IMF: Iterative Max-Flow for Node Localizability Detection in Barycentric Linear Localization
Abstract
Determining whether nodes can be uniquely localized, called localizability detection, is a concomitant problem of network localization. Localizability under traditional Non-Linear Localization (NLL) schema has been well explored, whereas localizability under the emerging Barycentric coordinate-based Linear Localization (BLL) schema has not been well touched. In this paper, we investigate the deficiency of existing localizability theories and algorithms in BLL, and then propose a necessary condition and a sufficient condition for BLL node localizability. Based on these two conditions, an efficient iterative maximum flow (IMF) algorithm is designed to identify BLL localizable nodes. Finally, our algorithms are validated by both theoretical analysis and experimental evaluations.
Index Terms:
Localizability Detection, Max-Flow, Barycentric Coordinate, Linear Localization, Wireless NetworksI Introduction
With the rapid development of communication technologies such as fifth-generation (5G) networks, and the growing popularity of smart objects such as sensors, robots, unmanned aerial vehicles (UAVs), there is potential for networking heterogeneous devices to provide services. In these applications, the geographical locations of the objects are one of the most fundamental knowledge [1, 2, 3, 4]. Thus Network Localization (NL), which calculates the geographical node locations using the inter-node measurements and anchor information, has attracted tremendous both academic interest [5, 6, 7] and commercial concerns[8, 9, 10].
Existing NL algorithms can be broadly divided into two categories. Traditionally, NL is modeled as a non-linear least-square optimization problem, whose objective is to minimize the sum square errors between the estimated distances (calculated by node locations) and the measured distances. We call these algorithms Non-Linear Localization (NLL) algorithms. NLL can be solved by multi-dimensional scaling [11], graph optimization [12, 13], and component stitching [14, 15], etc. However, NLL algorithms need to be well initialized, otherwise, it is easy to fall into a local minimum. NLL is also not efficient and is difficult to be distributed for it is essentially a quadratic equation. To overcome the defects of NLL algorithms, a more recent Barycentric coordinate-based Linear Localization (BLL) framework has emerged. In BLL, each node represents its location as a linear combination of locations of neighbors through the barycentric coordinates. Then the network localization problem reduces to a linear model, which is computationally efficient, easy to be distributed, and is guaranteed convergence under broad initialization [16, 17, 18, 19, 20].
Along with the evolution of NL algorithms, there is a concomitant problem called localizability detection. Network localizability characterizes whether an entire network is uniquely localizable given the distance and anchor constraints while node localizability answers whether a specific node is localizable. Prior to calculating node locations, localizability is of great significance to the feasibility of NL algorithms, which helps NL algorithms avoid wrong location answers[21]. The localizability property also provides guidelines for network topology control, node deployment optimization, and event detection.
The network localizability identification problem was usually researched through graph rigidity theories[22, 23, 24]. Based on the rigidity theory, the necessary and sufficient condition for network localizability of NLL methods has been proposed and a polynomial algorithm for localizability testing has been designed[24]. However, considering the general requirement of deployment cost and limited perception radius for energy efficiency, practical networks are usually sparsely deployed. For sparse networks, the network localizability can hardly be satisfied, because it is inevitable that some sparsely connected nodes are unlocalizable. The previous study has shown that real networks tend to be not entirely localizable, but a certain portion of the nodes can still be uniquely localized[25]. Thus, it is more meaningful to find out how many nodes can be uniquely localized and which are them. This problem is called node localizability detection. Herein, we should be clear about the concept of network localizability, and node localizability. Detecting localizable nodes deserve great research attention in both NLL and BLL.
The research on node localizability includes the node localizability conditions and the node localizability detection algorithms. In NLL, Yang et. al.[26] proposed an RR3P condition, which is so far the best sufficient condition for node localizability. But up to now, there is no known necessary and sufficient condition for node localizability. For the node localizability detection algorithms, a node localizability detection algorithm was designed according to the RR3P condition. Moreover, several incremental detection algorithms have been proposed according to the rigidity theory[22, 27, 28]. In BLL, Diao et.al. proposed the sufficient and necessary condition for network localizability[19]. But the node localizability condition and node localizability detection algorithms for BLL are still open.
