nlos error mitigation for toa-based localization via convex relaxation

13
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 8, AUGUST 2014 4119 NLOS Error Mitigation for TOA-Based Localization via Convex Relaxation Gang Wang, Member, IEEE, H. Chen, Youming Li, and Nirwan Ansari, Fellow, IEEE Abstract—In this paper, we address the time-of-arrival (TOA) based localization problem in an adverse environment, where line-of-sight (LOS) signal propagation between the source and the sensor is not readily available, in which case we have to resort to non-line-of-sight (NLOS) signals. Two convex relaxation methods, i.e., the semidefinite relaxation (SDR) and the second-order cone relaxation (SOCR) methods, are proposed to mitigate the effect of NLOS errors on the localization performance. We consider two separate cases in which the information of the NLOS status is totally unknown and perfectly known, respectively. The proposed methods can be applied without knowing the distribution of NLOS errors. Moreover, we propose a NLOS error mitigation method that is robust to detection errors, which are generated in the process of detecting NLOS paths. Simulation results show that the proposed convex relaxation methods outperform some existing state-of-the-art methods. Index Terms—Non-line-of-sight, robust localization, second- order cone programming (SOCP), semidefinite programming, time-of-arrival. I. I NTRODUCTION L OCALIZATION by a wireless network has attracted much attention in recent years since it finds wide applications, such as emergency preparedness and response, intelligent trans- portation systems, target tracking, and others [1]. Some tradi- tional localization methods assume that the signal propagation between the source and the sensor is in line-of-sight (LOS) [2]– [4], which is not practical due to the obstruction of obstacles in adverse environments, such as in complex buildings and dense urban areas. This assumption can significantly degrade the performance of the localization methods, which do not account for non-line-of-sight (NLOS) conditions. Thus, mitigation of NLOS errors becomes an urgent task. In this paper, we focus Manuscript received July 19, 2013; revised November 5, 2013, January 9, 2014, and March 21, 2014; accepted March 22, 2014. Date of publication March 31, 2014; date of current version August 8, 2014. This work was supported in part by the National Natural Science Foundation of China un- der Grants 61201099 and 61301152, the Ningbo Municipal Natural Science Foundation under Grant 2012A610027, and the K. C. Wong Magna Fund in Ningbo University. The associate editor coordinating the review of this paper and approving it for publication was D. Niyato. G. Wang and Y. Li are with the College of Information Science and Engineering, Ningbo University, Ningbo 315211, China (e-mail: wanggang@ nbu.edu.cn; [email protected]). H. Chen was with Southwest Jiaotong University, Chengdu 610031, China. N. Ansari is with the Advanced Networking Laboratory, Department of Electrical and Computer Engineering, New Jersey Institute of Technology, Newark, NJ 07102 USA (e-mail: [email protected]). Color versions of one or more of the figures in this paper are available online at http://ieeexplore.ieee.org. Digital Object Identifier 10.1109/TWC.2014.2314640 on the NLOS mitigation problem in the time-of-arrival (TOA) based localization problem. The NLOS mitigation problem has been extensively studied in the last decade. One easy way of addressing this problem is to identify (detect) the NLOS paths, discard the NLOS measurements, and then use the LOS measurements to locate the source [5], [6]. However, this incurs two drawbacks: 1) if the number of the LOS measurements is less than 3 in a 2-D plane or 4 in a 3-D space, the source cannot be located if any measurement is discarded; 2) the detection of NLOS paths always has a probability of missed detection or false alarm, and this will degrade the localization performance. Even if the two drawbacks are mitigated, using LOS measurements only is still not good enough since the NLOS measurements can be used to provide some useful information on the source location [7]. The most popular method for localization is the maximum likelihood (ML) method. Under NLOS conditions, one must know the exact distributions of both the NLOS errors and the measurement noise to formulate the ML problem [8], [9]; obtaining these distributions is very difficult in practice. To partially alleviate the difficulty, Guvenc et al. [10], [11] proposed the weighted least squares (WLS) method, which requires only the first two moments of the measurement noise and the NLOS errors. Another form of the WLS method is the residual weighting (RW) method [12], which does not require the statistics of the NLOS errors. However, this method is computationally inefficient. Recently, the optimization based methods become popular. In [13], a constrained WLS method was proposed, in which the NLOS measurements are used to form a region in which the source lies. This method introduces a nuisance parameter to simplify the problem. However, this method ignores the known relationship between the source location and the nuisance parameter. Yang et al. [14] improved this method by explicitly incorporating the known relationship, which is referred to as the quadratic programming (QP) method. Venkatesh and Buehrer [7] proposed a linear programming (LP) based method, which uses the LOS measurements to obtain the cost function of the LP and uses the NLOS measurements to form a set of constraints on the source location. Yu and Guo [15] formulated a set of optimization problems based on the in- formation of the NLOS status and solved the problems using the sequential quadratic programming (SQP) algorithm. Lui et al. [16] proposed a maximum a posteriori (MAP) method which assumes to know the prior information on the probability of the NLOS status, and the exact distribution of the NLOS errors. Chen et al. [17] proposed a semidefinite relaxation (SDR) method for cooperative sensor network localization under NLOS conditions, where three cases are considered based on 1536-1276 © 2014 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

Upload: nirwan

Post on 01-Feb-2017

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: NLOS Error Mitigation for TOA-Based Localization via Convex Relaxation

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 8, AUGUST 2014 4119

NLOS Error Mitigation for TOA-BasedLocalization via Convex Relaxation

Gang Wang, Member, IEEE, H. Chen, Youming Li, and Nirwan Ansari, Fellow, IEEE

Abstract—In this paper, we address the time-of-arrival (TOA)based localization problem in an adverse environment, whereline-of-sight (LOS) signal propagation between the source and thesensor is not readily available, in which case we have to resort tonon-line-of-sight (NLOS) signals. Two convex relaxation methods,i.e., the semidefinite relaxation (SDR) and the second-order conerelaxation (SOCR) methods, are proposed to mitigate the effect ofNLOS errors on the localization performance. We consider twoseparate cases in which the information of the NLOS status istotally unknown and perfectly known, respectively. The proposedmethods can be applied without knowing the distribution of NLOSerrors. Moreover, we propose a NLOS error mitigation methodthat is robust to detection errors, which are generated in theprocess of detecting NLOS paths. Simulation results show thatthe proposed convex relaxation methods outperform some existingstate-of-the-art methods.

Index Terms—Non-line-of-sight, robust localization, second-order cone programming (SOCP), semidefinite programming,time-of-arrival.

I. INTRODUCTION

LOCALIZATION by a wireless network has attracted muchattention in recent years since it finds wide applications,

such as emergency preparedness and response, intelligent trans-portation systems, target tracking, and others [1]. Some tradi-tional localization methods assume that the signal propagationbetween the source and the sensor is in line-of-sight (LOS) [2]–[4], which is not practical due to the obstruction of obstacles inadverse environments, such as in complex buildings and denseurban areas. This assumption can significantly degrade theperformance of the localization methods, which do not accountfor non-line-of-sight (NLOS) conditions. Thus, mitigation ofNLOS errors becomes an urgent task. In this paper, we focus

Manuscript received July 19, 2013; revised November 5, 2013, January 9,2014, and March 21, 2014; accepted March 22, 2014. Date of publicationMarch 31, 2014; date of current version August 8, 2014. This work wassupported in part by the National Natural Science Foundation of China un-der Grants 61201099 and 61301152, the Ningbo Municipal Natural ScienceFoundation under Grant 2012A610027, and the K. C. Wong Magna Fund inNingbo University. The associate editor coordinating the review of this paperand approving it for publication was D. Niyato.

G. Wang and Y. Li are with the College of Information Science andEngineering, Ningbo University, Ningbo 315211, China (e-mail: [email protected]; [email protected]).

H. Chen was with Southwest Jiaotong University, Chengdu 610031, China.N. Ansari is with the Advanced Networking Laboratory, Department of

Electrical and Computer Engineering, New Jersey Institute of Technology,Newark, NJ 07102 USA (e-mail: [email protected]).

Color versions of one or more of the figures in this paper are available onlineat http://ieeexplore.ieee.org.

Digital Object Identifier 10.1109/TWC.2014.2314640

on the NLOS mitigation problem in the time-of-arrival (TOA)based localization problem.

The NLOS mitigation problem has been extensively studiedin the last decade. One easy way of addressing this problemis to identify (detect) the NLOS paths, discard the NLOSmeasurements, and then use the LOS measurements to locatethe source [5], [6]. However, this incurs two drawbacks: 1) ifthe number of the LOS measurements is less than 3 in a 2-Dplane or 4 in a 3-D space, the source cannot be located ifany measurement is discarded; 2) the detection of NLOS pathsalways has a probability of missed detection or false alarm, andthis will degrade the localization performance. Even if the twodrawbacks are mitigated, using LOS measurements only is stillnot good enough since the NLOS measurements can be used toprovide some useful information on the source location [7].

The most popular method for localization is the maximumlikelihood (ML) method. Under NLOS conditions, one mustknow the exact distributions of both the NLOS errors andthe measurement noise to formulate the ML problem [8],[9]; obtaining these distributions is very difficult in practice.To partially alleviate the difficulty, Guvenc et al. [10], [11]proposed the weighted least squares (WLS) method, whichrequires only the first two moments of the measurement noiseand the NLOS errors. Another form of the WLS method is theresidual weighting (RW) method [12], which does not requirethe statistics of the NLOS errors. However, this method iscomputationally inefficient. Recently, the optimization basedmethods become popular. In [13], a constrained WLS methodwas proposed, in which the NLOS measurements are used toform a region in which the source lies. This method introducesa nuisance parameter to simplify the problem. However, thismethod ignores the known relationship between the sourcelocation and the nuisance parameter. Yang et al. [14] improvedthis method by explicitly incorporating the known relationship,which is referred to as the quadratic programming (QP) method.Venkatesh and Buehrer [7] proposed a linear programming (LP)based method, which uses the LOS measurements to obtain thecost function of the LP and uses the NLOS measurements toform a set of constraints on the source location. Yu and Guo[15] formulated a set of optimization problems based on the in-formation of the NLOS status and solved the problems using thesequential quadratic programming (SQP) algorithm. Lui et al.[16] proposed a maximum a posteriori (MAP) method whichassumes to know the prior information on the probability of theNLOS status, and the exact distribution of the NLOS errors.Chen et al. [17] proposed a semidefinite relaxation (SDR)method for cooperative sensor network localization underNLOS conditions, where three cases are considered based on

1536-1276 © 2014 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

Page 2: NLOS Error Mitigation for TOA-Based Localization via Convex Relaxation

4120 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 8, AUGUST 2014

the knowledge of the NLOS status and the distribution param-eters. Recently, localization using angle-of-arrival (AOA) andTOA measurements in the mixed LOS/NLOS environments hasbeen studied [18], [19]. In these methods, NLOS identificationis first performed, then the (single) reflection point is locatedusing AOA measurements, and finally the target node (TN)is located using TOA measurements. These methods requireboth the base nodes (BNs) and the TN to be equipped withmultiple antennas [18] or require cooperation between the BNsand the TN [19]. In summary, the existing methods, except theQP method in [14] and the third case in [17] (which, however,requires to know the measurement noise power), require one ofthe following conditions: 1) the statistics of the NLOS errorsare completely or partially known, and 2) the NLOS status foreach path or its probability is known.

In this paper, we solve the NLOS error mitigation problemby using convex relaxations, i.e., the SDR and the second-order cone relaxation (SOCR). In recent years, the convexrelaxation methods have been successfully applied to severalsource and sensor network localization problems [20]–[25]. Forthe localization problem studied in this paper, we propose tojointly estimate the source location and another parameter thatis related to the NLOS errors to partially mitigate the NLOSerrors. Owing to the non-convexity of the formulation, weapproximately solve it by applying SDR or SOCR to obtainthe convex semidefinite program (SDP) or second-order coneprogram (SOCP). Based on whether the NLOS status of eachpath is known or not, we consider two separate cases: theNLOS status is entirely unknown and it is perfectly known,respectively. Both methods do not require any statistics of theNLOS errors. Therefore, the proposed methods can be usedregardless of the distribution of the NLOS errors.

In practice, there always exists a probability of detection er-rors in identifying the NLOS status, including missed detectionand false alarm. This problem has not been well studied inthe literature. We, to the best of our knowledge, for the firsttime propose a localization method that is robust to detectionerrors. Unlike the convex relaxation methods stated above,which jointly estimate the NLOS errors and source location, therobust method takes the NLOS errors as nuisance parametersand estimates the source location only. Moreover, it neitherrequires to perform NLOS detection, nor requires to know thestatistics of NLOS errors, and only requires to know the upperbound of the NLOS errors.

The following notations are adopted throughout the paper.Bold face lower case letters and bold face upper case lettersdenote the vectors and matrices, respectively. ‖ · ‖ denotes the�2-norm. In denotes the n× n identity matrix, and 1n denotesthe n× 1 column vector. Aij denotes the (i, j)th entry of thematrix A, and tr(A) denotes the trace of matrix A. ai denotesthe ith entry of the vector a.

The rest of the paper is organized as follows. In Section II,we introduce the TOA measurement model under NLOS con-ditions. The proposed SDR and SOCR methods are presentedin Sections III and IV, respectively. The robust localizationmethod is presented in Section V. Simulations are conducted toverify the performance of the proposed methods in Section VI,and conclusions are drawn in Section VII.

II. PROBLEM FORMULATION

Consider a wireless sensor network (WSN) with N sensorsand one unknown source, where the locations of sensors arerespectively denoted by s1, . . . , sN , and the location of theunknown source is denoted by x (whose dimension is k × 1,k = 2 or 3). The range measurements are denoted by

di = ‖x− si‖+ ni, i ∈ El (1)

without considering the NLOS error, and

di = ‖x− si‖+ ei + ni, i ∈ En (2)

with considering the NLOS error, where ni is the measurementnoise, ei is the NLOS error, and El and En are the indexsets corresponding to the measurements of LOS and NLOS,respectively. We assume that ni follows a zero-mean Gaussiandistribution N (0, σ2

i ). Without loss of generality, we assumethat El = {1, . . . , Nl} and En = {Nl + 1, . . . , N}, where Nl isthe number of the LOS measurements and Nn = N −Nl is thenumber of the NLOS measurements.

In the literature, the NLOS error is assumed to be positiveand follows various distributions, e.g., uniform, Gaussian, andexponential distributions. In this paper, we do not assumeany distribution, i.e., our method can be applied under theassumption of any distribution. The only assumption here is thatthe NLOS error is much greater than the measurement noise. Itis worth noting that this assumption is made in most existingworks.

III. NLOS MITIGATION VIA SEMIDEFINITE RELAXATION

In this section, we present the SDR method for the NLOSmitigation problem.

A. Unknown NLOS Status

First, we consider the most difficult case that no informationon the NLOS status is known. Our idea is to estimate thesource location as well as the NLOS errors using both LOSand NLOS measurements, i.e., without discarding any NLOSmeasurements. To this end, we first rewrite (1) and (2) in theuniform form

di − ei = ‖x− si‖+ ni, i = 1, . . . , N (3)

where for i ∈ El, ei = 0.Based on (3), the ML estimation of x and ei(i = 1, . . . , N)

can be formulated as

minx,{ei}

N∑i=1

(di − ‖x− si‖ − ei)2

σ2i

s.t. ei ≥ 0, i = 1, . . . , N (4)

where we impose a set of known constraints ei ≥ 0, i = 1,. . . , N .

