Conference PaperPDF Available

Rank based fingerprinting algorithm for indoor positioning

Authors:

Abstract and Figures

A novel Received Signal Strength (RSS) rank based fingerprinting algorithm for indoor positioning is presented. Because RSS rank is invariant to bias and scaling, the algorithm provides the same accuracy for any receiver device, without the need for RSS calibration. Similarity measures to compare ranked vectors are introduced and their impact on positioning accuracy is investigated in experiments. Experimental results shown that proposed algorithm can achieve better accuracy than commonly used NN and WKNN fingerprinting algorithms.
Content may be subject to copyright.
2011 International Conference on Indoor Positioning and Indoor Navigation (IPIN), 21-23 September 2011, Guimarães, Portugal
Rank Based Fingerprinting Algorithm for Indoor
Positioning
J. Machaj*, R. Piché** and P. Brida*
* University of Zilina, Department of Telecommunications and Multimedia, Zilina, Slovakia. Email:
Machaj@fel.uniza.sk, Brida@fel.uniza.sk
** Tampere University of Technology, Tampere, Finland. Email: Robert.Piche@tut.fi
Abstract—A novel Received Signal Strength (RSS) rank
based fingerprinting algorithm for indoor positioning is
presented. Because RSS rank is invariant to bias and
scaling, the algorithm provides the same accuracy for any
receiver device, without the need for RSS calibration.
Similarity measures to compare ranked vectors are
introduced and their impact on positioning accuracy is
investigated in experiments. Experimental results shown
that the algorithm can achieve better accuracy than some
commonly used fingerprinting algorithms.
KeywordsIndoor positioning; Fingerprinting; Localization
I. INTRODUCTION
The basic requirement for Location Based Services
(LBS) [1] is knowledge of the mobile device position.
This can be achieved in many different ways. Global
Navigation Satellite Systems (GNSS), like GPS (Global
Positioning System) or GLONASS (Global Navigation
Satellite System), are widely used, and these systems
work very well for outdoors, especially in areas with a
clear view to the satellites. In dense urban environments
GNSS can suffer from high signal attenuations and
reflections, which can seriously degrade position estimate
accuracy. In indoor environment the situation is even
worse, as GNSS signals are mostly too weak to be
received at all.
These drawbacks of GNSS have motivated the
development of positioning algorithms that use signals
from existing radio networks. These algorithms use
different properties of radio signals. Most common in
indoor environment are measurements of RSS (Received
Signal Strength) and ToA (Time of Arrival). The work
presented in this paper deals with RSS measurements,
which have the advantage that they are available on
almost every device.
Indoor positioning systems can be based on different
wireless technologies, for example Bluetooth [2], UWB
(Ultra Wide Band) [3] and WiFi (IEEE 802.11) [4-8]. This
work deals with WiFi signals, because WiFi is the most
common technology and it is supported by a wide range of
devices.
Most indoor positioning systems based on WiFi use
some kind of fingerprinting algorithm. In fingerprinting
algorithms, measured RSS values stored in a database
(known as a radio map) are compared to RSS values
measured by the mobile device. A basic difficulty here is
that because of hardware and software differences
between different devices (even devices of the same make
and model), the RSS reported by the mobile device may
differ from the RSS in the database, and this can degrade
the positioning accuracy [9].
One approach to dealing with this issue is to calibrate
the RSS scale and bias for the device, for example using a
self-calibration learning algorithm as proposed in [4].
In this paper we propose a novel fingerprint positioning
algorithm that uses only the rankings of the RSS values.
Because rank information is invariant to any monotonic
increasing transformation (bias and scale), the algorithm's
performance should be unaffected by the calibration of the
mobile device.
The rest of the paper is organized as follows. In the next
section related work in indoor positioning algorithms is
introduced. Section III describes the proposed rank based
algorithm. Similarity measures used in the algorithm are
described in Section IV. Results of tests in a real
environment are given in Section V and Section VI
concludes the paper.
II. RELATED WORK
A. Rank based localization
Rank based localization in wireless networks was
introduced by Yedavalli et al. in [10]. Their Ecolocation
algorithm uses a set of constraints to estimate the position
of a mobile device. Measured RSS values from the APs
(Access Points) that are within range are sorted and
compared with constraints. Position is estimated as the
centroid of points with the highest number of satisfied
constraints.
An improved version of the Ecolocation algorithm was
introduced in [11]. Bisector lines were introduced as lines
connecting points with the same RSS values from two
different APs. Position is estimated as a weighted mean of
positions with the highest number of satisfied constraints.
Another modification of the algorithm [12] uses the
centroids of nearest three regions with the highest number
of satisfied constraints estimated by the previous
algorithm.
A drawback of these methods is their use of bisector
lines, because signal propagation in indoor environment,
where there are many obstacles, is not accurate and equal
values of RSS from two APs are not in a straight line.
B. Fingerprinting localization
In fingerprinting localization, the position of a mobile
device is estimated by comparison of measured RSS
values and RSS values stored in a radio map database.
2011 International Conference on Indoor Positioning and Indoor Navigation (IPIN), 21-23 September 2011, Guimarães, Portugal
Fingerprinting algorithms have two phases – an offline
learning phase and an online operating phase.
In the offline phase, the radio map database is created.
The localization area is divided into small cells [6], and
each cell is represented by a reference point. RSS values
from all APs within range are measured and stored in the
radio map, which is a collection of data vectors that can be
described as:
MjP jNj j,...,2,1),,...,( 1
, (1)
where Nj is the number of APs heard at the j-th reference
point, M is the number of reference points,
i are RSS
values, and parameter vector
j contains additional
information that can be used in the localization phase.
In the online phase the mobile device measures RSS
values from all APs within range. These values are
compared to data stored in the radio map database.
Algorithms used for comparison between RSS data from
the two phases and estimation of position of mobile device
can be divided into two main frameworks – deterministic
and probabilistic.
In the probabilistic (or statistical) framework the mobile
device’s position is modeled as a random vector [13]. The
location candidate
is chosen if its posterior probability is
the highest. The decision rule uses Bayes' theorem:
)(
)()(
)( SP
PSP
SP ii
i
, (2)
where posteriori probability P(
i|S) is a function of
likelihood P(S|
i), prior probability P(
i) and observed
evidence )()()( ii
i
PSPSP
, vector S represents the
observed RSS values during online phase and
i stands for
i-th location candidate.
The deterministic framework is based on optimizing the
similarity between the measurement and the fingerprints.
The position estimate is computed using the weighted
average:
M
i
i
M
i
ii
ω
ω
x
1
1
ˆ
, (3)
where ωi is a non-negative weighting factor. Weights can
be calculated as the reciprocal of the distance between
RSS vectors from online and offline phase. Usually the
Euclidian distance is used but different distance metrics
are also possible [14].
The estimator (3) which keeps the K largest weights and
sets the others to zero is called the WKNN (Weighted K-
Nearest Neighbor) method [7]. WKNN with all weights
i = 1 is called the KNN (K-Nearest Neighbor) method.
The simplest method, where K = 1, is called the NN
(Nearest Neighbor) method. In [6] it was found that
WKNN and KNN methods perform better than the NN
method, particularly when values of parameter K
are 3 or 4.
III. RANK BASED FINGERPRINTING
The main difference between conventional
fingerprinting algorithms and the proposed Rank Based
Fingerprinting (RBF) localization algorithm is the way in
which measured data in offline and online phases are
compared and used to estimate position. In classical
fingerprinting algorithms, vectors of RSS values measured
in online and offline phase are directly compared to each
other.
In the proposed algorithm (Fig. 1) the RSS values
measured in the online phase from different APs are first
sorted from strongest to weakest. Then ranks (1, 2, 3, …)
are assigned to APs based on their position in the sorted
vector. The sorted vector of APs detected in the online
phase is then compared to vectors stored in the radio map.
Rank vectors are created for vectors stored in the database.
Ranks are assigned based on the MAC (Media Access
Control) address of AP and the rank of the AP in online
phase. In case that one (or more) of the APs from the
online phase is not found in the database, the rank vector
created from the radio map is padded with 0, to achieve
the same length as the rank vector from the online phase.
Radio map
RSS Data
MAC address
Sort and comparison
Rank Vector
Rank vector
comparison
Estimate
position
Figure 1. Block diagram of proposed RBF algorithm
These rank vectors are then compared to the online
phase vector using one of the similarity measures
introduced in the next section. The K reference points with
smallest difference are used to calculate the estimated
position using the weighted average formula (3).
x
ˆ
IV. SIMILARITY MEASURES
In this section similarity measures used to compare
ranking vectors in RBF algorithm are introduced. In all
cases the online and offline RSS vectors are assumed to
have the same length.
A. Spearman distance
Spearman distance [15] is the square of Euclidean
distance between two rank vectors:
, (4)
n
k
kkS yxD
1
2
where xk is the rank of k-th element in vector X, yk is the
rank of k-th element in vector Y and n is the number of
elements in vectors X and Y.
2011 International Conference on Indoor Positioning and Indoor Navigation (IPIN), 21-23 September 2011, Guimarães, Portugal
B. Spearman’s footrule
Spearman’s footrule distance measures total element-
wise displacement between two permutations [16]. It is
similar to the Manhattan distance for quantitative
variables. Spearman’s footrule distance can be computed
as:
n
k
kkF yxD
1. (5)
C. Jaccard coefficient
The Jaccard coefficient is used to measure the similarity
of two sets of data. It is defined as the size (cardinality) of
the intersection of the data sets divided by the size of the
data sets [17]. It is a special case of the normalized
Hamming distance and can be computed using:

n
yx
C
n
k
kk
J
1. (6)
D. Hamming distance
Hamming distance is the number of disagreements
between two vectors. Hamming distance can also be used
for ordinal variables to measure disorder of elements in
two vectors [18]. In the RBF algorithm a weighted
Hamming distance was used to compute distance between
two rank vectors:
, (7)
n
k
kkkH yxD
1
where ωk denotes the weight assigned to the k-th element
of the rank vector.
E. Canberra distance
The Canberra distance is the sum of fraction differences
between two vectors. Each fraction difference is a value
between 0 and 1 [19]. If one of coordinates is zero, the
term become unity regardless the other values, thus the
distance will not be affected. A weighted version of
Canberra distance was used in the RBF algorithm:
k
n
kkk
kk
Cyx
yx
D
1. (8)
V. EXPERIMENTAL RESULTS
The experiment was carried out in Tietotalo building at
Tampere University of Technology. The area was covered
with 96 reference points. The average number of heard
APs per fingerprint was 29 and altogether 206 APs were
detected during data collection.
Measurements in the offline phase of the fingerprinting
algorithm were done with Nokia N900 mobile phone and
the data collecting software was implemented with Qt
Developer. The area where the test was performed, with
the positions of reference points, is shown in Fig. 2.
Figure 2. Localization area
Experimental measurements in the online phase were
done a month later with the same mobile phone Nokia
N900 and then a couple of weeks later with an Asus N63
laptop using WirelessMon software. Measured RSS data
were used to estimate the position of the mobile device
using fingerprinting algorithms. Measurements were done
at 43 points. Track of mobile devices in online phase is
shown on Fig. 2 as a black line.
In this scenario differences in localization accuracy are
caused by the change of device used in the online phase
and also by changes in environment. Results achieved in
this scenario using proposed RBF algorithm with different
similarity measures are shown in Fig. 3.
Nokia N900 Asus N63
0
5
10
15
20
25
Error [m]
Spearman distance
Spearman's footrule
Hamming distance
Jaccard coefficient
Canberra distance
Figure 3. Bars show mean error achieved using RBF and error bars
show the 5% and 95% quantiles Asterix show median error.
From results shown in Fig. 3 it can be seen that
Spearman’s footrule performs best in this real world
scenario. When Spearman’s footrule was used, median
error does not change, and mean error decreased by 1.5
meter when different devices were used in online and
offline phases. It is interesting to see that Asus does better
than Nokia, even though the Nokia was used to create the
radio map. This may be caused by changes of the
environment and also by hardware and software
equipment of used devices.
When best similarity measure in RBF algorithm was
found, performance of this algorithm can be compared to
NN and WKNN algorithms. For this comparison the same
data were used; in these algorithms the distance between
RSS vectors and weights were calculated using Euclidean
distance.
From results shown on Fig. 4 it can be seen that mean
error of proposed RBF algorithm outperforms commonly
2011 International Conference on Indoor Positioning and Indoor Navigation (IPIN), 21-23 September 2011, Guimarães, Portugal
used NN and WKNN algorithms. It is clear that position
error is less affected by change of the mobile device and
environment. From these results RBF algorithm seems to
be a great improvement, compared to NN and WKNN
algorithms.
