You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

18 November 2020

An Indoor Robust Localization Algorithm Based on Data Association Technique

,
,
and
1
Department of Computer and Communication Engineering, Northeastern University, Qinhuangdao 066004, China
2
SANY Group CO., Ltd., Changping, Beijing 102202, China
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue IoT Sensing Systems for Traffic Monitoring and for Automated and Connected Vehicles

Abstract

As a key technology of the Internet of Things, wireless sensor network (WSN) has been used widely in indoor localization systems. However, when the sensor is transmitting signals, it is affected by the non-line-of-sight (NLOS) transmission, and the accuracy of the positioning result is decreased. Therefore, solving the problem of NLOS positioning has become a major focus for indoor positioning. This paper focuses on solving the problem of NLOS transmission that reduces positioning accuracy in indoor positioning. We divided the anchor nodes into several groups and obtained the position information of the target node for each group through the maximum likelihood estimation (MLE). By identifying the NLOS method, a part of the position estimates polluted by NLOS transmission was discarded. For the position estimates that passed the hypothesis testing, a corresponding poly-probability matrix was established, and the probability of each position estimate from line-of-sight (LOS) and NLOS was calculated. The position of the target was obtained by combining the probability with the position estimate. In addition, we also considered the case where there was no continuous position estimation through hypothesis testing and through the NLOS tracking method to avoid positioning errors. Simulation and experimental results show that the algorithm proposed has higher positioning accuracy and higher robustness than other algorithms.

1. Introduction

In recent years, wireless sensor network (WSN) has been applied to target tracking, navigation, industrial monitoring, emergency services, and other fields due to the simple deployment of nodes, complete functions, and flexible network settings. With the rapid development of embedded systems, it is being applied to a wider range of applications. WSN positioning refers to using pre-deployed sensor nodes (anchor nodes) to obtain data, obtaining the coordinate information of the positioning target through a positioning algorithm. The positioning methods are roughly divided into two categories: ranging and no ranging. The ranging methods include time of arrival (TOA) [1], time difference of arrival (TDOA) [2], received signal strengthen indicate (RSSI) [3], angle of arrival (AOA) [4], and so on. No ranging methods include centroid algorithm, distance vector (DV)-hop [5] algorithm, and so on. The distance information obtained by the sensor is used as the input of the positioning algorithm, and the position of the target is obtained through the algorithm processing to complete the positioning work. In the process of signal propagation, due to various obstacles in the propagation environment, the signal is affected by non-line-of-sight (NLOS) transmission. NLOS transmission refers to when the transmission signal encounters an obstacle during transmission, and the signal reaches the receiving end through reflection, refraction, and diffraction. The distance measured by the sensor is greater than the actual distance. NLOS transmission can reduce positioning accuracy, especially in the indoor positioning, and this effect is particularly serious. Therefore, how to reduce the impact of NLOS on positioning results and obtain higher positioning accuracy is the main research hot spot of indoor positioning algorithms.
The proposed algorithm in this paper aims to solve the effect of NLOS transmission that reduces the accuracy of indoor localization. We used the concept of grouping by dividing the anchor nodes involved in positioning into several subgroups, screened out the position estimation that met the conditions by using the method of hypothesis testing, and then calculated the association probability through the improved data association method and obtained the position estimation of the target with the previous position estimation. In terms of the situation where the number of positions passing the hypothesis testing was zero continuously, an NLOS tracking method was proposed to avoid positioning errors. The advantages of the proposed algorithm are as follows:
  • NLOS identification was performed through hypothesis testing, and some NLOS transmissions were eliminated, effectively reducing the effect of NLOS.
  • The algorithm established the corresponding clustering probability matrix for the position estimation through hypothesis testing with the improved method to calculate the probability, where the positioning accuracy was higher.
  • If the hypothesis testing failed continuously when there was no position estimation obtained from the subgroup that fell into the verification gate, the NLOS tracking method was used to avoid positioning errors.
The paper is organized as follows: Section 2 introduces related work, Section 3 describes the establishment of the signal model, Section 4 analyzes the proposed algorithm, and Section 5 discusses the simulation results.

