N b i ( m , n ) ,   f o r   m , n = 1 , 2 , , X
where b i ( m , n ) indicates the number of notes increased at each grid, which can be defined as:
b i ( m , n ) = { 1 , d ^ i 3 ε d i m n d ^ i + 3 ε 0 , o t h e r w i s e
where d i m n represents the Euclidean distance between i -th beacon node and C ( m , n ) . d ^ i is the measurement distance of the i -th beacon node. The value of ε can be adjusted to make estimation more accurate, and here ε = σ L O S .
Step 2: The largest value in the voting matrix can be obtained, which is marked as V ( m * , n * ) , and V ( m * , n * ) V ( m , n ) ,   f o r   m , n = 1 , 2 , , X . The estimated location of mobile node is C * = [ C 1 * , C 2 * , , C v * ] , where C * is the initial results set and v represents the number of elements in C * , and the estimated location of the mobile node is given by:
C ¯ * = i = 1 v C i * v
The brief description of Step 2 is illustrated as Figure 2. The vote of each grid will increase if the measurement area of beacon nodes is overlapped.
Step 3: The corrected distance d ˜ i ( k ) of the i -th beacon node can be updated as:
d ˜ i ( k ) = C ¯ * P i
where P i = [ x i , y i ] represents the location of the i -th beacon node.
Based on the aforementioned descriptions, the pseudo code of Voting can be summarized as Algorithm 2:
Algorithm 2. Description of NLOS Correction Algorithm based on Voting
Input: d ^ i ( k )
Output: d ˜ i ( k )
begin
   V = 0
for i = 1 : N do
  for m = 1 : W do
    for n = 1 : W do
       d i m n = C ( m , n ) P i
    end for
  end for
   V ( m , n ) = V ( m , n ) + b i ( m , n )
end for
C * = [ m * , n * ] = m a x ( V )
v = s i z e   ( C * )
C ¯ * = i = 1 v C i * v
for i = 1:N do
   d ˜ i ( k ) = C ¯ * P i
end for
end

5.3. NLOS Errors Classification Based on FCM

Because the real distribution of NLOS is complex, it is impractical to know the parameters of NLOS errors. In order to tackle this problem, FCM is used to approximate the arbitrary probability density by adjusting its parameters.
Let d ˜ i ( k ) denote the range from i -th beacon node at time k after voting. M measurements from the i -th beacon node can be obtained over a time slot [ k δ , k + δ ] . In order to make our statement simpler, time interval k is introduced to indicate the time slot, for example, d ˜ i ( k ) = [ d ˜ 1 ( k ) , d ˜ 2 ( k ) , , d ˜ M ( k ) ] . Let c denote the number of cluster centers ( 1 < c < M ). Here, we set c = 3 . Let v = { v 1 , v 2 , , v c } indicate cluster centers set. Let μ i j indicate the membership between the i -th distance d ˜ i ( k ) at time k and the j -th cluster center v j , and the membership matrix is given by U = [ μ i j ] whose size is c × M . d i j indicates the Euclidean distance between d ˜ j ( k ) and v i : d i j = v i d j ( k ) , and FCM can be expressed as a mathematical planning problem:
m i n   J ( U , c ) = i = 1 c j = 1 M ( μ i j ) m d i j 2
where m represents the fuzzy weights factor and μ i j meets the following formula:
{ i = 1 M μ i j = 1 , i = 1 , 2 , , M i = 1 c μ i j < c , 1 i c μ i j [ 0 , 1 ]
Cluster center v i can be derived as follows to calculate the minimum value of the objective function based on the Lagrange multiplier method.
v k = i = 1 M μ i j m d ^ i ( k ) i = 1 M μ i j m ,   1 k c
The sorted cluster center v = { v 1 , v 2 , , v c } can be obtained. Since the NLOS error is of a positive bias and the largest value contains many NLOS errors, so the final result is given by:
v = { v 1 , v 2 , , v c 1 }
Hence, the classified distance can be described as follows, and the measurements are divided into two categories: hard NLOS measurements and soft ones.
{ d ^ i h ( k ) = v 1 d ^ i s ( k ) = v 2 , i f   v 1 > v 2 d ^ i h ( k ) = v 2 d ^ i s ( k ) = v 1 , e l s e
Based on the aforementioned descriptions, the NLOS error classification algorithm based on FCM can be summarized as the pseudo code shown in Algorithm 3:
Algorithm 3. Description of NLOS Errors Classification Algorithm based on FCM
Input: d ˜ i ( k )
Output: d ˜ i h ( k ) d ˜ i s ( k )
begin
while 1 do
  for i = 1 : c do
    for j = 1 : M do
       d i j = v i d j ( k )
       J ( U , c ) = J ( U , c ) + μ i j m d i j 2
    end for
  end for
  if J ( U , c ) J 0 ( U , c ) < δ then
     v k = i = 1 M μ i j m d ^ i ( k ) / i = 1 M μ i j m
     s o r t { v 1 , , v 3 }
   if v 1 > v 2 then
      d ˜ i h ( k ) = v 1
      d ˜ i s ( k ) = v 2
    else
      d ˜ i h ( k ) = v 2
      d ˜ i s ( k ) = v 1
    end if
    break
  end if
end while

