Open Access

A real-time device-free localization system using correlated RSS measurements

EURASIP Journal on Wireless Communications and Networking20132013:186

Received: 5 December 2012

Accepted: 2 July 2013

Published: 9 July 2013


Device-free localization (DFL) with wireless sensor networks (WSN) is an emerging technology for target localization, which has received much attention in the area of Internet of Things. Received signal strength (RSS) measurements are the key to realize DFL and mainly affects the localization performance. Most existing approaches need to measure the RSS of all the wireless links in WSN, which take much time on measurement process and localization algorithm due to the large amounts of RSS data, thus they are inefficient, especially in the case of target tracking. In this paper, by making full use of the consecutiveness of motion, we present an efficient measurement strategy based on a small set of correlated wireless links. Furthermore, a lightweight compressed maximum matching select (CMMS) algorithm is proposed to localize target, which only needs a small-scale matrix-vector product operating for one estimation. The proposed approach can significantly reduce the number of RSS measurements and improve the real-time capability of the DFL system. Experimental results demonstrate the superior performance of the proposed method in the context of target localization and tracking.


Internet of Things; Wireless sensor networks; Device-free localization; Compressed maximum matching select; Efficient measurement

1 Introduction

Internet of Things (IoT) concerns about the seamless interaction of objects, sensors, and computing devices[1]. With the integration of wireless sensor networks (WSN) and the Internet, the IoT is fast becoming a reality. IoT is applicable to various areas, including business logistics, home automation, and healthcare[2]. Tracking is an important aspect of the healthcare domain[3]. Device-free localization (DFL)[4] is an emerging method for localizing and tracking target with WSN, which does not need equipping the target with any wireless device. Hence, the DFL technology would not inconvenience the target or make it uncomfortable. The DFL also can be used in other applications such as intrusion detection, nighttime security monitoring, and emergency rescue, where the traditional localization scheme that target needs to equip with a wireless device to transmit or receive wireless signals will become invalid. The location information is extremely useful in these applications, as it may provide life-saving benefits for the emergency responders. Therefore, the study on realizing efficient real-time DFL with WSN is necessary and significative.

There are lots of wireless links within the deployment area of the WSN. When an object moves into the area, it may shadow some of the links and reflect, absorb, diffract, or scatter some of the transmitted power, which will change the received signal strength (RSS) of the shadowed links. The object locating at a different location will shadow different links, so we can realize DFL based on RSS measurements. Since there are too many wireless links in a WSN, the measurements of all the wireless links will cause some disadvantages in resources consumption, system latency, and estimation processing. This article focuses on using efficient measurement strategy and lightweight algorithm to realize real-time DFL.

Wilson and Patwari[47] formulated the DFL as a radio tomography imaging (RTI) problem and utilized regularization method to solve it. Moussa and Youssef[8, 9] modeled the DFL as a machine learning problem and adopted fingerprint-matching method to solve the problem. Zhang et al.[1014] proposed a signal dynamic model and used the geometric method and probabilistic cover algorithm based on dynamic clustering to localize targets. All these works require sufficient RSS measurements of wireless links, which are inefficient, have high-resource consumption, and sometimes are not even possible. In this paper, based on the consecutiveness of motion, we propose an efficient measurement strategy that only needs to measure a few wireless links. Furthermore, we consider the information of target locations as a sparse signal and reconstruct it via compressive sensing (CS) method. CS has been applied to realize DFL in[15]; however, the convex optimization approach was adopted to reconstruct the sparse signal, which is computationally expensive. Meanwhile, the reconstruction is based on a randomly selected set of links, and this leads to inefficiency and low consistency. Wang et al.[16] presented a novel Bayesian greedy matching pursuit (BGMP) algorithm to solve the DFL problem based on the enumeration region built on prior information. However, the algorithm is still computationally expensive.

In this article, for realizing efficient real-time DFL system with wireless network, we first provide the radio tomography imaging model for relating the variances of RSS measurements of wireless links to the spatial locations of the targets. Based on the RTI model, we formulate the DFL issue as a sparse signal reconstruction problem. Then we propose a novel and efficient measurement strategy based on the correlated links which are determined with possible region built on the previous reconstruction. We also propose a compressed maximum matching select (CMMS) algorithm for fast reconstruction of the signal. It only utilizes RSS measurements of the correlated links and reconstructs the signal within a restricted subspace. Hence, the running time of the algorithm is reduced and the reconstruction performance is improved simultaneously, which completely meet the need for real-time DFL applications.

