Next Article in Journal
Fluorometric Index for Sensing Oil in the Sea Environment
Next Article in Special Issue
A Map/INS/Wi-Fi Integrated System for Indoor Location-Based Service Applications
Previous Article in Journal
Research and Analysis on the Localization of a 3-D Single Source in Lossy Medium Using Uniform Circular Array
Previous Article in Special Issue
Vital Sign Monitoring and Mobile Phone Usage Detection Using IR-UWB Radar for Intended Use in Car Crash Prevention
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Indoor Trajectory Tracking Scheme Based on Delaunay Triangulation and Heuristic Information in Wireless Sensor Networks

1
School of Computer Science and Engineering, Northeastern University, Shenyang 110819, China
2
College of Information Engineering, Inner Mongolia University of Technology, Hohhot 010080, China
*
Author to whom correspondence should be addressed.
Sensors 2017, 17(6), 1275; https://doi.org/10.3390/s17061275
Submission received: 9 April 2017 / Revised: 19 May 2017 / Accepted: 22 May 2017 / Published: 2 June 2017

Abstract

:
Object tracking and detection is one of the most significant research areas for wireless sensor networks. Existing indoor trajectory tracking schemes in wireless sensor networks are based on continuous localization and moving object data mining. Indoor trajectory tracking based on the received signal strength indicator (RSSI) has received increased attention because it has low cost and requires no special infrastructure. However, RSSI tracking introduces uncertainty because of the inaccuracies of measurement instruments and the irregularities (unstable, multipath, diffraction) of wireless signal transmissions in indoor environments. Heuristic information includes some key factors for trajectory tracking procedures. This paper proposes a novel trajectory tracking scheme based on Delaunay triangulation and heuristic information (TTDH). In this scheme, the entire field is divided into a series of triangular regions. The common side of adjacent triangular regions is regarded as a regional boundary. Our scheme detects heuristic information related to a moving object’s trajectory, including boundaries and triangular regions. Then, the trajectory is formed by means of a dynamic time-warping position-fingerprint-matching algorithm with heuristic information constraints. Field experiments show that the average error distance of our scheme is less than 1.5 m, and that error does not accumulate among the regions.

1. Introduction

Currently, many indoor monitoring systems are based on wireless sensor networks (WSNs), such as safety monitoring systems in coal mines, disaster early warning systems in subway tunnel construction and indoor navigation systems. Indoor monitoring applications have undergone rapid development.
The position and moving trajectory of a monitored object form the most basic information for location based services. Knowing the position and moving trajectory of a miner is the most crucial factor in mine disaster rescue operations. Similarly, an early warning signal can be triggered by means of the relationship between the relative positions of vehicles and workers in a subway tunnel site. It is meaningless for wireless sensor networks to collect data without positional information [1].
Based on the principles for forming trajectory, trajectory tracking methods mainly include the following: trajectory tracking based on localization, trajectory tracking based on acceleration measurements, and trajectory tracking based on video recognition.
Trajectory tracking based on localization consists of two phases. First, a series of positions of an object are determined by sharing data between reference nodes and unknown nodes. Then, the trajectory of the moving object is created using moving-object data-mining techniques [2].
Outdoor localization and trajectory tracking are based on satellite localization systems, for example, Global Positioning Systems (GPSs), have been widely used [3]. However, GPSs are often ineffective indoors because of signal propagation limitations in indoor environments [4]. A universal formal description of localization for wireless sensor networks was proposed from the standpoint of mathematical modeling that covers the main ranging measurement and regional estimation methods [5]. The accuracy of trajectory tracking is largely determined by localization accuracy. In recent years, researchers have paid more attention to indoor localization based on the received signal strength indicator (RSSI), which represents the received power level at a receiver, because this approach requires no special infrastructure and has no Line of Sight (LOS) limitations [6]. Indoor localization based on fingerprinting was first proposed by Microsoft Research (Redmond, Washington, USA) with the development of the RADAR system [7]. This localization system uses a fingerprint, which is a vector formed by the RSSIs from multiple adjacent reference nodes. The localization method based on the position fingerprint consists of two phases: in the offline phase, an area is divided into a series of grid units and the RSSI measurements are collected at each intersection. To avoid the impact of different device orientations, the RSSI information is collected for each of the four directions (north, south, east, or west). Each combination of position and orientation (i.e., an (x, y, d) tuple), (tuple, RSSI vector mean) is stored in a fingerprint map table for use in the online phase. The mean is the average value of multiple samples. In the online phase, the RSSI information of a moving object will be detected and recorded. Then, the received RSSI vector will be compared with the fingerprint map table to determine the location of the moving object.
Multipath propagation is a main feature of wireless communication [7]. It is a kind of communication phenomenon that the wireless signal transmitted from a transmitter antenna arrives at a receiver antenna along two or more paths. Reflections, refractions and scattering are generated during the propagation process of wireless signal. Therefore, it is possible to receive the multiple same source electromagnetic waves at an arbitrary position, which is multipath propagation. The received signal is a synthesis of the direct path wave and multiple other waves. The amplitude change of the received signal is known as multipath fading.
RSSI-based indoor localization is particularly challenging for the following three reasons [6]. First, it is difficult to obtain accurate RSSI measurements. According to the results of experiments in [8], the standard deviation of RSSI measurements collected from a stationary node in one minute can be up to 5 dBm. Second, distance estimation based on RSSI measurements can easily be affected by multipath and diffraction effects, which contribute to most of the estimation errors in current indoor ranging measurement localization systems. Third, manufacturing variations among different wireless devices may also result in RSSI measurement discrepancy.
An in-depth analysis on the relationship between RSSI and LQI (link quality indicator) is proposed in [9]. LQI represents the energy and quality of the received data frames. Its value is based on the signal strength and the detected SNR (Signal-to-Noise Ratio). LQI is calculated by the MAC (Media Access Control) layer and uploaded to the upper layer. LQI is related to the probability of the correctly receiving data frames.
RSSI and LQI can be read from the built-in indicator in the CC2530 chip. Experiments [10] show that the level of LQI determines the quality of RSSI value. For a stationary node, the better the LQI is, the more stable the RSSI is; otherwise, RSSI fluctuates markedly. RSSI is directly related to the transmission distance, and LQI is directly related to signal modulation and interference.
Compared to RSSI, channel state information (CSI) [8] yields more accurate values from the physical layer; CSI describes the amplitude and phase, two properties that are characteristic of each subcarrier in the frequency domain. CSI information is more temporally stable than RSSI. More importantly, the CSI values of multi-subcarriers reasonably reflect the multipath effects. Based on these advantages, a CSI-based indoor localization scheme can achieve good performance. However, only orthogonal frequency division multiplexing (OFDM)-based wireless systems can extract the CSI because they use multiple subcarriers for data transmission; other modulation schemes such as direct sequence spread spectrum cannot provide this value.
Trajectory tracking methods that make use of real-time acceleration information to track an object are described in [11]. A future position of an object can be inferred from knowledge of its present position, speed and real-time acceleration information. To measure acceleration and speed in real time, acceleration sensors and gyroscopes are used in robots or aircrafts. However, without real-time calibration in indoor environments, this method results in large accumulated errors.
Trajectory tracking based on consecutive object recognition in videos has been one of the most active research topics in recent decades, particularly in the field of machine vision [12]. Visual tracking remains a challenging problem due to many factors, e.g., shifting viewpoint, signal noise, background clutter, illumination changes, and object deformation due to movement and image overlapping. A tracking mechanism was proposed in [13] that combined a structural regional hierarchy method to represent an object with a novel graph-matching algorithm. This algorithm has robust performance due to the hierarchical nature of its object representation. However, this method requires special video capture infrastructure; consequently, it is impractical in WSNs.
The continuous position fingerprint of a single object over time must correspond to its adjacent position in space. This spatiotemporal correlation can be regarded as a constraint in the trajectory tracking procedure. Some heuristic information can be mined in conjunction with the deployment of reference nodes. Existing indoor trajectory tracking schemes for WSNs are mainly based on continuous localization methods and cannot make use of heuristic information of an RSSI time series within a certain temporal and spatial range. The heuristic information of an RSSI time series includes some key factors for the trajectory tracking procedure. This study aims to design a novel trajectory tracking scheme that mines heuristic information to improve the accuracy of trajectory tracking. In this paper, the position of a moving node on the boundary is determined according to the change tendency of RSSI, and the moving trajectory is determined according to the RSSI time series.
In summary, the main contributions of this paper are as follows:
  • A novel indoor trajectory tracking scheme for WSNs is proposed based on Delaunay triangulation and heuristic information (TTDH). TTDH combines range free localization algorithms with position fingerprint localization algorithms. The error caused by uncertainty and fluctuation of RSSI can be effectively restrained in TTDH.
  • Algorithms that extract heuristic information from RSSI time series are designed. Heuristic information includes some key factors for the trajectory tracking procedure. The principle of heuristic information is strictly proven mathematically. The temporal information and spatial information in WSNs are fully utilized to mine the heuristic information.
  • The moving trajectory of an object is formed by means of a dynamic time-warping-position-fingerprint-matching algorithm with heuristic information constraints. TTDH has a good robustness, and that error does not accumulate among the regions. Field experiments show that the average error distance of the tracked trajectory is less than 1.5 m.
The rest of this paper is organized as follows. Section 2 first provides some related background information. Section 3 presents the TTDH scheme and the algorithm design. In Section 4, we provide the results of experiments and a discussion. Finally, we present conclusions in Section 5.