5.4. Kalman Filter

For LOS, KF is used to process LOS measurements. To explain the state more precisely, a state vector of the i -th beacon node is defined as:
X i ( k ) = [ d ^ i ( k ) , d ˙ i ( k ) ]
where d ^ i ( k ) indicates the distance between the i -th beacon node and the mobile node and d ˙ i ( k ) indicates the velocity that d ^ i ( k ) varies.
The state equation of the i -th beacon node under NLOS can be denoted as follows:
X i ( k ) = F X i ( k 1 ) + C w i ( k )
where F = [ 1 Δ t 0 1 ] ,   C = [ Δ t 2 / 2 Δ t ] , Δ t denotes the sample period [26]. w i ( k ) is measurement noise and follows identically distributed Gaussian Distribution with variance σ w 2 .
Hence, the predicted state and prediction covariance can be expressed as:
X ^ i ( k | k 1 ) = F X ^ i ( k 1 | k 1 )
P i ( k | k 1 ) = F P i ( k 1 | k 1 ) F T + σ L O S 2 CC T
The measurement residual is given by E i ( k ) = Z i ( k ) H X ^ i ( k | k 1 ) , where Z i ( k ) indicates the measurement state of mobile node and H = [ 1 , 0 ] .
And S i ( k ) is defined as:
S i ( k ) = H P i ( k | k 1 ) H T + Q
where Q indicates the covariance matrix of measurement errors.
The Kalman gain is described as:
K i ( k ) = P i ( k | k 1 ) H T ( S i ( k ) ) 1
The Kalman update equations can be expressed as:
X ^ i ( k | k ) = X ^ i ( k | k 1 ) + K i ( k ) E i ( k )
P ^ i ( k | k ) = P i ( k | k 1 ) K i ( k ) H P i ( k | k 1 )
In the end, the algorithm pseudo code of KF can be expressed as Algorithm 4:
Algorithm 4. Description of KF
Input: X i ( k )   Z i ( k )
Output: X ^ i ( k )   P ^ i ( k )
X ^ i ( k | k 1 ) = F X ^ i ( k 1 | k 1 ) P i ( k | k 1 ) = F P i ( k 1 | k 1 ) F + σ L O S 2 C C E i ( k ) = Z i ( k ) H X ^ i ( k | k 1 ) S i ( k ) = H P i ( k | k 1 ) H T + Q K i ( k ) = P i ( k | k 1 ) H T ( S i ( k ) ) 1 X ^ i ( k | k ) = X ^ i ( k | k 1 ) + K i ( k ) E i ( k ) P ^ i ( k | k ) = P i ( k | k 1 ) K i ( k ) P i ( k | k 1 ) H

