Jie Gao Joint work with Amitabh Basu*, Joseph Mitchell, Girishkumar Stony Brook Distributed Localization using Noisy Distance and Angle Information.

Slides:



Advertisements
Similar presentations
Routing Complexity of Faulty Networks Omer Angel Itai Benjamini Eran Ofek Udi Wieder The Weizmann Institute of Science.
Advertisements

Impact of Interference on Multi-hop Wireless Network Performance Kamal Jain, Jitu Padhye, Venkat Padmanabhan and Lili Qiu Microsoft Research Redmond.
Primal Dual Combinatorial Algorithms Qihui Zhu May 11, 2009.
Differential Forms for Target Tracking and Aggregate Queries in Distributed Networks Rik Sarkar Jie Gao Stony Brook University 1.
Incremental Linear Programming Linear programming involves finding a solution to the constraints, one that maximizes the given linear function of variables.
Approximation Algorithms Chapter 14: Rounding Applied to Set Cover.
Spherical Representation & Polyhedron Routing for Load Balancing in Wireless Sensor Networks Xiaokang Yu Xiaomeng Ban Wei Zeng Rik Sarkar Xianfeng David.
Introduction to Algorithms
1 EE5900 Advanced Embedded System For Smart Infrastructure Static Scheduling.
Exact Inference in Bayes Nets
Beyond Trilateration: On the Localizability of Wireless Ad Hoc Networks Reported by: 莫斌.
Convex Hulls in Two Dimensions Definitions Basic algorithms Gift Wrapping (algorithm of Jarvis ) Graham scan Divide and conquer Convex Hull for line intersections.
How should we define corner points? Under any reasonable definition, point x should be considered a corner point x What is a corner point?
EMIS 8373: Integer Programming Valid Inequalities updated 4April 2011.
Convex Position Estimation in Wireless Sensor Networks
1 EL736 Communications Networks II: Design and Algorithms Class8: Networks with Shortest-Path Routing Yong Liu 10/31/2007.
Graph Laplacian Regularization for Large-Scale Semidefinite Programming Kilian Weinberger et al. NIPS 2006 presented by Aggeliki Tsoli.
Easy Optimization Problems, Relaxation, Local Processing for a small subset of variables.
Basic Feasible Solutions: Recap MS&E 211. WILL FOLLOW A CELEBRATED INTELLECTUAL TEACHING TRADITION.
Good afternoon everyone.
The Out of Kilter Algorithm in Introduction The out of kilter algorithm is an example of a primal-dual algorithm. It works on both the primal.
Los Angeles September 27, 2006 MOBICOM Localization in Sparse Networks using Sweeps D. K. Goldenberg P. Bihler M. Cao J. Fang B. D. O. Anderson.
A Randomized Polynomial-Time Simplex Algorithm for Linear Programming Daniel A. Spielman, Yale Joint work with Jonathan Kelner, M.I.T.
Totally Unimodular Matrices Lecture 11: Feb 23 Simplex Algorithm Elliposid Algorithm.
Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information 梁紀翔 王謙志 NETLab.
1 Introduction to Linear and Integer Programming Lecture 9: Feb 14.
ASWP – Ad-hoc Routing with Interference Consideration Zhanfeng Jia, Rajarshi Gupta, Jean Walrand, Pravin Varaiya Department of EECS University of California,
Network Coding Project presentation Communication Theory 16:332:545 Amith Vikram Atin Kumar Jasvinder Singh Vinoo Ganesan.
Approximation Algorithms
1 Localization Technologies for Sensor Networks Craig Gotsman, Technion/Harvard Collaboration with: Yehuda Koren, AT&T Labs.
Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy under contract.
Jana van Greunen - 228a1 Analysis of Localization Algorithms for Sensor Networks Jana van Greunen.
Easy Optimization Problems, Relaxation, Local Processing for a small subset of variables.
UMass Lowell Computer Science Advanced Algorithms Computational Geometry Prof. Karen Daniels Spring, 2007 O’Rourke Chapter 8 Motion Planning.
Course: Advanced Algorithms CSG713, Fall 2008 CCIS Department, Northeastern University Dimitrios Kanoulas.
C&O 355 Lecture 2 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A.
Computational Geometry Piyush Kumar (Lecture 5: Linear Programming) Welcome to CIS5930.
Adaptive CSMA under the SINR Model: Fast convergence using the Bethe Approximation Krishna Jagannathan IIT Madras (Joint work with) Peruru Subrahmanya.
Approximating Minimum Bounded Degree Spanning Tree (MBDST) Mohit Singh and Lap Chi Lau “Approximating Minimum Bounded DegreeApproximating Minimum Bounded.
17 th International Teletraffic Congress Topological design of telecommunication networks Michał Pióro a,b, Alpar Jüttner c, Janos Harmatos c, Áron Szentesi.
MATH 527 Deterministic OR Graphical Solution Method for Linear Programs.
Scalable and Fully Distributed Localization With Mere Connectivity.
June 21, 2007 Minimum Interference Channel Assignment in Multi-Radio Wireless Mesh Networks Anand Prabhu Subramanian, Himanshu Gupta.
EMIS 8373: Integer Programming NP-Complete Problems updated 21 April 2009.
Minimizing Stall Time in Single Disk Susanne Albers, Naveen Garg, Stefano Leonardi, Carsten Witt Presented by Ruibin Xu.
1 Shape Segmentation and Applications in Sensor Networks Xianjin Xhu, Rik Sarkar, Jie Gao Department of CS, Stony Brook University INFOCOM 2007.
A New Hybrid Wireless Sensor Network Localization System Ahmed A. Ahmed, Hongchi Shi, and Yi Shang Department of Computer Science University of Missouri-Columbia.
A Passive Approach to Sensor Network Localization Rahul Biswas and Sebastian Thrun International Conference on Intelligent Robots and Systems 2004 Presented.
CSE 589 Part VI. Reading Skiena, Sections 5.5 and 6.8 CLR, chapter 37.
University “Ss. Cyril and Methodus” SKOPJE Cluster-based MDS Algorithm for Nodes Localization in Wireless Sensor Networks Ass. Biljana Stojkoska.
Exact Inference in Bayes Nets. Notation U: set of nodes in a graph X i : random variable associated with node i π i : parents of node i Joint probability:
Resource Allocation in Hospital Networks Based on Green Cognitive Radios 王冉茵
1 EE5900 Advanced Embedded System For Smart Infrastructure Static Scheduling.
IE 312 Review 1. The Process 2 Problem Model Conclusions Problem Formulation Analysis.
March 9, Broadcasting with Bounded Number of Redundant Transmissions Majid Khabbazian.
C&O 355 Lecture 19 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A A A A A A A.
TU/e Algorithms (2IL15) – Lecture 12 1 Linear Programming.
Common Intersection of Half-Planes in R 2 2 PROBLEM (Common Intersection of half- planes in R 2 ) Given n half-planes H 1, H 2,..., H n in R 2 compute.
Linear Programming Piyush Kumar Welcome to CIS5930.
1 Chapter 5 Branch-and-bound Framework and Its Applications.
Computational Geometry
TU/e Algorithms (2IL15) – Lecture 12 1 Linear Programming.
1 1 Slide Graphical solution A Graphical Solution Procedure (LPs with 2 decision variables can be solved/viewed this way.) 1. Plot each constraint as an.
Lap Chi Lau we will only use slides 4 to 19
Topics in Algorithms Lap Chi Lau.
The minimum cost flow problem
Dynamic Coverage In Wireless Ed-Hoc Sensor Networks
Analysis of Algorithms
EE5900 Advanced Embedded System For Smart Infrastructure
Graphical solution A Graphical Solution Procedure (LPs with 2 decision variables can be solved/viewed this way.) 1. Plot each constraint as an equation.
Presentation transcript:

