This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

IMF: Iterative Max-Flow for Node Localizability Detection in Barycentric Linear Localization

Haodi Ping, Yongcai Wang, and Deying Li The authors are with School of Information, Renmin University of China, Beijing, P.R.China, 100872.
E-mail: {haodi.ping, ycw, deyingli}@ruc.edu.cn
Abstract

Determining whether nodes can be uniquely localized, called localizability detection, is a concomitant problem of network localization. Localizability under traditional Non-Linear Localization (NLL) schema has been well explored, whereas localizability under the emerging Barycentric coordinate-based Linear Localization (BLL) schema has not been well touched. In this paper, we investigate the deficiency of existing localizability theories and algorithms in BLL, and then propose a necessary condition and a sufficient condition for BLL node localizability. Based on these two conditions, an efficient iterative maximum flow (IMF) algorithm is designed to identify BLL localizable nodes. Finally, our algorithms are validated by both theoretical analysis and experimental evaluations.

Index Terms:
Localizability Detection, Max-Flow, Barycentric Coordinate, Linear Localization, Wireless Networks

I Introduction

With the rapid development of communication technologies such as fifth-generation (5G) networks, and the growing popularity of smart objects such as sensors, robots, unmanned aerial vehicles (UAVs), there is potential for networking heterogeneous devices to provide services. In these applications, the geographical locations of the objects are one of the most fundamental knowledge [1, 2, 3, 4]. Thus Network Localization (NL), which calculates the geographical node locations using the inter-node measurements and anchor information, has attracted tremendous both academic interest [5, 6, 7] and commercial concerns[8, 9, 10].

Existing NL algorithms can be broadly divided into two categories. Traditionally, NL is modeled as a non-linear least-square optimization problem, whose objective is to minimize the sum square errors between the estimated distances (calculated by node locations) and the measured distances. We call these algorithms Non-Linear Localization (NLL) algorithms. NLL can be solved by multi-dimensional scaling [11], graph optimization [12, 13], and component stitching [14, 15], etc. However, NLL algorithms need to be well initialized, otherwise, it is easy to fall into a local minimum. NLL is also not efficient and is difficult to be distributed for it is essentially a quadratic equation. To overcome the defects of NLL algorithms, a more recent Barycentric coordinate-based Linear Localization (BLL) framework has emerged. In BLL, each node represents its location as a linear combination of locations of neighbors through the barycentric coordinates. Then the network localization problem reduces to a linear model, which is computationally efficient, easy to be distributed, and is guaranteed convergence under broad initialization [16, 17, 18, 19, 20].

Along with the evolution of NL algorithms, there is a concomitant problem called localizability detection. Network localizability characterizes whether an entire network is uniquely localizable given the distance and anchor constraints while node localizability answers whether a specific node is localizable. Prior to calculating node locations, localizability is of great significance to the feasibility of NL algorithms, which helps NL algorithms avoid wrong location answers[21]. The localizability property also provides guidelines for network topology control, node deployment optimization, and event detection.

The network localizability identification problem was usually researched through graph rigidity theories[22, 23, 24]. Based on the rigidity theory, the necessary and sufficient condition for network localizability of NLL methods has been proposed and a polynomial algorithm for localizability testing has been designed[24]. However, considering the general requirement of deployment cost and limited perception radius for energy efficiency, practical networks are usually sparsely deployed. For sparse networks, the network localizability can hardly be satisfied, because it is inevitable that some sparsely connected nodes are unlocalizable. The previous study has shown that real networks tend to be not entirely localizable, but a certain portion of the nodes can still be uniquely localized[25]. Thus, it is more meaningful to find out how many nodes can be uniquely localized and which are them. This problem is called node localizability detection. Herein, we should be clear about the concept of network localizability, and node localizability. Detecting localizable nodes deserve great research attention in both NLL and BLL.

The research on node localizability includes the node localizability conditions and the node localizability detection algorithms. In NLL, Yang et. al.[26] proposed an RR3P condition, which is so far the best sufficient condition for node localizability. But up to now, there is no known necessary and sufficient condition for node localizability. For the node localizability detection algorithms, a node localizability detection algorithm was designed according to the RR3P condition. Moreover, several incremental detection algorithms have been proposed according to the rigidity theory[22, 27, 28]. In BLL, Diao et.al. proposed the sufficient and necessary condition for network localizability[19]. But the node localizability condition and node localizability detection algorithms for BLL are still open.

Non-awareness of node localizability is a critical problem in BLL, because each node’s location is iteratively updated based on neighbors’ locations in the BLL routine. If non-localizable nodes participate in the location propagation process, their wrong locations will impact the locations of the localizable nodes. Fig. 1 shows an example of locating 12 nodes including 2 non-localizable nodes using ECHO[19], a representative BLL localization algorithm. Let 𝐩i\mathbf{p}_{i} denote the ground truth location of node viv_{i}, and 𝐩^i\mathbf{\hat{p}}_{i} denote the estimated location using ECHO. Fig. 1(a) shows the results when all the 12 nodes participate in BLL, where the asterisk represents 𝐩^i\mathbf{\hat{p}}_{i} and the circle represents 𝐩i\mathbf{p}_{i}. How the localization errors (𝐩^i𝐩i2||\mathbf{\hat{p}}_{i}-\mathbf{p}_{i}||_{2}) of the nodes vary with the iteration times is shown in Fig. 1(b). The results show that even after 3×1053\times 10^{5} iterations, no node can converge to the correct location if localizability is not considered. Therefore, detecting localizable nodes and excluding non-localizable nodes are critically important for BLL.

Refer to caption
(a) ECHO in 2D.
Refer to caption
(b) Error evolution
Figure 1: The convergence traces, where ‘++’ represents the initialization of 𝐩^i\mathbf{\hat{p}}_{i}, ‘*’ represents the converged 𝐩^i\mathbf{\hat{p}}_{i}, and ‘o’ represents the ground truth location 𝐩i\mathbf{p}_{i}. (a) ECHO converges to wrong locations for all nodes. (b) The evolution of localization error (𝐩^i𝐩i2||\mathbf{\hat{p}}_{i}-\mathbf{p}_{i}||_{2}) w.r.t. iteration rounds.

In this paper, we concentrate on localizability detection in BLL and its applications. The main contributions are as follows.

  • Firstly, a necessary condition and a sufficient condition are designed for BLL node localizability.

  • Then so far the first network localizability test algorithm for BLL is designed, whose key idea is to transform the detection of disjoint paths into calculating the max-flow. Moreover, an Iterative Max-Flow (IMF) method is designed to detect the BLL localizable nodes.

  • The time and space complexity of IMF are studied and the applicability of the IMF algorithms is verified in various aspects including its extension to NLL, extension to higher dimensions.

The remainder of this paper is as follows. In Section II, an overview of the evolution of NL algorithms and the localizability theories is presented. In Section III, a necessary condition and a sufficient condition for node localizability are proposed. In Section IV, testing algorithms for network localizability and an iterative maximum flow (IMF) algorithm for identifying localizable nodes are proposed. Analysis and possible extensions of the proposed algorithms are given in Section V. Algorithms are evaluated in Section VI. Finally, this paper is concluded with discussion of future work in Section VII.

II Preliminary and Key Related Work

The problem formulation, review of network localizability conditions in NLL and BLL, review of node localizability conditions in NLL and BLL, existing localizability identification algorithms, and an overview of our framework are introduced in this section.

II-A Notations and Problem Formulation

For a network 𝒢={𝒱,,𝐝}\mathcal{G=\{V,E,\mathbf{d}\}}, let 𝒱\mathcal{V} = 𝒜\mathcal{A}\cup\mathcal{F} denote the node set, which is composed of mm anchor nodes (i.e., 𝒜={vm+1,,vm+n}\mathcal{A}=\{v_{m+1},\cdots,v_{m+n}\}) and nn free nodes (i.e., ={v1,,vm}\mathcal{F}=\{v_{1},\cdots,v_{m}\}). Locations of anchors are known, denoted by 𝐏𝒜={𝐩1,,𝐩m}\mathbf{P}_{\mathcal{A}}=\{\mathbf{p}_{1},\cdots,\mathbf{p}_{m}\} while locations of free nodes are unknown, denoted by 𝐏={𝐩m+1,,𝐩m+n}\mathbf{P}_{\mathcal{F}}=\{\mathbf{p}_{m+1},\cdots,\mathbf{p}_{m+n}\}. 𝐝\mathbf{d} represents the distance matrix among nodes. For a node viv_{i}, it can obtain the distance dijd_{ij} to another node vjv_{j} if 𝐩i𝐩i2R||\mathbf{p}_{i}-\mathbf{p}_{i}||_{2}\leq R, where RR is the perception radius. (i,j)(i,j)\in\mathcal{E} if dijd_{ij} can be obtained. The neighbors of viv_{i} is represented as 𝒩i\mathcal{N}_{i}, vj𝒩iv_{j}\in\mathcal{N}_{i} if (i,j)(i,j)\in\mathcal{E}. The problem is to detect which free nodes can be uniquely localized using the anchor and distance constraints when BLL methods are adopted.

II-B BLL Methods, Localizability Conditions and Algorithms

Range-based NL algorithms fall into two categories, i.e., NLL and BLL. In NLL, there are a wide range of algorithms to solve 𝐏\mathbf{P}_{\mathcal{F}} from the model of minimizing the sum square errors[29, 11, 30, 31, 15, 32, 12, 14]. The main defect of NLL is that it does not guarantee global optimality since the optimization model is quadratic. For a detailed introduction to NLL, please refer to reference [14]. In this paper, we focus on BLL algorithms.

II-B1 The Process of BLL

In BLL, the basic idea is to represent a node’s location as a linear combination of the locations of its neighbors using inter-node distances. Then, the network localization problem becomes a linear model. The detailed procedure for converting the NL problem to linear form is as follows.

In 2\Re^{2}, for a node viv_{i} and neighbors vjv_{j}, vkv_{k}, vlv_{l} 𝒩i\in\mathcal{N}_{i}, the linear combination is:

𝐩i=aij𝐩j+aik𝐩k+ail𝐩l,\displaystyle{\mathbf{p}}_{i}=a_{ij}{\mathbf{p}}_{j}+a_{ik}{\mathbf{p}}_{k}+a_{il}{\mathbf{p}}_{l}, (1)

where {aij,aik,ail}\{a_{ij},a_{ik},a_{il}\} is called the barycentric coordinate of viv_{i} introduced by Mo¨biusM\ddot{o}bius[33]. Denote {vj,vk,vl}\{v_{j},v_{k},v_{l}\} as Θ\Theta. The barycentric coordinate is calculated as:

{aij=D(Θ;vi,vk,vl)/D(Θ,Θ),aik=D(Θ;vj,vi,vl)/D(Θ,Θ),ail=D(Θ;vj,vk,vi)/D(Θ,Θ).\left\{\begin{aligned} a_{ij}&=D(\Theta;v_{i},v_{k},v_{l})/D(\Theta,\Theta),\\ a_{ik}&=D(\Theta;v_{j},v_{i},v_{l})/D(\Theta,\Theta),\\ a_{il}&=D(\Theta;v_{j},v_{k},v_{i})/D(\Theta,\Theta).\end{aligned}\right. (2)

D()D(\cdot) represents the Cayley-Menger bideterminant, whose input is two node sets with equal cardinality and the output is a signed scalar[20]:

D(𝐩1,,𝐩k;𝐪1,,𝐪k)=\displaystyle D(\mathbf{p}_{1},\cdots,\mathbf{p}_{k};\mathbf{q}_{1},\cdots,\mathbf{q}_{k})= (3)
2(12)k|01111D(𝐩1,𝐪1)D(𝐩1,𝐪2)D(𝐩1,𝐪k)1D(𝐩2,𝐪1)D(𝐩2,𝐪2)D(𝐩2,𝐪k)1D(𝐩k,𝐪1)D(𝐩k,𝐪2)D(𝐩k,𝐪k)|,\displaystyle 2(-\frac{1}{2})^{k}\begin{vmatrix}0&1&1&\cdots&1\\ 1&D(\mathbf{p}_{1},\mathbf{q}_{1})&D(\mathbf{p}_{1},\mathbf{q}_{2})&\cdots&D(\mathbf{p}_{1},\mathbf{q}_{k})\\ 1&D(\mathbf{p}_{2},\mathbf{q}_{1})&D(\mathbf{p}_{2},\mathbf{q}_{2})&\cdots&D(\mathbf{p}_{2},\mathbf{q}_{k})\\ \vdots&\vdots&\vdots&\ddots&\vdots\\ 1&D(\mathbf{p}_{k},\mathbf{q}_{1})&D(\mathbf{p}_{k},\mathbf{q}_{2})&\cdots&D(\mathbf{p}_{k},\mathbf{q}_{k})\end{vmatrix},

where D(𝐩i,𝐪i)D(\mathbf{p}_{i},\mathbf{q}_{i}) is the squared distance dij2d_{ij}^{2} between the nodes 𝐩i\mathbf{p}_{i} and 𝐪i\mathbf{q}_{i}. Then, the linear representation of all node locations can form a linear system:

[𝐏𝒜𝐏]=[𝐈𝟎𝐁𝐂][𝐏𝒜𝐏].\left[{\begin{array}[]{*{20}{c}}{{{\mathbf{P}}_{\mathcal{A}}}}\\ {{{{\mathbf{P}}}_{\mathcal{F}}}}\end{array}}\right]=\left[{\begin{array}[]{*{20}{c}}{\mathbf{I}}&{\mathbf{0}}\\ {\mathbf{B}}&{\mathbf{C}}\end{array}}\right]\left[{\begin{array}[]{*{20}{c}}{{{\mathbf{P}}_{\mathcal{A}}}}\\ {{{{\mathbf{P}}}_{\mathcal{F}}}}\end{array}}\right]. (4)

𝐀=[𝐈𝟎𝐁𝐂](m+n)×(m+n)\mathbf{A}=\left[{\begin{array}[]{*{20}{c}}{\mathbf{I}}&{\mathbf{0}}\\ {\mathbf{B}}&{\mathbf{C}}\end{array}}\right]\in\mathbb{R}^{(m+n)\times(m+n)} is the barycentric coordinates calculated by inter-node distances. Finally, the BLL problem is formulated as the following linear model:

(𝐈𝐂)𝐏𝒮=𝐁𝐏𝒜.(\mathbf{I}-\mathbf{C})\mathbf{P}_{\mathcal{S}}=\mathbf{B}\mathbf{P}_{\mathcal{A}}. (5)

Thus, the general process of BLL is constructing the BLL model in (5) and solving 𝐏\mathbf{P}_{\mathcal{F}} from the model[18, 34, 19, 20]. Note that the same construction manner also works in 3\mathbb{R}^{3}. We then review the known network localizability conditions for NLL and BLL.

TABLE I: An overview of existing work about localizability. \checkmark:solved, ×\times: unsolved, -: unreported.
Network Localizability Node Localizability
Necessary and
Sufficient Condition
Testing
Algorithm
Necessary and
Sufficient Condition
Necessary
Condition
Sufficient
Condition
Detection
Algorithm
NLL \checkmark \checkmark ×\times \checkmark \checkmark \checkmark
BLL \checkmark - - - - -

II-B2 Network Localizability Conditions

In NLL, the network localizability problem is closely related to the graph rigidity[22, 35].

Lemma 1 (NLL Network Localizability Condition[22]).

A network 𝒢\mathcal{G} is localizable in 2D, if and only if it contains at least 3 anchors and it is global rigid (i.e., 3-connected and redundantly rigid).

In BLL, the network localizability condition is based on a generated graph 𝒢𝒜\mathcal{G^{A}} associated with the barycentric representation, instead of 𝒢\mathcal{G}.

Definition 1 (Generated Graph, 𝒢𝒜\mathcal{G^{A}}).

Given 𝒢=(𝒱,)\mathcal{G=(V,E)} and the constructed 𝐀\mathbf{A} in (5), the generated graph 𝒢𝒜=(𝒱,𝒜)\mathcal{G^{A}=(V,E^{A})} of 𝒢\mathcal{G} is defined as a graph with the same node set 𝒱\mathcal{V}. An edge (i,j)𝒜(i,j)\in\mathcal{E^{A}} if 𝐀ij0\mathbf{A}_{ij}\neq 0.

Then, the BLL network localizability condition is designed based on 𝒢𝒜\mathcal{G^{A}}[19].

Lemma 2 (BLL Network Localizability Condition[19]).

Using BLL algorithms, all free nodes in a generic graph 𝒢\mathcal{G} are localizable in 2D if every free node can find at least three node-disjoint paths to anchors through only edges in 𝒢𝒜\mathcal{G^{A}}.

So network localizability for NLL can be checked based on the graph property of 𝒢\mathcal{G}, while network localizability for BLL can be checked based on the property of 𝒢𝒜\mathcal{G^{A}}. We then review the node localizability conditions.

II-B3 Node Localizability Conditions

To judge whether a specific node is localizable, the necessary and sufficient condition has not been derived yet for either NLL or BLL. But there exist several sufficient or necessary conditions.

In NLL, Goldenberg et al. [25] proposed a necessary condition called 3P condition, i.e., a localizable node must have three node-disjoint paths to three distinct anchors. Yang et al. also derived a sufficient condition called RRT-3B condition, i.e., a localizable node needs to be in a redundantly rigid component that is 3-connected and has three anchors. Then, Yang et al. [26] proposed a tightened necessary condition called RR-3P that a localizable node must be in a redundant rigid component in addition to satisfying the 3P condition. They also gave a weaker sufficient condition called RR3P condition that the nodes belong to a redundantly rigid component containing at least three anchors, where there are three node-disjoint paths connecting the free nodes and three anchors. A detailed discussion about network localizability and node localizability can be seen in [36].

In BLL, the issue of node localizability has not been reported. The network localizability and node localizability detection algorithms are then reviewed.

II-B4 Network Localizability and Node Localizability Detection Algorithms

To test whether a network is localizable using NLL, algorithms have been designed to verify global rigidity by integrating the detection of redundant rigidity [37] and the detection of 3-connectivity[38, 39].

To detect localizable nodes in NLL, there are mainly three representative algorithms:

(1) The most representative method is trilateration protocol (TP)[22]. In d\mathbb{R}^{d}, TP first marks the anchors as localizable and free nodes as unlocalizable. Then, each unlocalizable node continually checks its neighbors and changes its state to localizable if it finds at least d+1d+1 localizable neighbors. TP is simple and efficient, but TP misses localizable nodes that are on a geographical gap or a geographical border. Moreover, TP fails to startup if the anchors do not have common neighbors;

(2) To identify nodes on a geographical gap or a border, Yang et al.[27] proposed the wheel extension (WE) algorithm. The structure of the wheel graph is defined and proved to be global rigid. Then each node tries to find a wheel graph in neighbors. If three or more nodes of a wheel are localizable, all other nodes of the wheel are localizable. WE inherits the efficiency of TP, but it may fail if there are not at least three anchors coexist in one wheel at the beginning, then no node can be localized;

(3) To supplement TP and WE, Wu et al.[28] defines the concept of branch, and proves that a branch including three anchors is localizable. A triangle extension (TE) method is proposed to construct branches. The branch construction starts from two connected anchors and extends the branch by extension operations. Once the extension reaches the third anchor or a localizable node, all nodes on the branch are localizable. However, TE fails when every two anchors do not share any common neighbor; Localizability detection in 3D has been explored in [21].

In BLL, there is neither a network localizability testing algorithm nor a node localizability detecting algorithm yet.

II-C Summary of BLL Localizability Detection and the Overview of Our Work

An overview of the state-of-the-art for network localizability, node localizability detection conditions and algorithms is summarized in Table I. Overall, the localizability problem has been well researched in NLL except for a necessary and sufficient node localizability condition and the corresponding detection algorithm that guarantee to detect all localizable nodes. The research on localizability in BLL is much lacked. Only the necessary and sufficient condition for BLL network localizability is given in [19]. The testing algorithm for BLL network localizability, conditions and algorithm for BLL node localizability are still open.

To fill the knowledge gap in BLL, this paper proposes:

1) A necessary condition for BLL node localizability.

2) A sufficient condition for BLL node localizability.

3) A testing algorithm for BLL network localizability, and

4) A detection algorithm for BLL localizable nodes.

The necessary and sufficient condition for node localizability is still left as an open problem.

III A Necessary Condition and A Sufficient Condition for BLL Node Localizability

Since the network localizability condition for BLL has been given [19], we will explore the node localizability conditions for BLL in this section. For a network 𝒢={𝒱,,𝐝}\mathcal{G=\{V,E,\bf{d}\}}, Yang et. al [26] proposed that even (vi,vj)(v_{i},v_{j})\notin\mathcal{E}, there might be an implicit edge between the two nodes if dijd_{ij} can be uniquely determined by two rigid constraints. Hereinafter, we assume that 𝒢\mathcal{G} is the graph after adding the implicit edges.

III-A Necessary Condition for BLL Node Localizability

From Lemma 2, a node should have three node-disjoint paths (3P) to anchors in 𝒢𝒜\mathcal{G^{A}} to be BLL-localizable. To make a certain node has 3P to anchors, it is straightforward that it must have at least 3 neighbors in 𝒢𝒜\mathcal{G^{A}}. From the perspective of the original graph 𝒢\mathcal{G}, this necessary condition is formulated as follows.

Theorem 1 (Necessity of d+1d+1 Mutually Connected Neighbors).

In a graph 𝒢={𝒱,}\mathcal{G=\{V,E\}} in d\mathbb{R}^{d}, for a node to be localizable using BLL, it must have at least d+1d+1 mutually connected neighbors.

Proof.

Recall that in the construction of the BLL linear model, the barycentric coordinates are calculated using the Cayley-Menger bideterminant, where the distance between each pair of nodes from the input {v1,,vk}\{v_{1},\cdots,v_{k}\} is involved. Thus, for node viv_{i}, 𝐀ij0\exists\mathbf{A}_{ij}\neq 0 (i.e., vjv_{j} is a neighbor of viv_{i} in 𝒢𝒜\mathcal{G^{A}}) only if viv_{i} has d+1d+1 mutually connected neighbors so that the Cayley-Menger bideterminant can be calculated. ∎

Theorem 1 implies that BLL node localizability requires stronger connectivity for each node. Neighbors in 𝒩i\mathcal{N}_{i} need to be mutually connected to contribute to the BLL-localizability of viv_{i}. That is, BLL-localizability is theoretically more difficult to be satisfied than NLL-localizability. For example, Yang et. al. have proved that a wheel graph like Fig. 2(a) is global rigid (i.e., NLL-localizable)[27]. But none of these nodes are BLL-localizable since each node’s neighbors are not mutually connected.

Refer to caption
(a) A wheel graph.
Refer to caption
(b) The corresponding 𝒢𝒜\mathcal{G^{A}}.
Figure 2: A wheel graph is NLL-localizable but not BLL-localizable.

III-B Sufficient Condition for BLL Node Localizability

From Lemma 2, we derive a sufficient condition for BLL node localizability by recursion.

Theorem 2 (Sufficiency of Recursive-3DP).

In a graph 𝒢={𝒱,}\mathcal{G=\{V,E\}} in 2\mathbb{R}^{2}, if 1) viv_{i} has 3P to anchors in 𝒢𝒜\mathcal{G^{A}}, without loss of generality, say p1p_{1}, p2p_{2}, and p3p_{3}, and 2) every node on each path p1p_{1}, p2p_{2}, and p3p_{3} has 3P to anchors. Then, node viv_{i} is BLL-localizable in 𝒢\mathcal{G}. We call this condition Recursive-3DP for brief.

Proof.

If both 1) and 2) are satisfied, the graph induced by viv_{i} and the nodes it passes by on its paths satisfies Lemma 2. So all these nodes are BLL-localizable.

Theorem 2 implies that the set of BLL-localizable nodes and the set of BLL-unlocalizable nodes should be edge-independent, i.e., the BLL-localizable nodes should have no edge connecting BLL-unlocalizable nodes. Thus, the BLL-localizable nodes can be found by iteratively removing nodes without 3P.

IV Algorithms for BLL Network Localizability and BLL Node Localizability

Given a network 𝒢\mathcal{G}, there is no existing algorithm that can tell the network localizability or node localizability in BLL. From the previous section, we can observe that the key issue of BLL-localizability is verifying the 3P3P condition. Thus in this section, we first transform the verification of 3P3P to the calculation of max-flow in an appropriately constructed flow graph. Then, a max-flow-based algorithm is presented to test whether 𝒢\mathcal{G} is BLL-localizable by checking the max-flow in its 𝒢𝒜\mathcal{G^{A}}. Furthermore, we adopt this idea to detect the BLL-localizable nodes using Theorem 2 through an iterative algorithm.

IV-A Disjoint Path and Max-Flow

To proceed, we introduce a flow graph 𝒢=(𝒱,,𝒞)\mathcal{G^{F}}=(\mathcal{V^{F}},\mathcal{E^{F}},\mathcal{C}) constructed from 𝒢={𝒱,}\mathcal{G=\{V,E\}}, where 𝒱=𝒜\mathcal{V}=\mathcal{A}\cup\mathcal{F}.

  • Divide each free node viv_{i}\in\mathcal{F} into two copies {viin,viout}\{v_{i}^{in},v_{i}^{out}\} and add them to 𝒱\mathcal{V^{F}}. Then, add anchor nodes in 𝒜\mathcal{A} and an virtual target node Ω\Omega to 𝒱\mathcal{V^{F}}.

  • For each viv_{i}\in\mathcal{F}, add (viin,viout)(v_{i}^{in},v_{i}^{out}) to \mathcal{E^{F}}. For each neighbor vj𝒩iv_{j}\in\mathcal{N}_{i}, add (viout,vj)(v_{i}^{out},v_{j}) to \mathcal{E^{F}} if vjv_{j} is an anchor, add (viout,vjin)(v_{i}^{out},v_{j}^{in}) to \mathcal{E^{F}}, otherwise; For each anchor node vi𝒜v_{i}\in\mathcal{A}, add (vi,Ω)(v_{i},\Omega) to \mathcal{E^{F}}.

  • Assign 𝒞ij=1\mathcal{C}_{ij}=1 in the capacity matrix 𝒞\mathcal{C} if (vi,vj)(v_{i},v_{j})\in\mathcal{E^{F}}.

Then, we show the equality between the number of disjoint paths (DP) in 𝒢\mathcal{G} and the Max-Flow in 𝒢\mathcal{G^{F}}.

Lemma 3.

Consider a network 𝒢\mathcal{G} and its corresponding 𝒢\mathcal{G^{F}}, the following two are equivalent.

  • The count of disjoint paths from viv_{i} to anchors in 𝒢\mathcal{G}.

  • The max flow from vioutv_{i}^{out} to Ω\Omega in 𝒢\mathcal{G^{F}}.

Proof.

First we prove that every path to anchors in 𝒢\mathcal{G} is included in 𝒢\mathcal{G^{F}}. Suppose an arbitrary edge (vi,vj)(v_{i},v_{j}) on any path 𝒫=v1vk\mathcal{P}=v_{1}\cdots v_{k} in 𝒢\mathcal{G}. If viv_{i} is an free node and vjv_{j} is an anchor node, then the edge is maintained by viinvioutvjv_{i}^{in}\rightarrow v_{i}^{out}\rightarrow v_{j}. If both viv_{i} and vjv_{j} are free nodes, the edge is maintained by viinvioutvjinvjoutv_{i}^{in}\rightarrow v_{i}^{out}\rightarrow v_{j}^{in}\rightarrow v_{j}^{out}. Since we focus on paths to anchors, the case that viv_{i} is an anchor node and vjv_{j} is a free node is not considered. Thus, any path 𝒫\mathcal{P} from viv_{i} to anchors in 𝒢\mathcal{G} can be transformed to a new path in 𝒢\mathcal{G^{F}}; Suppose any source node vioutv_{i}^{out}, it is straightforward that any path from vioutv_{i}^{out} to Ω\Omega must go through one edge of the minimum cut. And each node vjv_{j} is passed by at most one path since the capacity of (vjin,vjout)(v_{j}^{in},v_{j}^{out}) is one. Because the maximum flow equals the minimum edge cut, the count of disjoint paths from viv_{i} to anchors in 𝒢\mathcal{G} equals the max flow from vioutv_{i}^{out} to Ω\Omega in 𝒢\mathcal{G^{F}}. ∎

A case study is shown in Fig. 3. The generated graph 𝒢𝒜\mathcal{G^{A}} of a network 𝒢\mathcal{G} of 5 nodes is given in Figure 3(a). Its corresponding 𝒢\mathcal{G^{F}} is in Figure 3(b). The constructed capacity matrix 𝒞\mathcal{C} is shown in Table II. It is easy to verify the equivalence between the number of disjoint paths in 𝒢𝒜\mathcal{G^{A}} and the max flow in 𝒢\mathcal{G^{F}}. For example, there are five paths from v4v_{4} to anchors, i.e., v4v1,v4v5v1,v4v5v2,v4v5v3,v4v6v3v_{4}\rightarrow v_{1},v_{4}\rightarrow v_{5}\rightarrow v_{1},v_{4}\rightarrow v_{5}\rightarrow v_{2},v_{4}\rightarrow v_{5}\rightarrow v_{3},v_{4}\rightarrow v_{6}\rightarrow v_{3}. Three of them are node disjoint, i.e., v4v1,v4v5v2,v4v6v3v_{4}\rightarrow v_{1},v_{4}\rightarrow v_{5}\rightarrow v_{2},v_{4}\rightarrow v_{6}\rightarrow v_{3}. Using Orlin’s method [40], we can obtain that the max-flow from v4v_{4} to Ω\Omega in 𝒢\mathcal{G^{F}} is also three.

Refer to caption
(a) 𝒢𝒜\mathcal{G^{A}}
Refer to caption
(b) 𝒢F\mathcal{G}^{F}
Figure 3: A demonstration of the construction of 𝒢\mathcal{G^{F}}.
TABLE II: The capacity matrix 𝒞\mathcal{C} of the flow graph 𝒢\mathcal{G^{F}} in Fig. 3(b).
v4inv_{4}^{in} v4outv_{4}^{out} v5inv_{5}^{in} v5outv_{5}^{out} v6inv_{6}^{in} v6outv_{6}^{out} 1 2 3 Ω\Omega
0 1 0 0 0 0 0 0 0 0 v4inv_{4}^{in}
0 0 1 0 1 0 1 0 0 0 v4outv_{4}^{out}
0 0 0 1 0 0 0 0 0 0 v5inv_{5}^{in}
1 0 0 0 0 0 1 1 1 0 v5outv_{5}^{out}
0 0 0 0 0 1 0 0 0 0 v6inv_{6}^{in}
Free Nodes 1 0 0 0 0 0 0 0 1 0 v6outv_{6}^{out}
0 0 0 0 0 0 0 0 0 1 1
0 0 0 0 0 0 0 0 0 1 2
Anchors 0 0 0 0 0 0 0 0 0 1 3
Ω\Omega 0 0 0 0 0 0 0 0 0 0 Ω\Omega

IV-B BLL Network Localizability Test

Now, whether a network 𝒢\mathcal{G} is BLL-localizable can be tested by checking 𝒢𝒜\mathcal{G^{A}} using Lemma 3. Algorithm 1 shows the routine. Recall that a network is BLL-localizable means that all the nodes are BLL-localizable. So if any node does not meet the necessary condition in Theorem 1, the network is not BLL-localizable (Line 1-Line 1). Then, if all nodes meet the necessary condition, we construct the generated graph 𝒢𝒜\mathcal{G^{A}} shown as Function construct_generated_graph(𝒢\mathcal{G}) (Line 1-Line 1). Then the flow graph 𝒢\mathcal{G^{F}} of 𝒢𝒜\mathcal{G^{A}} is constructed using the method in Section IV-A. The max flow is calculated using Orlin’s method [40] (Line 1). In Lemma 2, the BLL network localizability condition requires that each free node should have 3P to anchors in 𝒢𝒜\mathcal{G^{A}}, so 𝒢\mathcal{G} is BLL-localizable if the max-flow from each viv_{i}\in\mathcal{F} to Ω\Omega is not less than 3 in 𝒢\mathcal{G^{F}}, BLL-unlocalizable, otherwise (Line 1-Line 1).

Use the graph in Fig. 3 for instance. Let 𝐃𝐏𝐢𝒜𝒢𝒜\bf{DP}^{\mathcal{G_{A}}}_{i\rightarrow\mathcal{A}} be the number of disjoint paths from viv_{i} to nodes in 𝒜\mathcal{A} in 𝒢𝒜\mathcal{G_{A}}, and 𝐌𝐚𝐱_𝐅𝐥𝐨𝐰𝐢𝛀𝒢\bf{Max\_Flow}_{i\rightarrow\Omega}^{\mathcal{G^{F}}} be the max flow from viv_{i} to the virtual node Ω\Omega. We can obtain:

{𝐃𝐏4{1,2,3}𝒢𝒜=𝐌𝐚𝐱_𝐅𝐥𝐨𝐰4Ω𝒢=3,𝐃𝐏5{1,2,3}𝒢𝒜=𝐌𝐚𝐱_𝐅𝐥𝐨𝐰5Ω𝒢=3,𝐃𝐏6{1,2,3}𝒢𝒜=𝐌𝐚𝐱_𝐅𝐥𝐨𝐰6Ω𝒢=2.\left\{\begin{aligned} \mathbf{DP}_{4\rightarrow\{1,2,3\}}^{\mathcal{G^{A}}}&=\mathbf{Max\_Flow}_{4\rightarrow\Omega}^{\mathcal{G^{F}}}=3,\\ \mathbf{DP}_{5\rightarrow\{1,2,3\}}^{\mathcal{G^{A}}}&=\mathbf{Max\_Flow}_{5\rightarrow\Omega}^{\mathcal{G^{F}}}=3,\\ \mathbf{DP}_{6\rightarrow\{1,2,3\}}^{\mathcal{G^{A}}}&=\mathbf{Max\_Flow}_{6\rightarrow\Omega}^{\mathcal{G^{F}}}=2.\end{aligned}\right. (6)

Thus, through Algorithm 1, we can conclude that the network in Fig. 3 is not BLL-localizable due to the existence of v6v_{6}.

Input: 𝒢={𝒱,},𝒱=𝒜\mathcal{G=\{V,E\}},\mathcal{V=A\cup F}.
Output: Network BLL-localizability: true or false.
21 add the implicit edges to \mathcal{E}[26];
43 if vi𝒱\exists v_{i}\in\mathcal{V} has no 3 mutually connected neighbors then
       // the necessary condition in Theorem 1 is not satisfied
6      5 return false;
7      
98𝒢𝒜={𝒱,𝒜}construct_generated_graph(𝒢)\mathcal{G^{A}}=\{\mathcal{V},\mathcal{E^{A}}\}\leftarrow construct\_generated\_graph(\mathcal{G});
1110 construct the flow graph 𝒢=(𝒱,,𝒞)\mathcal{G^{F}}=(\mathcal{V^{F}},\mathcal{E^{F}},\mathcal{C}) of 𝒢𝒜\mathcal{G^{A}} as in Section IV-A;
1312 calculate 𝐌𝐚𝐱_𝐅𝐥𝐨𝐰iΩ𝒢\mathbf{Max\_Flow}_{i\rightarrow\Omega}^{\mathcal{G^{F}}} for each viv_{i}\in\mathcal{F};
1514 if \exists 𝐌𝐚𝐱_𝐅𝐥𝐨𝐰iΩ𝒢<3\mathbf{Max\_Flow}_{i\rightarrow\Omega}^{\mathcal{G^{F}}}<3 then
17      16 return false;
18      
19else
21      20 return true;
22      
23Function construct_generated_graph(𝒢\mathcal{G})
25      24 for each node viv_{i}\in\mathcal{F} do
27            26 tri_count0tri\_count\leftarrow 0;
29            28 for each combination of 3 mutually connected nodes {vj,vk,vl}\{v_{j},v_{k},v_{l}\} in 𝒩i\mathcal{N}_{i} do
31                  30 tri_counttri_count+1tri\_count\leftarrow tri\_count+1;
33                  32 {𝐀ijtri_count,𝐀iktri_count,𝐀iltri_count}\{\mathbf{A}_{ij}^{tri\_count},\mathbf{A}_{ik}^{tri\_count},\mathbf{A}_{il}^{tri\_count}\}\leftarrow (1);
35                  34 𝐀istri_count0\mathbf{A}_{is}^{tri\_count}\leftarrow 0 for s𝒩i{vj,vk,vl}s\in\mathcal{N}_{i}\setminus\{v_{j},v_{k},v_{l}\};
36                  
38            37𝐀ir=1tri_countt=1tri_count𝐀irt\mathbf{A}_{ir}=\frac{1}{tri\_count}\sum_{t=1}^{tri\_count}\mathbf{A}_{ir}^{t}, for r𝒩ir\in\mathcal{N}_{i} ;
39            
41      40𝒢𝒜={𝒱,𝒜}\mathcal{G^{A}}=\{\mathcal{V},\mathcal{E^{A}}\}, where (vi,vj)𝒜(v_{i},v_{j})\in\mathcal{E^{A}} if 𝐀ij0\mathbf{A}_{ij}\neq 0;
43      42 return 𝒢𝒜\mathcal{G^{A}};
44      
Algorithm 1 The Max-Flow (MF) Algorithm for BLL Network Localizability Test

IV-C BLL Node Localizability Detection

Detecting the BLL-localizable nodes in a partial localizable network is conducted through Theorem 2, i.e., detecting the nodes that satisfy the Recursive-3DP condition. The routine is shown as the IMF algorithm in Algorithm 2. IMF iteratively removes nodes not having 3P and the corresponding capacities of these nodes in each round. In each round, only the nodes having 3P and the edges among them (denoted by Edge(\cdot)) are left (Line 2-Line 2). Finally, IMF terminates when no more nodes can be removed (Line 2).

Take Fig. 3 as an example to show the process of IMF. In the first round, v6v_{6} is removed since 𝐌𝐚𝐱_𝐅𝐥𝐨𝐰6Ω𝒢=2\mathbf{Max\_Flow}_{6\rightarrow\Omega}^{\mathcal{G^{F}}}=2, then ={v4,v5}\mathcal{F}^{*}=\{v_{4},v_{5}\}; In the second round, 𝐌𝐚𝐱_𝐅𝐥𝐨𝐰4Ω𝒢\mathbf{Max\_Flow}_{4\rightarrow\Omega}^{\mathcal{G^{F}}} becomes 2 since v6v_{6} and its corresponding edges are removed. Then, \mathcal{F}^{*} becomes {v5}\{v_{5}\}; In the third round, \mathcal{F}^{*} does not change since the 3P of v5v_{5} does not pass through nodes without 3P. So IMF terminates and outputs {v5}\{v_{5}\} as the BLL-localizable node set.

Input: 𝒢={𝒱,},𝒱=𝒜\mathcal{G=\{V,E\}},\mathcal{V=A\cup F}.
Output: Set of BLL-localizable nodes: \mathcal{F}^{*}.
21 add the implicit edges to \mathcal{E}[26];
43 𝒢𝒜={𝒱,𝒜}construct_generated_graph(𝒢)\mathcal{G^{A}}=\{\mathcal{V},\mathcal{E^{A}}\}\leftarrow construct\_generated\_graph(\mathcal{G});
65 construct the flow graph 𝒢=(𝒱,,𝒞)\mathcal{G^{F}}=(\mathcal{V^{F}},\mathcal{E^{F}},\mathcal{C}) of 𝒢𝒜\mathcal{G^{A}} as in Section IV-A;
87 calculate 𝐌𝐚𝐱_𝐅𝐥𝐨𝐰iΩ𝒢\mathbf{Max\_Flow}_{i\rightarrow\Omega}^{\mathcal{G^{F}}} for each viv_{i}\in\mathcal{F};
9 {vi|𝐌𝐚𝐱_𝐅𝐥𝐨𝐰iΩ𝒢3}\mathcal{F}^{*}\leftarrow\{v_{i}|\mathbf{Max\_Flow}_{i\rightarrow\Omega}^{\mathcal{G^{F}}}\geq 3\}; // the nodes whose max flow is not less than 3
1110 if =\mathcal{F}^{*}=\mathcal{F} then
13      12 return \mathcal{F}^{*};
14      
15else
17      16 remove the capacities of \mathcal{F}\setminus\mathcal{F}^{*} from 𝒞\mathcal{C};
19      18 \mathcal{F}\leftarrow\mathcal{F}^{*}, 𝒢{𝒜,𝐄𝐝𝐠𝐞(𝒜)}\mathcal{G}\leftarrow\{\mathcal{A}\cup\mathcal{F},\mathbf{Edge}(\mathcal{A}\cup\mathcal{F})\};
21      20 reconstruct 𝒢𝒜\mathcal{G^{A}} of 𝒢\mathcal{G};
23      22go back to Line 2;
24      
Algorithm 2 The Iterative Max-Flow (IMF) Algorithm for BLL Node Localizability Detection

V Analysis and Discussion

In this section, we first give the theoretical analysis of our IMF algorithm. Then we discuss its extensions. Finally, we give an application of IMF in NL.

V-A Analysis of IMF

V-A1 Validity

Theorem 3.

Given 𝒢={𝒱,}\mathcal{G=\{V,E\}}, all the nodes satisfying Theorem 2 can be detected by Algorithm 2.

Proof.

Index the nodes removed by Algorithm 2 as ={s1sc}\mathcal{F}\setminus\mathcal{F}^{*}=\{s_{1}\cdots s_{c}\}. Let 𝒱\mathcal{V}^{{}^{\prime}} be an arbitrary feasible solution of Lemma 2 and 𝐆[V]\mathbf{G}[V^{{}^{\prime}}] be the induced subgraph of 𝒱\mathcal{V}^{{}^{\prime}}. s1s_{1} is removed because s1s_{1} has not three disjoint paths to anchors. There must be that s1s_{1} cannot find three disjoint paths in 𝐆[V]\mathbf{G}[V^{{}^{\prime}}] since 𝐆[V]\mathbf{G}[V^{{}^{\prime}}] is a subgraph of 𝒢\mathcal{G}. i.e., s1s_{1} will not be included by any other feasible solution. Similarly, every node of \mathcal{F}\setminus\mathcal{F}^{*} is not included by any feasible solution. Additionally, every node of \mathcal{F}^{*} satisfies Theorem 2, otherwise it will be removed. Thus, Algorithm 2 selects all the vertices that can satisfy Theorem 2. ∎

V-A2 Time Complexity

Theorem 4.

For a graph 𝒢={𝒱,}\mathcal{G=\{V,E\}}, let |𝒱|=n|\mathcal{V}|=n, ||=m|\mathcal{E}|=m and the number of neighbors bounded by Δ\Delta, i.e., |𝒩i|Δ,vi𝒱|\mathcal{N}_{i}|\leq\Delta,~{}\forall v_{i}\in\mathcal{V}. The complexity of the IMF algorithm is O(kn(Δ3+m))O(kn(\Delta^{3}+m)), where kk is the number of iterations.

Proof.

In each round of IMF, the construction of 𝒢𝒜\mathcal{G^{A}} needs a complexity of O(nΔ3)O(n\Delta^{3}) since it needs to check the combination of three neighbors for each node. Then, the construction of 𝒢\mathcal{G^{F}} checks each edge in \mathcal{E} to assign the capacities, requesting a complexity of O(m)O(m). In calculating the max flow, there exist many efficient algorithms[41]. In this article, we adopt Orlin’s method with a complexity of O(nm)O(nm)[40]. Let kk be the iteration count, the complexity of IMF is O(kn(Δ3+m))O(kn(\Delta^{3}+m)). In the worst case, only one node is detected to be with a Max-Flow less than 3 in each round and then removed, then the time complexity becomes O(n2(Δ3+m))O(n^{2}(\Delta^{3}+m)). ∎

V-A3 Space Complexity

The major space consumption of IMF is storing 𝒢𝒜\mathcal{G^{A}} and 𝒢\mathcal{G^{F}}, and the space complexity is O(n2)O(n^{2}).

V-B Extensions of IMF

V-B1 Extension to NLL Localizability Detection

Recall that IMF checks the Recursive-3DP condition in the generated graph 𝒢𝒜\mathcal{G_{A}}. If we modify IMF as follows, the returned \mathcal{F}^{*} becomes the set of nodes satisfying Recursive-3DP in the original graph 𝒢\mathcal{G}.

Modification 1 (M1):

  • Remove Line 2 and Line 2 from Algorithm 2.

  • Change the construction of 𝒢\mathcal{G^{F}} in Line 2 to be based on 𝒢\mathcal{G}.

Thus, the returned \mathcal{F}^{*} becomes the set of nodes satisfying Recursive-3DP in 𝒢\mathcal{G} after M1.

Theorem 5.

A graph 𝒢\mathcal{G} is global rigid if it is composed of Recursive-3DP nodes.

Proof.

If each node has three node disjoint paths to anchors, there is no binary vertex cut. Then 𝒢\mathcal{G} is redundant rigid and 3-connected so that the NLL localizability condition is met. ∎

That is, IMF returns the NLL-localizable nodes if we conduct M1.

V-B2 Extension to Arbitrary Dimensions

IMF works in any dimensions, denoted by dd.

Modification 2 (M2):

  • Change the threshold in Line 2 to d+1d+1.

  • Increase the number of anchors to be no less than d+1d+1.

Then, the returned nodes form a (d+1)(d+1)P+ graph, where each node has at least d+1d+1 disjoint paths to anchors. Although the equivalence between globally rigidity and localizability has not been proved when d>2d>2, IMF provides an efficient way to detect a well-structured (d+1)(d+1)P+ subgraph after M2.

VI Evaluation

Simulations are conducted using MATLAB R2020b to show the effectiveness of our method. First, we present the localizability detection capacity of the proposed IMF algorithm compared with the most representative localizability detection algorithm TP and the state-of-the-art algorithm TE. Then, we show the strong applicability of IMF in a variety of harsh situations. Finally, we analyze the application of IMF in BLL.

VI-A Effectiveness of IMF in Localizability Detection

In this section, the perception radius RR is varied to control the network density (assessed by average node degree). The percentage of anchor nodes (i.e., |𝒜|/|𝒱||\mathcal{A}|/|\mathcal{V}|) is also varied. The detection capacity of a certain algorithm is assessed by the percentage of detected localizable nodes |^|/|𝒱||\hat{\mathcal{F}}^{*}|/|\mathcal{V}| (called %\% of localizable for brief), where ^\hat{\mathcal{F}}^{*} is the detected localizable nodes by a certain algorithm.

Refer to caption
(a) TP
Refer to caption
(b) TE
Refer to caption
(c) IMF
Figure 4: The effect of anchor density and node density on detection capacity.

Fig. 4 shows the percentage of detected localizable nodes of different algorithms under different average degrees and anchor densities. We can obtain the following observations:

  • IMF outperforms the other two algorithms in detection capacity under all settings, especially in sparse and anchor-lacking networks.

  • It is straightforward that detection algorithms are expected to detect more localizable nodes when there are more anchors. However, only the localizable nodes detected by IMF increase monotonically with the increase of anchor nodes under fixed network density. That is, the detection capacities of TP and TE are additionally affected by the distribution of anchors.

VI-B Applicability of IMF in Harsh Scenarios

To further show the stable performance of IMF, we visualize the detection result of different algorithms in harsh scenarios, i.e., networks with irregular anchor distribution or networks with holes.

Refer to caption
Refer to caption
Refer to caption
Refer to caption
Refer to caption
Refer to caption
Figure 5: The networks with different anchor distributions. Red diamonds represent anchors and brown cross markers represent the nodes that are not detected to be localizable by any algorithm. (a)-(b): 3 anchors have common neighbors; (c)-(d): 2 anchors have common neighbors; (e)-(f): no anchor nodes have common neighbors.)

Fig. 5 shows the impact of anchor distribution. It can be seen that TP requires at least three anchors having common neighbors as in Fig. 5 to startup and TE needs at least two anchors having common neighbors as in Fig. 5 to startup. If the startup condition is not satisfied as in Fig. 5, TP and TE fail and detect no localizable nodes. However, IMF can detect most of the localizable nodes, even when anchors do not have any common neighbor.

In some applications, networks may be deployed with holes due to geographical obstacles or deployment requirements. To clarify the effect of holes, we first adjust the anchor distribution to ensure TP and TE can startup as in Fig. 5 and Fig. 5. The results show that even when the startup conditions are met, TP and TE detect fewer localizable nodes than IMF. When anchors have no common neighbors, only IMF works as in Fig. 5. The detailed detection results are given in Table III.

TABLE III: The number of detected localizable nodes.
Fig. 5 Fig. 5 Fig. 5 Fig. 5 Fig. 5 Fig. 5
Total 97 154 97 154 97 154
TP 41 64 0 0 0 0
TE 86 51 86 51 0 0
IMF 93 151 93 151 93 151
Refer to caption
(a) Average Degree=8.
Refer to caption
(b) Average Degree=10.
Refer to caption
(c) Average Degree=12.
Refer to caption
(d) Average Degree=14.
Refer to caption
(e) Average Degree=16.
Figure 6: The distribution of detected localizable nodes under different average degrees.

Moreover, Fig. 6 shows the statistical results of repeated experiments. The five figures are statistical results for networks with average degrees {8, 10, 12, 14, 16} respectively. In each figure, 1000 networks are generated randomly following the average node degree and run TP, TE, and IMF respectively. Each network contains 100 nodes and the distributions of the number of detected localizable nodes for TP, TE and IMF are compared using box graph. It can be observed that:

  • IMF always detects more localizable nodes than TP and TE, especially in sparse networks. When the average degree is 16, the median value of IMF reaches 97%.

  • The median value of TP is 0 under each degree, which means that its startup condition is hard to be satisfied in random networks.

VII Conclusion

Determining localizability in BLL methods is crucially important due to its wide applications. In this paper, we summarize the gaps in existing theories and algorithms of BLL-localizability. To fill the knowledge gap, a sufficient condition and a necessary condition for BLL node localizability are proposed. Based on these conditions, algorithms to test BLL network localizability and to detect BLL node localizability are designed. We theoretically analyzed our main algorithm and discussed its broad prospects. Evaluations demonstrated the validity of the proposed IMF node localizability detection algorithm.

In future work, promising directions include deriving the sufficient and necessary condition of node localizability for both NLL and BLL, and designing reliable algorithms guaranteeing the detection of all theoretically localizable nodes, especially in higher dimensions.

References

  • [1] Kexin Guo, Xiuxian Li, and Lihua Xie. Ultra-wideband and odometry-based cooperative relative localization with application to multi-uav formation control. IEEE Transactions on Cybernetics, 50(6):2590–2603, 2020.
  • [2] Thien-Minh Nguyen, Zhirong Qiu, Thien Hoang Nguyen, Muqing Cao, and Lihua Xie. Persistently excited adaptive relative localization and time-varying formation of robot swarms. IEEE Transactions on Robotics, 36(2):553–560, 2020.
  • [3] Freddy Demiane, Sanaa Sharafeddine, and Omar Farhat. An optimized uav trajectory planning for localization in disaster scenarios. Computer Networks, 179:107378, 2020.
  • [4] Stefania Bartoletti, Andrea Conti, Davide Dardari, and Andrea Giorgetti. 5g localization and context-awareness. University of Bologna, University of Ferrara, 2018.
  • [5] Kexin Guo, Xiuxian Li, and Lihua Xie. Simultaneous cooperative relative localization and distributed formation control for multiple uavs. Science China Information Sciences, 63(1):1–3, 2020.
  • [6] Xiuwu Yu, Lixing Zhou, and Xiangyang Li. A novel hybrid localization scheme for deep mine based on wheel graph and chicken swarm optimization. Computer Networks, 154:73–78, 2019.
  • [7] Bobai Zhao, Dali Zhu, Tong Xi, Chenggang Jia, Shang Jiang, and Siye Wang. Convolutional neural network and dual-factor enhanced variational bayes adaptive kalman filter based indoor localization with wi-fi. Computer Networks, 162:106864, 2019.
  • [8] Fine Ranging (FiRa) Consortium. Localization cases based on distance measurement using uwb technology. Website, 2021. https://www.firaconsortium.org/discover/use-cases.
  • [9] Tsingoal. Precise locating core algorithm. Website, 2021. http://www.tsingoal.com/index.php?lang=en.
  • [10] Infsoft GmbH. Indoor positioning with uwb. Website, 2021. https://www.ultrawideband.io/en/technology.php.
  • [11] Yi Shang and Wheeler Ruml. Improved mds-based localization. In Proceedings of the 2004 IEEE INFOCOM, volume 4, pages 2640–2651. IEEE, 2004.
  • [12] H. Ping, Y. Wang, and D. Li. Hgo: Hierarchical graph optimization for accurate, efficient, and robust network localization. In Proceedings of the 29th International Conference on Computer Communications and Networks (ICCCN), pages 1–9, 2020.
  • [13] Soumya J Bhat and Santhosh K Venkata. An optimization based localization with area minimization for heterogeneous wireless sensor networks in anisotropic fields. Computer Networks, 179:107371, 2020.
  • [14] H. Ping, Y. Wang, D. Li, and T. Sun. Flipping free conditions and their application in sparse network localization. IEEE Transactions on Mobile Computing, pages 1–1, 2020.
  • [15] T. Sun, Y. Wang, D. Li, Z. Gu, and J. Xu. Wcs: Weighted component stitching for sparse network localization. IEEE/ACM Transactions on Networking, 26(5):2242–2253, 2018.
  • [16] U. A. Khan, S. Kar, and J. M. F. Moura. Linear theory for self-localization: Convexity, barycentric coordinates, and cayley–menger determinants. IEEE Access, 3:1326–1339, 2015.
  • [17] S. Safavi, U. A. Khan, S. Kar, and J. M. F. Moura. Distributed localization: A linear theory. Proceedings of the IEEE, 106(7):1204–1223, 2018.
  • [18] U. A. Khan, S. Kar, and J. M. F. Moura. Distributed sensor localization in random environments using minimal number of anchor nodes. IEEE Transactions on Signal Processing, 57(5):2000–2016, 2009.
  • [19] Y. Diao, Z. Lin, and M. Fu. A barycentric coordinate based distributed localization algorithm for sensor networks. IEEE Transactions on Signal Processing, 62(18):4760–4771, 2014.
  • [20] P. P. V. Tecchio, N. Atanasov, S. Shahrampour, and G. J. Pappas. N-dimensional distributed network localization with noisy range measurements and arbitrary anchor placement. In Proceedings of 2019 American Control Conference (ACC), pages 1195–1201, 2019.
  • [21] Na Xia, Yuanxiao Ou, Shiliang Wang, Rong Zheng, Huazheng Du, and Chaonong Xu. Localizability judgment in uwsns based on skeleton and rigidity theory. IEEE Transactions on Mobile Computing, 16(4):980–989, 2016.
  • [22] Tolga Eren, OK Goldenberg, Walter Whiteley, Yang Richard Yang, A Stephen Morse, Brian DO Anderson, and Peter N Belhumeur. Rigidity, computation, and randomization in network localization. In Proceedings of the 2004 IEEE INFOCOM, volume 4, pages 2673–2684. IEEE, 2004.
  • [23] Bruce Hendrickson. Conditions for unique graph realizations. SIAM journal on computing, 21(1):65–84, 1992.
  • [24] Bill Jackson and Tibor Jordán. Connected rigidity matroids and unique realizations of graphs. Journal of Combinatorial Theory, Series B, 94(1):1–29, 2005.
  • [25] David Kiyoshi Goldenberg, Arvind Krishnamurthy, Wesley C Maness, Yang Richard Yang, Anthony Young, A Stephen Morse, and Andreas Savvides. Network localization in partially localizable networks. In Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies., volume 1, pages 313–326. IEEE, 2005.
  • [26] Zheng Yang and Yunhao Liu. Understanding node localizability of wireless ad hoc and sensor networks. IEEE Transactions on Mobile Computing, 11(8):1249–1260, 2011.
  • [27] Z. Yang, Y. Liu, and X. . Li. Beyond trilateration: On the localizability of wireless ad-hoc networks. In Proceedings of the 2009 IEEE INFOCOM, pages 2392–2400, 2009.
  • [28] Hejun Wu, Ao Ding, Weiwei Liu, Lvzhou Li, and Zheng Yang. Triangle extension: Efficient localizability detection in wireless sensor networks. IEEE Transactions on Wireless Communications, 16(11):7419–7431, 2017.
  • [29] Senshan Ji, Kam-Fung Sze, Zirui Zhou, Anthony Man-Cho So, and Yinyu Ye. Beyond convex relaxation: A polynomial-time non-convex optimization approach to network localization. In Proceedings of 2013 IEEE INFOCOM, pages 2499–2507. IEEE, 2013.
  • [30] Anthony Man-Cho So and Yinyu Ye. Theory of semidefinite programming for sensor network localization. Mathematical Programming, 109(2-3):367–384, 2007.
  • [31] Rainer Kümmerle, Giorgio Grisetti, Hauke Strasdat, Kurt Konolige, and Wolfram Burgard. g2o: A general framework for graph optimization. In Proceedings of 2011 IEEE International Conference on Robotics and Automation (ICRA), pages 3607–3613. IEEE, 2011.
  • [32] Yongcai Wang, Tianyuan Sun, Guoyao Rao, and Deying Li. Formation tracking in sparse airborne networks. IEEE Journal on Selected Areas in Communications, 36(9):2000–2014, 2018.
  • [33] A. F. Mo¨bius\rm M\ddot{o}bius. Der barycentrische Calcul. Leipzig, 1827.
  • [34] Usman A Khan, Soummya Kar, Bruno Sinopoli, and José MF Moura. Distributed sensor localization in euclidean spaces: Dynamic environments. In Proceedings of the 46th Annual Allerton Conference on Communication, Control, and Computing, pages 361–366, 2008.
  • [35] Tolga Eren. Graph invariants for unique localizability in cooperative localization of wireless sensor networks: rigidity index and redundancy index. Ad Hoc Networks, 44:32–45, 2016.
  • [36] Yuan Zhang, Shutang Liu, Xiuyang Zhao, and Zhongtian Jia. Theoretic analysis of unique localization for wireless sensor networks. Ad Hoc Networks, 10(3):623–634, 2012.
  • [37] Gerard Laman. On graphs and rigidity of plane skeletal structures. Journal of Engineering mathematics, 4(4):331–340, 1970.
  • [38] John E Hopcroft and Robert Endre Tarjan. Dividing a graph into triconnected components. SIAM Journal on Computing, 2(3):135–158, 1973.
  • [39] GaryL Milkri. A new graph triconnectivity algorithm and its parallelization. 1988.
  • [40] James B Orlin. Max flows in o (nm) time, or better. In Proceedings of the 45th annual ACM symposium on Theory of computing, pages 765–774, 2013.
  • [41] Andrew V Goldberg and Robert E Tarjan. Efficient maximum flow algorithms. Communications of the ACM, 57(8):82–89, 2014.