2. Related Work

Trajectory tracking is a continuous localization process. A conventional trajectory tracking method first locates an object and then forms a trajectory using moving-object data-mining techniques. In contrast, using heuristic information, we consider trajectory tracking and localization as a whole. This section introduces the basic theory of Delaunay triangulation. We propose and prove the peak phenomenon on the boundary. Then, the approximate point in the triangulation (APIT) test principle is introduced to determine sequential triangular regions.
After the nodes are deployed at random, using a Voronoi diagram, a two-dimensional localization plane is partitioned into Voronoi cells (see Figure 1). A Voronoi cell is a region enclosed by real lines. A Voronoi cell could be either half-open or closed. The black symbol ∘ represents an unknown node and the red symbol ∘ represents a reference node in the center of a Voronoi cell. An unknown node must belong to a Voronoi cell whose center is the nearest among all reference nodes. That is,
0 < L i j 1 L i j 2 L i j k R ,
where R represents the communication radius between a reference node and an unknown node, j 1 , j 2 , , j k represents a sequence of reference nodes that can communicate directly with the unknown node, k represents the number of these reference nodes, and L i j k represents the distance between the unknown node i and the reference node j k . The unknown node ∘ belongs to the shaded region named Voronoi cell j 1 in Figure 1.
Delaunay triangulation is the dual graph of a Voronoi diagram. As shown in Figure 1, each triangle is enclosed by dotted lines and each side of the triangle links two reference nodes. Delaunay triangulation is an optimized triangulation in the sense of “maximized minimal angle”. Many applications in WSNs are based on Delaunay triangulation. For example, Wu et al. [14] used Delaunay triangulation to find the largest free space within a WSN that could hold the next deployment target. Constrained Delaunay triangulation is widely used in Geographic Information System (GIS) applications [15] and is embedded in common GIS software (e.g., the ArcGIS software).
Calculation of a Delaunay triangulation requires global information, namely, the exact positions of all the reference nodes in the WSN. We perform this calculation task in the central computer (a personal computer). The resulting Delaunay triangulation scheme will be used consistently unless a reference node is moved.
The total number n of Delaunay triangular regions satisfies Euler’s formula in topology:
e = p l + n ,
where p represents the total number of reference nodes, l represents the total number of sides, and Euler’s characteristic e is a constant. When the total number p of reference nodes is specified, l and n will vary because reference nodes are deployed differently.

