SlideShare una empresa de Scribd logo
1 de 35
Localization With Mobile AnchorLocalization With Mobile Anchor
Points in Wireless Sensor NetworksPoints in Wireless Sensor Networks
Authors:
Kuo-Feng Ssu, Chia-Ho Ou, and Hewijin Christine Jiau
Presented by:
Md. Kayser Nizam, Md. Habibur Rahman, Md. Monzur Morshed
Course:
Sensor Networks and Wireless Computing
Instructor:
Md. Saidur Rahman
Main Idea of this paperMain Idea of this paper
 In this paper, authors described a range-free
localization scheme using mobile anchor
points equipped with GPS moves in sensor
field and broadcasts its current position
periodically.
 For range-free localization, no extra hardware
or data communication is needed.
 Experiment results showed that authors
scheme performed better than other range-
free mechanisms.
LocalizationLocalization
 What is “localization”?
• Determining where a given node is physically located
in a wireless sensor network (WSN).
 Why do we need to localize a node?
• Identify the location at which sensor reading originate.
• A sensor reading consists of <time, location,
measurement>
• In novel communication protocols that route to
geographic areas instead of ID.
 Localization is a problem in WSNs
• Nodes randomly deployed
• Location unknown
Localization (cont.)Localization (cont.)
 Localization is essential
• Necessary for data correlation (e.g. target tracking)
• Many MAC, routing, and other protocols use nodes'
locations
• Helps in understanding the utility of a WSN from its
coverage area
• Increase network lifetime
 Scalability of localization protocol is important
• Large networks especially need localization
• Many using anchor nodes are non-scalable
Localization (cont.)Localization (cont.)
 Problem Formulation
• Defining a coordinate system
• Calculating the distance between sensor nodes
 Defining a Coordinate System
• Global
• Aligned with some externally meaningful system
(e.g., GPS)
• Relative
• An arbitrary rigid transformation (rotation,
reflection, translation) away from the global
coordinate system
Localization (cont.)Localization (cont.)
 In general, almost all the sensor network
localization algorithms share three main
phases
 DISTANCE ESTIMATION
 POSITION COMPUTATION
 LOCALIZATION ALGHORITHM
Distance EstimationDistance Estimation
 ANGLE OF ARRIVAL (AOA) method allows each sensor
to evaluate the relative angles between received radio
signals
 TIME OF ARRIVAL (TOA) method tries to estimate
distances between two nodes using time based measures
 TIME DIFFERENT OF ARRIVAL (TDOA) is a method for
determining the distance between a mobile station and
nearby synchronized base station
 THE RECEIVED SIGNAL STRENGTH INDICATOR
(RSSI) techniques are used to translate signal strength
into distance.
Position ComputationPosition Computation
 The common methods for position
computation techniques are:
 LATERATION techniques based on the
precise measurements to three non collinear
anchors. Lateration with more than three
anchors called multi-lateration.
 ANGULATION or triangulation is based on
information about angles instead of
distance.
Classifications of LocalizationClassifications of Localization
MethodsMethods
Wireless Sensor Network localization algorithms into
several categories such as:
 Centralized vs Distributed
 Anchor-free vs Anchor-based
 Range-free vs Range-based
 Mobile vs Stationary
Centralized vs DistributedCentralized vs Distributed
 Centralized
• All computation is done in a central server
 Distributed
• Computation is distributed among the nodes
Anchor-Free vs Anchor-BasedAnchor-Free vs Anchor-Based
 Anchor Nodes:
• Nodes that know their coordinates a priori
• By use of GPS or manual placement
• For 2D three and 3D four anchor nodes are needed
 Anchor-free
• Relative coordinates
 Anchor-based
• Use anchor nodes to calculate global coordinates
Range-Free vs Range-BasedRange-Free vs Range-Based
 Range-Free
• For achieving coarse grained accuracy
• 3 methods of distance estimation
• Centroid
• DV-hop
• Geometry conjecture
 Range-Based
• For fine grained accuracy
• TOA
• TDOA
• RSSI
• AOA
Generic Approach Using AnchorGeneric Approach Using Anchor
NodesNodes
 Determine the distances between regular
nodes and anchor nodes. (Communication)
 Derive the position of each node from its
anchor distances. (Computation)
 Iteratively refine node positions using range
information and positions of neighboring
nodes. (Communication & Computation)
Phase 1: CentroidPhase 1: Centroid
 Idea: Do not use any
ranging at all, simply
deploy enough beacons
 Anchors periodically
broadcast their location
 Localization:
 Listen for beacons
 Average locations of all
anchors in range
 Result is location
estimate
 Good anchor placement