[3] L. Zheng, W. Dehaene, G. Gielen, “A 3-Tier UWB-based indoor
localization scheme for ultra-low-powersensor nodes,” IEEE
International Conference on Signal Processing and
Communications ICSPC 2007, pp: 995-998, 2007
Nokia N900 Asus N63
0
10
20
30
40
Error [m]
RBF
WKNN
NN
[4] L. Koski, T. Perälä, R. Piché, “Indoor positioning using WLAN
coverage area estimates,” 2010 International Conference on
Indoor Positioning and Indoor Navigation IPIN2010, Sept. 2010
[5] O. Krejcar, “User localization for large artifacts prebuffering and
safety possibilities in mobile embedded systems,” International
Conference on Advanced Computer Control, January 2009
[6] V. Honkavirta, T. Perälä, S. Ali-Löytty, R. Piché, “A comparative
survey of WLAN location fingerprinting methods,” 6th Workshop
on Positioning, Navigation and Communication, WPNC 2009, pp:
243– 251, 2009
[7] B. Li, J. Salter, A. G. Dempster, C. Rizos, “Indoor positioning
techniques based on wireless LAN,” School of Surveying and
Spatial Information Systems, UNSW, Sydney, Australia, Tech.
Rep., 2006.
[8] S. Saha, K. Chauhuri, D. Sanghi, P. Bhagwat, “Location
determination of a mobile device using IEEE 802.11b access point
signals, Wireless Communications and Networking, WCNC 2003.
vol. 3, pp: 1987 - 1992, 2003
Figure 4. Comparison of RBF with NN and WKNN
Compared to WKNN, the mean error (bars on Fig. 4.)
of RBF algorithm is 50% lower when the same device was
used and 65% lower in case the devices in online and
offline phases were different. Note that RBF performs
better than NN and WKNN with every implemented
similarity measure.
[9] T. Vaupel; J. Seitz, F. Kiefer, S. Haimerl, J. Thielecke, “Wi-Fi
positioning: System considerations and device calibration,”
International Conference on Indoor Positioning and Indoor
Navigation, IPIN2010, Sept. 2010
[10] K. Yedavalli, B. Krishnamachari, S. Ravulat, B. Srinivasan,
“Ecolocation: a sequence based technique for RF localization in
wireless sensor networks,” Proceedings of the 4th International
Symposium on Information Processing in Sensor Networks,
IPSN '05, pp. 285–292, April 2005.
[11] D. Chen; W. Xiao; X. Zhao; “An improved localization algorithm
in wireless sensor network,” IEEE International Conference on
Robotics and Biomimetics ROBIO 2009, pp.1253-1258, Dec. 2009
VI. CONCLUSION AND FUTURE WORK
We have described a novel RBF algorithm for indoor
localization. The main advantage of this algorithm is that
its performance is about the same for any receiver,
without the need of calibration of RSS values.
Experimental results show that proposed algorithm
achieves better accuracy than algorithms NN and WKNN.
The impact of different similarity measures used in
RBF algorithm was also investigated. Spearman’s footrule
seems to perform best among all implemented measures in
a real indoor environment. RBF in combination with any
of the described similarity measures performs better than
NN and WKNN algorithms.
In future more experimental tests will be done, and the
impact of AP placement and the number of APs on
localization accuracy will be investigated. The impact of
density of reference points used in offline phase of
algorithm to accuracy of proposed algorithm will be
another part of future research. Other similarity measures,
such as in Webber et al. [20], will also be studied.
[12] Z. Liu; J. Chen, “A New Sequence-Based Iterative Localization in
Wireless Sensor Networks,” International Conference on
Information Engineering and Computer Science ICIECS 2009.,
pp.1-4, Dec. 2009
[13] Tsung-Nan Lin; Po-Chiang Lin, “Performance comparison of
indoor positioning techniques based on location fingerprinting in
wireless networks,” International Conference Wireless Networks,
Communications and Mobile Computing 2005, Volume 2, pp.