3. Heuristic Information Detection and Constrained Fingerprint Matching Algorithm

As discussed above, RSSI measurements are easily affected by various factors. To improve the accuracy of localization and trajectory tracking, methods such as dimensionality reduction [16], multivariate statistics [17], and support vector machine [18,19] have been introduced into the fingerprint matching algorithm. Our scheme mines some heuristic information, which reveals the spatiotemporal correlation in conjunction with the process of trajectory tracking.

3.1. Peak Value Phenomenon on the Boundary

Based on the excellent features of Delaunay triangulation, a common side is a line segment between the two closest reference nodes. Our scheme considers a common side as a boundary between two adjacent triangular regions. As an unknown node moves continuously, it will pass through every triangle along its moving trajectory; therefore, it will cross over the common side between adjacent triangles. As shown in Figure 2, the common side j 1 j 2 must intersect with the moving trajectory. Consequently, the RSSI measurements received from the two reference nodes can be considered as a time series R b :
R b = ( r b 1 , r b 2 , r b 3 , , r b k , , r b l ) ,
r b k = ( r j 1 k + r j 2 k ) / 2 .
For example, assume that j 1 j 2 is a common side that represents a boundary. R b represents the RSSI time series related to boundary j 1 j 2 . b is the bth boundary, l is the length of boundary time series R b , and r j 1 k and r j 2 k represent RSSI measurements received separately from j 1 and j 2 at nearly the same time. The time series element r b k is the mean of r j 1 k and r j 2 k , and k is the kth element.
As an unknown node gradually approaches, intersects, and moves away from the common side, R b will increase during the approach phase and decrease during the departing phase. These changes tend to coincide with the wireless signal transmission model.
Theorem 1.
Provided there is no noise, the maximal value of R b will be located at the intersection between boundary j 1 j 2 and the moving trajectory.
Proof of Theorem 1.
As shown in Figure 2, boundary j 1 j 2 could be in an arbitrary direction. We first rotate and translate the coordinates to ensure that boundary j 1 j 2 is vertical. As shown in Figure 3, j 2 = j 1 j 2 = q . P k represents the kth position related to boundary j 1 j 2 time series R b . x and y are the position coordinates of the unknown node at this time.
For a radio channel, wireless signal propagation in an indoor environment is dominated by multipath, diffraction, and scattering of the radio waves caused by structures within the building [7]. There are several wireless signal transmission models, including the free-space propagation model, the Rayleigh fading model and the logarithmic shadowing model. The logarithmic shadowing model considers the factors mentioned above synthetically and is both simpler and more accurate than other models in indoor environments [20]. We adopt this model for further discussion. The relationship between the RSSI and propagation distance can be described as follows:
P ( d 0 ) P ( d ) = d d 0 β ,
R ( d ) = 10 lg P ( d ) ,
R ( d ) = R ( d 0 ) 10 β lg ( d / d 0 ) ,
where R ( d ) (dBm) represents the RSSI related to the propagation distance d. R ( d 0 ) represents the RSSI at the reference node whose propagation distance is d 0 . P ( d ) (mw) represents the mean received signal power related to the propagation distance d, and P ( d 0 ) represents the mean received signal power at the reference node whose propagation distance is d 0 . In general, P ( d 0 ) takes the mean received signal power when d 0 = 1 m. The path attenuation factor, β , indicates the rate at which the path loss of the mean received signal power increases with distance. In theory, β will vary according to the environment. However, it is reasonable to assume that β is a constant within a small range. From Equation (7), it is evident that the RSSI will decrease as the propagation distance d increases when β satisfies certain conditions. We regard r b k , which is related to the moving trajectory (see Figure 3), as a function of the point p k ( x , y ) :
r b k = 2 R ( d 0 ) 10 β lg ( ( q x ) 2 + ( q y ) 2 ) 10 β lg ( ( q x ) 2 + y 2 ) ,
( r b k ) x = 10 2 ln 10 β ( x q ) [ ( q x ) 2 + ( q y ) 2 ] + β ( x q ) [ ( q x ) 2 + y 2 ] .
As shown in Figure 3, q is the length of boundary j 1 j 2 . When x = q , ( r b k ) ( x ) = 0 . In view of this real problem, r b k will achieve its maximal value only at the stationary point, and this stationary point must be on boundary j 1 j 2 .  ☐
The phenomenon illustrates a definite change tendency about R b . The maximal value could occur at a small deviation relative to boundary j 1 j 2 due to discrete RSSI measurement errors. We will discuss this problem further in Section 4.
Based on experimental data, a peak value phenomenon will occur with a high likelihood when the length of a boundary is below 50% R, where R represents the communication radius. Without loss of generality, the deployment of reference nodes can be eligible.

