SlideShare a Scribd company logo
1 of 5
Download to read offline
ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011



      An RSS Based Localization Algorithm in Cellular
                       Networks
                                                        Samer S. Saab1
               1
                   Lebanese American University/Department of Electrical and Computer Engineering, Lebanon
                                                     ssaab@lau.edu.lb

Abstract— Localization in cellular networks has attracted          deteriorates in presence of obstacles. The literature includes
significant interest in responding to localization accuracy        studies based on TOA [2], TDOA [3], AOA [4], RSS [5] and
driven by the emergency services (U.S. Enhanced 911) and the       [6], Cell-ID [7] and [8]. The proposed localization algorithm
security applications. This study focuses on the Mobile Station
                                                                   presented in this paper is based on the measurements RSS
(MS) localization employing the measurements of the detected
Base Stations (BSs) Received Signal Strength (RSS). A
                                                                   from neighboring base stations. That is, based on RSS
localization algorithm based only on measurements of BS            measurements provided at any time instant, the MS location
RSS and BS basic information is proposed. Experimental             can be estimated. The inputs to the system are BS numbers
results are presented illustrating the performance of the          along with their respective accurate positions and RSS
proposed localization algorithm in a dense multipath               measurement, and typical parameters pertaining to the log-
environment with uneven geographical area.                         distance path loss model. The proposed algorithm first
                                                                   estimates the location of the MS based on averaging the
Index Terms— Localization, positioning, Received Signal            positions of the detected BS. Based on the latter, the estimated
Strength, cellular networks, Global Positioning System (GPS)
                                                                   MS location is employed in order to estimate the azimuth
                                                                   angle between the MS and all detected BS. The log-distance
                        I. INTRODUCTION
                                                                   model is employed in order to extract the BS-MS distance
    The significance of localization, navigation and tracking      from the angle-loss compensated RSS measurements. The
has been exemplified in many systems such as guidance              proposed algorithm constructs different MS location
systems in military applications, disaster rescue, cellular        estimates based on all possible detected BS pair combination
systems, satellite systems, commodity tracking and of course       using the triangulation concept. Finally, the final MS location
cellular networks. Localization in cellular networks refers to     is estimated by taking the average, excluding outliers, of all
the attaining of the current position of a mobile phone or         obtained estimates. This implementation is backed by an
Mobile Station (MS), stationary or moving, which may occur         experimental study. The remaining part of the paper is
either via multilateration of radio signals between Base           organized as follows: in Section II, the proposed localization
Stations (BS) and the MS, or via GPS. Cellular network             algorithm is presented. The experimental results illustrating
operators in the United States have to support the Federal         the performance of the proposed system are presented in
Communication Commission Location Services requirements            Section III. Conclusions and future work are described in
[1]. This requires that for any E911 emergency call the location   Section IV.
accuracy of the calling MS shall be for any operator using a
network centric position method, e.g. Time of Arrival (TOA):                  II. PROPOSED LOCALIZATION ALGORITHM
100 meters for 67% of E911 calls and 300 m for 95% of calls
                                                                        This section first describes the localization problem
and for any network using a mobile centric position method,
                                                                   considered in this manuscript. After that a range model and
e.g. GPS: 50 meters for 67% of E911 calls and 150 m for 95% of
                                                                   its respective error model associated with RSSI measurements
calls. Currently, similar requirements are being developed in
                                                                   are summarized. Finally, a pseudo-code describing the main
Europe. The following presents some localization solutions
                                                                   steps involved in the proposed localization algorithm is
pertaining to cellular networks. Localization can be divided
                                                                   presented.
into two types of techniques: Unmodified Handset
                                                                   Problem statement: Given the serving and non-serving Base
Techniques and Modified Handset Techniques. In the
                                                                   Station (BS) ID, position, and Received Signal Strength (RSS)
Unmodified Handset Techniques solutions can encompass
                                                                   in the neighborhood of the Mobile Station (MS), estimate
the use of RSS, Time of Arrival (TOA), Angle of Arrival (AOA),
                                                                   the position of the MS. The power level of the signal or RSS
Time Difference of Arrival (TDOA), Cell Identification (Cell-
                                                                   at the MS propagated from a nearby BS is largely random
ID), or hybrid techniques using a combination of the said
                                                                   due to variation in the transmission path between the BS and
solutions. The Modified Handset Techniques include the use
                                                                   MS. The path can vary from line-of-sight to one that is
of GPS, mobile assisted TOA, and mobile assisted TDOA.
                                                                   obstructed by foliage, hills, and buildings. The RSS also
TOA and TDOA can provide acceptable accuracy without
                                                                   depends on distance, d, between BS and MS, BS transmitted
necessitating excessive hardware or software changes to the
                                                                   power and antenna gain, MS antenna gain, and the BS-MS
existing cellular infrastructure. TOA performs well when the
                                                                   angle-dependent loss due to the fact that both antennas are
MS is located close to the serving BS. TDOA performs better
                                                                   directional. For the application under consideration it is
when the MS is located at a significant distance from the
                                                                   assumed that the RSS has two “deterministic” independent
serving BS. However, performance of TDOA significantly
                                                                   variables: d, and the azimuth angle, , between the BS and th
© 2011 ACEEE
DOI: 01.IJNS.02.04. 45                                        46
ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011