Non-awareness of node localizability is a critical problem in BLL, because each node’s location is iteratively updated based on neighbors’ locations in the BLL routine. If non-localizable nodes participate in the location propagation process, their wrong locations will impact the locations of the localizable nodes. Fig. 1 shows an example of locating 12 nodes including 2 non-localizable nodes using ECHO[19], a representative BLL localization algorithm. Let denote the ground truth location of node , and denote the estimated location using ECHO. Fig. 1(a) shows the results when all the 12 nodes participate in BLL, where the asterisk represents and the circle represents . How the localization errors () of the nodes vary with the iteration times is shown in Fig. 1(b). The results show that even after iterations, no node can converge to the correct location if localizability is not considered. Therefore, detecting localizable nodes and excluding non-localizable nodes are critically important for BLL.


In this paper, we concentrate on localizability detection in BLL and its applications. The main contributions are as follows.
-
•
Firstly, a necessary condition and a sufficient condition are designed for BLL node localizability.
-
•
Then so far the first network localizability test algorithm for BLL is designed, whose key idea is to transform the detection of disjoint paths into calculating the max-flow. Moreover, an Iterative Max-Flow (IMF) method is designed to detect the BLL localizable nodes.
-
•
The time and space complexity of IMF are studied and the applicability of the IMF algorithms is verified in various aspects including its extension to NLL, extension to higher dimensions.
The remainder of this paper is as follows. In Section II, an overview of the evolution of NL algorithms and the localizability theories is presented. In Section III, a necessary condition and a sufficient condition for node localizability are proposed. In Section IV, testing algorithms for network localizability and an iterative maximum flow (IMF) algorithm for identifying localizable nodes are proposed. Analysis and possible extensions of the proposed algorithms are given in Section V. Algorithms are evaluated in Section VI. Finally, this paper is concluded with discussion of future work in Section VII.
II Preliminary and Key Related Work
The problem formulation, review of network localizability conditions in NLL and BLL, review of node localizability conditions in NLL and BLL, existing localizability identification algorithms, and an overview of our framework are introduced in this section.
II-A Notations and Problem Formulation
For a network , let = denote the node set, which is composed of anchor nodes (i.e., ) and free nodes (i.e., ). Locations of anchors are known, denoted by while locations of free nodes are unknown, denoted by . represents the distance matrix among nodes. For a node , it can obtain the distance to another node if , where is the perception radius. if can be obtained. The neighbors of is represented as , if . The problem is to detect which free nodes can be uniquely localized using the anchor and distance constraints when BLL methods are adopted.
II-B BLL Methods, Localizability Conditions and Algorithms
Range-based NL algorithms fall into two categories, i.e., NLL and BLL. In NLL, there are a wide range of algorithms to solve from the model of minimizing the sum square errors[29, 11, 30, 31, 15, 32, 12, 14]. The main defect of NLL is that it does not guarantee global optimality since the optimization model is quadratic. For a detailed introduction to NLL, please refer to reference [14]. In this paper, we focus on BLL algorithms.
II-B1 The Process of BLL
In BLL, the basic idea is to represent a node’s location as a linear combination of the locations of its neighbors using inter-node distances. Then, the network localization problem becomes a linear model. The detailed procedure for converting the NL problem to linear form is as follows.
In , for a node and neighbors , , , the linear combination is:
(1) |
where is called the barycentric coordinate of introduced by [33]. Denote as . The barycentric coordinate is calculated as:
(2) |
represents the Cayley-Menger bideterminant, whose input is two node sets with equal cardinality and the output is a signed scalar[20]:
(3) | ||||
where is the squared distance between the nodes and . Then, the linear representation of all node locations can form a linear system:
(4) |
is the barycentric coordinates calculated by inter-node distances. Finally, the BLL problem is formulated as the following linear model:
(5) |
Thus, the general process of BLL is constructing the BLL model in (5) and solving from the model[18, 34, 19, 20]. Note that the same construction manner also works in . We then review the known network localizability conditions for NLL and BLL.
Network Localizability | Node Localizability | ||||||||||||||||
|
|
|
|
|
|
||||||||||||
NLL | |||||||||||||||||
BLL |
II-B2 Network Localizability Conditions
Lemma 1 (NLL Network Localizability Condition[22]).
A network is localizable in 2D, if and only if it contains at least 3 anchors and it is global rigid (i.e., 3-connected and redundantly rigid).
In BLL, the network localizability condition is based on a generated graph associated with the barycentric representation, instead of .
Definition 1 (Generated Graph, ).