5.5. Unscented Kalman Filter

The main algorithm includes three procedures, namely, selection of sigma points, prediction and update [19]. To begin with, assume that the nonlinear system is:
{ X ( k + 1 ) = f ( X i j ( k ) , W k ) Z ( k ) = h ( X i j ( k ) , V k )
where W k and V k represents the Gaussian white noises in state variable X ( k + 1 ) and measurement variable Z ( k ) .
The initial state vector can be denoted as X i , which indicates the initial distances of the i -th beacon node [20], and x ¯ i indicates the mathematical expectation of X i :
x ¯ i = E ( X i )
For the hard NLOS case, the state can be expressed as X i = [ d ˜ i h ( k ) , d ˜ ˙ i h ( k ) ] ; for the soft NLOS case, the state can be expressed as X i = [ d ˜ i s ( k ) , d ˜ ˙ i s ( k ) ] , and the covariance of the i -th beacon node is defined as P i ( k ) .
Step 1: Select sigma points. Assume that state vector is an n dimensional random variable, so the sample points (Sigma points) are 2 n + 1 , and the estimated sigma points X i j ( k ) can be described as:
X i ( k 1 ) = { x ¯ i j = 0 x ¯ i + ( ( n + λ ) P i ( k ) ) j j = 1 , , n x ¯ i ( ( n + λ ) P i ( k ) ) j j = n + 1 , , 2 n
Step 2: Prediction. The system state equation is used to carry out the f ( ) nonlinear transformation for each Sigma point, and the points set after transformation can be expressed as:
X i ( k | k 1 ) = f ( X i ( k 1 ) , k )
where f ( ) denotes bounded nonlinear state transfer function which is determined.
Then one-step prediction state value X ^ i ( k 1 ) and covariance matrix P i ( k ) are given by:
X ^ i ( k | k 1 ) = j = 0 2 n ω i j X i j ( k | k 1 )
P i ( k | k 1 ) = j = 0 2 N ω j ( X i j ( k | k 1 ) X ^ i ( k 1 ) ) ( X i j ( k | k 1 ) X ^ i ( k 1 ) ) T + Q T
{ Q T = σ L O S 2 i f   d ˜ i S ( k ) Q T = σ N L O S 2 i f   d ˜ i H ( k )
Weight coefficient ω can be given by:
ω j = { η N + η j = 0 1 2 ( N + η ) j 0
where η indicates turning parameters to control the spread of the sigma points.
A new Sigma points set can be produced according to a one-step prediction state value:
X i j ( k | k 1 ) = f ( X i j ( k 1 ) )
Nonlinear transformation is performed to Sigma points set X i ( k ) by nonlinear observation equation:
Z i ( k ) = h ( X i ( k ) , d ˙ i ( k ) )
where h ( ) denotes non-linear observation equation function.
The system’s predicted observation values Z i ( k ) are obtained by weighted sum:
Z i ( k ) = j = 0 2 n ω i Z j ( k )
Step 3: Update. The covariance is updated by:
P i x ( k ) = j = 0 2 n ω i ( X i j ( k | k 1 ) x ^ i ( k ) ) ( X i j ( k | k 1 ) x ^ i ( k ) ) T
The covariance matrix of system measurement output variables is given by:
P i Z ( k ) = j = 0 2 n ω i ( Z i j ( k | k 1 ) Z ^ i ( k ) ) ( Z i j ( k | k 1 ) Z ^ i ( k ) ) T + R
where R denotes the covariance of the observation noise.
And the Kalman gain K i ( k ) is expressed as:
K i ( k ) = P i x ( k ) P i z ( k ) 1
The updated state X ^ i ( k ) and a posteriori covariance P i ( k ) are expressed as:
X ^ i ( k ) = X ^ i ( k | k 1 ) + K i ( k ) ( Z i ( k ) Z ^ i ( k ) )
P i ( k ) = P i ( k | k 1 ) K i ( k ) P i Z ( k ) K i T ( k )
The final NLOS measurements after filtering can be expressed as:
d ^ i N L O S ( k ) = ( d ^ i h ( k ) + d ^ i s ( k ) ) / 2
where d ^ i h ( k ) and d ^ i s ( k ) denote hard NLOS measurements and soft ones after UKF filtering.

5.6. Combination and Location Estimation

Two sorts of estimated distances from KF and UKF can be obtained, respectively, and the final estimated distance d ^ i ( k ) is updated as follows:
d ^ i ( k ) = { d ^ i L O S ( k ) i f   L O S d ^ i N L O S ( k ) i f   N L O S
A maximum likelihood localization method is utilized to estimate the mobile position according to the distance after filtering. The coordinate of the i -th beacon node can be expressed as P i = ( x i , y i )   0 < i N .
At time k , the position of a mobile node is P ^ ( k ) = ( x ^ ( k ) , y ^ ( k ) ) . The relation between coordinates of the mobile node and the coordinate of the i -th of beacon node can be modeled as [27]:
{ ( x 1 x ^ ( k ) ) 2 + ( y 1 y ^ ( k ) ) 2 = ( d ^ i ( k ) ) 2 ( x N x ^ ( k ) ) 2 + ( y N y ^ ( k ) ) 2 = ( d ^ N ( k ) ) 2
The equation above can be represented by linear equation AP = B , where A and B are expressed as follows:
A = [ ( x 1 x 2 ) ( y 1 y 2 ) ( x 1 x 3 ) ( y 1 y 3 ) ( x 1 x N ) ( y 1 y N ) ]   B = [ d ^ 2 ( k ) 2 d ^ 1 ( k ) 2 ( x 2 2 + y 2 2 ) + ( x 1 2 + y 1 2 ) d ^ 3 ( k ) 2 d ^ 1 ( k ) 2 ( x 3 2 + y 3 2 ) + ( x 1 2 + y 1 2 ) d ^ N ( k ) 2 d ^ 1 ( k ) 2 ( x N 2 + y N 2 ) + ( x 1 2 + y 1 2 ) ]
Finally, the simplified estimated coordinate P ^ ( k ) of a mobile node at time k can be derived as:
P ^ ( k ) = [ x ^ ( k ) , y ^ ( k ) ] T = ( A T A ) 1 A T B

6. Simulation and Experiment Results

6.1. Simulation Results

The purpose of simulation is to simulate a complicated environment by using different distributions and to conduct numerous experiments to obtain statistical results. The simulation results will be evaluated and shown in this section. Conventional IMM (without data fusion) [3], KF and UKF are compared with our algorithm. The simulation platform is MATLAB. Positions of beacon nodes applied with Monte Carlo in each run are randomly distributed in a square of 100 m × 100 m [25]. Propagation of NLOS errors between beacon nodes and the mobile node is randomly generated with probability φ , and every simulation is produced over 1000 times Monte Carlo runs. Root Mean Square Error (RMSE) is chosen to evaluate the performance of our algorithm, and RMSE is modeled as:
R M S E = 1 T n K i = 1 T n k = 1 K ( ( x ^ i ( k ) x i ( k ) ) 2 + ( y ^ i ( k ) + y i ( k ) ) 2 )
where T n indicates the times of Monte Carlo runs and K denotes the observation number of mobile node, and here, we assume T n = 1000 ,   K = 100 .

