IMPROVED RSSI LOCALIZATION ALGORITHM WITH VIRTUAL REFERENCE TAGS

Similar documents
Research Article Improved UWB Wireless Sensor Network Algorithm for Human Intruder Localization

INTRUDER LOCALIZATION WIRELESS SENSOR NETWORK RADAR DESIGN WITH VIRTUAL REFERENCE TAGS HADI ABDULLAH

DESIGN A DOUBLE PATCH ANTENNA WITH COPLANAR WAVEGUIDE FOR WIRELESS APPLICATION

Wi-Fi Localization and its

Design and Modeling of Linear Back Projection (LBP) Algorithm for Field Programmable Gate Array (FPGA)

WLAN Location Methods

Intra-Vehicle UWB MIMO Channel Capacity

UWB RFID Technology Applications for Positioning Systems in Indoor Warehouses

Implementation of RSSI-Based 3D Indoor Localization using Wireless Sensor Networks Based on ZigBee Standard

Research Article Kalman Filter-Based Hybrid Indoor Position Estimation Technique in Bluetooth Networks

Model Needs for High-accuracy Positioning in Multipath Channels

Final Report for AOARD Grant FA Indoor Localization and Positioning through Signal of Opportunities. Date: 14 th June 2013

UWB Real-Time Location Systems in Factory Automation - Examples from the Automotive Industry

Automated Switching Mechanism for Indoor and Outdoor Propagation with Embedded RFID and GPS in Wireless Sensor Network Platform

Target Classification in Forward Scattering Radar in Noisy Environment

Ray-Tracing Analysis of an Indoor Passive Localization System

Indoor Localization in Wireless Sensor Networks

A High Resolution Ultrawideband Wall Penetrating Radar

EITN85, FREDRIK TUFVESSON, JOHAN KÅREDAL ELECTRICAL AND INFORMATION TECHNOLOGY. Why do we need UWB channel models?

A Hybrid Indoor Tracking System for First Responders

UWB for Lunar Surface Tracking. Richard J. Barton ERC, Inc. NASA JSC

A Novel Method for Exact Determination to Localize Radial Deformation along the Transformer Winding Height

PARAMETRIC STUDIES ON EFFECTS OF DEFECTED GROUND STRUCTURE (DGS) FOR 6 GHz BANDPASS FILTER

UWB Channel Modeling

LOCALIZATION WITH GPS UNAVAILABLE

Channel Modeling ETI 085

UWB and Radio Astronomy. Andrew Clegg National Science Foundation May 13, 2003 CORF Meeting

Locali ation z For For Wireless S ensor Sensor Networks Univ of Alabama F, all Fall

Short-Range Ultra- Wideband Systems

Speed Estimation in Forward Scattering Radar by Using Standard Deviation Method

Research on an Economic Localization Approach

Indoor position tracking using received signal strength-based fingerprint context aware partitioning

Abderrahim Benslimane, Professor of Computer Sciences Coordinator of the Faculty of Engineering Head of the Informatic Research Center (CRI)

Mobile Positioning in a Natural Disaster Environment

A 3D Location Estimation Method using the Levenberg-Marquardt Method for Real-Time Location System

Node Localization using 3D coordinates in Wireless Sensor Networks

Specification. Patent Pending. Description : AccuraUWB Flex Series 3~10GHz Ultra-Wide Band (UWB) Flex Antenna with 100mm 1.

Wireless Access and Localization for Body Area Networks

Position Tracking for Static Target using Burst Signals with Time Difference of Arrival Method

A new position detection method using leaky coaxial cable

Tag Localization in Passive UHF RFID

DURIP Distributed SDR testbed for Collaborative Research. Wednesday, November 19, 14

Indoor Positioning Technology Based on Multipath Effect Analysis Bing Xu1, a, Feng Hong2,b, Xingyuan Chen 3,c, Jin Zhang2,d, Shikai Shen1, e

Comparison of localization algorithms in different densities in Wireless Sensor Networks

High-accuracy Positioning in Multipath Channels: Location-Awareness for 5G Networks and Beyond

