Fingerprinting Localization in Wireless Networks Based on ...292218/FULLTEXT01.pdf · Global System...

13
Linköping University Post Print Fingerprinting Localization in Wireless Networks Based on Received-Signal-Strength Measurements: A Case Study on WiMAX Networks Mussa Bshara, Umut Orguner, Fredrik Gustafsson and Leo Van Biesen N.B.: When citing this work, cite the original article. ©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Mussa Bshara, Umut Orguner, Fredrik Gustafsson and Leo Van Biesen, Fingerprinting Localization in Wireless Networks Based on Received-Signal-Strength Measurements: A Case Study on WiMAX Networks, 2010, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, (59), 1, 283-294. http://dx.doi.org/10.1109/TVT.2009.2030504 Postprint available at: Linköping University Electronic Press http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-53824

Transcript of Fingerprinting Localization in Wireless Networks Based on ...292218/FULLTEXT01.pdf · Global System...

Page 1: Fingerprinting Localization in Wireless Networks Based on ...292218/FULLTEXT01.pdf · Global System for Mobile Communications (GSM), location-based service (LBS), navigation, ...

Linköping University Post Print

Fingerprinting Localization in Wireless

Networks Based on

Received-Signal-Strength Measurements:

A Case Study on WiMAX Networks

Mussa Bshara, Umut Orguner, Fredrik Gustafsson and Leo Van Biesen

N.B.: When citing this work, cite the original article.

©2009 IEEE. Personal use of this material is permitted. However, permission to

reprint/republish this material for advertising or promotional purposes or for creating new

collective works for resale or redistribution to servers or lists, or to reuse any copyrighted

component of this work in other works must be obtained from the IEEE.

Mussa Bshara, Umut Orguner, Fredrik Gustafsson and Leo Van Biesen, Fingerprinting

Localization in Wireless Networks Based on Received-Signal-Strength Measurements: A

Case Study on WiMAX Networks, 2010, IEEE TRANSACTIONS ON VEHICULAR

TECHNOLOGY, (59), 1, 283-294.

http://dx.doi.org/10.1109/TVT.2009.2030504

Postprint available at: Linköping University Electronic Press

http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-53824

Page 2: Fingerprinting Localization in Wireless Networks Based on ...292218/FULLTEXT01.pdf · Global System for Mobile Communications (GSM), location-based service (LBS), navigation, ...

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 1, JANUARY 2010 283

Fingerprinting Localization in Wireless NetworksBased on Received-Signal-Strength Measurements:

A Case Study on WiMAX NetworksMussa Bshara, Student Member, IEEE, Umut Orguner, Member, IEEE,

Fredrik Gustafsson, Senior Member, IEEE, and Leo Van Biesen, Senior Member, IEEE

Abstract—This paper considers the problem of fingerprintinglocalization in wireless networks based on received-signal-strength(RSS) observations. First, the performance of static localizationusing power maps (PMs) is improved with a new approach calledthe base-station-strict (BS-strict) methodology, which emphasizesthe effect of BS identities in the classical fingerprinting. Second,dynamic motion models with and without road network infor-mation are used to further improve the accuracy via particlefilters. The likelihood-calculation mechanism proposed for theparticle filters is interpreted as a soft version (called BS-soft) ofthe BS-strict approach applied in the static case. The results ofthe proposed approaches are illustrated and compared with anexample whose data were collected from a WiMAX network in achallenging urban area in the capitol city of Brussels, Belgium.

Index Terms—Fingerprinting, Global Positioning System (GPS),Global System for Mobile Communications (GSM), location-basedservice (LBS), navigation, path loss model, positioning, positioningaccuracy, power maps (PMs), received signal strength (RSS), roadnetwork information, SCORE, time of arrival (TOA), WiMAX.

I. INTRODUCTION

THERE ARE several ways to position a wireless networkuser. GPS is the most popular way; its accuracy meets

all the known location-dependent applications’ requirements.The main problems with GPS, in addition to the fact that theuser’s terminal must be GPS enabled, are the high batteryconsumption, limited coverage, and latency. Furthermore, GPSperforms poorly in urban areas near high buildings and insidetunnels. Another way to position a user is to rely on the wirelessnetwork itself, by using the available information like the cellID, which has widely been used in Global System for MobileCommunications (GSM) systems, despite its limited accuracy[1]. Using other network resources (information) like the re-ceived signal strength (RSS), time of arrival (TOA), or timedifference of arrival (TDOA) gives better accuracy but requiresmaking measurements by the wireless terminal (terminal-sidemeasurements), by the network (network-side measurements),

Manuscript received January 27, 2009; revised July 3, 2009. First publishedAugust 18, 2009; current version published January 20, 2010. The work ofU. Orguner and F. Gustafsson was supported in part by the SSF StrategicResearch Center MOVIII and in part by the Vinnova/FMV TAIS projectARCUS. The review of this paper was coordinated by Dr. Y. Gao.

M. Bshara and L. Van Biesen are with the Department of FundamentalElectricity and Instrumentation, Vrije Universiteit Brussel, 1050 Brussels,Belgium (e-mail: [email protected]; [email protected]).

U. Orguner and F. Gustafsson are with the Department of ElectricalEngineering, Linköping University, 581 83 Linköping, Sweden (e-mail:[email protected]; [email protected]).

Digital Object Identifier 10.1109/TVT.2009.2030504

or by both [2], [3]. From this point on, we are going to referto these measurements as network measurements, regardlessof where these measurements have been conducted. Someof these measurements are hard to obtain, like TOA, whichneeds synchronization, and some are easy to obtain, like RSSmeasurements. Many localization approaches depending onnetwork measurements have been proposed in GSM networksand sensor networks. Most of the works focused on range mea-surements depending on TOA, TDOA, and RSS observations;see surveys [2], [4], and [5] and the references therein. Theseapproaches can improve the localization accuracy achieved byusing the cell ID. The basic idea in RSS-based localization isto compare all measured RSS values to a model of RSS foreach position and then determine the position that gives thebest match. The two most common models are the generalexponential path loss model and a dedicated power map (PM)constructed offline for the region of interest. The first alternativeis the most common strategy and is the simplest to deploy. Theexponential path loss model is known as the Okumura–Hata(OH) model [6], [7], and in a log power scale, it says that theRSS value linearly decreases with the distance to the antenna.This is quite a crude approximation, where the noise level ishigh and further depends on multipath and non-line-of-sight(NLOS) conditions. In [8], the authors used this alternative totrack a target and proposed using different path loss exponentsfor the links between the terminal and the base stations (BSs).The proposed method achieved higher localization accuracythan the conventional localization methods that use the samepath loss exponent for all the links. Furthermore, the authorsof [9] proposed using an RSS statistical lognormal model anda sequential Monte Carlo localization technique to get betterlocalization accuracy. The lognormal model was also used in[10] to estimate the mobile location, and the authors tried tomitigate the influence of the propagation environment by usingthe differences in signal attenuations.

The second alternative is to determine the RSS values ineach point and save these in a database (i.e., a map). This canbe done using offline measurement campaigns adaptively bycontribution from users or by using cell planning tools. Theadvantage of this effort is a large gain in the SNR and lesssensitivity to multipath and NLOS conditions. The set of RSSvalues that are collected for each position in the map fromvarious BSs is called the fingerprint for that location. The ideaof matching observations of RSS to the map of the previouslymeasured RSS values is known as fingerprinting, which proved

0018-9545/$26.00 © 2009 IEEE

Authorized licensed use limited to: Linkoping Universitetsbibliotek. Downloaded on February 5, 2010 at 06:42 from IEEE Xplore. Restrictions apply.

Page 3: Fingerprinting Localization in Wireless Networks Based on ...292218/FULLTEXT01.pdf · Global System for Mobile Communications (GSM), location-based service (LBS), navigation, ...

284 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 1, JANUARY 2010

to provide better performance than the first alternative [1]. In[11] and [12], the authors used RSS information in finger-printing positioning to improve the accuracy obtained by thelognormal model. The authors of [13] used fingerprinting toovercome the inconveniences related to the use of the TOA, theangle of arrival, and the RSS lognormal model for positioning.