3. Signal Model

Suppose that the mobile node moves in a limited two-dimensional plane, and M anchor nodes are deployed randomly. x ^ ( k ) = [ x ( k ) y ( k ) x ˜ ( k ) y ˜ ( k ) ] T is the state vector of the mobile node, and ( x ( k ) , y ( k ) ) is the coordinate of the mobile node at k-th time. ( x ˜ ( k ) , y ˜ ( k ) ) represents the velocity along the x-axis and the y-axis at k-th time. Therefore, the motion change of the target node can be described by the change of state vector. The change of the state vector of the target node is modeled as:
x ^ ( k ) = G x ^ ( k 1 ) + C ϖ ( k 1 ) G = [ 1 0 0 1 Δ t 0 0 Δ t 0 0 0 0 1 0 0 1 ] C = [ Δ t 2 / 2 0 Δ t 0 0 Δ t 2 / 2 0 Δ t ]
where Δ t represents the sampling interval, and I M is the M × M identity matrix, and the driving noise ϖ ( k ) is modeled as Gaussian white noise with the mean of 0 and a covariance matrix of Q ( k ) = σ ω 2 I 2 , where k = 1 , 2 , , K describes the uncertainty on the motion model at time k . G represents the state transition matrix of the mobile node, and C represents the interference noise input matrix. The distance measurement value between the M anchor nodes and the mobile node at the moment k is expressed as: D ( k ) = [ d 1 ( k ) , , d M ( k ) ] T if the probability that the NLOS measurement occurs is α , the probability that the LOS measurement appears as 1 α , d L ( k ) represents the distance measured from the L-th anchor node to the mobile node, recorded as [24]:
d L ( k ) = { h L ( x ^ ( k ) ) + v ( k )                         i f   L O S   c o n d i t i o n h L ( x ^ ( k ) ) + n N L O S + v ( k )           i f   N L O S   c o n d i t i o n
h L ( x ^ ( k ) ) represents the actual geometric distance from the L-th anchor node which participates in positioning to the target node, which is defined as:
h L ( x ^ ( k ) ) = ( x ( k ) x L ) 2 + ( y ( k ) y L ) 2 L = 1   ,   2   , ,   M
where ( x L , y L ) represents the two-dimensional coordinates of the L-th anchor node, n N L O S represents the NLOS deviation, and v ( k ) is the LOS noise modeled as Gaussian white noise with mean of 0 and standard deviation of σ G 2 . The Euclidean distance set from the mobile node to the M anchor nodes is h ( x ^ ( k ) ) = [ h 1 ( k ) , , h M ( k ) ] T .

4. Proposed Algorithm

4.1. General Concept

The flow chart of the proposed algorithm is shown in Figure 1. In this paper, we divided the M anchor nodes into N = C M 3 different subgroups and through the MLE method to obtain the position estimation of the target node z n ( k ) = [ x n ( k ) , y n ( k ) ] T in each subgroup. Because the propagation environment from the anchor node to the target node in the subgroup n was unknown, if it was NLOS, the position estimation accuracy of the target node calculated by the corresponding position estimation was decreased, and the position estimation in the LOS state had higher accuracy. Therefore, we performed hypothesis testing on the position estimates obtained for each subgroup and reduced the effect of NLOS errors through hypothesis testing in advance. When performing hypothesis testing at time k , Kalman prediction state vector x ^ ( k | k 1 ) and covariance matrix P ( k | k 1 ) were needed to obtain the predicted position estimate z ( k | k 1 ) of the target node. A statistical test T i ( k ) was calculated using the obtained predicted position estimate z ( k | k 1 ) , and the value was compared with a preset threshold. If the statistical test value was less than the threshold, the assumption was true, and the position estimate was used in subsequent positioning calculations. If the statistical test value was larger than the threshold set previously, the assumption was not true, and the corresponding position estimation was discarded. The selection of the threshold was decided on the threshold probability P G . The number of statistically estimated position estimates through hypothesis testing was N V ( k ) . If N V ( k ) was greater than 0, a corresponding clustering probability matrix was established, the associated probability was calculated using an improved method, and the state of the target node was updated using the associated probability and the position estimation through hypothesis testing. If N V ( k ) equaled 0, it meant that the position estimates had not passed the hypothesis testing, and then it was detected whether the number of position estimates that passed the hypothesis testing at the previous moment was 0 or not. If it was 0, the position estimate of the mobile node was calculated by the NLOS tracking method; otherwise, the predicted position estimate was used as the position estimation of the mobile node. In this way, it was possible to avoid the situation of continuous positioning errors caused by hypothesis testing without position estimation and strengthen the robustness. The components of the algorithm are described in detail below.
Figure 1. The flow chart of the algorithm.

4.2. Grouping and Hypothesis Testing

This article assumed that there were M anchor nodes participating in the positioning of the target node, and that M was greater than 3. Anchor nodes were grouped into groups of three, with a total of N subgroups. When sampling was performed at k moment, the distance measurement from the anchor node to the target node was also divided into N subgroups. The MLE was performed on the distance measurement obtained by each subgroup to get the position estimate of the target node. The specific process of hypothesis testing is described in detail below.