The remainder of this paper is organized as follows. In the next section, we will discuss some related works. Section 3 introduces the RTI model and formulates the DFL issue as a compressed RTI (CRTI) problem with CS theory. Section 4 presents the efficient measurement strategy and the CMMS algorithm. The experiments and results are showed in Section 5. Finally, we conclude the paper in Section 6.

2 Related works

Localization of targets based on received signal strength in WSN is a promising technique which has received extensive attention[1721]. However, little attention has been given to the real-time CS-based DFL and efficient measurement method. In this section, we briefly summarize the most relevant research on the DFL and the CS-based DFL.

Device-free localization was first introduced by Zhang et al.[10] and Youssef et al.[9]. Zhang et al.[1013] presented a dynamic model to describe the relation between the RSS variance and the target location, then utilized geometric method and the dynamic cluster-based probabilistic cover algorithm to solve the DFL problem. They also proposed a real-time DFL system[14]. They divided the tracking area into distinct sub-regions, with each region assigned with a separate radio channel, and used the support vector regression model to locate the target in each sub-region. Youssef et al.[8, 9] adopted the fingerprint-matching method to realize DFL. The target’s location was estimated by comparing the current RSS measurements with the trained database. Although the above methods achieve reasonable performance, they need to build a separate training measurement database before realizing the DFL. Training measurements increase exponentially with the increase of the number of wireless links and targets. Moreover, the database will be unavailable when the environment changed. Wilson and Patwari[5, 6, 22, 23] firstly modeled the DFL as a RTI problem, then they carried out in-depth research on relating the temporal link signature with the target’s location. They utilized the regularization method to solve the ill-posed inverse problem in the reconstruction of the radio tomographic image. Their studies laid the foundation for future research on the radio tomographic imaging and encouraged other researchers to start to work in this direction. Chen et al.[24] adopted an auxiliary particle filter to realize tracking of device-free target based on the RSS measurements. These works require that there should be sufficient number of wireless links be measured to guarantee the reconstruction performance, otherwise, the reconstruction performance will drop significantly. On the basis of these works, we formulate the DFL as a CRTI problem and propose an efficient measurement strategy and a lightweight algorithm to realize real-time tracking.

To the best of our knowledge, Kanso and Rabbat[15] adopted convex optimization algorithm to reconstruct the sparse image, which is the first work that adopts CS theory to solve the DFL problem. However, the computation complexity of the 1 minimization algorithm is too high and not suitable for wireless network. Wang et al.[16] also utilized the CS theory to solve the DFL problem. They limited the region where the target may be located with prior information of last reconstruction, then used the proposed BGMP algorithm to solve the simplified DFL problem. The BGMP algorithm iteratively seeks the contribution of each pixel in the restricted region and finally locates the target on the pixel which has the biggest contribution value. BGMP essentially is a fusion of the orthogonal matching pursuit (OMP)[25] algorithm and back-projection algorithm. However, the algorithm is also computationally expensive and not very suitable for real-time localization and tracking of targets. Furthermore, the above works choose a set of wireless links to reconstruct the sparse signal and they still need to measure all of the wireless links.

In this paper, we proposed a novel efficient measurement strategy, which only needs to measure a small set of correlated links so it is efficient and energy saving. To our best knowledge, this is the first work which realizes efficient measurement in real-time DFL system. We also proposed a lightweight CMMS algorithm to localize target, which only needs a small-scale matrix-vector product and a sorting operation. Hence it runs fast and is suitable for real-time system.

3 Model and problem formulation

In this section, we provide a RTI model for relating the variance of the measured RSS value of each wireless links to the location of the target, and then we introduce the CS theory and formulate the DFL problem as a compressive RTI question.

3.1 System model

In a WSN, if the number of nodes is K, then the number of the unique two-way wireless links is M=(K2K)/2. For simplicity, we illustrate a WSN in Figure1 with all the 20 wireless nodes uniformly distributed in a square perimeter. When wireless nodes communicate, the RSS y i (t) of a particular link i at time t is denoted as
y i ( t ) = P i S i ( t ) F i ( t ) L i v i ( t ) ,
Figure 1

An illustration of an RTI network with 20 nodes.