Jie Gao Joint work with Amitabh Basu*, Joseph Mitchell, Girishkumar Stony Brook Distributed Localization using Noisy Distance and Angle Information To appear in ACM MobiHoc 2006

Localization in sensor networks Given local measurements –Connectivity –Distance measurements –Angle measurements Find –Relative positions –Absolute positions

Localization in sensor networks Location info is important for –Integrity of sensor readings –Many basic network functions Topology control Geographical routing Clustering and self-organization.

Localization problem Extensively studied. Anchor-based methods –Anchors know positions, e.g., via GPS. –Triangulation-type of methods, e.g., [Savvides et al.] Anchor-free methods –Local measurements  global layout. –We use this approach.

Anchor-free localization Distance information only –Global optimization MDS [Shang 03], SDP [Biswas & Ye 04] –Localized, distributed algorithm Mass-spring optimization, robust quadrilateral [Moore 04], etc. Graph rigidity!

Our approach Distance + angle information Measurements are noisy. Assume a global north. Upper/lower bound on distance and direction of neighbors. Goal: find an embedding that satisfies all the constraints.

Our results Finding a feasible solution with noisy distance + angle is NP-hard. A distributed, iterative algorithm for a relaxation.

Hardness results Accurate distance + angle: trivial. Infinite noise, non-neighbors >1 = Unit disk graph embedding: NP-hard [Breu & Kirkpatrick]. Accurate angle, infinite noise in distance, non- neighbors >1: NP-hard [Bruck05]. Accurate distance, infinite noise in angle, non- neighbors >1: NP-hard [Aspnes et. al. 04].

This paper 1.ε noise in distance, δ noise in angle, for arbitrarily small ε, δ, finding a feasible solution is NP-hard. 2.Accurate distance, relative angle, non-neighbors >1: NP-hard. Reduction from 3SAT. or

Solve a relaxation Use a convex approximation to the non- convex frustum, e.g, a trapezoid. All the constraints are linear. Use linear programming to solve for an embedding. Solution not unique. Compute all of them.