6.1.1. The NLOS Errors Obey a Gaussian Distribution

Table 2 represents the default parameters of NLOS errors obeying a Gaussian Distribution in the simulation.
Figure 3 shows the localization results of a one-time run of TF-FCM, and that the number of beacon nodes is 5. It can be seen from the figure that TF-FCM achieves a fulfilling result even if the beacon nodes are randomly distributed in this area.
Figure 4 displays the cumulative distribution function (CDF) of the localization error under the condition of 1000 times Monte Carlo runs, and the number of beacon nodes is five; from the figure, it can be seen that ninety percent of TF-FCM errors are less than 8.8 m; by contract, the errors of UKF, IMM and KF are 11.1 m, 11.2 m and 11.4 m, respectively. Most of the localization error of TF-FCM is much lower than UKF, IMM and KF, which indicates the high localization accuracy of TF-FCM.
To better describe the robustness and localization accuracy of TF-FCM as the number of beacon nodes changes, Figure 5 shows RMSE results with the number of beacon nodes varying from 5 to 10. It is obvious that TF-FCM has a better performance than KF, UKF and IMM with increasing numbers of beacon nodes. If the number of beacon nodes is five, the improvement of TF-FCM location accuracy compared with KF, UKF and IMM is 17.7%, 16.0% and 16.8%, respectively. In the figure, we can see that the KF and IMM have the same performance, and UKF performs better when the number of beacon nodes is low. However, when the number of beacon nodes is high, KF, IMM and UKF almost have the same localization accuracy.
To illustrate the robustness of TF-FCM as the NLOS errors get larger, Figure 6 and Figure 7 display the RMSE result with mean of NLOS errors varying from 2 to 10 and the standard deviation adapting from 3 to 10. It can be seen from the figure that the trend is on the rise with the increase of NLOS errors. The average RMSE values of TF-FCM, UKF, IMM and KF are 7.16 m, 8.78 m, 8.96 m and 9.10 m, respectively, and when the standard deviation of NLOS errors gets larger (3–10), the accuracy rate of TF-FCM improvement compared with IMM, UKF, KF is 19.9%, 18.3% and 21.2%, respectively. In Figure 6 and Figure 7, we can see that as NLOS errors get larger, the RMSE of TF-FCM still stays much lower than other algorithms, which indicates the strong robustness of our algorithm.
To clearly denote the robustness as the probability of NLOS errors get larger, Figure 8 illustrates the RMSE result when the NLOS probability varies from 0.5 to 0.9. It can be clearly seen that when the NLOS probability is small, the IMM and KF is slightly better than UKF and TF-FCM, but with the probability of NLOS getting larger, the effect of TF-FCM is much better than KF and IMM. The result demonstrates that our algorithm is much better and has strong robustness when coping with the situation that contains many NLOS errors.

6.1.2. The NLOS Errors Obey Uniform Distribution

The default parameters of NLOS errors obeying Uniform Distribution are shown as Table 3.
Figure 9 shows the cumulative distribution function of localization at 1000 times under Uniform Distribution obeyed U ( 3 , 8 ) . When localization errors are small, four filters almost have the same filtering effect, but once the localization errors get larger, the performance of TF-FCM is better than the others, and it can be seen that the ninety percent of TF-FCM errors is less than 7.5 m; by contrast, the errors of UKF, IMM and KF are 9.8 m, 9.7 m and 9.7 m, respectively.
To better describe the robustness and localization accuracy of TF-FCM as the number of beacon nodes changes, Figure 10 shows the RMSE result with the beacon nodes varying from 5 to 10 under Uniform Distribution. It can be seen from the result that the four methods show a downward trend with the increase of the number of nodes, and the performance of TF-FCM is the best compared with other methods. The average RMSE errors of TF-FCM, UKF, IMM, KF are 4.13 m, 5.20 m, 5.31 m and 5.17 m, respectively.
To illustrate the robustness of TF-FCM as the NLOS errors get larger, Figure 11 shows the RMSE result with NLOS parameter U max varying from 4 to 10. It can be senn from the result that the trend of IMM, KF and UKF is on the rise as U max becomes larger. While the tendency of TF-FCM remains steady, it indicates the strong robustness of our algorithm. The average RMSE values of TF-FCM, UKF, IMM, KF are 5.27 m, 6.99 m, 7.04 m and 7.05 m, respectively.

