| Literature DB >> 35233260 |
Pothuri Surendra Varma1, Veena Anand1.
Abstract
IoT services are the basic building blocks of smart cities, and some of such crucial services are provided by smart buildings. Most of the services like smart meters, indoor navigation, lighting control, etc., which contribute to smart buildings, need the locations of people or objects within the building. This gave rise to Indoor Localization, where only the infrastructure of the building has to be used for localization as accessing the Global Positioning System is difficult in indoor environments. Many approaches have been proposed to predict locations based on the infrastructure available indoors, and some of such techniques use Wi-Fi access points. Still, unfortunately, very few studies have concentrated on tolerating faults while being cost-effective. This work discusses hardware implementation of indoor localization. It then proposes a learning algorithm SRNN (Speed Conscious Recurrent Neural Network) that uses the RSSI (Received Signal Strength Indicator) values of available Wi-Fi access points in the building and predicts the location. Also, fault-tolerant approaches termed nearest RSSI and the most recent RSSI using Kullback-Leibler Divergence have been proposed to improve the location accuracy when access points go down and are prone to faults. Both the proposed approaches nearest RSSI and most recent RSSI along with SRNN improve the location accuracy by 4% and 2.1%, respectively, over existing techniques and contribute to optimizing predicted location's accuracy in Indoor Localization an IoT service for smart buildings. Supplementary information: The online version contains supplementary material available at 10.1007/s12083-022-01301-y.Entities:
Keywords: Indoor localization; Kullback–Leibler divergence; Received signal strength indicator; Smart buildings; Speed conscious recurrent neural network
Year: 2022 PMID: 35233260 PMCID: PMC8872895 DOI: 10.1007/s12083-022-01301-y
Source DB: PubMed Journal: Peer Peer Netw Appl ISSN: 1936-6442 Impact factor: 3.488
Fig. 1Basic architecture of indoor localization
Fig. 2Access point failure in indoor localization
Fig. 3Data set generation process through a manual site survey
Description for various notations used
| Symbol | Description |
|---|---|
| T | Time ranging from 1 to t |
| RNN | Recurrent Neural Network |
| R(t) | RSSI given as input to RNN at time ‘t’ |
| PL(t) | Previous Location at time t, used as the hidden state in RNN |
| F(t) | Output of the Neural Network at time ‘t’ |
| M | Loss function |
| W | Weight matrices of the Neural Network |
| γ | Learning rate to update the weight matrices |
| nbr(Ft) | Function to check if predicted location is present in neighbors of Ft or not |
| b | Number of neighbors returned from nbr() |
| D | Data set |
| d | Number of data points in the data set |
| x | Total number of class labels |
| KLD | Kullback–Leibler Divergence |
| NA | RSSI value is not available |
| SRNN | Speed Conscious Recurrent Neural Network |
The table represents the summary of the latest related works
| Authors | Objectives | Proposed methods | Gap identified |
|---|---|---|---|
| Barsocchi et al. (2021) [ | To preserve social distance in indoor environments | Privacy through a compliant Access Control (AC) system | Improvement in localization results to be compared with the state-of-the-art techniques |
| Achour et al. (2019) [ | Location Accuracy, Computation time | Non-Gaussian probability density function | Noticeable costs due to specific hardware |
| Kumar and Das (2020) [ | Target detection accuracy | Mini-batch Singular Value Decomposition | Focus only on sensor location uncertainty |
| Li et al. (2020) [ | Construct space of candidate labels | Multiple Machine Learning Algorithms | A probabilistic model to estimate user's location |
| Sheng et al. (2020) [ | Achieve flexible array orientation and receiver positions | Array calibration, AoA estimation algorithm | Dynamic array arrangement might not be feasible in all environments |
| Li et al. (2020) [ | Mitigate noise problem | Torus Intersection localization (TILoc) | Not accurate during slight noise |
| Zhang et al. (2020) [ | Lightweight privacy-preserving scheme (LPW2) | Minimizing least square error for overdetermined linear formulation | More importance to privacy rather than location accuracy |