MS antennas, neglecting elevation angle, . All the other                                             The model of LD() can be modeled based on specific antenna
variables will be lumped together and modeled in a statistical                                        radiation pattern.
fashion using log-normal shadowing.                                                                   In what follows, a mathematical model for extracting d from
In terms of decibels the deterministic model of the RSS at                                            RSS is presented.
MS, Prec(d, ), can be expressed as                                                                   Range Model
Prec(d, ) = Pr(d) + LD()                       (1)                                                  The measured signal level model adopted in this manuscript
where Pr(d) is the received power in the direction of the                                             is entirely based on the average received signal decreasing
strongest emission, LD() is the angle-dependent loss.                                                logarithmically with distance and log-normal shadowing. That
Notation: The “^” above a variable denotes an “estimate” of                                           is, at a specific distance separation between BS and MS, d,
the variable.                                                                                         the measured signal levels (or RSS) in dBm
The proposed localization algorithm is based on the following                                         units, Pr (d )[dBm] , have a Gaussian or normal distribution
steps:
                                                                                                      about the path loss distance-dependent mean. Consequently,
Step 1. Initial MS location estimation: Given all the detected
                                                                                                      the signal level model is given by [10]
BS       locations       (x,  y    and     z-coordi nates),
( xiBS , yiBS , ziBS ),1  i  N BS , neighboring the MS, then the                                    Pr ( d )[dBm]  Pt [dBm]  PL (d ), and
                                                                                                                                        d 
initial estimate of the MS location is determined as follows                                           PL( d )  E[ PL (d o )]  10q log   X 
                                                                                                                                        d 
                                1              N BS                                                                                      o
  ˆ MS ˆ MS ˆ MS
( xo , y o , z o )                                  ( xiBS , yiBS , ziBS )
                               N BS            i 1
                                                                                   (2)                where E[.] is the expectation operator, Pt is the BS transmitted
                                                                                                      power, PL(.) is the average large-scale path loss, do is the
Step 2. Estimation of the azimuth angle: Using the MS
                                                                                                      close-in reference distance, q is the path loss exponent, and
                     ˆ MS ˆ MS ˆ MS
location estimate, ( xinit , yinit , zinit ) , and the BS locations                                   Xσ is a zero-mean Gaussian distributed random variable in dB
                                                                                                      with standard deviation σ also in dB.
( xiBS , yiBS , ziBS ), 1  i  N BS , determine the azimuth angle,                                   Remark 1. The variation in altitude among different
                                                                                                      neighboring BS and MS are assumed to be insignificant.
 , between the MS and each BS. Consequently, LD() is
 ˆ
                                                                                                      Without loss of generality, the 3D localization becomes a 2D
estimated.                                                                                            localization problem. In addition, the z-coordinate of the MS
Step 3. Extraction of the angle-dependent loss from RSS:                                              can be estimated using the method presented in Equation
Based on the estimate of LD() and each received measurement                                          (2).
(1), the angle-compensated RSS is given by:                                                           Notations: Let (upper case) P denote the power in dBm and
P ( d )  P (d ,  )  L ( ).
 ˆ                         ˆ                                                                          let (lower case) p denote the corresponding power in mW
 r               rec              D
                                                                                                      and l D ( )  10LD ( ) /10 .
Step 4. Estimation of the range between MS and BS, d :  ˆ
                                                                                                      Another representation of the signal level model is
Given the angle-compensated RSS, P ( d ), estimate d using
                                  ˆ
                                                                    r                                                               d                 
                                                                                                      Pr (d )  Pr (d o )  10q log                     X  where Pr (d o )  Pt  E[ PL (d o )]
the model under consideration.                                                                                                      d
                                                                                                                                     o
                                                                                                                                                       
                                                                                                                                                       
Step 5. ­Different estimations of MS location: First, estimate
                                                                                                      Taking into consideration the angle-dependent loss Prec(d, )
the MS location by making use of all possible BS pairs. That
                                                                                                      = Pr(d) + LD() can be thought of as the RSS nominal value.
is, consider a 2D positioning problem with available range
                                                                                                      Therefore, the value of the nominal distance, d, can be
estimates from three (N = 3) different BS, d , d , d with an
                                      BS
                                           ˆ ˆ ˆ                              1   2     3           extracted from Prec(d, ) as follows [Saab, 2011]
                                                                                                                   Pr ( d o )  X   LD ( )  Prec ( d , )

                                ˆ MS ˆ MS ˆ MS
initial MS location estimate, ( xinit , yinit , zinit ) .                                             d  d o 10                     10 q                                          1/ q                   1 / q
                                                                                                                                                                 d o  p r ( d o )    p rec ( d ,  )          where
                                                                                                              X
                     N BS  3 N BS ( N BS  1)
                                                                                                                                  1 / q
                                                                                                        1010q and   l D ( ) . One reasonable model for the
Then there could be  2  
                                                3 different
                                     2                                                              measurement of the received power, in the absence of
combinations from which MS location can be estimated using                                            knowledge of X, andLD(), is given by
the concept of triangulation. In particular,                                                                                                 d  d  d 
                                                                                                                                              ˆ
                                                                                                      Prec ( d ,  )  Pr ( d o )  10q log             
 
  ˆ ˆ
     1
            ˆ ˆ
             2
                     ˆ ˆ
                       1
                         
 d , d  x , y  , d , d  x , y , and
                           1
                                ˆ ˆ
                                  1        3              2    2
                                                                                                                                            
                                                                                                                                                 do     
                                                                                                                                                         
                                                                                                      where d corresponds to the distance estimate of d, and d
dˆ , dˆ  xˆ , y . Consequently, the number of different
     2       3
                  ˆ    3   3
                                                                                                              ˆ
                                                                                                      is the corresponding distance error. Consequently,
MS location estimates could increase quadratically as NBS
increases.
Step 6. Estimation of MS location using various
estimations: The MS location estimate is based on                                                     The corresponding error model is presented in [9].
averaging all values (excluding the outliers),
Averagexi , yi . .
        ˆ ˆ
         i


© 2011 ACEEE
DOI: 01.IJNS.02.04. 45                                                                           47
ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011


                   III. EXPERIMENTAL RESULTS                              Relevant Modeling Parameters: Several side experiments
                                                                          were carried out in the region, considering different BS, to
    Experimental Setup: Trimble 5700 GPS system was
                                                                          estimate path loss, q, and the corresponding standard
employed to locate BS, and the MS reading sites. The setup
                                                                          deviation about the mean value, . The minimum mean square
consisted of a base GPS station and a radio transmitter setup
                                                                          error was implemented. Although different values of q and ,
on top of the engineering building, at the Lebanese American
                                                                          were obtained for different BS and different zones, the values
University, on a point with accurately known GPS coordinates
                                                                          used during this experiment were q = 2.7 and corresponding
(seismic data collection point). The second part of the GPS
                                                                           H” 8 associated with the close-in reference distance do =
system, which consisted of a second portable GPS station
                                                                          100 m and Po = “47dBm. Figure 3 illustrated the measured
with a radio receiver synchronized with fixed GPS station in
order to receive accurate differential GPS readings. After each           RSS,      Prec (d ,  ) ,   the   angle-compensated                 RSS,
field trip, the Trimble Geomatics Office software was used to
                                                                          Pr (d )  Prec (d ,  )  LD ( ), and the log-distance model versus
                                                                           ˆ                            ˆ
collect, convert from World Geodetic System 84 to local plane
(x-y coordinates) and also to visualize the GPS plots. For the            distance. By examining Figure 3, it can be noted the level of
MS part the NOKIA 6600 phones (GSM) were used running a                   non-deterministic part of the RSS.
special firmware along with the Agilent E6474A Wireless
Network Optimization Platform kit records the power and ID                The radiation pattern or the angle-dependent loss of the
of each Tx BS cell antenna. The experiment was conducted in               reader-tag, is obtained by a polynomial fit in least-squares
the city of Byblos. There are 13 different MS locations that              sense applied on data obtained experimentally, LD() = –
are under study. Around the different location of the MS, 12              1.11×10-32 dB, where the latter model assumes  to be in
different BS were detected in total. However, since the BS                degrees. Consequently, the beamwidth H” 104o,
use directional sectored antenna, groups of the detected BS
shared 6 different locations as shown in the Figure 1. The
vertical elevation between different BS ranges from 75-265 m,
whereas for MS locations, it ranges from 37-105 m.