6.1.3. The NLOS Errors Obey Exponential Distribution

The default parameters obeying Exponential Distribution are displayed as Table 4.
Figure 12 shows that the cumulative distribution function of localization at 1000 times under Exponential Distribution when the number of beacon nodes is five. The result shows that ninety percent of TF-FCM errors are less than 6.1 m, while the errors of UKF, IMM, KF are 7.2 m, 11 m and 11.1 m, respectively. Most of the localization error of TF-FCM is much lower than UKF, IMM and KF, which indicates the high localization accuracy of TF-FCM.
To illustrate the robustness of TF-FCM as the NLOS errors get larger, Figure 13 shows the RMSE result with the number of beacon nodes varying from 5 to 10. It can be clearly seen that the RMSE of TF-FCM is the smallest with the increase of the beacon node number. The overall trend declines as the number of beacon nodes increases, while the drop of TF-FCM is much slower than other algorithms, and the average RMSE of TF-FCM, UKF, IMM, KF is 3.94 m, 5.20 m, 5.23 m, and 5.31 m.

6.2. Experiment Results

6.2.1. Localization Results Analysis

In order to test the performance of TF-FCM in actual scenarios, an experiment is conducted under indoor conditions. The signal transmission between beacon nodes and mobile nodes is based on the carrier-less communication technology Ultra-Wideband (UWB) which uses a non-sinusoidal narrow pulse to transfer data. In recent years, UWB has been widely applied in close-range accurate indoor positioning. The principle of UWB ranging is two-way time-of-flight (TW-TOF) using a timestamp to approximate the distance between nodes, and the UWB device used in this paper is shown in Figure 14. To the left of the figure is the UWB node and to the right of the figure is the power supply of the node.
In order to avoid ground reflection, the beacon nodes and the mobile node are placed 1.2 m above the ground. As shown in Figure 15, eight beacon nodes are placed around the desks in a 5 m × 8 m room. The height of each desk is 1.3 m. The mobile node moves following the trajectory at a constant velocity. Every 40 cm, one sampling site is recorded and there are 31 sampling sites in our experiment shown as dotted lines in the figure. Twenty measurements are collected at the sampling site at one time, and the average distance of each sampling site is utilized by the localization algorithm.
The cumulative function of localization error under experimental conditions is displayed as Figure 16. From the figure, it is obvious that TF-FCM has the highest accuracy in comparison with other methods. The localization error of KF and IMM is more than 2 m; in contrast, the error of UKF is less than 1 m; especially, the error of TF-FCM is less than 0.5 m. The error over 90 percent of TF-FCM, UKF, IMM, KF is 0.23 m, 0.65 m, 2.43 m, 2.56 m, respectively. To better describe the localization accuracy of four algorithms, the comparison table of average localization error is shown as Table 5. From the experiment, it can be clearly seen that there is high precision and the strong robustness of TF-FCM.
In the simulation experiment, when the NLOS errors obey Gaussian, Uniform and Exponential Distributions, respectively, according to Figure 4, Figure 9 and Figure 12, the proposed algorithm has the highest positioning accuracy compared with other methods. In the actual experiment, the localization error of TF-FCM is the lowest compared with other methods according to Figure 16.

6.2.2. Processing Time Comparison

Table 6 shows the running time of TF-FCM, UKF, KF and IMM. The four algorithms are performed using Matlab 2016a and tested on a Windows 10 home edition with AMD A10-8700P Randeon R6, 10 Compute Cores 4C + 6G 1.80 GHz 8.00 GB RAM.

7. Conclusions

In this paper, an algorithm based on triple-filter mixed KF and UKF, using residual analysis, voting and FCM is proposed, which is utilized to mitigate NLOS errors and enhance the accuracy of localization in mixed LOS and NLOS environments. Residual analysis is employed to identify if the propagation condition is NLOS or not. For LOS case, KF is adopted to process. For NLOS case, firstly NLOS correction algorithm based on voting is used to restrict the NLOS errors and correct the measurements. Then, the NLOS error classification method based on FCM is proposed to classify the NLOS errors into two categories: hard NLOS measurements and soft ones. The simulation result shows great advantage when processing the situation with complicated NLOS errors, including Gaussian distribution, exponential distribution and uniform distribution compared with IMM, UKF and KF. The performance of TF-FCM has significantly improved in accuracy and robustness when dealing with rough wireless environments. Furthermore, TF-FCM could efficiently mitigate the NLOS effects compared with other classical methods. An experiment is conducted to verify our algorithm, and the result shows the high accuracy and strong robustness of TF-FCM.

Author Contributions

L.C., Y.L. and Y.B. conceived and designed the experiments; Y.W. and L.F. performed the experiments; Y.L., M.X. and Y.B. analyzed the data; L.F. and Y.W. contributed analysis tools; L.C. and Y.L. wrote the paper.

