International Journal of Applied Engineering Research ISSN 0973-4562 Volume 11, Number 8 (2016) pp 5714-5718 © Research India Publications. http://www.ripublication.com RF Based Node Location and Mobility Tracking in IoT J. Ann Roseela Research Scholar, ECE Department, Dr. M. G. R. Educational and Research Institute, Chennai, India Dr. S. Ravi Professor & Head, ECE Department, Dr. M. G. R. Educational and Research Institute, Chennai, India Dr. M. Anand Professor, ECE Department, Dr. M. G. R. Educational and Research Institute, Chennai, India network based methodology for node localization. The Received Signal Strength Indicator (RSSI) values of the anchor node beacons are used. The multi-layer Perceptron (MLP) neural network model was trained using Matlab. In order to evaluate the performance of the proposed method in real time, the model obtained was then implemented on the Arduino microcontroller. For obtaining the best neural network for localization, the BR training algorithm is evaluated to give the best result. However, it is recommended that the RSSI value of the localization beacon request signals received by the anchor nodes also be utilized that can result in a further reduction of the localization error (Shiu Kumar et al., (2016)). This paper presents an algorithm that uses connectivity information which node is within communications range of whom to derive the locations of the nodes in the network. The method can take advantage of additional information, such as estimated distances between neighbors or known positions for certain anchor nodes, if it is available. The algorithm is based on multidimensional scaling, a data analysis technique that takes O(n3) time for a network of n nodes (Yi Shang et al., (2003). This paper reviews different approaches of node localization discovery in wireless sensor networks. The overview of the schemes proposed by different scholars for the improvement of localization in wireless sensor networks is also presented Amitangshu Pal (2010). In this paper a fuzzy set-based localization method as an enhancement of the ring-overlapping scheme proposed to tackle the problem of RSS uncertainty. In the proposed method, first fuzzy membership function based on RSS measurements to generate fuzzysets of rings that constrain sensor node position with respect to each anchor is used. Then fuzzy set of regions by intersecting rings from different ring sets is generated Andrija S. Velimirovic et al., (2010). This paper proposes an APS that a distributed, hop by hop positioning algorithm, that works as an extension of both distance vector routing and GPS positioning in order to provide approximate position for all nodes in a network where only a limited fraction of nodes have self-positioning capability DragosNiculescu and BadriNath (2002). Abstract In this paper, a new method RF based IoT node localization and status is proposed. In this paper a robust mapping is done between the measured RSSI vector and the existing RSSI signature to minimize location estimation errors encouraged by the instability problem of RSSI node evaluations. The proposed system extends study on multicast networks in which the communication IoT nodes should be with in the RF server region of the network. In proposed method, the routing is performed peer to peer instead of a static network infrastructure to provide network connectivity. Objectives of this paper are reliable communication, cooperative network, expanding of network and shrinking of network. The study includes RSSI technique for locating the position of the Wi-Fi enabled nodes and determining the variation in the strength of the signal at individual nodes connected to an access point, as the number of nodes increases or decreases. Keywords: IoT nodes, RF server, RSSI, Node Loaction and Mobility. Introduction A IoT nodes are expected to provide mobility, flexibility, composed of active nodes, ease to distribute, low cost, less electric power consumption and also achieve the demanded throughput etc. In IoT nodes, localization identification is done by distance-dependent (DD) and distance independent (DI) algorithms. In DD, the position of the unknown IoT nodes is determined by using the distances between adjacent nodes. The distance is calculated from the average round trip time and measures the direction of arrival of signals. The distances for position estimation have the information to provide connectivity to other nodes and identification of neighboring nodes. The methods of localization using received signal strength indicator (RSSI) meets the coverage needs (without extra hardware requirement) by measuring the distances between nodes. Shiu Kumar et al., (2016). Related works In this paper, 2D localization algorithm for WSN by utilizing ANN is proposed. This paper adopted feed-forward neural 5714 International Journal of Applied Engineering Research ISSN 0973-4562 Volume 11, Number 8 (2016) pp 5714-5718 © Research India Publications. http://www.ripublication.com In this paper a radio frequency based system for locating and tracking users inside buildings is proposed ParamvirBahl and VenkataN. Padmanabhan (2000). This paper provides an overview of the measurement techniques in sensor network localization and the one-hop localization algorithms based on these measurements. A detailed investigation on multi-hop connectivity-based and distance-based localization algorithms are presented Guoqiang Mao et al., (2007). iii. Workflow for measuring signal strength is shown in figure 2. Proposed system In proposed system, ‘n’ numbers of nodes with RF transmitter are considered. RF server is connected with Laptop. Block diagram of proposed system is shown in figure 1. Figure 2: Work flow of proposed system OPTIMAL RESOURCE ALLOCATION Resource allotted to the IoT node at a specific time slot after tracking the IoT node state i. e., resources being allocated to the IoT node which has strongest signal strength. Portion of total resources across time and frequency (degree of the freedom of the channel) and sharing of resources across the users is possible through optimal resource allocation. Memory Allocation and Deallocation Place an IoT node on any point of the server region and move it along a block line to different point. Once the node is moved, it must remain on the point to which it is moved. Now place a second IoT node on any unoccupied point of server region, and move it in similar fashion to any other unoccupied point. Continue in this way until all the IoT nodes have been placed on points. This is shown in Figure 3. Figure 1: Proposed system MEASURING SIGNAL STRENGTH Signal strength measured by transmitted signal strength by each RF transmitter during mobilization of IoT nodes. RSSI based localization technique is attractive for a wide variety of applications, where the significant estimation error has negative effects related to signal propagation. RSSI is a common way to represent the signal energy in the local environment. The attenuation of radio signals during propagation is charecterized by RSSI. The distances between IoT nodes are calculated by measuring the signal attenuation in RSSI. Thus, RSSI is highly sensitive to the distances. The IoT nodes packet contain the RSSI information which if lost can affect the overall localization accuracy. The rapid increase of IoT node devices with Wi-Fi as preferred method of network access, predominantly indoor demands the location analysis method to have minimum mean square error (MSE) so as to realize unprecedented benefits from location-based services. This includes; i. Location analytics: The Number of IoT nodes enters to the network is estimated along with the amount of time spent and the frequency of their IoT node ii. Advanced analytics: Provides signature of movement patterns of the IoT nodes while available in the RF server area. A D F G C B H E Figure 3: Optimal memory allocations 5715 International Journal of Applied Engineering Research ISSN 0973-4562 Volume 11, Number 8 (2016) pp 5714-5718 © Research India Publications. http://www.ripublication.com Distance from RF Server Vs IoT node Generally the problem arises when IoT node going far away from the RF server, i. e., and signal strength become weak not able to achieve good communication due to interference. This typical situation is overcome by using successive interference cancellation method, which is shown in Table 1. The IoT nodes service with respect to the radio range of a RF server wireless link is limited with single access point. The solution to this issue is to add multiple RF server to the network and extend the range of mobility of a IoT node in the network. Table 1: Comparison of SIC Receiver with Conventional Receiver COMMUNICATION AMONG NODES Given a set V of IoT nodes, the authenticated IoT nodes are just a string of symbols from V. The communication is modeled as a graph , , where E is the set of edges between unreliable pairs of IoT nodes, i. e. IoT nodes which cause confusion during transmission. For analogy, in speech transmission, the pronunciation B and P are connected by an edge (since upon reception they are indistinguishable). G is called the confusion graph. Distance from IoT node signal Performance RF server strength Conventional Closer Stronger Accepted Far Weaker Unaccepted SIC Closer Stronger Accepted Far Stronger Accepted Type MAXIMIZING THE PROBABILITY OF LOCALIZING IoT NODE Let the number of localization with available probability points less than belong to elements of group2, while the others are elements of group1. Then, the objective is to maximize the probability of selecting elements of group1 in a mixture of points. For Ex: If the size of the elements of group1 and group2 are equal to N/2, then to maximize the probability of accessing a higher priority task the IoT nodes are grouped as shown in Figure. In this, one element of group1 is placed in access1 queue and other remaining elements of both group1& group2 are given to access 2 queue. Due to this, the probability of accessing a higher priority node is increased. Figure 5: IoT nodes arranged as a graph, with adjacent IoT nodes representing confusion IoT node If ‘ ’ represents the symbol and ‘ ’ represents the vertexes, then possible combinations include: and can be confused with • • and can be confused with , or • Can be confused and can be confused. The IoT nodes are represented by the adjacency matrix ‘A’ shown below; with value 1 indicates the adjacent nodes. 0 1 0 0 1 1 0 1 0 0 0 1 0 1 0 0 0 1 0 1 1 0 0 1 0 The communication among IoT nodes uses the minimum eigenvalue approach to distinguish the elements of the three sets v1, v2 and v3 where Figure 4: Allocating tasks to maximize access probability P (Choosing high priority task in direction-1) =1 P (Choosing high priority task from direction-2) = P (Choosing among direction-1 or direction-2) =1/2 1 1 2 1 2 1 2 1 / As an example, for N=20; equation (4. 1) = 9/38 14/19 The possible arrangement of IoT nodes includes (i) i. e. null and (ii) at any time can become malicious i. e. any of the nodes in and join the set v3. 3/4 In this work selection of optimal access points that identifies potential bandwidth in which aIoT node is likely to receive after affiliating with a particular access point’s area is done. 5716 International Journal of Applied Engineering Research ISSN 0973-4562 Volume 11, Number 8 (2016) pp 5714-5718 © Research India Publications. http://www.ripublication.com ALGORITHM FOR DATA TRANSFER AMONG FRIENDLY IoT NODES Data multicast from source and is open for reception to all IoT nodes. then forward packet to next nearest IoT l1: if (IoT node node) then stop forwarding) else goto l1; if (forwarded IoT node All the IoT nodes are movable with variable signal strength as it need not be connected to a single access point always, and this makes authentication between two ends challenging. NUMBER OF NODES PER (AP) ACCESS POINT The maximum number of IoT nodes an AP can support with uniform traffic load against different transmission speed in MAC protocol is determined. The throughput is measured against the number of IoTnodes and with the MAC protocol, it is observed that all generated data traffic reaches its destination and the medium is not saturated at the current load level. Figure 7 Figure 8 shows RF server state with IoT node is in the RF server region and it is in the active state. Hardware implementation Number of IoT nodes =8 Server = centralized Monitoring stateÆ C, U, A. CÆ Connected: IoT node is in the RF server, but it is not active UÆ Unconnected: IoT node is not in the RF server, it may be active or not active. AÆActive: IoT node is in the RF server, but it is active Connection details Initially RF Server connect with the PC by serial port communication. Connect key is used to enable the RF server to measure the receiving RF signal strength. Get status key is used to get monitoring state of various IoT nodes. Figure 8 Results Figure 6 shows the initial stage of RF server with zero IoTnode in the server region. Conclusion In this paper, proximity method and triangulation method used to estimate IoT node location. The performance of a mobile device under varying channel fading scenarios analyzed. RF Signal, power variations, outage probability for different channel fading scenarios are determined. References [1] [2] Figure 6 [3] Figure 7 shows the state of RF server with IoT node 4 in the RF server region. IoT node 4 is only in the connect state. 5717 Pal, "Localization algorithms in wireless sensor networks: current approaches and future challenges, " Network Protocols and Algorithms, vol. 2, pp. 45-74, 2010. S. Velimirovic, G. L. Djordjevic, M. M. Velimirovic, and M. D. Jovanovi´c, "A Fuzzy Set-Based Approach to Range-Free Localization in Wireless Sensor Networks, " FactaUniversitatis (NiˇS )Ser. : Elec. Energ., vol. 23, pp. 227-244, August. D. Niculescu and B. Nath, "DV Based Positioning in Ad hoc Networks, " Journal of Telecommunication Systems, vol. 1, 2003. International Journal of Applied Engineering Research ISSN 0973-4562 Volume 11, Number 8 (2016) pp 5714-5718 © Research India Publications. http://www.ripublication.com [4] [5] [6] [7] [8] [9] [10] [11] [12] G. Mao, B. Fidan, and B. D. O. Anderson, "Wireless sensor network localization techniques, " Computer Networks, vol. 51, pp. 2529-2553, 2007. Shiu Kumar, Ronesh Sharma and Edwin R. Vans, “Localization F or W ireless Se nsor Ne tworks: A Neural Network A pproach”, International Journal of Computer Networks & Communications (IJCNC) Vol. 8, No. 1, January 2016. Y. Shang, W. Ruml, Y. Zhang, and M. Fromherz, “Localization from mere connectivity”, In Proceedings of ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’03), June 2003, Annapolis, Maryland, USA, pp. http://dx. doi. org/201-212. 10. 1145/778415. 778439 ParamvirBahul and VenkataN. Padmanabhan, “RADAR: An In-Building RF-based User Location and Tracking System”, IEEE INFOCOM 2000. Ajay Chandra V. Gummalla and john o. Limb, “Wireless M edium Access C ontrol Protocols”, IEEE Communications Surveys, Second Quarter 2000. Christian Bettstetter, Giovanni Resta, and Paolo Santi, “The Node Distribution of the Random Waypoint Mobility Model for Wireless Ad Hoc Networks “, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 2, NO. 3, JULYSEPTEMBER 2003. Joshua Reich, Vishal Misra, Dan Rubenstein, and Gil Zussman, “Connectivity Maintenance in Mobile Wireless Networks via Constrained Mobility”, IEEE Journal On Selected Areas In Com munications, Vol. 30, no. 5, June 2012. Stavros Toumpisand Andrea J. Goldsmith, “Capacity Regions for Wireless Ad Hoc Networks”, IEEE Transactions On Wireless Communications, VOL. 2, No. 4, July 2003. Yongxing Wang, Gang Hua, YonggangXu and Hongsheng Yin, “Wireless PositioningAlgorithm Based on RSS in LimitedSpace”, International Journal of Signal Processing, Image Processing and Pattern Recognition Vol. 9, No. 1 (2016), pp. 335346. 5718