                                                                                 Figure 3. RSS [dBm]: Prec(d, ) (black), Pr(d) (blue), and
                                                                                         corresponding log-distance model (red).
           Figure 1. Location of BS and MS under study                    Performance: The estimation of the distance between BS
Initial MS location estimation: Figure 2 shows the initial                and MS as well as the estimates of the 13 different MS location
                             ˆ MS ˆ MS ˆ MS                               coordinate are assessed using average (avg) and standard
estimates of MS locations, ( xinit , yinit , zinit ) , which are
                                                                          deviation (std) of absolute errors.
obtained using Equation (2). It is worth noting that the                  Assessment 1: The estimates of distances between BS and
average (over the 13 different MS locations) of the absolute              MS are first examined. It is first shown that the significance
                                   ˆ MS                                   improvement when the losses, LD(), due direction of the
error in the z-coordinate, Avg z  zinit  59.57m .
                             1 i 13                                     sectored BS are compensated for. The overall errors listed in
                                                                          Table 1 (with LD() being neglected) are significantly larger
                                                                          (about 43%) than the error listed in Table 2 (with LD() being
                                                                          compensated for). Tables 1 and 2 illustrate both the
                                                                          performance of distance estimation and the performance of
                                                                          each BS. Only 8 BS were significantly detected, that is, the
                                                                          RSS is above “80dBm. NMS is the number of MS locations
                                                                          detecting a specific BS. For example, BS with ID 6 is detected
                                                                          from 6 out of the 13 MS locations, which happens to have
                                                                          overall largest distance estimation errors.



  Figure 2. MS: True locations (dashed blue) and Initial Estimates
                            (Red solid)

© 2011 ACEEE
DOI: 01.IJNS.02.04.45                                                48
ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011


      TABLE 1. MS-BS DISTANCE ERRORS WITHOUT ANGLE COMPENSATION




                                                                                   Figure 5. Euclidean norm of MS x-y coordinates,

        TABLE   2. MS -BS DISTANCE ERRORS WITH ANGLE COMPENSATION
                                                                                        versus various MS location IDs


                                                                                TABLE 3. ERROR RESULTING FROM X- Y MS COORDINATES ESTIMATION




                                                                                                     CONCLUSIONS
Assessment 2: Performance of the MS x-y coordinate
estimates. Figure 4 shows the estimates of 13 different MS                    This paper presented a localization algorithm based on
location x-y coordinates versus the nominal values. Figure 5              BS RSS measurements and positions. The algorithm first
shows the resulting distance errors determined using the                  estimated the MS location based on the detected BS
estimates of 13 different MS location x-y coordinates. Table 3            positions, and then compensated angle-dependent loss factor
shows the significant improvement of the overall proposed                 from the BS RSS measurements. The BS-MS distances were
algorithm versus the proposed initial MS estimates using                  extracted from the compensated RSS measurements and MS
Equation (2).                                                             location estimate was found based on triangulation concept
                                                                          by exploiting all possible combinations detected BS pairs.
                                                                          An experiment was conducted and presented illustrating the
                                                                          performance of the proposed approach where most of the
                                                                          distances between any two BSs ranges from 1.5km to more
                                                                          than 9km. The average and standard deviation of the absolute
                                                                          positioning errors obtained is about 192.5m and 88.8m,
                                                                          respectively. We conclude that a localization algorithm based
                                                                          solely on BS RSS measurements can provide acceptable
                                                                          performance in a dense multipath environment with uneven
                                                                          geographical area. Future work: Since the estimation error of
                                                                          the MS-BS range increases proportionally to the increase in
                                                                          distance [9], then instead of taking the average (as indicated
                                                                          in Step 6), a weighted stochastic mean (e.g., a Kalman filter)
                                                                          may be incorporated in order to further improve localization
                                                                          accuracy. As future work, this issue will be investigated.
    Figure 4. Estimates of MS x-y coordinates (solid) and their
corresponding nominal values (dashed) versus various MS location
                              IDs



© 2011 ACEEE
DOI: 01.IJNS.02.04.45                                               49
ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011


                      ACKNOWLEDGMENT                                 [5] L. Mihaylova , D. Angelova , S. Honary , D. Bull, N. Canagarajah
                                                                     and B. Ristic “Mobility tracking in cellular networks using particle
   The author would like to thank Mr. Tony Mezher and Mr.            filtering”, IEEE Trans. Wireless Commun., vol. 6, no. 10, pp.3589
Fadi Bassil from the Lebanese American University for their          -3599, 2007.
help in collecting the experimental data.                            [6] S. S. Saab and S.M. El Kabbout, “ Map Based Mobile Positioning
                                                                     System: A Feasibility Study,” in the proceedings of 2nd IASTED
                          REFERENCES                                 WOC Conference, Banff, Canada, pp. 452-456, July 17-19, 2002.
                                                                     [7] N. Deblauwe, GSM-based positioning: Techniques and
[1] CC Docket 94-102 Revision of the commissions rules to ensure     application, 2008.
compatibility with enhanced 911 emergency calling systems, 1996.     [8] M.Bshara, U. Orguner, F. Gustafasson, and L. V. Biesen,
[2] X. Wang , Z. Wang and B. O. Dea “A TOA-based location            “Robust Tracking in Cellular Networks Using HMM Filters and
algorithm reducing the error due to non-line-of-sight (NLOS)         Cell-ID Measurements”, IEEE Trans. Veh. Technol., vol. 60, no. 3,
propagation”, IEEE Trans. Veh. Technol., vol. 52, no. 1, pp.112 -    pp. 1016-1024, 2011.
116, 2003.                                                           [9] S. S. Saab, Z. Nakad, “A Standalone RFID Indoor Positioning
[3] J. J. Caffery and G. L. Stuber, Wireless Location in CDMA        System Using Passive Tags,” IEEE Trans. on Industrial Electronics,
Cellular Radio Systems, 1999: Kluwer.                                vol. 58, no. 5, May 2011.
[4] S. Sakagami , S. Aoyama , K. Kuboi , S. Shirota and A. Akeyama   [10] S. S. Saab, W. Mhanna, S. Saliba, “Conceptualisation study of
“Vehicle position estimates by multi-beam antennas in multipath      using RFID as a stand-alone vehicle positioning system,” Int.
environment”, IEEE Trans. Veh. Technol., vol. 41, no. 1, pp.63 -     Journal of Radio Frequency Identification Technology and
67, 1992.                                                            Applications, pp. 27-45, 2009, Vol. 2, No. 1/2.