In this paper, we propose to use fingerprinting localiza-tion depending on RSS-based observations for positioningand tracking in wireless networks. We first consider classicalfingerprinting, and based on the BS identities, we proposea method to improve fingerprinting performance. The newmethod emphasizes the effects of the BS identities in classicalfingerprinting, and it is called the BS-strict method. Then, theuse of dynamic motion models is suggested for further improve-ment. In this regard, we use particle filters (PFs) [14]–[16] withboth unconstrained and road-constrained motion models. Thesimultaneous use of the motion models and the road networkinformation has shown to yield quite good estimation perfor-mance. The special likelihood calculation mechanism that thispaper suggests for the dynamic case, which is called the BS-soft method, is also interpreted as a soft version of the BS-strict methodology proposed for the static case. We presentour results along with remarks on WiMAX networks, whichwere the main motivation and the illustrative case study for thisresearch. However, our results equally apply to other types ofnetworks. The importance of the contributions of this paper canbe summarized as follows.

1) The proposed approaches yield direct methodologies forRSS-based localization balancing the effects of measuredRSS values and the BS identities. Increasing the effectof BS identities in location estimation is particularlysignificant when the SNR in the RSS values is low andthe effects of multipath and fading are dominant.

2) Dynamic localization using PFs gives a seamless inte-gration of fingerprinting-type approaches with dynamicalmotion models and road network information.

We also argue that the approaches considered in this paper meetthe requirements of most location-dependent applications.

This paper is organized as follows. The measurement model-ing methodologies for the RSS measurements are summarizedin Section II. The main building blocks of the proposed meth-ods, which are different likelihood calculation mechanisms, aregiven as separate algorithms in Sections III and V for the staticand dynamic estimation cases, respectively. These algorithmsare used in their corresponding positioning and tracking meth-ods, and their performances are illustrated in Sections IV andVI, respectively. Conclusions are drawn in Section VII.

II. MODELING RSS MEASUREMENTS

FOR FINGERPRINTING

In general, the received signal rt at the time instant t can beexpressed as

rt = atst−τ + vt. (1)

Here, s denotes the transmitted (pilot) signal waveforms, at isthe radio path attenuation, τ is the distance-dependent delay,

and vt is a noise component. A WiMAX modem does notreadily provide information for time-delay-based localization,and therefore, we focus on the path loss constant at. This valueis averaged over one or more pilot symbols to give a sampledRSS observation

zk =h (xpk) + ek (2a)

yk ={

zk, if zk ≥ ymin

NaN, if zk < ymin(2b)

where k is the sample index (corresponding to time instant t =t0 + kT , where t0 and T are the time of the first sample (k = 0)and the sampling period, respectively), xp

k is the position ofthe target, and NaN stands for not a number, representing a“nondetection” event. This expression includes one determinis-tic position-dependent term h(xp

k) including range dependence,and ek is the noise that includes fast and slow fading. We alsoexplicitly model the detector in the receiver with the thresholdymin, since signals that are too weak are not detected.

The classical model of RSS measurements is based on theso-called OH model [6], [7], which is given as

OH model: zk = PBS − 10α log10

(‖pBS − xp

k‖2

)+ ek

(3)

where PBS is the transmitted signal power (in decibels), α is thepath loss exponent, ek is the measurement noise, and pBS is theposition of the antenna; the standard ‖ · ‖2 norm is used. Thismodel has been used in many proposed localization algorithms[2], [17]. Although it is a global and simple model, there areseveral problems associated with using it.

1) The transmitted power needs to be known, which requiresa protocol and software that allows a higher layer ofapplications to access this information.

2) The position of the antenna needs to be known. Thisrequires first building a database. Second, it requires thatthe user application be able to access the identificationnumber of each antenna connected to the model. Third,the operators in some countries consider the position oftheir antennas to be classified.

3) The path loss constant needs to be known, while, inpractice, it depends on the local environment.

An alternative model is based on a local PM (LPM), which isobtained by observing the measurement yk over a longer timeand over a local area. Each LPM item is then computed as alocal average

LPM model: z(x) = E(y) = E (h(x) + e) (4a)

h(x) ={

z(x), if z(x) ≥ ymin

NaN, if z(x) < ymin(4b)

where the operator E denotes the corresponding averaging.LPM provides a prediction of the observation (2) in the sameway as the OH model in (3) does. However, the LPM shouldbe considered to be more accurate since it implicitly takes careof the line-of-sight/NLOS problems that are difficult to handle[18]. The LPM model also partially includes the effects of slowand fast fading. The total effect can be approximated as a gain inSNR with a factor of ten, compared with the OH model; see [2].

Authorized licensed use limited to: Linkoping Universitetsbibliotek. Downloaded on February 5, 2010 at 06:42 from IEEE Xplore. Restrictions apply.

Page 4: Fingerprinting Localization in Wireless Networks Based on ...292218/FULLTEXT01.pdf · Global System for Mobile Communications (GSM), location-based service (LBS), navigation, ...

BSHARA et al.: FINGERPRINTING LOCALIZATION IN WIRELESS NETWORKS BASED ON RSS MEASUREMENTS 285

The collection of averaged measurements h(x) for the sameposition in a single vector gives us the fingerprint h(x) for thatposition, i.e.,

h(x) Δ= [ h1(x) h2(x) · · · hNBS(x) ]T (5)

where NBS is the number of BSs, and hj(x) is the averagedmeasurement from the jth BS at the position x. The advantageof collecting fingerprints in a database is that prior knowledgeof the antenna position, transmitted power, or path loss constantis not needed, enabling mobile-centric solutions. The price forthis is the cumbersome task of constructing the LPM. Here,three main alternatives are plausible.

1) Collect the fingerprints during an offline phase. Themeasurements to be stored have to be collected from allpossible places where the target can be and under variousweather conditions at different times in the area understudy. This method gives the most accurate database, butit is time consuming and expensive.

2) Use the principle of wardriving [19], where the userscontribute online to the LPM. The idea is that users withpositioning capabilities (for instance, GPS) report theirposition and observations (2) to a database [20], [21],which is used to position other users.

3) Predict the fingerprints using Geographical InformationSystem planning tools [2]. Using the radio propagationformulas to predict the RSS values is not as accurate asmeasuring them because it is not possible to model all thepropagation effects. As a result, the predicted data are notas accurate as the measured ones, but they are quite easyto obtain.

In this paper, the first method was adopted, and the WiMAXRSS values have been collected from all the possible roads inthe area under study (we assume that the target or the user isusing the public road network) during an offline phase. TheLPM has been formed from this database as follows.

1) NLPM different grid points denoted as {pi Δ=[xi, yi]T }NLPM

i=1 , where xi and yi denote the x- andy-coordinates of the ith point, respectively, have beenselected on the road network. A maximum distance of10 m has been left between these LPM points.

2) For each piece of data that has been collected, the closestLPM grid point has been found.

3) For each LPM grid point i, the vector hi (called the “RSSvector” or fingerprint) is formed such that

hi = [ hi1 hi

2 · · · hiNBS

]T (6)

where hij is the mean of the RSS data from the jth BS

assigned to the ith LPM grid point. If there are no RSSdata from the jth BS assigned to the ith LPM grid point,we set hi

j = NaN, representing a nondetection. Note

that each fingerprint (or RSS) vector hi = h(pi) is a rep-resentative of the expected RSS values at the position pi.

The measured RSS values at the time of localization are thencollected in another RSS vector y, which is defined as

y = [ y1 y2 · · · yNBS ]T (7)

where the values yj are equal to the measured RSS valuesfrom the jth BS or are equal to NaN when there is no valuemeasured (no detection). The localization can then be done bydefining distance measures between the measurement vector yand the map RSS vectors hi. In this paper, we will denote suchmeasures in the form of likelihoods p(y|hi) of the measurementvector y given the RSS vector hi, which represents a hypothesisabout the position of the target (i.e., pi). Note that this notationalselection makes sense in the case of dynamic localization whereprobabilistic arguments quite frequently appear. However, evenin the static localization, the use of such a symbol for thedistance measures, in spite of the fact that there is no stochasticreasoning in their definition most of the time, emphasizes thesimilarity of the problems in both cases. How to define thelikelihoods is not straightforward and forms the backbone oflocalization. Once they are defined, the localization procedurein fingerprinting can mathematically be posed as the maximum-likelihood (ML) estimation problem given as follows:[

xy

]= pi (8)

i = arg max1≤i≤NLPM

p(y|hi) (9)

where x and y are the estimated x- and y-coordinates of thetarget.