4.2.1. Kalman Prediction

We used the state vector x ^ ( k 1 | k 1 ) and the covariance matrix P ( k 1 | k 1 ) of the mobile node at time k 1 to predict the state vector and the covariance matrix of the mobile node at time k through the next formula:
x ^ ( k | k 1 ) = G x ^ ( k 1 | k 1 )
P ( k | k 1 ) = G P ( k 1 | k 1 ) G T + C Q C T
The predicted position estimation of the mobile node is:
z ( k | k 1 ) = B x ^ ( k | k 1 ) B = [ 1 0 0 0 0 1 0 0 ]
B is the observation matrix. The difference between the estimated position of the target node and the position estimation of the target node obtained by the nth subgroup is defined as innovation:
v n ( k ) = z n ( k ) z ( k | k 1 ) n = 1   ,   2   , ,   M

4.2.2. NLOS Identification

At time k , if the anchor nodes in the n-th subgroup are all in LOS environment, the innovation meets:
v n ( k ) ~ N ( 0 , S n ( k ) ) n = 1   , ,   N
The covariance of the innovation is:
S n ( k ) = B P ( k | k 1 ) B T + σ G 2 I 2 ( H n T ( k ) H n ( k ) ) 1 H n ( k ) = h n ( x ^ ( k ) ) x ^ ( k )
In order to identify (8), we defined the following assumptions:
H 0 , n : ν n ( k ) ~ N ( 0 , S n ( k ) ) n = 1   , ,   N
H 1 , n : n o n H 0 , n n = 1   , ,   N
If the anchor nodes in the n-th subgroup are all in the LOS environment, the assumption H 0 , n is true. If at least one anchor node in the n-th subgroup is in the NLOS environment, the H 1 , n is true, and the position estimate obtained by the subgroup will have a large error. If the anchor nodes in the n-th subgroup are in the LOS environment, the obtained position estimation will fall into the verification gate. In order to identify the position estimates obtained for each subgroup, we defined a statistical test as:
T n ( k ) = v n T ( k ) S n 1 ( k ) v n ( k ) n = 1   , ,   N
We compared the statistical test value with a preset threshold value. If the statistical test value was larger than the threshold, the corresponding hypothesis was invalid, otherwise, it was true. The selection of the threshold of the correlation gate is related to the threshold probability P G :
0 γ f χ 2 ( 2 ) ( x ) d x = P G = 1 P F A
Threshold probability P G is the probability that the position estimate from the LOS environment falls into the verification gate. f χ 2 ( 2 ) ( ) is a chi-square distribution with a degree of freedom of 2, and P F A is the alert probability when the probability that the position estimation falls into the verification door is estimated to be an LOS environment no less than 0.99, and the threshold of the chi-square distribution with a degree of freedom of 2 is γ = 9.21 . x represents the location estimation to be tested. We then calculated the number of position statistics that passed the hypothesis testing and recorded as N v ( k ) . If it was greater than 0, the subsequent calculation of the correlation probability was performed in addition to updating the state estimation and the covariance matrix. If N v ( k ) was 0, and N v ( k 1 ) was 0, at this time, the final position estimate was obtained by the NLOS tracking method. Otherwise, the predicted position estimate was used as the final position estimate.

4.3. Association Probability Updating

This article used the improved probability data association method to calculate the association probability. First, the correlation event was defined:
  • The LOS environment and the NLOS environment from the target node to the anchor node had position estimates;
  • Each position estimation was from LOS or NLOS environments.
Defining the associated event:
ξ l t : {Hypothesis-tested position estimates from LOS environment}, l = 1   , ,   N V ( k ) , t = 1. The event ξ 01 indicates that the position estimation from the LOS environment does not fall into the verification gate, ξ l 0 indicates that the position estimation z l ( k ) is from a NLOS environment, and ξ 00 indicates that there is no position estimation in the NLOS environment that is meaningless. The correct position at time k is estimated as: Z ( k ) = { z l ( k ) } l = 1 N v ( k ) , Z k = { Z ( 1 ) , Z ( 2 ) , , Z ( k ) } represents correct positions from start time to current time. The probability density function of the event ( l = 1 , , N v ( k ) , t = 1 ) is modeled as:
f l 1 ( z l ( k ) | ξ l 1 ( k ) , N v ( k ) , Z k ) = = P G 1 N ( z l ( k ) ; z ( k | k 1 ) , S l ( k ) ) = = P G 1 exp { 1 2 v l T ( k ) S l 1 ( k ) v l ( k ) } 2 π | S l ( k ) | 0.5
The probability density function of the event ξ l 0 ( l = 1   , ,   N v ( k ) ) is assumed as:
f l 0 ( z l ( k ) | ξ l 0 ( k ) , L ( k ) , Z k ) = N v ( k ) V ( k ) l = 1   , ,   N v ( k )
V ( k ) = π τ | S ( k ) | 0.5
V ( k ) is the acreage of the verification area corresponding to the accepted hypothesis. The probability density function of the event ξ 01 is:
f 01 ( z l ( k ) | ξ 01 ( k ) , N v ( k ) , Z k ) = ( 2 V ) 1 ( 1 P d P G )
where P d is the detected probability, which represents the probability that the position estimation falls into the verification area which can be detected by the verification gate.
The probability density function of the event ξ 00 is:
f 00 ( z l ( k ) | ξ 00 ( k ) , N v ( k ) , Z k ) = 0
Association probability is modeled as:
β l 1 ( k ) = 1 c [ ε l 1 ( k ) t r = 0 t r 1 1 r = 0 r l N v ( k ) ε r t r ( k ) + ζ l 1 ( k ) r = 0 r l N v ( k ) t r = 0 t r 1 1 ζ r t r ( k ) ]
where t r = 0 , 1 , r = 0 , 1 , L ( k )
ε l t ( k ) = f l t ( z l ( k ) | ξ l t ( k ) , N v ( k ) , Z k ) / l = 0 N v ( k ) f l t ( z l ( k ) | ξ l t ( k ) , N V ( k ) , Z k )
ζ l t ( k ) = f l t ( z l ( k ) | ξ l t ( k ) , N v ( k ) , Z k ) / t = 0 1 f l t ( z l ( k ) | ξ l t ( k ) , N v ( k ) , Z k )
where c is the normalization factor. Kalman gain K ( k ) needs to be calculated during the state updating:
K ( k ) = P ( k | k 1 ) B T S 1 ( k )
and the updated state estimate of the mobile node and the updated covariance matrix are obtained by the associated probability:
x ^ ( k | k ) = x ^ ( k | k 1 ) + K ( k ) l = 1 L ( k ) β l 1 ( k ) v l ( k )
P ( k | k ) = β 01 ( k ) P ( k | k 1 ) + ( 1 β 01 ( k ) ) P c ( k ) + P ˜ ( k )
P c ( k ) = ( I 4 K ( k ) B ) P ( k | k 1 )
P ˜ ( k ) = K ( k ) [ l = 1 N v ( k ) β l 1 ( k ) v l ( k ) v l T ( k ) v ( k ) v T ( k ) ] K T ( k )
v ( k ) = l = 1 N v ( k ) β l 1 ( k ) v l ( k )