Mathematically, Problem (4) yields a trivial solution. Any

solution [xT , e1, . . . , eN ]T

that satisfies di − ‖x− si‖ ≥ 0,

Page 3: NLOS Error Mitigation for TOA-Based Localization via Convex Relaxation

WANG et al.: NLOS ERROR MITIGATION FOR TOA-BASED LOCALIZATION 4121

i = 1, . . . , N is the optimal solution to (4) because the optimalvalue of the objective function, 0, is achieved if we set ei =di − ‖x− si‖. This indicates that Problem (4) is meaninglessif we do not have enough LOS measurements and do not knowthe NLOS status, or we do not have other information on ei,i = 1, . . . , N . As a result, we estimate only one NLOS errorinstead of all NLOS errors. As pointed out in [15], this NLOSerror plays the role of a “balancing” parameter that partiallymitigates the NLOS effect. Hence, instead of solving (4), wesolve the following problem

minx,e

N∑i=1

(di − ‖x− si‖ − e)2

σ2i

(5)

where e is seen as the “balancing” parameter.In the ideal case, the NLOS errors are completely mitigated,

i.e., for i = 1, . . . , N , we have ei = ei (Here, ei is the truevalue of the ith NLOS error). Thus, in the ideal case, the sourcelocation estimate is the optimal value of the following problem:

minx

N∑i=1

(di − ‖x− si‖ − ei)2

σ2i

. (6)

Note that (6) is different from (4) since the NLOS errors arecompletely mitigated in (6).

In the following, we examine how close (5) is in approximat-ing (6). Define the approximation error as

pΔ=

[N∑i=1

(di−‖x−si‖−ei)2

σ2i

−N∑i=1

(di−‖x−si‖−e)2

σ2i

]2.

(7)

Under the assumption of ei � ni, we have di − ‖x− si‖ ≈ ei.Replacing di − ‖x− si‖ in (7) with ei, we have the followingapproximation:

p ≈[

N∑i=1

(ei − e)2

σ2i

]2. (8)

Note that if the ith measurement is LOS, i.e., ei = 0, (8) stillholds.

We find e by minimizing the approximation error

e ≈ argmine

[N∑i=1

(ei − e)2

σ2i

]2

= argmine

N∑i=1

(ei − e)2

σ2i

=

(N∑i=1

eiσ2i

)/(N∑i=1

1

σ2i

). (9)

Based on (9), we can find an upper bound on e. Since thetrue range between the source and the ith sensor, ‖x− si‖, isgenerally greater than the absolute value of the noise |ni|, wehave ei < di. Hence, from (9), we have an upper bound on e:e < (

∑Ni=1(di/σ

2i ))/(

∑Ni=1(1/σ

2i )). This bound is reasonable

since it is obtained based on the optimal e, e. Imposing thisconstraint and the explicit constraint e > 0 to (5), we have

minx,e

N∑i=1

(di − ‖x− si‖ − e)2

σ2i

s.t. 0 < e <

(N∑i=1

di/σ2i

)/(N∑i=1

1

σ2i

). (10)

Recall that we have assumed that the NLOS error is muchgreater than the measurement noise. Based on this assumption,we can obtain a set of constraints on the source location, likethose in [14]. Since ei � ni, we have

‖x− si‖ ≤ di, i = 1, . . . , N. (11)

Squaring both sides of (11) yields

‖x− si‖2 ≤ d2i , i = 1, . . . , N (12)

which implies

‖x‖2 − 2sTi x ≤ d2i − ‖si‖2, i = 1, . . . , N. (13)

Writing all inequalities in (13) into the matrix form gives

H

[x

‖x‖2]≤ f (14)

where

H =

⎡⎣ −2s1 1

......

−2sN 1

⎤⎦ f =

⎡⎢⎣

d21 − ‖s1‖2...

d2N − ‖sN‖2

⎤⎥⎦ . (15)

Adding (14) to (10), we have

minx,e

N∑i=1

(di − ‖x− si‖ − e)2

σ2i

s.t. 0 < e <

(N∑i=1

diσ2i

)/(N∑i=1

1

σ2i

)

H

[x

‖x‖2]≤ f . (16)

It is worth noting that adding (14) to (10) is helpful for improv-ing the localization performance [7].

Problem (16) is very difficult to solve since it is noN - convex.In this paper, we relax (16) into an SDP problem, which isconvex and can be solved efficiently using the interior pointmethods.

Problem (16) can be equivalently written as

ming,x

(Bg − d)TQ−1(Bg − d)

s.t. g = [‖x− s1‖, . . . , ‖x− sN‖, e]T

0 < gN+1 <

(N∑i=1

diσ2i

)/(N∑i=1

1

σ2i

)

H[xT ‖x‖2

]T ≤ f , (17)

Page 4: NLOS Error Mitigation for TOA-Based Localization via Convex Relaxation

4122 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 8, AUGUST 2014

where Q = diag{σ21 , . . . , σ

2N}, B = [IN 1N ], and d = [d1,

. . . , dN ]T .Problem (17) can be further written as

minG,g,r,x

tr

{C

[G ggT 1

]}s.t. Gii = r − 2sTi x+ ‖si‖2, i = 1, . . . , N[

G ggT 1

]� 0, rank{G} = 1

‖x‖2 = r,

gN+1 > 0

GN+1,N+1 <

[(N∑i=1

diσ2i

)/(N∑i=1

1

σ2i

)]2

H[xT r]T ≤ f (18)

where C =

[BTQ−1B −BTQ−1d−dTQ−1B dTQ−1d

]. Note that we do not

put an upper bound on gN+1 since from [G g; gT 1] � 0, wehave g2N+1 ≤ GN+1,N+1, which implies if the upper bound ofGN+1,N+1 is determined, so will be that of gN+1.

Furthermore, according to the Cauchy-Schwarz inequality,we have

Gij = ‖x− si‖‖x− sj‖≥∣∣(x− si)

T (x− sj)∣∣ = ∣∣r − (si + sj)

Tx+ sTi sj∣∣ .(19)

Adding (19) to (18), dropping the rank-1 constraint andrelaxing ‖x‖2 = r as ‖x‖2 ≤ r, we can obtain the SDP:

minG,g,r,x

tr

{C

[G ggT 1

]}s.t. Gii = r − 2sTi x+ ‖si‖2, i = 1, . . . , N

Gij ≥∣∣r − (si + sj)

Tx+ sTi sj∣∣

i, j = 1, . . . , N, i > j,[G ggT 1

]� 0,

[Ik xxT r

]� 0

gN+1 > 0,

GN+1,N+1 <

[(N∑i=1

diσ2i

)/(N∑i=1

1

σ2i

)]2

H[xT r]T ≤ f . (20)

Note that adding (19) can improve the localization perfor-mance. According to [25], only when the off-diagonal elementsof C are negative, rank{G} = 1 holds. If this is true, adding(19) is not helpful for performance improvement. However, thiscondition does not hold for this problem, and thus adding (19)is necessary.

B. Known NLOS Status

In this section, we consider the case that the NLOS statusis perfectly identified. To utilize this information and improve

the performance, we propose to address the LOS and NLOSmeasurements separately. For LOS measurements, we have

di = ‖x− si‖+ ni, i ∈ El. (21)

Squaring both sides of (21) gives

d2i = ‖x− si‖2 + 2‖x− si‖ni + n2i

= ‖x− si‖2 + 2dini − n2i , i ∈ El. (22)

With simple manipulations, we have

d2i − ‖x− si‖22di

≈ ni, i ∈ El (23)

where n2i is neglected. n2

i can be neglected only when 2di ismuch greater than ni. This implies that only when 2di is compa-rable to ni, i.e., the source is sufficiently close to the ith sensor,neglecting n2

i will cause performance degradation. However,in practice, if this happens, we usually do not need to locatethe source using localization algorithms. Thus, neglecting thesecond-order terms is reasonable. Indeed, this has been appliedin many existing works, such as [26]–[28].

Based on (2) and (23), we can formulate another localizationproblem under NLOS conditions:

minx,e

∑i∈El

(d2i − ‖x− si‖2

)24d2iσ

2i

+∑i∈EN

(di − ‖x− si‖ − e)2

σ2i

s.t. 0 < e <

Nn∑j=1

(dNl+j/σ

2Nl+j

)Nn∑j=1

(1/σN2

l+j

) (24)

where we still jointly estimate the source location and oneNLOS error as earlier.

Similarly, we can add the following constraints to (24)

Hn

[xT ‖x‖2

]T ≤ fn (25)

where

Hn =

⎡⎢⎣−2sNl+1 1

......