3.2. Delaunay Triangulation Inside/Outside Decision Based on APIT

The approximate point in the triangulation (APIT) [21,22] localization method is a typical range-free localization scheme and is widely used for position estimation in WSNs because of its robustness to irregular wireless transmission models and random node distributions. The APIT test is an approximate algorithm of the point in triangulation (PIT) method. We first introduce PIT.
As shown in Figure 4a, many triangular regions are formed by reference nodes. PIT uses the change tendency of the RSSI to estimate the triangular region in which an unknown node is located. The relationship between an unknown node M and a triangular region ΔABC is that the node is either inside or outside the triangle. The reference nodes A, B, C are three vertices of the Delaunay triangle in which the unknown node M resides. In the first case, when the unknown node M is moved, the distances MA, MB, and MC impossibly increase or decrease simultaneously (see Figure 4b). In the other case, when the unknown node M is moved, at least in one direction, the distances MA, MB, and MC must definitely increase or decrease simultaneously (see Figure 4c). According to the monotonic relationship between the RSSI and propagation distance, if a direction exists such that the RSSI measurements received by the unknown node M from the three reference nodes increase or decrease simultaneously in this direction, then we can determine that the unknown node M is outside the triangle formed by the three reference nodes. Otherwise, M is inside the triangle. This is the PIT test. Essentially, PIT is an exhaustive approach that is infeasible in practice.
Exchanging adjacent node information in APIT is regarded as node movement in PIT. As shown in Figure 5a, 1, 2, 3, and 4 are adjacent nodes of M. If no identical change (increase/decrease) occurs between M and each adjacent node, M is assumed to be inside the triangular region ΔABC. Otherwise, M is outside this triangular region. As an approximate substitute, experiments have confirmed that the error rate of APIT tests is relatively low (less than 14% in the worst case) when the node density (the average number of nodes per node radio area) is greater than 6 [21].
A series of APIT tests are performed during the process of node movement. Unlike classic APIT methods, Delaunay triangulation is regarded as a triangular unit in our TTDH. A group of variables are introduced to aggregate the processed results, and each variable is initially set to 0. The number of variables is equal to n in Equation (2). If M is inside a triangular unit, the corresponding variable is incremented by 1. If M is outside a triangular unit, the corresponding variable maintains unchanged. As shown in Figure 6, the variables related to a triangular unit crossed by the trajectory are larger than the other variables. We can then determine which triangular units the unknown node has crossed. Compared with the APIT method, continuous aggregation can improve the accuracy rate of a triangular unit decision.
The numbers in triangular units are the accumulated results (see Figure 6). There is an error (number 1) related to a single APIT test, but it does not typically affect the precision of the entire decision (it can sometimes be affected; we will discuss this problem further in Section 4). It is evident from Figure 6 that these triangular units, related to the numbers 2, 3, 5, 3, and 2 from left to right, are considered triangular regions crossed by the trajectory.
After the sequential triangular regions have been detected, the common sides of adjacent triangular regions must be the boundaries intersected by the trajectory.
The pseudocode for the Delaunay triangulation inside/outside decision based on APIT is as Algorithm 1:
Algorithm 1 Delaunay Triangulation Inside/Outside Decision Based on APIT
  • Input: Delaunay triangulation of an experiment site, the RSSI of an object node and its surrounding nodes; 
  • Output: the sequential triangular regions where the monitored object resides for a period of time;  
  • 1. Set all accumulated variables A D T i to initial value 0;  
  • 2. for (each position corresponding to a regular time interval on the trajectory) 
  • 3. for (each triangular unit D T i
  • 4. { 
  • 5. if (APIT( D T i ) == outside) A D T i maintains unchanged; 
  • 6. if (APIT( D T i ) == inside) A D T i incremented by 1; 
  • 7. } 
  • 8. Find the sequential triangular regions with the adjacent maximal accumulated values.
The symbol ∘ represent a series of test positions (see Figure 6). The algorithm shows how the aggregated variables reflect the positional information in both the temporal and spatial domains. The continuous APIT tests reveal the time dimension information and Delaunay triangulation reveals the spatial dimension information. The value of the accumulated variables depends on the length of the trajectory separated by triangular regions (the length will largely determine the number of APIT tests).

3.3. Boundary Detection Based on Time Series

A classic fingerprinting algorithm consists of two phases: offline and online. In the first phase, the experimental site is divided into 0.5 m × 0.5 m square grids and RSSI measurements are collected at each intersection. In the online phase, the RSSI vector information of a moving object will be detected and recorded. Then, the received RSSI vector will be compared with the fingerprint map table to determine the position of the moving object. Finally, the trajectory is formed by mining the position information. In our scheme, to detect the position related to the peak value on the boundary, a boundary fingerprint table is organized independently and indexed by the boundary information. When a segment of a boundary belongs to two adjacent square grids, the square grid with the higher ratio is selected as the boundary fingerprint (Boundary j 1 j 2 is shown in Figure 7a, the green grid is selected in Figure 7b. Figure 7b is an enlargement of the red ellipse in Figure 7a. The boundary fingerprint format is as follows:
( ( j 1 , j 2 ) , ( x , y ) , R S S I v e c t o r m e a n ) ,
where j 1 and j 2 are the endpoints of boundary j 1 j 2 , x and y are coordinates of the square grid, and R S S I v e c t o r m e a n is the corresponding position fingerprint. For the purpose of tractability, j 1 j 2 is the requirement.
Unlike the existing fingerprinting model, we can determine the boundary on which the unknown node resides using the peak value before matching the fingerprint. To reduce the impact of noise, we use a moving least square (MLS) method to process the boundary time series R b (see Figure 8). The discrete RSSI information is converted into a continuous curve in the temporal dimension. Then, the change tendency and peak value of the curve will be detected. MLS is a segmented least-square fitting method that ensures the curve will be smooth. The MLS formulas are as follows:
l i n e a r b a s e P ( x ) = [ 1 , x ] T ,
c o e f f i c i e n t v e c t o r a ( x ) = A 1 ( x ) B ( x ) y ,
where
A ( x ) = j = 1 n w ( x x j ) p ( x j ) p T ( x j ) ,
and n represents the number of nodes within the range of influence. Then,
B ( x ) = [ w ( x x 1 ) p ( x 1 ) , w ( x x 2 ) p ( x 2 ) , , w ( x x n ) p ( x n ) ]
and
y T = [ y 1 , y 2 , , y n ] ,
and the fitting function is
f ( x ) = i = 1 m a i ( x ) p i ( x ) ,
where m represents the number of terms in the linear base:
w ( γ ) = 2 / 3 4 γ 2 + 4 γ 3 , ( γ 1 / 2 ) , 4 / 3 4 γ + 4 γ 2 4 γ 3 / 3 , ( 1 / 2 < γ 1 ) , 0 , ( γ > 1 ) ,
and
γ = ( x x i ) / γ m a x ,
where γ m a x represents the length of the range of influence. The weighted sum of several of the surrounding primitive RSSI measurements substitutes for the primitive RSSI measurement. The cubic spline function w ( γ ) is selected as the weight function. The weight of each primitive data point is different. The smaller the distance between the primitive point and the substitutive point, the larger the corresponding weight (see Equations (16) and (17)). The curve fitting accuracy depends on the rank number of the base function P ( x ) . Based on field experiments, a linear base is selected.
After the peak value is detected, we can obtain the corresponding time instant (in Figure 8, the blue perpendicular dotted line indicates the time instant). Then, the fingerprint at this time instant can be matched to the boundary fingerprint table. The start and end points of the segmented trajectory are determined. Compared with the conventional fingerprint matching algorithm, the boundary information is highly accurate at the given time instant. This conclusion has been verified both theoretically and through practical application.
The pseudocode for calculating the position at the time instant related to the peak value is as Algorithm 2:
Algorithm 2 Calculating the Position at the Time Instant Related to the Peak Value
  • Input: boundary fingerprint table, adjacent triangular regions, boundary RSSI time series R b
  • Output: start and end points of the segmented trajectory;  
  • 1. {  
  • 2. Fit boundary RSSI time series R b by MLS; 
  • 3. Find the peak value; 
  • 4. Determine the start and end points of the segmented trajectory. 
  • 5. }