III. LIKELIHOOD DEFINITIONS FOR STATIC ESTIMATION

In defining the likelihoods used for classical (static) finger-printing [given in (8) and (9)], if the vectors y and hi didnot have NaN values, then any norm (or normlike functions)would do the job. The same would be true in the case where theplaces of NaN values and non-NaN values would match in thetwo vectors. However, it is quite unlikely that this condition issatisfied in any real application. The classical way of definingthe likelihood function is as given in the following algorithm[1], [12].

1) Algorithm 1—Classical Fingerprinting: Ignore the NaNvalues and compute the likelihood as the distance between thetwo (sub)vectors, i.e.,

p(y|hi) Δ= ‖Γi‖−1 (10)

where Γi Δ= [γi1, γ

i2, . . . , γ

iNBS

]T is the vector whose elementsare defined as

γij

Δ={

yj − hij , yj �= NaN, hi

j �= NaN0, otherwise.

(11)

The norm ‖ · ‖ (although, most of the time, its effects might benegligible) can be selected to be any valid norm or distance. Inour paper, for the comparisons, the standard ‖ · ‖2 norm is used.

On the other hand, the nonmatching NaN values, as is goingto be shown in this paper, carry valuable information that shouldnot be neglected in the localization. The information given bythem can be summarized for two different cases.

1) When the measurement vector y has a NaN value forsome BS (this means that the receiver did not get any

Authorized licensed use limited to: Linkoping Universitetsbibliotek. Downloaded on February 5, 2010 at 06:42 from IEEE Xplore. Restrictions apply.

Page 5: Fingerprinting Localization in Wireless Networks Based on ...292218/FULLTEXT01.pdf · Global System for Mobile Communications (GSM), location-based service (LBS), navigation, ...

286 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 1, JANUARY 2010

RSS measurement from that BS), the hypotheses hi thathave a value for that BS are unlikely. In other words, thepositions pi that are far from the BS are more likely.

2) When the measurement vector has a value for some BS(this means that the receiver has got an RSS measurementfrom that BS), the hypotheses hi that does not have avalue for that BS (these are the RSS vectors hi that havea NaN value for that BS) are unlikely, i.e., the positionspi that are close to the BS are more likely.

The use of this (in a way) negative information in localiza-tion to different extents is the main theme of this paper. Thelocalization hypotheses hi having nonmatching NaN values,which we call nonmatching hypotheses, are punished by ourproposed methods. Two different likelihood calculation mech-anisms (and, hence, measurement models) are proposed for thestatic and dynamic estimation cases, respectively. The staticestimation case involves no assumption of temporal correlationof the estimated position values and therefore requires thefull extent of the punishment of the nonmatching hypotheses.Consequently, we call the likelihood calculation mechanismproposed for this case as the BS-strict approach. The dynamicestimation case, on the other hand, makes use of a dynamicmotion model for the estimated position values, which enablesthe positioning algorithm to accumulate information from con-secutive measurements. This requires a softer version of theBS-strict approach in the sense that it allows for the survival ofthe unlikely hypotheses between consecutive times. Hence, wecall the proposed algorithm for this dynamical case the BS-softapproach.

We delay the stochastic derivation of the BS-soft approachto Section V and give in the following the BS-strict approach,which is going to be used in the static estimation in Section IV.

2) Algorithm 2—BS-Strict: This approach calculates thelikelihoods in the same way as Algorithm 1 does, but this time,the elements γi

j of the vector Γi are defined as

γij

Δ=

⎧⎨⎩

yj − hij , yj �= NaN, hi

j �= NaN

0, yj = NaN, hij = NaN

∞, otherwise.

(12)

Notice that the infinite punishment given to the nonmatchingNaN values in Algorithm 2 results in the elimination of thecorresponding hypotheses because their likelihood will vanish.Any likelihood-based method using Algorithm 2 will thereforesearch for the strict match of the NaN and non-NaN valuesin the two compared RSS vectors. This methodology willthen increase the effects of the BS identities in the estimationprocess. The methods based on this algorithm can be morerobust than the ones using the classical algorithm, which reliesonly on the measured RSS values. This is because the measuredBS identities are much more reliable than the actual measuredRSS values under a significant range of effects like weather,NLOS, and fading.

IV. FINGERPRINTING LOCALIZATION: THE STATIC CASE

In this paper, the PMs of all available sites in the measure-ment area shown in Fig. 1 have been generated and plotted in

Fig. 1. Area under study (the measurement area). The average distancebetween two sites is about 1150 m.

Fig. 2. In the following sections, fingerprinting as defined in(8) and (9) is applied to the RSS index (RSSI) and SCOREvalues where the likelihoods p(y|hi) involved are calculatedby either the classical method or the BS-strict approach definedin Section III.

A. Fingerprinting Using RSSI Values

In this section, we suppose that the user can accurately mea-sure (the same accuracy as the PM) the received power (RSSIvalues). This can be done (and has been done in this paper) us-ing special calibrated modems with extra software installed, andthe measurements have to be collected offline, because only onechannel can be measured at a time. Currently, it is not practicalto use such modems in applications, but the purpose of usingthem in this paper is to check the possible achievable accuracyin case the user can make such measurements. The validationdata set was obtained using the trajectory shown in Fig. 3 andwas used to position a user. The two mentioned approacheswere applied: the classical fingerprinting (Algorithm 1) and theBS-strict fingerprinting (Algorithm 2). The results are shownin Fig. 4. The BS-strict fingerprinting approach’s performancewas significantly better than the classical one due to the factthat the BS number is more robust against the noise than RSSvalues, i.e., the same BS number will be obtained, regardless ofthe presence of strong noise, but different RSS values will becollected.

B. Fingerprinting Using SCORE Values

The SCORE values are used by the standard WiMAXmodems to evaluate the connection quality between the sub-scriber station and the available BSs, and they can be collectedwithout adding any extra software or hardware to the modem.The advantage of using the SCORE values is the possibility ofsimultaneously obtaining them for all the available BSs, but thedisadvantage lies in their low accuracy compared with RSSIvalues. The relation between SCORE values and RSSI values

Authorized licensed use limited to: Linkoping Universitetsbibliotek. Downloaded on February 5, 2010 at 06:42 from IEEE Xplore. Restrictions apply.

Page 6: Fingerprinting Localization in Wireless Networks Based on ...292218/FULLTEXT01.pdf · Global System for Mobile Communications (GSM), location-based service (LBS), navigation, ...

BSHARA et al.: FINGERPRINTING LOCALIZATION IN WIRELESS NETWORKS BASED ON RSS MEASUREMENTS 287

Fig. 2. PMs of the three WiMAX sites. (a) Site 1. (b) Site 2. (c) Site 3.

Fig. 3. Used target trajectory.

is given, according to the information provided by the modemmanufacturer, by

SCORE = (RSSI − 22) − (0.08 × AvgViterbi) (13)

Fig. 4. Positioning error cdf’s. The two fingerprinting approaches were used(the classical and the BS-strict) with the available measurements (RSSI andSCORE).

where the AvgViterbi value is statistically computed from theViterbi decoder. This adds an extra challenge for localizationservices, since even though the performance of the decoder

Authorized licensed use limited to: Linkoping Universitetsbibliotek. Downloaded on February 5, 2010 at 06:42 from IEEE Xplore. Restrictions apply.

Page 7: Fingerprinting Localization in Wireless Networks Based on ...292218/FULLTEXT01.pdf · Global System for Mobile Communications (GSM), location-based service (LBS), navigation, ...

288 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 1, JANUARY 2010

is important for handover decisions, it is only a nuisancefor localization. Measurements were collected using the sametrajectory to validate the two fingerprinting approaches (usingthe same database built using RSSI values). Fig. 4 shows thecumulative distribution function (cdf) of the positioning error.Two observations can be made.

1) Using the SCORE values gives less positioning accuracythan using the RSSI values. This is logical because theSCORE values are less accurate than RSSI values.

2) The impact of using the BS-strict approach is larger in thecase of SCORE values. The SCORE values are subject tobigger changes than the RSSI values because the SCOREvalues depend on not only the received power but thequality of the signal determined by the Viterbi decoderas well.