  • P i is the transmitted power in decibel,

  • S i (t) is the shadowing loss in decibel caused by the targets which attenuate the signal,

  • F i (t) is the fading loss in decibel due to constructive and destructive interference of narrow-band signals in multi-path communication,

  • L i is the static loss in decibel due to antenna patterns, distance, and device inconsistencies,

  • v i (t) is the measurement noise.

For two time instants t a and t b , the change of the RSS measurement y i is
y i = y i ( t b ) y i ( t a ) = S i ( t b ) S i ( t a ) + F i ( t b ) F i ( t a ) + v i ( t b ) v i ( t a )
which can be rewritten as
y i = S i + n i ,
where the noise is the grouping of fading and measurements
n i = F i ( t b ) F i ( t a ) + v i ( t b ) v i ( t a ) .
As described in (3), we can see that y i is primarily determined by the shadowing loss difference of the two time instants. We examined the shadowing effect of the target on single link measurement. As seen in Figure2, a target was located in the WSN, and we took the links l1, l2, and l3 for comparison. Figure2b shows the values of RSS measurement when a human stood in the position as showed in Figure2a and when without any human in the deployment WSN area. We can see that if a wireless link is shadowed by a target, its RSS value will significantly change from when it is not shadowed. Hence we can use the shadowing model to realize DFL.
Figure 2

A comparison of the shadowing effect of target in WSN. In one case the network is empty from target. In the other case, there is one target that passed through by two links (6,14) and (10,20) in the network. (a) Measurement setup. (b) RSS values.

In the shadowing model, which is the most widely adopted model, the noise n i is caused by time-varying measurements miscalibration of the receiver, by the contribution of thermal noise, and by the variations in the multipath channels. The statistics of the noise n i has been examined in[5], which is constant with time. Hence, the calibration (when no moving targets existed in the wireless network field) could be able to establish it as the baseline. Then one can use the changes of RSS measurements to realize DFL.

Now we provide the RTI model. The monitoring area of the WSN is divided into N square cells which can be seen as pixels, as indicated in Figure3. We use the word pixel to represent the cell in the following sections, and the location of each pixel is represented by the center point of the corresponding cell. The shadowing loss y i of link i can be approximated as a sum of attenuation that occurs in each pixel. Since the contribution of each pixel to the attenuation of each link is different, a weighting is applied. Mathematically, this is described for single link i as
y i = S i + n i = j = 1 N w ij x j + n i
Figure 3

Illustration of the RTI elliptical weight model.

where x j is the attenuation occurring in pixel j, w i j is the weighting of pixel j for link i, and N is the total number of pixels. The weighting w i j can be calculated with ellipse model mathematically described as
w ij = 1 d × 1 , if d ij ( 1 ) + d ij ( 2 ) d + λ , 0 , otherwise ,

where d is the distance between the two nodes of the link i, d i j (1) and d i j (2) are the distance from the center of pixel j to the two nodes, and λ is a tunable parameter describing the width of the ellipse. The width parameter λ is typically set very low in RTI, such that it is essentially the same as using the line-of-sight (LOS) model, as depicted in Figure3.

Supposing that M links are adopted to realize RTI, the changes of RSS measurements can be expressed in matrix form as
y = Wx + n

where the vector y=[ y1,y2,…,y M ] T is a M×1 vector that represents the changes of the RSS measurements, W={w i j ,i=1,2,…,M, j=1,2,…,N} is the M ×N weighting matrix, x= [ x1,x2,…,x N ] T is the unknown N×1 pixel vector to be reconstructed, and n= [ n1,n2,…,n M ] T is the M×1 noise vector.

The weighting matrix can be calculated with (6). With sufficient link RSS measurements, we can reconstruct an image vector by solving the inverse problem in (7). The image vector describes the amount of radio power attenuation occurring due to the targets within the pixels of the WSN region. Since the pixel locations are known, RTI allows us to know where the attenuations in a WSN are occurring and, therefore, where the targets are located.