1569- 1574, 2005
[14] J. Machaj, P. Brida, “Performance Comparison of Similarity
Measurements for Database Correlation Localization Method,”
3rd Asian conference on intelligent information and database
systems ACIIDS 2011, April 2011 – “in press”
[15] I. Contreras, “Emphasizing the rank positions in a distance-based
aggregation procedure,” Decision Support Systems, Volume 51,
Issue 1, pp. 240-245 April 2011
[16] R. Kumar, S. Vassilvitskii, “Generalized distances between
rankings, Proceedings of the 19th international conference on
World wide web,” April 2010
[17] J. Bank, B. Cole, “Calculating the Jaccard Similarity Coefficient
with Map Reduce for Entity Pairs in Wikipedia,”, Wikipedia
Similarity Team, December 2008
ACKNOWLEDGMENT
This work was partially supported by the Slovak
Research and Development Agency under contract No.
LPP-0126-09 and by the Slovak VEGA grant agency,
Project No. 1/0392/10. We thank Laura Wirola, née
Koski, and Toni Fadjukoff for assistance in the data
collection.
[18] A. Tarsitano, “Comparing the effectiveness of rank correlation
statistics,” Working Papers, Università della Calabria,
Dipartimento di Economia e Statistica, 2009.
[19] S.-H. Cha, “Comprehensive survey on distance/similarity
measures between probability density functions,” International
Journal of Mathematical Models and Methods in Applied Science,
vol. 1, no. 4, 2007
[20] W. Webber, A. Moffat, J. Zobel, “A similarity measure for
indefinite rankings,” ACM Transactions on Information Systems,
Volume 28, Issue 4, 38 pages, November 2010
REFERENCES
[1] D. Mohapatra, S. B. Suma, “Survey of location based wireless
services,” IEEE International Conference on Personal Wireless
Communications, ICPWC 2005, 2005
[2] S. S. Chawathe,. “Low-latency indoor localization using bluetooth
beacons,” 12th International IEEE Conference on Intelligent
Transportation Systems, 2009. ITSC '09., pp: 1 – 7, 2009
... For instance, the authors of Wu, Xu, Yang, Lane, and Yin (2017) propose fingerprint spatial gradient, that exploits spatial features of fingerprints from multiple adjacent locations to reduce spatial ambiguity and temporal instability of classical fingerprinting. Another alternative is to make use of ranking based fingerprints, where the RSS information is only exploited to sort the APs detected at each location in decreasing order (Cheng, Chawathe, LaMarca, & Krumm, 2005;Machaj, Brida, & Piché, 2011). As a result, sequences of AP identifiers, without any explicit information on their RSSs, are considered. ...
... As a result, sequences of AP identifiers, without any explicit information on their RSSs, are considered. This allows to better deal with problems such as device heterogeneity and signal perturbations, even though, in the past, the general performances brought by this kind of representation were lower than full-fledged fingerprint based approaches (Cheng et al., 2005;Laoudias, Piché, & Panayiotou, 2013;Lohan et al., 2017;Ma, Wu, & Poslad, 2019;Machaj et al., 2011;Saccomanno, Brunello, & Montanari, 2020;Tiku & Pasricha, 2019). ...
... Deterministic-like ranking based fingerprints combined with -NN are proposed by Machaj et al. (2011). Among multiple considered metrics, Spearman's footrule emerges as the most performing one. ...
Article
In a world increasingly pervaded by mobile and IoT devices, position-related information is gaining more and more importance. Highly accurate and standardized positioning techniques are not yet available for indoor scenarios, unlike for the outdoor case. The most commonly used method for indoor positioning is WiFi fingerprinting, which, despite its well-recognized advantages, still suffers from some notable limitations. Recently, approaches relying on deep learning showed promising results even though their lack of interpretability is still a significant drawback. In this paper, for the first time, we propose a domain-specific concept of interpretability, based on identifying the access points that are most relevant to a position estimate. The goal is to enhance the positioning process by gaining novel scientific knowledge and operational insights, without worsening the performance of the task. We show how it is possible to practically achieve both a local and a global notion of interpretability by means of a deep learning model equipped with an attention module, applied to a ranking based fingerprint representation. Since off-the-shelf application of attention does not guarantee to achieve a faithful nor plausible interpretation, we verified through a series of thoroughly designed quantitative and qualitative clustering based experiments the existence of a strong relationship between the obtained interpretations and the positioning domain. Finally, as by-product, we showed an example of how the new knowledge can be used in principle to improve positioning performance.