Given and the constructed in (5), the generated graph of is defined as a graph with the same node set . An edge if .
Then, the BLL network localizability condition is designed based on [19].
Lemma 2 (BLL Network Localizability Condition[19]).
Using BLL algorithms, all free nodes in a generic graph are localizable in 2D if every free node can find at least three node-disjoint paths to anchors through only edges in .
So network localizability for NLL can be checked based on the graph property of , while network localizability for BLL can be checked based on the property of . We then review the node localizability conditions.
II-B3 Node Localizability Conditions
To judge whether a specific node is localizable, the necessary and sufficient condition has not been derived yet for either NLL or BLL. But there exist several sufficient or necessary conditions.
In NLL, Goldenberg et al. [25] proposed a necessary condition called 3P condition, i.e., a localizable node must have three node-disjoint paths to three distinct anchors. Yang et al. also derived a sufficient condition called RRT-3B condition, i.e., a localizable node needs to be in a redundantly rigid component that is 3-connected and has three anchors. Then, Yang et al. [26] proposed a tightened necessary condition called RR-3P that a localizable node must be in a redundant rigid component in addition to satisfying the 3P condition. They also gave a weaker sufficient condition called RR3P condition that the nodes belong to a redundantly rigid component containing at least three anchors, where there are three node-disjoint paths connecting the free nodes and three anchors. A detailed discussion about network localizability and node localizability can be seen in [36].
In BLL, the issue of node localizability has not been reported. The network localizability and node localizability detection algorithms are then reviewed.
II-B4 Network Localizability and Node Localizability Detection Algorithms
To test whether a network is localizable using NLL, algorithms have been designed to verify global rigidity by integrating the detection of redundant rigidity [37] and the detection of 3-connectivity[38, 39].
To detect localizable nodes in NLL, there are mainly three representative algorithms:
(1) The most representative method is trilateration protocol (TP)[22]. In , TP first marks the anchors as localizable and free nodes as unlocalizable. Then, each unlocalizable node continually checks its neighbors and changes its state to localizable if it finds at least localizable neighbors. TP is simple and efficient, but TP misses localizable nodes that are on a geographical gap or a geographical border. Moreover, TP fails to startup if the anchors do not have common neighbors;
(2) To identify nodes on a geographical gap or a border, Yang et al.[27] proposed the wheel extension (WE) algorithm. The structure of the wheel graph is defined and proved to be global rigid. Then each node tries to find a wheel graph in neighbors. If three or more nodes of a wheel are localizable, all other nodes of the wheel are localizable. WE inherits the efficiency of TP, but it may fail if there are not at least three anchors coexist in one wheel at the beginning, then no node can be localized;
(3) To supplement TP and WE, Wu et al.[28] defines the concept of branch, and proves that a branch including three anchors is localizable. A triangle extension (TE) method is proposed to construct branches. The branch construction starts from two connected anchors and extends the branch by extension operations. Once the extension reaches the third anchor or a localizable node, all nodes on the branch are localizable. However, TE fails when every two anchors do not share any common neighbor; Localizability detection in 3D has been explored in [21].
In BLL, there is neither a network localizability testing algorithm nor a node localizability detecting algorithm yet.
II-C Summary of BLL Localizability Detection and the Overview of Our Work
An overview of the state-of-the-art for network localizability, node localizability detection conditions and algorithms is summarized in Table I. Overall, the localizability problem has been well researched in NLL except for a necessary and sufficient node localizability condition and the corresponding detection algorithm that guarantee to detect all localizable nodes. The research on localizability in BLL is much lacked. Only the necessary and sufficient condition for BLL network localizability is given in [19]. The testing algorithm for BLL network localizability, conditions and algorithm for BLL node localizability are still open.
To fill the knowledge gap in BLL, this paper proposes:
1) A necessary condition for BLL node localizability.
2) A sufficient condition for BLL node localizability.
3) A testing algorithm for BLL network localizability, and
4) A detection algorithm for BLL localizable nodes.
The necessary and sufficient condition for node localizability is still left as an open problem.
III A Necessary Condition and A Sufficient Condition for BLL Node Localizability
Since the network localizability condition for BLL has been given [19], we will explore the node localizability conditions for BLL in this section. For a network , Yang et. al [26] proposed that even , there might be an implicit edge between the two nodes if can be uniquely determined by two rigid constraints. Hereinafter, we assume that is the graph after adding the implicit edges.