3.4. Dynamic Time-Warping Position-Fingerprint-Matching Algorithm with Constraints

Dynamic time warping (DTW) is a kind of nonlinear warping technology that combines warping in the time dimension with distance measurements [23]. DTW uses nonlinear warping technology to determine the maximal overlap between two paths, essentially removing the time difference. As shown in Figure 9a, the Euclidean distance measurement requires aligning the data in the time dimension; in DTW, the distance measurement eliminates the time difference (see Figure 9b). DTW can achieve minimal distortion in terms of change tendency measurement [23]. Moreover, it can process two time series of different lengths and is a robust approach.
Position fingerprints corresponding to a segment of trajectory can be processed as a time series. As shown in Figure 10, the two endpoints of the segmented trajectory within a triangular region are on different boundaries, respectively. We search for the most similar candidate trajectory within the triangular region for the time series detected. The DTW distance measurement is defined as follows:
D D T W ( U , W ) = D b a s e ( u 1 , w 1 ) + m i n D D T W ( U , W [ 2 : ] ) , D D T W ( U [ 2 : ] , W ) , D D T W ( U [ 2 : ] , W [ 2 : ] ) ,
where U = ( u 1 , u 2 , , u n 1 ) represents a time series in the online phase, W = ( w 1 , w 2 , , w n 2 ) represents a candidate time series in the offline phase, and n 1 and n 2 are the lengths of U and W, respectively, and
D b a s e ( u 1 , w 1 ) = u 1 w 1 2 ,
where D b a s e ( u 1 , w 1 ) represents the Euclidean distance between position fingerprints u 1 and w 1 . The recursive definition of D D T W can measure the similarity between two time series with different lengths. Equation (19) shows that the DTW algorithm can be implemented with dynamic programming. The three conditions that must be satisfied by each candidate trajectory time series are as follows:
  • The start point is p s , and the end point is p e , where p s and p e represent the heuristic information on the boundary.
  • The candidate trajectory must reside entirely within the triangular region.
  • The candidate trajectory must be continuous, which means that the trajectory must be composed of a series of position fingerprints related to adjacent square grid units (see Figure 10).
The length of a candidate trajectory W is not necessarily equal to that of U. We introduce the DTW algorithm to match position fingerprints with different lengths. The most similar candidate trajectory is regarded as the tracked trajectory.
Compared with traditional fingerprint matching, on one hand, this approach mainly considers the change tendency of a trajectory, while on the other hand, the continuous position fingerprint in the time dimension must also be continuous in the space dimension.
The pseudocode for the dynamic time-warping position-fingerprint-matching algorithm is as Algorithm 3:
Algorithm 3 Dynamic Time-Warping Position-Fingerprint-Matching Algorithm
  • Input: fingerprint time series, triangular region, start point, end point, fingerprint map table; 
  • Output: the most similar candidate trajectory within the triangular region;  
  • 1. {  
  • 2. Fit fingerprint time series by MLS; 
  • 3. For (each candidate trajectory satisfying the three conditions mentioned above) 
  • 4. Calculate D D T W between the candidate trajectory and the fitted fingerprint time series; 
  • 5. Find the minimal D D T W , which denotes the most similar candidate trajectory. 
  • 6. }

4. TTDH Performance Evaluation

To verify the performance of our TTDH trajectory tracking scheme, this section describes a series of field experiments in which we used a CC2530 transceiver chip. A reference node and an unknown node are shown in Figure 11. The indoor area is a deep foundation pit for a metro station whose size is 50 m × 30 m (Figure 12). All the reference nodes are randomly deployed on the roof of the pit. Workers wearing helmets and construction machinery move about in the region as needed. Each unknown node is attached to a helmet or resides on a transporter. The trajectory of a worker or a transporter is formed by tracking the corresponding unknown nodes. There are no intervening walls in the area.

4.1. TTDH Framework

The steps of the TTDH scheme are as follows:
Step 1.
Perform Delaunay triangulation based on the positional information of all reference nodes.
Step 2.
Collect position fingerprints in square grid units and form a fingerprint map table.
Step 3.
Organize a boundary fingerprint table and create an index on this table with the boundary information.
Step 4.
Perform continuous Delaunay triangulation inside/outside decisions to obtain the sequential triangular regions.
Step 5.
Determine the start and end points of a segmented trajectory.
Step 6.
Execute the dynamic time-warping position-fingerprint-matching algorithm to form a trajectory segment.
The first three steps are initialization steps. Then, the remaining steps are repeated with tracking processes. We assume that the reference nodes have not been moved. If a reference node is moved, we start all the steps over again.

4.2. Fingerprint Collection

The TTDH scheme requires a fingerprint map table and a boundary fingerprint table. Considering the computing capability and storage capacity of a wireless node, we perform this computing work at a central computer. That is, fingerprints are collected and stored by the central computer in the offline phase. Then, real-time RSSI measurements received by an unknown node are uploaded to this computer and processed during the online phase.

4.3. Key Data Structure Setting

The APIT tests are performed continuously by exchanging information between a monitored node and its neighbors. A monitored node is allocated a group of accumulated variables whose number is equal to the total number of triangular regions.
It must be determined whether a point is inside/outside a triangular region. The exchanged information consists only of the ID numbers of the reference nodes, the ID numbers of the neighboring nodes and the corresponding RSSI, as shown in Table 1. Each monitored node’s information is transmitted to the central computer and merged (Table 2).
By searching the columns in the merged information table, if a column exists in which all members are larger/smaller than those of the monitored node, we can assume that the point is outside the region. If no such column is found, we can assume that the point is inside. Therefore, the decision regarding any triangular region can be made as described above and all triangular regions within the node’s communication radius can be determined in the same way.
In a fixed time interval, a series of APIT tests will be performed, and the results will be aggregated. For trajectory tracking, the continuous APIT tests based on Delaunay triangulation reflect a spatiotemporal correlation. A single inside/outside decision error can be masked by the aggregation mechanism.