3.2 Formulation as CRTI problem

CS is an emerging theory for reconstructing sparse signals from a much lower sampling rate than Shannon/Nyquist theorem. In the deployment area of a RTI system, when a target moves into a pixel j, the pixel value x j will be non-zero, otherwise, x j will be zero. Note that after sufficient dense gridding, each target can be guaranteed to have a unique location in 1 pixel. In general DFL application, the number of targets K is considerably less than the number of pixels N. Hence, the image vector x will be a sparse signal, and it will be possible to reconstruct the x from a few measurements. This motivates us to utilize the CS theory to reconstruct the sparse signal based on (7). We will present a lightweight algorithm to solve the sparse signal reconstruction problem in the next section.

4 Efficient measurement strategy and CMMS algorithm

In this section, we describe the detailed implementation of the proposed real-time DFL system, including the efficient measurement strategy, the lightweight reconstruction algorithm CMMS, and the system scheme.

In a RTI system, if one directly use (7) to find the pixel where the target is located, almost all the links should be measured, which is time and power consuming, especially when N is large. As we know, the WSN generally is power-limited. To solve this problem, we propose utilizing prior information of last reconstruction to restrict the range of the pixels where the target may locate and to guide the next measurements. Once we know which links need to be measured, the radio of the other nodes which does not need to participate in the measurement can be turned off, hence, we can both reduce the latency of the system and save the power of the nodes.

As moving is consecutive, the target’s current location must be around the last location. As illustrated in Figure4, supposing that the target is located on x j at time instant t−1, then at the next time instant t, the target must be located in a adjacent pixel of x j (the shaded pixels in Figure4), which is called as possible region in this paper. If the distance d i j between pixel i and pixel j is less than the threshold l, then the pixel i is in the possible region. The parameter l should be set as l=Vmax×tint, where Vmax is the maximum speed of the target, and tint is the time interval between two successive running of the estimation algorithm. The wireless links that pass through the possible region are called as correlated links. We can only use the correlated links to localize the target in the possible region. Hence, we only need to measure the correlated links in the DFL system. Algorithm 1 presents the construction process of the possible region R and the correlated links of set L.
Figure 4

Illustration of the possible region and the correlated links.

Algorithm 1 Possible region and correlated links construction algorithm

After calculating the set of links that needs to be measured, the host of the algorithm (generally a laptop) sends command messages to the wireless nodes through the base station node to tell them when to participate in the measurement and when to go to sleep. Therefore, in the real-time system, the nodes have two phases: one for measurement and the other for receiving command messages from the host computer. In the phase of measurement, the nodes are synchronized and time slots are assigned by the following scheme. In 1 cycle of measurement, the total number of slots is the same as the number of the nodes. Each node is assigned to transmit only in the slot in which the serial number is equal to its node ID number; in other slots, the node either receives messages from another node for measurement the RSS of the link or keeps radio in sleep phase to save power. The packet transmitted by a node includes the ID of the node and the RSS values that it has already measured. In the measurement phase, the base station node receives all the data packets and sends them to the host computer. Hence, when the last node has sent its data packet, the host computer has all the RSS values of the correlated links. Then the wireless node will turn to the second phase. All of them will keep alive and receive command messages from the base station node. Simultaneously, the host computer will use the measured RSS vector to estimate the target’s location with Algorithm 2.

Algorithm 2 CMMS algorithm

Now, we only need to reconstruct the signal x R , which contains far less elements than the source signal x. In addition, the magnitude of the measured vector y L is also far less than in the source vector y. Hence, the reconstruction problem in (7) is compressed to
y L = W LR × x R + n L .

We propose the CMMS algorithm to solve the above compressed problem. The pseudocode of the CMMS algorithm is summarized in Algorithm 2. For estimating the next location of target i, the CMMS algorithm only needs to find out the pixel j that could maximize | W L i R i T × y L i | , where R i and L i are the possible region and the correlated links of the target i, respectively; W L i R i is a sub-matrix of W that only includes the rows in L i and columns in R i ; and y L i is the measured RSS values of the correlated links L i . Since it only needs a small-scale matrix-vector product and a sorting operation, the CMMS algorithm is lightweight and has low complexity, which makes it meet the requirements of real-time systems. When two targets move too close together that it is difficult to distinguish from each other, the algorithm will make their trajectories as smoother as possible.