V. LIKELIHOOD DEFINITIONS FOR DYNAMIC ESTIMATION

In static estimation, there is no temporal correlation betweenthe consecutively made estimations. In other words, once ameasurement ytk

is collected at time tk and an estimate xpk

of the target position is obtained, in the next time step tk+1,the whole procedure is repeated by using only ytk+1 , and thenew estimate xp

k+1 is independent of what xpk is. In such a case,

the use of the information stored in the measurement ytkto its

fullest extent is reasonable because by doing this, we achievethe following.

1) We extract most out of a single measurement.2) Even if we make a mistake in the current estimation,

the estimation errors cannot accumulate and affect thesubsequent estimations.

Consequently, the negative information (i.e., nondetectionevents or NaN values) in the measurements y has beenused to completely eliminate some positioning hypotheses inAlgorithm 2.

On the other hand, the dynamical estimation methods, whichuse models to take advantage of the correlated informationin consecutive position estimations, get their power from theaccumulation of the information in the algorithm along thetime. Therefore, the survival of different hypotheses aboutthe position values is important in such methods for theinformation-gathering process, which enables higher estima-tion performance. Moreover, the complete elimination of somehypotheses (like the assignment of infinite cost to nonmatchinghypotheses in Algorithm 2) can result in error accumulation ina recursive procedure because a hypothesis deletion can neverbe compensated for in the future, even if some contrastingevidence appears. Thus, assigning still higher but finite coststo nonmatching hypotheses, hence allowing them (or someof them) to survive, is more suitable in dynamic estimationprocedures. Since such a cost assignment procedure makesthe hypothesis punishment softer than that in Algorithm 2 byassigning finite costs to nonmatching hypotheses (comparedwith the infinite punishment in Algorithm 2, which results inthe hypothesis elimination), we call the resulting methodologyas the “soft” approach. In the following, we give such a softlikelihood calculation mechanism to be used in a dynamic

estimation method. The algorithm that we will present is basedon the following simple assumptions.

1) The elements {yj}NBSj=1 of the measurement vector y

are conditionally independent, given the database RSSvector hi.

2) Matching non-NaN values in the measurement and RSSvalues satisfy

yj = hij + ej , if yj �= NaN and hi

j �= NaN (14)

where ej ∼ pej(.) represents the measurement noise for

the jth BS.Using the first assumption, the likelihood p(y|hi) can bewritten as

p(y|hi) =NBS∏j=1

βij (15)

where βijΔ= p(yj |hi

j) is the individual likelihood for the jthBS. The different combinations that appear in the analysis dueto NaN values are separately considered as follows.

1) If yj �= NaN (we get a measurement from the jth BS)and hi

j �= NaN (the ith hypothesis has LPM data for thejth BS), we have, by assumption 2, that

βij = pej

(yj − hi

j

)(16)

where pej(.) can be selected considering the application

requirements. A simple choice is to set

βij = N(yj ; hi

j , σ2j

)(17)

where N (yj ; hij , σ

2j ) denotes a normal density with mean

hij and standard deviation σj evaluated at yj . This cor-

responds to pej(.) = N (.; 0, σ2

j ). If the number of datapoints averaged for an LPM grid point is greater than,e.g., ten, then by the central limit theorem, this Gaussianlikelihood seems to be the most appropriate selection. Thestandard deviation σj is a user-selected parameter thatcould change from BS to BS.

2) If yj = NaN (we do not get any measurement from thejth BS) and hi

j �= NaN, we then have

βij = P(yj < ymin|hi

j

)(18)

= P(ej < ymin − hi

j

)(19)

= cdfej

(ymin − hi

j

)(20)

where cdfej(x) Δ=

∫ x

−∞ pej(x)dx is the cdf of ej . Here,

while passing from (19) to (20), we assumed that ej isa continuous random variable (i.e., no discontinuity inits cdf). The probability density function appears in thecalculation again as a design parameter. Notice here that,although it is the same density as that required in the pre-vious case, the density pej

(.) can be selected differentlyin each case for design purposes. In fact, as observed fromseveral preliminary experiments, the Gaussian selectionas in the previous case gives too much (exponential)

Authorized licensed use limited to: Linkoping Universitetsbibliotek. Downloaded on February 5, 2010 at 06:42 from IEEE Xplore. Restrictions apply.

Page 8: Fingerprinting Localization in Wireless Networks Based on ...292218/FULLTEXT01.pdf · Global System for Mobile Communications (GSM), location-based service (LBS), navigation, ...

BSHARA et al.: FINGERPRINTING LOCALIZATION IN WIRELESS NETWORKS BASED ON RSS MEASUREMENTS 289

punishment for the nonmatching hypotheses (i.e., hy-potheses corresponding to hi for which hi

j �= NaN). Sucha selection would therefore yield a hard approach thatis similar to the BS-strict algorithm. Therefore, anotherselection has been made, which leads to the softer result

βij = μ

∣∣∣∣∣ hij

ymin

∣∣∣∣∣ (21)

where μ ≤ 1 is a constant design parameter. This se-lection, in fact, corresponds to a uniform density for ej

between the values ymin and −ymin when μ = 0.5/ymin.Notice that we always have ymin < hi

j ≤ 0 in this paper,1

and therefore, 0 ≤ βij < 1. Since we do not get a mea-surement from the jth BS, we punish the hypotheses thathave LPM values for that BS and note that the larger theLPM value (i.e., power), the greater the punishment is,i.e., βij is smaller.

3) If yj �= NaN and hij = NaN (for the ith hypothesis, we do

not have any data for the jth BS), then a similar analysiswould be

βij = p(yj |hi

j < ymin

)(22)

=P(hi

j < ymin|yj

)p(yj)

P(hi

j < ymin

) (23)

which requires the prior likelihood p(yj) and probabilityP (hi

j < ymin), which are hard to obtain. A straightfor-ward approximation can be

βij ≈ P(hi

j < ymin|yj

)(24)

which is simple to calculate in a way similar to (21) buthas been seen to give low performance in preliminarysimulations. The reason for this has been investigated andis found to be that the term calculated using (24) cansometimes be much larger than the terms calculated forthe hypotheses that actually have a (non-NaN) value forthat BS. We are going to illustrate our argument on thefollowing example case: Suppose that yj �= NaN (i.e., wehave collected a measurement from the jth BS) and i1and i2 are two positioning hypotheses such that hi1

� = hi2�

for � �= j. Suppose also that hi1j = NaN (for the i1th

hypothesis, we do not have any data for the jth BS) andhi2

j �= NaN (for the i2th hypothesis, we have data forthe jth BS). We would like to calculate the punishingterms (likelihoods) βi1j and βi2j corresponding to thesetwo hypotheses. Since the hypothesis i1 is nonmatching(in terms of only the jth BS, i.e., yj �= hi1

j ) and thehypothesis i1 is matching (in terms of only the jth BS,

1In fact, the data collected in this paper (i.e., {hij}

NLPMi=1 for j =

1, . . . , NBS) satisfied this assumption, but in general, the collected data neednot satisfy it. This is, however, not a restriction because one can always find the

quantity hΔ= max1≤j≤NBS max1≤i≤NLPM hi

j and subtract it from all thedata and the online measurements when they are collected to obtain equivalentdata and measurements that satisfy the assumption for a value of ymin.

i.e., yj = hi1j ), we expect the punishment for i1 to be

more than the one for i2, that is, the inequality

βi1j ≤ βi2j (25)

must be satisfied. Note that, since βi2j depends on hi2j

and yj via (17), it can be arbitrarily small. Therefore,if βi1j is selected irrespective of the βi2j values for thematching hypotheses, it is a strong possibility that βi1j

would happen to be much higher than βi2j , and hence,a nonmatching hypothesis will be promoted instead ofthe matching ones. In fact, in the preliminary simulationsusing (24), this caused the matching hypotheses to bediscarded. Therefore, for this case, we (give up (24) and)propose the following likelihood calculation method:

βij = minm∈Mj

βmj (26)

where the set Mj is given as

MjΔ={

i|hij �= NaN

}. (27)

The likelihood (26) always satisfies the condition (25),and hence, the nonmatching hypotheses are punishedmore than or as much as the matching ones. One canactually replace the punishment factor with any smallervalue. Notice that when there are no hypotheses that havevalues for the BS (i.e., the set Mj is empty), arbitrarypunishing or (24) can be applied.