4.4. Boundary Detection

We performed independent field experiments to detect the peak value on the boundary. As shown in Figure 13, the reference nodes are deployed in square grid units where the length of each side, q, is equal to 7 m.
Overall, the experimental results show that the boundary time series monotonically decreases as the distance increases. There are some exceptions in the discrete RSSI measurements (e.g., the peak value on boundary 2). A boundary time series is fitted into a smooth curve, and by using MLS, we can effectively eliminate the impact from such exceptions. In general, our scheme can obviously detect the peak value on each boundary. The three perpendicular dotted lines indicate the time instants when the monitored node passes through each boundary. Note that a small bias exists between the second perpendicular dotted line and the real position. The reasons causing this bias are as follows:
  • A reference node communicates with an unknown node at regular time intervals. It is difficult to guarantee that the communication occurs exactly on the boundary.
  • The uncertainty of RSSI measurements introduces error.
Fortunately, the experimental results show that the probability that the bias is less than 1 s in a 0.5 s time interval is above 93%, which translates to an error distance of less than 1.3 m.

4.5. Triangular Region Detection

There are 31 reference nodes in the study area. The corresponding Voronoi diagram and Delaunay triangulation are shown in Figure 14, where the red symbol ∘ represents a reference node and the yellow line segments constitute a Voronoi diagram. In the Delaunay triangulation, a blue line segment is a boundary. The heuristic information means the triangular regions and boundaries crossed by the trajectory. The red dotted line denotes a test trajectory.
Figure 15a shows the average triangular-region error percentage as a function of node density, while Figure 15b shows this error percentage as a function of the number of APIT tests within a triangular area.
  • The APIT test employs neighbor information to emulate the movement of a monitored node in different directions. The higher the node density is, the more accurate the triangular region detection will be. When the node density is greater than 5, the average region error percentage falls to 8.5% accuracy improvement compared with classical APIT.
  • Our scheme aggregates the results of discrete APIT tests to decide which triangular region has been crossed. The larger the triangular area is, the more APIT tests need to be performed. The greater the number of APIT tests is, the more accurate the triangular region detection will be. When the number of APIT tests within a triangular region is greater than 5, the region error percentage falls to 4.5%.
  • The impact of the movement speed of a monitored node is the same as the impact of the size of a triangular area, which determines the number of APIT tests within a triangular region. For an object at high speed, we can reduce the time interval discussed above to improve the accuracy.
  • Because the number of APIT tests is a key factor in the accuracy of triangular region detection, when sharp or narrow regions are crossed, the triangular region is not easily detected. As shown in Figure 14, the circled region in the upper right corner is difficult to detect. Sometimes, this phenomenon can be corrected by means of the continuity of a moving trajectory and information from adjacent regions (e.g., when two large regions have definitely been crossed, the short, sharp region between them must also have been crossed).

4.6. Forming A Trajectory by Means of the Dynamic Time-Warping Position-Fingerprint-Matching Algorithm

Based on the triangular region and boundary information, trajectory tracking becomes a segmented position-fingerprint-matching procedure. The corresponding positions on the boundary are used as the start and end points of the segmented trajectory. The average error distance (the Euclidean distance between the real position and the estimated position) of the tracked trajectory will fall to less than 1.5 m. A sliding window of 10 RSSI samples was mentioned in RADAR. Our TTDH scheme is essentially a sliding window method too: the difference is that one uses a standardized window size and the other uses an adjustable size. In RADAR, the continuous movement is split into a series of regular sliding windows mechanically, while, in our scheme, the sliding window is combined with the reference nodes deployment and the monitored node movement.
The start and end points are on the common side of two adjacent triangular regions; therefore, the end point of the former region is the start point of the latter region. The DTW algorithm matches data from a sequence of fingerprints rather than one. A segment of the trajectory is formed independently, and each peak value with high accuracy is used as a calibrated point. The error does not accumulate among the triangular regions. These factors make the tracked trajectory smooth and accurate.
Field experiments show that our method performs better than RADAR, which is a typical method based on position fingerprint. Even when the RSSI measurements include a large amount of signal noise, the trajectory tracked by our method is more accurate due to the region and boundary constraints.

4.7. Impact of Multipath Effect and Deployment of Reference Nodes

In the fields of location and trajectory tracking, multipath effect leads to time delay, which has a serious effect on TOA (Time of Arrival) localization algorithm [5]. In this paper, we use the algorithm based on RSSI position fingerprint, and the signal strength fluctuation caused by multipath fading is the main influence. In order to reduce the impact of discrete RSSI fluctuation, the following measures have been adopted:
  • Due to the presence of multipath effect, RSSI will fluctuate and result in a possible error in the single APIT test. As previously mentioned, the error rate of single APIT test is relatively low when the node density is greater than 6. The results of discrete APIT tests are aggregated to decide which triangular region has been crossed. The accuracy of triangular region detection is mainly determined by the number of APIT tests. When the number of APIT tests within a triangular region is greater than 5, the region error percentage can reach 95.5%. The aggregation mechanism can effectively mask a single inside/outside decision error caused mainly by multipath effect. On average, node density greater than 6 and triangular regions with relatively large areas are required in TTDH.
  • As shown in Figure 13, there are some exceptions in the discrete RSSI measurements caused mainly by the multipath effect. A boundary time series is fitted into a smooth curve by using MLS. The change tendency of boundary time series R b is more easily detected than the direct localization. TTDH can effectively eliminate the impact from such exceptions. The experimental results show that the probability of a bias occurring of less than 1 s in 0.5 s time interval is above 93%, which means an error distance of less than 1.3 m.
  • Fingerprints are measured in the actual environment, and environmental factors (e.g., multipath effect) have been considered. The track is formed by using a DTW (dynamic-time-warping position-fingerprint-matching algorithm with heuristic information constraints) algorithm. The Rayleigh fading model [7] and the Rician distribution model [7] are not used, which are mainly used in range based localization system.
  • When a Delaunay triangle is too large, the real-time performance will be bad due to TTDH forming a segment of trajectory as a unit of triangular region. Therefore, the Delaunay Triangulation related to the positions of all reference nodes should try to be balanced in size and shape and avoid forming sharp or narrow regions.