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 6: Fading

Performance Analysis of Rake Receivers in IR UWB System

Design and Analysis of 28 GHz Millimeter Wave Antenna Array for 5G Communication Systems

The Technologies behind a Context-Aware Mobility Solution

THE IMPLEMENTATION OF INDOOR CHILD MONITORING SYSTEM USING TRILATERATION APPROACH

A Novel Transform for Ultra-Wideband Multi-Static Imaging Radar

Design and Simulation of Horn Antenna Using CST Software for GPR System

Channel Modeling ETIN10. Wireless Positioning

NIST Activities in Wireless Coexistence

Experimental Evaluation Scheme of UWB Antenna Performance

User Guide for the Calculators Version 0.9

Experimental Investigation of High-Speed Digital Circuit s Return Current on Electromagnetic Emission

STUDY AND ANALYSIS OF CONFORMAL ANTENNAS FOR VEHICULAR COMMUNICATION APPLICATIONS

Research in Ultra Wide Band(UWB) Wireless Communications

Range Error Analysis of TDOA Based UWB-IR Indoor Positioning System

A NOVEL ANALYSIS OF ULTRA-WIDEBAND PLANAR DIPOLE ARRAY ANTENNA

FILA: Fine-grained Indoor Localization

Modified RWGH and Positive Noise Mitigation Schemes for TOA Geolocation in Indoor Multi-hop Wireless Networks

MIMO-Based Vehicle Positioning System for Vehicular Networks

Comparison of Two Detection Combination Algorithms for Phased Array Radars

IoT Wi-Fi- based Indoor Positioning System Using Smartphones

SIGNAL PROCESSING FOR COMMUNICATIONS

Wireless technologies Test systems

UWB based Positioning

RADAR CHAPTER 3 RADAR

Novel Localization of Sensor Nodes in Wireless Sensor Networks using Co-Ordinate Signal Strength Database

Cooperative navigation: outline

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 6: Fading

A Testbed for Real-Time Performance Evaluation of RSS-based Indoor Geolocation Systems in Laboratory Environment

Localization in WSN. Marco Avvenuti. University of Pisa. Pervasive Computing & Networking Lab. (PerLab) Dept. of Information Engineering

A Look at the Recent Wireless Positioning Techniques With a Focus on Algorithms for Moving Receivers

MDFD and DFD Methods to detect Failed Sensor Nodes in Wireless Sensor Network

Fundamental Concepts of Radar

Form DOT F (8-72) This form was electrically by Elite Federal Forms Inc. 16. Abstract:

State and Path Analysis of RSSI in Indoor Environment

SUB-BAND ANALYSIS IN UWB RADIO CHANNEL MODELING

Hybrid Positioning through Extended Kalman Filter with Inertial Data Fusion

HIGH accuracy centimeter level positioning is made possible

International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February ISSN

SIMULTANEOUS OBSTACLE DETECTION FOR MOBILE ROBOTS AND ITS LOCALIZATION FOR AUTOMATIC BATTERY RECHARGING

UWB Small Scale Channel Modeling and System Performance

Open Access AOA and TDOA-Based a Novel Three Dimensional Location Algorithm in Wireless Sensor Network

Chapter 1 Implement Location-Based Services

Extended Gradient Predictor and Filter for Smoothing RSSI

Evaluating The IEEE a UWB Physical Layer for WSN Applications

Ultra Wideband Radio Propagation Measurement, Characterization and Modeling

Locating- and Communication Technologies for Smart Objects

Measuring Galileo s Channel the Pedestrian Satellite Channel

DUAL BAND DIPOLE ANTENNA WITH HARMONIC SUPPRESSION CAPABILITY

Combined Use of Various Passive Radar Range-Doppler Techniques and Angle of Arrival using MUSIC for the Detection of Ground Moving Objects

Ultra Wideband Signals and Systems in Communication Engineering

GPS Ray Tracing to Show the Effect of Ionospheric Horizontal Gradeint to L 1 and L 2 at Ionospheric Pierce Point