4) If yj = NaN and hij = NaN, then since the vectors are

matching for the jth BS, one can set βij = 1.

The algorithm outlined is summarized in the following from animplementation point of view.

1) Algorithm 3—BS-Soft: Suppose the current available hy-potheses are shown as {hi}Nh

i=1, where Nh represents the num-ber of hypotheses.

1) Calculate the quantities αij for i = 1, . . . , Nh and j =1, . . . , NBS as

αij =

{N

(yj ; hi

j , σ2j

), yj �= NaN, hi

j �= NaN

NaN, otherwise.(28)

2) Calculate the quantities βij for i = 1, . . . , Nh and j =1, . . . , NBS using {αij} as

βij =

⎧⎪⎪⎪⎪⎪⎨⎪⎪⎪⎪⎪⎩

1, yj = NaN, hij = NaN

μ

∣∣∣∣ hij

ymin

∣∣∣∣ , yj = NaN, hij �= NaN

minm

αmj , yj �= NaN, hij = NaN

αij , yj �= NaN, hij �= NaN

(29)

where only numeric values are considered in theminimization.

3) Calculate the likelihoods {p(y|hi)}Nhi=1 from {βij} as

p(y|hi) =NBS∏j=1

βij (30)

for i = 1, . . . , Nh.

Authorized licensed use limited to: Linkoping Universitetsbibliotek. Downloaded on February 5, 2010 at 06:42 from IEEE Xplore. Restrictions apply.

Page 9: Fingerprinting Localization in Wireless Networks Based on ...292218/FULLTEXT01.pdf · Global System for Mobile Communications (GSM), location-based service (LBS), navigation, ...

290 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 1, JANUARY 2010

The punishment terms in the likelihood calculation can bethought of as a softened version of the BS-strict approachpreviously considered in this section. In a way, by assigninglower weights to the hypotheses that do not match the measure-ment, one lowers their effect in the overall estimate instead ofcompletely discarding them (similar to BS-strict), which can bequite harmful in dynamic approaches.

VI. FINGERPRINTING LOCALIZATION:THE DYNAMIC CASE

For the positioning methods used in Section IV, one doesnot consider the time information (stamps) available with themeasurements. When the target is localized with good accuracyfor one measurement, in the next measurement when the useris possibly quite close to the previous location (because onlya small amount of time has passed), the previous accuratelocalization is completely discarded, and a new localization isdone based on the new measurement. This is one type of statictarget localization, and the dynamic information coming fromthe fact that the user does not move much between consecutivemeasurements is not used. One of the ways to use this extrainformation in localization is to use a dynamic model for thetarget (user) position given as

xtk+1 = ftk+1,tk(xtk

, wtk+1,tk) (31)

where we have the following.1) xtk

∈ Rnx is the state of the target at time tk.

2) wtk+1,tk∈ R

nw is the process noise representing theuncertainty in the model between time instants tk andtk+1. If the process noise term is selected to be small, thismeans that the target model is known with good accuracyand vice versa.

3) ftk+1,tk(., .) is, in general, a nonlinear function of its

arguments.This type of models is generally used in target tracking [22],[23] to model target motion dynamics. At each time instant tk,we get a measurement ytk

that is related to the state of thetarget as

ytk= h(xtk

) + vtk(32)

where we have the following.1) h(.) is, in general, a nonlinear function. In our applica-

tion, it is the PM whose information is collected offline.The likelihoods p(ytk

|xtk) will be formed from the PM

using Algorithm 3. The details will be given below inSection VI-B2.

2) vtkis the measurement noise representing the quality of

our sensors.The state estimation with this type of probabilistic model,which is given by (31) and (32), is a mature area of research[24], [25]. The optimal solution when the functions f(.) andh(.) are linear and the noise terms wtk+1,tk

and vtkare Gaussian

is the well-known Kalman filter [26]. Some small nonlinearitiescan be handled by approximate methods such as the extendedKalman filter [27], and the methods called sigma-point Kalman

filters [28], of which the unscented Kalman filter [29], [30]is one type, have been shown to be suitable for a muchlarger class of nonlinearities (see the extensive work in [31]).These approaches are possible alternatives in the cases wherethe posterior density of the state is unimodal. On the otherhand, if one assumes that the user is moving on the road, thestate density would be highly multimodal, which can quitepoorly be approximated with a single Gaussian distribution.Complicating the facts, the measurement function h(.) that isrepresented by the PM is highly nonlinear, and furthermore, itis discontinuous. Therefore, in this paper, we are going to usethe relatively recent algorithms in the literature called PFs [14]–[16]. Two PFs are used to track the target (user). The first oneexploits the target dynamic information (motion model) only,and the second filter makes use of the public road informationmap in addition to the dynamic information. We call these filtersoff-road and on-road PFs for obvious reasons. Knowing that theuser is on the public road network is valuable information forthe positioning of the user. The TeleAtlas maps have been usedas assisting data, in addition to the measured data [32].

A. PF

PFs are the recursive implementation of Bayesian densityrecursions [14]–[16]. The main aim in the method, as inmany Bayesian methods, is to calculate the posterior density

of the state xtkgiven all the measurements yt1:k

Δ= {yt1 ,yt2 , . . . ,ytk

}; i.e., we calculate the density p(xtk|yt1:k). While

doing this, the PF approximates the density p(xtk|yt1:k) with

a number of state values {x(i)tk}Np

i=1 (called particles) and their

corresponding weights {η(i)tk}Np

i=1 (called particle weights), i.e.,

p (xtk|yt1:k) ≈

Np∑i=1

η(i)tk

δx

(i)tk

(xtk) . (33)

Then, at each time step, the PF needs to calculate the par-ticles and weights {x(i)

tk, η

(i)tk}Np

i=1 from the previous particles

and weights {x(i)tk−1

, η(i)tk−1

}Np

i=1. We are going to use the basicparticle filtering algorithm, which is called a bootstrap filter thatwas first proposed in [33]. At each step of the algorithm, onecan calculate the conditional estimate xtk

and the covariancePtk

of the state as

xtk

Δ=Np∑i=1

η(i)tk

x(i)tk

(34)

Ptk

Δ=Np∑i=1

η(i)tk

[x(i)

tk− xtk

] [x(i)

tk− xtk

]T

. (35)

It is possible to calculate other types of point estimates, likemaximum a posteriori (MAP) estimates [34], from the particlesand the weights of the posterior state density; however, thiswould require a kernel smoothing of the particles in general[35]. Note that the PF described is one of the simplest and com-putationally cheapest algorithms among the more complicatedones, as given in [36] and [14]. In the following section, we willdescribe the specific models and parameters that are used in thetwo differently (off-road and on-road) implemented PFs.

Authorized licensed use limited to: Linkoping Universitetsbibliotek. Downloaded on February 5, 2010 at 06:42 from IEEE Xplore. Restrictions apply.

Page 10: Fingerprinting Localization in Wireless Networks Based on ...292218/FULLTEXT01.pdf · Global System for Mobile Communications (GSM), location-based service (LBS), navigation, ...

BSHARA et al.: FINGERPRINTING LOCALIZATION IN WIRELESS NETWORKS BASED ON RSS MEASUREMENTS 291

B. Implementation Details of the PFs

We implemented two different bootstrap PFs using differenttarget motion models but with the same measurement model(i.e., likelihood).

1) State Models: The first PF (called an off-road filter) usesa classical (nearly) constant-velocity model with state xk =[px

k+1, pyk+1, v

xk+1, v

yk+1]

T , where variables p and v denote theposition and the velocity of the target, respectively. The motionmodel is given by⎡⎢⎣

pxk+1

pyk+1

vxk+1

vyk+1

⎤⎥⎦ =

[I2 Tk+1I2

0 I2

]⎡⎢⎣px

k

pyk

vxk

vyk

⎤⎥⎦ +

[ T 2k+12 I2

Tk+1I2

]wk+1 (36)

where wk is a 2-D white Gaussian noise with zero mean andcovariance 52I2, and In is the identity matrix of dimension n.Tk+1 = tk+1 − tk is the difference between consecutive timestamps of the measurements.