is crucial!
Anchors
Ref: Nirupama Bulusu, John Heidemann and Deborah Estrin. Density Adaptive
Beacon Placement, Proceedings of the 21st IEEE ICDCS, 2001
Phase 1: DV-hopPhase 1: DV-hop
• Anchors
• flood network with
own position
• flood network with
avg hop distance
• Nodes
• count number of hops
to anchors
• multiply with avg hop
distance
C
A
B
1
1
1
1
2
2
2
3
3
4
4
3 hops
avg hop: 5
System EnvironmentSystem Environment
• Sensor network consists of sensor
nodes and mobile anchor points
• Randomly distributed
• Can receive messages from sensor
nodes and mobile anchor points
• Mobile anchor points can traverse
for assisting sensor nodes to
determine their locations
• Each mobile anchor point has a GPS
receiver and sufficient energy for
moving and broadcasting beacon
• Messages during the localization
process.
Localization SchemeLocalization Scheme
• Inspired by the perpendicular
bisector of a chord conjecture.
• Perpendicular bisector of any
chord passes through the
center of the circle
• Localization problem can be
transformed based on the
conjecture
• Sensor node location: center
of the circle
• Sensor nodes communicate
with mobile anchors through
the radius of the circle
Beacon Point SelectionBeacon Point Selection
• At least three endpoints on the
circle should be collected for
establishing two chords
• Anchor point periodically
broadcasts beacon messages
when it moves
• Beacon message contains the
anchor node’s id, location, and
timestamp
• Node maintains a set of beacon
points & a visitor list
• Beacon point is considered as
an approximate endpoint on
the sensor node’s
communication circle
Location CalculationLocation Calculation
Beacon SchedulingBeacon Scheduling
• Broadcasting in wireless ad hoc
networks may cause destructive
bandwidth congestion,
contention, and collision
• Collision at sensor nodes could
occur due to beacon messages in
the mechanism
• Solution: the scheduling for
broadcasting beacon messages is
jittered.
• Randomized scheduling prevents
the beacon collision at sensor
nodes so each node can
efficiently obtain beacon
messages from different mobile
anchor points.
Chord SelectionChord Selection
 Localization will be accurate if the selected beacon points
are exact on the communication circle
 Incorrect beacon points could be chosen due to collision or
inappropriate beacon intervals.
 Chords generated using the beacon points thus fails to
estimate the position of the sensor
 When length of the chord is too short, probability of
unsuccessful localization will increase rapidly
 A threshold λ for the length of a chord is used to solve the
problem
 The length of a chord must surpass the threshold for
reducing the localization error
Obstacle ToleranceObstacle Tolerance
• Obstacles in the sensor field
cause radio irregularity in
the sensor network
• Radio irregularity could
degrade the performance of
localization protocols so
most localization schemes
require a non-obstacle
sensing area
• Original mechanism may
choose inappropriate
beacon points if obstacles
exist
Obstacle Tolerance (cont.)Obstacle Tolerance (cont.)
• Enhanced beacon point selection
based on the characteristic of
concentric circles is developed
for tolerating the presence of
obstacles
• Exploiting chords on one of its
concentric circles can also
compute the center of the circle
• B3, B4, and B5 are on the same
concentric circle and can form
two suitable chords to determine
the center of the circle
• Signal strength of a received
beacon is in inverse proportion
to the distance with the sender
Simulation EnvironmentSimulation Environment
Six sets of simulations for
evaluation:
•Beacon scheduling
•Threshold for the length
of a chord
•Radio range
•Moving speed
•Number of anchor points
•Obstacles
Three metrics used to evaluate the
performance of proposed localization
mechanism
• Average location error
• Average execution time
• Beacon overhead
Performance MetricsPerformance Metrics
Simulation ParametersSimulation Parameters
PerformancePerformance
ConclusionConclusion
In this paper, authors found that ……………..
 Range-free localization mechanism without using distance or angle
information was also able to achieve fine-grained accuracy.
 The sensor nodes can calculate their positions without additional
interactions based on the localization information from mobile anchors
and the principles of elementary geometry.
 All computation is performed locally, and beacon overhead only occurs
on mobile anchors so the mechanism is distributed, scalable, effective,
and power efficient.
 Execution time for localization mechanism can be shortened if the
moving speed, the radio range, or the number of mobile anchor points
in increased.
Thank you 

Más contenido relacionado

La actualidad más candente

Indoor navigation system
Indoor navigation systemIndoor navigation system
Indoor navigation systemOmkar Paranjape
 
Localization &amp; calling
Localization  &amp; callingLocalization  &amp; calling
Localization &amp; callingRUpaliLohar
 
Location Based services
Location Based servicesLocation Based services
Location Based servicesFraj Alshahibi
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its applicationRoma Vyas
 
Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applicationsDeepshika Reddy
 
Infrastructure Establishment
Infrastructure EstablishmentInfrastructure Establishment
Infrastructure Establishmentjuno susi
 
Tracking and positioning of mobile in telecommunication network
Tracking and positioning of mobile in telecommunication networkTracking and positioning of mobile in telecommunication network
Tracking and positioning of mobile in telecommunication networkKrishna Ghanva
 
Wireless body area network
Wireless body area networkWireless body area network
Wireless body area networkPratik Gondaliya
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitecturePeriyanayagiS
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksGokuldhev mony
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksMshari Alabdulkarim
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksAneeshGKumar
 
A comparative study of reactive and proactive routing
A comparative study of reactive and proactive routingA comparative study of reactive and proactive routing
A comparative study of reactive and proactive routingAbhiram Subhagan
 

La actualidad más candente (20)

Indoor navigation system
Indoor navigation systemIndoor navigation system
Indoor navigation system
 
Satellite Navigation
Satellite Navigation Satellite Navigation
Satellite Navigation
 
Localization &amp; calling
Localization  &amp; callingLocalization  &amp; calling
Localization &amp; calling
 
Location Based services
Location Based servicesLocation Based services
Location Based services
 
Ioe module 4
Ioe module 4Ioe module 4
Ioe module 4
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
 
Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applications
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Body Area Networks (BANs) - PPT (By Study PPT)
Body Area Networks (BANs) - PPT (By Study PPT)Body Area Networks (BANs) - PPT (By Study PPT)
Body Area Networks (BANs) - PPT (By Study PPT)
 
Infrastructure Establishment
Infrastructure EstablishmentInfrastructure Establishment
Infrastructure Establishment
 
Paging and Location Update
Paging and Location UpdatePaging and Location Update
Paging and Location Update
 
Tracking and positioning of mobile in telecommunication network
Tracking and positioning of mobile in telecommunication networkTracking and positioning of mobile in telecommunication network
Tracking and positioning of mobile in telecommunication network
 
Wireless body area network
Wireless body area networkWireless body area network
Wireless body area network
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor Networks
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Dsdv
DsdvDsdv
Dsdv
 
Gnss data-processing
Gnss data-processingGnss data-processing
Gnss data-processing
 
A comparative study of reactive and proactive routing
A comparative study of reactive and proactive routingA comparative study of reactive and proactive routing
A comparative study of reactive and proactive routing
 

Destacado

Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routingAshraf Uddin
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewYoav Francis
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocolnitss007
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 

Destacado (7)

Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routing
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocol
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 

Similar a Localization with mobile anchor points in wireless sensor networks

Sensor Localization presentation1&2
Sensor Localization  presentation1&2Sensor Localization  presentation1&2
Sensor Localization presentation1&2gamalsallam1989
 
Optimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor NetworksOptimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor Networkspaperpublications3
 
A self localization scheme for mobile wireless sensor networks
A self localization scheme for mobile wireless sensor networksA self localization scheme for mobile wireless sensor networks
A self localization scheme for mobile wireless sensor networksambitlick
 
A Survey on Localization of Wireless Sensors
A Survey on Localization of Wireless SensorsA Survey on Localization of Wireless Sensors
A Survey on Localization of Wireless SensorsKarthik Mohan
 
Localization scheme for underwater wsn
Localization scheme for underwater wsnLocalization scheme for underwater wsn
Localization scheme for underwater wsnAkshay Paswan
 
A Virtual Infrastructure for Mitigating Typical Challenges in Sensor Networks
A Virtual Infrastructure for Mitigating Typical Challenges in Sensor NetworksA Virtual Infrastructure for Mitigating Typical Challenges in Sensor Networks
A Virtual Infrastructure for Mitigating Typical Challenges in Sensor NetworksMichele Weigle
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor NetworksIOSR Journals
 
Artificial Bee Colony algorithm for Localization in Wireless Sensor Networks
Artificial Bee Colony algorithm for Localization in Wireless Sensor NetworksArtificial Bee Colony algorithm for Localization in Wireless Sensor Networks
Artificial Bee Colony algorithm for Localization in Wireless Sensor NetworksAssociate Professor in VSB Coimbatore
 
3D routing algorithm for sensor network in e-health
3D routing algorithm for sensor network in e-health3D routing algorithm for sensor network in e-health
3D routing algorithm for sensor network in e-healthVakhtang Mosidze
 
Direct_studies_report13
Direct_studies_report13Direct_studies_report13
Direct_studies_report13Farhad Gholami
 
CUBOID-BASED WIRELESS SENSOR NETWORK LOCALIZATION ALGORITHM
CUBOID-BASED WIRELESS SENSOR NETWORK LOCALIZATION ALGORITHM CUBOID-BASED WIRELESS SENSOR NETWORK LOCALIZATION ALGORITHM
CUBOID-BASED WIRELESS SENSOR NETWORK LOCALIZATION ALGORITHM ijassn
 
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...ijasuc
 
Analyzing the performance of the dynamic
Analyzing the performance of the dynamicAnalyzing the performance of the dynamic
Analyzing the performance of the dynamicIJCNCJournal
 
Multi Sensor Data Fusion In Target Tracking
Multi Sensor Data Fusion In Target TrackingMulti Sensor Data Fusion In Target Tracking
Multi Sensor Data Fusion In Target TrackingVasuhiSamydurai1
 
WIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORS’ ANTENNAS
WIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORS’ ANTENNASWIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORS’ ANTENNAS
WIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORS’ ANTENNASijassn
 
66672670-Wireless-Sensor-Network.ppt
66672670-Wireless-Sensor-Network.ppt66672670-Wireless-Sensor-Network.ppt
66672670-Wireless-Sensor-Network.ppt073AamirFarooq
 

Similar a Localization with mobile anchor points in wireless sensor networks (20)

Sensor Localization presentation1&2
Sensor Localization  presentation1&2Sensor Localization  presentation1&2
Sensor Localization presentation1&2
 
Lps
LpsLps
Lps
 
Optimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor NetworksOptimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor Networks
 
A self localization scheme for mobile wireless sensor networks
A self localization scheme for mobile wireless sensor networksA self localization scheme for mobile wireless sensor networks
A self localization scheme for mobile wireless sensor networks
 
A Survey on Localization of Wireless Sensors
A Survey on Localization of Wireless SensorsA Survey on Localization of Wireless Sensors
A Survey on Localization of Wireless Sensors
 
Localization scheme for underwater wsn
Localization scheme for underwater wsnLocalization scheme for underwater wsn
Localization scheme for underwater wsn
 
A Virtual Infrastructure for Mitigating Typical Challenges in Sensor Networks
A Virtual Infrastructure for Mitigating Typical Challenges in Sensor NetworksA Virtual Infrastructure for Mitigating Typical Challenges in Sensor Networks
A Virtual Infrastructure for Mitigating Typical Challenges in Sensor Networks
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks
 
Artificial Bee Colony algorithm for Localization in Wireless Sensor Networks
Artificial Bee Colony algorithm for Localization in Wireless Sensor NetworksArtificial Bee Colony algorithm for Localization in Wireless Sensor Networks
Artificial Bee Colony algorithm for Localization in Wireless Sensor Networks
 
3D routing algorithm for sensor network in e-health
3D routing algorithm for sensor network in e-health3D routing algorithm for sensor network in e-health
3D routing algorithm for sensor network in e-health
 
Direct_studies_report13
Direct_studies_report13Direct_studies_report13
Direct_studies_report13
 
CUBOID-BASED WIRELESS SENSOR NETWORK LOCALIZATION ALGORITHM
CUBOID-BASED WIRELESS SENSOR NETWORK LOCALIZATION ALGORITHM CUBOID-BASED WIRELESS SENSOR NETWORK LOCALIZATION ALGORITHM
CUBOID-BASED WIRELESS SENSOR NETWORK LOCALIZATION ALGORITHM
 
3 ijcse-01222-5
3 ijcse-01222-53 ijcse-01222-5
3 ijcse-01222-5
 
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
 
O026084087
O026084087O026084087
O026084087
 
Analyzing the performance of the dynamic
Analyzing the performance of the dynamicAnalyzing the performance of the dynamic
Analyzing the performance of the dynamic
 
Multi Sensor Data Fusion In Target Tracking
Multi Sensor Data Fusion In Target TrackingMulti Sensor Data Fusion In Target Tracking
Multi Sensor Data Fusion In Target Tracking
 
WIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORS’ ANTENNAS
WIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORS’ ANTENNASWIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORS’ ANTENNAS
WIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORS’ ANTENNAS
 
Wireless Sensor
Wireless SensorWireless Sensor
Wireless Sensor
 
66672670-Wireless-Sensor-Network.ppt
66672670-Wireless-Sensor-Network.ppt66672670-Wireless-Sensor-Network.ppt
66672670-Wireless-Sensor-Network.ppt
 

Más de Habibur Rahman

Cycling for the body and mind
Cycling for the body and mindCycling for the body and mind
Cycling for the body and mindHabibur Rahman
 
Poster Presentation of the 3rd IEEE Int. Conf. on ICIEV’14
Poster Presentation of the 3rd IEEE Int. Conf. on ICIEV’14Poster Presentation of the 3rd IEEE Int. Conf. on ICIEV’14
Poster Presentation of the 3rd IEEE Int. Conf. on ICIEV’14Habibur Rahman
 
A version of watershed algorithm for color image segmentation
A version of watershed algorithm for color image segmentationA version of watershed algorithm for color image segmentation
A version of watershed algorithm for color image segmentationHabibur Rahman
 
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...Habibur Rahman
 
A tutorial on GreenCloud
A tutorial on GreenCloudA tutorial on GreenCloud
A tutorial on GreenCloudHabibur Rahman
 
A tutorial on CloudSim
A tutorial on CloudSimA tutorial on CloudSim
A tutorial on CloudSimHabibur Rahman
 
Survey on cloud simulator
Survey on cloud simulatorSurvey on cloud simulator
Survey on cloud simulatorHabibur Rahman
 
Simulation and modeling
Simulation and modelingSimulation and modeling
Simulation and modelingHabibur Rahman
 
Performace analysis of mipv4 vs mipv6
Performace  analysis of mipv4 vs mipv6Performace  analysis of mipv4 vs mipv6
Performace analysis of mipv4 vs mipv6Habibur Rahman
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingHabibur Rahman
 

Más de Habibur Rahman (11)

Cycling for the body and mind
Cycling for the body and mindCycling for the body and mind
Cycling for the body and mind
 
Poster Presentation of the 3rd IEEE Int. Conf. on ICIEV’14
Poster Presentation of the 3rd IEEE Int. Conf. on ICIEV’14Poster Presentation of the 3rd IEEE Int. Conf. on ICIEV’14
Poster Presentation of the 3rd IEEE Int. Conf. on ICIEV’14
 
A version of watershed algorithm for color image segmentation
A version of watershed algorithm for color image segmentationA version of watershed algorithm for color image segmentation
A version of watershed algorithm for color image segmentation
 
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...
 
A tutorial on GreenCloud
A tutorial on GreenCloudA tutorial on GreenCloud
A tutorial on GreenCloud
 
A tutorial on CloudSim
A tutorial on CloudSimA tutorial on CloudSim
A tutorial on CloudSim
 
H.323 protocol
H.323 protocolH.323 protocol
H.323 protocol
 
Survey on cloud simulator
Survey on cloud simulatorSurvey on cloud simulator
Survey on cloud simulator
 
Simulation and modeling
Simulation and modelingSimulation and modeling
Simulation and modeling
 
Performace analysis of mipv4 vs mipv6
Performace  analysis of mipv4 vs mipv6Performace  analysis of mipv4 vs mipv6
Performace analysis of mipv4 vs mipv6
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 

Último

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Último (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

Localization with mobile anchor points in wireless sensor networks

  • 1. Localization With Mobile AnchorLocalization With Mobile Anchor Points in Wireless Sensor NetworksPoints in Wireless Sensor Networks Authors: Kuo-Feng Ssu, Chia-Ho Ou, and Hewijin Christine Jiau Presented by: Md. Kayser Nizam, Md. Habibur Rahman, Md. Monzur Morshed Course: Sensor Networks and Wireless Computing Instructor: Md. Saidur Rahman
  • 2. Main Idea of this paperMain Idea of this paper  In this paper, authors described a range-free localization scheme using mobile anchor points equipped with GPS moves in sensor field and broadcasts its current position periodically.  For range-free localization, no extra hardware or data communication is needed.  Experiment results showed that authors scheme performed better than other range- free mechanisms.
  • 3. LocalizationLocalization  What is “localization”? • Determining where a given node is physically located in a wireless sensor network (WSN).  Why do we need to localize a node? • Identify the location at which sensor reading originate. • A sensor reading consists of <time, location, measurement> • In novel communication protocols that route to geographic areas instead of ID.  Localization is a problem in WSNs • Nodes randomly deployed • Location unknown
  • 4. Localization (cont.)Localization (cont.)  Localization is essential • Necessary for data correlation (e.g. target tracking) • Many MAC, routing, and other protocols use nodes' locations • Helps in understanding the utility of a WSN from its coverage area • Increase network lifetime  Scalability of localization protocol is important • Large networks especially need localization • Many using anchor nodes are non-scalable
  • 5. Localization (cont.)Localization (cont.)  Problem Formulation • Defining a coordinate system • Calculating the distance between sensor nodes  Defining a Coordinate System • Global • Aligned with some externally meaningful system (e.g., GPS) • Relative • An arbitrary rigid transformation (rotation, reflection, translation) away from the global coordinate system
  • 6. Localization (cont.)Localization (cont.)  In general, almost all the sensor network localization algorithms share three main phases  DISTANCE ESTIMATION  POSITION COMPUTATION  LOCALIZATION ALGHORITHM
  • 7. Distance EstimationDistance Estimation  ANGLE OF ARRIVAL (AOA) method allows each sensor to evaluate the relative angles between received radio signals  TIME OF ARRIVAL (TOA) method tries to estimate distances between two nodes using time based measures  TIME DIFFERENT OF ARRIVAL (TDOA) is a method for determining the distance between a mobile station and nearby synchronized base station  THE RECEIVED SIGNAL STRENGTH INDICATOR (RSSI) techniques are used to translate signal strength into distance.
  • 8. Position ComputationPosition Computation  The common methods for position computation techniques are:  LATERATION techniques based on the precise measurements to three non collinear anchors. Lateration with more than three anchors called multi-lateration.  ANGULATION or triangulation is based on information about angles instead of distance.
  • 9. Classifications of LocalizationClassifications of Localization MethodsMethods Wireless Sensor Network localization algorithms into several categories such as:  Centralized vs Distributed  Anchor-free vs Anchor-based  Range-free vs Range-based  Mobile vs Stationary
  • 10. Centralized vs DistributedCentralized vs Distributed  Centralized • All computation is done in a central server  Distributed • Computation is distributed among the nodes
  • 11. Anchor-Free vs Anchor-BasedAnchor-Free vs Anchor-Based  Anchor Nodes: • Nodes that know their coordinates a priori • By use of GPS or manual placement • For 2D three and 3D four anchor nodes are needed  Anchor-free • Relative coordinates  Anchor-based • Use anchor nodes to calculate global coordinates
  • 12. Range-Free vs Range-BasedRange-Free vs Range-Based  Range-Free • For achieving coarse grained accuracy • 3 methods of distance estimation • Centroid • DV-hop • Geometry conjecture  Range-Based • For fine grained accuracy • TOA • TDOA • RSSI • AOA
  • 13. Generic Approach Using AnchorGeneric Approach Using Anchor NodesNodes  Determine the distances between regular nodes and anchor nodes. (Communication)  Derive the position of each node from its anchor distances. (Computation)  Iteratively refine node positions using range information and positions of neighboring nodes. (Communication & Computation)
  • 14. Phase 1: CentroidPhase 1: Centroid  Idea: Do not use any ranging at all, simply deploy enough beacons  Anchors periodically broadcast their location  Localization:  Listen for beacons  Average locations of all anchors in range  Result is location estimate  Good anchor placement is crucial! Anchors Ref: Nirupama Bulusu, John Heidemann and Deborah Estrin. Density Adaptive Beacon Placement, Proceedings of the 21st IEEE ICDCS, 2001
  • 15. Phase 1: DV-hopPhase 1: DV-hop • Anchors • flood network with own position • flood network with avg hop distance • Nodes • count number of hops to anchors • multiply with avg hop distance C A B 1 1 1 1 2 2 2 3 3 4 4 3 hops avg hop: 5
  • 16. System EnvironmentSystem Environment • Sensor network consists of sensor nodes and mobile anchor points • Randomly distributed • Can receive messages from sensor nodes and mobile anchor points • Mobile anchor points can traverse for assisting sensor nodes to determine their locations • Each mobile anchor point has a GPS receiver and sufficient energy for moving and broadcasting beacon • Messages during the localization process.
  • 17. Localization SchemeLocalization Scheme • Inspired by the perpendicular bisector of a chord conjecture. • Perpendicular bisector of any chord passes through the center of the circle • Localization problem can be transformed based on the conjecture • Sensor node location: center of the circle • Sensor nodes communicate with mobile anchors through the radius of the circle
  • 18. Beacon Point SelectionBeacon Point Selection • At least three endpoints on the circle should be collected for establishing two chords • Anchor point periodically broadcasts beacon messages when it moves • Beacon message contains the anchor node’s id, location, and timestamp • Node maintains a set of beacon points & a visitor list • Beacon point is considered as an approximate endpoint on the sensor node’s communication circle
  • 20. Beacon SchedulingBeacon Scheduling • Broadcasting in wireless ad hoc networks may cause destructive bandwidth congestion, contention, and collision • Collision at sensor nodes could occur due to beacon messages in the mechanism • Solution: the scheduling for broadcasting beacon messages is jittered. • Randomized scheduling prevents the beacon collision at sensor nodes so each node can efficiently obtain beacon messages from different mobile anchor points.
  • 21. Chord SelectionChord Selection  Localization will be accurate if the selected beacon points are exact on the communication circle  Incorrect beacon points could be chosen due to collision or inappropriate beacon intervals.  Chords generated using the beacon points thus fails to estimate the position of the sensor  When length of the chord is too short, probability of unsuccessful localization will increase rapidly  A threshold λ for the length of a chord is used to solve the problem  The length of a chord must surpass the threshold for reducing the localization error
  • 22. Obstacle ToleranceObstacle Tolerance • Obstacles in the sensor field cause radio irregularity in the sensor network • Radio irregularity could degrade the performance of localization protocols so most localization schemes require a non-obstacle sensing area • Original mechanism may choose inappropriate beacon points if obstacles exist
  • 23. Obstacle Tolerance (cont.)Obstacle Tolerance (cont.) • Enhanced beacon point selection based on the characteristic of concentric circles is developed for tolerating the presence of obstacles • Exploiting chords on one of its concentric circles can also compute the center of the circle • B3, B4, and B5 are on the same concentric circle and can form two suitable chords to determine the center of the circle • Signal strength of a received beacon is in inverse proportion to the distance with the sender
  • 24. Simulation EnvironmentSimulation Environment Six sets of simulations for evaluation: •Beacon scheduling •Threshold for the length of a chord •Radio range •Moving speed •Number of anchor points •Obstacles
  • 25. Three metrics used to evaluate the performance of proposed localization mechanism • Average location error • Average execution time • Beacon overhead Performance MetricsPerformance Metrics
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. ConclusionConclusion In this paper, authors found that ……………..  Range-free localization mechanism without using distance or angle information was also able to achieve fine-grained accuracy.  The sensor nodes can calculate their positions without additional interactions based on the localization information from mobile anchors and the principles of elementary geometry.  All computation is performed locally, and beacon overhead only occurs on mobile anchors so the mechanism is distributed, scalable, effective, and power efficient.  Execution time for localization mechanism can be shortened if the moving speed, the radio range, or the number of mobile anchor points in increased.