−2sN 1

⎤⎥⎦ , fn =

⎡⎢⎣d2Nl+1 − ‖sNl+1‖2

...d2N − ‖sN‖2

⎤⎥⎦ .

(26)

Similar to (18), (24) can be equivalently written as

mingn,x,{ci}

∑i∈El

ci + tr

{Cn

[gng

Tn gn

gTn 1

]}

s.t.

(d2i − ‖x− si‖2

)24d2iσ

2i

≤ ci, i ∈ El

gn = [‖x− sNl+1‖, . . . , ‖x− sN‖, e]T

gn,Nn+1 > 0

Gn,{N+1,N+1} <

⎡⎣∑Nn

j=1

(dNl+j/σ

2Nl+j

)∑Nn

j=1

(1/σ2

Nl+j

)⎤⎦2

Hn[xT ‖x‖2]T ≤ fn, (27)

Page 5: NLOS Error Mitigation for TOA-Based Localization via Convex Relaxation

WANG et al.: NLOS ERROR MITIGATION FOR TOA-BASED LOCALIZATION 4123

where Cn=

[BT

nQ−1n Bn −BT

nQ−1n dn

−dTnQ

−1n Bn dT

nQ−1n dn

], Qn=diag{σ2

Nl+1,

. . . , σ2N}, Bn = [INn

1Nn], and dn = [dNl+1, . . . , dN ]T .

Problem (27) can be further written as

minGn,gn,r,x,{ci}

∑i∈El

ci + tr

{Cn

[Gn gn

gTn 1

]}

s.t.(d2i − r + 2sTi x− ‖si‖2

)2 ≤ 4cid2iσ

2i , i ∈ El,

Gn,jj = r − 2sTNl+jx+ ‖sNl+j‖2, j = 1, . . . , Nn,[Gn gn

gTn 1

]� 0, rank{Gn} = 1

‖x‖2 = r,

gn,Nn+1 > 0,

Gn,{N+1,N+1} <

⎡⎣∑Nn

j=1

(dNl+j/σ

2Nl+j

)∑Nn

j=1

(1/σ2

Nl+j

)⎤⎦2

Hn[xT r]

T ≤ fn. (28)

In a similar manner, we can relax (28) into the following SDP:

minGn,gn,r,x,{ci}

∑i∈El

ci + tr

{Cn

[Gn gn

gTn 1

]}

s.t.(d2i − r + 2sTi x− ‖si‖2

)2 ≤ 4cid2iσ

2i , i ∈ El

Gn,jj = r − 2sTNl+jx+ ‖sNl+j‖2, j = 1, . . . , Nn

Gn,mj ≥ |r − (sNl+m + sNl+j)Tx+ sTNl+msNl+j |

m, j = 1, . . . , Nn, m > j[Gn gn

gTn 1

]� 0,

[Ik xxT 1

]� 0

gn,Nn+1 > 0

Gn,{N+1,N+1} <

⎡⎣∑Nn

j=1

(dNl+j/σ

2Nl+j

)∑Nn

j=1

(1/σ2

Nl+j

)⎤⎦2

Hn[xT r]T ≤ fn. (29)

C. Feasibility Problem

It is worth noting that the constraints in (14) (or (25)) ispossibly not satisfied due to the fact that some paths are LOS orthe NLOS errors are small. Hence, we need to identify whetherthe constraints are satisfied before solving the SDP. To this end,we solve the following feasibility problem when the NLOSstatus is unknown:

find x, r

such that ‖x‖2 = r

H[xT r]T ≤ f . (30)

For the relaxed version of the original problem (18), i.e., (20),we solve the following feasibility problem:

find x, r

such that ‖x‖2 ≤ r

H[xT r]T ≤ f . (31)

If (31) is infeasible, we replace the constraints in (31) by theconstraint:

∑Ni=1 hi[x

T r]T ≤

∑Ni=1 fi, where hi and fi are

the ith row of H and the ith element of f , respectively.In some very rare cases, we cannot find feasible points un-

der the constraint∑N

i=1 hi[xT r]

T ≤∑N

i=1 fi. In such cases,we remove the constraints formed by NLOS measurements.Since these cases often occur when the number of NLOSmeasurements is very small or the NLOS errors are very small,removing these constraints would not cause much performancedegradation.

Similarly, when the NLOS status is unknown, we solve thefollowing feasibility problem:

find x, r

such that ‖x‖2 ≤ r

Hn[xT r]

T ≤ fn. (32)

If (32) is infeasible, we perform a similar procedure like thatwhen the NLOS status is unknown.

The SDR method when the NLOS status is unknown issummarized in Algorithm 1, and that when the NLOS statusis known is similar to Algorithm 1.

Algorithm 1 NLOS Mitigation Using SDR When the NLOSStatus is Unknown

Input:{di}: range measurements;{σ2

i }: variances of the measurement noise;{si}: sensor locations;

1: solve problem (31);2: if (31) is feasible, solve (20);3: if (31) is infeasible, solve the following problem

find x, r

such that ‖x‖2 ≤ rN∑i=1

hi[xT r]

T ≤N∑i=1

fi. (33)

4: if (33) is infeasible, solve (20) by removing H[xT r]T ≤

f ; otherwise, solve (20) by replacing H [xT r]T ≤ f

with∑N

i=1 hi[xT r]

T ≤∑N

i=1 fi.Output: the solution of (20), x, is the estimate of the source

location.

IV. NLOS MITIGATION VIA SECOND-ORDER

CONE RELAXATION

A. Unknown NLOS Status

Squaring both sides of (3) yields

(di − ei)2 = ‖x− si‖2 + 2‖x− si‖ni + n2

i . (34)

With simple manipulations, we have

(di − ei)2 − ‖x− si‖2

2‖x− si‖≈ ni (35)

Page 6: NLOS Error Mitigation for TOA-Based Localization via Convex Relaxation

4124 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 8, AUGUST 2014

where n2i is negligible since it is generally much smaller than

2‖x− si‖ni.Based on (35), the approximate ML estimation of x and

ei(i = 1, . . . , N) can be formulated as

minx,{ei}

N∑i=1

[(di − ei)

2 − ‖x− si‖2]2

4σ2i ‖x− si‖2

. (36)

We can obtain a localization problem similar to (16)

minx,e

N∑i=1

[(di − e)2 − ‖x− si‖2

]24σ2

i ‖x− si‖2

s.t. 0 < e <

(N∑i=1

diσ2i

)/(N∑i=1

1

σ2i

)

H

[x

‖x‖2]≤ f . (37)

Note that imposing the constraints are reasonable since (36) isa close approximation to (4) [only the second-order noise termsare neglected in (35)].

We can equivalently rewrite (37) as

minx,e,{ai},{bi},u,v

N∑i=1

(ai − bi)2

4σ2i bi

s.t. 0 < e <

(N∑i=1

diσ2i

)/(N∑i=1

1

σ2i

)

e2 = u,

ai = d2i − 2die+ u, i = 1, . . . , N

‖x‖2 = v

bi = v − 2sTi x+ ‖si‖2, i = 1, . . . , N

H[xT v]T ≤ f . (38)

Similarly, we relax (38) into an SOCP problem. To this end,we relax e2 = u and ‖x‖2 = v into e2 ≤ u and ‖x‖2 ≤ v,respectively, thus yielding the following problem

minx,e,{ai},{bi},u,v

N∑i=1

(ai − bi)2

4σ2i bi

s.t. e > 0

e2 ≤ u <

[(N∑i=1

diσ2i

)/(N∑i=1

1

σ2i

)]2

ai = d2i − 2die+ u, i = 1, . . . , N

‖x‖2 ≤ v

bi = v − 2sTi x+ ‖si‖2, i = 1, . . . , N

H[xT v]T ≤ f (39)

which can be equivalently written in the epigraph form

minx,e,{ai},{bi},{ci},u,v

N∑i=1

ci

s.t.(ai − bi)

2

4σ2i bi

≤ ci, i = 1, . . . , N

e > 0

e2 ≤ u <

[(N∑i=1

diσ2i

)/(N∑i=1

1

σ2i

)]2

ai = d2i − 2die+ u, i = 1, . . . , N

‖x‖2 ≤ v,

bi = v − 2sTi x+ ‖si‖2, i = 1, . . . , N

H [xT v]T ≤ f (40)

where ci(i = 1, . . . , N) are introduced to form a linear objec-tive function.

Problem (40) can be further written into an SOCP

minx,e,{ai},{bi},{ci},u,v

N∑i=1

ci

s.t.∥∥[4σ2

i bi−ci; 2(ai−bi)]∥∥≤4σ2

i bi+ci, i = 1, . . . , N

e > 0

‖[e;u− 1/4]‖ ≤ u+ 1/4

u <

[(N∑i=1

diσ2i

)/(N∑i=1

1

σ2i

)]2

ai = d2i − 2die+ u, i = 1, . . . , N

‖[x; v − 1/4]‖ ≤ v +1

4bi = v − 2sTi x+ ‖si‖2, i = 1, . . . , N

H [xT v]T ≤ f . (41)

B. Known NLOS Status

For NLOS measurements, we have a similar result to (35) asfollows:

(di − ei)2 − ‖x− si‖2

2‖x− si‖≈ ni, i ∈ En. (42)

To partially mitigate the NLOS error, we similarly estimate thesource position and one NLOS parameter as that in Section IV-A.Thus, we can obtain a similar optimization problem to (37) asfollows:

minx,e

∑i∈El

(d2i − ‖x− si‖2

)24σ2

i d2i

+∑i∈En

[(di − e)2 − ‖x− si‖2

]24σ2

i ‖x− si‖2

s.t. 0 < e <

∑Nn

j=1

(dNl+j/σ

2Nl+j

)∑Nn

j=1

(1/σ2

Nl+j

)Hn

[x

‖x‖2]≤ fn (43)

where the constraint in (25) is incorporated.

Page 7: NLOS Error Mitigation for TOA-Based Localization via Convex Relaxation

WANG et al.: NLOS ERROR MITIGATION FOR TOA-BASED LOCALIZATION 4125

In a similar manner, we can relax (43) into the followingSOCP:

minx,e,{ai},{bi},{ci}, u,v

N∑i=1

ci

s.t.∥∥[d2i − bi; 4σ

2i d

2i ci − 1/4

]∥∥ ≤ 4σ2i d

2i ci + 1/4, i ∈ El∥∥[4σ2

i bi − ci; 2(ai − bi)]∥∥ ≤ 4σ2

i bi + ci, i ∈ Ene > 0

‖[e;u− 1/4]‖ ≤ u+ 1/4

u <

⎡⎣∑Nn

j=1

(dNl+j/σ

2Nl+j

)∑Nn

j=1

(1/σ2

Nl+j

)⎤⎦2

ai = d2i − 2die+ u, i ∈ En‖[x; v − 1/4]‖ ≤ v + 1/4

bi = v − 2sTi x+ ‖si‖2, i = 1, . . . , N

Hn[xT v]

T ≤ fn. (44)

Note that it is also required to solve the feasibility problem(31) or (32) before solving the SOCP.

The SOCR method when the NLOS status is unknown issummarized in Algorithm 2, and that when the NLOS statusis known is similar to Algorithm 2.

Algorithm 2 NLOS Mitigation Using SOCR When theNLOS Status is Unknown

Input:{di}: range measurements;{σ2

i }: variances of the measurement noise;{si}: sensor locations;

1: solve problem (31);2: if (31) is feasible, solve (41);3: if (31) is infeasible, solve (33);4: if (33) is infeasible, solve (41) by removing H[xT r]

T ≤f ; otherwise, solve (41) by replacing H[xT r]

T ≤ f

with∑N

i=1 hi[xT r]

T ≤∑N

i=1 fi.Output: the solution of (41), x, is the estimate of the source

location.

V. ROBUST LOCALIZATION USING

SEMIDEFINITE RELAXATION

In the above, we have assumed that the NLOS paths areperfectly detected without any detection errors. However, de-tection errors are inevitable in practice. Motivated by [21], wepropose a localization method that is robust to detection errorsin this section. This method only requires to specify the upperbound of NLOS errors, and neither requires to perform NLOSdetection, nor requires to know the statistics of NLOS errors.

A. Robust Formulation

Assume that the upper bound of the NLOS errors is denotedas ρ and is known, i.e.,

0 ≤ ei ≤ ρ, i = 1, . . . , N (45)

which implies that∣∣∣ei − ρ

2

∣∣∣ ≤ ρ

2, i = 1, . . . , N =⇒

∥∥∥e− ρ

21N

∥∥∥ ≤ ρ

2

√N

(46)

with e = [e1, e2, . . . , eN ]T .By taking e as a nuisance vector, we formulate the localiza-

tion problem as

minx,g,e

(d− g − e)TQ−1(d− g − e)

s.t. gi = ‖x− si‖, i = 1, . . . , N. (47)

The worst-case robust formulation can be written as:

minx,g

supe

{(d− g − e)TQ−1(d− g − e)

}s.t. gi = ‖x− si‖, i = 1, . . . , N (48)

which is equivalent to

minx,g,η

η

s.t. supe{(d− g − e)TQ−1(d− g − e)} ≤ η

gi = ‖x− si‖, i = 1, . . . , N. (49)

The constraint

supe

{(d−g−e)TQ−1(d−g−e)|

∥∥∥e− ρ

21N

∥∥∥ ≤ ρ

2

√N}≤ η

(50)

implies that

∀e ∈{e|∥∥∥e− ρ

21N

∥∥∥ ≤ ρ

2

√N}

=⇒ (d− g − e)TQ−1(d− g − e)− η ≤ 0 (51)

i.e.,[e1

]T [IN −ρ

21N

−ρ21

TN 0

] [e1

]≤ 0

=⇒[e1

]T[Q−1 −Q−1(d− g)

−(d− g)TQ−1 q − η

][e1

]≤0

(52)

with q = (d− g)TQ−1(d− g).By using the S-procedure [29], (52) implies that there exists

λ ≥ 0 such that[Q−1 −Q−1(d− g)

−(d− g)TQ−1 q − η

]� λ

[IN −ρ1N

2

−ρ1TN

2 0

](53)

i.e.,[λIN −Q−1 Q−1(d− g)− λρ

2 1N

(d− g)TQ−1 − λρ2 1T

N −q + η

]� 0.

(54)

Page 8: NLOS Error Mitigation for TOA-Based Localization via Convex Relaxation

4126 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 8, AUGUST 2014

Thus, the robust formulation can be rewritten as

minx,g,η,λ

η

s.t.

[λIN −Q−1 Q−1(d− g)− λρ

2 1N

(d− g)TQ−1 − λρ2 1T

N −q + η

]� 0

q = (d− g − e)TQ−1(d− g − e)

gi = ‖x− si‖, i = 1, . . . , N, λ ≥ 0. (55)

Applying SDR, we have the following SDP:

minG,g,x,r,η,λ

η

s.t.

[λIN−Q−1 Q−1(d−g)− λρ

2 1N

(d−g)TQ−1− λρ2 1T

N −q + η

]�0

q = tr(Q−1G)− 2dTQ−1g + dTQ−1d[G ggT 1

]� 0,

[Ik xxT r

]� 0

Gii = r − 2sTi x+ ‖si‖2, i = 1, . . . , N

Gij ≥ |r − (si + sj)Tx+ sTi sj |,

i, j = 1, . . . , N, i > j, λ ≥ 0

H[xT r]T ≤ f (56)

where the constraint H[xT r]T ≤ f is added for the purpose

of performance improvement.

B. Robustness Analysis

According to the Schur complement, we can equivalentlyrewrite the first constraint in (55) into

q +

[(d− g)TQ−1 − λρ

21TN

](λIN −Q−1)−1×

[Q−1(d− g)− λρ

21N

]≤ η (57)

which can be equivalently written as:

q+

(d−g− λρ

2Q1N

)T

(λQ2−Q)−1

(d−g− λρ

2Q1N

)≤η.

(58)

Minimizing η in (55) is equivalent to minimizing the termon the left-hand side of (58) since (55) is written in theepigraph form. From (58), we see that there is an ad-ditional term (d− g − (λρ/2)Q1N )T (λQ2 −Q)

−1(d− g −

(λρ/2)Q1N ) as compared with the non-robust localizationproblem (which minimizes q). This term can be seen as aregularization term. The value of the regularization term isdetermined by the values of ρ, λ, and Q, which can be regardedas regularization factors. ρ and Q are assumed to be known,and λ is obtained by solving the relaxed version of the robustformulation (55), i.e., the SDP (56). Thus, after solving (56),the regularization term is automatically determined.

VI. SIMULATION RESULTS

In this section, simulations are conducted to verify the per-formance of the proposed methods. We compare the perfor-mance of the proposed methods with the existing state-of-the-art LP [7], QP [14], and min-max algorithm (MMA) [30].1

The performance of a randomly guessed location in the local-ization area (denoted by “Random Guess”) is also presentedfor comparison. In the following, we use “SDP”, “SOCP”, and“SDP-Robust” to represent the SDR, the SOCR, and the robustmethod, respectively.

We assume that both the sensor and the source locationsare randomly chosen from a region of size 10× 10 m2. Weperform M independent Monte Carlo (MC) runs, and in eachrun, we locate a randomly located source using a random sensorgeometry. Following [7], the measurement noise is assumed tofollow the Gaussian distribution with zero mean and identicalvariance σ2 for each sensor, i.e., σ2

1 = σ22 = · · · = σ2

N = σ2.The NLOS error is assumed to follow the uniform distributionU(0, Bmax). If not specified, Bmax is set as Bmax = 5 in thefollowing. The performance is evaluated using the root meansquare error (RMSE), which is computed by

RMSE =

√√√√ 1

M

M∑i=1

‖xi − xi‖2. (59)

Here, xi and xi are the estimate of the source location andthe true source location in the ith run, respectively. In thesimulations, we set M = 3000. The SDP and SOCP are solvedusing the MATLAB toolbox CVX [31], and the solver isSeDuMi [32].

A. Unknown NLOS Status

In this section, we consider the case when the NLOS status isunknown. We consider three scenarios: 1) the number of NLOSmeasurements is small; 2) the number of NLOS measurementsis large; and 3) the fraction of NLOS measurements varies.

1) Scenario 1: In this scenario, we assume that the num-ber of sensors is N = 5, and the numbers of NLOS and theLOS measurements are 1 and 4, respectively, i.e., Nn = 1 andNl = 4. The performance of the proposed convex relaxationmethods and the QP method in [14] is compared in Fig. 1.From this figure, we see that QP performs better than the othermethods. This is attributed to the following reasons: 1) when thenumber of LOS measurements is large, the objective functionin the QP method is not subject to much mismatch caused byNLOS errors and the QP can be solved exactly (see [14] fordetails), while SDP, SOCP, and SDP-Robust are relaxationsof the original problems; and 2) the case, where there are nofeasible points in (31), frequently occurs in SDP, SOCP, andSDP-Robust, leading us to use the relaxed constraints (seeSection III-C), while this infeasibility problem does not exist

1Although MMA is not designed for NLOS mitigation, it can be tailoredto do so. In our simulations, we add the constraint (14) (when NLOS statusis unknown) or (25) (when NLOS status is known) to the original min-maxproblem.

Page 9: NLOS Error Mitigation for TOA-Based Localization via Convex Relaxation

WANG et al.: NLOS ERROR MITIGATION FOR TOA-BASED LOCALIZATION 4127

Fig. 1. Comparison of RMSE using different methods when the NLOS statusis unknown: Nn = 1 and Nl = 4.

Fig. 2. Comparison of RMSE using different methods when the NLOS statusis unknown: Nn = 4 and Nl = 1.

in QP since the constraint in QP is looser (note that in QP, itonly has one constraint H[xT r]

T ≤ f [14]).2) Scenario 2: In this scenario, the numbers of NLOS and

the LOS measurements are assumed to be 4 and 1, respectively,i.e., Nn = 4 and Nl = 1. The results are shown in Fig. 2, fromwhich we see that SDP-Robust performs the best, and bothSDP-Robust and SDP perform better than QP. SOCP performsbetter than QP when the noise is not very large. This is due tothe fact that the mismatch in the objective function of the QPbecomes very large when there are more NLOS measurements.When the noise is small, the performance of QP is worse thanthat when the noise is large. This strange observation can beexplained as follows. If the noise is large and negative, theNLOS error can be partially offset, which makes the linearconstraints generated by the NLOS errors tighter.

3) Scenario 3: In this scenario, we fix the number of sen-sors and change the number of the NLOS measurements. Thenumber of sensors is fixed as N = 10, and the number of NLOSmeasurements varies from 5 to 10, and the standard deviation of

Fig. 3. RMSE versus the fraction of NLOS measurements when the NLOSstatus is unknown.

the measurement noise is fixed as 0.5 m. The results are shownin Fig. 3, from which we see that the increase of the NLOSmeasurements improves the performance of SDP-Robust. Notethat the only factor that affects the performance of SDP-Robustis the upper bound of the NLOS error ρ. Apparently, ρ is toolarge when the number of NLOS measurements is small, whichwould degrade the performance of SDP-Robust. In comparison,the performance of SDP, SOCP, and MMA almost remainsrelatively stable. This indicates that the capability of NLOSmitigation of the three methods is rather consistent. As thenumber of NLOS measurements increases, the “balancing”parameter would also increase to partially offset the errors inNLOS measurements. Moreover, QP performs the best whenthe number of NLOS measurements is small, which complieswith the results in Fig. 1.

B. Known NLOS Status

In this section, we consider the case when the NLOS statusis perfectly known. Similarly, we also consider three scenarios.

1) Scenario 4: Fig. 4 plots the performance of several meth-ods when Nn = 1 and Nl = 4. From this figure, we see thatSOCP and SDP perform comparably, and both perform betterthan QP, LP, and MMA. The performance is mostly determinedby LOS measurements if the number of LOS measurements ismuch greater than that of NLOS measurements. Note that whenthe NLOS status is known, the first summation term in (24)is exactly the same as that in (43), and this is also true whenthey are relaxed. This leads to similar performance betweenSDP and SOCP. SDP-robust performs badly in this scenariobecause 1) it does not use the prior information of NLOSstatus, and 2) it uses an improper upper bound ρ for NLOSerrors. In comparing Fig. 1 and Fig. 4, we see that QP performseven worse when the NLOS status is known. This reveals thatthe performance of QP is rather dependent on the constraintsimposed by the NLOS measurements, since when the NLOSstatus is known, the number of the constraints imposed by theNLOS measurements is smaller.

Page 10: NLOS Error Mitigation for TOA-Based Localization via Convex Relaxation

4128 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 8, AUGUST 2014

Fig. 4. Comparison of RMSE using different methods when the NLOS statusis known: Nn = 1 and Nl = 4.

Fig. 5. Comparison of RMSE using different methods when the NLOS statusis known: Nn = 4 and Nl = 1.

2) Scenario 5: We further evaluate the performance of theproposed methods when the number of NLOS measurementsis large, i.e., Nn = 4 and Nl = 1. Fig. 5 shows the simulationresults, from which we see that SDP-Robust performs the best,and SDP performs better than SOCP, QP, and MMA. Theperformance of LP is not shown here because LP gives onlya very coarse estimate of the source location when the numberof LOS measurements is less than 3.

It is worth noting that the comparison of Figs. 1 and 4 (orFigs. 2 and 5) reveals that the information of the NLOS statuscan improve the localization performance.

3) Scenario 6: In this scenario, the parameter setup is thesame as that in Scenario 3, except that we assume the NLOSstatus is known. Fig. 6 plots the performance curves of dif-ferent methods. From this figure, we see that SDP and SOCPperform the best when the number of NLOS measurementsis small, while SDP-Robust performs the best in a moredense NLOS environment, which complies with the results inFigs. 4 and 5.

Fig. 6. RMSE versus the fraction of NLOS measurements when the NLOSstatus is known.

Fig. 7. Effect of missed detection on the performance when Bmax = 5.

C. Sensitivity to NLOS Detection Errors

In the last subsection, we have assumed that the NLOS statusis perfectly known. However, this is not true in practice. In thissubsection, we examine the effect of NLOS detection errors onthe localization performance.

We consider two types of detection errors: missed detectionand false alarm. In this subsection, we assume that the numbersof both the NLOS and LOS measurements are 3, i.e., Nn =Nl = 3.

1) Scenario 7: In this scenario, we consider the effect ofmissed detection, i.e., NLOS measurements are detected asLOS measurements. Assume that two NLOS measurementsare detected as LOS. Two cases that the bound of the NLOSerrors is Bmax = 5 and Bmax = 8, respectively, are examined.The simulation results are shown in Figs. 7 and 8, respectively.From the two figures, we see that SDP-Robust is very robustregardless of large or small NLOS errors. SDP and SOCP alsoperform very well, while other methods are quite sensitive tomissed detection.

Page 11: NLOS Error Mitigation for TOA-Based Localization via Convex Relaxation

WANG et al.: NLOS ERROR MITIGATION FOR TOA-BASED LOCALIZATION 4129

Fig. 8. Effect of missed detection on the performance when Bmax = 8.

Fig. 9. Effect of false alarm on the performance when Bmax = 5.

2) Scenario 8: In this scenario, we consider the effect offalse alarm, i.e., LOS measurements are detected as NLOSmeasurements. Figs. 9 and 10 show the simulation results whenthe bound of the NLOS errors is Bmax = 5 and Bmax = 8,respectively. From the figures, we see that SDP-Robust is quiterobust to false alarm, while other methods are more or lesssensitive.

Comparing Figs. 7–10, we have a strange observation:when Bmax = 5, missed detection causes graceful performancedegradation as compared to false alarm, while when Bmax = 8,the conclusion is opposite, i.e., false alarm causes gracefulperformance degradation as compared to missed detection. Thiscan be explained as follows. Note that the detection errorswill cause two kinds of mismatches: mismatch in the objectivefunction and mismatch in the constraints formed by NLOSmeasurements. When the NLOS error is small, i.e., the casewhen Bmax = 5, the effect of mismatch in the constraintswould dominate that of mismatch in the objective function.On one hand, the mismatch in the objective function causedby small NLOS errors is small; on the other hand, if LOS

Fig. 10. Effect of false alarm on the performance when Bmax = 8.

measurements are detected as NLOS, the constraints formedby the NLOS measurements will be much tighter than the trueconstraints. This may cause the infeasibility problem, whichdegrades the performance. When the NLOS error is large, i.e.,the case when Bmax = 8, the constraints formed by NLOSmeasurements are loose, and the mismatch in the constraintsdoes not have a significant effect even if false detections oc-cur. However, the mismatch in the objective function causedby NLOS errors will become large, especially when NLOSmeasurements are detected as LOS.

D. Summary

We summarize the results of the eight localization scenariosunder NLOS conditions as follows:

1) The proposed methods perform worse than the existingmethod only when the number of NLOS measurements isquite small.

2) The known information of the NLOS status is helpful forimproving the localization performance.

3) The degree of the effect of missed detection and falsealarm depends on the levels of NLOS errors. If theNLOS errors are large, missed detection causes moreperformance degradation; otherwise, false alarm exertsmore damage.

4) The SDP-Robust method performs very well in all exam-ined scenarios expect Scenario 4.

The above results give us some guidelines in choosing meth-ods for different environments. For instance, if the source lies ina sparse NLOS environment and the NLOS status is unknown,QP is the best choice; if it lies in a sparse NLOS environmentand the NLOS status is known, SDP and SOCP are the bestchoices; if it lies in a dense NLOS environment, SDP-Robustwould be the best choice.

VII. CONCLUSION

In this paper, we have considered the TOA-based localizationproblem under NLOS conditions, and proposed two convex

Page 12: NLOS Error Mitigation for TOA-Based Localization via Convex Relaxation

4130 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 8, AUGUST 2014

relaxation methods, i.e., the SDR and the SOCR method.We have considered two separate cases: known and unknownNLOS status. In both cases, the distribution of the NLOS errorsis not required. Furthermore, we have considered the impactof NLOS detection errors, and proposed a localization methodthat is robust to detection errors. Simulation results show thesuperior performance of the proposed methods over the existingmethods. Moreover, the results give us some guidelines inchoosing methods for different environments.

ACKNOWLEDGMENT

The authors would like to thank the anonymous reviewersand the Editor for their valuable comments, which have greatlyimproved the quality of the paper. The first author wouldalso like to thank Prof. Anthony M.-C. So for the helpfuldiscussions.

REFERENCES

[1] N. Patwari, J. N. Ash, S. Kyperountas, A. Hero, R. L. Moses, andN. S. Correal, “Locating the nodes: Cooperative localization in wirelesssensor networks,” IEEE Signal Process. Mag., vol. 22, no. 4, pp. 54–69,Jul. 2005.

[2] K. W. Cheung and H. C. So, “Accutate approximation algorithm for TOA-based maximum likelihood mobile location using semidefinite program-ming,” in Proc. IEEE ICASSP, Montreal, QC, Canada, May 2004, vol. 2,pp. 145–148.

[3] K. W. Cheung, H. C. So, W.-K. Ma, and Y. T. Chan, “A constrainedleast squares approach to mobile positioning: Algorithms and optimality,”EURASIP J. Appl. Signal Process., vol. 2006, pp. 1–23, Article ID 20858.

[4] Y. T. Chan, H. Hang, and P.-C. Ching, “Exact and approximate maximumlikelihood localization algorithms,” IEEE Trans. Veh. Technol., vol. 55,no. 1, pp. 10–16, Jan. 2006.

[5] J. Riba and A. Urruela, “A non-line-of-sight mitigation technique basedon ML-detection,” in Proc. IEEE ICASSP, Montreal, QC, Canada,May 2004, vol. 2, pp. 153–156.

[6] Y. T. Chan, W. Y. Tsui, H. C. So, and P. C. Ching, “Time-of-arrival basedlocalization under NLOS conditions,” IEEE Trans. Veh. Technol., vol. 55,no. 1, pp. 17–24, Jan. 2006.

[7] S. Venkatesh and R. M. Buehrer, “NLOS mitigation using linear pro-gramming in ultrawideband locatioN-aware networks,” IEEE Trans. Veh.Technol., vol. 56, no. 5, pp. 3182–3198, Sep. 2007.

[8] S. Gezici and Z. Sahinoglu, “UWB geolocation techniques for IEEE802.15.4a personal area Networks,” Mitsubishi Electric Research Labo-ratories (MERL) Tech. Rep., Cambridge, MA, USA, Aug. 2004.

[9] R. W. Ouyang and A. K. S. Wong, “An enhanced TOA-based wirelesslocation estimation algorithm for dense NLOS environments,” in Proc.IEEE Int. Conf. WCNC, 2009, pp. 1–6.

[10] I. Guvenc, C. C. Chong, and F. Watanabe, “NLOS identification and mit-igation for UWB localization systems,” in Proc. IEEE Int. Conf. WCNC,Hong Kong, Mar. 2007, pp. 1571–1576.

[11] I. Guvenc, C. C. Chong, F. Watanabe, and H. Inamura, “NLOS identi-fication and weighted least squares localization for UWB systems usingmultipath channel statistics,” EURASIP J. Adv. Signal Process., vol. 2008,no. 1, pp. 1–14, Jan. 2008.

[12] P. C. Chen, “A non-line-of-sight error mitigation algorithm in locationestimation,” in Proc. IEEE Int. Conf. WCNC, New Orleans, LA, USA,Sep. 1999, vol. 1, pp. 316–320.

[13] X. Wang, Z. Wang, and B. O. Dea, “A TOA based location algorithmreducing the errors due to non-line-of-sight (NLOS) propagation,” IEEETrans. Veh. Technol., vol. 52, no. 1, pp. 112–116, Jan. 2003.

[14] K. Yang, J. An, X. Bu, and Y. Lu, “A TOA-based location algorithm forNLOS environments using quadratic programming,” in Proc. IEEE Int.Conf. WCNC, 2010, pp. 1–5.

[15] K. Yu and Y. G. Guo, “Improved positioning algorithms for nonline-of-sight environments,” IEEE Trans. Veh. Technol., vol. 57, no. 4, pp. 2342–2353, Jul. 2008.

[16] K. W. K. Lui, H. C. So, and W.-K. Ma, “Maximum a posteriori approachto time-of-arrival-based localization in non-line-of-sight environment,”IEEE Trans. Veh. Technol., vol. 59, no. 3, pp. 1517–1523, Mar. 2010.

[17] H. Chen, G. Wang, Z. Wang, H. C. So, and H. V. Poor, “Non-line-of-sightnode localization based on semi-definite programming in wireless sensornetworks,” IEEE Trans. Wireless Commun., vol. 11, no. 1, pp. 108–116,Jan. 2012.

[18] C. K. Seow and S. Y. Tan, “Non-line-of-sight localization in multipathenvironments,” IEEE Trans. Mobile Comput., vol. 7, no. 5, pp. 647–660,May 2008.

[19] Z. Wang and S. A. Zekavat, “Omnidirectional mobile NLOS identificationand localization via multiple cooperative nodes,” IEEE Trans. MobileComput., vol. 11, no. 12, pp. 2047–2059, Dec. 2012.

[20] P. Biswas, T.-C. Lian, T.-C. Wang, and Y. Ye, “Semidefinite programmingbased algorithms for sensor network localiation,” ACM Trans. Sens. Netw.,vol. 2, no. 2, pp. 188–220, 2006.

[21] K. Yang, G. Wang, and Z.-Q. Luo, “Efficient convex relaxation methodsfor robust target localization by a sensor network using time differenceof arrivals,” IEEE Trans. Signal Process., vol. 57, no. 7, pp. 2775–2784,Jul. 2009.

[22] R. W. Ouyang, A. K. S. Wong, and C.-T. Lea, “Received signal strength-based wireless localization via semidefinite programming: Noncoopera-tive and cooperative schemes,” IEEE Trans. Veh. Technol., vol. 59, no. 3,pp. 1307–1318, Mar. 2010.

[23] G. Wang and K. Yang, “A new approach to sensor node localization usingRSS measurements in wireless sensor networks,” IEEE Trans. WirelessCommun., vol. 10, no. 5, pp. 1389–1395, May 2011.

[24] G. Wang, Y. Li, and N. Ansari, “A semidefinite relaxation method forsource localization using TDOA and FDOA measurements,” IEEE Trans.Veh. Technol., vol. 62, no. 2, pp. 853–862, Feb. 2013.

[25] G. Wang, Y. Li, and R. Wang, “A new semidefinite relaxation method foracoustic energy based source localization,” IEEE Sensors J., vol. 13, no. 5,pp. 1514–1521, May 2013.

[26] Y. T. Chan and K. C. Ho, “A simple and efficient estimator for hyperboliclocation,” IEEE Trans. Signal Process., vol. 42, no. 8, pp. 1905–1915,Aug. 1994.

[27] K. C. Ho, X. Lu, and L. Kovavisaruch, “An accurate algebraic solution formoving source location using TDOA and FDOA measurements,” IEEETrans. Signal Process., vol. 52, no. 9, pp. 2453–2463, Sep. 2004.

[28] K. C. Ho and W. Xu, “Source localization using TDOA and FDOAmeasurements in the presence of receiver location errors: Analysis andsolution,” IEEE Trans. Signal Process., vol. 55, no. 2, pp. 684–696,Feb. 2007.

[29] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge, U.K.:Cambridge Univ. Press, 2004.

[30] E. Xu, Z. Ding, and S. Dasgupta, “Source localization in wireless sensornetworks from signal time-of-arrival measurements,” IEEE Trans. SignalProcess., vol. 59, no. 6, pp. 2887–2897, Jun. 2011.

[31] M. Grant and S. Boyd, CVX: Matlab Software for Disciplined ConvexProgramming. [Online]. Available: http://stanford.edu/~boyd/cvx

[32] J. F. Sturm, “Using SeDuMi 1.02, a MATLAB toolbox for optimiza-tion over symmetric cones,” Optim. Methods Softw., vol. 11/12, no. 1–4,pp. 625–653, Aug. 1999.

Gang Wang (M’13) received the B.Eng. degreefrom Shandong University, Jinan, China, and thePh.D. degree from Xidian University, Xi’an, China,both in electrical engineering, in 2006 and 2011,respectively.

He joined Ningbo University, Ningbo, China, inJanuary 2012. His research interests are in the area oftarget localization and tracking in wireless networks.

H. Chen received the B.S. and M.S. degrees fromSouthwest Jiaotong University, Chengdu, China, andthe Ph.D. degree from the University of Tokyo,Japan.

His research interests include Wireless Localiza-tion, Wireless Sensor Networks, and Statistical Sig-nal Processing.

Page 13: NLOS Error Mitigation for TOA-Based Localization via Convex Relaxation

WANG et al.: NLOS ERROR MITIGATION FOR TOA-BASED LOCALIZATION 4131

Youming Li received the B.S. degree in com-putational mathematics from Lanzhou University,Lanzhou, China, in 1985, the M.S. degree in compu-tational mathematics from Xi’an Jiaotong University,Xi’an, China, in 1988, and the Ph.D. degree in elec-trical Engineering from Xidian University, Xi’an,China, in 1995.

From 1988 to 1998, he worked in the Departmentof Applied Mathematics, Xidian University, Xi’an,where he was an Associate Professor. From 1999to 2004, he worked in the School of Electrical and

Electronics Engineering, Nanyang Technological University, DSO NationalLaboratories, Singapore; and the School of Engineering, Bar-Ilan University,Israel, respectively. Since 2005, he has been with Ningbo University, Ningbo,China, where he is currently a Professor. His research interests are in cognitiveradio and wireless/wireline communications.

Nirwan Ansari (S’78–M’83–SM’94–F’09) receivedthe B.S.E.E. (summa cum laude with a perfect GPA)degree from NJIT, the M.S.E.E. degree from theUniversity of Michigan, Ann Arbor, MI, USA, andthe Ph.D. degree from Purdue University, WestLafayette, IN, USA.

He joined NJIT in 1988, where he is Professor ofElectrical and Computer Engineering. He has alsoassumed various administrative positions at NJIT. Hehas been a Visiting (Chair/Honorary) Professor atseveral universities. His current research focuses on

various aspects of broadband networks and multimedia communications. Hehas served on the editorial/advisory board of nine journals. He was elected toserve on the IEEE Communications Society (ComSoc) Board of Governorsas a member-at-large (2013–2015), as well as the IEEE Region 1 Board ofGovernors as the IEEE North Jersey Section Chair. He has chaired ComSoctechnical committees, and has actively organized numerous IEEE Internationalconferences/symposia/workshops, assuming leadership roles such as Chair orTPC Chair.

Prof. Ansari is the author of Computational Intelligence for Optimization(Springer 1997) with E.S.H. Hou, Media Access Control and Resource Allo-cation for Next Generation Passive Optical Networks (Springer, 2013) withJ. Zhang, and is the editor of Neural Networks in Telecommunications (Springer1994) with B. Yuhas. He has also (co)-authored over 450 publications, over onethird of which were published in widely cited refereed journals/magazines. Hehas been granted more than 20 U.S. patents. He has also guest-edited a numberof special issues, covering various emerging topics in communications and net-working. He is frequently selected to deliver keynote addresses, distinguishedlectures, and tutorials. Some of his recent recognitions include a couple of bestpaper awards, several Excellence in Teaching Awards, the Thomas Alva EdisonPatent Award (2010), the NJ Inventors Hall of Fame Inventor of the Year Award(2012), the NCE Excellence in Research Award (2014), and designation as aComSoc Distinguished Lecturer (2006–2009).