Funding

This research was supported by the National Natural Science Foundation of China under Grant No. 61803077; Natural Science Foundation of Hebei Province under Grant No. F2016501080 and No. F2015501097; Fundamental Research Funds for the Central Universities under Grant No. N172304024. The APC was funded by Fundamental Research Funds for the Central Universities under Grant No. N172304024.

Conflicts of Interest

The authors declare that there is no conflict of interests regarding the publication of this paper.

References

  1. Rahman, M.S.; Park, Y.; Kim, K.D.; Arab, J. RSS-Based Indoor Localization Algorithm for Wireless Sensor Network Using Generalized Regression Neural Network. Arab. J. Sci. Eng. 2012, 37, 1043–1053. [Google Scholar] [CrossRef]
  2. Yang, X.F.; Zhao, F.; Chen, T.J. NLOS identification for UWB localization based on import vector machine. AEU Int. J. Electron. Commun. 2018, 87, 128–133. [Google Scholar] [CrossRef]
  3. Liao, J.F.; Chen, B.S. Robust mobile location estimator with NLOS mitigation using interacting multiple model algorithm. IEEE Trans. Wirel. Commun. 2006, 5, 3002–3006. [Google Scholar] [CrossRef]
  4. Huerta, J.M.; Vidal, J.; Giremus, A.; Tourneret, J.Y. Joint Particle Filter and UKF Position Tracking in Severe Non-Line-of-Sight Situations. IEEE J. Sel. Top. Signal Process. 2009, 3, 874–888. [Google Scholar] [CrossRef] [Green Version]
  5. Tomic, S.; Beko, M.; Dinis, R.; Bernardo, L. On Target Localization Using Combined RSS and AoA Measurements. Sensors 2018, 18, 1266. [Google Scholar] [CrossRef] [PubMed]
  6. Tomic, S.; Beko, M. A bisection-based approach for exact target localization in NLOS environments. Signal Process. 2018, 143, 328–335. [Google Scholar] [CrossRef]
  7. Pak, J.M.; Ahn, C.K.; Shi, P.; Shmaliy, Y.S.; Lim, M.T. Distributed Hybrid Particle/FIR Filtering for Mitigating NLOS Effects in TOA-Based Localization Using Wireless Sensor Networks. IEEE Trans. Ind. Electron. 2017, 64, 5182–5191. [Google Scholar] [CrossRef]
  8. Liu, R.R.; Yin, J.X.; Wang, D. A Closed form Localization Method using AOA and TOA Measurements based on WSN in NLOS Environments. In Proceedings of the 2017 International Conference on Electronic Industry and Automation (EIA 2017), Suzhou, China, 23–25 June 2017; Volume 145, pp. 121–125. [Google Scholar]
  9. Hua, J.Y.; Yin, Y.J.; Lu, W.D.; Zhang, Y.; Li, F. NLOS Identification and Positioning Algorithm Based on Localization Residual in Wireless Sensor Networks. Sensors 2018, 18, 2991. [Google Scholar] [CrossRef] [PubMed]
  10. Yang, X.F. NLOS Mitigation for UWB Localization Based on Sparse Pseudo-Input Gaussian Process. IEEE Sens. J. 2018, 18, 4311–4316. [Google Scholar] [CrossRef]
  11. Lei, T.; Wang, J.; Zhang, L.Y.; Wang, H.Y.; Yu, Y. Robust Cooperative Indoor Localization Based on Reliability Evaluation. IEEE Sens. J. 2018, 18, 6836–6846. [Google Scholar] [CrossRef]
  12. Aghaie, N.; Tinati, M.A. Localization of WSN Nodes Based on NLOS Identification Using AOAs Statistical Information. In Proceedings of the 2016 24th Iranian Conference on Electrical Engineering (ICEE), Shiraz, Iran, 10–12 May 2016; pp. 496–501. [Google Scholar]
  13. Yu, X.S.; Ji, P.; Wang, Y.; Chu, H. Mean Shift-Based Mobile Localization Method in Mixed LOS/NLOS Environments for Wireless Sensor Network. J. Sensors 2017, 2017. [Google Scholar] [CrossRef]
  14. Fleury, B.H.; Tschudin, M.; Heddergott, R.; Dahlhaus, D.; Pedersen, K.I. Channel parameter estimation in mobile radio environments using the SAGE algorithm. IEEE J. Sel. Areas Commun. 1999, 17, 434–450. [Google Scholar] [CrossRef]
  15. Hu, B.; Kocian, A.; Piton, R.; Hviid, A.; Fleury, B.H.; Rasmussen, L.K. Iterative joint channel estimation and successive interference cancellation using a SISO-SAGE algorithm for coded CDMA. In Proceedings of the Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, USA, 7–10 November 2004; Volume 1, pp. 622–626. [Google Scholar]
  16. Kocian, A.; Badiu, M.A.; Fleury, B.H.; Martelli, F.; Santi, P. A unified message-passing algorithm for MIMO-SDMA in software-defined radio. EURASIP J. Wirel. Commun. Netw. 2017, 2017, 4. [Google Scholar] [CrossRef] [Green Version]