© 2011 ACEEE
DOI: 01.IJNS.02.04.45                                                50

More Related Content

What's hot

Channel Overlapping Between IMT-Advanced Users and Fixed Satellite Service
Channel Overlapping Between IMT-Advanced Users and Fixed Satellite ServiceChannel Overlapping Between IMT-Advanced Users and Fixed Satellite Service
Channel Overlapping Between IMT-Advanced Users and Fixed Satellite ServiceEECJOURNAL
 
A STRUCTURED DEEP NEURAL NETWORK FOR DATA-DRIVEN LOCALIZATION IN HIGH FREQUEN...
A STRUCTURED DEEP NEURAL NETWORK FOR DATA-DRIVEN LOCALIZATION IN HIGH FREQUEN...A STRUCTURED DEEP NEURAL NETWORK FOR DATA-DRIVEN LOCALIZATION IN HIGH FREQUEN...
A STRUCTURED DEEP NEURAL NETWORK FOR DATA-DRIVEN LOCALIZATION IN HIGH FREQUEN...IJCNCJournal
 
HORIZONTAL AND VERTICAL ZONE BASED LOCATION TECHNIQUES FOR WIRELESS SENSOR NE...
HORIZONTAL AND VERTICAL ZONE BASED LOCATION TECHNIQUES FOR WIRELESS SENSOR NE...HORIZONTAL AND VERTICAL ZONE BASED LOCATION TECHNIQUES FOR WIRELESS SENSOR NE...
HORIZONTAL AND VERTICAL ZONE BASED LOCATION TECHNIQUES FOR WIRELESS SENSOR NE...ijwmn
 
Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...IDES Editor
 
Channel characterization and modulation schemes of ultra wideband systems
Channel characterization and modulation schemes of ultra wideband systemsChannel characterization and modulation schemes of ultra wideband systems
Channel characterization and modulation schemes of ultra wideband systemsijmnct
 
Shared bandwidth reservation of backup paths of multiple lsp against link and...
Shared bandwidth reservation of backup paths of multiple lsp against link and...Shared bandwidth reservation of backup paths of multiple lsp against link and...
Shared bandwidth reservation of backup paths of multiple lsp against link and...IAEME Publication
 
Shared bandwidth reservation of backup paths of multiple
Shared bandwidth reservation of backup paths of multipleShared bandwidth reservation of backup paths of multiple
Shared bandwidth reservation of backup paths of multipleiaemedu
 
A Fuzzy Based Priority Approach in Mobile Sensor Network Coverage
A Fuzzy Based Priority Approach in Mobile Sensor Network CoverageA Fuzzy Based Priority Approach in Mobile Sensor Network Coverage
A Fuzzy Based Priority Approach in Mobile Sensor Network CoverageIDES Editor
 
ISPD2016_paper_11
ISPD2016_paper_11ISPD2016_paper_11
ISPD2016_paper_11LI-DE CHEN
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...csijjournal
 
Simulation and performance analysis of blast
Simulation and performance analysis of blastSimulation and performance analysis of blast
Simulation and performance analysis of blasteSAT Publishing House
 
Smartphone indoor positioning based on enhanced BLE beacon multi-lateration
Smartphone indoor positioning based on enhanced BLE beacon multi-laterationSmartphone indoor positioning based on enhanced BLE beacon multi-lateration
Smartphone indoor positioning based on enhanced BLE beacon multi-laterationTELKOMNIKA JOURNAL
 
A self localization scheme for mobile wireless sensor networks
A self localization scheme for mobile wireless sensor networksA self localization scheme for mobile wireless sensor networks
A self localization scheme for mobile wireless sensor networksambitlick
 
Finite horizon adaptive optimal distributed Power Allocation for Enhanced Cog...
Finite horizon adaptive optimal distributed Power Allocation for Enhanced Cog...Finite horizon adaptive optimal distributed Power Allocation for Enhanced Cog...
Finite horizon adaptive optimal distributed Power Allocation for Enhanced Cog...IJCNC
 
Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...Dr. Amarjeet Singh
 
Beam steering in smart antennas by using low complex adaptive algorithms
Beam steering in smart antennas by using low complex adaptive algorithmsBeam steering in smart antennas by using low complex adaptive algorithms
Beam steering in smart antennas by using low complex adaptive algorithmseSAT Journals
 
Beam steering in smart antennas by using low complex
Beam steering in smart antennas by using low complexBeam steering in smart antennas by using low complex
Beam steering in smart antennas by using low complexeSAT Publishing House
 
Performance of the MIMO-MC-CDMA System with MMSE Equalization
Performance of the MIMO-MC-CDMA System with MMSE EqualizationPerformance of the MIMO-MC-CDMA System with MMSE Equalization
Performance of the MIMO-MC-CDMA System with MMSE EqualizationTamilarasan N
 

What's hot (20)

Channel Overlapping Between IMT-Advanced Users and Fixed Satellite Service
Channel Overlapping Between IMT-Advanced Users and Fixed Satellite ServiceChannel Overlapping Between IMT-Advanced Users and Fixed Satellite Service
Channel Overlapping Between IMT-Advanced Users and Fixed Satellite Service
 
A STRUCTURED DEEP NEURAL NETWORK FOR DATA-DRIVEN LOCALIZATION IN HIGH FREQUEN...
A STRUCTURED DEEP NEURAL NETWORK FOR DATA-DRIVEN LOCALIZATION IN HIGH FREQUEN...A STRUCTURED DEEP NEURAL NETWORK FOR DATA-DRIVEN LOCALIZATION IN HIGH FREQUEN...
A STRUCTURED DEEP NEURAL NETWORK FOR DATA-DRIVEN LOCALIZATION IN HIGH FREQUEN...
 
HORIZONTAL AND VERTICAL ZONE BASED LOCATION TECHNIQUES FOR WIRELESS SENSOR NE...
HORIZONTAL AND VERTICAL ZONE BASED LOCATION TECHNIQUES FOR WIRELESS SENSOR NE...HORIZONTAL AND VERTICAL ZONE BASED LOCATION TECHNIQUES FOR WIRELESS SENSOR NE...
HORIZONTAL AND VERTICAL ZONE BASED LOCATION TECHNIQUES FOR WIRELESS SENSOR NE...
 
Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...
 
Channel characterization and modulation schemes of ultra wideband systems
Channel characterization and modulation schemes of ultra wideband systemsChannel characterization and modulation schemes of ultra wideband systems
Channel characterization and modulation schemes of ultra wideband systems
 
Shared bandwidth reservation of backup paths of multiple lsp against link and...
Shared bandwidth reservation of backup paths of multiple lsp against link and...Shared bandwidth reservation of backup paths of multiple lsp against link and...
Shared bandwidth reservation of backup paths of multiple lsp against link and...
 
Shared bandwidth reservation of backup paths of multiple
Shared bandwidth reservation of backup paths of multipleShared bandwidth reservation of backup paths of multiple
Shared bandwidth reservation of backup paths of multiple
 
A Fuzzy Based Priority Approach in Mobile Sensor Network Coverage
A Fuzzy Based Priority Approach in Mobile Sensor Network CoverageA Fuzzy Based Priority Approach in Mobile Sensor Network Coverage
A Fuzzy Based Priority Approach in Mobile Sensor Network Coverage
 
ISPD2016_paper_11
ISPD2016_paper_11ISPD2016_paper_11
ISPD2016_paper_11
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
 
Simulation and performance analysis of blast
Simulation and performance analysis of blastSimulation and performance analysis of blast
Simulation and performance analysis of blast
 
Smartphone indoor positioning based on enhanced BLE beacon multi-lateration
Smartphone indoor positioning based on enhanced BLE beacon multi-laterationSmartphone indoor positioning based on enhanced BLE beacon multi-lateration
Smartphone indoor positioning based on enhanced BLE beacon multi-lateration
 
A self localization scheme for mobile wireless sensor networks
A self localization scheme for mobile wireless sensor networksA self localization scheme for mobile wireless sensor networks
A self localization scheme for mobile wireless sensor networks
 
Article GSM
Article GSMArticle GSM
Article GSM
 
Finite horizon adaptive optimal distributed Power Allocation for Enhanced Cog...
Finite horizon adaptive optimal distributed Power Allocation for Enhanced Cog...Finite horizon adaptive optimal distributed Power Allocation for Enhanced Cog...
Finite horizon adaptive optimal distributed Power Allocation for Enhanced Cog...
 
Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...
 
Beam steering in smart antennas by using low complex adaptive algorithms
Beam steering in smart antennas by using low complex adaptive algorithmsBeam steering in smart antennas by using low complex adaptive algorithms
Beam steering in smart antennas by using low complex adaptive algorithms
 
Beam steering in smart antennas by using low complex
Beam steering in smart antennas by using low complexBeam steering in smart antennas by using low complex
Beam steering in smart antennas by using low complex
 
Sub159
Sub159Sub159
Sub159
 
Performance of the MIMO-MC-CDMA System with MMSE Equalization
Performance of the MIMO-MC-CDMA System with MMSE EqualizationPerformance of the MIMO-MC-CDMA System with MMSE Equalization
Performance of the MIMO-MC-CDMA System with MMSE Equalization
 

Similar to An RSS Based Localization Algorithm in Cellular Networks

Relay technologies for wi max and lte
Relay technologies for wi max and lteRelay technologies for wi max and lte
Relay technologies for wi max and lteDevdatta Ambre
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor NetworksIOSR Journals
 
IOT-WSN: SURVEY ON POSITIONING TECHNIQUES
IOT-WSN: SURVEY ON POSITIONING TECHNIQUESIOT-WSN: SURVEY ON POSITIONING TECHNIQUES
IOT-WSN: SURVEY ON POSITIONING TECHNIQUESijassn
 
Optimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor NetworksOptimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor Networkspaperpublications3
 
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor NetworksA New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor Networksidescitation
 
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor NetworksAccurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networksambitlick
 
Investigations on real time RSSI based outdoor target tracking using kalman f...
Investigations on real time RSSI based outdoor target tracking using kalman f...Investigations on real time RSSI based outdoor target tracking using kalman f...
Investigations on real time RSSI based outdoor target tracking using kalman f...IJECEIAES
 
Localization of Objects using Stochastic Tunneling
Localization of Objects using Stochastic TunnelingLocalization of Objects using Stochastic Tunneling
Localization of Objects using Stochastic TunnelingRana Basheer
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Mobile positioning for location dependent services in GSM networks
Mobile positioning for location dependent services in GSM networks Mobile positioning for location dependent services in GSM networks
Mobile positioning for location dependent services in GSM networks marwaeng
 
PARTICLE FILTER APPROACH TO UTILIZATION OF WIRELESS SIGNAL STRENGTH FOR MOBIL...
PARTICLE FILTER APPROACH TO UTILIZATION OF WIRELESS SIGNAL STRENGTH FOR MOBIL...PARTICLE FILTER APPROACH TO UTILIZATION OF WIRELESS SIGNAL STRENGTH FOR MOBIL...
PARTICLE FILTER APPROACH TO UTILIZATION OF WIRELESS SIGNAL STRENGTH FOR MOBIL...ijwmn
 
PARTICLE FILTER APPROACH TO UTILIZATION OF WIRELESS SIGNAL STRENGTH FOR MOBIL...
PARTICLE FILTER APPROACH TO UTILIZATION OF WIRELESS SIGNAL STRENGTH FOR MOBIL...PARTICLE FILTER APPROACH TO UTILIZATION OF WIRELESS SIGNAL STRENGTH FOR MOBIL...
PARTICLE FILTER APPROACH TO UTILIZATION OF WIRELESS SIGNAL STRENGTH FOR MOBIL...ijwmn
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
UWB LOCALIZATION OF NODES FOR SECURING A MANET
UWB LOCALIZATION OF NODES FOR SECURING A MANETUWB LOCALIZATION OF NODES FOR SECURING A MANET
UWB LOCALIZATION OF NODES FOR SECURING A MANETijistjournal
 

Similar to An RSS Based Localization Algorithm in Cellular Networks (20)

Relay technologies for wi max and lte
Relay technologies for wi max and lteRelay technologies for wi max and lte
Relay technologies for wi max and lte
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks
 
IOT-WSN: SURVEY ON POSITIONING TECHNIQUES
IOT-WSN: SURVEY ON POSITIONING TECHNIQUESIOT-WSN: SURVEY ON POSITIONING TECHNIQUES
IOT-WSN: SURVEY ON POSITIONING TECHNIQUES
 
50120140503002
5012014050300250120140503002
50120140503002
 
Optimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor NetworksOptimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor Networks
 
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor NetworksA New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
 
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor NetworksAccurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
 
O026084087
O026084087O026084087
O026084087
 
Investigations on real time RSSI based outdoor target tracking using kalman f...
Investigations on real time RSSI based outdoor target tracking using kalman f...Investigations on real time RSSI based outdoor target tracking using kalman f...
Investigations on real time RSSI based outdoor target tracking using kalman f...
 