III-A Necessary Condition for BLL Node Localizability
From Lemma 2, a node should have three node-disjoint paths (3P) to anchors in to be BLL-localizable. To make a certain node has 3P to anchors, it is straightforward that it must have at least 3 neighbors in . From the perspective of the original graph , this necessary condition is formulated as follows.
Theorem 1 (Necessity of Mutually Connected Neighbors).
In a graph in , for a node to be localizable using BLL, it must have at least mutually connected neighbors.
Proof.
Recall that in the construction of the BLL linear model, the barycentric coordinates are calculated using the Cayley-Menger bideterminant, where the distance between each pair of nodes from the input is involved. Thus, for node , (i.e., is a neighbor of in ) only if has mutually connected neighbors so that the Cayley-Menger bideterminant can be calculated. ∎
Theorem 1 implies that BLL node localizability requires stronger connectivity for each node. Neighbors in need to be mutually connected to contribute to the BLL-localizability of . That is, BLL-localizability is theoretically more difficult to be satisfied than NLL-localizability. For example, Yang et. al. have proved that a wheel graph like Fig. 2(a) is global rigid (i.e., NLL-localizable)[27]. But none of these nodes are BLL-localizable since each node’s neighbors are not mutually connected.


III-B Sufficient Condition for BLL Node Localizability
From Lemma 2, we derive a sufficient condition for BLL node localizability by recursion.
Theorem 2 (Sufficiency of Recursive-3DP).
In a graph in , if 1) has 3P to anchors in , without loss of generality, say , , and , and 2) every node on each path , , and has 3P to anchors. Then, node is BLL-localizable in . We call this condition Recursive-3DP for brief.
Proof.
If both 1) and 2) are satisfied, the graph induced by and the nodes it passes by on its paths satisfies Lemma 2. So all these nodes are BLL-localizable.
∎
Theorem 2 implies that the set of BLL-localizable nodes and the set of BLL-unlocalizable nodes should be edge-independent, i.e., the BLL-localizable nodes should have no edge connecting BLL-unlocalizable nodes. Thus, the BLL-localizable nodes can be found by iteratively removing nodes without 3P.
IV Algorithms for BLL Network Localizability and BLL Node Localizability
Given a network , there is no existing algorithm that can tell the network localizability or node localizability in BLL. From the previous section, we can observe that the key issue of BLL-localizability is verifying the condition. Thus in this section, we first transform the verification of to the calculation of max-flow in an appropriately constructed flow graph. Then, a max-flow-based algorithm is presented to test whether is BLL-localizable by checking the max-flow in its . Furthermore, we adopt this idea to detect the BLL-localizable nodes using Theorem 2 through an iterative algorithm.
IV-A Disjoint Path and Max-Flow
To proceed, we introduce a flow graph constructed from , where .
-
•
Divide each free node into two copies and add them to . Then, add anchor nodes in and an virtual target node to .
-
•
For each , add to . For each neighbor , add to if is an anchor, add to , otherwise; For each anchor node , add to .
-
•
Assign in the capacity matrix if .
Then, we show the equality between the number of disjoint paths (DP) in and the Max-Flow in .
Lemma 3.
Consider a network and its corresponding , the following two are equivalent.
-
•
The count of disjoint paths from to anchors in .
-
•
The max flow from to in .
Proof.
First we prove that every path to anchors in is included in . Suppose an arbitrary edge on any path in . If is an free node and is an anchor node, then the edge is maintained by . If both and are free nodes, the edge is maintained by . Since we focus on paths to anchors, the case that is an anchor node and is a free node is not considered. Thus, any path from to anchors in can be transformed to a new path in ; Suppose any source node , it is straightforward that any path from to must go through one edge of the minimum cut. And each node is passed by at most one path since the capacity of is one. Because the maximum flow equals the minimum edge cut, the count of disjoint paths from to anchors in equals the max flow from to in . ∎
A case study is shown in Fig. 3. The generated graph of a network of 5 nodes is given in Figure 3(a). Its corresponding is in Figure 3(b). The constructed capacity matrix is shown in Table II. It is easy to verify the equivalence between the number of disjoint paths in and the max flow in . For example, there are five paths from to anchors, i.e., . Three of them are node disjoint, i.e., . Using Orlin’s method [40], we can obtain that the max-flow from to in is also three.