Weak deployment regions We solve for Regions of Deployment Weak deployment –All feasible solutions. Upper bound. –Fix a sensor,  a feasible solution for the other sensors.

Strong deployment regions We solve for Regions of Deployment Strong deployment –Inherent uncertainty. Lower bound. –Pick any point within each region independently  a feasible solution.

Linear programming We can also solve weak and strong deployment by LP. Let ’ s look at weak deployment first.

Weak deployment and LP LP for feasibility of embedding. n sensors, m edges. Variables: (x i, y i ) for each sensor i. # variables 2n, # constraints: 8m. A valid embedding is a point in R 2n. The feasible polytope P in R 2n : collection of all feasible solutions. Weak deployment region for sensor i = projection of P onto plane (x i, y i ).

Theory of convex polytope The feasible polytope P has 8m faces. In general, the complexity of P (# vertices) and its projection, can be exponential in 8m.

Solve for weak deployment Our problem has special structures: The weak deployment region has O(m) complexity in the worst case. We can solve it in polynomial time by linear programming. There is a distributed algorithm that finds the same solution as the global LP.

What next? A distributed, iterative algorithm for the weak deployment problem. Show why the complexity of weak deployment region is O(m). Simulation results. Strong deployment.

RiRi RjRj Forward constraint propagation Each node keeps a current feasible region R i. Region R i shrinks region R j. R j  R j ∩ R i  F ij. Minkowski sum X  Y={p+q | p ∊ X, q ∊ Y} F ij

Backward constraint propagation RiRi RjRj When R j shrinks, then R i can also shrink. R i  R i ∩ R j  (-F ij ). -F ij

Iterative algorithm Pin down one node at the origin. Initialize all other regions as R 2. Until all regions stabilize –For each sensor, compute new regions from all neighbors ’ regions Both forward & backward propagation. –Shrink its current region to the common intersection.

Iterative algorithm correctness The iterative algorithm computes the weak deployment regions. Proof sketch: –Regions always shrink. –It converges to weak deployment region when shrinking stops. –The algorithm stops after a finite number of steps

Convergence Prove by contradiction. Assume a point p  R i * for sensor i. For every sensor j, propagate the constraints from i to j along all possible paths. Take the common intersection of these regions, say P i. p

Convergence Recall p  R i *. Thus either 1.One region P j is empty. 2.The origin k is outside P k. 1 is not possible. –The shape of P j doesn’t depend on p. –Start from a point in R i *, the LP is infeasible. p p* Pj

Convergence Recall p  R i *. Thus either 1.One region P j is empty. 2.The origin k is outside P k. If 2 happens. –Reverse the paths from k to i. –The point p will be eliminated. –The algorithm hasn’t converged. p k=origin

Why the regions are O(m)? All the operations are Minkowski sums and intersections. Minkowski sum X  Y: boundary comes from the boundaries of X and Y

Why the regions are O(m)? All the operations are Minkowski sums and intersections. Slopes of the region boundary come from the original constraints. There are only 8m different slopes. If we use rectangle constraints, then all the deployment regions are rectangles.

Convergence rate Nodes randomly deployed. Communication graph: unit disk graph.

Robustness to link variation Links switch on ↔ off with prob p: 0~1. The deployment regions are stable.

Robustness to link variation Links switch on ↔ off with prob p: 0~1. Due to network disconnection. When p is small, it is slow to get re-connected.

Comparison to SDP [Biswas & Ye] SDP only uses noisy distance measurements. We use angle range  /4. Less dependency on # anchors.

Comparison to SDP [Biswas & Ye] SDP only uses noisy distance measurements. We choose angle range  /4. Two metrics: Center furthest point. WD: weak deployment SD: strong deployment

Strong deployment –Inherent uncertainty. Lower bound. –Pick any point within each region independently  a feasible solution.

Strong deployment More subtle! One can shrink the region for one to get a larger region for the others. We propose to find the same shaped region for every node, e.g., square, as large as possoble. Formulate as LP? Infinite # constraints?

Strong deployment By convexity, if the constraints are satisfied for every pair of corners of the deployment regions, then the constraints are satisfied for every pair of internal points. Formulate a LP w/ constraints on all pairs of corners. Maximize the size of the region r.

Strong deployment Reduce to weak deployment. Distributed algorithm. –Guess the size r. –Solve for center of the strong deployment region. –Binary search on r.

Conclusion Localization with noisy distance + angle measurements. Complete the hardness results. Upper/lower bound: weak/strong deployment regions. Linear programming and distributed implementation.

Future work Convergence rate of the distributed iterative algorithm. Bound the approximation through the relaxation of non-convex constraints. Generalize the noise model to probabilistic distributions.

Questions? Thank you!