Localization of Objects using Stochastic Tunneling
Localization of Objects using Stochastic TunnelingLocalization of Objects using Stochastic Tunneling
Localization of Objects using Stochastic Tunneling
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Mobile positioning for location dependent services in GSM networks
Mobile positioning for location dependent services in GSM networks Mobile positioning for location dependent services in GSM networks
Mobile positioning for location dependent services in GSM networks
 
PARTICLE FILTER APPROACH TO UTILIZATION OF WIRELESS SIGNAL STRENGTH FOR MOBIL...
PARTICLE FILTER APPROACH TO UTILIZATION OF WIRELESS SIGNAL STRENGTH FOR MOBIL...PARTICLE FILTER APPROACH TO UTILIZATION OF WIRELESS SIGNAL STRENGTH FOR MOBIL...
PARTICLE FILTER APPROACH TO UTILIZATION OF WIRELESS SIGNAL STRENGTH FOR MOBIL...
 
PARTICLE FILTER APPROACH TO UTILIZATION OF WIRELESS SIGNAL STRENGTH FOR MOBIL...
PARTICLE FILTER APPROACH TO UTILIZATION OF WIRELESS SIGNAL STRENGTH FOR MOBIL...PARTICLE FILTER APPROACH TO UTILIZATION OF WIRELESS SIGNAL STRENGTH FOR MOBIL...
PARTICLE FILTER APPROACH TO UTILIZATION OF WIRELESS SIGNAL STRENGTH FOR MOBIL...
 
A2 l
A2 lA2 l
A2 l
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Q026201030106
Q026201030106Q026201030106
Q026201030106
 
Q026201030106
Q026201030106Q026201030106
Q026201030106
 
2015LISAT_pathloss1
2015LISAT_pathloss12015LISAT_pathloss1
2015LISAT_pathloss1
 
UWB LOCALIZATION OF NODES FOR SECURING A MANET
UWB LOCALIZATION OF NODES FOR SECURING A MANETUWB LOCALIZATION OF NODES FOR SECURING A MANET
UWB LOCALIZATION OF NODES FOR SECURING A MANET
 

More from IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

More from IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Recently uploaded