1 | 2 | 3 | |||||||||
0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||
0 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 0 | ||
0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | ||
1 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 1 | 0 | ||
0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | ||
Free Nodes | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 2 | |
Anchors | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 3 |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
IV-B BLL Network Localizability Test
Now, whether a network is BLL-localizable can be tested by checking using Lemma 3. Algorithm 1 shows the routine. Recall that a network is BLL-localizable means that all the nodes are BLL-localizable. So if any node does not meet the necessary condition in Theorem 1, the network is not BLL-localizable (Line 1-Line 1). Then, if all nodes meet the necessary condition, we construct the generated graph shown as Function construct_generated_graph() (Line 1-Line 1). Then the flow graph of is constructed using the method in Section IV-A. The max flow is calculated using Orlin’s method [40] (Line 1). In Lemma 2, the BLL network localizability condition requires that each free node should have 3P to anchors in , so is BLL-localizable if the max-flow from each to is not less than 3 in , BLL-unlocalizable, otherwise (Line 1-Line 1).
Use the graph in Fig. 3 for instance. Let be the number of disjoint paths from to nodes in in , and be the max flow from to the virtual node . We can obtain:
(6) |
Thus, through Algorithm 1, we can conclude that the network in Fig. 3 is not BLL-localizable due to the existence of .
IV-C BLL Node Localizability Detection
Detecting the BLL-localizable nodes in a partial localizable network is conducted through Theorem 2, i.e., detecting the nodes that satisfy the Recursive-3DP condition. The routine is shown as the IMF algorithm in Algorithm 2. IMF iteratively removes nodes not having 3P and the corresponding capacities of these nodes in each round. In each round, only the nodes having 3P and the edges among them (denoted by Edge()) are left (Line 2-Line 2). Finally, IMF terminates when no more nodes can be removed (Line 2).
Take Fig. 3 as an example to show the process of IMF. In the first round, is removed since , then ; In the second round, becomes 2 since and its corresponding edges are removed. Then, becomes ; In the third round, does not change since the 3P of does not pass through nodes without 3P. So IMF terminates and outputs as the BLL-localizable node set.
V Analysis and Discussion
In this section, we first give the theoretical analysis of our IMF algorithm. Then we discuss its extensions. Finally, we give an application of IMF in NL.
V-A Analysis of IMF
V-A1 Validity
Proof.
Index the nodes removed by Algorithm 2 as . Let be an arbitrary feasible solution of Lemma 2 and be the induced subgraph of . is removed because has not three disjoint paths to anchors. There must be that cannot find three disjoint paths in since is a subgraph of . i.e., will not be included by any other feasible solution. Similarly, every node of is not included by any feasible solution. Additionally, every node of satisfies Theorem 2, otherwise it will be removed. Thus, Algorithm 2 selects all the vertices that can satisfy Theorem 2. ∎
V-A2 Time Complexity
Theorem 4.
For a graph , let , and the number of neighbors bounded by , i.e., . The complexity of the IMF algorithm is , where is the number of iterations.
Proof.
In each round of IMF, the construction of needs a complexity of since it needs to check the combination of three neighbors for each node. Then, the construction of checks each edge in to assign the capacities, requesting a complexity of . In calculating the max flow, there exist many efficient algorithms[41]. In this article, we adopt Orlin’s method with a complexity of [40]. Let be the iteration count, the complexity of IMF is . In the worst case, only one node is detected to be with a Max-Flow less than 3 in each round and then removed, then the time complexity becomes . ∎
V-A3 Space Complexity
The major space consumption of IMF is storing and , and the space complexity is .
V-B Extensions of IMF
V-B1 Extension to NLL Localizability Detection
Recall that IMF checks the Recursive-3DP condition in the generated graph . If we modify IMF as follows, the returned becomes the set of nodes satisfying Recursive-3DP in the original graph .
Modification 1 (M1):
- •
-
•
Change the construction of in Line 2 to be based on .
Thus, the returned becomes the set of nodes satisfying Recursive-3DP in after M1.
Theorem 5.
A graph is global rigid if it is composed of Recursive-3DP nodes.
Proof.
If each node has three node disjoint paths to anchors, there is no binary vertex cut. Then is redundant rigid and 3-connected so that the NLL localizability condition is met. ∎
That is, IMF returns the NLL-localizable nodes if we conduct M1.
V-B2 Extension to Arbitrary Dimensions
IMF works in any dimensions, denoted by .