5. Conclusions

In this paper, we described the design and development of a novel indoor trajectory tracking scheme called TTDH. In this method, Delaunay triangulation is performed based on reference nodes as spatial information, and the peak value of time series is regarded as temporal information. TTDH makes the best of the temporal information and spatial information in WSNs to mine the heuristic information. This heuristic information includes the triangular region in which an unknown node is located and the boundary on which the unknown node resides at the peak value of the corresponding time series. Then, TTDH forms a segment of trajectory of the monitored object using a dynamic-time-warping-position-fingerprint-matching algorithm with constraints. In this procedure, the aggregation mechanism of discrete APIT tests can effectively improve the accuracy of triangular region detection and the boundary information can be detected with high accuracy.
Field experiments show that TTDH achieves good trajectory accuracy and smoothness. The average error distance of this trajectory tracking method can be reduced to less than 1.5 m, and the error does not accumulate among the triangular regions. In summary, TTDH combines a fingerprint matching method with a range-free localization method, and its good performance stems from making full use of heuristic information.

Acknowledgments

This research was supported by the National Key Research and Development Program of China (No. 2016YFC0801607), the National Natural Science Foundation of China (No. 61540004), the Natural Science Foundation of Inner Mongolia of China (2015MS0619, 2013MS0920), and the higher educational scientific research project of Inner Mongolia (NJZY091).