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

An RSS Based Localization Algorithm in Cellular Networks

  • 1. ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011 An RSS Based Localization Algorithm in Cellular Networks Samer S. Saab1 1 Lebanese American University/Department of Electrical and Computer Engineering, Lebanon ssaab@lau.edu.lb Abstract— Localization in cellular networks has attracted deteriorates in presence of obstacles. The literature includes significant interest in responding to localization accuracy studies based on TOA [2], TDOA [3], AOA [4], RSS [5] and driven by the emergency services (U.S. Enhanced 911) and the [6], Cell-ID [7] and [8]. The proposed localization algorithm security applications. This study focuses on the Mobile Station presented in this paper is based on the measurements RSS (MS) localization employing the measurements of the detected Base Stations (BSs) Received Signal Strength (RSS). A from neighboring base stations. That is, based on RSS localization algorithm based only on measurements of BS measurements provided at any time instant, the MS location RSS and BS basic information is proposed. Experimental can be estimated. The inputs to the system are BS numbers results are presented illustrating the performance of the along with their respective accurate positions and RSS proposed localization algorithm in a dense multipath measurement, and typical parameters pertaining to the log- environment with uneven geographical area. distance path loss model. The proposed algorithm first estimates the location of the MS based on averaging the Index Terms— Localization, positioning, Received Signal positions of the detected BS. Based on the latter, the estimated Strength, cellular networks, Global Positioning System (GPS) MS location is employed in order to estimate the azimuth angle between the MS and all detected BS. The log-distance I. INTRODUCTION model is employed in order to extract the BS-MS distance The significance of localization, navigation and tracking from the angle-loss compensated RSS measurements. The has been exemplified in many systems such as guidance proposed algorithm constructs different MS location systems in military applications, disaster rescue, cellular estimates based on all possible detected BS pair combination systems, satellite systems, commodity tracking and of course using the triangulation concept. Finally, the final MS location cellular networks. Localization in cellular networks refers to is estimated by taking the average, excluding outliers, of all the attaining of the current position of a mobile phone or obtained estimates. This implementation is backed by an Mobile Station (MS), stationary or moving, which may occur experimental study. The remaining part of the paper is either via multilateration of radio signals between Base organized as follows: in Section II, the proposed localization Stations (BS) and the MS, or via GPS. Cellular network algorithm is presented. The experimental results illustrating operators in the United States have to support the Federal the performance of the proposed system are presented in Communication Commission Location Services requirements Section III. Conclusions and future work are described in [1]. This requires that for any E911 emergency call the location Section IV. accuracy of the calling MS shall be for any operator using a network centric position method, e.g. Time of Arrival (TOA): II. PROPOSED LOCALIZATION ALGORITHM 100 meters for 67% of E911 calls and 300 m for 95% of calls This section first describes the localization problem and for any network using a mobile centric position method, considered in this manuscript. After that a range model and e.g. GPS: 50 meters for 67% of E911 calls and 150 m for 95% of its respective error model associated with RSSI measurements calls. Currently, similar requirements are being developed in are summarized. Finally, a pseudo-code describing the main Europe. The following presents some localization solutions steps involved in the proposed localization algorithm is pertaining to cellular networks. Localization can be divided presented. into two types of techniques: Unmodified Handset Problem statement: Given the serving and non-serving Base Techniques and Modified Handset Techniques. In the Station (BS) ID, position, and Received Signal Strength (RSS) Unmodified Handset Techniques solutions can encompass in the neighborhood of the Mobile Station (MS), estimate the use of RSS, Time of Arrival (TOA), Angle of Arrival (AOA), the position of the MS. The power level of the signal or RSS Time Difference of Arrival (TDOA), Cell Identification (Cell- at the MS propagated from a nearby BS is largely random ID), or hybrid techniques using a combination of the said due to variation in the transmission path between the BS and solutions. The Modified Handset Techniques include the use MS. The path can vary from line-of-sight to one that is of GPS, mobile assisted TOA, and mobile assisted TDOA. obstructed by foliage, hills, and buildings. The RSS also TOA and TDOA can provide acceptable accuracy without depends on distance, d, between BS and MS, BS transmitted necessitating excessive hardware or software changes to the power and antenna gain, MS antenna gain, and the BS-MS existing cellular infrastructure. TOA performs well when the angle-dependent loss due to the fact that both antennas are MS is located close to the serving BS. TDOA performs better directional. For the application under consideration it is when the MS is located at a significant distance from the assumed that the RSS has two “deterministic” independent serving BS. However, performance of TDOA significantly variables: d, and the azimuth angle, , between the BS and th © 2011 ACEEE DOI: 01.IJNS.02.04. 45 46
  • 2. ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011 MS antennas, neglecting elevation angle, . All the other The model of LD() can be modeled based on specific antenna variables will be lumped together and modeled in a statistical radiation pattern. fashion using log-normal shadowing. In what follows, a mathematical model for extracting d from In terms of decibels the deterministic model of the RSS at RSS is presented. MS, Prec(d, ), can be expressed as Range Model Prec(d, ) = Pr(d) + LD() (1) The measured signal level model adopted in this manuscript where Pr(d) is the received power in the direction of the is entirely based on the average received signal decreasing strongest emission, LD() is the angle-dependent loss. logarithmically with distance and log-normal shadowing. That Notation: The “^” above a variable denotes an “estimate” of is, at a specific distance separation between BS and MS, d, the variable. the measured signal levels (or RSS) in dBm The proposed localization algorithm is based on the following units, Pr (d )[dBm] , have a Gaussian or normal distribution steps: about the path loss distance-dependent mean. Consequently, Step 1. Initial MS location estimation: Given all the detected the signal level model is given by [10] BS locations (x, y and z-coordi nates), ( xiBS , yiBS , ziBS ),1  i  N BS , neighboring the MS, then the Pr ( d )[dBm]  Pt [dBm]  PL (d ), and d  initial estimate of the MS location is determined as follows PL( d )  E[ PL (d o )]  10q log   X  d  1 N BS  o ˆ MS ˆ MS ˆ MS ( xo , y o , z o )   ( xiBS , yiBS , ziBS ) N BS i 1 (2) where E[.] is the expectation operator, Pt is the BS transmitted power, PL(.) is the average large-scale path loss, do is the Step 2. Estimation of the azimuth angle: Using the MS close-in reference distance, q is the path loss exponent, and ˆ MS ˆ MS ˆ MS location estimate, ( xinit , yinit , zinit ) , and the BS locations Xσ is a zero-mean Gaussian distributed random variable in dB with standard deviation σ also in dB. ( xiBS , yiBS , ziBS ), 1  i  N BS , determine the azimuth angle, Remark 1. The variation in altitude among different neighboring BS and MS are assumed to be insignificant.  , between the MS and each BS. Consequently, LD() is ˆ Without loss of generality, the 3D localization becomes a 2D estimated. localization problem. In addition, the z-coordinate of the MS Step 3. Extraction of the angle-dependent loss from RSS: can be estimated using the method presented in Equation Based on the estimate of LD() and each received measurement (2). (1), the angle-compensated RSS is given by: Notations: Let (upper case) P denote the power in dBm and P ( d )  P (d ,  )  L ( ). ˆ ˆ let (lower case) p denote the corresponding power in mW r rec D and l D ( )  10LD ( ) /10 . Step 4. Estimation of the range between MS and BS, d : ˆ Another representation of the signal level model is Given the angle-compensated RSS, P ( d ), estimate d using ˆ r d  Pr (d )  Pr (d o )  10q log    X  where Pr (d o )  Pt  E[ PL (d o )] the model under consideration. d  o   Step 5. ­Different estimations of MS location: First, estimate Taking into consideration the angle-dependent loss Prec(d, ) the MS location by making use of all possible BS pairs. That = Pr(d) + LD() can be thought of as the RSS nominal value. is, consider a 2D positioning problem with available range Therefore, the value of the nominal distance, d, can be estimates from three (N = 3) different BS, d , d , d with an BS ˆ ˆ ˆ  1 2 3  extracted from Prec(d, ) as follows [Saab, 2011] Pr ( d o )  X   LD ( )  Prec ( d , ) ˆ MS ˆ MS ˆ MS initial MS location estimate, ( xinit , yinit , zinit ) . d  d o 10 10 q 1/ q 1 / q  d o  p r ( d o )    p rec ( d ,  )   where X  N BS  3 N BS ( N BS  1) 1 / q   1010q and   l D ( ) . One reasonable model for the Then there could be  2      3 different   2 measurement of the received power, in the absence of combinations from which MS location can be estimated using knowledge of X, andLD(), is given by the concept of triangulation. In particular,  d  d  d  ˆ Prec ( d ,  )  Pr ( d o )  10q log     ˆ ˆ 1 ˆ ˆ 2 ˆ ˆ 1   d , d  x , y  , d , d  x , y , and 1 ˆ ˆ 1 3 2 2   do   where d corresponds to the distance estimate of d, and d dˆ , dˆ  xˆ , y . Consequently, the number of different 2 3 ˆ 3 3 ˆ is the corresponding distance error. Consequently, MS location estimates could increase quadratically as NBS increases. Step 6. Estimation of MS location using various estimations: The MS location estimate is based on The corresponding error model is presented in [9]. averaging all values (excluding the outliers), Averagexi , yi . . ˆ ˆ i © 2011 ACEEE DOI: 01.IJNS.02.04. 45 47
  • 3. ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011 III. EXPERIMENTAL RESULTS Relevant Modeling Parameters: Several side experiments were carried out in the region, considering different BS, to Experimental Setup: Trimble 5700 GPS system was estimate path loss, q, and the corresponding standard employed to locate BS, and the MS reading sites. The setup deviation about the mean value, . The minimum mean square consisted of a base GPS station and a radio transmitter setup error was implemented. Although different values of q and , on top of the engineering building, at the Lebanese American were obtained for different BS and different zones, the values University, on a point with accurately known GPS coordinates used during this experiment were q = 2.7 and corresponding (seismic data collection point). The second part of the GPS  H” 8 associated with the close-in reference distance do = system, which consisted of a second portable GPS station 100 m and Po = “47dBm. Figure 3 illustrated the measured with a radio receiver synchronized with fixed GPS station in order to receive accurate differential GPS readings. After each RSS, Prec (d ,  ) , the angle-compensated RSS, field trip, the Trimble Geomatics Office software was used to Pr (d )  Prec (d ,  )  LD ( ), and the log-distance model versus ˆ ˆ collect, convert from World Geodetic System 84 to local plane (x-y coordinates) and also to visualize the GPS plots. For the distance. By examining Figure 3, it can be noted the level of MS part the NOKIA 6600 phones (GSM) were used running a non-deterministic part of the RSS. special firmware along with the Agilent E6474A Wireless Network Optimization Platform kit records the power and ID The radiation pattern or the angle-dependent loss of the of each Tx BS cell antenna. The experiment was conducted in reader-tag, is obtained by a polynomial fit in least-squares the city of Byblos. There are 13 different MS locations that sense applied on data obtained experimentally, LD() = – are under study. Around the different location of the MS, 12 1.11×10-32 dB, where the latter model assumes  to be in different BS were detected in total. However, since the BS degrees. Consequently, the beamwidth H” 104o, use directional sectored antenna, groups of the detected BS shared 6 different locations as shown in the Figure 1. The vertical elevation between different BS ranges from 75-265 m, whereas for MS locations, it ranges from 37-105 m. Figure 3. RSS [dBm]: Prec(d, ) (black), Pr(d) (blue), and corresponding log-distance model (red). Figure 1. Location of BS and MS under study Performance: The estimation of the distance between BS Initial MS location estimation: Figure 2 shows the initial and MS as well as the estimates of the 13 different MS location ˆ MS ˆ MS ˆ MS coordinate are assessed using average (avg) and standard estimates of MS locations, ( xinit , yinit , zinit ) , which are deviation (std) of absolute errors. obtained using Equation (2). It is worth noting that the Assessment 1: The estimates of distances between BS and average (over the 13 different MS locations) of the absolute MS are first examined. It is first shown that the significance ˆ MS improvement when the losses, LD(), due direction of the error in the z-coordinate, Avg z  zinit  59.57m . 1 i 13 sectored BS are compensated for. The overall errors listed in Table 1 (with LD() being neglected) are significantly larger (about 43%) than the error listed in Table 2 (with LD() being compensated for). Tables 1 and 2 illustrate both the performance of distance estimation and the performance of each BS. Only 8 BS were significantly detected, that is, the RSS is above “80dBm. NMS is the number of MS locations detecting a specific BS. For example, BS with ID 6 is detected from 6 out of the 13 MS locations, which happens to have overall largest distance estimation errors. Figure 2. MS: True locations (dashed blue) and Initial Estimates (Red solid) © 2011 ACEEE DOI: 01.IJNS.02.04.45 48
  • 4. ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011 TABLE 1. MS-BS DISTANCE ERRORS WITHOUT ANGLE COMPENSATION Figure 5. Euclidean norm of MS x-y coordinates, TABLE 2. MS -BS DISTANCE ERRORS WITH ANGLE COMPENSATION versus various MS location IDs TABLE 3. ERROR RESULTING FROM X- Y MS COORDINATES ESTIMATION CONCLUSIONS Assessment 2: Performance of the MS x-y coordinate estimates. Figure 4 shows the estimates of 13 different MS This paper presented a localization algorithm based on location x-y coordinates versus the nominal values. Figure 5 BS RSS measurements and positions. The algorithm first shows the resulting distance errors determined using the estimated the MS location based on the detected BS estimates of 13 different MS location x-y coordinates. Table 3 positions, and then compensated angle-dependent loss factor shows the significant improvement of the overall proposed from the BS RSS measurements. The BS-MS distances were algorithm versus the proposed initial MS estimates using extracted from the compensated RSS measurements and MS Equation (2). location estimate was found based on triangulation concept by exploiting all possible combinations detected BS pairs. An experiment was conducted and presented illustrating the performance of the proposed approach where most of the distances between any two BSs ranges from 1.5km to more than 9km. The average and standard deviation of the absolute positioning errors obtained is about 192.5m and 88.8m, respectively. We conclude that a localization algorithm based solely on BS RSS measurements can provide acceptable performance in a dense multipath environment with uneven geographical area. Future work: Since the estimation error of the MS-BS range increases proportionally to the increase in distance [9], then instead of taking the average (as indicated in Step 6), a weighted stochastic mean (e.g., a Kalman filter) may be incorporated in order to further improve localization accuracy. As future work, this issue will be investigated. Figure 4. Estimates of MS x-y coordinates (solid) and their corresponding nominal values (dashed) versus various MS location IDs © 2011 ACEEE DOI: 01.IJNS.02.04.45 49
  • 5. ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011 ACKNOWLEDGMENT [5] L. Mihaylova , D. Angelova , S. Honary , D. Bull, N. Canagarajah and B. Ristic “Mobility tracking in cellular networks using particle The author would like to thank Mr. Tony Mezher and Mr. filtering”, IEEE Trans. Wireless Commun., vol. 6, no. 10, pp.3589 Fadi Bassil from the Lebanese American University for their -3599, 2007. help in collecting the experimental data. [6] S. S. Saab and S.M. El Kabbout, “ Map Based Mobile Positioning System: A Feasibility Study,” in the proceedings of 2nd IASTED REFERENCES WOC Conference, Banff, Canada, pp. 452-456, July 17-19, 2002. [7] N. Deblauwe, GSM-based positioning: Techniques and [1] CC Docket 94-102 Revision of the commissions rules to ensure application, 2008. compatibility with enhanced 911 emergency calling systems, 1996. [8] M.Bshara, U. Orguner, F. Gustafasson, and L. V. Biesen, [2] X. Wang , Z. Wang and B. O. Dea “A TOA-based location “Robust Tracking in Cellular Networks Using HMM Filters and algorithm reducing the error due to non-line-of-sight (NLOS) Cell-ID Measurements”, IEEE Trans. Veh. Technol., vol. 60, no. 3, propagation”, IEEE Trans. Veh. Technol., vol. 52, no. 1, pp.112 - pp. 1016-1024, 2011. 116, 2003. [9] S. S. Saab, Z. Nakad, “A Standalone RFID Indoor Positioning [3] J. J. Caffery and G. L. Stuber, Wireless Location in CDMA System Using Passive Tags,” IEEE Trans. on Industrial Electronics, Cellular Radio Systems, 1999: Kluwer. vol. 58, no. 5, May 2011. [4] S. Sakagami , S. Aoyama , K. Kuboi , S. Shirota and A. Akeyama [10] S. S. Saab, W. Mhanna, S. Saliba, “Conceptualisation study of “Vehicle position estimates by multi-beam antennas in multipath using RFID as a stand-alone vehicle positioning system,” Int. environment”, IEEE Trans. Veh. Technol., vol. 41, no. 1, pp.63 - Journal of Radio Frequency Identification Technology and 67, 1992. Applications, pp. 27-45, 2009, Vol. 2, No. 1/2. © 2011 ACEEE DOI: 01.IJNS.02.04.45 50