For clarity, the outline of the proposed real-time DFL method is summarized in Figure5.
Figure 5

Flow diagram of the system.

5 Experimental results

To evaluate the performance of the real-time DFL system, we conduct the real-time measurement and tracking experiment. In this section, we first describe our experimental setup. Then the tracking performance of moving targets is provided. Lastly, we will give some analyses and discussions.

5.1 Physical description of experiment

A wireless network containing 20 nodes was deployed in a laboratory. Each node is placed 1.0 m apart along the perimeter of 5 × 5 m2 and 1.0 m off the ground on a tripod. A photograph of the experimental setup is shown in Figure6. The network comprises MICAz wireless nodes[26] made by MEMSIC (MEMSIC Inc., Andover, MA, USA). Each node operates in the 2.4G frequency band and runs the IEEE 802.15.4 standard protocol for communication. A base station node listens all network traffic then feeds the data to a laptop computer via a USB port for processing. It also sends command messages to the wireless nodes from the laptop computer.
Figure 6

The setup of the experiment.

To avoid network transmission collisions, a simple token passing protocol is used. Each node is assigned an ID number from 1 to 20 and programmed with a known order of transmission. When a node transmits its packet, the other nodes that need to measure the RSS of the link will wake up to receive the message for acquiring the RSS value and then put it into its send buffer. When its turn to transmit arrives, the measured RSS values will be sent out. Since the base station node always receives all the packages after the last node transmitted its packet, the real-time tracking program running on the laptop will get all the needed RSS values.

When the base station node sends a message to the wireless nodes, its package follows a certain format. The base station node needs to send two kinds of messages to the wireless nodes: the first kind of messages tells the nodes when they need to wake up for receiving packages; we call this kind of messages as L message. Packages of the L message follow the format as indicated in Figure7. The second kind of message is a command that tells the nodes start to measure; we call this kind of message as start message, which is set as a simple 3 bytes packet ‘11 22 33’. Once the nodes receive the start message, they will start their timer and the node with ID number 1 will transmit first. The start message can also synchronize the wireless nodes.
Figure 7

The packet format of the L message.

In the experiment, the system is calibrated by taking RSS measurements while the network is vacant from moving targets. The RSS vector is averaged over a 120-second period, which results in approximately 1,240 samples from each link. The calibrated RSS vector is saved in the laptop computer and provides a baseline against which all other RSS measurements are differenced. This process has to be done off-line.

The default parameters are as follows: the pixel size is 0.5×0.5 m, and the possible region threshold is l=0.75 m; hence, the possible region includes 9 pixels. In the experiments, the parameters were set as given in Table1.
Table 1

Relevant parameter settings






Pixel width (m)



Width of weighting ellipse (m)



Regularization parameter



Threshold for calculate possible region (m)

5.2 Tracking performance

In order to verify the proposed method, three experiments were conducted: one for one target tracking, the others for two targets tracking. Each experiment was repeated two times: one experiment for real-time tracking with the CMMS algorithm and one that measured the RSS of all the wireless links for off-line processing with the other algorithms. In the experiments, the experimenter moves at a typical walking pace on a predefined path at a normal walking speed of 1.2 m/s. A metronome and uniformly placed markings on the floor help the experimenter to take constant-sized steps at a regular time interval. The actual location of the experimenter is interpolated using the start and stop time and the known marker positions.

In the first experiment, a target moved around the square is shown in Figure8. The figure compares the true trace with the estimated ones obtained by CMMS, 1, regularization, and BGMP. In the experiment, we assume that the starting location of the target is known, which is reasonable in target tracking. It should be pointed out that there were two consecutive locations estimated by the algorithms for each pixel that the target traveled. It is obvious that the proposed CMMS algorithm could achieve better tracking performance than the other algorithms.
Figure 8

Visualized tracking example with one target. (a) CMMS. (b) 1. (c) Regularization. (d) BGMP.