  17. Liu, W.Y.; Luo, X.Y.; Liu, Y.M.; Liu, J.Q.; Liu, M.H.; Shi, Y.Q. Localization Algorithm of Indoor Wi-Fi Access Points Based on Signal Strength Relative Relationship and Region Division. Comput. Mater. Contin. 2018, 55, 71–93. [Google Scholar]
  18. Vasuhi, S.; Vaidehi, V. Target tracking using Interactive Multiple Model for Wireless Sensor Network. Inf. Fusion 2016, 27, 41–53. [Google Scholar] [CrossRef]
  19. Keshavarz-Mohammadiyan, A.; Khaloozadeh, H. Adaptive IMMPF for Bearing-Only Maneuvering Target Tracking in Wireless Sensor Networks. In Proceedings of the 4th International Conference on Control, Instrumentation, and Automation (ICCIA), Qazvin, Iran, 27–28 January 2016; pp. 6–11. [Google Scholar]
  20. Li, L.; Xia, Y.Q. Unscented Kalman Filter Over Unreliable Communication Networks with Markovian Packet Dropouts. Ieee Trans. Autom. Control 2013, 58, 3224–3230. [Google Scholar] [CrossRef]
  21. Cai, Z.G.; Shang, L.; Gao, D.; Zhao, K.; Wang, Y.G.; Kwon, Y. Indoor Mobile Localization in Mixed Environment with RSS Measurements. Int. J. Distrib. Sens. Netw. 2015, 11, 106475. [Google Scholar] [CrossRef]
  22. Cheng, L.; Wang, Y.; Wu, H.; Hu, N.; Wu, C.D. Non-parameter location estimation in rough wireless environments for wireless network. Sensors 2015, 224, 57–64. [Google Scholar]
  23. Kitanouma, T.; Takashima, Y.; Adachi, N.; Takizawa, Y. Cloud-based Self-Organizing Localization for Wireless Sensor Networks in Mixture Environments of LOS and NLOS. In Proceedings of the 11th IEEE International Wireless Communications and Mobile Computing Conference (IEEE IWCMC), Dubrovnik, Croatia, 24–28 August 2015; pp. 1230–1235. [Google Scholar]
  24. Wang, Y.; Hang, J.Q.; Cheng, L.; Li, C.; Song, X. A Hierarchical Voting based Mixed Filter Localization Method for Wireless Sensor Network in Mixed LOS/NLOS Environments. Sensors 2018, 18, 2348. [Google Scholar] [CrossRef] [PubMed]
  25. Cho, H.; Kwon, Y. RSS-based indoor localization with PDR location tracking for wireless sensor networks. AEU Int. J. Electron. Commun. 2016, 18, 250–256. [Google Scholar] [CrossRef]
  26. Chen, B.S.; Yang, C.Y.; Liao, F.K.; Liao, J.F. Mobile Location Estimator in a Rough Wireless Environment Using Extended Kalman-Based IMM and Data Fusion. IEEE Trans. Veh. Technol. 2018, 58, 1157–1169. [Google Scholar] [CrossRef]
  27. Cheng, L.; Feng, L.; Wang, Y. A Residual Analysis-Based Improved Particle Filter in Mobile Localization for Wireless Sensor Networks. Sensors 2018, 18, 2945. [Google Scholar] [CrossRef] [PubMed]
Figure 1. The flowchart for the proposed algorithm.
Figure 1. The flowchart for the proposed algorithm.
Sensors 19 01215 g001
Figure 2. The Description of Voting.
Figure 2. The Description of Voting.
Sensors 19 01215 g002
Figure 3. The localization result of TF-FCM.
Figure 3. The localization result of TF-FCM.
Sensors 19 01215 g003
Figure 4. The localization error versus CDF.
Figure 4. The localization error versus CDF.
Sensors 19 01215 g004
Figure 5. The RMSE versus the number of beacon nodes.
Figure 5. The RMSE versus the number of beacon nodes.
Sensors 19 01215 g005
Figure 6. The RMSE versus mean of NLOS errors.
Figure 6. The RMSE versus mean of NLOS errors.
Sensors 19 01215 g006
Figure 7. The RMSE versus standard deviation of NLOS errors.
Figure 7. The RMSE versus standard deviation of NLOS errors.
Sensors 19 01215 g007
Figure 8. The RMSE versus the probability of NLOS errors.
Figure 8. The RMSE versus the probability of NLOS errors.
Sensors 19 01215 g008
Figure 9. The localization error versus CDF.
Figure 9. The localization error versus CDF.
Sensors 19 01215 g009
Figure 10. The RMSE versus the number of beacon nodes.
Figure 10. The RMSE versus the number of beacon nodes.
Sensors 19 01215 g010
Figure 11. The RMSE versus U max of NLOS errors.
Figure 11. The RMSE versus U max of NLOS errors.
Sensors 19 01215 g011
Figure 12. The localization error versus CDF.
Figure 12. The localization error versus CDF.
Sensors 19 01215 g012
Figure 13. The RMSE versus the number of beacon nodes.
Figure 13. The RMSE versus the number of beacon nodes.
Sensors 19 01215 g013
Figure 14. The UWB node.
Figure 14. The UWB node.
Sensors 19 01215 g014
Figure 15. The floor plan of the indoor environment.
Figure 15. The floor plan of the indoor environment.
Sensors 19 01215 g015
Figure 16. The localization errors versus CDF.
Figure 16. The localization errors versus CDF.
Sensors 19 01215 g016
Table 1. List of key notations.
Table 1. List of key notations.
SymbolExplanationSymbolExplanation
N the number of beacon nodes N C the combination of beacon nodes
S k the index of every combination X ^ k the estimated position of every combination
Re s ( X ^ k , S k ) the residual of S k Re s ¯ ( X ^ k , S k ) the average residual of S k
d i ( k ) the true distance between mobile node and i -th beacon node at time k d ^ i ( k ) the estimated distance between mobile node and the i -th beacon node at time k
P ^ ( k ) the final position of mobile node at the time k d ˜ i ( k ) the corrected range after voting
n L O S the LOS errors n N L O S the NLOS errors
C ( m , n ) the location of each voting grid C * the estimated location of mobile node
V ( m , n ) the voting matrix b i ( m , n ) the number of votes increased at C ( m , n )
v the number of the estimated location of mobile node C ¯ * the average of the mobile nodes
M the number of distances in a time slot c the number of cluster centers
v the cluster centers set μ i j the membership between i -th distance d ^ i ( k ) at time k and the j -th cluster center
v i the i -th cluster center d i j the Euclidean distance between d ^ j ( k ) and v i
X i ( k ) the state of the i -th beacon node at time k P i ( k ) the covariance of the i -th beacon node at time k
K i ( k ) Kalman gain of the i -th beacon node at time k Z i ( k ) the measured state of the i -th beacon node at time k
ω i weight efficient of the i -th sigma point s ^ i ( k ) the state of the i -th beacon node at time k
Table 2. The default parameters of a Gaussian Distribution.
Table 2. The default parameters of a Gaussian Distribution.
ParameterSymbolDefault Values
The number of beacon nodes N 5
The probability of NLOS propagation φ 0.7
The standard deviation of measurement noise σ L O S 1
The NLOS errors N ( μ N L O S , σ N L O S 2 ) N ( 3 , 5 2 )
The number of sample points K 100
The number of Monte Carlo runs T n 1000
Table 3. The default parameters of Uniform Distribution.
Table 3. The default parameters of Uniform Distribution.
ParameterSymbolDefault Values
The number of beacon nodes N 5
The probability of NLOS propagation φ 0.7
The standard deviation of measurement noise σ L O S 1
The NLOS errors U ( U min , U max ) U ( 3 , 8 )
The number of sample points K 100
The number of Monte Carlo runs T n 1000
Table 4. The default parameters of Exponential Distribution.
Table 4. The default parameters of Exponential Distribution.
ParameterSymbolDefault Values
The number of beacon nodes N 5
The probability of NLOS propagation φ 0.7
The standard deviation of measurement noise σ L O S 1
The NLOS errors μ NLOS 5
The number of sample points K 100
The number of Monte Carlo runs T n 1000
Table 5. Comparison table of average localization error.
Table 5. Comparison table of average localization error.
AlgorithmAverage Localization Error/m
TF-FCM0.192
UKF0.555
IMM1.366
KF1.434
Table 6. Running time of each algorithm.
Table 6. Running time of each algorithm.
AlgorithmRunning Time/m
TF-FCM0.192
UKF0.555
IMM1.366
KF1.434

Share and Cite

MDPI and ACS Style

Cheng, L.; Li, Y.; Wang, Y.; Bi, Y.; Feng, L.; Xue, M. A Triple-Filter NLOS Localization Algorithm Based on Fuzzy C-means for Wireless Sensor Networks. Sensors 2019, 19, 1215. https://doi.org/10.3390/s19051215

AMA Style

Cheng L, Li Y, Wang Y, Bi Y, Feng L, Xue M. A Triple-Filter NLOS Localization Algorithm Based on Fuzzy C-means for Wireless Sensor Networks. Sensors. 2019; 19(5):1215. https://doi.org/10.3390/s19051215

Chicago/Turabian Style

Cheng, Long, Yifan Li, Yan Wang, Yangyang Bi, Liang Feng, and Mingkun Xue. 2019. "A Triple-Filter NLOS Localization Algorithm Based on Fuzzy C-means for Wireless Sensor Networks" Sensors 19, no. 5: 1215. https://doi.org/10.3390/s19051215

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop