Efficient IoT Devices Localization Through Wi-Fi CSI Feature Fusion and Anomaly Detection

 Yan Li, Jie Yang , Shang-Ling Shih, Wan-Ting  Shih, Chao-Kai Wen,  and Shi ** Manuscript received 23 March 2024; revised 01 June 2024; accepted 18 June 2024. Date of publication ** **** 2024; date of current version ** **** 2024. The work was supported in part by the National Key Research and Development Program 2018YFA0701602, in part by the National Natural Science Foundation of China (NSFC) under Grant 62301156 and 62341107, in part by the National Science Foundation of Jiangsu Province under Grant BK20230818, in part by the Fundamental Research Funds for the Central Universities 2242022k60004. The work of S.-L. Shih, W.-T. Shih, and C.-K. Wen was supported in part by the National Science and Technology Council of Taiwan under the grant MOST 111-2221-E-110-020-MY3 and by the Higher Education SPROUT Project of the Ministry of Education, Taiwan, funding the Sixth Generation Communication and Sensing Research Center. The associate editor coordinating the review of this article and approving it for publication was Dr. Andrea Sciarrone.(Corresponding authors: Jie Yang; Shi **.) Y. Li is with the National Mobile Communications Research Laboratory, Southeast University, Nan**g 210096, P. R. China, Email: [email protected]. J. Yang is with Frontiers Science Center for Mobile Information Communication and Security and Key Laboratory of Measurement and Control of Complex Systems of Engineering, Ministry of Education, Southeast University, Nan**g 210096, P. R. China, Email:[email protected]. S.-L. Shih, W.-T. Shih and C.-K. Wen are with the Institute of Communications Engineering, National Sun Yat-sen University, Kaohsiung 80424, Taiwan, Email: [email protected], [email protected], [email protected]. S. ** is with the National Mobile Communications Research Laboratory, Southeast University and Frontiers Science Center for Mobile Information Communication and Security, Nan**g 210096, P. R. China, Email: [email protected].
Abstract

Internet of Things (IoT) device localization is fundamental to smart home functionalities, including indoor navigation and tracking of individuals. Traditional localization relies on relative methods utilizing the positions of anchors within a home environment, yet struggles with precision due to inherent inaccuracies in these anchor positions. In response, we introduce a cutting-edge smartphone-based localization system for IoT devices, leveraging the precise positioning capabilities of smartphones equipped with motion sensors. Our system employs artificial intelligence (AI) to merge channel state information from proximal trajectory points of a single smartphone, significantly enhancing line of sight (LoS) angle of arrival (AoA) estimation accuracy, particularly under severe multipath conditions. Additionally, we have developed an AI-based anomaly detection algorithm to further increase the reliability of LoS-AoA estimation. This algorithm improves measurement reliability by analyzing the correlation between the accuracy of reversed feature reconstruction and the LoS-AoA estimation. Utilizing a straightforward least squares algorithm in conjunction with accurate LoS-AoA estimation and smartphone positional data, our system efficiently identifies IoT device locations. Validated through extensive simulations and experimental tests with a receiving antenna array comprising just two patch antenna elements in the horizontal direction, our methodology has been shown to attain decimeter-level localization accuracy in nearly 90% of cases, demonstrating robust performance even in challenging real-world scenarios. Additionally, our proposed anomaly detection algorithm trained on Wi-Fi data can be directly applied to ultra-wideband, also outperforming the most advanced techniques.

Index Terms:
IoT devices localization, channel state information, artificial intelligence, anomaly detection

I Introduction

TABLE I: Notations of Important Variables.
Notation Definition Notation Definition
Ncsubscript𝑁cN_{\mathrm{c}}italic_N start_POSTSUBSCRIPT roman_c end_POSTSUBSCRIPT number of OFDM subcarriers Nrsubscript𝑁rN_{\mathrm{r}}italic_N start_POSTSUBSCRIPT roman_r end_POSTSUBSCRIPT number of receiving antenna elements
fnsubscript𝑓𝑛f_{n}italic_f start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT subcarrier index {0,,Nc1}absent0subscript𝑁c1\in\{0,\ldots,N_{\mathrm{c}}-1\}∈ { 0 , … , italic_N start_POSTSUBSCRIPT roman_c end_POSTSUBSCRIPT - 1 } ht,m(fn)subscript𝑡𝑚subscript𝑓𝑛h_{t,m}(f_{n})italic_h start_POSTSUBSCRIPT italic_t , italic_m end_POSTSUBSCRIPT ( italic_f start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ) CFR of the m𝑚mitalic_m-th antenna at subcarrier fnsubscript𝑓𝑛f_{n}italic_f start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT
L𝐿Litalic_L number of downlink channel propagation paths |gt,l|subscript𝑔𝑡𝑙|g_{t,l}|| italic_g start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT | signal strength of the l𝑙litalic_l-th path
τt,lsubscript𝜏𝑡𝑙\tau_{t,l}italic_τ start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT ToA of the l𝑙litalic_l-th path at time t𝑡titalic_t θt,lsubscript𝜃𝑡𝑙\theta_{t,l}italic_θ start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT AoA of the l𝑙litalic_l-th path at time t𝑡titalic_t
𝐚r()subscript𝐚r\mathbf{a}_{\mathrm{r}}(\cdot)bold_a start_POSTSUBSCRIPT roman_r end_POSTSUBSCRIPT ( ⋅ ) steering vector of the antenna array 𝐡t(fn)subscript𝐡𝑡subscript𝑓𝑛\mathbf{h}_{t}(f_{n})bold_h start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( italic_f start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ) CFR at time t𝑡titalic_t on subcarrier fnsubscript𝑓𝑛f_{n}italic_f start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT
𝐲t(fn)subscript𝐲𝑡subscript𝑓𝑛\mathbf{y}_{t}(f_{n})bold_y start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( italic_f start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ) signal received by the smartphone at time t𝑡titalic_t from the IoT device s(fn)𝑠subscript𝑓𝑛s(f_{n})italic_s ( italic_f start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ) known training symbol (assumed to be 1111)
𝐰t(fn)subscript𝐰𝑡subscript𝑓𝑛\mathbf{w}_{t}(f_{n})bold_w start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( italic_f start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ) other unresolvable multipath interference and additive white Gaussian noise 𝐳t,lsubscript𝐳𝑡𝑙\mathbf{z}_{t,l}bold_z start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT multipath channel parameters of the l𝑙litalic_l-th path at time t𝑡titalic_t
TABLE II: List of Main Acronyms
Acronym Definition Acronym Definition
AD anomaly detection AoA angle of arrival
AnoDetNet Anomaly Detection Network BiLSTM bidirectional long short-term memory
CFR channel frequency response CSI channel state information
CDF cumulative distribution function GPS global positioning system
IoT internet of things LoS line of sight
LoS-AoA line of sight angle of arrival LoSEstNet LoS-AoA estimation network
LS least squares method NLoS non-line of sight
NOMP newton orthogonal matching pursuit OFDM orthogonal frequency division multiplexing
OLoS obstructed line of sight RSS received signal strength
ToA time of arrival UWB ultra-wideband

I-A Background and Motivations

Indoor localization is integral to Internet of Things (IoT) applications, encompassing smart homes[1] patient and medical staff tracking in smart hospitals [2], machine and asset tracking systems in smart factories [3], indoor navigation in shop** malls [4], and people tracking systems in challenging environments like mines, tunnels, and construction sites [5]. These applications fundamentally rely on the localization of IoT devices. While the Global Positioning System (GPS) [6] offers precise outdoor location tracking, its efficacy diminishes indoors due to signal obstructions disrupting line-of-sight (LoS) paths to satellites. Moreover, the high cost and power consumption of GPS-capable devices make it impractical for all IoT devices to have GPS capability [7].

In response to these limitations, the research community has pursued a diverse array of indoor localization methods, such as radio frequency identification, IMU [8], Wi-Fi localization [9], Bluetooth localization [10], visible light[11], geomagnetic localization [12], ultra-wideband localization [13] and infrared localization [14]. Among these, Wi-Fi technology stands out due to its utilization of existing network infrastructure and the omnipresence of Wi-Fi beacons, which are available without subscription, thus presenting a cost-efficient approach [15]. Given these advantages, our study concentrates on the exploration and enhancement of Wi-Fi-based localization technologies.

Recently, Wi-Fi localization systems leveraging channel state information (CSI) have achieved decimeter-level accuracy [16, 17]. The fundamental principle behind CSI localization involves deriving the angle-of-arrival (AoA) and subsequently estimating the target’s location using geometric methods. However, this approach often depends on support from existing infrastructures or networks, such as Wi-Fi access points (APs) serving as anchor points [18, 19, 20, 21, 22, 23, 16]. When anchor points are moved, recalibrating the spatial attributes of these devices becomes inconvenient [16].

Smartphones, equipped with motion sensors such as accelerometers, gyroscopes, and magnetometers, have the potential to serve as anchor points through their self-localization capabilities [24], facilitating direct localization of IoT devices. The smartphone-assisted localization algorithm (SALA) used a smartphone solely as a mobile beacon, employing its motion sensor data to track its position [25]. The smartphone collected response messages from nearby IoT devices for localization purposes. However, SALA does not account for complex multipath scenarios and relies on precise power and distance relationships. The easy AP position (EasyAPPos) system achieves precise target position estimation, leveraging smartphone technology using CSI [26]. Nonetheless, significant trajectory movement is required to maintain optimal LoS conditions, leading to inefficient data utilization and increased complexity and response times. In this study, we aim to utilize short trajectories (less than 5 meters) to achieve the localization of IoT devices in complex environments.

I-B Challenges and Research Gaps

According to the IEEE 802.11 protocol, Wi-Fi beacon frames, modulated using orthogonal frequency division multiplexing (OFDM), serve as management frames within the Wi-Fi network. IoT devices utilizing Wi-Fi periodically broadcast these frames to announce the network’s presence and its fundamental parameters [27]. By capturing these beacon signals, smartphones can determine their spatial relationship with IoT devices, extracting location-related information such as time of arrival (ToA), AoA, and received signal strength (RSS) using algorithms like multi-signal classification [28] and Newton orthogonal matching pursuit (NOMP) [29]. Theoretically, smartphones could localize IoT devices precisely using this location-related information. However, practical applications face several challenges:

  • Lack of Timing Synchronization: In real-world scenarios, the absence of clock synchronization between IoT devices and smartphones means that ToA metrics represent only relative values, rendering direct distance map** unfeasible [30].

  • Obstructed LoS Situations: Indoor environments are filled with numerous obstacles, such as glass walls, wooden partitions, and columns. These can obstruct the LoS, causing signal strength to significantly decrease or vanish. Consequently, non-LoS (NLoS) paths might be misidentified as LoS paths, leading to considerable inaccuracies in extracting location-related information [31].

  • Limited Bandwidth and Angular Resolution: The bandwidth of Wi-Fi beacons is 20MHz, insufficient to resolve paths with a distance difference of less than 15 meters [32]. Furthermore, smartphones, typically equipped with only 2 or 3 antennas, face limitations in size, resulting in relatively coarse angular resolution. These factors complicate obtaining precise location-related information [26].

Acknowledging these obstacles, particularly the impracticality of ToA due to timing synchronization issues and the complexities of accurate path loss modeling for RSS, we shift our focus to employing LoS-AoA measurements for the localization of IoT devices. Although AoA localization provides a strategy to navigate the synchronization challenge, the difficulties—stemming from obstructed LoS situations and limitations in bandwidth and angular resolution—remain formidable. Specially, our approach to IoT device localization, which is predicated on trajectory-based methods and deals with closely spaced trajectory points, underscores the necessity for highly accurate LoS-AoA measurements to attain precise localization. The key variables and abbreviations are succinctly presented in Table I and Table II.

I-C Contributions

In addressing the outlined challenges, we present a streamlined solution for localizing IoT devices through brief, continuous mobility trajectories of smartphones 111Simulation codes are provided in https://github.com/Lii-Yan/IoT-AP-Localization-WiFi-CSI. This method combines CSI and anomaly detection to refine LoS-AoA estimation effectively. Our key contributions include:

  • Accurate LoS-AoA Estimation: We utilize the NOMP algorithm to extract location-related information and establish the corresponding parameter matrix. Subsequently, we introduce the LoS-AoA Estimation Network (LoSEstNet), which integrates the parameter matrix of CSI from nearby trajectory points to estimate LoS-AoA. Our study demonstrates that this fusion process significantly improves the accuracy of LoS-AoA estimation across various scenarios, thereby enhancing the precision of IoT device localization.

  • Anomaly Detection: Although the proposed LoSEstNet exhibits high performance, its efficiency decreases in obstructed LoS situations or in the presence of severe complex multipath channels. To mitigate this issue, we present an Anomaly Detection Network (AnoDetNet), designed specifically for the LoSEstNet. AnoDetNet employs the feature extraction module of the LoSEstNet to extract CSI features and reconstructs the features of a trajectory segment in reverse, calculating the reconstruction error. A strong correlation between reconstruction error and LoS-AoA estimation accuracy allows us to use this error to refine LoS-AoA estimations, effectively navigating environmental constraints.

  • Experimental Validation: Our proposed solution is trained and tested using both simulated data and a real Wi-Fi system setup, requiring no parameter adjustments for immediate application. Experimental results demonstrate the effectiveness of our method with real-world data, achieving approximately 90% accuracy even under challenging conditions. This underscores the robustness of our approach in both simulated and real-world environments.

II Related Work

Before delving into the specifics of our proposed solutions, this section provides an overview of previous research in the field of Wi-Fi localization and the evolution of anomaly detection techniques. Localization systems primarily rely on two core signal measurements: RSS and CSI.

Initially, RSS-based methods were favored for indoor localization due to their cost-effectiveness, extensive coverage, and no requirement for additional hardware [33, 34]. Research focused on the log-distance path loss model and alternative approaches for estimating propagation distances from RSS measurements [35, 36, 37, 38, 39]. However, these methods often faced significant inaccuracies due to complex multipath effects, resulting in errors in path loss model parameters and, consequently, substantial inaccuracies in distance estimates based on RSS. A study [40] introduced a gradient-based technique for locating rogue IoT devices by identifying negative gradients and applying triangulation. Yet, the accuracy of this approach critically depends on the correct estimation of gradient direction, with any misjudgment making the IoT devices unlocatable.

In contrast, CSI offers more robust features for localization, especially in multipath and indoor noise environments [41]. Recent systems have implemented autonomous map** of Wi-Fi infrastructure using CSI, requiring specialized antenna arrangements or autonomous robots, which may not always be practical [42, 43]. MapFi [16] proposed creating Wi-Fi maps in heterogeneous environments without site surveys, but it requires prior knowledge of specific Wi-Fi IoT device locations. Simultaneous Localization and Map** (SLAM) algorithms improve localization precision but rely on accurate sources and devices with higher resolution. EasyAPPos [26] introduced a lightweight positioning solution using a 1×2121\times 21 × 2 patch array antenna, but it requires manual antenna rotation and numerous trajectories for accurate positioning, presenting practical limitations.

Anomaly detection (AD) is crucial for eliminating low-quality data, thus reducing the data requirements for accurate localization. Anomalies in multivariate time series data have been extensively studied, with unsupervised learning approaches being preferred due to the diversity of abnormal data and labeling challenges. LSTM has been used for multivariate time series prediction in spacecraft data, with anomalies identified based on prediction error magnitudes [44]. The LSTM-based encoder-decoder architecture [45] leverages temporal correlations to detect abnormal patterns through reconstruction error evaluation. Other methods, like the deep autoencoder Gaussian mixture model [46] and the LSTM-VAE [47], have been developed for AD. However, these methods typically focus on singular data flows and may not directly apply to the multipath signals encountered in Wi-Fi localization. In this study, we design an AD solution tailored for CSI to complement our LoS-AoA estimation method, aiming to efficiently accomplish IoT devices localization with short smartphone trajectories.

III System Model and Problem Formulation

III-A Wi-Fi Signal Model

We consider an indoor scenario with multiple stationary Wi-Fi IoT devices adhering to the IEEE 802.11 protocol, which utilizes OFDM modulation to broadcast beacon frames. These frames are transmitted across a frequency range that spans Ncsubscript𝑁c{N_{\mathrm{c}}}italic_N start_POSTSUBSCRIPT roman_c end_POSTSUBSCRIPT subcarriers. A smartphone, equipped with Nrsubscript𝑁r{N_{\mathrm{r}}}italic_N start_POSTSUBSCRIPT roman_r end_POSTSUBSCRIPT antenna elements, leverages these Wi-Fi beacon frames for IoT device localization. At time slot t𝑡titalic_t, the channel frequency response (CFR) at subcarrier fn{0,,Nc1}subscript𝑓𝑛0subscript𝑁c1{{f_{n}}\in\{0,\ldots,{N_{\mathrm{c}}}-1\}}italic_f start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ∈ { 0 , … , italic_N start_POSTSUBSCRIPT roman_c end_POSTSUBSCRIPT - 1 } of the m𝑚mitalic_m-th antenna can be represented as:

ht,m(fn)=l=1Lgt,lej2πfnNcτt,lam(θt,l),subscript𝑡𝑚subscript𝑓𝑛superscriptsubscript𝑙1𝐿subscript𝑔𝑡𝑙superscript𝑒𝑗2𝜋subscript𝑓𝑛subscript𝑁csubscript𝜏𝑡𝑙subscript𝑎𝑚subscript𝜃𝑡𝑙h_{t,m}(f_{n})=\sum_{l=1}^{L}{{g_{t,l}}{e^{-j2\pi\frac{f_{n}}{N_{\mathrm{c}}}{% \tau_{t,l}}}}{{{a}}_{m}}({\theta_{t,l}})},italic_h start_POSTSUBSCRIPT italic_t , italic_m end_POSTSUBSCRIPT ( italic_f start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ) = ∑ start_POSTSUBSCRIPT italic_l = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_L end_POSTSUPERSCRIPT italic_g start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT italic_e start_POSTSUPERSCRIPT - italic_j 2 italic_π divide start_ARG italic_f start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT end_ARG start_ARG italic_N start_POSTSUBSCRIPT roman_c end_POSTSUBSCRIPT end_ARG italic_τ start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT end_POSTSUPERSCRIPT italic_a start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ( italic_θ start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT ) , (1)

where L𝐿Litalic_L denotes the number of downlink channel propagation paths, and |gt,l|2superscriptsubscript𝑔𝑡𝑙2|g_{t,l}|^{2}| italic_g start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT | start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT, τt,lsubscript𝜏𝑡𝑙\tau_{t,l}italic_τ start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT, and θt,lsubscript𝜃𝑡𝑙\theta_{t,l}italic_θ start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT symbolize the multipath channel parameters: RSS, ToA, and AoA of the l𝑙litalic_l-th path, respectively. am()subscript𝑎𝑚{{{a}}_{m}}(\cdot)italic_a start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ( ⋅ ) is the m𝑚mitalic_m-th element of the steering vector 𝐚r()Nr×1subscript𝐚rsuperscript𝑁r1\mathbf{a}_{\mathrm{r}}(\cdot)\in\mathbb{C}^{N{\mathrm{r}}\times 1}bold_a start_POSTSUBSCRIPT roman_r end_POSTSUBSCRIPT ( ⋅ ) ∈ blackboard_C start_POSTSUPERSCRIPT italic_N roman_r × 1 end_POSTSUPERSCRIPT.