The detailed statistical characters of the localization errors of different algorithms are summarized in Table2. We can see that the average error of the proposed CMMS is 0.09 m which is smaller than the errors of the regularization (0.27 m) and BGMP (0.15 m) and even smaller than the error of the 1 (0.12 m). The maximum error of the CMMS is also smaller than the ones of the other algorithms. We additionally tested the average running time of different algorithms for once estimation on a dual-core 2.6 GHz PC. The proposed CMMS algorithm consumed about 0.06 ms, which is far less than 1 ms the regularization algorithm consumed 0.3 ms; the BGMP algorithm consumed approximately 5 ms; and 1 consumed much more about 28 ms. We can see that the CMMS needs considerably less time than the other algorithms.
Table 2

Comparison of localization error and execution time


Median (m)

Average (m)

Stand deviation (m)

90% (m)

Max (m)

CPU time (ms)





























Based on the proposed efficient measurement strategy, each node needs to receive 2.3 packets on average from the other nodes and additional 3 packets from the base station node for one estimation. Without utilizing the efficient measurement strategy, each node needs to receive 19 packets from all the other nodes. Each node needs to send one packet in the two situations. Therefore, one can save nearly 88% of the RSS measurements and about 72% of the radio communications using the proposed efficient measurement strategy.

In experiments 2 and 3, two targets walked along the polyline shown in Figure9a,b. The target A moved from A1 to A2; simultaneously, target B moved from B1 to B2. In Figure9a, the distance between target A and target B was always longer than 3 pixels. We can see that the trajectories estimated by the CMMS algorithm is similar to the real ones. The average error of this experiment is 0.11 m. In Figure9b, target A and target B moved into two adjacent pixels (1.25,2.25) and (1.25,2.75). We can see that the tracking performance is getting worse when two targets moved too close to each other. The average error of this experiment increases to 0.23 m. In summary, the total average error of the experiments of two targets is 0.17 m, thus the experimental tracking performance is acceptable.
Figure 9

Visualized tracking example with two targets. (a) The distance between the two targets was always longer than 3 pixels. (b) The two targets moved into two adjacent pixels (1.25,2.25) and (1.25,2.75).

5.3 Analyses and discussions

We first analyze the latency of the system. Since the total number of the nodes is 20, there 20 time slots in the measurement phase. A MICAz node takes 7 ms on average to transmit a packet with 51 bytes, so we assigned each time slot with 8 ms. The measurement phase needs 20×8=160 ms=0.16 s. In the first experiment, the number of links each node needs to measure on average is 2.3, following the packet format in Figure7; each node needs up to 5 bytes on average in the packet of the L message. The maximum length of the payload in TinyOS packet is over 51 bytes, so the L message can be sent in two packets. The time required by the base station node sending L message and start message to the nodes is up to (2+1)×7=21 ms. The time needed for the host running the reconstruction algorithm is less than 1 ms. In total, once estimation of the location of the target needs up to 160+21+1=182 ms≈0.2 s. In summary, our system can reach the real-time tracking with the latency of about 0.2 s, which significantly outperforms previous tracking systems[10, 11, 14]. The latency will increase as enlargement of the deployment area with more nodes. Based on the above analysis, we can see that the system latency will increase at less than 10 ms with each additional node. In general application, two estimation in 1 s is enough. On this condition, the system can be extended up to 50 nodes. The system can also be extended by clustering nodes into different regions which are assigned with separate channels and share timeslots as introduced in[11]. Hence, the system is scalable.

The width of the pixel is an important parameter in RTI problem, which correlates highly with the resolution. We believe that it is mainly dependent on the application. In the experiments, we set it at 0.5 m, which can meet the requirement of general applications. In addition, increasing or decreasing of the width of the pixel will not significantly change the latency of the system.

To evaluate the performance of the proposed method under different conditions, we evaluate the algorithm with different width of the ellipse λ and possible region threshold l. The weighting parameter plays an important role in generating accurate RTI images. If the ellipse is too wide, the pixels of where attenuation is not occurring may be included. If the ellipse is too narrow, pixels that do, in fact, attenuate a link’s signal may not be captured by the model. This may result in a loss of information that degrades the final reconstruction quality. Figure10a illustrates the mean squared error (MSE) with respect to different λ. It is obvious that the CMMS algorithm can achieve better results when λ in the neighborhood of the point 0.03. And the MSE with respect to different possible region threshold l is indicated in Figure10b. We can see that the MSE is very large (over 1.8 m) when l=0.5 m, because the target may move out of the possible region which only comprises 5 pixels. The MSE does not significantly increase with the threshold l increasing, but a very large value of l will increase both the computational complexity and the system latency. Essentially, the threshold l is determined by Vmax and tint (lVmax×tint). If the movement speed of the target is very slow, one can set tint with a big value (such as 1 or 2 s) for conserving system resources. Since once estimation of the target’s location needs less than 0.2 s, the value of tint can down to 0.2 s. On the precondition of l=0.75 m and w=0.5 m, the value of Vmax can up to 3.75 m/s, which is much larger than the normal walking speed. In short, one should carefully select the value of l according to specific application for reaching good tracking accuracy and conserving system resources.
Figure 10