Modification 2 (M2):
-
•
Change the threshold in Line 2 to .
-
•
Increase the number of anchors to be no less than .
Then, the returned nodes form a P+ graph, where each node has at least disjoint paths to anchors. Although the equivalence between globally rigidity and localizability has not been proved when , IMF provides an efficient way to detect a well-structured P+ subgraph after M2.
VI Evaluation
Simulations are conducted using MATLAB R2020b to show the effectiveness of our method. First, we present the localizability detection capacity of the proposed IMF algorithm compared with the most representative localizability detection algorithm TP and the state-of-the-art algorithm TE. Then, we show the strong applicability of IMF in a variety of harsh situations. Finally, we analyze the application of IMF in BLL.
VI-A Effectiveness of IMF in Localizability Detection
In this section, the perception radius is varied to control the network density (assessed by average node degree). The percentage of anchor nodes (i.e., ) is also varied. The detection capacity of a certain algorithm is assessed by the percentage of detected localizable nodes (called of localizable for brief), where is the detected localizable nodes by a certain algorithm.



Fig. 4 shows the percentage of detected localizable nodes of different algorithms under different average degrees and anchor densities. We can obtain the following observations:
-
•
IMF outperforms the other two algorithms in detection capacity under all settings, especially in sparse and anchor-lacking networks.
-
•
It is straightforward that detection algorithms are expected to detect more localizable nodes when there are more anchors. However, only the localizable nodes detected by IMF increase monotonically with the increase of anchor nodes under fixed network density. That is, the detection capacities of TP and TE are additionally affected by the distribution of anchors.
VI-B Applicability of IMF in Harsh Scenarios
To further show the stable performance of IMF, we visualize the detection result of different algorithms in harsh scenarios, i.e., networks with irregular anchor distribution or networks with holes.






Fig. 5 shows the impact of anchor distribution. It can be seen that TP requires at least three anchors having common neighbors as in Fig. 5 to startup and TE needs at least two anchors having common neighbors as in Fig. 5 to startup. If the startup condition is not satisfied as in Fig. 5, TP and TE fail and detect no localizable nodes. However, IMF can detect most of the localizable nodes, even when anchors do not have any common neighbor.
In some applications, networks may be deployed with holes due to geographical obstacles or deployment requirements. To clarify the effect of holes, we first adjust the anchor distribution to ensure TP and TE can startup as in Fig. 5 and Fig. 5. The results show that even when the startup conditions are met, TP and TE detect fewer localizable nodes than IMF. When anchors have no common neighbors, only IMF works as in Fig. 5. The detailed detection results are given in Table III.
Fig. 5 | Fig. 5 | Fig. 5 | Fig. 5 | Fig. 5 | Fig. 5 | |
---|---|---|---|---|---|---|
Total | 97 | 154 | 97 | 154 | 97 | 154 |
TP | 41 | 64 | 0 | 0 | 0 | 0 |
TE | 86 | 51 | 86 | 51 | 0 | 0 |
IMF | 93 | 151 | 93 | 151 | 93 | 151 |





Moreover, Fig. 6 shows the statistical results of repeated experiments. The five figures are statistical results for networks with average degrees {8, 10, 12, 14, 16} respectively. In each figure, 1000 networks are generated randomly following the average node degree and run TP, TE, and IMF respectively. Each network contains 100 nodes and the distributions of the number of detected localizable nodes for TP, TE and IMF are compared using box graph. It can be observed that:
-
•
IMF always detects more localizable nodes than TP and TE, especially in sparse networks. When the average degree is 16, the median value of IMF reaches 97%.
-
•
The median value of TP is 0 under each degree, which means that its startup condition is hard to be satisfied in random networks.
VII Conclusion
Determining localizability in BLL methods is crucially important due to its wide applications. In this paper, we summarize the gaps in existing theories and algorithms of BLL-localizability. To fill the knowledge gap, a sufficient condition and a necessary condition for BLL node localizability are proposed. Based on these conditions, algorithms to test BLL network localizability and to detect BLL node localizability are designed. We theoretically analyzed our main algorithm and discussed its broad prospects. Evaluations demonstrated the validity of the proposed IMF node localizability detection algorithm.
In future work, promising directions include deriving the sufficient and necessary condition of node localizability for both NLL and BLL, and designing reliable algorithms guaranteeing the detection of all theoretically localizable nodes, especially in higher dimensions.