The second PF (called an on-road filter) makes use of theroad database information. The literature is abundant with alarge number of publications on target tracking with road net-work information. Although the early studies used approachesbased on multiple-model (extended) Kalman filters [37]–[39],the PFs, in a short time, have proved to be one of the in-dispensable tools in road-constrained estimation [40], [41].This is confirmed in the large number of publications on thesubject, like [42]–[47], which appeared only during the lastfive years. Our approach here considers a single reduced-orderon-road motion model with a bootstrap filter. The state of thePF is denoted by xr

k, where r stands for emphasizing roadinformation, and it is given as xr

k = [prk, vr

k, irk]T , where thescalar variables pr

k and vrk denote the position and speed values

of the target on the road segment, which is identified by theinteger index irk. The following model is used for the dynamicsof xr

k: ⎡⎣ pr

k+1

vrk+1

irk+1

⎤⎦ = fr

⎛⎝⎡⎣pr

k+1

vrk+1

irk

⎤⎦ , IRN , wrd

k+1

⎞⎠ (37)

where[pr

k+1

vrk+1

]=[

1 Tk+1

0 1

] [pr

k

vrk

]+[

T 2k+12

Tk+1

]wrc

k+1. (38)

The continuous process noise wrc

k is a scalar white Gaussianacceleration noise with zero mean and 0.2-m/s2 standard devi-ation. The predicted position and speed values, i.e., pr

k+1 andvr

k+1, might not be on the road segment indicated by irk. Thefunction fr(.) therefore projects the values pr

k+1 and vrk+1

into the road segment denoted by irk+1. If there is more thanone candidate for the next road segment index irk+1 due to thejunctions, the function also selects a random one according tothe value of the discrete on-road process noise term wrd

k+1 ∈{1, 2, . . . , Nr(xr

k)}, where Nr(xrk) is the number of possible

road segments in which the target with on-road state xrk might

go in the following Tk+1 seconds.2) Likelihoods: The measurement model is the same for

both PFs. At a single time instant tk, the measurement vector is

TABLE IPARAMETER VALUES USED FOR ALGORITHM 3

FOR LIKELIHOOD CALCULATION

in the following form:

ytk= [ y1 y2 · · · yNBS ]T (39)

as has also been given in Section II. The likelihood valuep(ytk

|x(i)tk

) is calculated using the LPM, as given in the fol-lowing algorithm:

3) Algorithm 4—Calculation of p(ytk|x(i)

tk):

1) Calculate the distance of the particle to all of the LPMgrid points as

dj =∥∥∥p

(i)tk

− pj∥∥∥

2(40)

where p(i)tk

denotes the vector composed of the position

components of x(i)tk

.2) Find the closest point in the LPM to the particle posi-

tion as

j = arg max1<j<NLPM

dj . (41)

3) Calculate p(ytk|x(i)

tk) as

p(ytk

|x(i)tk

)=

{p(ytk

|hj)

, if dj ≤ dthreshold

p(ytk|h), otherwise

(42)

where p(ytk|hj) and p(ytk

|h) are calculated usingAlgorithm 3, whose specific parameters are given inTable I. In (42), h denotes an NBS vector with all ele-ments being equal to NaN. dthreshold is a user-selecteddistance threshold that determines the largest distancebetween a particle and an LPM grid point at which theLPM grid point can be used to calculate the likelihoodof the particle. This is going to be particularly importantin the off-road PF where the particles can frequently gooutside of the area of interest. In this case, using p(ytk

|h)instead of p(ytk

|hj) implicitly punishes such a particle.We selected dthreshold = 100 m in our simulations.

4) Initialization: PFs were initialized with a large Gaussianspread of particles with mean at the true positions and zerovelocities, i.e.,[

px,(i)0 p

y,(i)0 v

x,(i)0 v

y,(i)0

]T ∼ N (.,m0, P0) (43)

for i = 1, . . . , Np, where

m0Δ= [ px

0 py0 0 0 ]T (44)

P0Δ= diag ([ 1002 1002 102 102 ]) . (45)

Here, [px0 , py

0] is the true target coordinates at time t0, and theoperator diag(.) forms a diagonal matrix from the elements of

Authorized licensed use limited to: Linkoping Universitetsbibliotek. Downloaded on February 5, 2010 at 06:42 from IEEE Xplore. Restrictions apply.

Page 11: Fingerprinting Localization in Wireless Networks Based on ...292218/FULLTEXT01.pdf · Global System for Mobile Communications (GSM), location-based service (LBS), navigation, ...

292 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 1, JANUARY 2010

Fig. 5. Positioning error cdf’s for the proposed fingerprinting approach and the conventional approach (based on the OH model). (a) Using RSSI measurements.(b) Using SCORE measurements.

the input vector. The results that have been obtained in this pa-per does not change with different initial distribution selectionas long as the initial distribution covers the true target positionwith some probability mass. The initial Gaussian density givenhas a position standard deviation of 100 m, which is, in a way,an indirect assumption of prior information for the initial targetposition with that quality. It is unfortunately not possible toinitially distribute the particles to the whole area of study andthen start the estimation. This is because in such a case, thepercentage of the probability mass that is spread around thetrue position would be too small. Therefore, a suggestion forthe general case, where no prior information of the initial targetposition is available, can be to initialize the particles aroundan initial estimate obtained by the static fingerprinting with thefirst collected measurement.

In the off-road PF, we directly use the initial particles. Onthe other hand, in the on-road PF, which always needs particlesthat are on the road network, the corresponding particles areobtained by projecting the ones defined earlier onto the roadnetwork.

To compare our fingerprinting-based bootstrap filters, wehave implemented two additional (on-road and off-road) boot-strap PFs that use only the OH model in (3) for likelihoodcalculation. For this purpose, we have estimated transmittedpowers (PBS) and measurement variances for each BS and thepath loss exponent α using the least squares method with ourpreviously collected data (which has been used for forming theLPM). The estimation results for our fingerprinting-based boot-strap filters and OH-model-based bootstrap filters are shown inFig. 5. Notice that using SCORE or RSSI measurements withthe OH model in the off-road filter gives almost the same resultsbecause the dominating model errors like fading overcome theeffect of the accuracy of the measurements, and the differenceis no longer visible. In the on-road case, the difference ismore evident. The fingerprinting approach reduces the effect ofmodeling errors, and therefore, the quality of the measurementsgains more importance in the results. The performance of the

fingerprinting methodology in dynamic filtering significantlyexceeds that of the OH-model-based approach. The perfor-mance gain with fingerprinting is overwhelming in the off-roadcase but is still visible in the on-road filters, particularly with theSCORE measurements where the SNR is lower. It is remarkablethat the on-road OH-model-based PF is almost equivalent tothe off-road fingerprinting-based filter in terms of estimationerrors, which clearly illustrate the effect of the strong modelingcapability of the fingerprinting approach.

As a last point, we make a comparison between the resultsof the dynamic and the static cases, which are depicted inFig. 6. A very interesting observation is that, in the high-accuracy parts of the RSSI case, the static approach makesbetter estimations than the dynamic ones, although the dynamicestimation algorithms, in the overall results, are seen to bemuch more robust. Note that there is about a 10-m performanceloss in the RSSI-based dynamic on-road filter compared tothe static result. We attribute this difference to the fact thatthe static estimation calculates an ML estimate, whereas thedynamic on-road filter calculates a mean square estimate. Sincethere are about 10 m between the LPM grid points and thePF calculates the likelihood of a particle as the likelihood ofthe closest LPM point, there can appear many particles withthe same weights in a 5-m radius. Calculating the average ofthese particles, which may be biased toward one side of theoptimal result due to the road constraints, can give an errorof about 5 m. Considering the error terms added by averagingover all the particles, we can expect an error of about 10 m inthe result compared with the ML-based static approach, whichwould directly give the position of the most likely LPM gridpoint when the SNR is high (like the case with RSSI). Thecalculation of the MAP estimate in the PF can be an alternativefor this problem. In the off-road case, since the particles areeven more separated, we can expect this lower performanceeffect (under a high SNR) to be more visible. Furthermore, wethink that the lack of road-network information also makes theestimates of the off-road filter suffer from low prior information

Authorized licensed use limited to: Linkoping Universitetsbibliotek. Downloaded on February 5, 2010 at 06:42 from IEEE Xplore. Restrictions apply.

Page 12: Fingerprinting Localization in Wireless Networks Based on ...292218/FULLTEXT01.pdf · Global System for Mobile Communications (GSM), location-based service (LBS), navigation, ...

BSHARA et al.: FINGERPRINTING LOCALIZATION IN WIRELESS NETWORKS BASED ON RSS MEASUREMENTS 293

Fig. 6. Positioning error comparison between (on-road and off-road) dynamic positioning and static positioning. (a) Using RSSI measurements. (b) UsingSCORE measurements.

compared with static estimates, which are always constrained tothe road segments. Note that, with the SCORE measurements,which represents a more practical low-SNR case, there are nosimilar important sufferings. In the global behavior (95% lines),the performance gains with the dynamic approaches make itclear that these methods should be preferred when highly robustestimators are required. The results show that, for 95% lines, thepositioning accuracy improvement caused by the motion modelcompared with the static case is about 33% when SCOREvalues are used and about 50% when RSSI values are used. Thelocalization accuracy improvement achieved by using the roadinformation compared with the dynamic case is about 50% inthe case of SCORE values and about 40% in the case of RSSIvalues, which indicates the strong effect of the road networkinformation on the localization accuracy.

VII. CONCLUSION

This paper has discussed the use of fingerprinting positioningin wireless networks based on the RSS measurements, i.e.,RSSI and SCORE, with specific remarks on WiMAX networks.The introduced work has been divided into two main parts:static localization and dynamic localization. In the latter, theinformation of the target’s motion model was used with andwithout road information. In both approaches, the effect ofBS identities, which are more robust to propagation effects,on the estimates has been increased via designing specificlikelihood calculation mechanisms. The results obtained showthat fingerprinting positioning is a strong and robust approachfor overcoming the RSS’s high variability. The positioningaccuracy obtained by using the motion model and the roadnetwork information is notable. The accuracy improvement wasvery promising, and new location-dependent applications couldbe seen in the horizon. The positioning accuracy achieved byusing the fingerprinting-positioning approach with the motionmodel and road information can therefore be seen as a furtherstep toward more accuracy-demanding applications and newtypes of location-based services.

REFERENCES

[1] Cello Consortium Rep. [Online]. Available: http://www.telecom.ntua.gr/cello/documents/CELLO-WP2-VTT-D03-007-Int.pdf

[2] F. Gustafsson and F. Gunnarsson, “Possibilities and fundamental limi-tations of positioning using wireless communication networks measure-ments,” IEEE Signal Process. Mag., vol. 22, no. 4, pp. 41–53, Jul. 2005.

[3] G. Sun, J. Chen, W. Guo, and K. Liu, “Signal processing techniques innetwork-aided positioning: A survey of state-of-the-art positioning de-signs,” IEEE Signal Process. Mag., vol. 22, no. 4, pp. 12–23, Jul. 2005.

[4] S. Gezici, Z. Tian, B. Giannakis, H. Kobayashi, and A. Molisch, “Local-ization via ultra-wideband radios,” IEEE Signal Process. Mag., vol. 22,no. 4, pp. 70–84, Jul. 2005.

[5] D. Li and Y. Hu, “Energy-based collaborative source localization usingacoustic microsensor array,” J. Appl. Signal Process., vol. 2003, pp. 321–337, Jan. 2003.

[6] Y. Okumura, E. Ohmori, T. Kawano, and K. Fukuda, “Field strength andits variability in VHF and UHF land-mobile radio service,” Rev. Elect.Commun. Lab., vol. 16, pp. 9–10, 1968.

[7] M. Hata, “Empirical formula for propagation loss in land mobile radioservices,” IEEE Trans. Veh. Technol., vol. VT-29, no. 3, pp. 317–325,Aug. 1980.

[8] J. Shirahama and T. Ohtsuki, “RSS-based localization in environmentswith different path loss exponent for each link,” in Proc. Veh. Technol.Conf., 2008, pp. 1509–1513.

[9] W. D. Wang and Q. X. Zhu, “RSS-based Monte Carlo localisation formobile sensor networks,” IET Commun., vol. 2, no. 5, pp. 673–681,May 2008.

[10] D.-B. Lin and R.-T. Juang, “Mobile location estimation based on differ-ences of signal attenuations for GSM systems,” IEEE Trans. Veh. Tech-nol., vol. 54, no. 4, pp. 1447–1454, Jul. 2005.

[11] O. Sallent, R. Agusi, and X. Cavlo, “A mobile location service demon-strator based on power measurements,” in Proc. Veh. Technol. Conf.,Sep. 2004, vol. 6, pp. 4096–4099.

[12] K. K. C. Takenga, “Mobile positioning based on pattern-matching andtracking techniques,” ISAST Trans. Commun. Netw., vol. 1, no. 1, pp. 529–532, Aug. 2007.

[13] A. Taok, N. Kandil, S. Affes, and S. Georges, “Fingerprinting localiza-tion using ultra-wideband and neural networks,” in Proc. Signals, Syst.Electron., Aug. 2007, pp. 529–532.

[14] A. Doucet, S. J. Godsill, and C. Andrieu, “On sequential simulation-basedmethods for Bayesian filtering,” Stat. Comput., vol. 10, no. 3, pp. 197–208, 2000.

[15] A. Doucet, N. de Freitas, and N. Gordon, Eds., Sequential Monte CarloMethods in Practice. Berlin, Germany: Springer-Verlag, 2001.

[16] S. Arulampalam, S. Maskell, N. Gordon, and T. Clapp, “A tutorial onparticle filters for on-line non-linear/non-Gaussian Bayesian tracking,”IEEE Trans. Signal Process., vol. 50, no. 2, pp. 174–188, Feb. 2002.

[17] A. Heinrich, M. Majdoub, J. Steuer, and K. Jobmann, “Real-time path-lossposition estimation in cellular networks,” in Proc. ICWN, Jun. 2002.

Authorized licensed use limited to: Linkoping Universitetsbibliotek. Downloaded on February 5, 2010 at 06:42 from IEEE Xplore. Restrictions apply.

Page 13: Fingerprinting Localization in Wireless Networks Based on ...292218/FULLTEXT01.pdf · Global System for Mobile Communications (GSM), location-based service (LBS), navigation, ...

294 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 1, JANUARY 2010

[18] K.-T. Feng, C.-L. Chen, and C.-H. Chen, “GALE: An enhanced geometry-assisted location estimation algorithm for NLOS environments,” IEEETrans. Mobile Comput., vol. 7, no. 2, pp. 199–213, Feb. 2008.

[19] K. Jones and L. Liu, “What where Wi: An analysis of millions of Wi-Fiaccess points,” in Proc. IEEE Int. Conf. PORTABLE, May 2007, pp. 1–4.

[20] K. Jones, L. Liu, and F. Alizadeh-Shabdiz, “Improving wireless posi-tioning with look-ahead map-matching,” in Proc. 4th Annu. Int. Conf.MobiQuitous, Aug. 2007, pp. 1–8.

[21] S. Byers and D. Kormann, “802.11b access point mapping,” Commun.ACM, vol. 46, no. 5, pp. 41–46, May 2003.

[22] Y. Bar-Shalom, X. R. Li, and T. Kirubarajan, Estimation With Applicationsto Tracking and Navigation. New York: Wiley, 2001.

[23] S. Blackman and R. Popoli, Design and Analysis of Modern TrackingSystems. Norwood, MA: Artech House, 1999.

[24] B. D. O. Anderson and J. B. Moore, Optimal Filtering. EnglewoodCliffs, NJ: Prentice-Hall, 1979.

[25] P. R. Kumar and P. Varaiya, Stochastic Systems: Estimation, Identificationand Adaptive Control. Englewood Cliffs, NJ: Prentice-Hall, 1986.

[26] R. E. Kalman, “A new approach to linear filtering and prediction prob-lems,” J. Basic Eng., vol. 82, no. 1, pp. 34–45, Mar. 1960.

[27] A. H. Jazwinski, Stochastic Processes and Filtering Theory. New York:Academic, 1970.

[28] R. Van Der Merwe and E. Wan, “Sigma-point Kalman filters for proba-bilistic inference in dynamic state-space models,” in Proc. Workshop Adv.Mach. Learn., 2003, p. 377.

[29] S. Julier, J. Uhlmann, and H. Durrant-Whyte, “A new method for the non-linear transformation of means and covariances in filters and estimators,”IEEE Trans. Autom. Control, vol. 45, no. 3, pp. 477–482, Mar. 2000.

[30] S. Julier and J. Uhlmann, “Unscented filtering and nonlinear estimation,”Proc. IEEE, vol. 92, no. 3, pp. 401–422, Mar. 2004.

[31] R. Van Der Merwe, “Sigma-point Kalman filters for probabilistic infer-ence in dynamic state-space models,” Ph.D. dissertation, Oregon Health,Sci. Univ., Portland, OR, 2004.

[32] Digital Mapping and Solutions—Teleatlas. [Online]. Available: http://www.teleatlas.com

[33] N. J. Gordon, D. J. Salmond, and A. F. M. Smith, “A novel approachto nonlinear/non-Gaussian Bayesian state estimation,” Proc. Inst. Elect.Eng.—Radar Signal Process., vol. 140, no. 2, pp. 107–113, Apr. 1993.

[34] H. L. Van Trees, Detection, Estimation, and Modulation Theory, vol. I.New York: Wiley, 1968.

[35] H. Driessen and Y. Boers, “MAP estimation in particle filter tracking,”in Proc. IET Semin. Target Tracking Data Fusion: Algorithms Appl.,Apr. 2008, pp. 41–45.

[36] M. Pitt and N. Shephard, “Filtering via simulation: Auxiliary particlefilters,” J. Amer. Stat. Assoc., vol. 94, no. 446, pp. 590–599, Jun. 1999.

[37] T. Kirubarajan, Y. Bar-Shalom, K. R. Pattipati, and I. Kadar, “Ground tar-get tracking with variable structure IMM estimator,” IEEE Trans. Aerosp.Electron. Syst., vol. 36, no. 1, pp. 26–46, Jan. 2000.

[38] P. J. Shea, T. Zadra, D. Klamer, E. Frangione, and R. Brouillard, “Im-proved state estimation through use of roads in ground tracking,” in Proc.SPIE Signal Data Process. Small Targets, 2000, vol. 4048, pp. 312–332.

[39] P. J. Shea, T. Zadra, D. Klamer, E. Frangione, and R. Brouillard, “Pre-cision tracking of ground targets,” in Proc. IEEE Aerosp. Conf., vol. 3,2000, pp. 473–482.

[40] M. S. Arulampalam, N. Gordon, M. Orton, and B. Ristic, “A variablestructure multiple model particle filter for GMTI tracking,” in Proc. Int.Conf. Inf. Fusion, Jul. 2002, vol. 2, pp. 927–934.

[41] B. Ristic, S. Arulampalam, and N. Gordon, Beyond the Kalman Filter:Particle Filters for Tracking Applications. London, U.K.: Artech House,2004, ch. 10.

[42] M. Ulmke and W. Koch, “Road-mapassistedgroundtarget tracking,”IEEETrans. Aerosp. Electron. Syst., vol. 42, no. 3, pp. 1264–1274, Oct. 2006.

[43] Y. Cheng and T. Singh, “Efficient particle filtering for road-constrainedtarget tracking,” IEEE Trans. Aerosp. Electron. Syst., vol. 43, no. 4,pp. 1454–1469, Oct. 2007.

[44] O. Payne and A. Marrs, “An unscented particle filter for GMTI tracking,”in Proc. IEEE Aerosp. Conf., Mar. 2004, vol. 3, pp. 1869–1875.

[45] L. Hong, N. Cui, M. Bakich, and J. R. Layne, “Multirate interactingmultiple model particle filter for terrain-based ground target tracking,”Proc. Inst. Elect. Eng.—Control Theory Appl., vol. 153, no. 6, pp. 721–731, Nov. 2006.

[46] G. Kravaritis and B. Mulgrew, “Variable-mass particle filter forroad-constrained vehicle tracking,” EURASIP J. Adv. Signal Process.,vol. 2008, p. 321 967, Jan. 2008.

[47] M. Ekman and E. Sviestins, “Multiple model algorithm based on particlefilters for ground target tracking,” in Proc. Int. Conf. Inf. Fusion, Jul. 2007,pp. 1–8.

Mussa Bshara (S’09) received the Bachelor’s de-gree in electrical engineering from Damascus Uni-versity, Damascus, Syria, and the M.Sc. degree insignal processing and information security from theBeijing University of Posts and Telecommunica-tions, Beijing, China. He is currently working towardthe Ph.D. degree with the Department of Fundamen-tal Electricity and Instrumentation, Vrije UniversiteitBrussel, Brussels, Belgium.

His research interests include localization, nav-igation and tracking in wireless networks, sig-

nal processing, wireless communications, power line communications, andx digital subscriber line (xDSL) technologies.

Umut Orguner (S’99–M’07) received the B.S.,M.S., and Ph.D. degrees in electrical engineeringfrom Middle East Technical University, Ankara,Turkey, in 1999, 2002, and 2006, respectively.

From 1999 to 2007, he was with the Departmentof Electrical and Electronics Engineering, MiddleEast Technical University, as a Teaching and Re-search Assistant. Since January 2007, he has beena Postdoctoral Associate with the Division of Au-tomatic Control, Department of Electrical Engineer-ing, Linköping University, Linköping, Sweden. His

research interests include estimation theory, multiple-model estimation, targettracking, and information fusion.

Fredrik Gustafsson (S’91–M’93–SM’05) receivedthe M.Sc. degree in electrical engineering and thePh.D. degree in automatic control from LinköpingUniversity, Linköping, Sweden, in 1988 and 1992,respectively.

Since 2005, he has been a Professor of sensorinformatics with Department of Electrical Engineer-ing, Linköping University. From 1992 to 1999, heheld various positions in automatic control, and from1999 to 2005, he had a professorship in communi-cation systems. He is a Cofounder of the companies

NIRA Dynamics and Softube, developing signal processing software solutionsfor the automotive and the music industry, respectively. He is currently anAssociate Editor for the EURASIP Journal on Applied Signal Processing andthe International Journal of Navigation and Observation. His research interestsare in stochastic signal processing and adaptive filtering and change detection,with applications to communication, vehicular, airborne, and audio systems.His work in the sensor fusion area involves the design and implementationof nonlinear filtering algorithms for localization and navigation and trackingof all kinds of platforms, including cars, aircraft, spacecraft, unmanned aerialvehicles, surface and underwater vessels, cell phones, and film cameras foraugmented reality.

Dr. Gustafsson was elected as a member of the Royal Academy of Engineer-ing Sciences in 2007. He received the Arnberg prize by the Royal SwedishAcademy of Science in 2004. He was an Associate Editor for the IEEETRANSACTIONS ON SIGNAL PROCESSING from 2000 to 2006.

Leo Van Biesen (SM’96) received the Electro-Mechanical Engineer and the Doctoral (Ph.D.) de-grees from the Vrije Universiteit Brussel (VUB),Brussels, Belgium, in 1978 and 1983, respectively.

Currently, he is a Full Senior Professor with theDepartment of Fundamental Electricity and Instru-mentation, VUB. He teaches courses on fundamentalelectricity, electrical measurement techniques, sig-nal theory, computer-controlled measurement sys-tems, telecommunication, physical communication,and information theory. His current interests are sig-

nal theory, PHY layer in communication, time-domain reflectometry, wirelesscommunications, x digital subscriber line (xDSL) technologies, and expertsystems for intelligent instrumentation.

Dr. Van Biesen was the Chairman of the International Measurement Confed-eration (IMEKO) TC-7 from 1994 to 2000 and the President Elect of IMEKOfrom 2000 to 2003 and has been the Liaison Officer between the IEEE andIMEKO. He was the President of IMEKO from 2003 to September 2006. He iscurrently the Chairman of the Advisory Board of IMEKO as the immediate pastPresident. He is also member of the board of Federation des Ingenieurs deTelecommunication des Communautées Européens Belgium and UnionRadio-Scientifique International Belgium.

Authorized licensed use limited to: Linkoping Universitetsbibliotek. Downloaded on February 5, 2010 at 06:42 from IEEE Xplore. Restrictions apply.