Abstract

Location-based service based on wireless cooperative localization networks is becoming ubiquitous nowadays. However, since the fact that most location network nodes are resource-limited, recent investigations focus on the proper network scheduling strategies that can significantly enhance the system performance, including but not limited to localization accuracy and energy efficiency. In addition to the current efficient nondata-aided strategies, we find that some silent nodes, called “eavesdroppers,” can be helpful to the localization task without transmitting any signals. In this paper, we first formulate the eavesdropping scheduling policy in practical asynchronous cooperative wireless localization networks. Then, we perform resource optimization in different eavesdropping-based strategies. Both two-slot and multislot strategies are considered, and three types of listening modes are designed from a practical point of view. Numeric results show that, for the scenario with a blocked propagation path, the localization error of networks with dedicated eavesdroppers is only 21% of the conventional networks. Besides, the system with eavesdropping anchors could improve the localization performance by 70%. The result could provide meaningful insights into the practical low-complexity location network deployment and development.

1. Introduction

As the Internet of Everything has become a hot spot in the development of science and technology, the demand for location information is also increasing. Traffic navigation, logistics tracking, indoor monitoring, environmental detection, hazard warning to search and rescue, all these location-based service (LBS) need the support of positioning technology [17]. In most complicated environments, where the open sky can not be guaranteed or more accurate location information is required, wireless network localization provides promising alternatives in addition to satellite navigation systems [8, 9].

In typical location-aware networks, the agent whose position remains unknown needs measurements with multiple predeployed anchors. Different measurements, including the time of arrival (TOA), received signal strength intensity, angle of arrival, and their combinations, are usually adopted [10, 11]. TOA-based ranging and localization provide high-accuracy solutions, but one implicit assumption in this measurement method is that all involved nodes are clock synchronized (high-accuracy ranging and localization requires the clock synchronization as nano-second level), which is challenging in practical wireless networks, especially when the number of network nodes is large [12]. Therefore, asynchronous TOA-based solutions, such as the round trip measurements (RTM) and time difference of arrival, are popular in such scenarios [13]. Generally, the asynchronous solutions may degrade in localization accuracy but achieve tradeoffs in system complexity.

Furthermore, ultra-wideband (UWB) technology has gained significant attention in the field of wireless cooperative localization networks [14, 15]. It can transmit low-power, short-duration pulses, which is well-suited for accurate positioning and ranging in wireless localization networks. The wide bandwidth allows for precise TOA measurements, which can further improves the accuracy of localization algorithms. UWB-based systems have shown promising results in various applications, such as indoor positioning, asset tracking, and wireless sensor networks (WSNs) [1618].

The accuracy of network localization is largely determined by the accuracy of range measurements and the network topology. Generally, we need to specify the topology of sensor network, and thus, the power for the transmitter needs to improve for a better localization performance, which increases the resource consumption and system complexity, especially for real-world cases (e.g., WSNs). In the face of resource and cost constraints, resource allocation optimization has proven to be an effective solution [19, 20]. In wireless positioning networks, system positioning resources are relatively limited because of hardware constraints. Thus, appropriate resource allocation schemes are required to benefit the service life of the system and increase the positioning accuracy of the system [21, 22]. Based on the background of wireless positioning networks, resources usually refer to power, bandwidth, spectrum, etc. [2326]. Furthermore, compared with the optimization of one specific resource, joint resource optimization can explore the potential of the localization system as much as possible with constrained resource consumption [27, 28].

In addition, the cooperation idea can also effectively improve the positioning accuracy under the above constraints. Considering that in ubiquitous LBS, when the scale of localization networks increases or the coverage becomes large, some specific agents cannot be detected with limited anchors (in a 2D scenario, a minimum of three anchors is required), especially in complicated environments with several obstacles. Currently, cooperative positioning has been widely used in various networks. Liu et al. [29] and Peng et al. [30] mentioned that cooperative positioning is a promising solution to the problem of vehicle high-precision positioning. In the study of Mendrzik and Bauch [9], researchers introduce a cooperative idea into indoor localization and propose the framework of position-constrained stochastic inference, which can reduce the requirements of agents. Salari et al. [31] proposed to realize cooperative positioning by means of moving anchors, which is verified to be suitable for large-scale WSNs.

However, communication requirements of cooperation increase the system complexity and energy consumption. In order to improve the above problems, a reasonable scheduling strategy is necessary. Considering that the existing allocation algorithms have been developed to optimize throughput and delay instead of navigation performance [32, 33], proposed a framework to construct a distributed optimization scheme for WSNs. In addition, existing researches also illustrate that when the scheduling scheme is adopted properly, some anchors can also realize localization task without transmitting any signals [3436].

In this study, we introduce eavesdroppers into a centralized (a server is assumed to be able to collect all parameters of the network) nondata-aided allocation scheme for asynchronous UWB-based cooperative sensor networks using RTMs. We consider different eavesdropping strategies and perform resource optimization to achieve a better localization accuracy in this proposed networks. Finally, we provide a simulation of bandwidth allocation for the system and propose a high-precision algorithm to solve the resource allocation problem. Our numerical results demonstrate the value of eavesdropping with the existence of blocked RTMs, which have better performance than conventional wireless localization networks. The main contribution of this article can be summarized as follows:(i)The ranging information intensity (RII) of the eavesdropping wireless localization network is derived to calculate the positioning error bound as the performance metric.(ii)Different eavesdropping strategies are introduced in the system to enhance the localization accuracy with the existence of blocked RTMs.(iii)Agents with eavesdropping functions are discussed to further allocate the power and bandwidth while optimizing the system performance in multitime slots.

2. System Model

2.1. Network Settings and Signal Models

In a conventional localization sensor network, anchor nodes are preposed with known positions while the locations of agents need estimating. Aiming at the practical issue, all network nodes are asynchronous in clocks, implying the ranges between any nodes are able to be obtained with the RTMs. All ranging information (RI) is forwarded to a server where the localization algorithms are carried out. In this work, the data to be processed is relatively small; we can assume that we use a different band or time to send the data back. Even though the data collection is an essential part of the centralized system, it is a secondary aspect beyond this study [37]. The state of anchors and agents can be represented by and separately. Meanwhile, the location of node is expressed as , .

The signal which is received by node and transmitted from node , experiencing a multipath propagation, is derived as follows (in this paper, we adopt the IEEE 802.15.4a CM1 channel model as the propagation environment [38], since it is a typical scenario for UWB ranging):where represents power at transmitter for node , means the range difference from node to node , is the transmitted signal with normalized power, represents the path loss factor for the correspond detection, the amplitude after normalization is represented by , the path delay is represented with , is the additive white Gaussian noise, and for the wireless link, there are totally multipath components. illustrate the measurement interval.

Because there exist clock offsets among the sensor nodes, we adopt the RTM to derive the distance information. As shown in Figure 1, the estimated RTM can be split into two time slots with two nodes. For the first slot, the observation is originated from agent , and then the anchor finishes the RTM with a replied signal in the second time slot. The distance from node to node can be derived by the following:

TOA estimated at anchor and is represented with and . In this case, the measured error is obeyed to Gaussian distribution, and the variance is as follows:where the and are the variance at time and , respectively.

2.2. Error Analysis for TOA-Based RTM

In our work, the clock offsets between different nodes are not considered for TOA-based RTMs. We can model the RTMs error as a Gaussian distribution for multipath environments [26]. The RII is used to analyze the localization performance, which is the inverse form of the Cramer–Rao lower bound (CRLB) for localization errors [39]. The RII between anchor and agent can be represented as follows:where represents the power of node used for the transmitting signal in the first time slot of RTM, and is the bandwidth occupied by the signal. represents the power of node during the second time slot for replied signal, while is the bandwidth occupied by the signal. It is noticeable that if the waveform of the signal is designed properly (e.g., sinc-shaped pulses) with a fixed carrier frequency, the effective bandwidth is able to be equivalent (or approximate) to the practical bandwidth of the signal [27]. The channel coefficient is decided by the properties of the channel. For instance, the overlap factor of transmit path, the normalized direct path (DP) signal amplitude, and the energy of the signal [19, 39]. For simplification and without loss of generality, is described as a positive constant to scale the derived RII.

2.3. Position Error Bound

According to Shen et al. [40], the squared position error bound (SPEB), derived from the CRLB, is calculated based on the equivalent Fisher information matrix (EFIM). The SPEB of node can be defined as follows:where means the estimated position of , represents the EFIM of node ’s position from observation.

The EFIM of agents for a WSN are able to be represented by a 2 matrix. In EFIM, the element is as follows:

In Equation (6), and represent the RI of agent , which is observed from all the anchors and the agent separately. They can be expressed by the following:where illustrates the angular information between anchor and agent . The fundamental limits of localization performance are determined by SPEB, and thus, it is utilized as the performance metric in our work.

3. Eavesdropping Strategies Based on the Proposed Scheduling Framework

In this part, we introduced the eavesdropper to the network. If the localization strategy is appropriately adopted, some specific nodes in the sensor network do not need to transmit signals. Those eavesdroppers only need to “listening” the interaction of other nodes, and the system performance can be optimized, which is called eavesdropping. Thus, we build the scheduling policy for two scenarios as follows.

We proposed two eavesdropping strategies for wireless cooperative localization networks. The first strategy involves the use of a dedicated eavesdropper, as shown in Figure 2, which is a node with a known position that does not transmit signals but instead listens to the interaction of other nodes. The second strategy involves the use of eavesdropping anchors, where some or all anchors are equipped with listening capabilities and can overhear the information exchange between other nodes, as shown in Figure 3. Both strategies aim to improve system performance by optimizing resource allocation and scheduling.

3.1. Scheduling with the Dedicated Eavesdropper

As shown in Figure 2, a sensor network with three nodes is presented, where node is the agent, is the anchor, and represents the dedicated eavesdropper. Figure 4 illustrates a conventional scheduling strategy. According to Equation (2), three RTMs of TOA are performed by the anchor and agent to estimate the distance . Meanwhile, the eavesdropper does not send any signals during the RTMs processing, but it can receive the signals from other nodes. With the scheduling strategy illustrated in Figure 5, the signals can be collected to node . Thus, the time difference is as follows:and the estimation of could be derived by the following:

For the observed RI at the eavesdropper, there exist cumulative errors, as shown in Figure 4. The error for obtained at the eavesdropper can be affected by the transmitted signal from agent at different times, like , , and . Therefore, the estimate at time is as follows:where , , and are used to indicate the measurement errors. The variance for at eavesdropper is as follows:whereMeanwhile, the signals from anchors can be heard by eavesdroppers as well, i.e.,The corresponding variance is as follows:where

It is noticeable that the network is assumed to be processed in a centralized manner. Observed range estimation needs to be transmitted to the center processor and then improve the network performance. Based on the definition, the RII of all estimations are able to be acquired in Equations (19) and (20).

Remark 1. Although the eavesdropper can realize distance estimation with no need for transmit power, it still needs twice estimates as much as RTMs (four versus two). Therefore, it can be deduced that the result of eavesdropping is less “reliable” than RTM, and the ranging accuracy is still mainly determined by RTMs. But on the other hand, for scenes with constrained energy and resources, eavesdroppers could be valuable.

The scene in Figure 4 is extended to a multinode scene here. One significant challenge here is that, because of the existence of multiple anchors and agents, the eavesdropper can hardly pair the received signal correctly. According to Song et al. [36], a frequency division multiplexing (FDM) method is applied in this scene, as shown in Figure 5, and thus the received signals can be recognized with their frequency bands. The strategy can be concluded as follows:(i)Initialization: With a point-to-point manner, RTMs are initialized at all the nodes, while the frequency bands are preallocated [35]. The procedure is happened in the first time slot.(ii)Replication: In the second time slot, the signals are replied from the anchors with FDM method to realize TOA-based RTM.(iii)Eavesdropping: In the third and fourth time slot, the signals transmitted from other nodes are overheard by the eavesdropper, and one measurement consists of four time slots. This measurement will not stop until the system is turned off.

3.2. Scheduling Strategy with Eavesdropping Anchors

In this part, we present another eavesdropping method according to the allocation framework in Figure 5. As shown in Figure 3, there is a simple distribution of nodes in a location network, where represents the range difference from agent to anchor , which can be gotten from an RTM. represents the distance between anchor and eavesdropper . Here, we assume that the eavesdropper is an anchor whose location is known. Therefore, we can derive .

Based on the scheduling strategy with eavesdropping anchors in Figure 6, node can receive all the RI from agent and anchor . So we can see that,by which an estimate of can be obtained by the following:where

According to Section 3.1, we can calculate the variance as follows:

It is noticeable that for all the eavesdroppers, there exists cumulative error from localization signals, and the variance of can be calculated similarly to Equation (11). According to the formula, we can see that the eavesdropper could obtain the RI between agent and itself by eavesdropping the RTM signals of agent and anchor . If some anchors turn to eavesdroppers, the ranging performance of the whole system will be optimized. Based on the definition, Equation (28) can derive the RII for all the estimations.

4. Resource Allocation and Optimization Algorithms

Our work mainly includes two aspects. In the first step, we present a new network scheduling strategy, i.e., we build a rule about how the whole network works. Based on the presented strategy, the value of an eavesdropper is more like a dedicated “listener” or specific anchor. Then, in the second step, when the resources, including power and bandwidth, are subject to constraints, we perform resource optimization using a Taylor expension-based high-accuracy approximate algorithm. With relatively few times of iteration, the nonconvex question can be approximated to a linear problem.

4.1. Dedicated Eavesdropper Cases

A dedicated eavesdropper is a node that has a known position but can not send signals, i.e., it does not occupy system resources. Since the RII is determined by the transmitted energy and frequency bandwidth, we set the objective function based on the global SPEB. By optimizing the joint power and bandwidth allocation of all the nodes, the objective function could be minimized. The total power limit of agents and anchors is limited, while the individual power limit is also given. The optimization problems can be presented as follows:where is the number of agents and is the number of anchors, , , . and are the transmit power and bandwidth from agent to anchor at the odd time slots, and are the transmit power and bandwidth from agent to cooperative agent at the odd time slots. Similarly, and are the transmit power and bandwidth from anchor to agent at even time slots, and are the transmit power and bandwidth from cooperative agent to agent at even time slots, respectively. and are the power and bandwidth limits for each node, while and are the whole power bound for all the agents and anchors, respectively. in Equation (29) is obtained from both RTMs and eavesdropping, i.e.,

We can see from Equation (35) that the RI can be obtained from two aspects. We could obtain it according to perform RTMs with anchors, i.e., . At the same time, the eavesdropper can also obtain the location information, i.e., , which include the information “listening” from anchor and agent. Note that when there is no eavesdropper, will become zero, and the location system will transfer to the conventional RTMs.

In Equation (29) of , the aim is to minimize the SPEB of all nodes by adopting proper allocation methods. The constraints in Equation (31) limit the maximum power given to each node, while Equations (31) and (32) present the power limits for the whole network respectively for a time measurement. Besides, the bandwidth limitation is given in Equations (33) and (34) to avoid interference in even and odd time slots separately.

4.2. Eavesdropping Anchors

Consider another strategy of eavesdropping in the scheduling framework based on Figure 6. i.e., dedicated eavesdroppers are no longer added to the wireless positioning network, but some or all anchors are provided with “listening” function. While the “anchor” joins in RTM, it can also listen to the information exchange between other nodes. Based on the eavesdropping scheduling policy of the anchor with the eavesdropping ability, the optimization problem in could be rewritten as .where and are the bandwidth form agent k to anchor j for RTM and eavesdropping, respectively, and is the bandwidth of corresponding agent–anchor pair. It is noticeable that, because of the use of half-duplex transceivers in practical cases, only different band signals can be received at the eavesdroppers. Thus, Equation (38) is presented here. Obviously, if anchors do not have the ability to eavesdrop, will be zero. in Equation (36) can be acquired from both RTMs and eavesdropping, i.e.,

4.3. Anchor Eavesdropping with Power Consuming

The anchor with the eavesdropping function mentioned above does not generate power consumption while “listening,” but in the actual situation, once the node is in the open mode, it generates power consumption; that is, the anchor has the following three modes, including sleep, eavesdropping, and distance measurement. In sleep mode, no power consumption is generated, while under the function of eavesdropping, the node wakes up and thus has a fixed power consumption. By considering the above conditions, limiting the sum of total power, the can be modified as follows:where and are the power for agent k to anchor j, for RTM and eavesdropping respectively, while is the power of corresponding agent. in Equation (40) is as follows:where parameter indicates whether to enable the anchor node. Since we consider the power consumption of eavesdroppers, constraint Equation (42) is added to limit the peak transmit power.

Note that , , and are non-convex due to the form of RII. Thus, we need to introduce an approximate method to solve this problem. First-order Taylor expansion can be adopted to a certain point of . According to Zhang et al. [41], the RII can be derived as follows:combined with the trust region constraintwhere represents all parameters to be optimized. is the index of iteration. is radius of the trust regions at iteration.

5. Numerical Results

In this section, we discuss the simulated results of the scheduling problems based on the former methods. It is assumed that all nodes power are normalized, which means , while the bandwidth limit of one individual time slot is also . A square area is covered by the wireless localization network, which contains agents and anchors. The IEEE 802.15.4a CM1 channel model is adopted here to derive the channel coefficient. The probability of shadowing between two nodes is set to 0.5. All scheduling problems are solved by the standard solver package CVX [42].

5.1. Multislot Scheduling

In order to eavesdrop more information, the RTM can be extended in multislot. In the case of two complete RTMs, two, three, and four time slots are simulated separately. We enable the three anchors to overhear signals. In order to verify the generality of the experimental conclusions, a single agent is randomly generated multiple times in a square region, wherein the positioning network accuracy varies with the number of time slots, as shown in Table 1. indicates the number of time slots.

Table 1 leads us to the conclusion that (i) as the number of time slots increases, the system-squared positioning error bound tends to decrease. Since the bandwidth resources are reallocated every time slot, the accuracy of the positioning network increases as the number of time slots increases. (ii) Also, it can be seen that, with the increasing of the number of time slots, the improving trend of the positioning accuracy of the position system is not obvious, since the system error reduction is only about 0.02 . When the number of positioning slots increases to 3, the system positioning error is reduced by 31.94%, and when the number of positioning slots increases to 4, the system positioning error is only reduced by 13.27%; the reduction ratio shows a significant downward trend.

In order to explain this phenomenon, the number of system positioning time slots is set to 4, and multiple experimental data are counted. The average power distribution of each time slot is shown in Table 2, where indicates the serial number of time slot. The following conclusions can be drawn as follows:

(i)It can be seen that the power is mainly divided into the first time slot, and the power allocated by the remaining three time slots is less than 0.1, i.e., the power allocation has obvious sparsity.(ii)As the time slot increases, the positioning error is also cumulative, so the power distribution does not appear in a uniformly distributed form.(iii)Since the accuracy of the positioning network, with the increase of the number of positioning slots, does not greatly improve, the detection based on three time slots or more is of little significance.

5.2. Performance Analysis of Introducing Dedicated Eavesdroppers

In order to analyze the impact of the introduction of dedicated eavesdroppers on the performance of the wireless positioning network, the distribution of nodes in the positioning network is shown in Figure 7, and the distribution of the anchors is approximated by a straight line. Based on the dual-slot scheduling strategy, the simulation result is given (as shown in Figure 8), the abscissa is used to measure the network positioning accuracy, and the ordinate is the cumulative probability distribution. Figure 8 illustrates the following:(i)The introduction of the dedicated eavesdropper can ensure that the 95% probability system positioning error is lower than 0.11 , and the pure RTM can only ensure that the system positioning error is lower than 0.52 .(ii)When the system resources are the same, the positioning accuracy of a wireless positioning network with a dedicated eavesdropper is significantly better than that of the pure RTM.(iii)When the distribution of anchors in the network is unreasonable, and the agent is difficult to locate, the dedicated eavesdropper can be broadcasted to assist the ranging. Because it consumes less power and can provide a better measurement angle to assist distance measurement.

Furthermore, a special case is presented here. As shown in Figure 9, there are three anchors, one agent, and one eavesdropper posed inside the area. The shadowing effects between anchors and agents are presented. To simplify, the shadowing probability is 0.5, while the power attenuation varies from 0–20 dB. The SIMULATED results are shown in Figure 10. We can see the following:(i)With a low-shadowing effect, the position of the agent is primarily determined by the distance estimation of the two nearby anchors. Eavesdroppers have a relatively lower influence.(ii)With the attenuation of signal attenuation increasing (larger than 15 dB in the investigated cases), the results of eavesdroppers tend to be valuable.(iii)Similar to Remark1, the localization performance is mainly determined by RTM results. However, if the DP signal cannot be received, eavesdroppers are helpful to increase ranging accuracy.

5.3. Performance Analysis of Eavesdropping Anchors

This section mainly considers the scene where the anchor has the eavesdropping function. It should be noted that since the half-duplex signal transmission method is usually adopted in practice, the anchor equipped with an eavesdropping function must use different frequency bands to transmit or receive signals at the same time. The distribution of network nodes is shown in Figure 11, that is, six fixed position anchors and three random agents. All simulations performed two complete RTMs, and the total power and bandwidth resources in the wireless positioning network are the same. Figure 12 shows a comparison between the positioning accuracy of the anchor with the an eavesdropping function and the positioning accuracy of pure RTM.

As is demonstrated in Figure 12, the network localization accuracy achieved by the eavesdropping anchors is generally better than the traditional RTM-based system. It can be seen that when the anchor has eavesdropping function, the square error of the positioning network is 95% <7.6 , and RTM can only guarantee that 95% probability square error is <20 .

According to Equations (34) and (38), the total bandwidth available is fixed. So, it will be a tradeoff whether the anchors perform eavesdropping or not. Under the defined wireless position network, a bandwidth indicator for eavesdropping () is defined as follows:which indicates the ratio of bandwidth that the anchor allocates for eavesdropping.

As shown in Figure 13, the conclusions can be drawn as follows:(i)Observing the intersection of the image and the vertical axis, it can be seen that the positioning network will enable the eavesdropping function with the probability exceeding 70%.(ii)Then, by making an auxiliary line parallel to the horizontal axis, it can be seen that the anchor has a probability of 62% that it will use 50% of the total system bandwidth for eavesdropping.(iii)When the anchor is equipped with the eavesdropping function, the idle bandwidth can be used to listen to signals sent by surrounding nodes to obtain positioning information. Because the eavesdropping consumes less power and the eavesdropper does not send a signal to interfere the surroundings. The result of the system optimization is that more than half of the bandwidth is allocated for eavesdropping in most cases. Thus, eavesdropping anchors can provide highly energy-efficient ranging results.

6. Conclusion

In this paper, based on the nondata-aided scheduling strategy, we show that eavesdropper is helpful in asynchronous localization networks. Firstly, we present an eavesdropping scheduling policy. Then, a resource optimization scheme based on the scheduling strategy is performed, and a high-accuracy algorithm is proposed to solve the resource allocation problem. According to the numerical results, we can see the following:(i)Eavesdropping could improve the system performance without extra transmitting signals, which is valuable in energy-constraint scenarios. For the scenario with block RTMs, the localization error with dedicated eavesdroppers is only 21% of the conventional networks. Besides, the system with eavesdropping anchors could improve the localization performance than 70%.(ii)Appropriate resource allocation is essential for the system’s performance when the total resources are limited.(iii)The localization task is mainly based on the traditional RTMs. However, when the network is poorly deployed or the signals are severely attenuated, eavesdropping is a reliable substitute to increase ranging performance. These proposed strategies and numerical results may be helpful for practical LBS system design.

Although our strategies could improve the performance of wireless cooperative localization networks through the use of eavesdropping and resource optimization, there are still many avenues for future research in this area. For example, further investigation could be conducted to determine the impact of these approaches on dense networks operating under global resource limitations. Additionally, new algorithms and techniques could be developed to improve the efficiency and accuracy of eavesdropping and resource allocation or to address challenges such as severe obstacles blocking the anchors. By building on the current work and extending it in new and innovative ways, we can further improve their performance in real-world scenarios.

Data Availability

The data used to support the findings of this study are included within the article.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This paper was supported by the Natural Science Foundation of China (NSFC) under Grant Nos. 62171160, 91638204, and 61101124, the Natural Science Foundation of Shenzhen under Grant No. JCYJ20160531192013063, The Domestic Joint Postgraduate Training Project (LHPY-2021005), the Scientific Research Project in School-Level (SZIIT2019KJ026), the Fundamental Research Funds for the Central Universities under Grant No. HIT.OCEF.2022055, and the Shenzhen Science and Technology Program under Grant Nos. JCYJ20190806143212658 and ZDSYS20210623091808025, and also a major project of PCL.