| Liu et al. (2020) [ | Low cost, low power, and scalable localization | DNN along with de-noising autoencoder | Performance is evaluated by analyzing only runtime and noise |
| Bai et al. (2020) [ | Low energy, accurate human location in home environments | Trilateration and fingerprint-based methods | Additional hardware might be required as wearables are used |
| Sadhu et al. (2019) [ | Cross building localization, privacy, and latency | onion routing and perturbation/randomization techniques | Need to collaborate signals from Wi-Fi, Cellular RSSI, light, sound, geo-magnetic |
| Nieminen and Jrvinen (2020) [ | privacy-preserving indoor localization scheme | Cryptographic primitives—Paillier encryption and garbled circuits | Costs of privacy increase noticeably |
| Zhao et al. (2020) [ | Lightweight privacy-preserving localization | Location Preservation Algorithm with Plausible Dummies | Attacks are still possible due to Spatio-temporal correlations among locations |
| Kwak et al. (2018) [ | low computational complexity, energy efficiency | BLE interface and two sensors—magnetometer and accelerometer | Issues using a magnetic field, costs of specific hardware |
| Bhat and Santhosh (2020) [ | Stable localization under faulty conditions | K-means clustering and majority voting methods | Conventional methods like K-means clustering were used |
| Carvalho et al. (2019) [ | localization accuracy during faults | Recurrent Neural Network | Failed base station is ignored completely during faults |
Table representing the parameters optimized in each work
| Authors | Location Accuracy | Cost-effective | Energy efficient | Fault-tolerant | Privacy-preserving | Low latency |
|---|---|---|---|---|---|---|
| Fang et al. (2021) [ | ✓ | ✓ | X | X | X | X |
| Zhang et al. (2021) [ | ✓ | ✓ | X | X | X | X |
| Barsocchi et al. (2021) [ | ✓ | X | X | X | ✓ | X |
| Achroufene et al. (2018) [ | ✓ | X | X | X | X | ✓ |
| Luo et al. (2018) [ | ✓ | X | X | X | X | X |
| Hoang et al. (2019) [ | ✓ | X | X | X | X | X |
| Kumar and Das (2020) [ | ✓ | ✓ | X | X | X | X |
| Li et al. (2020) [ | ✓ | X | X | X | X | ✓ |
| Sheng et al. (2020) [ | ✓ | ✓ | X | X | X | X |
| Li et al. (2020) [ | ✓ | ✓ | X | X | X | ✓ |
| Zhang et al.(2020) [ | ✓ | ✓ | X | X | ✓ | ✓ |
| Liu et al. (2020) [ | ✓ | ✓ | ✓ | X | X | ✓ |
| Bai et al. (2020) [ | ✓ | X | ✓ | X | X | X |
| Sadhu et al. (2019) [ | ✓ | X | ✓ | X | ✓ | ✓ |
| Nieminen and Jrvinen (2020) [ | ✓ | X | X | X | ✓ | X |
| Zhao et al. (2020) [ | ✓ | ✓ | ✓ | X | ✓ | X |
| Kwak et al. (2018) [ | ✓ | X | ✓ | X | X | ✓ |
| Bhat and Santhosh (2020) [ | ✓ | X | X | ✓ | X | X |
| Carvallo et al. (2019) [ | ✓ | X | X | ✓ | X | X |
| Salazar et al. (2019) [ | ✓ | ✓ | ✓ | X | X | X |
| Guidara et al. (2019) [ | ✓ | X | ✓ | X | X | ✓ |
| Zhao et al. (2018) [ | ✓ | ✓ | X | X | ✓ | X |
| Tiku and Pasricha (2019) [ | ✓ | X | X | X | ✓ | X |
Fig. 4An unfolded Recurrent Neural Network was used for Localization
Fig. 5Layout of the indoor environment
Fig. 6Part of indoor environment layout
Fig. 7Unmatched locations using SRNN
Fig. 8No. of wrong predictions at each location with SRNN
Fig. 9No. of matched locations for each algorithm
Fig. 10Plot for No. of matched locations during faults
Fig. 11Comparison of results before and after faults
Fig. 12Bar Graph presenting the improvement while using a fault-tolerant approach
Fig. 13without faults vs. with faults vs. fault-tolerant approach
Fig. 14Using SRNN before faults, after faults, and with fault tolerance
Fig. 15The efficiency of various fault-tolerant approaches
Divergence values for various data used
| Data | Standard | Data | Kullback–Leibler Divergence |
|---|---|---|---|
| Original | 11.27 | Original vs. Faulty | 6.06 |
| Faulty | 14.87 | Fault-Tolerant vs. Faulty | 4.88 |
| Fault-Tolerant | 11.70 | Original vs. Fault Tolerant | 3.29 |
Fig. 16Kullback–Leibler Divergences at various stages of data pre-processing
Fig. 17Unmatched locations using KLDPA
Fig. 18Unmatched locations using LSVT
Fig. 19Unmatched locations using LSVT
Fig. 20Comparison of results before and after faults
Fig. 21The efficiency of various fault-tolerant approaches
Fig. 22without faults vs. with faults vs. fault-tolerant approach.