Research Article A Novel Subnanosecond Monocycle Pulse Generator for UWB Radar Applications

ULTRA WIDE BAND(UWB) Embedded Systems Programming

Chapter 4 Radio Communication Basics

Transcription:

Prosiding Seminar Kebangsaan Aplikasi Sains dan Matematik 201 3 (SKASM2013) IMPROVED RSSI LOCALIZATION ALGORITHM WITH VIRTUAL REFERENCE TAGS Mohd Shamian ~ainal', Hadi ~bdullah', Ijaz ~han', Hanvaj Mhd ~oad', Siti Zarina ~uji', Moharnad Md om', Azmi ~idek' '~mbedded Computing Systems (EmbCos), Department of Computer Engineering, Faculty of Electrical and Electronics Engineering, Universiti Tun Hussein Onn Malaysia, 86400 Parit Raja, Batu Pahat, Johor sharnian@uthm.edu.my, hadi.uthm@yahoo.com, ijaz.uthm@yahoo.com, hazwaj@uthm.edu.my, szarina@uthm.edu.my, mohamads@uthm.edu.my, azrni@uthm.edu.my This conference proceeding presents an extension of our previous research on localization algorithm with Virtual Reference Tags (VRTs). VRTs are virtual tags that are mapped over a particular surveillance area. Each tag has its own stored information which is used by system as a reference point to track the target. In multistatic radar scenario with one transmitting and three receiving nodes are used to locate and track the intruder. Ultra Wide Band (UWB) pulses are transmitted and their reflections by intruder are received at three receivers. Received Signal Strength Indicator (RSSI) algorithm is used to process the received signal. VRTs not only provide solution to synchronization problems but also provide a platform where clutters due to object other than target can be easily removed by adding information in VRTs. These specific tags can indicate themselves as clutters, which can be identified by the system. Lastly we use Network Simulator 2 (NS2) to simulate and conclude the use of VRTs as clutter removal technique. Keywords: Multistatic radar, Received signal strength Indicator (RSSI), Surveillance area, Clutter, Virtual reference tags (VRTs). 1. INTRODUCTION Technology advances as well as wireless sensor networks (WSNs). Due to its vast applications, these types of networks became popular over the past years. WSNs mainly consist of a number of sensor nodes for surveillance over a specific region. These nodes can have hfferent state depending on design of the algorithm. The main methods or algorithms used by localization systems are Received Signal Strength Indicator (RSSI), Angle of Arrival (AoA), Time (Difference) of Arrival (ToAITDoA). Auto-organization, scalability, robustness and efficient are the key requirements of localization systems. Focusing on these requirements, this paper presents a localization technique which uses RSSI and modifies it with Virtual Reference Tags (VRTs). Reference tagging concept is introduced which is commonly used in WID systems(ni, Dian, & Souryal, 201 1). Reference tags are used in some narrow band tracking systems providing reference to track intruder or object. These systems use a number of sensor nodes. Reference tags are symmetrically placed over the surveillance area and a tag is given to the intruder while entering in surveillance area(ni, et 191

al., 2011). There are number of limitations to these kinds of systems. For example for an unknown intruder with no tags cannot be localized, positioning of actual reference tags symmetrically over surveillance area makes the system complicated, greater number of sensor nodes are used making these system suitable only in case of limited surveillance area. Clutters have always been a hurdle in radar designs which limit their use to specific regions. Many complex methods are present for clutter removal in different cases(zhao Li, 2012),(Nigam, 2010). Due to their complexity and inefficiency these techniques have less accuracy when applied in UWB radar sensor network. In this paper we have given an improved radar algorithm design which virtualizes reference tags and their information is kept in receiving nodes. Secondly number of sensor nodes are reduced to four (having one transmitting node and three receiving nodes), and RSSI tracking techniques is used in which there is no need of intruder to carry a tag. Whenever intruder arrives in surveillance area it is monitored with RSSI localization technique and VRTs provide reference point closest to actual intruder location. This algorithm design has no synchronization problem (like in ToA) and has greater accuracy than RSSI. Further objects in surveillance area other than target can also be identified by using indicating closest VRT to object with a flag. 2. RESEARCH METHODOLOGY 2.1 Reveived Signal Strength Indicator (RSSI) In this technique the strength of the signal which is reflected fiom the target is measured at all corresponding receivers. If we consider an ideal case each measurement of the signal strength at receivers will give the &stance of receiver fiom the target. But in RSSI the accuracy decreases in case of multi path fading environment and shape of circle gets distorted. So it becomes difficult to get an exact intersection of distorted circles. This can produce a considerable amount of error in the target positioning (Gigl, Janssen, Dizdarevic, Witrisal, & Irahhauten, 2007),(Hatami, Pahlavan, Heidari, & Akgul, 2006). Figure 1 shows RSSI localization sensario with three receivers. w Fig. 1. RSSI localization technique.

2.2 Radar Clutters Prosiding Seminar Kebangsaan Aplikasi Sains dan Matematik 2013 (SKASM2013) The term clutter is used for unwanted echoes in radar systems. For different types of radar clutter type can be different. In our case these echoes occur due to reflection fi-om any object (car, building, animal, pole etc) other then the target present in surveillance area. Figure 2 shows how clutter occurs due to objects. 2.3 Virtual Reference Tags (VRTs) Fig. 2. Clutter effect in radar systems To overcome drawbacks in RSSI techniques our design uses RSSI along with VRTs(Mohd Shamian Zianal, 2012). These VRTs contain information about the characteristics of target reflected received signal in respective three receivers. Each VRT has its own information. In our design we are using multistatic radar system with one transmitter and three receivers. Each VRT has measured distance form its location to three receivers and received signal strength of three receivers considering location of VRT as target location. 3. CLUTTER REMOVAL WITH VRTS To overcome clutter problem VRTs can be used. Since VRTs are virtually mapped over the surveillance area so while mapping, VRTs that overlap object or VRTs closest to objects are given additional flags in their information. Figure 3 shows the situation of objects with their closest VRTs.

Objects and their nearest VETS RX 1 Fig. 3. Objects in the surveillance area mapped with VRTs. The VRTs with flags in their information can now indicate the presence of an object clutter. Once objects are identified their echo can be matched and ignored by the receivers. VRTs mapping for different surveillance area can be done while installing the radar system or VRTs can be reprogrammed when some part of surveillance area is changed. 4. SYSTEM DESIGN Once TX-RXs are placed at their location, virtual reference tags are planned at different positions within the surveillance area. The number of VRTs can vary in different configurations depending on radar design and characteristics of surveillance area. The system parameters for the radar design are shown in table 1. Table1. System Parameters Parameter Surveillance area Lower frequency Upper frequency Signal bandwidth Transmitted antenna gain Receiver antenna gain Radar cross-section Pulse repetition frequency Symbol A f L fu B Gt G, o PRF Value 90x90 m 5 GHz 5.5 GHz 500 MHz 0 db 0 db I inl 1.5 MHz

Prosiding Seminar Kebangsaan Aplikasi Sains dan Matematik 2013 (SKASM2013) After setting the parameters of system, we design radar in Network Simulator 2(NS2). Figure 4 shows the simulation start of the radar design. Fig. 4. Radar simulation in NS2. 5. EXPERIMENTAL RESULTS The surveillance area is set as 90x90 meters. TX-RXs area placed at the edges of surveillance area represented by node 1, 2, 3 and 4. Node 0 represents target which will move in the surveillance area. Nodes 5, 6, 7 and 8 represent objects in the surveillance area which produce clutters. The number of VRTs will vary keeping the path of target and location objects same. The actual path and detected path of target using 29, 105 and 1681 VRTs are shown in table2. Table 2. Actual and calculated target path with 29, 105 and 1681 VRTs Time Actual Path Calculated path with 29 VRTs Calculated path with 105 VRTs Calculated path with 1681 VRTs 0.1s X: 6 7.51 7; Y: X: 70.000; Y: 55.000 X: 66.000; Y: 58.000 X: 68.000; Y: 62.000 0.2s 61.988 X: 56.000; Y: X: 55.000; Y: 55.000 X: 58.000; Y: 58.000 X: 56.000; Y: 58.000 0.3s 58.000 X: 27.000; Y: X: 25.000; Y: 55.000 X: 26.000; Y: 50.000 X: 26.000; Y: 48.000 0.4s 49.000 X: 83.000; Y: X: 85.000; Y: 85.000 X: 82.000; Y: 90.000 X: 82.000; Y: 88.000 0.5s 89.000