Let 𝐡t(fn)=[ht,1(fn),ht,2(fn),,ht,Nr(fn)]Tsubscript𝐡𝑡subscript𝑓𝑛superscriptsubscript𝑡1subscript𝑓𝑛subscript𝑡2subscript𝑓𝑛subscript𝑡subscript𝑁rsubscript𝑓𝑛𝑇\mathbf{h}_{t}(f_{n})=[h_{t,1}(f_{n}),h_{t,2}(f_{n}),\ldots,h_{t,N_{\mathrm{r}% }}(f_{n})]^{T}bold_h start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( italic_f start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ) = [ italic_h start_POSTSUBSCRIPT italic_t , 1 end_POSTSUBSCRIPT ( italic_f start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ) , italic_h start_POSTSUBSCRIPT italic_t , 2 end_POSTSUBSCRIPT ( italic_f start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ) , … , italic_h start_POSTSUBSCRIPT italic_t , italic_N start_POSTSUBSCRIPT roman_r end_POSTSUBSCRIPT end_POSTSUBSCRIPT ( italic_f start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ) ] start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT denote the CFR at time slot t𝑡titalic_t on subcarrier fnsubscript𝑓𝑛{f_{n}}italic_f start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT. Consequently, the received signal of the smartphone for subcarrier fnsubscript𝑓𝑛{f_{n}}italic_f start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT from the IoT device is expressed as:

𝐲t(fn)=𝐡t(fn)s(fn)+𝐰t(fn),subscript𝐲𝑡subscript𝑓𝑛subscript𝐡𝑡subscript𝑓𝑛𝑠subscript𝑓𝑛subscript𝐰𝑡subscript𝑓𝑛{\mathbf{y}_{t}({f_{n}})=\mathbf{h}_{t}(f_{n})s({f_{n}})+\mathbf{w}_{t}({f_{n}% }),}bold_y start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( italic_f start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ) = bold_h start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( italic_f start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ) italic_s ( italic_f start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ) + bold_w start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( italic_f start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ) , (2)

where s(fn)𝑠subscript𝑓𝑛s({f_{n}})italic_s ( italic_f start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ) denotes the known training symbols, and for simplicity, we assume s(fn)=1𝑠subscript𝑓𝑛1s({f_{n}})=1italic_s ( italic_f start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ) = 1. 𝐰t(fn)subscript𝐰𝑡subscript𝑓𝑛\mathbf{w}_{t}({f_{n}})bold_w start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( italic_f start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ) encompasses the other unresolvable multipath interference and additive white Gaussian noise.

The multipath channel parameters for the l𝑙litalic_l-th path at time t𝑡titalic_t, including RSS, ToA, and AoA, are denoted as 𝐳t,l=[|gt,l|,τt,l,θt,l]subscript𝐳𝑡𝑙subscript𝑔𝑡𝑙subscript𝜏𝑡𝑙subscript𝜃𝑡𝑙\mathbf{z}_{t,l}=[|g_{t,l}|,{\tau_{t,l}},{\theta_{t,l}}]bold_z start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT = [ | italic_g start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT | , italic_τ start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT , italic_θ start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT ], encapsulating essential landmark information. Let 𝐳t=[𝐳t,0,,𝐳t,L1]subscript𝐳𝑡subscript𝐳𝑡0subscript𝐳𝑡𝐿1\mathbf{z}_{t}=[\mathbf{z}_{t,0},\ldots,\mathbf{z}_{t,L-1}]bold_z start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT = [ bold_z start_POSTSUBSCRIPT italic_t , 0 end_POSTSUBSCRIPT , … , bold_z start_POSTSUBSCRIPT italic_t , italic_L - 1 end_POSTSUBSCRIPT ] represent the array comprising the collection of parameters for L𝐿Litalic_L paths. Equations (1) and (2) demonstrate that the received signal, 𝐲t(fn)subscript𝐲𝑡subscript𝑓𝑛\mathbf{y}_{t}(f_{n})bold_y start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( italic_f start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ), can be leveraged to estimate multipath channel parameters, thereby enabling the precise localization of IoT devices.

III-B Problem Formulation

To precisely derive multipath channel parameters, we initially conduct an extraction process from the raw CSI measurements. This extraction process precedes the training phase and results in parameters that serve as input data for subsequent algorithms. Our modeling strategy aims at minimizing the disparity between the measured vector and the reference model, ensuring a close approximation of the measured CSI vector to the parametric model (1). This strategy is formalized as:

𝐳^t=argmin𝐳tJ(𝐳t),subscript^𝐳𝑡subscriptargsubscript𝐳𝑡𝐽subscript𝐳𝑡\hat{\mathbf{z}}_{t}=\operatorname*{arg\min}_{\mathbf{z}_{t}}J(\mathbf{z}_{t}),over^ start_ARG bold_z end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT = start_OPERATOR roman_arg roman_min end_OPERATOR start_POSTSUBSCRIPT bold_z start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_J ( bold_z start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ) , (3)

where

J(𝐳t)=fn=0Nc1𝐲t(fn)l=1Lgt,lej2πfnNcτt,l𝐚(θt,l)22.𝐽subscript𝐳𝑡superscriptsubscriptsubscript𝑓𝑛0subscript𝑁c1superscriptsubscriptnormsubscript𝐲𝑡subscript𝑓𝑛superscriptsubscript𝑙1𝐿subscript𝑔𝑡𝑙superscript𝑒𝑗2𝜋subscript𝑓𝑛subscript𝑁csubscript𝜏𝑡𝑙𝐚subscript𝜃𝑡𝑙22J(\mathbf{z}_{t})=\sum_{f_{n}=0}^{N_{\mathrm{c}}-1}\left\|\mathbf{y}_{t}(f_{n}% )-\sum_{l=1}^{L}{{g_{t,l}}{e^{-j2\pi\frac{f_{n}}{N_{\mathrm{c}}}{\tau_{t,l}}}}% \mathbf{a}({\theta_{t,l}})}\right\|_{2}^{2}.italic_J ( bold_z start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ) = ∑ start_POSTSUBSCRIPT italic_f start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT = 0 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N start_POSTSUBSCRIPT roman_c end_POSTSUBSCRIPT - 1 end_POSTSUPERSCRIPT ∥ bold_y start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( italic_f start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ) - ∑ start_POSTSUBSCRIPT italic_l = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_L end_POSTSUPERSCRIPT italic_g start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT italic_e start_POSTSUPERSCRIPT - italic_j 2 italic_π divide start_ARG italic_f start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT end_ARG start_ARG italic_N start_POSTSUBSCRIPT roman_c end_POSTSUBSCRIPT end_ARG italic_τ start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT end_POSTSUPERSCRIPT bold_a ( italic_θ start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT ) ∥ start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT . (4)

Specifically, we utilize the NOMP algorithm [48] to address the optimization problem outlined in (3), systematically extracting a set of multipath channel parameters, 𝐳^tsubscript^𝐳𝑡\hat{\mathbf{z}}_{t}over^ start_ARG bold_z end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT. The path with the higher measured gain or the shorter measured delay corresponds to a higher probability of LoS path, as represented by |g^t,l|subscript^𝑔𝑡𝑙|\hat{g}_{t,l}|| over^ start_ARG italic_g end_ARG start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT | and τ^t,lsubscript^𝜏𝑡𝑙\hat{\tau}_{t,l}over^ start_ARG italic_τ end_ARG start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT in 𝐳^tsubscript^𝐳𝑡\hat{\mathbf{z}}_{t}over^ start_ARG bold_z end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT. Utilizing 𝐳^tsubscript^𝐳𝑡\hat{\mathbf{z}}_{t}over^ start_ARG bold_z end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT as input for LoS-AoA estimation helps improve the accuracy of LoS-AoA estimation, which is crucial for the localization of IoT devices.

However, the presence of indoor obstacles often leads to the attenuation or complete loss of the LoS path, thereby complicating the identification of the LoS component among the multipath signals detected by the NOMP algorithm. In addition, the inherent limitations in Wi-Fi bandwidth and the finite number of antenna elements pose significant challenges to the precision of NOMP algorithm predictions, detrimentally affecting the overall accuracy of localization efforts. Consequently, our next steps involve the adoption of artificial intelligence technology to refine LoS-AoA estimation and to filter out less accurate LoS-AoA estimations, thus ensuring more precise localization. The core workflow of our algorithm is summarized below:

Algorithm 1 Pseudocode

(a) LoS-AoA Estimation:

0:  The outcomes of the NOMP algorithm for a trajectory comprising N𝑁Nitalic_N points [𝐳^1,,𝐳^N]subscript^𝐳1subscript^𝐳𝑁[\hat{\mathbf{z}}_{1},\ldots,\hat{\mathbf{z}}_{N}][ over^ start_ARG bold_z end_ARG start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , over^ start_ARG bold_z end_ARG start_POSTSUBSCRIPT italic_N end_POSTSUBSCRIPT ] with dimensions N×L×3𝑁𝐿3N\times L\times 3italic_N × italic_L × 3.
1:  Transform θt,lsubscript𝜃𝑡𝑙\theta_{t,l}italic_θ start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT using its sine and cosine components, changing the dimensions of [𝐳^1,,𝐳^N]subscript^𝐳1subscript^𝐳𝑁[\hat{\mathbf{z}}_{1},\ldots,\hat{\mathbf{z}}_{N}][ over^ start_ARG bold_z end_ARG start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , over^ start_ARG bold_z end_ARG start_POSTSUBSCRIPT italic_N end_POSTSUBSCRIPT ] to N×L×4𝑁𝐿4N\times L\times 4italic_N × italic_L × 4.
2:  for n=1𝑛1n=1italic_n = 1 to N𝑁Nitalic_N do
3:     Extract channel parameter features from 𝐳^nsubscript^𝐳𝑛\hat{\mathbf{z}}_{n}over^ start_ARG bold_z end_ARG start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT using Convolutional Module.
4:     Use Linear Layer Module for feature dimension reduction.
5:  end for
6:  Obtain [𝐱^(1),𝐱^(2),𝐱^(3),,𝐱^(N)]superscript^𝐱1superscript^𝐱2superscript^𝐱3superscript^𝐱𝑁[\hat{\mathbf{x}}^{(1)},\hat{\mathbf{x}}^{(2)},\hat{\mathbf{x}}^{(3)},\ldots,% \hat{\mathbf{x}}^{(N)}][ over^ start_ARG bold_x end_ARG start_POSTSUPERSCRIPT ( 1 ) end_POSTSUPERSCRIPT , over^ start_ARG bold_x end_ARG start_POSTSUPERSCRIPT ( 2 ) end_POSTSUPERSCRIPT , over^ start_ARG bold_x end_ARG start_POSTSUPERSCRIPT ( 3 ) end_POSTSUPERSCRIPT , … , over^ start_ARG bold_x end_ARG start_POSTSUPERSCRIPT ( italic_N ) end_POSTSUPERSCRIPT ] from the above results.
7:  BiLSTM Module merges features from both preceding and succeeding trajectory points.
7:  The estimation vector of size N×2𝑁2N\times 2italic_N × 2, where the data at position N/2𝑁2N/2italic_N / 2 represents the sine and cosine values of LoS-AoA estimation for the trajectory point at position N/2𝑁2N/2italic_N / 2, which can be converted to the angle using the arctangent function.

(b) AD:

0:  The outcomes of the NOMP algorithm for a trajectory comprising N𝑁Nitalic_N points [𝐳^1,,𝐳^N]subscript^𝐳1subscript^𝐳𝑁[\hat{\mathbf{z}}_{1},\ldots,\hat{\mathbf{z}}_{N}][ over^ start_ARG bold_z end_ARG start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , over^ start_ARG bold_z end_ARG start_POSTSUBSCRIPT italic_N end_POSTSUBSCRIPT ] with dimensions N×L×3𝑁𝐿3N\times L\times 3italic_N × italic_L × 3.
1:  Transform θt,lsubscript𝜃𝑡𝑙\theta_{t,l}italic_θ start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT using its sine and cosine components, changing the dimensions of [𝐳^1,,𝐳^N]subscript^𝐳1subscript^𝐳𝑁[\hat{\mathbf{z}}_{1},\ldots,\hat{\mathbf{z}}_{N}][ over^ start_ARG bold_z end_ARG start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , over^ start_ARG bold_z end_ARG start_POSTSUBSCRIPT italic_N end_POSTSUBSCRIPT ] to N×L×4𝑁𝐿4N\times L\times 4italic_N × italic_L × 4.
2:  for n=1𝑛1n=1italic_n = 1 to N𝑁Nitalic_N do
3:     Extract channel parameter features from 𝐳^nsubscript^𝐳𝑛\hat{\mathbf{z}}_{n}over^ start_ARG bold_z end_ARG start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT using the Convolutional Module.
4:     Use the Linear Layer Module for feature dimension reduction.
5:  end for
6:  Obtain [𝐱^(1),𝐱^(2),𝐱^(3),,𝐱^(N)]superscript^𝐱1superscript^𝐱2superscript^𝐱3superscript^𝐱𝑁[\hat{\mathbf{x}}^{(1)},\hat{\mathbf{x}}^{(2)},\hat{\mathbf{x}}^{(3)},\ldots,% \hat{\mathbf{x}}^{(N)}][ over^ start_ARG bold_x end_ARG start_POSTSUPERSCRIPT ( 1 ) end_POSTSUPERSCRIPT , over^ start_ARG bold_x end_ARG start_POSTSUPERSCRIPT ( 2 ) end_POSTSUPERSCRIPT , over^ start_ARG bold_x end_ARG start_POSTSUPERSCRIPT ( 3 ) end_POSTSUPERSCRIPT , … , over^ start_ARG bold_x end_ARG start_POSTSUPERSCRIPT ( italic_N ) end_POSTSUPERSCRIPT ] from the above results.
7:  𝐬e(0)𝟎3×1superscriptsubscript𝐬e0subscript031\mathbf{s}_{\mathrm{e}}^{(0)}\leftarrow\mathbf{0}_{3\times 1}bold_s start_POSTSUBSCRIPT roman_e end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( 0 ) end_POSTSUPERSCRIPT ← bold_0 start_POSTSUBSCRIPT 3 × 1 end_POSTSUBSCRIPT.
8:  for n=1𝑛1n=1italic_n = 1 to N𝑁Nitalic_N do
9:     𝐬e(n)LSTM(𝐱(n),𝐬e(n1))superscriptsubscript𝐬e𝑛LSTMsuperscript𝐱𝑛superscriptsubscript𝐬e𝑛1\mathbf{s}_{\mathrm{e}}^{(n)}\leftarrow\text{LSTM}(\mathbf{x}^{(n)},\mathbf{s}% _{\mathrm{e}}^{(n-1)})bold_s start_POSTSUBSCRIPT roman_e end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT ← LSTM ( bold_x start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT , bold_s start_POSTSUBSCRIPT roman_e end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_n - 1 ) end_POSTSUPERSCRIPT ).
10:  end for
11:  Set 𝐬d(N)=𝐬e(N)superscriptsubscript𝐬d𝑁superscriptsubscript𝐬e𝑁\mathbf{s}_{\mathrm{d}}^{(N)}=\mathbf{s}_{\mathrm{e}}^{(N)}bold_s start_POSTSUBSCRIPT roman_d end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_N ) end_POSTSUPERSCRIPT = bold_s start_POSTSUBSCRIPT roman_e end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_N ) end_POSTSUPERSCRIPT.
12:  𝐱^(N)=𝐰𝐬d(N)+𝐛superscript^𝐱𝑁𝐰superscriptsubscript𝐬d𝑁𝐛\hat{\mathbf{x}}^{(N)}=\mathbf{w}\,\mathbf{s}_{\mathrm{d}}^{(N)}+\mathbf{b}over^ start_ARG bold_x end_ARG start_POSTSUPERSCRIPT ( italic_N ) end_POSTSUPERSCRIPT = bold_w bold_s start_POSTSUBSCRIPT roman_d end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_N ) end_POSTSUPERSCRIPT + bold_b.
13:  for n=N1𝑛𝑁1n=N-1italic_n = italic_N - 1 to 1111 do
14:     𝐱^(n)LSTM(𝐱^(n+1),𝐬d(n+1))superscript^𝐱𝑛LSTMsuperscript^𝐱𝑛1superscriptsubscript𝐬d𝑛1\hat{\mathbf{x}}^{(n)}\leftarrow\text{LSTM}(\hat{\mathbf{x}}^{(n+1)},\mathbf{s% }_{\mathrm{d}}^{(n+1)})over^ start_ARG bold_x end_ARG start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT ← LSTM ( over^ start_ARG bold_x end_ARG start_POSTSUPERSCRIPT ( italic_n + 1 ) end_POSTSUPERSCRIPT , bold_s start_POSTSUBSCRIPT roman_d end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_n + 1 ) end_POSTSUPERSCRIPT ).
15:  end for
15:  Reconstruction error =n=1N𝐗(n)𝐗^(n)2superscriptsubscript𝑛1𝑁superscriptnormsuperscript𝐗𝑛superscript^𝐗𝑛2\mathcal{E}=\sum_{n=1}^{N}\|{\mathbf{X}}^{(n)}-\hat{\mathbf{X}}^{(n)}\|^{2}caligraphic_E = ∑ start_POSTSUBSCRIPT italic_n = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N end_POSTSUPERSCRIPT ∥ bold_X start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT - over^ start_ARG bold_X end_ARG start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT ∥ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT.