References
- [1] Kexin Guo, Xiuxian Li, and Lihua Xie. Ultra-wideband and odometry-based cooperative relative localization with application to multi-uav formation control. IEEE Transactions on Cybernetics, 50(6):2590–2603, 2020.
- [2] Thien-Minh Nguyen, Zhirong Qiu, Thien Hoang Nguyen, Muqing Cao, and Lihua Xie. Persistently excited adaptive relative localization and time-varying formation of robot swarms. IEEE Transactions on Robotics, 36(2):553–560, 2020.
- [3] Freddy Demiane, Sanaa Sharafeddine, and Omar Farhat. An optimized uav trajectory planning for localization in disaster scenarios. Computer Networks, 179:107378, 2020.
- [4] Stefania Bartoletti, Andrea Conti, Davide Dardari, and Andrea Giorgetti. 5g localization and context-awareness. University of Bologna, University of Ferrara, 2018.
- [5] Kexin Guo, Xiuxian Li, and Lihua Xie. Simultaneous cooperative relative localization and distributed formation control for multiple uavs. Science China Information Sciences, 63(1):1–3, 2020.
- [6] Xiuwu Yu, Lixing Zhou, and Xiangyang Li. A novel hybrid localization scheme for deep mine based on wheel graph and chicken swarm optimization. Computer Networks, 154:73–78, 2019.
- [7] Bobai Zhao, Dali Zhu, Tong Xi, Chenggang Jia, Shang Jiang, and Siye Wang. Convolutional neural network and dual-factor enhanced variational bayes adaptive kalman filter based indoor localization with wi-fi. Computer Networks, 162:106864, 2019.
- [8] Fine Ranging (FiRa) Consortium. Localization cases based on distance measurement using uwb technology. Website, 2021. https://www.firaconsortium.org/discover/use-cases.
- [9] Tsingoal. Precise locating core algorithm. Website, 2021. http://www.tsingoal.com/index.php?lang=en.
- [10] Infsoft GmbH. Indoor positioning with uwb. Website, 2021. https://www.ultrawideband.io/en/technology.php.
- [11] Yi Shang and Wheeler Ruml. Improved mds-based localization. In Proceedings of the 2004 IEEE INFOCOM, volume 4, pages 2640–2651. IEEE, 2004.
- [12] H. Ping, Y. Wang, and D. Li. Hgo: Hierarchical graph optimization for accurate, efficient, and robust network localization. In Proceedings of the 29th International Conference on Computer Communications and Networks (ICCCN), pages 1–9, 2020.
- [13] Soumya J Bhat and Santhosh K Venkata. An optimization based localization with area minimization for heterogeneous wireless sensor networks in anisotropic fields. Computer Networks, 179:107371, 2020.
- [14] H. Ping, Y. Wang, D. Li, and T. Sun. Flipping free conditions and their application in sparse network localization. IEEE Transactions on Mobile Computing, pages 1–1, 2020.
- [15] T. Sun, Y. Wang, D. Li, Z. Gu, and J. Xu. Wcs: Weighted component stitching for sparse network localization. IEEE/ACM Transactions on Networking, 26(5):2242–2253, 2018.
- [16] U. A. Khan, S. Kar, and J. M. F. Moura. Linear theory for self-localization: Convexity, barycentric coordinates, and cayley–menger determinants. IEEE Access, 3:1326–1339, 2015.
- [17] S. Safavi, U. A. Khan, S. Kar, and J. M. F. Moura. Distributed localization: A linear theory. Proceedings of the IEEE, 106(7):1204–1223, 2018.
- [18] U. A. Khan, S. Kar, and J. M. F. Moura. Distributed sensor localization in random environments using minimal number of anchor nodes. IEEE Transactions on Signal Processing, 57(5):2000–2016, 2009.
- [19] Y. Diao, Z. Lin, and M. Fu. A barycentric coordinate based distributed localization algorithm for sensor networks. IEEE Transactions on Signal Processing, 62(18):4760–4771, 2014.
- [20] P. P. V. Tecchio, N. Atanasov, S. Shahrampour, and G. J. Pappas. N-dimensional distributed network localization with noisy range measurements and arbitrary anchor placement. In Proceedings of 2019 American Control Conference (ACC), pages 1195–1201, 2019.