0.6s 0.7s 0.8s 0.9s 1.0s 1.1s 1.2s X. 12.000; Y: 1.3s I 13.000 1.4s 1.5s 1.6s ( 1.7s 1.8s 1.9s X: 23.130; Y: 54.036 X: 89.000; Y: 82.000 X: 60.000; Y: 50.000 X: 22.000; E43.000 X: 14.000; Y: 87.000 X: 14.000; Y: 87.000 X: 25.000; Y: 43.000 X: 83.000; Y: 12.000 X: 25.000; Y: 55.000 X: 85.000; Y: 85.000 X. 55.000; Y: 55.000 X: 25.000; Y:40.000 X: 10.000; Y: 85.000 X: 10.000; K. 85.000 X: 10.000; Y: 10.000 X 25.000; Y: 40,000 X: 85.000; Y: 10,000 X: 26.000; Y: 58.000 X: 90.000; Y: 82.000 X: 58.000; U: 50.000 X: 18.000; Y:42.000 X: 10.000; Y: 90.000 X: 10.000; Y: 90.000 X: 10.000; Y: 10.000 X: 26.000; Y: 42.000 X: 82.000; Y: 10.000 X: 24.000; Y: 54.000 X: 88.000; Y: 82.000 X: 60.000; Y: 50.000 X: 22,000; Y:42.000 X: 14.000; Y: 86.000 X: 14.000; Y: 86.000 X: 12.000; K. 12.000 2.0s ~t time: I I 2.1s 2.2s 2.3s 2.4s 2.5s 2.6s 2.7s 2.8s X: 24.000; Y: 42.000 X: 82.000; Y: 12.000 I X: 37.355; Y: 37.355 X: 40.000; Y: 40.000 X: 34.000; Y: 34.000 X: 38.000; Y: 38.000 Figure 5 shows the graphical comparison of the actual and three detected path in different VRTs. Also in three different cases objects detection is shown in table 3.

Prosiding Seminar Kebangsaan Aplikasi Sains dan Matematik 2013 (SKASM2013) Table 3. Actual and detected locations of objects. objec t numb er Actual location of objects Calculated Location of objects with 29 VR Ts Calculated Location of objects with 105 VR Ts Calculated Location of objects with 1681 VR Ts I X: 19.000; F37.000 X: 20.000; F40.000 X: 18.000; F34.000 X: 20.000; F36.000 m 100 (a) m.- X P 100 80 (b) I 0 0 0 20 40 60 80 100 0 20 40 60 a0 100 2-0 Surveillance area 100m x-axis 2-D Surveillance area l00m x-axis (c) 100 100.- Y1.- m X X 'P S 'P n 80. '> 80. 1, E E 0 0 D D m 60. m 60.?! E' 0 E 40. (4 0 0 0 20 40 60 80 100 0 20 40 60 80 100 2-D Surveillance area l00m x-axis 2-D Surveillance area l00m x-axis