(c) IoT Device Localization:

0:  Trajectory points (an,bn)subscript𝑎𝑛subscript𝑏𝑛(a_{n},b_{n})( italic_a start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT , italic_b start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ) and corresponding LoS-AoA estimates θnsubscript𝜃𝑛\theta_{n}italic_θ start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT for n=1,2,,N𝑛12𝑁n=1,2,...,Nitalic_n = 1 , 2 , … , italic_N.
1:  Formulate 𝐀𝐀\mathbf{A}bold_A and 𝜷𝜷\bm{\beta}bold_italic_β matrices based on (8).
2:  Calculate LS solution 𝐩^^𝐩\hat{\mathbf{p}}over^ start_ARG bold_p end_ARG using 𝐩^=(𝐀T𝐀)1𝐀T𝜷^𝐩superscriptsuperscript𝐀T𝐀1superscript𝐀T𝜷\hat{\mathbf{p}}={({\mathbf{A}^{\mathrm{T}}}\mathbf{A})^{-1}}{\mathbf{A}^{% \mathrm{T}}}\bm{\beta}over^ start_ARG bold_p end_ARG = ( bold_A start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT bold_A ) start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT bold_A start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT bold_italic_β.
2:  Estimated position 𝐩^=(p^x,p^y)^𝐩subscript^𝑝xsubscript^𝑝y\hat{\mathbf{p}}=(\hat{p}_{\rm x},\hat{p}_{\rm y})over^ start_ARG bold_p end_ARG = ( over^ start_ARG italic_p end_ARG start_POSTSUBSCRIPT roman_x end_POSTSUBSCRIPT , over^ start_ARG italic_p end_ARG start_POSTSUBSCRIPT roman_y end_POSTSUBSCRIPT ) of the IoT device.

LoS-AoA Estimation: Accurate LoS-AoA estimation is crucial for effective localization. Hence, we develop LoSEstNet, a network designed to extract the LoS-AoA feature from 𝐳tsubscript𝐳𝑡\mathbf{z}_{t}bold_z start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT and to combine features from adjacent trajectory points, thereby enhancing LoS-AoA estimation accuracy.

AD: Anomalies during the CSI data collection phase are inevitable, and precise IoT localization requires the identification and removal of such anomalies. To this end, we introduce AnoDetNet, a network that reverse-reconstructs the input data for LoS-AoA estimation and assesses the reconstruction error. This error serves as the criterion for AD, enabling us to filter out less accurate LoS-AoA estimation results.

IoT Device Localization: Utilizing the smartphone’s positions and the estimated LoS-AoAs, we employ the simple least squares (LS) method for rapid and efficient localization of IoT devices.

The algorithms corresponding to each process are discussed in detail in the subsequent section.

IV Algorithm Design

IV-A LoS-AoA Estimation

Refer to caption
Figure 1: Architecture of LoSEstNet, utilized to enhance LoS-AoA estimation accuracy by leveraging adjacent trajectory points.

As previously discussed, the outcomes of the NOMP algorithm become less dependable in complex multipath scenarios or when the LoS path is absent. To address this, we enhance LoS-AoA estimation accuracy by leveraging the continuous variations in LoS-AoA, attributed to trajectory continuity. Specifically, we have designed LoSEstNet, a neural network that extracts relevant features from 𝐳tsubscript𝐳𝑡\mathbf{z}_{t}bold_z start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT associated with LoS-AoA and combines these features with those extracted from adjacent trajectory points. As a result, LoSEstNet produces estimates of sine and cosine values, thereby furnishing refined LoS-AoA estimates.

For a smartphone establishing a downlink channel with an IoT device, the NOMP algorithm extracts L𝐿Litalic_L paths signals, each described by 𝐳t,l=[|gt,l|,τt,l,θt,l]subscript𝐳𝑡𝑙subscript𝑔𝑡𝑙subscript𝜏𝑡𝑙subscript𝜃𝑡𝑙\mathbf{z}_{t,l}=[|g_{t,l}|,{\tau_{t,l}},{\theta_{t,l}}]bold_z start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT = [ | italic_g start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT | , italic_τ start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT , italic_θ start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT ]. It is important to note that the AoA values, θt,lsubscript𝜃𝑡𝑙\theta_{t,l}italic_θ start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT, should be treated as continuous angles, where θt,l=0subscript𝜃𝑡𝑙0\theta_{t,l}=0italic_θ start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT = 0 and θt,l=2πsubscript𝜃𝑡𝑙2𝜋\theta_{t,l}=2\piitalic_θ start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT = 2 italic_π represent the same physical angle despite their numerical difference. To address this discontinuity, we transform θt,lsubscript𝜃𝑡𝑙\theta_{t,l}italic_θ start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT using its sine and cosine components, providing a continuous representation as the angle changes. This transformation converts 𝐳tsubscript𝐳𝑡\mathbf{z}_{t}bold_z start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT into an L×4𝐿4L\times 4italic_L × 4 tensor, denoted by [|gt,l|,τt,l,cos(θt,l),sin(θt,l)]subscript𝑔𝑡𝑙subscript𝜏𝑡𝑙subscript𝜃𝑡𝑙subscript𝜃𝑡𝑙[|g_{t,l}|,{\tau_{t,l}},\cos{(\theta_{t,l})},\sin{(\theta_{t,l})}][ | italic_g start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT | , italic_τ start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT , roman_cos ( italic_θ start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT ) , roman_sin ( italic_θ start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT ) ]. For a trajectory comprising N𝑁Nitalic_N points, this transformation yields a parameter tensor with dimensions N×L×4𝑁𝐿4N\times L\times 4italic_N × italic_L × 4. This tensor acts as the input for the LoSEstNet, which then provides refined LoS-AoA estimates, particularly for the trajectory points positioned at N/2𝑁2N/2italic_N / 2, effectively optimizing the AoA estimation for the central points of short trajectories.

As depicted in Fig. 1, we assume that at each time step, a smartphone moves one trajectory point. LoSEstNet comprises three main modules: the convolutional module, the linear layer module, and the bidirectional long short-term memory (BiLSTM) module. For input data with dimensions N×L×4𝑁𝐿4{N\times L\times 4}italic_N × italic_L × 4, LoSEstNet initially employs the convolutional module to extract features from each multipath channel parameter tensor of size L×4𝐿4L\times 4italic_L × 4. This process embeds the reliability and numerical information of LoS-AoA, resulting in a feature map of size N×L×4𝑁𝐿4N\times L\times 4italic_N × italic_L × 4. The linear layer module further reduces the feature dimensions to N×3𝑁3N\times 3italic_N × 3. Subsequently, the BiLSTM module correlates these features, which shifts towards managing temporal sequences rather than merely extracting rough features. This refinement should enhance LoS-AoA estimation, relying on the continuous variations in LoS-AoA due to trajectory continuity, expected to be more reliable than individual trajectory points. The network produces an estimation vector of size N×2𝑁2N\times 2italic_N × 2, from which we take the data at position N/2𝑁2N/2italic_N / 2 as sine and cosine values of the LoS-AoA estimation result for the trajectory point at position N/2𝑁2N/2italic_N / 2, which can be converted to the angle using the arctangent function. A detailed description of each module follows:

Convolutional Module: At each trajectory point, a channel parameter tensor of dimensions L×4𝐿4L\times 4italic_L × 4 is established, containing LoS-AoA features such as reliability and AoA. For instance, when a specific path |gt,l|subscript𝑔𝑡𝑙|g_{t,l}|| italic_g start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT | surpasses others or when τt,lsubscript𝜏𝑡𝑙\tau_{t,l}italic_τ start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT is smaller, the probability of it being the LoS-AoA path increases. We employ one-dimensional convolution to merge L𝐿Litalic_L paths, enabling LoS-AoA feature extraction through convolution along the multipath signal count dimension (i.e., the L𝐿Litalic_L dimension). By using a 3×4343\times 43 × 4 one-dimensional convolutional kernel with appropriate padding, we generate a feature map while preserving the dimensions of L×4𝐿4L\times 4italic_L × 4. This enhanced feature representation significantly improves our LoS-AoA estimation accuracy. We apply the ReLU activation function after each convolutional layer to introduce the necessary nonlinearities into our network.

Linear Layer Module: AoA features, especially when associated with LoS paths, inherently do not demand high dimensionality. Reducing the dimensionality allows the neural network to capture more important features. After transforming the generated feature map into an N×4L𝑁4𝐿N\times 4Litalic_N × 4 italic_L tensor, we employ fully connected layers to reduce the dimensions to N×3𝑁3N\times 3italic_N × 3. This reduction in dimensions not only facilitates the neural network’s focus on critical features but also tends to enhance the performance of subsequent anomaly detection (AD) processes. Our experimental results indicate that selecting a dimensionality of 3333 strikes an optimal balance, effectively supporting AD performance while maintaining the integrity of LoS-AoA estimation accuracy.

BiLSTM Module: After obtaining refined LoS-AoA features from adjacent trajectory points, precise LoS-AoA estimation requires the fusion of these features. Incorporating the BiLSTM, which extends the LSTM model by integrating two LSTM layers to merge features from both preceding and succeeding trajectory points, plays a crucial role in this process. Hence, the BiLSTM is a fundamental component of our structure. Its primary function is to aggregate and process feature sequences from neighboring trajectory points, thus enhancing the model’s overall accuracy.

Considering that features closer to the trajectory being estimated are typically more crucial, we select the middle output of the BiLSTM as our final estimation result. This ensures that both LSTM layers of the BiLSTM consider the features of the point being estimated as their final input, attributing higher importance to them. Additionally, our previously introduced convolutional module effectively compensates for the BiLSTM’s limitations in feature extraction capabilities. The pseudocode of LoS-AoA estimation is summarized in Algorithm 1(a).

IV-B AD

While LoSEstNet significantly enhances LoS-AoA estimation by fusing multiple features of channel parameter tensors from proximate trajectory points, its performance might diminish when one or more trajectory points are exposed to complex multipath channels or experience the complete absence of LoS paths. Thus, it becomes imperative to accurately identify and eliminate data associated with these challenging factors. To address this, we classify sequences of 𝐳tsubscript𝐳𝑡\mathbf{z}_{t}bold_z start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT data containing these challenging factors as anomalous sequences, while sequences devoid of these issues are termed normal sequences.

Refer to caption
Figure 2: Architecture of AnoDetNet, designed for filtering out unreliable trajectory points in localization tasks.

Our work introduces an LSTM encoder-decoder AD network inspired by [45], to tackle this issue. As shown in Fig. 2, AnoDetNet leverages the temporal correlation present in continuous time series data and utilizes an autoencoder combined with LSTM for reverse reconstruction of sequences. Anomalous continuous time series typically exhibit significantly larger reconstruction errors compared to normal sequences, which is a useful pattern for AD. However, traditional AD algorithms are typically designed for simple data streams where anomalies are markedly greater or lesser than the surrounding data. These methods may not be well-suited for complex communication data. Therefore, a feature extraction tool for signal characterization is needed to enhance the distinctiveness of temporal sequence features.

Considering that AnoDetNet is designed to complement LoSEstNet, we explore utilizing the Convolutional Module and Linear Layer module from pre-trained LoSEstNet as depictedin Fig. 1 as a feature extractor. The same input data as that used by LoSEstNet, which comprises a parameter tensor representing a trajectory with dimensions of N×L×4𝑁𝐿4N\times L\times 4italic_N × italic_L × 4, is input into the feature extractor, yielding a tensor of size N×3𝑁3N\times 3italic_N × 3. Subsequently, the processed data undergoes filtration through AnoDetNet. Specifically, for the n𝑛nitalic_n-th trajectory point, we obtain the parameter 𝐳tsubscript𝐳𝑡\mathbf{z}_{t}bold_z start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT and extract features using the feature extractor to obtain 𝐱(n)3superscript𝐱𝑛superscript3{\mathbf{x}}^{(n)}\in\mathbb{R}^{3}bold_x start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT ∈ blackboard_R start_POSTSUPERSCRIPT 3 end_POSTSUPERSCRIPT. For a short trajectory of length N𝑁Nitalic_N, we generate a multi-dimensional time feature sequence [𝐱(1),𝐱(2),𝐱(3),,𝐱(N)]superscript𝐱1superscript𝐱2superscript𝐱3superscript𝐱𝑁[{\mathbf{x}}^{(1)},{\mathbf{x}}^{(2)},{\mathbf{x}}^{(3)},\ldots,{\mathbf{x}}^% {(N)}][ bold_x start_POSTSUPERSCRIPT ( 1 ) end_POSTSUPERSCRIPT , bold_x start_POSTSUPERSCRIPT ( 2 ) end_POSTSUPERSCRIPT , bold_x start_POSTSUPERSCRIPT ( 3 ) end_POSTSUPERSCRIPT , … , bold_x start_POSTSUPERSCRIPT ( italic_N ) end_POSTSUPERSCRIPT ]. Next, we perform feature inverse reconstruction by sequentially inputting the obtained time feature sequence into AnoDetNet for feature reconstruction, resulting in a reconstructed sequence [𝐱^(1),𝐱^(2),𝐱^(3),,𝐱^(N)]superscript^𝐱1superscript^𝐱2superscript^𝐱3superscript^𝐱𝑁[\hat{\mathbf{x}}^{(1)},\hat{\mathbf{x}}^{(2)},\hat{\mathbf{x}}^{(3)},\ldots,% \hat{\mathbf{x}}^{(N)}][ over^ start_ARG bold_x end_ARG start_POSTSUPERSCRIPT ( 1 ) end_POSTSUPERSCRIPT , over^ start_ARG bold_x end_ARG start_POSTSUPERSCRIPT ( 2 ) end_POSTSUPERSCRIPT , over^ start_ARG bold_x end_ARG start_POSTSUPERSCRIPT ( 3 ) end_POSTSUPERSCRIPT , … , over^ start_ARG bold_x end_ARG start_POSTSUPERSCRIPT ( italic_N ) end_POSTSUPERSCRIPT ]. Anomalous sequences can be identified by analyzing the reconstruction error:

=n=1N𝐱(n)𝐱^(n)2.superscriptsubscript𝑛1𝑁superscriptnormsuperscript𝐱𝑛superscript^𝐱𝑛2{\cal E}=\sum_{n=1}^{N}\|{\mathbf{x}}^{(n)}-\hat{\mathbf{x}}^{(n)}\|^{2}.caligraphic_E = ∑ start_POSTSUBSCRIPT italic_n = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N end_POSTSUPERSCRIPT ∥ bold_x start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT - over^ start_ARG bold_x end_ARG start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT ∥ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT . (5)

AnoDetNet comprises two LSTM-based layers: an encoder and a decoder. These layers are jointly trained to reverse-reconstruct the time series. The encoder learns a vector representation of the input time series, and the decoder utilizes this representation to reconstruct the time series. During the encoding phase, the initial hidden state of the LSTM units is set to a zero tensor. 𝐱(n)superscript𝐱𝑛{{\mathbf{x}}^{(n)}}bold_x start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT is input into the LSTM encoder to obtain the hidden state 𝐬e(n)csuperscriptsubscript𝐬e𝑛superscript𝑐{\mathbf{s}}_{\mathrm{e}}^{(n)}\in\mathbb{R}^{c}bold_s start_POSTSUBSCRIPT roman_e end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT ∈ blackboard_R start_POSTSUPERSCRIPT italic_c end_POSTSUPERSCRIPT, where c𝑐citalic_c is the number of LSTM units in the hidden layer of the encoder. 𝐬e(n)superscriptsubscript𝐬e𝑛{\mathbf{s}}_{\mathrm{e}}^{(n)}bold_s start_POSTSUBSCRIPT roman_e end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT serves as the initial state for the next LSTM unit. This process continues with the next input 𝐱(n+1)superscript𝐱𝑛1{{\mathbf{x}}^{(n+1)}}bold_x start_POSTSUPERSCRIPT ( italic_n + 1 ) end_POSTSUPERSCRIPT, obtaining 𝐬e(n+1)superscriptsubscript𝐬e𝑛1{\mathbf{s}}_{\mathrm{e}}^{(n+1)}bold_s start_POSTSUBSCRIPT roman_e end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_n + 1 ) end_POSTSUPERSCRIPT, until input 𝐱(N)superscript𝐱𝑁{{\mathbf{x}}^{(N)}}bold_x start_POSTSUPERSCRIPT ( italic_N ) end_POSTSUPERSCRIPT yields 𝐬e(N)superscriptsubscript𝐬e𝑁{\mathbf{s}}_{\mathrm{e}}^{(N)}bold_s start_POSTSUBSCRIPT roman_e end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_N ) end_POSTSUPERSCRIPT. The final state of the encoder, 𝐬e(N)superscriptsubscript𝐬e𝑁{\mathbf{s}}_{\mathrm{e}}^{(N)}bold_s start_POSTSUBSCRIPT roman_e end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_N ) end_POSTSUPERSCRIPT, is used as the initial state for the decoder, 𝐬d(N)superscriptsubscript𝐬d𝑁{\mathbf{s}}_{\mathrm{d}}^{(N)}bold_s start_POSTSUBSCRIPT roman_d end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_N ) end_POSTSUPERSCRIPT. A linear layer with weight matrix 𝐰𝐰\mathbf{w}bold_w of size 3×c3𝑐3\times c3 × italic_c and bias vector 𝐛3𝐛superscript3\mathbf{b}\in{\mathbb{R}}^{3}bold_b ∈ blackboard_R start_POSTSUPERSCRIPT 3 end_POSTSUPERSCRIPT on top of the LSTM decoder layer compute 𝐱^(N)=𝐰𝐬d(N)+𝐛superscript^𝐱𝑁𝐰superscriptsubscript𝐬d𝑁𝐛\hat{\mathbf{x}}^{(N)}=\mathbf{w}\,\mathbf{s}_{\mathrm{d}}^{(N)}+\mathbf{b}over^ start_ARG bold_x end_ARG start_POSTSUPERSCRIPT ( italic_N ) end_POSTSUPERSCRIPT = bold_w bold_s start_POSTSUBSCRIPT roman_d end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_N ) end_POSTSUPERSCRIPT + bold_b, which is then used as input for the encoder to obtain the state 𝐬d(N1)superscriptsubscript𝐬d𝑁1{\mathbf{s}}_{\mathrm{d}}^{(N-1)}bold_s start_POSTSUBSCRIPT roman_d end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_N - 1 ) end_POSTSUPERSCRIPT and predict 𝐱^(N1)superscript^𝐱𝑁1\hat{\mathbf{x}}^{(N-1)}over^ start_ARG bold_x end_ARG start_POSTSUPERSCRIPT ( italic_N - 1 ) end_POSTSUPERSCRIPT. During the decoding process, 𝐱^(n)superscript^𝐱𝑛\hat{\mathbf{x}}^{(n)}over^ start_ARG bold_x end_ARG start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT is utilized as input to obtain 𝐱^(n1)superscript^𝐱𝑛1\hat{\mathbf{x}}^{(n-1)}over^ start_ARG bold_x end_ARG start_POSTSUPERSCRIPT ( italic_n - 1 ) end_POSTSUPERSCRIPT and 𝐬d(n1)superscriptsubscript𝐬d𝑛1{\mathbf{s}}_{\mathrm{d}}^{(n-1)}bold_s start_POSTSUBSCRIPT roman_d end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_n - 1 ) end_POSTSUPERSCRIPT, ultimately yielding the reconstructed sequence. The model is trained to minimize the objective {\cal E}caligraphic_E. The pseudocode of AD is summarized in Algorithm 1(b).

The intuition here is that the encoder-decoder pair, during training, only sees normal sequences and learns to reconstruct them effectively. When sequences contain abnormal multipath channel parameters, they cannot be reconstructed well. Therefore, when presented with an unknown sequence, we can determine its usability for LoSEstNet based on the reconstruction error {\cal E}caligraphic_E. Our results show that AnoDetNet significantly enhances LoS-AoA estimation by effectively filtering out anomalies when used as an auxiliary tool. We will discuss this phenomenon in detail in Section V-C.

Refer to caption
Figure 3: Illustration of the Simulation Scenario: Fixed IoT devices and smartphones on the move, demonstrating various trajectories within the annotated area (enclosed by the blue box), showcasing the dynamic interaction essential for localization accuracy testing.

IV-C IoT Device Localization

After completing the LoS-AoA estimation, we use the smartphone’s trajectory points corresponding to the LoS-AoAs to establish an overdetermined equation system and solve for the IoT device’s estimated position. Due to its simplicity and low complexity, we employ the LS algorithm for rapid IoT device position estimation.

For the downlink channel, composed of signals transmitted from the IoT device located at (px,py)subscript𝑝xsubscript𝑝y(p_{\rm x},p_{\rm y})( italic_p start_POSTSUBSCRIPT roman_x end_POSTSUBSCRIPT , italic_p start_POSTSUBSCRIPT roman_y end_POSTSUBSCRIPT ) and received by the smartphone at (an,bn)subscript𝑎𝑛subscript𝑏𝑛(a_{n},b_{n})( italic_a start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT , italic_b start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ), the LoS-AoA can be represented as θnsubscript𝜃𝑛\theta_{n}italic_θ start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT. Based on the LoS-AoA definition, we can establish the equation as follows:

pybnpxan=tanθ.subscript𝑝ysubscript𝑏𝑛subscript𝑝xsubscript𝑎𝑛𝜃\frac{p_{\rm y}-b_{n}}{p_{\rm x}-a_{n}}=\tan\theta.divide start_ARG italic_p start_POSTSUBSCRIPT roman_y end_POSTSUBSCRIPT - italic_b start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT end_ARG start_ARG italic_p start_POSTSUBSCRIPT roman_x end_POSTSUBSCRIPT - italic_a start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT end_ARG = roman_tan italic_θ . (6)

Given multiple trajectory points, a system of equations is formulated as:

{pxtanθ1py=b1a1tanθ1,pxtanθ2py=b2a2tanθ2,pxtanθNpy=bNaNtanθN,casessubscript𝑝xsubscript𝜃1subscript𝑝yabsentsubscript𝑏1subscript𝑎1subscript𝜃1subscript𝑝xsubscript𝜃2subscript𝑝yabsentsubscript𝑏2subscript𝑎2subscript𝜃2missing-subexpressionsubscript𝑝xsubscript𝜃𝑁subscript𝑝yabsentsubscript𝑏𝑁subscript𝑎𝑁subscript𝜃𝑁\left\{\begin{array}[]{rl}p_{\rm x}\tan{\theta_{1}}-p_{\rm y}&=~{}{b_{1}}-{a_{% 1}}\tan{\theta_{1}},\\ p_{\rm x}\tan{\theta_{2}}-p_{\rm y}&=~{}{b_{2}}-{a_{2}}\tan{\theta_{2}},\\ &~{}\vdots\\ p_{\rm x}\tan{\theta_{N}}-p_{\rm y}&=~{}{b_{N}}-{a_{N}}\tan{\theta_{N}},\end{% array}\right.{ start_ARRAY start_ROW start_CELL italic_p start_POSTSUBSCRIPT roman_x end_POSTSUBSCRIPT roman_tan italic_θ start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT - italic_p start_POSTSUBSCRIPT roman_y end_POSTSUBSCRIPT end_CELL start_CELL = italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT - italic_a start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT roman_tan italic_θ start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , end_CELL end_ROW start_ROW start_CELL italic_p start_POSTSUBSCRIPT roman_x end_POSTSUBSCRIPT roman_tan italic_θ start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT - italic_p start_POSTSUBSCRIPT roman_y end_POSTSUBSCRIPT end_CELL start_CELL = italic_b start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT - italic_a start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT roman_tan italic_θ start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , end_CELL end_ROW start_ROW start_CELL end_CELL start_CELL ⋮ end_CELL end_ROW start_ROW start_CELL italic_p start_POSTSUBSCRIPT roman_x end_POSTSUBSCRIPT roman_tan italic_θ start_POSTSUBSCRIPT italic_N end_POSTSUBSCRIPT - italic_p start_POSTSUBSCRIPT roman_y end_POSTSUBSCRIPT end_CELL start_CELL = italic_b start_POSTSUBSCRIPT italic_N end_POSTSUBSCRIPT - italic_a start_POSTSUBSCRIPT italic_N end_POSTSUBSCRIPT roman_tan italic_θ start_POSTSUBSCRIPT italic_N end_POSTSUBSCRIPT , end_CELL end_ROW end_ARRAY (7)

where N𝑁Nitalic_N represents the number of trajectory points, with (an,bn)subscript𝑎𝑛subscript𝑏𝑛(a_{n},b_{n})( italic_a start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT , italic_b start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ) and θnsubscript𝜃𝑛\theta_{n}italic_θ start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT indicating the position and the estimated LoS-AoA for the n𝑛nitalic_n-th trajectory point, respectively. Equation (7) can be can be compactly expressed as:

𝐀𝐩=𝜷,𝐀𝐩𝜷\mathbf{A}\mathbf{p}=\bm{\beta},bold_Ap = bold_italic_β , (8)

where

𝐀=[tanθ11tanθ21tanθN1],𝜷=[b1a1tanθ1b2a2tanθ2bNaNtanθN]and 𝐩=[pxpy].formulae-sequence𝐀matrixsubscript𝜃11subscript𝜃21subscript𝜃𝑁1𝜷matrixsubscript𝑏1subscript𝑎1subscript𝜃1subscript𝑏2subscript𝑎2subscript𝜃2subscript𝑏𝑁subscript𝑎𝑁subscript𝜃𝑁and 𝐩matrixsubscript𝑝xsubscript𝑝y\displaystyle{\mathbf{A}}=\begin{bmatrix}\tan{\theta_{1}}&-1\\ \tan{\theta_{2}}&-1\\ \vdots&\vdots\\ \tan{\theta_{N}}&-1\end{bmatrix}\!\!,{\bm{\beta}}=\begin{bmatrix}{b_{1}}-{a_{1% }}\tan{\theta_{1}}\\ {b_{2}}-{a_{2}}\tan{\theta_{2}}\\ \vdots\\ {b_{N}}-{a_{N}}\tan{\theta_{N}}\end{bmatrix}\!\text{and }\!{\mathbf{p}}=\begin% {bmatrix}p_{\rm x}\\ p_{\rm y}\end{bmatrix}\!.bold_A = [ start_ARG start_ROW start_CELL roman_tan italic_θ start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_CELL start_CELL - 1 end_CELL end_ROW start_ROW start_CELL roman_tan italic_θ start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT end_CELL start_CELL - 1 end_CELL end_ROW start_ROW start_CELL ⋮ end_CELL start_CELL ⋮ end_CELL end_ROW start_ROW start_CELL roman_tan italic_θ start_POSTSUBSCRIPT italic_N end_POSTSUBSCRIPT end_CELL start_CELL - 1 end_CELL end_ROW end_ARG ] , bold_italic_β = [ start_ARG start_ROW start_CELL italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT - italic_a start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT roman_tan italic_θ start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_CELL end_ROW start_ROW start_CELL italic_b start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT - italic_a start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT roman_tan italic_θ start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT end_CELL end_ROW start_ROW start_CELL ⋮ end_CELL end_ROW start_ROW start_CELL italic_b start_POSTSUBSCRIPT italic_N end_POSTSUBSCRIPT - italic_a start_POSTSUBSCRIPT italic_N end_POSTSUBSCRIPT roman_tan italic_θ start_POSTSUBSCRIPT italic_N end_POSTSUBSCRIPT end_CELL end_ROW end_ARG ] and bold_p = [ start_ARG start_ROW start_CELL italic_p start_POSTSUBSCRIPT roman_x end_POSTSUBSCRIPT end_CELL end_ROW start_ROW start_CELL italic_p start_POSTSUBSCRIPT roman_y end_POSTSUBSCRIPT end_CELL end_ROW end_ARG ] .