Performance under different parameters. (a) λ. (b) l.

Essentially, our proposed real-time DFL is based on the RTI theory, hence, the localization performance is depending on the imaging performance. We provide an imaging result in Figure11. It can be seen that the CMMS algorithm could achieve reasonable imaging performance.
Figure 11

Imaging performance. (a) Real image. (b) Image reconstructed by CMMS.

6 Conclusion

In this article, we designed and implemented a real-time DFL system, which is based on efficient measurement strategy and lightweight reconstruction algorithm. The measurement strategy makes use of the last localization result to predict a possible region of the target, then finds the wireless links which travel through the possible region to establish the set of correlated links. The system only needs to measure the RSS of the correlated links via cooperating with the bastion station node. As far as we know, we are the first to realize real-time DFL based on measurements of correlated links. Furthermore, the proposed CMMS algorithm only needs a small-scale matrix-vector product operation to reconstruct the signal and localize the target. In summary, we realized an efficient and energy-saving real-time DFL wireless network system. Experimental results demonstrate the effectiveness of our approach and confirm that the CMMS algorithm could achieve satisfactory localization and tracking results.



This work has been financially supported by the National Natural Science Foundation of China (grant no. 61074167).

Authors’ Affiliations

School of Information Science and Technology, Sun Yat-sen University


  1. The Internet of Things: ITU Internet Reports. 2005. . Accessed 15 May 2013Google Scholar
  2. Fok C, Julien C, Roman G, Lu C: Challenges of satisfying multiple stakeholders: quality of service in the internet of things. In Proceedings of the 2nd workshop on Software Engineering for Sensor Network Applications, SESENA’11, Waikiki, Honolulu. New York: ACM; 2011:55-60.View ArticleGoogle Scholar
  3. Atzori L, Iera A, Morabito G: The internet of things: a survey. Comput. Netw. 2010, 54(15):2787-2805. 10.1016/j.comnet.2010.05.010View ArticleGoogle Scholar
  4. Patwari N, Wilson J: RF sensor networks for device-free localization: measurements, models, and algorithms. Proc. IEEE 2010, 98(11):1961-1973.View ArticleGoogle Scholar
  5. Wilson J, Patwari N: Radio tomographic imaging with wireless networks. IEEE Trans. Mob. Comput 2010, 9(5):621-632.View ArticleGoogle Scholar
  6. Wilson J, Patwari N, Vasquez F: Regularization methods for radio tomographic imaging. In Virginia Tech Symposium on Wireless Personal Communications. : ; The Inn, 3–5 June 2009Google Scholar
  7. Wilson J, Patwari N: See-through walls: motion tracking using variance-based radio tomography networks. IEEE Trans. Mob. Comput. 2011, 10(5):612-621.View ArticleGoogle Scholar
  8. Moussa M, Youssef M: Smart devices for smart environments: device-free passive detection in real environments. In Proceedings of the 2009 IEEE International Conference on Pervasive Computing and Communications (PerCom). : ; Galveston, TX, 9–13 March 2009Google Scholar
  9. Youssef M, Mah M, Agrawala A: Challenges: device-free passive localization for wireless environments. In Proceedings of the 13th annual ACM International Conference on Mobile Computing and Networking (MobiCom), Montreal, 9–14 September. New York: ACM; 2007:222-229.View ArticleGoogle Scholar
  10. Zhang D, Ma J, Chen Q, Ni LM: An RF-based system for tracking transceiver-free objects. In Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications (PerCom) White Plains, NY, 19–23 March. Los Alamitos: IEEE Computer Society Press; 2007:135-144.View ArticleGoogle Scholar