Fig. 5. Target movement in 2-D surveillance area of 90x90 meters, (a) Actual path of target, (b) Calculated target path with 29 VRTs, (c) Calculated target path with 105 VRTs, (d) Calculated target path with 1681 VRTs. From table 2 and 3 we came to know that increasing number of VRTs also increases accuracy of the system and for a surveillance area of 100x100 meters if we make 2500 VRTs we can monitor target path with 0.2 meter accuracy. By increasing VRTs from 2500 we can get even more accurate results and also their vast application made them improve radars application in vehicles (Hadi Abdullah, APRIL 2013). Clutters in previous researches are also identified by keeping track of still reflected signals(gaikwad, Singh, & Nigam, 2011; Zhao, Xijing, Wenzhe, & Jianqi, 2012). In our research still reflected signals are processed and are matched with the nearest VRT having radar crossection closest to the received signal. This not only help in identifying clutter signals but also provides location of clutter objects. 6. CONCLUSION In our study we have seen a hybrid design that uses virtual reference tags and how these tags affect the performance of our design. VRT has provided us with a new ground on which we can check measure and improve our radar system performance. These radar systems can be very efficient in places where high level security is required and only cameras don't provide enough security. Specially in case when there is fog or misty night one can't only rely on cameras. Also covering an area of 100x100 meters with cameras for security is a difficult issue. Our design can be easily implemented on FPGAs, giving and extra advantage of being low cost. m s makes our design best for use in places like airports, hospitals, nuclear reactors, jails etc.clutters in our case are defined to be objects of any nature which can reflect the signal with some specific strength to receivers. These reflected signals can be identified by using VRTs. When VRTs are mapped on surveillance they have information whch provides reference to three receivers about target and receivers consider target location to be the nearest VRT. Similarly these VRTs while mapping also contain a flag which can identify presence of object other than target. The nearest VRT to the object contains a flag that identifies receivers the location of object. The application of VRTs in clutter removal does not limit their use in radars. With little modification they can be implemented in many other radar fields like road safety in vehicles, under water radar systems of submarines, radars in battle tanks to identify location of enemy tank etc. Acknowledgments Authors would like to thank the Computer engineering department of University tun Hussein Onn Malaysia for providing such research opporhmities.

References Prosiding Seminar Kebangsaan Aplikasi Sains dan Matematik 2013 (SKASM2013) Gaikwad, A. N., Singh, D., & Nigam, M. J. (201 1). Application of clutter reduction techniques for detection of metallic and low dielectric target behind the brick wall by stepped frequency continuous wave radar in ultra-wideband range. Radar, Sonar & Navigation, IET, 5(4), 416-425. Gigl, T., Janssen, G. J. M., Dizdarevic, V., Witrisal, K., & Irahhauten, Z. (2007, 22-22 March 2007). Analysis of a LVB Indoor Positioning System Based on Received Signal Strength. Paper presented at the Positioning, Navigation and Communication, 2007. WPNC '07. 4th Workshop on. Hadi Abdullah, I. K. a. M. B. Z. (APRIL 2013). Low cost Ultra Wide Band hybrid radar design using virtual reference tags as road safety feature in vehicles. J OWAL OF INFORMATION AND COMMUNICATION TECHNOLOGLES, 3(Issue 4). Hatami, A., Pahlavan, K., Heidari, M., & Akgul, F. (2006, 3-6 April 2006). On RSS and TOA based indoor geolocation - a comparative performance evaluation. Paper presented at the Wireless Communications and Networking Conference, 2006. WCNC 2006. IEEE. Mohd Shamian Zianal, H. A. a. I. K. (2012). Ultra Wide Band localization and tracking hybrid technique using VRTs. International Journal of Integrated Engineering, 4(3). Ni, L. M., Dian, Z., & Souryal, M. R. (2011). RFID-based localization and tracking technologies. Wireless Communications, IEEE, 18(2), 45-51. Nigarn, A. N. G. D. S. M. J. (2010). Application of clutter reduction techniques for detection of metallic and low dielectric target behind the brick wall by stepped frequency continuous wave radar in ultra-wideband range. IET Radar, Sonar and Navigation. Zhao, L., Xijing, J., Wenzhe, L., & Jianqi, W. (2012, 4-8 June 2012). A wavelet-based strong clutter removal technique for UKB life detection. Paper presented at the Ground Penetrating Radar (GPR), 2012 14th International Conference on. Zhao Li, X. J., Wenzhe Li and Jianqi Wang. (2012). A Wavelet-based Strong Clutter Removal Technique for UWB Life Detection. 14th International Conference on Ground Penetrating Radar (GPR).