- [21] Na Xia, Yuanxiao Ou, Shiliang Wang, Rong Zheng, Huazheng Du, and Chaonong Xu. Localizability judgment in uwsns based on skeleton and rigidity theory. IEEE Transactions on Mobile Computing, 16(4):980–989, 2016.
- [22] Tolga Eren, OK Goldenberg, Walter Whiteley, Yang Richard Yang, A Stephen Morse, Brian DO Anderson, and Peter N Belhumeur. Rigidity, computation, and randomization in network localization. In Proceedings of the 2004 IEEE INFOCOM, volume 4, pages 2673–2684. IEEE, 2004.
- [23] Bruce Hendrickson. Conditions for unique graph realizations. SIAM journal on computing, 21(1):65–84, 1992.
- [24] Bill Jackson and Tibor Jordán. Connected rigidity matroids and unique realizations of graphs. Journal of Combinatorial Theory, Series B, 94(1):1–29, 2005.
- [25] David Kiyoshi Goldenberg, Arvind Krishnamurthy, Wesley C Maness, Yang Richard Yang, Anthony Young, A Stephen Morse, and Andreas Savvides. Network localization in partially localizable networks. In Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies., volume 1, pages 313–326. IEEE, 2005.
- [26] Zheng Yang and Yunhao Liu. Understanding node localizability of wireless ad hoc and sensor networks. IEEE Transactions on Mobile Computing, 11(8):1249–1260, 2011.
- [27] Z. Yang, Y. Liu, and X. . Li. Beyond trilateration: On the localizability of wireless ad-hoc networks. In Proceedings of the 2009 IEEE INFOCOM, pages 2392–2400, 2009.
- [28] Hejun Wu, Ao Ding, Weiwei Liu, Lvzhou Li, and Zheng Yang. Triangle extension: Efficient localizability detection in wireless sensor networks. IEEE Transactions on Wireless Communications, 16(11):7419–7431, 2017.
- [29] Senshan Ji, Kam-Fung Sze, Zirui Zhou, Anthony Man-Cho So, and Yinyu Ye. Beyond convex relaxation: A polynomial-time non-convex optimization approach to network localization. In Proceedings of 2013 IEEE INFOCOM, pages 2499–2507. IEEE, 2013.
- [30] Anthony Man-Cho So and Yinyu Ye. Theory of semidefinite programming for sensor network localization. Mathematical Programming, 109(2-3):367–384, 2007.
- [31] Rainer Kümmerle, Giorgio Grisetti, Hauke Strasdat, Kurt Konolige, and Wolfram Burgard. g2o: A general framework for graph optimization. In Proceedings of 2011 IEEE International Conference on Robotics and Automation (ICRA), pages 3607–3613. IEEE, 2011.
- [32] Yongcai Wang, Tianyuan Sun, Guoyao Rao, and Deying Li. Formation tracking in sparse airborne networks. IEEE Journal on Selected Areas in Communications, 36(9):2000–2014, 2018.
- [33] A. F. . Der barycentrische Calcul. Leipzig, 1827.
- [34] Usman A Khan, Soummya Kar, Bruno Sinopoli, and José MF Moura. Distributed sensor localization in euclidean spaces: Dynamic environments. In Proceedings of the 46th Annual Allerton Conference on Communication, Control, and Computing, pages 361–366, 2008.
- [35] Tolga Eren. Graph invariants for unique localizability in cooperative localization of wireless sensor networks: rigidity index and redundancy index. Ad Hoc Networks, 44:32–45, 2016.
- [36] Yuan Zhang, Shutang Liu, Xiuyang Zhao, and Zhongtian Jia. Theoretic analysis of unique localization for wireless sensor networks. Ad Hoc Networks, 10(3):623–634, 2012.
- [37] Gerard Laman. On graphs and rigidity of plane skeletal structures. Journal of Engineering mathematics, 4(4):331–340, 1970.
- [38] John E Hopcroft and Robert Endre Tarjan. Dividing a graph into triconnected components. SIAM Journal on Computing, 2(3):135–158, 1973.
- [39] GaryL Milkri. A new graph triconnectivity algorithm and its parallelization. 1988.
- [40] James B Orlin. Max flows in o (nm) time, or better. In Proceedings of the 45th annual ACM symposium on Theory of computing, pages 765–774, 2013.
- [41] Andrew V Goldberg and Robert E Tarjan. Efficient maximum flow algorithms. Communications of the ACM, 57(8):82–89, 2014.