  11. Zhang D, Ni LM: Dynamic clustering for tracking multiple transceiver-free objects. In Proceedings of the 2009 IEEE International Conference on Pervasive Computing and Communications (PerCom) Galveston, 9–13 March. Los Alamitos: IEEE Computer Society Press; 2009:1-8.Google Scholar
  12. Zhang D, Liu Y, Ni LM: Link-centric probabilistic coverage model for transceiver-free object detection in wireless networks. In Proceedings of the 30th International Conference on Distributed Computing Systems (ICDCS) Genova, 21–25 June. : IEEE Press, Piscataway; 2010:116-125.Google Scholar
  13. Zhang D, Yang Y, Cheng D, Liu S, Ni LM: Cocktail: an RF-based hybrid approach for indoor localization. In Proceedings of the 2010 IEEE International Conference on Communications (ICC), Cape Town, 23–27 May. : IEEE Press, Piscataway; 2010:1-5.Google Scholar
  14. Zhang D, Liu Y, Ni LM: RASS: a real-time, accurate and scalable system for tracking transceiver-free objects. In Proceedings of the 2011 IEEE International Conference on Pervasive Computing and Communications (PerCom) Seattle, 21–25 March. : IEEE Computer Society Press, Los Alamitos; 2011:197-204.View ArticleGoogle Scholar
  15. Kanso M, Rabbat M: Compressed RF tomography for wireless sensor networks: centralized and decentralized approaches. In Distributed Computing in Sensor Systems. : Springer, New York; 2009:173-186.View ArticleGoogle Scholar
  16. Wang J, Gao Q, Chen H, Zhang X, Wang H: Device-free localisation with wireless networks based on compressive sensing. IET Commun. 2012, 6(15):2395-2403. 10.1049/iet-com.2011.0603MathSciNetView ArticleGoogle Scholar
  17. Seshadri V, Zaruba G, Huber M: A Bayesian sampling approach to in-door localization of wireless devices using received signal strength indication. In Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications (PerCom) Kauai Island, HI, 8-12 March. : IEEE Computer Society Press, Los Alamitos; 2005:75-84.View ArticleGoogle Scholar
  18. Ouyang R, Wong AS, Lea CT: Received signal strength-based wireless localization via semidefinite programming: noncooperative and cooperative schemes. IEEE Trans. Veh. Technol 2010, 59(3):1307-1318.View ArticleGoogle Scholar
  19. Li X: Collaborative localization with received-signal strength in wireless sensor networks. IEEE Trans. Veh. Technol 2007, 56(6):3807-3817.View ArticleGoogle Scholar
  20. Shi Q, He C, Chen H, Jiang L: Distributed wireless sensor network localization via sequential greedy optimization algorithm. IEEE Trans. Signal Process 2010, 58(6):3328-3340.MathSciNetView ArticleGoogle Scholar
  21. Pi X, Yu H: A distributed and cooperative target localization algorithm in wireless sensor networks. In Proceedings of the Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), Dalian, 5–8 December. : IEEE Computer Society Press, Los Alamitos; 2005:887-889.Google Scholar
  22. Patwari N, Kasera SK: Temporal link signature measurements for location distinction. IEEE Trans. Mob. Comput 2011, 10(3):449-462.View ArticleGoogle Scholar
  23. Wilson J, Patwari N: A fade level Skew-Laplace signal strength model for device-free localization with wireless networks. IEEE Trans. Mob. Comput 2012, 6(99):947-958.View ArticleGoogle Scholar
  24. Chen X, Edelstein A, Li Y, Coates M, Rabbat M, Men A: Sequential Monte Carlo for simultaneous passive device-free tracking and sensor localization using received signal strength measurements. In Proceedings of the 10th International Conference on Information Processing in Sensor Networks (IPSN), Chicago, 12–14 April. : IEEE Computer Society Press, Los Alamitos; 2011:342-353.Google Scholar
  25. Tropp J, Gilbert A: Signal recovery from random measurements via orthogonal matching pursuit. IEEE Trans. Inf. Theory 2007, 53(12):4655-4666.MathSciNetView ArticleGoogle Scholar
  26. MICAz: Wireless sensor networks. . Accessed 15 May 2013


© Yang et al.; licensee Springer. 2013

This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.