... They concluded that the correlationbased similarity metrics have the best matching performance. In [29], the impact of five different fingerprint matching similarity metrics, which include Spearman distance, Spearman's footrule distance, Jaccard coefficient, hamming distance, and Canberra distance, using the rank-based fingerprinting (RBF) localization algorithm, is determined. The authors concluded that Spearman's footrule distance-based similarity metric performed the best based on the fingerprint database they considered. ...
Article
Full-text available
Fingerprint database clustering and localization using k‐medoids and k‐nearest neighbour (k‐NN) algorithms respectively typically use distance‐based fingerprint similarity metrics, with their performances dependent on the type of distance metric used. This paper proposes employing a pattern‐based metric, the context similarity coefficient (CSC), for both algorithms instead of traditional distance‐based metrics. The CSC accounts for fingerprint behaviour and the non‐linear relationships among fingerprints during the similarity measurement. The performance of both algorithms with the CSC as the similarity metric is evaluated on four publicly available fingerprint databases, using position root mean square error (RMSE) and silhouette score as performance metrics. These results are compared to those of the same algorithms using five distance‐based metrics: Euclidean, square Euclidean, Manhattan, cosine, and Chebyshev distances. The k‐medoids algorithm with CSC shows moderate clustering performance compared to the five distance‐based metrics considered. However, when combined with the k‐NN algorithm also using CSC, it achieves the highest localization accuracy, with at least a 29% improvement in position RMSE across all four databases. The results indicate that while k‐medoids with CSC may not create well‐separated clusters, combining it with the k‐NN algorithm with CSC as its similarity metric significantly enhances localization accuracy compared to distance‐based metrics.
... The localization performance of the simultaneous localization and mapping (SLAM) algorithm was determined using eight different distance-based similarity metrics, which include Euclidean, Manhattan, Chebyshev, cosine, Spearman, variable, and correlation [19]. Also, in [20], the localization performance of the rank-based fingerprinting (RBF) localization algorithm was determined using Spearman distance, Spearman's footrule distance, Jaccard coefficient, hamming distance, and Canberra distance as fingerprint similarity metrics. Based on the database they considered, the authors concluded that Spearman's footrule distance resulted in the best localization accuracy. ...
Article
Full-text available
Distance-based metrics are the most common fingerprint similarity metrics used in fingerprint database clustering and localization processes in a fingerprint-based localization system. In this paper, however, a less common but promising pattern-based fingerprint similarity metric is proposed as an alternative to the distance-base metric. The proposed fingerprint similarity metric is based on an inverse weight (IW) normalization of the context similarity coefficient (CSC)-based similarity metric measure. The clustering and localization performance of the fingerprint-based localization system with the proposed IW-CSC-based fingerprint similarity metric is determined and compared to the square Euclidean, Manhattan, and cosine distance-based metrics. The k-means algorithm with a k-means++ cluster initialization process is considered for fingerprint database clustering, while the k-nearest neighbor (k-NN) algorithm is considered for localization. Based on the four fingerprint databases considered, the proposed IW-CSC-based metric has the slowest localization time with moderate clustering performance. However, it has the best localization performance, which is at least 52% higher than the localization performances of the three distance-base metrics considered. The proposed IW-CSC-based metric is recommended as an alternative to the distance-base metric only when improved localization performance is the primary objective of the fingerprint-based localization system. It is also recommended for use in small to medium-sized fingerprint databases for clustering and localization.
Chapter
Indoor localization, positioning, and navigation are an upcoming application domain for the navigation and tracking of people and assets. Ubiquitously available Wi-Fi signals have enabled low-cost fingerprinting-based localization solutions. Further, the rapid growth in mobile hardware capability now allows high-accuracy deep learning-based frameworks to be executed locally on mobile devices in an energy-efficient manner. However, existing deep learning-based indoor localization frameworks are vulnerable to access point (AP) attacks. This chapter presents an analysis into the vulnerability of a convolutional neural network (CNN)-based indoor localization solution to AP security compromises. Based on this analysis, we propose a novel methodology to maintain indoor localization accuracy, even in the presence of AP attacks. The proposed secured framework (called S-CNNLOC) is validated across a benchmark suite of paths and is found to deliver up to 10× more resiliency to malicious AP attacks, compared with its unsecured counterpart.
Article
Contact tracing is a powerful tool for mitigating the spread of COVID-19 during the pandemic. Front-line healthcare workers are particularly at high risk of infection in hospital units. This paper presents ContAct TraCing for Hospitals (CATCH), an automated contact tracing system designed specifically for healthcare workers in hospital environments. CATCH employs distributed embedded devices placed throughout a hospital unit to detect close contacts among healthcare workers wearing Bluetooth Low Energy (BLE) beacons. We first identify a set of distinct contact tracing scenarios based on the diverse environmental characteristics of a real-world intensive care unit (ICU) and the different working patterns of healthcare workers in different spaces within the unit. We then develop a suite of novel contact tracing methods tailored for each scenario. CATCH has been deployed and evaluated in the ICU of a major medical center, demonstrating superior accuracy in contact tracing over existing approaches through a wide range of experiments. Furthermore, the real-world case study highlights the effectiveness and efficiency of CATCH compared to standard contact tracing practices.
Chapter
Indoor localization is an emerging application domain that promises to enhance the way we navigate in various indoor environments, as well as track equipment and people. Wireless signal-based fingerprinting is one of the leading approaches for indoor localization. Using ubiquitous Wi-Fi access points and Wi-Fi transceivers in smartphones has enabled the possibility of fingerprinting-based localization techniques that are scalable and low-cost. However, the heterogeneity of Wi-Fi hardware modules and software stacks used in smartphones nowadays introduces problems when employing Wi-Fi-based fingerprinting methodologies across devices, hence diminishing the accuracy of localization. Through this chapter we propose a framework called SHERPA that enables efficient porting of indoor localization techniques across mobile devices, to maximize accuracy. An in-depth analysis comparing two variants of our proposed framework proves that it can deliver up to 8× more accurate results as compared to state-of-the-art localization techniques for a variety of environments.KeywordsFingerprinting-based indoor localizationHidden Markov modelPattern matchingDevice heterogeneityIndoor positioning
Chapter
Indoor localization, positioning, and navigation are an upcoming application domain for the navigation and tracking of people and assets. Ubiquitously available WiFi signals have enabled low-cost fingerprinting-based localization solutions. Further, the rapid growth in mobile hardware capability now allows high-accuracy deep learning-based frameworks to be executed locally on mobile devices in an energy-efficient manner. However, existing deep learning-based indoor localization frameworks are vulnerable to access point (AP) attacks. This chapter presents an analysis into the vulnerability of a convolutional neural network (CNN)-based indoor localization solution to AP security compromises. On the basis of this research, we offer a unique strategy for maintaining indoor localization accuracy despite AP attacks. The proposed secured framework (named S-CNNLOC) is validated over a benchmark suite of paths and is proven to be up to ten times more resistant to malicious AP attacks than its unprotected version.KeywordsAP jammingSecurityIndoor localizationFingerprinting
Conference Paper
Full-text available
In wireless sensor networks, the localization space can be divided into distinct regions that can each be uniquely identified by sequences in traditional sequence-based localization (SBL). The sequences represent the ranking of distances from the reference nodes to that region. But the average estimate error for locations in a face region is quite in evidence. For the problem of location error, a new localization technique which is an improvement of SBL is proposed here. It uses the triangular area enclosed by the centroids of the three "nearest" location regions to exclude areas in which the unknown nodes do not exist, so it will narrow the range to some extend and then improve the accuracy of localization. Then the new localization chooses the centroid of the triangular represented as location estimate of the unknown node, at last it regards the unknown node as a reference node and locates the next unknown node iteratively. The new localization technique will bring some computing increases, however it does not need additional improvement in hardware or complexity of nodes. Simulation experiments prove that the new localization provides comparable or better accuracy than SBL and the centroid method. If the proportion of reference nodes increases, the location error will decrease markedly.
Article
Full-text available
As well as delivering high speed internet, Wireless LAN (WLAN) can be used as an effective indoor positioning system. It is competitive in terms of both accuracy and cost compared to similar systems. To date, several signal strength based techniques have been proposed. Researchers at the University of New South Wales (UNSW) have developed several innovative implementations of WLAN positioning systems. This paper describes the techniques used and details the experimental results of the research.
Conference Paper
Full-text available
The term ldquolocation fingerprintingrdquo covers a wide variety of methods for determining receiver position using databases of radio signal strength measurements from different sources. In this work we present a survey of location fingerprinting methods, including deterministic and probabilistic methods for static estimation, as well as filtering methods based on Bayesian filter and Kalman filter. We present a unified mathematical formulation of radio map database and location estimation, point out the equivalence of some methods from the literature, and present some new variants. A set of tests in an indoor positioning scenario using WLAN signal strengths is performed to determine the influence of different calibration and location method parameters. In the tests, the probabilistic method with the kernel function approximation of signal strength histograms was the best static positioning method. Moreover, all filters improved the results significantly over the static methods.
Conference Paper
Full-text available
This paper introduces a novel method for positioning using coverage area estimates of wireless communication nodes. The coverage areas are estimated in a Bayesian inference framework using location fingerprints that are collected in an offline calibration phase, and the estimated coverage areas are stored in a database. In the online positioning phase the coverage areas of the heard communication nodes are used to infer the position of the mobile terminal. Floor plan information is used to enhance the positioning accuracy. In a field study comparing Kalman Filter, Box Filter and Particle Filter using real WLAN measurement data, it is found that Kalman Filter achieves almost the same accuracy as Box Filter and Particle Filter but with smaller computational load.
Article
Distance or similarity measures are essential to solve many pattern recognition problems such as classification, clustering, and retrieval problems. Various distance/similarity measures that are applicable to compare two probability density functions, pdf in short, are reviewed and categorized in both syntactic and semantic relationships. A correlation coefficient and a hierarchical clustering technique are adopted to reveal similarities among numerous distance/similarity measures.
Article
Main area of interest is in a model of a radio-frequency based system for locating and tracking users of control or information system inside the corporate area. The developed framework joins the concepts of location and user tracking as an extension for a new type of mobile embedded systems. The PDPT (Predictive Data Push Technology) framework uses a WiFi network infrastructure to let a mobile device determine its position. User position is used for data pre-buffering and pushing information from server database to user’s PDA database. All server data is saved as artifacts (together) with its position information in building. The accessing of such prebuffered data on mobile embedded device can highly improve the response time needed to view large multimedia data. All data artifacts are transferred from PDPT Server database to mobile embedded device database throw secured wireless connection standard EAP-TLS.
Conference Paper
Indoor localization refers to the task of determining the location of a traveler in spaces (such as large building complexes or airport terminals) using coordinates appropriate to those spaces (such as floor and room number or airport terminal and gate). Indoor localization using Bluetooth beacons is attractive because of the low cost and high spatial selectivity of Bluetooth devices. However, a significant drawback of the Bluetooth protocol for this application is the large delay incurred in the discovery phase of the protocol, which is the phase used for detecting beacons. These delays, of approximately 20 seconds, hamper the use of this localization method because typical walking speeds are likely to change the set of potentially visible beacons part-way through the discovery phase. We study the causes of these delays and propose methods for alleviating them for indoor localization applications. We formalize the key problem of finding a minimum-cost complete beacon-probing plan and present an algorithm for generating such plans.
Conference Paper
In this paper, a hierarchical indoor localization scheme is proposed to enable the use of autonomously powered ultra-low-power tags attached to the objects with unknown position. Using the UWB characteristics and the 3-tier organization (consisting of a large number of cost-effective tags, a small number of cheap and low-power hubs and a few synchronized base stations), the proposed localization scheme can provide a wide geographical coverage and precise positioning. Localization is based on the arrival time of the UWB pulses at the reference nodes with known locations. We formalize the hub placement problem as an optimization problem. Simulations investigate the performance degradation due to the nonideal hub placement and hub localization error.
Conference Paper
Due to an increasing number of public and private access points in indoor and urban environments, Wi-Fi positioning becomes more and more attractive for pedestrian navigation. In the last ten years different approaches and solutions have been developed. But Wi-Fi hardware and network protocols have not been designed for positioning. Therefore, Wi-Fi devices have different hardware characteristics that lead to different positioning accuracies. In this article we analyze and discuss hardware characteristics of Wi-Fi devices with a focus on the so called Wi-Fi fingerprinting technique for positioning. The analysis is based on measurements collected using a static setup in an anechoic chamber to minimize signal reflections and noise. Characteristics like measurement offsets and practical polling intervals of different mobile devices have been examined. Based on this analysis a calibration approach to compensate the measurement offsets of Wi-Fi devices is proposed. Experimental results in a typically office building are presented to evaluate the improvement in localization accuracy using the calibration approach.