4.4. NLOS Tracking

When the hypothesis test occurred and there was no position estimation passing the hypothesis testing continuously, if the final position estimation was also calculated by the above method at this time, it caused a positioning failure. Therefore, if such a situation occurred, the final position estimation needed to be corrected by the NLOS tracking method. After each hypothesis testing was completed, a corresponding flag was set. If the number of position estimates passed by the hypothesis testing was greater than 0, the corresponding flag was recorded as 1. If it was 0, the corresponding flag bit was recorded as 0. If two 0′s appeared consecutively, REKF was used to calculate the target’s position estimate. We wrote the EKF into linear regression and rewrote Equations (1) and (2) as:
[ I 4 H ( k ) ] x ^ ( k ) = [ G x ^ ( k 1 | k 1 ) y ( k ) h ( x ^ ( k | k 1 ) ) + H ( k ) x ^ ( k | k 1 ) ] + e ( k )
e ( k ) = [ G ( x ( k 1 ) x ^ ( k 1 | k 1 ) ) + C ϖ ( k 1 ) v ( k ) ]
H ( k ) = h ( x ( k ) ) x ( k )
E [ e ( k ) e T ( k ) ] = [ P ( k | k 1 ) 0 0 R ( k ) ] = C ( k ) C T ( k )
Utilizing the bridge Cholesky decomposition, C ( k ) can be solved, and the linear regression model can be written as:
y ˜ = D x + b f ˜ v + v ˜
y ˜ = C 1 ( k ) [ x ^ ( k | k 1 ) y ( k ) h ( x ^ ( k | k 1 ) ) + H ( k ) x ^ ( k | k 1 ) ]
D = C 1 ( k ) [ I 4 H ( k ) ]
x = x ( k )
v ˜ = C 1 ( k ) e ( k )
From the linear model, with the probability density function of v ˜ , the maximum likelihood estimation of x could be obtained by solving the following equations:
i = 1 M + dim ( x ) [ D ] ij × φ ( y ˜ i j = 1 dim ( x ) [ D ] i j x j ) = 0 j = 1 , , dim ( x )
where dim ( x ) means the dimension of x ^ ( k ) , φ ( υ ) = f v ( υ ) f v ( υ ) . With the least square method to solve the above linear model, we obtained x ^ ( k | k ) = ( D T D ) 1 D T y ˜ . In order to avoid the sensitivity of the least squares method to outliers and increase the robustness of the algorithm, the following methods were used to improve:
(1)
Let l = 0 , getting the initial position estimate x ^ 0 .
(2)
Calculate the residual: v ˜ ^ = y ˜ D x ˜ l
(3)
Use the v ˜ ^ to estimate the range of σ ^ V ˜
(4)
Update the μ and x ^ :
μ = 1 / ( 1.25 max ( | ψ ( v ˜ ^ / σ ^ V ) | ) )
x ^ l + 1 = x ^ l + μ ( D T D ) 1 D T ψ ( v ˜ ^ / σ ^ V )
(5)
Calculate | | x ^ l + 1 x ^ l | | , if the value is less than the ε set previously, the loop is stopped to obtain the final position estimation value. Otherwise, go to the second step and continue the cycle until it stops:
where ψ ( υ ) = { υ b tanh [ 0.5 b ( c 2 | υ | ) ] 0 sgn ( υ ) , | υ | c 1 c 1 < | υ | < c 2 | υ | c 2

5. Experiment Simulation

This section shows the simulation results of the algorithm we proposed. In the experiment, anchor nodes were randomly installed in the simulation region, and one target node moved along a fixed trajectory; the simulation scene was 100   m × 100   m . The target node moved 100 steps at a time, the sampling interval was Δ t = 0.5   s , the initial state vector was x ^ ( 0 ) = [ 1   m 19.99   m 1   m / s 0.5   m / s ] T , and the covariance matrix was P ( 0 ) = I 4 . I 4 was the 4 × 4 identity matrix. The initial state vector of each subgroup was x ^ n , j ( 0 ) = x ^ ( 0 ) , and the initial covariance matrix of the subgroup was P n , j ( 0 ) = P ( 0 ) . The threshold probability was P G = 0.99 , and the alert probability was P F A = 0.01 , P d = 0.95 . The probability of NLOS measurement occurred was P N L O S . In this paper, robust interacting multiple model (RIMM) algorithm [25], REKF algorithm [26], and modified probabilistic data association (MPDA) algorithm [27] were used as comparison. In this paper, the root mean square error (RMSE) in (38) and the cumulative distribution function (CDF) were used as indicators to assess the algorithm.
R M S E = 1 K 1 M C j = 1 M C k = 1 K ( ( x ^ j ( k ) x j ( k ) ) 2 + ( y ^ j ( k ) y j ( k ) ) 2 )
( x ^ j ( k ) , y ^ j ( k ) ) was the position estimation obtained during the j -th operation, and ( x j ( k ) , y j ( k ) ) was the real position of the mobile node during the j -th operation. K = 100 was the number of movements in each Monte Carlo simulation, and M C = 1000 was the number of Monte Carlo runs. The simulation results of NLOS errors under different distributions are discussed below.

5.1. The NLOS Errors Obeys Gaussian Distribution

The measurement noise is modeled to be a Gaussian distribution N ( 0 , σ G 2 ) , and the NLOS error is a Gaussian distribution N ( μ N L O S , σ N L O S 2 ) . The parameters of the Gaussian distribution are listed in Table 1.
Table 1. Gaussian distribution parameter.
Figure 2 shows the change of the RMSE of the REKF algorithm, the RIMM algorithm, the MPDA algorithm, and the robust data association technique (RDAT) algorithm with the increase of the number of anchor nodes. The RMSEs of REKF, RIMM, MPDA, and RDAT all decreased as the number of anchor nodes increased. It can be concluded from the simulation diagram that the RMSEs of MPDA and RDAT dropped significantly. The average positioning errors of REKF, RIMM, MPDA, and RDAT were 4.710 m, 3.684 m, 3.036 m, and 2.619 m. The average positioning accuracies of RDAT were 44.39%, 28.91%, and 13.74% higher than those of REKF, RIMM, and MPDA, respectively.
Figure 2. Performance comparison between the RIMM, robust extend Kalman filter (REKF), MPDA, and RDAT under different number of anchor nodes M , where P N L O S = 0.5 , N ( 0 , 1 2 ) and N ( 5 , 6 2 ) .
Through Figure 3, the higher the probability of NLOS error that occurred, the larger the RMSE was, thus lowering the positioning accuracy. The average localization accuracies of REKF, RIMM, MPDA, and RDAT were 3.563 m, 2.565 m, 2.825 m, and 2.189 m, respectively. The positioning accuracies of RDAT were about 38.56%, 14.66%, and 22.51% higher than those of REKF, RIMM, and MPDA, respectively. Compared to the MPDA, due to the NLOS tracking method in the RDAT, the disadvantage of MPDA was alleviated.
Figure 3. Simulation comparison between RIMM, REKF, MPDA, and RDAT with different probability of NLOS errors P N L O S , N ( 0 , 1 2 ) and N ( 5 , 6 2 ) .
The mean value of the NLOS error changed from 3 to 10, and the RMSEs of REKF, RIMM, MPDA, and RDAT increased continuously in Figure 4, but RDAT increased more slowly than others with smaller positioning error. It can be concluded that the larger the average value of NLOS error was, the larger the error of positioning was; the performance of RDAT was still superior in the condition where the NLOS noise was higher.
Figure 4. Performance comparison between RIMM, REKF, MPDA, and RDAT under different mean values of NLOS error μ N L O S , where P N L O S = 0.5 , and N ( 0 , 1 2 ) , N ( 5 , 6 2 ) .
It can be seen from the simulation in Figure 5 that when the standard deviation of NLOS error changed between 3 and 10, the RMSEs of the REKF and the RIMM algorithms rose steadily, while the RMSE of the MPDA algorithm decreased firstly and then increased. The RMSE of the RDAT algorithm was decreasing until the standard deviation reached nine, when it started to increase because the algorithm we proposed is sensitive to outliers. The average positioning accuracies of REKF, RIMM, MPDA, and RDAT were 4.398 m, 3.066 m, 3.466 m, and 2.075 m, respectively.
Figure 5. Performance contrast of RIMM, REKF, MPDA, and RDAT with different standard deviation of NLOS errors σ N L O S , P N L O S = 0.5 , N ( 0 , 1 2 ) and N ( 5 , 6 2 ) .
Figure 6 shows the cumulative error distribution of REKF, RIMM, MPDA, and RDAT. When the value of cumulative distribution function was 90%, the average localization accuracies of REKF, RIMM, MPDA, and RDAT did not exceed 7.569 m, 6.417 m, 6.463 m, and 5.168 m, respectively. This indicates the performance of RDAT was better than the others in most cases, as the accuracy of RDAT was significantly higher than REKF, RIMM, and MPDA.
Figure 6. The cumulative distribution function (CDF) result of the localization error.

5.2. The NLOS Errors Obey Uniform Distribution

Assuming that the measurement noise obeys the Gaussian distribution N ( 0 , σ G 2 ) , and the NLOS error is modeled as uniform distribution U ( a , b ) , a and b are the minimum and the maximum of the uniform distribution, respectively. The default parameters of the uniform distribution are shown in Table 2.
Table 2. Uniform distribution parameter.
With the occurrence probability of NLOS propagation changes between 0.1 and 0.7 in Figure 7, the position accuracy decreased while the RMSE increased. Compared with REFK and RIMM algorithms, MPDA and RDAT increased slowly; before 0.4, the change was small, and RDAT was better than MPDA. The average positioning accuracies of REKF, RIMM, MPDA, and RDAT were 5.241 m, 4.300 m, 3.473 m, and 2.775 m, respectively. The positioning accuracies of RDAT were about 47.05%, 35.47%, and 20.10% higher than REKF, RIMM, and MPDA, respectively.
Figure 7. Performance comparison between RIMM, REKF, MPDA, and RDAT with the probability of NLOS errors P N L O S , N ( 0 , 1 2 ) and U ( 0 , 14 ) .
From Figure 8, with the increase of the maximum value of the NLOS error, compared to REKF, RIMM, and MPDA, the RDAT increased more slowly and did not change much. The average localization accuracies of REKF, RIMM, MPDA, and RDAT were 4.772 m, 4.397 m, 4.505 m, and 3.926 m, respectively.
Figure 8. Performance comparison between RIMM, REKF, MPDA, and RDAT with different maximum value of NLOS error, where P N L O S = 0.5 , N ( 0 , 1 2 ) and U ( 0 , 14 ) .

5.3. The NLOS Errors Obey Index Distribution

The measurement noise is assumed to be a Gaussian distribution N ( 0 , σ G 2 ) , and the NLOS errors obey the index distribution E ( λ ) in this section. The default parameters of the index distribution are shown in Table 3.
Table 3. Index distribution parameter.
Referring to Figure 9, when the parameter of the index distribution increased from 3 to 10, REKF and RIMM increased faster, and the root mean square errors of MPDA and RDAT increased less. Compared with MPDA, RDAT was more stable. The average positioning errors of REKF, RIMM, MPDA, and RDAT were 4.676 m, 3.585 m, 2.305 m, and 1.603 m, respectively.
Figure 9. Performance contrast between RIMM, REKF, MPDA, and RDAT with different parameters of index distribution, where P N L O S = 0.5 , N ( 0 , 1 2 ) and E ( 8 ) .
Figure 10 shows the average positioning error distribution of REKF, RIMM, MPDA, and RDAT when the NLOS errors followed an index distribution. The average positioning errors of 90% of REKF, RIMM, MPDA, and RDAT were not less than 9.459 m, 7.753 m, 4.208 m, and 2.833 m. When the cumulative distribution function approached one, the average positioning accuracy of RDAT did not exceed 6 m, which was a higher improvement than REKF, RIMM, and MPDA.
Figure 10. The CDF result of the localization error.

5.4. Experimental Result

For the purpose of verifying the actual performance of the proposed algorithm, we conducted an experiment in our laboratory. Due to the high accuracy, we applied UWB to collect the information of distance. Figure 11 shows we deployed eight anchor nodes, and the pedestrian who held the UWB in hand moved uniformly through the trajectory from the red mark point to the blue mark point; the green mark point was the anchor node, and the black mark point was the sample point. The coordinates of the beacon nodes were (0.4 m 4.1 m), (3.3 m 0.6 m), (3.6 m 3.0 m), (4.2 m 1.2 m), (5.4 m 4.2 m), (9.1 m 1.2 m), (9.6 m 3.6 m), and (11.40 m 5.18 m), respectively. The initial state vector was x ^ = [ 1.8   m 6.0   m 0   m / s 0.6 / s ] . In order to avoid the receiver receiving the UWB signal reflected from the ground, the pedestrian took the mobile node in hand, which was 1.2 m above the ground. The laboratory was 12.6 m long and 6.6 m wide. Because there were obstacles such as persons, desks, and so on in the room, the measured values interfered with NLOS factors. In addition, when someone was walking in the room during the measurement, it aggravated the interference of NLOS factors. Each time the mobile node moved 0.6 m, a sampling was performed at the black point in Figure 11 and was done 30 times for each anchor node. Each anchor node collected 20 measurements at each sample interval with the average value as the final measurements handled by localization algorithm.
Figure 11. Deployment of experiment.
The localization error distribution of each sample point is shown in Figure 12; the x-axis represents the order of the sample point, and the y-axis represents the positioning error at the corresponding sampling point in meters. The CDF is shown in Figure 13. From Figure 12, the positioning performance of the RDAT was better than REKF, RIMM, and MPDA in most sample points, and the corresponding positioning error was less than one meter. From Figure 13, the 90% error of the RDAT was less than 1.036 m, and the CDF tended to one at a localization error of less than 1.67 m, while the 90% errors of REKF, RIMM, and MPDA were achieved at 1.297 m, 1.442 m, and 1.051 m, respectively. Through the CDF, the location error of RDAT was less than 1.67 m in the whole track. Although the performance of RDAT in a real experiment was not as outstanding as in simulation, it was just because there were too many types of noise in the real environment; the algorithm we proposed still has excellent performance in most cases. Thus, there is improvement to be made on this question in the future.
Figure 12. The localization error of sample points.
Figure 13. The CDF result of localization error.

6. Conclusions

This paper proposes am NLOS identification and suppression indoor localization algorithm. The anchor nodes participating in the positioning were divided into several subgroups, and the position estimates of the target nodes obtained by each subgroup were checked through hypothesis testing. The position estimates polluted by NLOS errors were discarded, thereby improving subsequent positioning accuracy. For the position estimation that passed the hypothesis test, the clustering probability matrix was used to improve the method of calculating the association probability to get the final target position estimation. For the case where no position estimation passed the hypothesis testing continuously, the NLOS tracking method was used to obtain the position estimation, which increased the robustness of the algorithm. Simulation results verify that the performance of the proposed algorithm was better than REKF, RIMM, and MPDA, and RDAT had high positioning accuracy when the NLOS error probability was relatively small. When the NLOS error probability was large, the positioning accuracy was reduced, thus there is improvement to be achieved in the future.

Author Contributions

L.C. and Y.W. conceived and designed the experiment; Y.W. and Y.B. performed the experiment; L.C. and M.X. analyzed the data; L.C and Y.W. wrote the paper. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China under Grant No. 61803077; Natural Science Foundation of Hebei Province under Grant No. F2020501012; Fundamental Research Funds for the Central Universities under Grant No. N172304024.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Shi, Q.; Cui, X.; Zhao, S.; Lu, M. Sequential TOA-Based Moving Target Localization in Multi-Agent Networks. IEEE Commun. Lett. 2020, 24, 1719–1723. [Google Scholar] [CrossRef]
  2. Cao, S.; Chen, X.; Zhang, X.; Chen, X. Combined Weighted Method for TDOA-Based Localization. IEEE Trans. Instrum. Meas. 2019, 69, 1962–1971. [Google Scholar] [CrossRef]
  3. Yang, B.; Guo, L.; Guo, R.; Zhao, M.; Zhao, T. A Novel Trilateration Algorithm for RSSI-Based Indoor Localization. IEEE Sens. J. 2020, 20, 8164–8172. [Google Scholar] [CrossRef]
  4. Zheng, Y.; Sheng, M.; Liu, J.; Li, J. Exploiting AoA Estimation Accuracy for Indoor Localization: A Weighted AoA-Based Approach. IEEE Wirel. Commun. Lett. 2018, 8, 65–68. [Google Scholar] [CrossRef]
  5. Gui, L.; Val, T.; Wei, A.; Dalce, R. Improvement of range-free localization technology by a novel DV-hop protocol in wireless sensor networks. Ad Hoc Netw. 2015, 24, 55–73. [Google Scholar] [CrossRef]
  6. Haigh, S.; Kulon, J.; Partlow, A.; Rogers, P.; Gibson, C. A Robust Algorithm for Classification and Rejection of NLOS Signals in Narrowband Ultrasonic Localization Systems. IEEE Trans. Instrum. Meas. 2018, 68, 646–655. [Google Scholar] [CrossRef]
  7. Tian, X.; Wei, G.; Wang, J.; Zhang, D. A Localization and Tracking Approach in NLOS Environment Based on Distance and Angle Probability Model. Sensors 2019, 19, 4438. [Google Scholar] [CrossRef] [PubMed]
  8. Wang, L.; Zawodniok, M. New Theoretical Limit Analysis of LoS and RSS Based Positioning Methods for Ricean Fading Channel in RF Systems. IEEE Trans. Mob. Comput. 2019, 18, 2401–2414. [Google Scholar] [CrossRef]
  9. Barral, V.; Escudero, C.J.; García-Naya, J.A.; Maneiro-Catoira, R. NLOS Identification and Mitigation Using Low-Cost UWB Devices. Sensors 2019, 19, 3464. [Google Scholar] [CrossRef] [PubMed]
  10. Zhang, G.; Deng, Z.; Wen, L.; Ge, L.; Ke, H.; Jiao, J. An UWB Location Algorithm for Indoor NLOS Environment. In Proceedings of the 2018 Ubiquitous Positioning, Indoor Navigation and Location-Based Services (UPINLBS), Wuhan, China, 22–23 March 2018; Institute of Electrical and Electronics Engineers (IEEE): New York, NY, USA; pp. 1–6. [Google Scholar]
  11. Yuan, Y.; Li, Y.; Liu, Z.; Chan, K.Y.; Zhu, S.; Guan, X. A three dimensional tracking scheme for underwater non-cooperative objects in mixed LOS and NLOS environment. Peer-to-Peer Netw. Appl. 2018, 12, 1369–1384. [Google Scholar] [CrossRef]
  12. Wang, Y.; Jie, H.; Cheng, L. A Fusion Localization Method based on a Robust Extended Kalman Filter and Track-Quality for Wireless Sensor Networks. Sensors 2019, 19, 3638. [Google Scholar] [CrossRef]
  13. Zhang, X.; Lin, W. Hyperbolic-Weighted Centroid Indoor Location Algorithm based on Kalman Filter. In Proceedings of the 2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, China, 12–14 October 2018; pp. 2520–2523. [Google Scholar]
  14. Dwek, N.; Birem, M.; Geebelen, K.; Hostens, E.; Mishra, A.; Steckel, J.; Yudanto, R. Improving the Accuracy and Robustness of Ultra-Wideband Localization Through Sensor Fusion and Outlier Detection. IEEE Robot. Autom. Lett. 2020, 5, 32–39. [Google Scholar] [CrossRef]
  15. Tomic, S.; Beko, M. A Robust NLOS Bias Mitigation Technique for RSS-TOA-Based Target Localization. IEEE Signal Process. Lett. 2019, 26, 64–68. [Google Scholar] [CrossRef]
  16. Chang, S.; Li, Y.; Yang, X.; Wang, H.; Hu, W.; Wu, Y. A Novel Localization Method Based on RSS-AOA Combined Measurements by Using Polarized Identity. IEEE Sens. J. 2019, 19, 1463–1470. [Google Scholar] [CrossRef]
  17. Chen, H.; Wang, G.; Ansari, N. Improved Robust TOA-Based Localization via NLOS Balancing Parameter Estimation. IEEE Trans. Veh. Technol. 2019, 68, 6177–6181. [Google Scholar] [CrossRef]
  18. Yang, M.N.; Jackson, D.R.; Chen, J.; Xiong, Z.B. A TDOA Localization Method for NLOS Scenarios. IEEE Trans. Antennas Propag. 2019, 67, 2666–2676. [Google Scholar] [CrossRef]
  19. Wang, G.; Zhu, W.; Ansari, N. Robust TDOA-Based Localization for IoT via Joint Source Position and NLOS Error Estimation. IEEE Internet Things J. 2019, 6, 8529–8541. [Google Scholar] [CrossRef]
  20. Xiong, W.; So, H.C. TOA-Based Localization with NLOS Mitigation via Robust Multidimensional Similarity Analysis. IEEE Signal Process. Lett. 2019, 26, 1334–1338. [Google Scholar] [CrossRef]
  21. Cheng, L.; Hang, J.; Wang, Y.; Bi, Y. A Fuzzy C-Means and Hierarchical Voting Based RSSI Quantify Localization Method for Wireless Sensor Network. IEEE Access 2019, 7, 47411–47422. [Google Scholar] [CrossRef]
  22. Cheng, L.; Li, Y.; Wang, Y.; Bi, Y.; Feng, L.; Xue, M. A Triple-Filter NLOS Localization Algorithm Based on Fuzzy C-means for Wireless Sensor Networks. Sensors 2019, 19, 1215. [Google Scholar] [CrossRef] [PubMed]
  23. Wang, Y.; Hang, J.; Cheng, L.; Li, C.; Song, X. A Hierarchical Voting Based Mixed Filter Localization Method for Wireless Sensor Network in Mixed LOS/NLOS Environments. Sensors 2018, 18, 2348. [Google Scholar] [CrossRef] [PubMed]
  24. Liu, N.; Xu, Z.; Sadler, B.M. Geolocation Performance with Biased Range Measurements. IEEE Trans. Sinal Process. 2012, 60, 2315–2329. [Google Scholar] [CrossRef]
  25. Li, D.; Sun, J. Robust Interacting Multiple Model Filter Based on Student’s t-Distribution for Heavy-Tailed Measurement Noises. Sensors 2019, 19, 4830. [Google Scholar] [CrossRef] [PubMed]
  26. Hammes, U.; Zoubir, A.M. Robust MT Tracking Based on M-Estimation and Interacting Multiple Model Algorithm. IEEE Trans. Signal Process. 2011, 59, 3398–3409. [Google Scholar] [CrossRef]
  27. Hammes, U.; Zoubir, A.M. Robust Mobile Terminal Tracking in NLOS Environments Based on Data Association. IEEE Trans. Signal Process. 2010, 58, 5872–5882. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.