Author Contributions

Junping Qin and Qingxu Deng conceived the thesis research ideas, designed the experiments, and analyzed the data. Junping Qin and Shiwen Sun performed the experiments. Limin Liu and Yonghong Tian provided suggestions and critical insights during the development of this paper. Junping Qin wrote the manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Tsirmpas, C.; Rompas, A.; Fokou, O.; Koutsouris, D. An indoor navigation system for visually impaired and elderly people based on Radio Frequency Identification (RFID). Inf. Sci. 2015, 320, 288–305. [Google Scholar] [CrossRef]
  2. Wallgrun, J. Hierarchical Voronoi Graphs Spatial Representation and Reasoning for Mobile Robots; Springer: Berlin, Germany, 2010. [Google Scholar]
  3. Hofmann-Wellenhof, B.; Lichtenegger, H.; Collins, J. Global Positioning System: Theory and Practice, 5th ed.; Springer: Berlin, Germany, 2012. [Google Scholar]
  4. Zhang, H.; Yuan, W.; Shen, Q.; Li, T.; Chang, H. A handheld inertial pedestrian navigation system with accurate step modes and device poses recognition. IEEE Sens. J. 2015, 3, 1421–1429. [Google Scholar] [CrossRef]
  5. Qian, Z.; Sun, D.; Leung, V. A Survey on Localization on Model in Wireless Network. Chin. J. Comput. 2016, 39, 1237–1256. [Google Scholar]
  6. Xie, Y.; Wang, Y.; Nallanathan, A.; Wang, L. An Improved K-Nearest-Neighbor Indoor Localization Method Based on Spearman Distance. IEEE Signal Process. Lett. 2016, 23, 351–355. [Google Scholar] [CrossRef]
  7. Bahl, P.; Padmanabhan, V.N. RADAR: An In-building RF-based User Location and Tracking System. In Proceedings of the IEEE 19th International Conference on Computer Communications, Tel Aviv, Israel, 26–30 March 2000; pp. 775–784. [Google Scholar]
  8. Wu, K.; Xiao, J.; Yi, Y.; Chen, D. CSI-based indoor localization. IEEE Trans. Parallel Distrib. Syst. 2013, 24, 1300–1309. [Google Scholar] [CrossRef]
  9. Shu, J.; Liu, S.; Liu, L.; Zhan, L.; Hu, G. Research on Link Quality Estimation Mechanism for Wireless Sensor Networks Based on Support Vector Machine. Chin. J. Electron. 2017, 26, 377–384. [Google Scholar] [CrossRef]
  10. Shang, J.; Sheng, L.; Cheng, T.; Shi, H.; Yue, K. The Indoor Localization Based on LQI Weight and Improved Particle Swarm Optimization Algorithm. Chin. J. Sens. Actuators 2017, 30, 284–290. [Google Scholar]
  11. Bao, S.-D.; Meng, X.-L.; Xiao, W.; Zhang, Z.-Q. Fusion of Inertial/Magnetic Sensor Measurements and Map Information for Pedestrian Tracking. Sensors 2017, 17, 340. [Google Scholar] [CrossRef] [PubMed]
  12. Yang, H.; Shao, L.; Zheng, F.; Wang, L.; Song, Z. Recent advances and trends in visual tracking: A review. Neurocomputing 2011, 74, 3823–3831. [Google Scholar] [CrossRef]
  13. Song, Y.-Z.; Li, C.; Wang, L.; Hall, P.; Shen, P. Robust visual tracking using structural region hierarchy and graph matching. Neurocomputing 2012, 89, 12–20. [Google Scholar] [CrossRef]
  14. Wu, C.H.; Lee, K.; Chung, Y. A Delaunay triangulation based method for wireless sensor network deployment. Comput. Commun. 2007, 30, 2744–2752. [Google Scholar] [CrossRef]
  15. Liu, S.; Hu, X.; Xi, Y.; Liu, T. D inverse modeling for potential fields on rugged observation surface using constrained Delaunay triangulation. Comput. Geosci. 2015, 76, 18–30. [Google Scholar] [CrossRef]
  16. Fang, S.-H.; Lin, T.-N. Principal component localization in indoor WLAN environments. IEEE Trans. Mob. Comput. 2012, 11, 100–110. [Google Scholar] [CrossRef]
  17. Zhang, X.; Yang, Z.; Wu, C.; Sun, W.; Liu, Y.; Xing, K. Robust trajectory estimation for crowdsourcing based mobile application. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 1876–1885. [Google Scholar] [CrossRef]
  18. Mao, K.; Fan, C.; Ye, F.; Wang, P.; Chen, Q. Node Localization Algorithm in Wireless Sensor Networks Based on SVM. J. Comput. Res. Dev. 2014, 51, 2427–2436. [Google Scholar]
  19. Shi, K.; Chen, H.-S.; Zhang, R.-T. Indoor Location Method Based on Support Vector Regression in 802.11 Wireless Environments. J. Softw. 2014, 25, 2636–2651. [Google Scholar]
  20. Seidel, S.Y.; Rapport, T.S. 914 MHz path loss prediction Model for Indoor Wireless Communications in Multi-floored buildings. IEEE Trans. Antennas Propag. 1992, 40, 207–217. [Google Scholar] [CrossRef]
  21. He, T.; Huang, C.; Blum, B.M.; Stankovic, J.A.; Abdelzaher, T. Range-free localization schemes for large scale sensor networks. In Proceedings of the 9th annual international conference on Mobile computing and networking, San Diego, CA, USA, 14–19 September 2003; pp. 81–95. [Google Scholar]
  22. Liu, J.; Wang, Z.; Yao, M.; Qiu, Z. VN-APIT: Virtual nodes-based range-free APIT localization scheme for WSN. Wirel. Netw. 2016, 22, 867–878. [Google Scholar] [CrossRef]
  23. Wang, J.; Katabi, D. Dude, where’s my card?: RFID positioning that works with multipath and non-line of sight. ACM SIGCOMM Comput. Commun. Rev. 2013, 43, 51–62. [Google Scholar] [CrossRef]
Figure 1. Voronoi diagram and Delaunay triangulation.
Figure 1. Voronoi diagram and Delaunay triangulation.
Sensors 17 01275 g001
Figure 2. Heuristic information based on Delaunay triangulation.
Figure 2. Heuristic information based on Delaunay triangulation.
Sensors 17 01275 g002
Figure 3. Relationship between boundary j 1 j 2 and moving trajectory.
Figure 3. Relationship between boundary j 1 j 2 and moving trajectory.
Sensors 17 01275 g003
Figure 4. PIT (point in triangulation) principle: (a) Position estimation; (b) Inside; (c) Outside.
Figure 4. PIT (point in triangulation) principle: (a) Position estimation; (b) Inside; (c) Outside.
Sensors 17 01275 g004
Figure 5. APIT (approximate point in the triangulation) principle: (a) Inside; (b) Outside.
Figure 5. APIT (approximate point in the triangulation) principle: (a) Inside; (b) Outside.
Sensors 17 01275 g005
Figure 6. APIT based Delaunay triangulation inside decision.
Figure 6. APIT based Delaunay triangulation inside decision.
Sensors 17 01275 g006
Figure 7. Boundary fingerprint table: (a) Boundary j 1 j 2 ; (b) Select grid.
Figure 7. Boundary fingerprint table: (a) Boundary j 1 j 2 ; (b) Select grid.
Sensors 17 01275 g007
Figure 8. Boundary detecting based on time series.
Figure 8. Boundary detecting based on time series.
Sensors 17 01275 g008
Figure 9. Dynamic time warping principle: (a) Euclidean distance; (b) DTW (Dynamic time warping) distance.
Figure 9. Dynamic time warping principle: (a) Euclidean distance; (b) DTW (Dynamic time warping) distance.
Sensors 17 01275 g009
Figure 10. Constrained position fingerprint matching.
Figure 10. Constrained position fingerprint matching.
Sensors 17 01275 g010
Figure 11. Nodes: (a) Reference node; (b) Unknown node.
Figure 11. Nodes: (a) Reference node; (b) Unknown node.
Sensors 17 01275 g011
Figure 12. Deep foundation pit of a metro station.
Figure 12. Deep foundation pit of a metro station.
Sensors 17 01275 g012
Figure 13. Boundary detecting.
Figure 13. Boundary detecting.
Sensors 17 01275 g013
Figure 14. Region detecting based on Delaunay triangulation.
Figure 14. Region detecting based on Delaunay triangulation.
Sensors 17 01275 g014
Figure 15. TTDH average region error: (a) Under varying node density; (b) Under varying region area.
Figure 15. TTDH average region error: (a) Under varying node density; (b) Under varying region area.
Sensors 17 01275 g015
Table 1. Exchanged information table.
Table 1. Exchanged information table.
Reference Node IDUnknown Node ID
A R S S I A
B R S S I B
C R S S I C
Table 2. Merged information table.
Table 2. Merged information table.
Reference Node IDUnknown Node Self-IDUnknown Node ID 1 Unknown Node ID m
A R S S I A R S S I A R S S I A
B R S S I B R S S I B R S S I B
C R S S I C R S S I C R S S I C

Share and Cite

MDPI and ACS Style

Qin, J.; Sun, S.; Deng, Q.; Liu, L.; Tian, Y. Indoor Trajectory Tracking Scheme Based on Delaunay Triangulation and Heuristic Information in Wireless Sensor Networks. Sensors 2017, 17, 1275. https://doi.org/10.3390/s17061275

AMA Style

Qin J, Sun S, Deng Q, Liu L, Tian Y. Indoor Trajectory Tracking Scheme Based on Delaunay Triangulation and Heuristic Information in Wireless Sensor Networks. Sensors. 2017; 17(6):1275. https://doi.org/10.3390/s17061275

Chicago/Turabian Style

Qin, Junping, Shiwen Sun, Qingxu Deng, Limin Liu, and Yonghong Tian. 2017. "Indoor Trajectory Tracking Scheme Based on Delaunay Triangulation and Heuristic Information in Wireless Sensor Networks" Sensors 17, no. 6: 1275. https://doi.org/10.3390/s17061275

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop