distributed projection-based algorithms for source...

12
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 6, JUNE 2015 3131 Distributed Projection-Based Algorithms for Source Localization in Wireless Sensor Networks Yanqiong Zhang, Youcheng Lou, Yiguang Hong, Senior Member, IEEE, and Lihua Xie, Fellow, IEEE Abstract—In this paper, we investigate source localization for wireless sensor networks based on received signal strength. We first formulate the localization problem as the intersection compu- tation of a group of sensing rings, and then convert this non-convex problem into two weighted convex optimization problems. We next propose a unified distributed alternating projection algorithm to solve the resulting weighted optimization problems, where sensor nodes can communicate only locally with their neighbors over a time-varying jointly-connected topology. We also show that sensor nodes’ estimates can achieve consensus on a possible minimizer. Both theoretical analysis and some comparative simulations reveal that the proposed approach has good estimation performance in both the consistent and inconsistent cases. Index Terms—Source localization, wireless sensor networks, distributed algorithms, intersection computation, constrained con- vex optimization. I. I NTRODUCTION I N wireless sensor networks, how to locate source nodes is one of the fundamental tasks due to the importance of posi- tion information for the network. In recent years, some types of measurement approaches to source localization, including time difference of arrival, angle of arrival and received signal strength, and energy measurement-based approaches have been proposed for wireless sensor networks (WSNs) [1]–[8]. Some classical estimation approaches such as maximum likelihood estimation (MLE) [3] and nonlinear least squares (NLS) [9] estimation derived for the source localization problem are often very complex and maybe trapped by a local optimum, and therefore, numerous suboptimal techniques have been proposed to reduce the complexity in solving the MLE or NLS problems, such as convex relaxation methods [6], [27]–[32]. Manuscript received March 14, 2014; revised September 2, 2014, January 14, 2015, and February 5, 2015; accepted February 6, 2015. Date of publi- cation February 11, 2015; date of current version June 6, 2015. This work was supported partially by the NNSF of China under Grant 61333001, 973 Program under Grant 2014CB845301/2/3, and National Research Founda- tion of Singapore under Grant NRF-CRP8-2011-03, NRF2011NRF-CRP001- 090, NRF2013EWT-EIRP004-012, NSFC 61120106011. The associate editor coordinating the review of this paper and approving it for publication was A. Giorgetti. Y. Zhang and Y. Hong are with the Key Laboratory of Systems and Control, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing 100190, China (e-mail: [email protected]; [email protected]). Y. Lou is with the National Center for Mathematics and Interdisciplinary Sciences, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing 100190, China (e-mail: [email protected]). L. Xie is with the School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore 639798 (e-mail: [email protected]). Color versions of one or more of the figures in this paper are available online at http://ieeexplore.ieee.org. Digital Object Identifier 10.1109/TWC.2015.2402672 Source localization algorithms can be categorized into two classes from an implementation point of view: centralized and distributed algorithms. In [10], [11], projection-based methods were studied for source localization, which are usually cen- tralized and implemented in a sequential or parallel manner without rigorous analysis. The main disadvantage of central- ized methods is that they require a central unit to gather and process the measurements from the sensor nodes. To overcome this disadvantage, some distributed algorithms were developed, where local communications between neighboring nodes are realized by wireless transmissions. For example, a distributed implementation of the incremental gradient algorithm was proposed to solve the nonlinear least-squares problem in [5], and a weighted direct least-squares formulation was reported in [9] for a tradeoff between performance and computational complexity, while a distributed asynchronous algorithm was proposed to deal with the maximum likelihood convex relax- ation in [32]. A fully distributed projection-based approach was also de- veloped for the source localization in [12], where the problem was formulated as a convex feasibility problem or convex intersection problem (CIP), and both the consistent and incon- sistent cases were discussed. In fact, distributed optimization to achieve a global optimal objective by local optimization and local information exchange mechanism has received consider- able attention [15]–[18], and CIP has also been widely stud- ied in distributed optimization literature. Various distributed projection-based algorithms for CIP were proposed over the past decade [13]–[15], [19], [20]. Clearly, communications among sensor nodes play an im- portant role in the implementation of distributed algorithms. The communication topology of a sensor network may be time- varying because of environmental influence, or link failure, or energy saving. A well-known concept to describe the time- varying connectivity is called uniform joint-strong-connected (UJSC), which has been widely used in the multi-agent lit- erature [16], [17], [20] to demonstrate that their proposed algorithms are robust to the variable communication topology. Here we give a formulation by treating the source local- ization problem as an intersection computation problem of a group of sensing rings in two different localization cases: the consistent case (when the intersection of the rings is nonempty) and the inconsistent case (when the intersection is empty). Note that the ring intersection computation is a non-convex con- strained optimization problem, whose exact optimal solution is very hard to find. Obviously, the convex problem under fixed topologies discussed in [12] is a very special case of our non- convex problem under switching communication topologies. 1536-1276 © 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

Upload: others

Post on 16-Sep-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Distributed Projection-Based Algorithms for Source ...lsc.amss.ac.cn/~yghong/papers/TWC2015distributed.pdfIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 6,JUNE 2015 3131

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 6, JUNE 2015 3131

Distributed Projection-Based Algorithms for SourceLocalization in Wireless Sensor Networks

Yanqiong Zhang, Youcheng Lou, Yiguang Hong, Senior Member, IEEE, and Lihua Xie, Fellow, IEEE

Abstract—In this paper, we investigate source localization forwireless sensor networks based on received signal strength. Wefirst formulate the localization problem as the intersection compu-tation of a group of sensing rings, and then convert this non-convexproblem into two weighted convex optimization problems. We nextpropose a unified distributed alternating projection algorithm tosolve the resulting weighted optimization problems, where sensornodes can communicate only locally with their neighbors over atime-varying jointly-connected topology. We also show that sensornodes’ estimates can achieve consensus on a possible minimizer.Both theoretical analysis and some comparative simulations revealthat the proposed approach has good estimation performance inboth the consistent and inconsistent cases.

Index Terms—Source localization, wireless sensor networks,distributed algorithms, intersection computation, constrained con-vex optimization.

I. INTRODUCTION

IN wireless sensor networks, how to locate source nodes isone of the fundamental tasks due to the importance of posi-

tion information for the network. In recent years, some typesof measurement approaches to source localization, includingtime difference of arrival, angle of arrival and received signalstrength, and energy measurement-based approaches have beenproposed for wireless sensor networks (WSNs) [1]–[8]. Someclassical estimation approaches such as maximum likelihoodestimation (MLE) [3] and nonlinear least squares (NLS) [9]estimation derived for the source localization problem are oftenvery complex and maybe trapped by a local optimum, andtherefore, numerous suboptimal techniques have been proposedto reduce the complexity in solving the MLE or NLS problems,such as convex relaxation methods [6], [27]–[32].

Manuscript received March 14, 2014; revised September 2, 2014, January14, 2015, and February 5, 2015; accepted February 6, 2015. Date of publi-cation February 11, 2015; date of current version June 6, 2015. This workwas supported partially by the NNSF of China under Grant 61333001, 973Program under Grant 2014CB845301/2/3, and National Research Founda-tion of Singapore under Grant NRF-CRP8-2011-03, NRF2011NRF-CRP001-090, NRF2013EWT-EIRP004-012, NSFC 61120106011. The associate editorcoordinating the review of this paper and approving it for publication wasA. Giorgetti.

Y. Zhang and Y. Hong are with the Key Laboratory of Systems and Control,Academy of Mathematics and Systems Science, Chinese Academy of Sciences,Beijing 100190, China (e-mail: [email protected]; [email protected]).

Y. Lou is with the National Center for Mathematics and InterdisciplinarySciences, Academy of Mathematics and Systems Science, Chinese Academyof Sciences, Beijing 100190, China (e-mail: [email protected]).

L. Xie is with the School of Electrical and Electronic Engineering, NanyangTechnological University, Singapore 639798 (e-mail: [email protected]).

Color versions of one or more of the figures in this paper are available onlineat http://ieeexplore.ieee.org.

Digital Object Identifier 10.1109/TWC.2015.2402672

Source localization algorithms can be categorized into twoclasses from an implementation point of view: centralized anddistributed algorithms. In [10], [11], projection-based methodswere studied for source localization, which are usually cen-tralized and implemented in a sequential or parallel mannerwithout rigorous analysis. The main disadvantage of central-ized methods is that they require a central unit to gather andprocess the measurements from the sensor nodes. To overcomethis disadvantage, some distributed algorithms were developed,where local communications between neighboring nodes arerealized by wireless transmissions. For example, a distributedimplementation of the incremental gradient algorithm wasproposed to solve the nonlinear least-squares problem in [5],and a weighted direct least-squares formulation was reportedin [9] for a tradeoff between performance and computationalcomplexity, while a distributed asynchronous algorithm wasproposed to deal with the maximum likelihood convex relax-ation in [32].

A fully distributed projection-based approach was also de-veloped for the source localization in [12], where the problemwas formulated as a convex feasibility problem or convexintersection problem (CIP), and both the consistent and incon-sistent cases were discussed. In fact, distributed optimizationto achieve a global optimal objective by local optimization andlocal information exchange mechanism has received consider-able attention [15]–[18], and CIP has also been widely stud-ied in distributed optimization literature. Various distributedprojection-based algorithms for CIP were proposed over thepast decade [13]–[15], [19], [20].

Clearly, communications among sensor nodes play an im-portant role in the implementation of distributed algorithms.The communication topology of a sensor network may be time-varying because of environmental influence, or link failure, orenergy saving. A well-known concept to describe the time-varying connectivity is called uniform joint-strong-connected(UJSC), which has been widely used in the multi-agent lit-erature [16], [17], [20] to demonstrate that their proposedalgorithms are robust to the variable communication topology.

Here we give a formulation by treating the source local-ization problem as an intersection computation problem of agroup of sensing rings in two different localization cases: theconsistent case (when the intersection of the rings is nonempty)and the inconsistent case (when the intersection is empty). Notethat the ring intersection computation is a non-convex con-strained optimization problem, whose exact optimal solution isvery hard to find. Obviously, the convex problem under fixedtopologies discussed in [12] is a very special case of our non-convex problem under switching communication topologies.

1536-1276 © 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

Page 2: Distributed Projection-Based Algorithms for Source ...lsc.amss.ac.cn/~yghong/papers/TWC2015distributed.pdfIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 6,JUNE 2015 3131

3132 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 6, JUNE 2015

In the literature, some convex relaxation methods, based onsemidefinite programming [27], [28], second order cone pro-gramming [6], [29], sum of squares [30] and Lagrangian dual[22], [23], have been proposed to overcome the difficultycaused by the non-convexity. However, their results can notbe applied directly to our problem because, in our problemsetup: (i) each sensor can only observe its own sensing ringand share its source localization estimate with its neighbors,without knowing the information of any other sensing rings;(ii) the communication topology defining the neighbor rela-tionship is time-varying and may not be connected at eachmoment. To solve the problem, we take a convex approximationtechnique to get a suboptimal estimation. By converting thenon-convex problem into a weighted unconstrained convexproblem in the inconsistent case and a weighted constrainedconvex problem in the consistent case, we further propose aunified distributed projection-based algorithm and prove itsoptimal convergence in these two cases. Notice that the con-vergence analysis for our problem is much more difficult thanthat in [12], because we have to handle a constrained convexoptimization in a distributed way, rather than the unconstrainedoptimization, especially when each agent only knows its ownconstraint set (sensing ring). Moreover, we have to guaranteethe convergence under some weaker connectivity conditions,compared with either the same constraint set case or uniformweight assumptions in [16].

This paper is organized as follows. In Section II, we providea new formulation for the source localization problem alongwith basic concepts. In Section III, we present an alternatingprojection algorithm with some preliminary results. Then inSections IV we give the main results and convergence analysisfor both the consistent and inconsistent cases under switchinginteraction topologies. Following that, we carry out simulationstudies to verify our theoretical results in Section V. Finally, wegive concluding remarks in Section VI.

II. PROBLEM FORMULATION

In this section, we give a formulation for source localizationbased on intersection computation.

Consider a network composed of n (wireless) sensors thatcan only interact with each other through local time-varyingcommunications in the sensor field denoted by S ⊆ R

2. Theproblem of interest is to determine the location of an activeacoustic source in this sensor network.

A. Topology of Sensor Network

Here we consider the time-varying communication topologyfor the investigated sensor network.

At first, we review some useful concepts related to graphtheory [24]. A directed graph is a pair G = (V, E), where V ={1, 2, · · · , n} is the node set, and E ⊆ V × V the edge set. Inthe paper, we regard sensor i as node i. Node i is a neighborof j if (i, j) ∈ E . Let Ni be the set of neighbors of node i. Apath of length r from a node i1 to a node ir+1 is a sequenceof r + 1 distinct nodes i1, · · · , ir+1 such that (iq, iq+1) ∈ E forq = 1, · · · , r. If there is a path between any two nodes i, j ∈ V ,then G is said to be strongly connected.

However, the communication topologies over sensor net-works may be time-varying in practice due to link failure orenergy saving. As usual, the topology can be described by atime-varying directed graph Gk = (V, E(k)) with k ≥ 0, whereE(k) represents the set of communication links at time k. Forany two sensors i, j ∈ V , j can get the information from iat time k if and only if (i, j) ∈ E(k). Denote Ni(k) = {j ∈V|(j, i) ∈ E(k)}, and we assume i ∈ Ni in this paper. Letaij(k) represent the weight of arc (j, i) at time k, aij(k) > 0if (j, i) ∈ E(k); aij(k) = 0 otherwise. A(k) = [aij(k)] is thecorresponding weighted adjacency matrix.

The following two assumptions on the graphs for sensor net-works are widely used in the distributed optimization literature[15], [16], [20].

Assumption 1: (Weight Rule) There exists a scalar η with0 < η < 1 such that aij(k) ≥ η if aij(k) > 0 for i, j ∈ V andk ≥ 0. Moreover,

∑ni=1 ais(k) =

∑nj=1 asj(k) = 1 for s ∈ V .

Assumption 2: (Connectivity) The communication graph isuniformly jointly strongly connected (UJSC), i.e., there is aninteger T > 0 such that the directed graph (V,∪T

t=1E(k + t))is strongly connected for any k ≥ 0.

Remark 2.1: Assumption 1 has been widely used in the dis-tributed optimization literature, and in the bidirectional graphcase (that is, (i, j) ∈ E(k) if and only if (j, i) ∈ E(k)), it can beeasily satisfied by adopting Metropolis weight rule [34]:

aij(k)=

⎧⎨⎩

1/ (max {|Ni(k)| , |Nj(k)|}+ 1) , (i, j) ∈ E(k);1−

∑p �=i aip(k), j = i;

0, otherwise.

In the directed graph case, we can also obtain an adjacencymatrix to satisfy Assumption 1 starting from an arbitrary ad-jacency matrix using some algorithms such as the distributedimbalance-correcting algorithm [35].

Denote Φ(k, s) = A(k)A(k − 1) · · ·A(s) for k ≥ s ≥ 0.Then we review some convergence results of transition matrixΦ(k, s) in [15].

Lemma 2.2: Suppose Assumptions 1 and 2 hold. Then∣∣∣∣[Φ(k, s)]ij − 1

n

∣∣∣∣ ≤ λγk−s

with [Φ(k, s)]ij the ij-th entry of transition matrix Φ(k, s) fori, j ∈ {1, · · · , n}, and k ≥ s ≥ 0, λ = 2(1 + η(1−n)T )/(1−η(n−1)T ) and γ = (1− η(n−1)T )1/((n−1)T ).

B. Sensing Area

We now discuss the sensing area of each sensor to locate asource. We start with some preliminaries about convex analysis[26]. A set K ⊆ R

m is convex if ax+ (1− a)y ∈ K for anyx, y ∈ K and 0 ≤ a ≤ 1. For any x ∈ R

m, there is a unique ele-ment PK(x) ∈ K satisfying ‖x− PK(x)‖ = infy∈K ‖x− y‖,which is denoted by |x|K , where K ⊆ R

m is a nonempty closedconvex set and PK denotes the projection operator onto K.Denote |x|K = 0 for any x if K = ∅, for convenience. A func-tion f(·) : Rm → R is said to be convex if f(ax+ (1− a)y) ≤af(x) + (1− a)f(y) for any x, y ∈ R

m and 0 ≤ a ≤ 1. Let

Page 3: Distributed Projection-Based Algorithms for Source ...lsc.amss.ac.cn/~yghong/papers/TWC2015distributed.pdfIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 6,JUNE 2015 3131

ZHANG et al.: DISTRIBUTED PROJECTION-BASED ALGORITHMS FOR SOURCE LOCALIZATION IN WSNs 3133

f(·) : Rm → R be a convex function, vector ζ ∈ Rm is a

subgradient of f at y ∈ Rm if

f(x)− f(y) ≥ ζT (x− y), ∀ x ∈ Rm, (1)

where ζT denotes the transpose of vector ζ. The following aresome useful results [16], [21] on the properties of projectionoperator which are instrumental for the analysis later.

Lemma 2.3: Let K be a closed convex set in Rm. Then

(i) ‖PK(x)− y‖2 ≤ ‖x− y‖2 − ‖PK(x)− x‖2 for anyy ∈ K and x;

(ii) ||x|K − |y|K | ≤ ‖x− y‖ for any x and y;(iii) |x|K is a convex function and |x|2K is continuously differ-

entiable with ∇|x|2K = 2(x− PK(x)), where ∇ standsfor the gradient.

Let the source be located at an unknown coordinate pair ρ =[ρ1, ρ2]

T in a sensor field S ⊆ R2 which emits a signal with

power level P . The considered n sensors perform sensing basedon energy detection. At sensor i with its known coordinate si,i = 1, · · · , n, the received signal power can be written as fol-lows [3], [4], [8]:

Psi = giP

Dνis

+ εi, (2)

where gi is the gain factor of sensor i, Dis := ‖ρ− si‖, νis the power-loss factor, which depends on the propagationenvironment and varies from 2 to 5, and εi is the receivernoise at the i-th sensor. For simplicity, we assume that εi(i =1, · · · , n) are zero-mean uncorrelated Gaussian processes withvariances {σ2

i }, i.e., εi ∼ N(0, σ2i ).

In this paper, we assume that the source power P is known,and the only parameter to be estimated is the location vectorρ of the source. The maximum likelihood estimator (MLE) isfound by solving the nonlinear least-squares problem when thenoise is Gaussian, that is,

ρ∗ML = argminρ

n∑i=1

(Psi − giP

Dνis

)2

σ2i

= argminρ

n∑i=1

φi(ρ),

where φi(ρ) :=

(Psi

− giP

Dνis

)2

σ2i

. Clearly, φi(ρ) attains its mini-

mum 0 on the circle defined as follows:

Ci ={ρ ∈ R

2 : ‖ρ− si‖ =

(giP

Psi

)1/ν}.

However, due to the observation noise, the source may not ap-pear exactly on the circles {Ci}ni=1 but be contained in a groupof sensing areas described by rings in the following forms:

Ri =

{ρ :

(giP

Psi + ξiσi

) 1ν

< ‖ρ− si‖ <

(giP

Psi − ξiσi

) 1ν

}

where ξiσi indicates the area of noise distribution for sensori with a given trust parameter 0 < ξi <

Psi

σi. Obviously, as ξi

increases, the possibility of the source located in the ring Ri

increases, which will be 99.7% if ξi = 3. In this paper, we takeξi = min

{3,

Psi

σi

}.

Fig. 1. (a) Consistent case; (b) inconsistent case.

Denote the outer open disk of ring Ri by

X0i =

{ρ ∈ R

2 : ‖ρ− si‖ <

(giP

Psi − ξiσi

)1/ν},

and the inner open disk by

Y 0i =

{ρ ∈ R

2 : ‖ρ− si‖ <

(giP

Psi + ξiσi

)1/ν}.

Let Xi and Yi be the closures of X0i and Y 0

i , respectively.Ri = X0

i \ Yi = {x : x ∈ X0i , x �∈ Yi} is an open ring for i =

1, · · · , n. Since the ring Ri is the sensing area of sensor i, it isnatural to assume that sensor i can get the information aboutthe sets Xi and Yi, though it does not know anything about Rj

when j �= i.

C. Formulation

The source localization problem can be formulated as findinga point in the intersection set of the sensing rings as its lo-cation estimate. However, for any given ξi, there is still somepossibility for the source to be located outside of the ringRi. Hence, there are two cases for the source localization asa ring intersection computation problem: i) Consistent case:R0 :=

⋂ni=1 Ri �= ∅; ii) Inconsistent case: R0 = ∅ (as shown

in Fig. 1, the black dot and small squares denote the source andthe sensors, respectively).

Remark 2.4: In the consistent case, since⋂n

i=1 X0i ⊆ X0 :=⋂n

i=1 Xi is an open and nonempty set, there exists at least oneinterior point in the intersection set X0.

Generally speaking, the intersection computation of rings,which are not convex, is still very complicated. One of thereasons is that it is difficult to ensure that the optimal point islocated outside of all the inner disks {Yi}ni=1 in the non-convexproblem. Therefore, we formulate the source localization prob-lem as the following two convex problems:

i) Inconsistent case: the source can not be in Ri for alli = 1, · · · , n, and we give a trade-off solution for the lo-calization problem by finding a point x∗ ∈ R

2 to minimizethe weighted sum of the squares of the distances to theouter disks {Xi}ni=1 and inner disks {Yi}ni=1, i.e.,

minn∑

i=1

(|x|2Xi

+ bi|x|2Yi

); (3)

Page 4: Distributed Projection-Based Algorithms for Source ...lsc.amss.ac.cn/~yghong/papers/TWC2015distributed.pdfIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 6,JUNE 2015 3131

3134 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 6, JUNE 2015

ii) Consistent case: the source is inside the intersectionset X0, and then the source localization problem canbe solved by finding a point x∗ ∈ X0 to minimize theweighted sum function (3), that is,

min

n∑i=1

(|x|2Xi

+ bi|x|2Yi

), subject to x ∈ X0, (4)

or equivalently,

min

n∑i=1

bi|x|2Yi, subject to x ∈ X0, (5)

where b1, · · · , bn are the positive scalar parameters.Roughly speaking, {bi}ni=1 can be viewed as the weighted

parameters to make our considered problem become a “virtual”convex intersection problem for a group of certain convex sets{Qi}ni=1 with Yi ⊆ Qi ⊆ Xi.

Denote by Z∗ and X∗ the optimal solution sets of the uncon-strained problem (3) and constrained problem (4), respectively.Then we give our localization formulation as follows:

Definition 2.5: The distributed source localization problemis solved if we can find a distributed algorithm such that,for any initial condition xi(0) ∈ R

2, i ∈ V , there exists anoptimal solution x∗ ∈ Z∗ with limk→∞ xi(k) = x∗, i ∈ V ifproblem is inconsistent; there exists an optimal solution x∗ ∈X∗ with limk→∞ xi(k) = x∗ for i ∈ V otherwise. In bothcases, x∗ is termed as the optimal estimate of the sourcelocation.

Remark 2.6: Our formulation of the source localization ismore general than or different from those given in the litera-ture such as [12], [27]–[29]. First of all, we consider jointly-connected switching communication topologies, while fixedtopologies were basically discussed in [12], [27]–[29]. Next,some existing results formulate the localization problem as aneasily-solved convex optimization problem in [12], but ours isa constrained problem. Moreover, different from the problemsetups of the rings’ intersection investigated in some literature[27]–[29], each sensor in our problem can only access theinformation about its own sensing ring without knowing anyother rings, and the only available information from its time-varying neighbor sensors is their estimates about the source.Certainly, if the information about the sensing rings can beshared among all the sensors, the semidefinite programming(SDP) and linear cone programming (LCP) methods can beeasily applied.

In what follows, we will construct a unified algorithm forboth cases and then provide its convergence proofs in the twocases, respectively.

III. DISTRIBUTED ALGORITHM AND PRELIMINARIES

In this section, we propose a distributed alternating pro-jection algorithm (DAPA) for the source localization problemwith jointly-connected switching topologies and then give somepreliminary results.

A. Algorithm

The main idea of DAPA is to allow sensor i(i ∈ V) with aninitial estimate xi(0) ∈ R

2 to update its estimate by combiningthe estimates received from its neighbors, and meanwhile, toemploy the projections on its inner disk Yi and its outer closeddisk Xi, respectively. To be precise, sensor i is allowed toupdate its estimate according to the following rule:⎧⎨

⎩vi(k) =

∑nj=1 aij(k)xj(k),

wi(k) = vi(k)− αk∇fi (vi(k)) ,xi(k + 1) = wi(k)− βk∇gi (wi(k)) ,

(6)

where the weights aij(k) are nonnegative, fi(x) =bi2 |x|2Yi

and gi(x) =12 |x|2Xi

with respective gradients ∇fi(vi(k)) =bi(vi(k)− PYi

(vi(k))) at vi(k) and ∇gi(wi(k)) = wi(k)−PXi

(wi(k)) at wi(k), and αk ∈ [0,min{1, 1/b0}] with b0 =max{b1, · · · , bn} and βk ∈ [0, 1] for k = 0, 1, · · · are thestep-sizes. Clearly, our algorithm is a distributed alternatinggradient-based algorithm. In fact, wi(k) = (1− αkbi)vi(k) +αkbiPYi

(vi(k)) is the approximate projection of point vi(k)onto Yi, and xi(k + 1) = (1− βk)wi(k) + βkPXi

(wi(k)) isthe approximate projection of point wi(k) onto Xi. Here αk

and βk can be viewed as projection accuracies.Remark 3.1: Note that the ring intersection computation

problem is very complicated. In the above, we made a firstattempt to derive a more accurate estimator for source localiza-tion. In fact, its complexity can be significantly reduced if it be-comes the widely-studied convex set intersection computationproblem [12], [16], [19], [20] by taking Yi = ∅ for i = 1, · · · , n.In this way, the non-convex ring intersection problem can bereduced to the following unconstrained optimization problem:

minx∈R2

n∑i=1

|x|2Xi(7)

In this case, wi(k) = vi(k) in the algorithm (6). Then thecorresponding distributed algorithm of problem (7) is obtainedin the following form:{

vi(k) =∑n

i=1 aij(k)xj(k),xi(k + 1) = vi(k)− βk (vi(k)− PXi

(vi(k))) .(8)

Our results obtained in the next section are directly appli-cable to the convex optimization problem in the consistent(⋂n

i=1 Xi �=∅) and inconsistent (⋂n

i=1 Xi=∅) cases discussedin [12].

B. Preliminary Results

To prove the convergence of DAPA, we introduce two usefullemmas obtained in [16] and [25], respectively.

Lemma 3.2: Let 0 < μ < 1 and {φk}∞k=0 be a positive scalarsequence. If limk→∞ φk = 0, then limk→∞

∑ks=0 μ

k−sφs = 0.Moreover, if

∑∞k=0 φk < ∞, then

∑∞k=0

∑ks=0 μ

k−sφs < ∞.Lemma 3.3: Let {ak}∞k=0 and {ak}∞k=0 be two non-negative

sequences with∑∞

k=0 ak < ∞. If ak+1 ≤ ak + ak, ∀k ≥ 0,then limk→∞ ak is a finite number.

Page 5: Distributed Projection-Based Algorithms for Source ...lsc.amss.ac.cn/~yghong/papers/TWC2015distributed.pdfIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 6,JUNE 2015 3131

ZHANG et al.: DISTRIBUTED PROJECTION-BASED ALGORITHMS FOR SOURCE LOCALIZATION IN WSNs 3135

Let Xco = co{X1, · · · , Xn} be the convex hull consisting ofall finite convex combinations of points in Xi, i = 1, · · · , n.Due to the boundedness of Xi (1 ≤ i ≤ n), Xco is bounded andd0 := supx,y∈Xco

‖x− y‖ < ∞. Denote di(k) = bi(vi(k)−PYi

(vi(k))) and δi(k) = wi(k)− PXi(wi(k)). Then we estab-

lish a lemma for the boundedness of sequences {di(k)} and{δi(k)} obtained by our algorithm (6).

Lemma 3.4: With Assumption 1, there exists a positiveconstant L such that

‖di(k)‖ ≤ L and ‖δi(k)‖ ≤ L (9)

for i = 1, · · · , n and k = 0, 1, · · ·.Denoting ei(k) = xi(k + 1)− wi(k), it follows from (9)

that

‖ei(k)‖ ≤ Lβk. (10)

With the transition matrix Φ(k, s), we have

xi(k + 1) =n∑

j=1

[Φ(k, 0)]ij xj(0)− αkdi(k) + ei(k)

−k∑

r=1

⎛⎝ n∑

j=1

[Φ(k, r)]ij αr−1dj(r − 1)

⎞⎠

+

k∑r=1

⎛⎝ n∑

j=1

[Φ(k, r)]ij ej(r − 1)

⎞⎠ .

Due to x(k) = 1n

∑nj=1 xj(k), (9), (10), and Lemma 2.2, we

obtain

‖xi(k + 1)− x(k + 1)‖

≤ λγkn∑

j=1

‖xj(0)‖+ nLλ

k∑r=1

γk−rαr−1 + 2Lαk

+ 2Lβk + nLλ

k∑r=1

γk−rβr−1. (11)

From Lemma 3.2 and (11), we establish the following result.Lemma 3.5: Under Assumptions 1 and 2, if the step-sizes

{αk} and {βk} satisfy∑∞

k=0 α2k<∞ and

∑∞k=0 β

2k<∞, then,

for any i ∈ {1, · · · , n}, we have limk→∞ ‖xi(k)− x(k)‖ =0,

∑∞k=0 αk‖xi(k)− x(k)‖ < ∞, and

∑∞k=0 βk‖xi(k)−

x(k)‖ < ∞.

IV. INTERSECTION COMPUTATION FOR LOCALIZATION

In this section, we give the proofs for the unified DAPA inthe inconsistent case and the consistent case with switchingtopologies, respectively.

In the inconsistent case, we can verify that∑n

i=1 bi|x|2Yi+

|x|2Xiis a convex function from Lemma 2.3 (iii). With the

boundedness of sets {Xi, Yi}ni=1, we get that∑n

i=1 bi|x|2Yi+

|x|2Xiis coercive (i.e., lim||x||→∞

∑ni=1 bi|x|2Yi

+ |x|2Xi= ∞).

Then by Proposition 2.1.1 in [26], we obtain the optimal solu-tion set Z∗ of problem (3) is nonempty. We have the followingconvergence theorem.

Theorem 4.1: Under Assumptions 1 and 2, the sequences{xi(k)}ni=1 generated by algorithm (6) converge to the optimalsolution of problem (3), i.e.,

limk→∞

xi(k) = p∗ for some p∗ ∈ Z∗ and all i,

if∑∞

k=0αk=∞,∑∞

k=0βk=∞,∑∞

k=0α2k<∞,

∑∞k=0β

2k<∞,

and∑∞

k=0 |αk − βk| < ∞.Proof: See Appendix A. �

Theorem 4.1 shows that the algorithm (6) can achieve theoptimal point p∗ to minimize the unconstrained optimizationproblem (3) in a distributed way. This subsection can alsobe viewed as dealing with the convergence of the proposedalgorithm in the inconsistent case. This means that the obtainedp∗ is an estimate of the source location in the inconsistent case.Moreover, the conditions in Theorem 4.1 can be easily satisfiedby taking αk = 1

k+2 and βk = 1k+1 for k = 0, 1, · · ·.

In the consistent case, we need further to show that theoptimal estimate belongs to set X0 =

⋂ni=1 Xi. In this case,

it follows from Lemma 2.3 (iii) that | · |2Yi, i = 1, · · · , n are

convex and continuously differentiable functions. Accordingto the compactness of X0 and the Weierstrass’ Theorem, theoptimal solution set X∗ of problem (5) is nonempty.

By using Remark 2.4, we can obtain the following lemmain [16].

Lemma 4.2: For any xi ∈ Xi, i = 1, · · · , n, let x =1n

∑ni=1 xi and x∈∩n

i=1X0i . Then s= ε

ε+δ x+δ

ε+δ x∈X0 and

‖x− s‖ ≤ 1

δn

⎛⎝ n∑

j=1

‖xj − x‖

⎞⎠

⎛⎝ n∑

j=1

|x|Xj

⎞⎠ ,

where ε =∑n

j=1 |x|Xjand δ is a positive number satisfying

{y|‖y − x‖ ≤ δ} ⊆ X0.In fact, when vi(k) ∈ Xi, wi(k)∈Xi and then |wi(k)|Xi

=0.When vi(k) �∈ Xi, |wi(k)|Xi

= 0 if wi(k) ∈ Xi; otherwise, itis not hard to get

|wi(k)|Xi= |vi(k)|Xi

− αkbi |vi(k)|Yi.

Next, we demonstrate how to select the sequence {αk}. For anyk ≥ 0 and i ∈ Nout := {i|vi(k) �∈ Xi}, αk must satisfy at leastone of the following two conditions:

• |vi(k)|Xi− αkbi|vi(k)|Yi

≤ αkL;• vi(k)− αkdi(k) ∈ Xi,

where L is a given large enough positive constant. We termthis property as the alternative property. From the alternativeproperty, we have

|wi(k)|Xi≤ αkL, ∀i ∈ V. (12)

Remark 4.3: Once vi(k) ∈ Xi for sensor i, the above con-dition is not affected by αk. Hence, we only need to considersensor i (i ∈ Nout) to determine αk. In this case, the alternativeproperty means that αk should satisfy that the approximateprojection of vi(k) on its inner ring Yi is sufficiently close to Xi

or belongs to Xi. Our algorithm objective is to find a point in theset X0 =

⋂ni=1 Xi to minimize the sum function

∑ni=1 bi| · |2Yi

.It is a natural assumption that makes its state close to its own

Page 6: Distributed Projection-Based Algorithms for Source ...lsc.amss.ac.cn/~yghong/papers/TWC2015distributed.pdfIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 6,JUNE 2015 3131

3136 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 6, JUNE 2015

constrained set Xi as much as possible when sensor i optimizesits own function bi| · |2Yi

. Therefore, the alternative propertyassumption is reasonable. In other words, we first make allthe sensors’ estimates converge to the intersection set X0 withthe alternative property assumption, and then optimize the sumfunction

∑ni=1 bi| · |2Yi

to achieve a consensus point.The next theorem presents the convergence result for the

distributed algorithm (6) in the consistent case.Theorem 4.4: Under Assumptions 1 and 2, the sequences

{xi(k)}ni=1 produced by the algorithm (6) converge to theoptimal solution of problem (5), i.e.,

limk→∞

xi(k) = x∗ for some x∗ ∈ X∗ and all i,

if the sequence {αk} satisfies the alternative property alongwith

∑∞k=0 αk = ∞,

∑∞k=0 βk = ∞,

∑∞k=0 α

2k < ∞, and∑∞

k=0 β2k < ∞.

Proof: See Appendix B. �Remark 4.5: The condition on αk in Theorem 4.4 can be eas-

ily satisfied by setting αk = 1k+2 and βk = 1

k+1 , for instance.Moreover, the alternative property can also be guaranteed witha sufficiently large constant L > 0. In the next section, we cansee that the value of L is not necessarily too large. In addition,the optimal solution of constrained optimization problem (5) isalso the global optimal solution of unconstrained optimizationproblem (3) if

∑∞k=0 |αk − βk| < ∞ holds.

Remark 4.6: Note that [12], [15] focused on unconstrainedconvex problem, but we consider a constrained convex problem(in the consistent case). Clearly, the constrained convex opti-mization is much more difficult than the optimization withoutconstraints, especially when each agent can only know its ownconstraint. In [16], all the constraint sets are assumed to beidentical or the communication topologies are assumed to befixed and fully connected (aij = 1

n for all i, j). In contrast,Theorem 4.4 gives a complete analysis for the case of differentconstraints under switching topologies. Moreover, we also tryour best to provide a unified algorithm to handle two differentcases (both consistent and inconsistent cases).

V. SIMULATION AND DISCUSSION

In this section, we give simulation results for the consistentand inconsistent cases to illustrate the convergence performanceof the distributed alternating projection algorithm proposed inthis paper. Then we give a comparative study about the esti-mation performance of our algorithm, the distributed projectionalgorithm (DPA) in [12], the grid search method for MLE in [3],and the convex relaxation method for linear cone programming(LCP) in [12], as well as the Cramer-Rao lower bound (CRLB)by a series of Monte Carlo simulations.

Consider a group of five sensor nodes with the switchinginteraction topologies randomly placed in a 10 m × 10 m fieldfor illustration. The measurement of the source energy at eachsensor is generated by (2). Suppose that the gain factors giequal 1 for all sensors and the power-loss factor is set as ν = 2.The source is located at ρ = [5.5, 5.5]T and emits a signalwith P set to 20 mW. An AWGN channel is assumed withεi ∼ N(0, σ2

i ), where 0 ≤ σi ≤ 0.3, i = 1, · · · , 5. The actual

Fig. 2. Rings determined by sensors.

receiver SNR (signal to noise ratio) at different sensors dependson the distance to the source. For instance, if the variance ofnoise is 0.01 mW, the receiver SNR of a sensor 5 m awayfrom the source is 10× log10

(20/52)0.01 = 19 dB. To simplify

the simulation, here we take b1 = · · · = b5 = b considering theinner disks have the same priority. The standard deviation ofbackground noise for each sensor takes the same value σ, andthen the trust parameters ξ1 = · · · = ξ5 = ξ.

The time-varying interaction topology G is periodicallyswitched between two graphs Gi, i = 1, 2, where G(2k) = G1

and G(2k + 1) = G2 for k = 0, 1, · · ·. The corresponding adja-cency matrices are described by A1 = [1, 0, 0, 0, 0; 0, 0.6, 0.2,0, 0.2; 0, 0, 0.6, 0.4, 0;0, 0.4, 0, 0.6, 0; 0, 0, 0.2, 0, 0.8] and A2=[0.6, 0.4, 0, 0, 0; 0, 0.6, 0, 0.4, 0; 0, 0, 0.8, 0, 0.2; 0.4, 0, 0, 0.6, 0;0, 0, 0.2, 0, 0.8].

A. Convergence Performance

In this subsection, we give a comparative study about theestimation performance of our proposed algorithm (6), the DPAfor convex set intersection (without caring about {Yi}ni=1) in[12], and the LCP method in [29].

At first, we take b = 1, σ = 0.1, and ξ = 1 < 3, and theintersection problem is inconsistent most of time in our simu-lation, which means the intersection of the corresponding ringsdetermined by sensors is empty, i.e., R0 =

⋂5i=1 Ri = ∅. Fig. 2

shows a source localization scenario and the correspondingsensing rings, determined by the sensors, with dots standing forthe sensors and � for the source.

Take the step-sizes (projection accuracies) with αk = 1k+2

and βk = 1k+1 , which satisfy the conditions in Theorem 4.1.

The estimation errors, expressed as the logarithm of the Eu-clidean distance between the estimated and true source loca-tion (i.e., log10 ‖xi − ρ‖, i = 1, · · · , 5), are shown, respectivelywith our algorithm (6) and the DPA in Fig. 3. It is shown that thecorresponding average estimation value x = 1

5

∑5i=1 xi of DPA

converges to [5.518, 5.245]T (marked with � in Fig. 2) afterabout 10000 iteration steps, the average estimation x of our al-gorithm converges to [5.508, 5.551]T (marked with ∗ in Fig. 2)after 10000 iterations, which is very close to the centralized

Page 7: Distributed Projection-Based Algorithms for Source ...lsc.amss.ac.cn/~yghong/papers/TWC2015distributed.pdfIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 6,JUNE 2015 3131

ZHANG et al.: DISTRIBUTED PROJECTION-BASED ALGORITHMS FOR SOURCE LOCALIZATION IN WSNs 3137

Fig. 3. Estimation errors by proposed algorithm (6) (left) and the DPA in [12](right) in the inconsistent case.

Fig. 4. Rings determined by sensors.

solution [5.512, 5.554]T . Additionally, the source estimate byusing the centralized LCP method is [5.512, 5.616]T (markedwith + in Fig. 2), and the corresponding estimation errors are0.2558, 0.0515, 0.1166 by these three methods, which impliesthat our algorithm has a better estimation performance in thiscase.

Next, when ξ = 3, the intersection problem becomes consis-tent with a high probability. Fig. 4 shows a source localizationscenario, and the corresponding sensing rings determined bythe sensors, with dots and � representing the sensors and thesource, respectively. From Fig. 4, we clearly see that the ringintersection is nonempty (i.e., R0 �= ∅).

Take L = 30 and the algorithm step-sizes αk = 1k+2 and

βk = 1k+1 , which satisfy the conditions in Theorem 4.4. The

estimation errors and convergence results are presented withour algorithm (6) and DPA in [12] in Fig. 5, respectively. DPAcannot converge to X0 after 10000 steps and the correspondingaverage estimation value x = 1

5

∑5i=1 xi = [5.447, 6.216]T �∈

X0 (marked with � in Fig. 4). On the other hand, the averageestimation value x = [5.123, 5.198]T ∈ X0 (marked with � inFig. 4) after 10000 steps with our method, which is veryclose to the centralized solution [5.133, 5.187]T . Additionally,the source estimation by using centralized LCP method in[29] is [5.937, 5.708]T (marked with + in Fig. 4). Thus, thecorresponding estimation errors are 0.7184, 0.4830, 0.4845 forthese three methods, respectively. This simulation results showthat our algorithm has better performance than DPA and thecentralized LCP methods.

Fig. 5. Estimation errors by proposed algorithm (6) (left) and the DPA in [12](right) in the consistent case.

Fig. 6. Estimate error as trust parameter ξ changes.

Although the selection of trust parameter ξ determines ifthe problem is consistent or inconsistent, the above simulationresults of the proposed algorithm (6) show good convergenceperformance in both consistent and inconsistent cases withoutknowing which case it is beforehand.

Then we investigate the convergence performance of theproposed algorithm with an analysis on ξ. In this simulation,sensors are randomly placed in each run with σ = 0.1, b =1. Next, we compare the estimation accuracy between ourproposed algorithm (6), DPA and LCP methods with changingξ, based on the well-known localization accuracy metric, rootmean square error (RMSE),

RMSE =

√√√√ 1

Tr

Tr∑i=1

‖ρ∗i − ρ‖2,

where Tr denotes the number of trials and ρ∗i denotes theestimate of source location at the i-th trail for i ∈ {1, · · · , Tr}.Fig. 6 shows the RMSE as ξ changes under 1000 trials, wherethe estimation error for DPA and LCP roughly increases as ξincreases. In fact, the possibility of the source located in Ri

increases as ξ increases, and therefore, the intersection set ofthese rings becomes larger, which may yield larger estimation

Page 8: Distributed Projection-Based Algorithms for Source ...lsc.amss.ac.cn/~yghong/papers/TWC2015distributed.pdfIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 6,JUNE 2015 3131

3138 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 6, JUNE 2015

Fig. 7. Estimation errors as weighted parameter b changes.

errors. However, our proposed algorithm actually solves the“constrained” problem

minn∑

i=1

(|x|2Xi

+ |x|2Yi

),

s.t., x ∈ R2 (inconsistent) or x ∈ X0 (consistent)

and ξ has a less impact on this objective function∑n

i=1(|x|2Xi+

|x|2Yi) than the term

∑ni=1 |x|2Xi

, which leads to better perfor-mance in the statistical sense.

Moreover, the stepsize conditions in Theorems 4.1 and 4.4can be easily satisfied by setting αk = 1

k+2 and βk = 1k+1 , for

instance. Furthermore, the alternative property in the consistentcase can also be guaranteed with a sufficiently large constantL > 0. In the above simulation example, we can see that thevalue of L is not necessarily too large.

Next, we discuss the effectiveness of augmentation term∑ni=1 bi|x|2Yi

. With the noise environment σ = 0.1 and trust

parameter ξ = min{3,

Psi

σ , i = 1, . . . , 5}

, Fig. 7 shows the

effect of weighted parameter b on the RMSE under the 1000different selections of sensors’ locations and initial estimatevalues by our proposed algorithm (6). In addition, in mostof our simulations, we find that, when b ≤ 1, the estimationperformance of our algorithm is better than that of the algorithm(8), where b = 0.

B. Estimation Performance Comparison

Let us study the estimation performance of our proposedalgorithm compared with the DPA [12], the grid search methodfor MLE in [3], the convex relaxation method for linear coneprogramming (LCP) in [29], as well as the Cramer-Rao lowerbound (CRLB) through thousands of Monte Carlo simulations.The CRLB is computed as follows:

CRLB =

√√√√ 1

Tr

Tr∑i=1

CRLBi

where CRLBi denotes the CRLB at the i-th trail.Here the grid search resolution is set to 1 m × 1 m

and the LCP method can be solved by using the SeDuMi

Fig. 8. Comparisons in accuracy as noise standard deviation changes through5000 trails for a fixed sensor configuration.

Fig. 9. Comparisons in accuracy as noise standard deviation changes through8000 trails for randomly placed sensors.

toolbox [33]. Note that both grid search and LCP meth-ods are operated in a centralized way. With b = 1 and ξ =min

{3,

psi

σ , i = 1, . . . , 5}

, Figs. 8 and 9 demonstrate the lo-calization accuracy metric RMSE of these four methods asa function of the standard deviation of the background noisethrough 5000 trials for a fixed sensor configuration [7, 9;3, 5;5,2;7, 2;9, 3] and 8000 trials for random sensor configuration ineach run, respectively. The simulation results in Figs. 8 and 9exhibit that our algorithm outperforms the ML-grid search andDPA methods. With the increasing standard deviation of thebackground noise, the performance of our algorithm becomesbetter than the centralized convex relaxation method LCP.

At last, we investigate the scalability with the number ofsensors for our algorithm. For simplicity, the communicationtopology graph is switching between two different 3-regularconnected undirected graphs with Metropolis weights. Withσ = 0.1, b = 1 and ξ = min

{3,

psi

σ , i = 1, . . . , 5}

, Fig. 10demonstrates the localization accuracy metric RMSE of fourdifferent number of sensors through 1000 trials for randomlyplaced sensors in each run. It can be observed from Fig. 10that the convergence speeds for various scales of network areabout the same. Also, the result shows that the estimation error

Page 9: Distributed Projection-Based Algorithms for Source ...lsc.amss.ac.cn/~yghong/papers/TWC2015distributed.pdfIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 6,JUNE 2015 3131

ZHANG et al.: DISTRIBUTED PROJECTION-BASED ALGORITHMS FOR SOURCE LOCALIZATION IN WSNs 3139

Fig. 10. Estimation errors by proposed algorithm (6) for four different numberof sensors.

indeed decreases with the increasing number of sensors, but theestimation accuracy will not be effectively improved after thenumber of the sensors reaches a certain level. In addition, wefind that the estimation accuracy of our algorithm keeps almostthe same after a certain number of iterations in a large scalesensor network: Fig. 10 shows that our localization algorithm(6) will almost converge (that is, the estimation error keepsalmost unchanged) at 2000 iterations no matter how manysensors are in the sensor network.

VI. CONCLUSION

In this paper, the source localization problem was consideredby cooperatively computing the intersection of the sensing ringsof the sensors. A distributed alternating projection algorithmwas proposed to deal with this complicated non-convex opti-mization problem. With alternating computing the projectionon the inner and outer disks of each sensor, sufficient conver-gence conditions were obtained for the distributed localizationalgorithm in both the consistent and inconsistent cases. Simula-tion results show that the performance of our algorithm performgood in a comparison with some existing algorithms, especiallyconvex relaxation based on convex intersection computation,semidefinite and cone programming. In fact, many interestingand challenging problems still remain to be addressed, includ-ing how to extend this distributed non-convex ring intersectionalgorithm from single source to multiple sources and how tobalance the localization performance and the computationalcomplexity in solving the non-convex optimization.

APPENDIX APROOF OF THEOREM 4.1

Proof: For any q∗ ∈ Z∗, it follows from Lemma 2.3 (iii)and (1) that

‖xi(k + 1)− q∗‖2

≤ ‖wi(k)− q∗‖2 + L2β2k − 2βkδ

Ti (k) (wi(k)− q∗)

≤ βk

(|q∗|2Xi

− |wi(k)|2Xi

)+ ‖wi(k)− q∗‖2 + L2β2

k.

With the boundedness of sequences {xi(k)}, {vi(k)} and{wi(k)}, we obtain that

M :=maxi,k

{|wi(k)|Xi

, |vi(k)|Yi, |q∗|Xi

, ‖x(k)−q∗‖, |x(k)|Xi

}is a finite number. It follows from Lemma 2.3 (ii) that

βk

(|q∗|2Xi

− |wi(k)|2Xi

)≤ βk

(|q∗|2Xi

− |x(k)|2Xi

)+ 2Mβk ‖x(k)− wi(k)‖ .

Since

‖x(k)− wi(k)‖ ≤ ‖x(k)− vi(k)‖+ ‖vi(k)− wi(k)‖

≤n∑

j=1

aij(k) ‖x(k)− xj(k)‖+ Lαk

we have

‖xi(k + 1)− q∗‖2

≤ ‖wi(k)− q∗‖2 + βk

(|q∗|2Xi

− |x(k)|2Xi

)+ 2MLαkβk

+ 2M

n∑j=1

aij(k)βk ‖x(k)− xj(k)‖+ L2β2k. (13)

With a similar expanding of ‖xi(k + 1)− q∗‖2 given in (13),we have

‖wi(k)− q∗‖2

≤n∑

j=1

aij(k) ‖xj(k)− q∗‖2 + αkbi

(|q∗|2Yi

− |x(k)|2Yi

)

+ L2α2k+b0(d0+2M)

n∑j=1

aij(k)αk ‖x(k)−xj(k)‖. (14)

Since

αk

n∑i=1

bi

(|q∗|2Yi

− |x(k)|2Yi

)+ βk

n∑i=1

(|q∗|2Xi

− |x(k)|2Xi

)

≤ αk

n∑i=1

((bi|q∗|2Yi

+ |q∗|2Xi

)−(bi |x(k)|2Yi

+ |x(k)|2Xi

))+ 2nM2|βk − αk|

it follows from (13) and (14) that

n∑i=1

‖xi(k + 1)− q∗‖2

≤n∑

i=1

‖xi(k)−q∗‖2+b0(d0+2M)

n∑j=1

αk ‖x(k)− xj(k)‖

+αk

n∑i=1

((bi|q∗|2Yi

+|q∗|2Xi

)−(bi |x(k)|2Yi

+ |x(k)|2Xi

))+ nML

(α2k + β2

k

)+ nL2β2

k + nL2α2k

+ 2M

n∑j=1

βk ‖x(k)− xj(k)‖+ 2nM2|βk − αk|. (15)

Page 10: Distributed Projection-Based Algorithms for Source ...lsc.amss.ac.cn/~yghong/papers/TWC2015distributed.pdfIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 6,JUNE 2015 3131

3140 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 6, JUNE 2015

Due to q∗ ∈ Z∗, we have

n∑i=1

((bi|q∗|2Yi

+ |q∗|2Xi

)−(bi |x(k)|2Yi

+ |x(k)|2Xi

))≤ 0.

With the given conditions∑∞

k=0 α2k < ∞,

∑∞k=0 β

2k < ∞,∑∞

k=0 |αk − βk| < ∞ and Lemma 3.5, it is easy to find that thesequence {

∑ni=1 ‖xi(k)− q∗‖2} is convergent for every q∗ ∈

Z∗ from Lemma 3.3. Consequently, for any i, the sequence{‖xi(k)− q∗‖} is also convergent for every q∗ ∈ Z∗. Noticethat limk→∞ ‖xi(k)− x(k)‖ = 0 for i ∈ V , which implies thesequence {‖x(k)− q∗‖} is convergent for any q∗ ∈ Z∗.

By summing (15) over k, we have

k∑r=0

αr

n∑i=1

((bi |x(r)|2Yi

+ |x(r)|2Xi

)−(bi|q∗|2Yi

+ |q∗|2Xi

))

≤n∑

i=1

‖xi(0)− q∗‖2 + (nML+ nL2)k∑

r=0

(α2r + β2

r

)

+ 2nM2k∑

r=0

|βr − αr|+ 2M

n∑j=1

k∑r=0

βr ‖x(r)− xj(r)‖

+ b0(d0 + 2M)n∑

j=1

k∑r=0

αr ‖x(r)− xj(r)‖

< ∞.

Since∑∞

r=0 αr = ∞, we have

lim infr→∞

n∑i=1

((bi |x(r)|2Yi

+|x(r)|2Xi

)−(bi|q∗|2Yi

+|q∗|2Xi

))=0.

Hence, there exists a limit point p∗ of {x(k)} such that p∗ ∈ Z∗.Similarly, we get that the sequence {‖x(k)− p∗‖} is conver-gent. Therefore, limk→∞ ‖xi(k)− p∗‖ = 0 for all i; namely,

limk→∞

xi(k) = p∗, i = 1, · · · , n.

Thus, the conclusion follows. �

APPENDIX BPROOF OF THEOREM 4.4

Proof: For any z∗ ∈ X∗, it follows from X∗ ⊆ X0 ⊆ Xi

and Lemma 2.3 (i) that

‖xi(k + 1)− z∗‖2

≤ (1− βk) ‖wi(k)− z∗‖2 + βk ‖PXi(wi(k))− z∗‖2

≤(1−βk) ‖wi(k)−z∗‖2+βk ‖wi(k)−z∗‖2−βk |wi(k)|2Xi

≤ ‖vi(k)− z∗‖2 + L2α2k + 2αkd

Ti (k) (z

∗ − vi(k))

≤n∑

j=1

aij(k) ‖xj(k)− z∗‖2 + αkbi

(|z∗|2Yi

− |vi(k)|2Yi

)

+ L2α2k. (16)

From Remark 2.4, there are a vector x ∈ ∩ni=1X

0i and a number

δ > 0 such that {y|‖y−x‖ ≤ δ} ⊆ X0. Define s(k)= εε+δ x+

δε+δ x(k), where ε =

∑nj=1 |x(k)|Xj

. According to Lemma 4.2,

s(k) ∈ X0. Note that αkbi(|z∗|2Yi− |vi(k)|2Yi

) = αkbi(|z∗|2Yi−

|s(k)|2Yi) + αkbi(|s(k)|Yi

+ |vi(k)|Yi)(|s(k)|Yi

− |vi(k)|Yi).

With the boundedness of sequences {xi(k)}, {vi(k)} and{wi(k)}, we obtain

W := maxi,k

{|wi(k)|Xi

, |vi(k)|Yi, ‖z∗ − vi(k)‖

}< ∞.

It follows from |s(k)|Yi≤ d0 and Lemma 2.3 (ii) that

αkbi

(|z∗|2Yi

− |vi(k)|2Yi

)

=αkbi

(|z∗|2Yi

−|s(k)|2Yi

)+ αkbi(d0 +W ) ‖s(k)− vi(k)‖

≤αkbi

(|z∗|2Yi

−|s(k)|2Yi

)+αkb0(d0 +W ) ‖s(k)−x(k)‖

+ αkb0(d0 +W ) ‖x(k)− vi(k)‖ .

From (16), we have

n∑i=1

‖xi(k + 1)− z∗‖2

≤n∑

i=1

‖xi(k)− z∗‖2 +n∑

i=1

αkbi

(|z∗|2Yi

− |s(k)|2Yi

)

+ b0(d0 +W )

n∑j=1

αk ‖x(k)− xj(k)‖+ nL2α2k

+ nb0(d0 +W )αk ‖s(k)− x(k)‖ . (17)

Since {xi(k)} is bounded and x ∈ X0, {xi(k)− x} is boundedfor any i. Without loss of generality, we assume ‖xi(k)− x‖ ≤W . By Lemma 4.2,

‖x(k)− s(k)‖ ≤ 1

δn

⎛⎝ n∑

j=1

‖xj(k)− x‖

⎞⎠

⎛⎝ n∑

j=1

|x(k)|Xj

⎞⎠

≤ W

δ

n∑j=1

∥∥x(k)− PXj(wj(k))

∥∥ .As a result,

‖x(k)− s(k)‖

≤ W

δ

n∑j=1

‖x(k)− xj(k)‖+W

δ(1− βk)

n∑j=1

|wj(k)|Xj

+nLW

δβk +

nLW

δαk. (18)

Page 11: Distributed Projection-Based Algorithms for Source ...lsc.amss.ac.cn/~yghong/papers/TWC2015distributed.pdfIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 6,JUNE 2015 3131

ZHANG et al.: DISTRIBUTED PROJECTION-BASED ALGORITHMS FOR SOURCE LOCALIZATION IN WSNs 3141

Recalling (12), it follows from (18), Lemma 3.5,∑∞

k=0 α2k <

∞, and∑∞

k=0 β2k < ∞ that

∞∑k=0

αk ‖x(k)− s(k)‖ ≤ W

δ

n∑j=1

∞∑k=0

αk ‖x(k)− xj(k)‖

+nLW

δ

∞∑k=0

(2α2

k + β2k

)

+nW

δL

∞∑k=0

α2k

<∞.

Since s(k) ∈ X0 and z∗ ∈ X∗, we obtain

n∑i=1

bi

(|z∗|2Yi

− |s(k)|2Yi

)≤ 0.

Then it follows from Lemma 3.3 and (17) that the sequence{∑n

i=1 ‖xi(k)− z∗‖2} is convergent for every z∗ ∈ X∗. Con-sequently, the sequence {‖xi(k)− z∗‖} is also convergent forany i and z∗ ∈ X∗.

By Lemma 3.5, we obtain limk→∞ ‖xi(k)− x(k)‖ = 0 forall i. It can be verified from (12) and (18) that limk→∞ ‖x(k)−s(k)‖ = 0. Therefore, limk→∞ ‖xi(k)− s(k)‖ = 0, which im-plies that the sequence {‖s(k)− z∗‖} is convergent for everyz∗ ∈ X∗.

By summing (17) over k, we have

n∑i=1

‖xi(k + 1)− z∗‖2 +k∑

r=0

n∑i=1

αrbi

(|s(r)|2Yi

− |z∗|2Yi

)

≤n∑

i=1

‖xi(0)− z∗‖2 + nb0(d0 +W )k∑

r=0

αr ‖s(r)− x(r)‖

+ nL2k∑

r=0

α2r + b0(d0 +W )

n∑j=1

k∑r=0

αr ‖x(r)− xj(r)‖ .

Thus,

∞∑r=0

αr

n∑i=1

bi

(|s(r)|2Yi

− |z∗|2Yi

)< ∞.

Since∑∞

r=0 αr = ∞, we obtain

lim infr→∞

n∑i=1

bi

(|s(r)|2Yi

− |z∗|2Yi

)= 0.

As a result, there exists a limit point x∗ of {s(k)} such thatx∗ ∈ X∗. Then with a similar analysis we get that the sequence{‖s(k)− x∗‖} is convergent, which leads to limk→∞ ‖s(k)−x∗‖ = 0. Therefore, limk→∞ ‖xi(k)− x∗‖ = 0, which com-pletes the proof. �

REFERENCES

[1] J. Bachrach and C. Taylor, Handbook of Sensor Networks. Hoboken, NJ,USA: Wiley, 2005.

[2] H. L. Song, “Automatic vehicle location in cellular communications sys-tems,” IEEE Trans. Veh. Technol., vol. 43, no. 4, pp. 902–908, Nov. 1994.

[3] X. Sheng and Y. H. Hu, “Maximum likelihood multiple-source localiza-tion using acoustic energy measurements with wireless sensor network,”IEEE Trans. Signal Process., vol. 53, no. 1, pp. 44–53, Jan. 2005.

[4] W. Meng, W. Xiao, and L. Xie, “An efficient EM algorithm for energy-basedsensor network multi-source localization in wireless sensor networks,”IEEE Trans. Instrum. Meas., vol. 60, no. 3, pp. 1017–1027, Mar. 2011.

[5] M. Rabbat and R. Nowak, “Decentralized source localization and track-ing,” in Proc. ICASSP, Mar. 2004, vol. 3, pp. 921–924.

[6] S. Srirangarajan, A. Tewfik, and Z.-Q. Luo, “Distributed sensor networklocalization using SOCP relaxation,” IEEE Trans. Wireless Commun.,vol. 7, no. 12, pp. 4886–4895, Dec. 2008.

[7] W. Wang, V. Srinivasan, B. Wang, and K. Chua, “Coverage for targetlocalization in wireless sensor networks,” IEEE Trans. Wireless Commun.,vol. 7, no. 2, pp. 667–676, Feb. 2008.

[8] K. C. Ho and M. Sun, “An accurate algebraic closed-form solution forenergy-based source localization,” IEEE Trans. Audio, Speech, LanguageProcess., vol. 15, no. 8, pp. 2542–2550, Nov. 2007.

[9] C. Meesookho, U. Mitra, and S. Narayanan, “On energy-based acousticsource localization for sensor networks,” IEEE Trans. Signal Process.,vol. 56, no. 1, pp. 365–376, Jan. 2008.

[10] D. Blatt and A. O. Hero, “Energy based sensor network source localizationvia projection on to convex sets,” IEEE Trans. Signal Process., vol. 54,no. 9, pp. 3614–3619, Sep. 2006.

[11] P. L. Combettes, “Inconsistent signal feasibility problems: Least squaressolutions in a product space,” IEEE Trans. Signal Process., vol. 42, no. 11,pp. 2955–2966, Nov. 1994.

[12] W. Meng, W. Xiao, L. Xie, and A. Pandharipande, “Diffusion based pro-jection method for distributed source localization in wireless sensor net-works,” in Proc. IEEE Comput. Commun. Workshops, 2011, pp. 537–542.

[13] F. Deutsch and H. Hundal, “The rate of convergence for the cyclic pro-jections algorithm III: Regularity of convex sets,” J. Approx. Theory,vol. 155, no. 2, pp. 155–184, Dec. 2008.

[14] H. Bauschke and J. M. Borwein, “On projection algorithms for solving con-vex feasibility problems,” SIAM Rev., vol. 38, no. 3, pp. 367–426, Sep. 1996.

[15] A. Nedic and A. Ozdaglar, “Distributed subgradient methods formulti-agent optimization,” IEEE Trans. Autom. Control, vol. 54, no. 1,pp. 48–61, Jan. 2009.

[16] A. Nedic, A. Ozdaglar, and P. A. Parrilo, “Constrained consensus and op-timization in multi-agent networks,” IEEE Trans. Autom. Control, vol. 55,no. 4, pp. 922–938, Apr. 2010.

[17] G. Shi and K. H. Johansson, “Randomized optimal consensus of multi-agent systems,” Automatica, vol. 48, no. 12, pp. 3018–3030, Dec. 2012.

[18] Z. J. Towfic and A. H. Sayed, “Adaptive penalty-based distributed stochas-tic convex optimization,” IEEE Trans. Signal Process., vol. 62, no. 15,pp. 3924–3938, Aug. 2014.

[19] G. Shi, K. H. Johansson, and Y. Hong, “Reaching optimal consensus:Dynamical systems that compute intersections of convex sets,” IEEETrans. Autom. Control, vol. 58, no. 3, pp. 610–622, Mar. 2013.

[20] Y. Lou, G. Shi, K. H. Johansson, and Y. Hong, “Approximate projectedconsensus for convex intersection computation: Convergence analysis andcritical error angle,” IEEE Trans. Autom. Control, vol. 59, no. 7, pp. 1722–1736, Jul. 2014.

[21] J. Aubin and A. Cellina, Differential Inclusions. Berlin, Germany:Springer-Verlag, 1984.

[22] W. Yu and R. Lui, “Dual methods for nonconvex spectrum optimizationof multicarrier system,” IEEE Trans. Commun., vol. 54, no. 7, pp. 1310–1322, Jul. 2006.

[23] J. Lee, R. Mazumdar, and N. Shroff, “Non-convex optimization andrate control for multi-class services in the Internet,” IEEE/ACM Trans.Networking, vol. 13, no. 4, pp. 827–840, Aug. 2005.

[24] C. Godsil and G. Royle, Algebraic Graph Theory. New York, NY, USA:Springer-Verlag, 2001.

[25] B. T. Polyak, Introduction to Optimization. New York, NY, USA:Optimization Software, Inc., 1987.

[26] D. P. Bertsekas, A. Nedic, and A. Ozdaglar, Convex Analysis andOptimization. Belmont, MA, USA: Athena Scientific, 2003.

[27] P. Biswas and Y. Ye, “Semidefinite programming for Ad Hoc wirelesssensor network localization,” in Proc. 3rd Int. Symp. Inf. Process. SensorNetw., 2004, pp. 46–54.

[28] P. Biswas, T.-C. Lian, T.-C. Wang, and Y. Ye, “Semidefinite programmingbased algorithms for sensor network localization,” ACM Trans. Sens.Netw., vol. 2, no. 2, pp. 188–220, 2006.

Page 12: Distributed Projection-Based Algorithms for Source ...lsc.amss.ac.cn/~yghong/papers/TWC2015distributed.pdfIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 6,JUNE 2015 3131

3142 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 6, JUNE 2015

[29] H. Chen, Q. Shi, R. Tan, H. V. Poor, and K. Sezaki, “Mobile elementassisted cooperative localization for wireless sensor networks with ob-stacles,” IEEE Trans. Wireless Commun., vol. 9, no. 3, pp. 956–963,Mar. 2010.

[30] J. Nie, “Sum of squares methods for sensor network localizaiton,”Comput. Optim. Appl., vol. 43, pp. 151–179, 2009.

[31] P. Oguz-Ekim, J. Gomes, J. Xavier, and P. Oliveira, “A convex relaxationfor approximate maximum-likelihood 2D source localization from rangemeasurements,” in Proc. IEEE Int. Conf. Acoust. Speech Signal Process.,2010, pp. 2698–2701.

[32] A. Simonetto and G. Leus, “Distributed maximum-likelihood sensor net-work localization,” IEEE Trans. Signal Process., vol. 62, no. 6, pp. 1424–1437, Mar. 2014.

[33] J. F. Sturm, “Using SeDuMi 1.02 a Matlab toolbox for optimization oversymmetric cone,” Optim. Methods Softw., vol. 11/12, no. 1–4, pp. 625–653, 1999.

[34] L. Xiao and S. Boyd, “A scheme for robust distributed sensor fusion basedon average consensus,” in Proc. 4th Int. Symp. Inf. Process. Sensor Netw.,2005, pp. 63–70.

[35] B. Gharesifard and J. Cortes, “Distributed strategies for generatingweight-balanced and doubly stochastic digraph,” Eur. J. Control, vol. 18,no. 6, pp. 539–557, 2012.

Yanqiong Zhang received the bachelor’s degreefrom Wuhan University in 2010. She is pursuingthe Ph.D. degree at the Academy of Mathematicsand Systems Science, Chinese Academy of Sciences.Her research interest covers distributed optimization,sensor networks, and multi-agent networks.

Youcheng Lou received the B.Sc. degree in math-ematics and applied mathematics from ZhengzhouUniversity in 2008, and Ph.D. degree in complexsystems and control from Academy of Mathematicsand Systems Science, Chinese Academy of Sciencesin 2013. He was a visiting scholar at the ChineseUniversity of Hong Kong from October 2014 toDecember 2014. Currently he is a postdoctoral re-searcher in the National Center for Mathematics andInterdisciplinary Sciences, Academy of Mathematicsand Systems Science, Chinese Academy of Sciences.

His research interests include multi-agent networks, distributed optimizationand the applications of distributed methods in operation research.

Yiguang Hong (SM’02) received the B.Sc. andM.Sc. degrees from Peking University, Beijing,China, and the Ph.D. degree from the ChineseAcademy of Sciences (CAS), Beijing. He is cur-rently a Professor in the Institute of Systems Science,Academy of Mathematics and Systems Science,CAS, and serves as the Director of Key Lab ofSystems and Control, CAS and the Director of the In-formation Technology Division, National Center forMathematics and Interdisciplinary Sciences, CAS.His research interests include nonlinear dynamics

and control, multi-agent systems, distributed optimization, social networks,and software reliability. Prof. Hong serves as Editor-in-Chief of the ControlTheory and Technology, Deputy Editor-in-Chief of Acta Automatica Sinca, andalso serves or served as Associate Editors for several journals including theIEEE TRANSACTIONS ON AUTOMATIC CONTROL, IEEE Control SystemsMagazine, Nonlinear Analysis: Hybrid Systems, and Kybernetika. He is arecipient of the Guang Zhaozhi Award at the Chinese Control Conference (in1997), Young Author Prize of the IFAC World Congress (in 1999), YoungScientist Award of CAS (in 2001), and the Youth Award for Science andTechnology of China (in 2006), and the National Natural Science Prize of China(in 2008).

Lihua Xie (F’07) received the B.E. and M.E. degreesin electrical engineering from Nanjing University ofScience and Technology in 1983 and 1986, respec-tively, and the Ph.D. degree in electrical engineeringfrom the University of Newcastle, Australia, in 1992.Since 1992, he has been with the School of Electricaland Electronic Engineering, Nanyang TechnologicalUniversity, Singapore, where he is currently a pro-fessor and served as the Head of Division of Controland Instrumentation from July 2011 to June 2014.He held teaching appointments in the Department of

Automatic Control, Nanjing University of Science and Technology from 1986to 1989 and Changjiang Visiting Professorship with South China University ofTechnology from 2006 to 2011. His research interests include robust controland estimation, networked control systems, multi-agent networks, and sensornetworks. In these areas, he has published over 260 journal papers and co-authored two patents and six books. He has served as an editor of IETBook Series in Control and an Associate Editor of a number of journalsincluding IEEE TRANSACTIONS ON AUTOMATIC CONTROL, AUTOMATICA,IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, and IEEETRANSACTIONS ON CIRCUITS AND SYSTEMS-II. Dr. Xie is a Fellow of IEEEand IFAC.