The LS solution of (8) is given by

𝐩^=(𝐀T𝐀)1𝐀T𝜷.^𝐩superscriptsuperscript𝐀T𝐀1superscript𝐀T𝜷\hat{\mathbf{p}}={({\mathbf{A}^{\mathrm{T}}}\mathbf{A})^{-1}}{\mathbf{A}^{% \mathrm{T}}}\bm{\beta}.over^ start_ARG bold_p end_ARG = ( bold_A start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT bold_A ) start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT bold_A start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT bold_italic_β . (9)

Matrix 𝐀𝐀\mathbf{A}bold_A is mostly non-singular, ensuring a unique solution for 𝐩^^𝐩\hat{\mathbf{p}}over^ start_ARG bold_p end_ARG. Given the utilization of relatively short trajectories, characterized by limited and closely spaced trajectory points, any inaccuracies in LoS-AoA estimation can markedly affect the IoT device localization. Therefore, there are stringent requirements regarding LoS-AoA accuracy to achieve swift localization, especially when dealing with short trajectories. The pseudocode of LS algorithm for localization is summarized in Algorithm 1(c).

V Simulations and Discussions

In this section, we evaluate the performance of LoSEstNet and AnoDetNet across various channel condition scenarios utilizing ray-tracing techniques. We begin by presenting the simulation settings, which encompass channel generation and neural network training specifics. Subsequently, we delve into the proposed LoS-AoA estimation and AD, followed by the presentation of localization results.

Refer to caption
Figure 4: Comparison of Reconstruction Error {\cal E}caligraphic_E in AnoDetNet Based on LoS-AoA Estimation Errors: Error <15absentsuperscript15<15^{\circ}< 15 start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT vs. Error >15absentsuperscript15>15^{\circ}> 15 start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT in LoSEstNet.
Refer to caption
Figure 5: CDF comparison of various LoS-AoA estimation methods within the annotated area shown in Fig. 3.
TABLE III: Explanation of LoS-AoA Estimation Methods
LoS-AoA Method Explanation
RSS estimation Selects AoA of the path with the highest gain as the LoS path based on the NOMP algorithm.
ToA estimation Selects AoA of the path with the minimum ToA as the LoS path based on the NOMP algorithm.
FC network Estimates LoS-AoA by a neural network comprising two hidden layers with 128 units each, using ReLU activation.
NEAR estimation Selects AoA of the path closest to that of the ideal LoS path based on the NOMP algorithm.
LoSEstNet Estimates LoS-AoA by LoSEstNet utilizing continuous variations in LoS-AoA related to trajectory continuity.
AD-LoSEstNet Enhances LoSEstNet by eliminating abnormal sequences via AnoDetNet.
TABLE IV: Comparative Performance Analysis of Various LoS-AoA Estimation Methods
RSS ToA FC NEAR LoSEstNet AD-LoSEstNet ρ𝜌\rhoitalic_ρ
A1 4.97 63.71 6.37 4.4 2.27 2.27 16/16
A2 5.28 63.33 5.09 5.03 2.96 2.96 16/16
B1 23.63 61.72 22.54 5.63 5.93 2.59 8/16
B2 15.77 48.70 16.27 10.66 4.17 1.98 10/16
C1 40.90 98.70 42.06 11.58 5.69 3.33 7/16
C2 28.49 59.44 28.06 14.61 24.38 3.42 9/16

V-A Simulation Settings

To conduct a comprehensive evaluation, we perform computer simulations using Wireless Insite software [49], which utilizes ray-tracing techniques. We simulate a 5.805 GHz OFDM system, adhering to the IEEE 802.11a standard [50], with a 20 MHz channel bandwidth and 312.5 kHz subcarrier spacing. The environment modeled is an indoor office, depicted in Fig. 3222Simulation data are provided in https://github.com/CoLoSNet/Extractor. This office has a ceiling height of 2.62 meters, and its structure incorporates walls made of glass, wood, and concrete. Notably, the central concrete wall is 15 cm thick, contrasting with the other concrete walls, which are 30 cm thick. Within this environment, IoT devices are positioned at 10 distinct locations, each equipped with a vertical dipole antenna. The smartphone, outfitted with a triangular arrangement of omnidirectional patch antennas [30], is placed at a height of 1.2 meters. To facilitate our experiments, the indoor floor plan is discretized into grids with 0.2-meter spacing, along which the smartphone traverses during simulations. Given smartphones’ embedded motion sensors, including accelerometers, gyroscopes, and magnetometers, precise self-localization is achievable [24], allowing us to assume known initial points on each trajectory, obtained via the phone’s positioning system.

For training LoSEstNet and AnoDetNet, we establish N𝑁Nitalic_N and L𝐿Litalic_L as 5, indicating that each trajectory segment consists of 5 trajectory points, with 5 multipath signals extracted at each point. Considering deep neural networks’ propensity for overfitting on abnormal sequences, potentially impairing generalization [51], we enforce two criteria to ensure the training dataset predominantly contains normal sequences:

  • Criteria 1: Within each trajectory point, among the 5 paths identified by the NOMP algorithm, at least one signal must represent a LoS path, with LoS-AoA estimation errors less than 10superscript1010^{\circ}10 start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT.

  • Criteria 2: The path with the highest gain among signals collected at all trajectory points must exceed 8080-80- 80 dBm.

To ensure the diversity of the training dataset, we specifically selected IoT devices 1, 2, 6, 7, 8, and 10, generating 500 trajectories for each. This selection process results in a comprehensive training set comprising 3,000 trajectories. Criteria 1 necessitates the inclusion of actual locations of smartphones and IoT devices in the training dataset while Criteria 2 depends solely on the estimations provided by the NOMP algorithm, denoted as 𝐳^tsubscript^𝐳𝑡\hat{\mathbf{z}}_{t}over^ start_ARG bold_z end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT, to identify the path exhibiting the highest signal gain. Therefore, only a training dataset that simultaneously satisfies both Criteria 1 and Criteria 2 can be created, whereas other datasets can only satisfy Criterion 2.

Hyperparameters such as the learning rate, batch size, and training epochs are configured at 0.0001, 8, and 100, respectively, with the learning rate scheduled to decrease by 0.85 every 5 epochs. The Adam optimizer, known for its efficacy, is employed for the training process. The model that exhibits the best performance on the validation set during training is selected as the final model. Considering the smartphone’s limited movement distance, its location is assumed to be accurately known. LoSEstNet and AnoDetNet utilize the same training dataset and hyperparameters during the training phase.

For establishing a threshold on the reconstruction error {\cal E}caligraphic_E to identify anomalous sequences, a heuristic simulation approach is undertaken. Specifically, based on Criteria 2, 500 trajectories of length N𝑁Nitalic_N are generated for each of the aforementioned IoT devices. These trajectories are then evaluated using the trained LoSEstNet and AnoDetNet to investigate the relationship between the {\cal E}caligraphic_E of each trajectory’s feature sequence and the LoS-AoA estimation errors at position N/2𝑁2N/2italic_N / 2. As depicted in Fig. 4, the solid red line represents LoS-AoA estimation errors <15absentsuperscript15<15^{\circ}< 15 start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT. For these errors, only a small proportion of {\cal E}caligraphic_E values (37.28%) exceed 0.002. Conversely, the dashed blue line represents errors >15absentsuperscript15>15^{\circ}> 15 start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT, where a large proportion (81.93%) surpasses this threshold. Consequently, establishing a threshold of 0.002 enables the exclusion of many instances of poor LoS-AoA estimation. Sequences with {\cal E}caligraphic_E exceeding this threshold are classified as anomalous by AnoDetNet.

V-B Performance of LoS-AoA Estimation

Refer to caption
(a) (a) Trajectory A1
Refer to caption
(b) (c) Trajectory B1
Refer to caption
(c) (e) Trajectory C1
Refer to caption
(d) (b) Trajectory A2
Refer to caption
(e) (d) Trajectory B2
Refer to caption
(f) (f) Trajectory C2
Figure 6: LoS-AoA estimation results across different trajectories. Each scatter plot illustrates AoAs extracted by the NOMP algorithm for five signal paths, with darker colors denoting higher absolute RSS-based complex gain values. “Ground Truth” represents the theoretical LoS-AoA, whereas “Predict” indicates the LoS-AoA as estimated by LoSEstNet. Points enclosed in red boxes ({\color[rgb]{1,0,0}\Box}) are those preserved by AD.

We conducted an evaluation of multiple LoS-AoA estimation methods, as detailed in Table III. Direct results from the NOMP algorithm facilitate RSS and ToA estimations, which selects AoA of the path with the highest gain and the minimum ToA. Meanwhile, NEAR estimation serves as a benchmark to establish an upper accuracy limit for selecting the AoA estimated the NOMP algorithm closest to the ideal LoS-AoA based on smartphone and IoT locations. Additionally, we investigated a Fully Connected (FC) network model, characterized by its single-snapshot input, which does not benefit from trajectory fusion gains. To accommodate LoSEstNet’s input specifications, we partitioned longer trajectories into shorter segments of length N𝑁Nitalic_N, employing a sliding window approach with a step size of 1.

The improved version of LoSEstNet, enhanced by AnoDetNet for anomaly sequence filtration, is termed AD-LoSEstNet. Specifically, for segments of length N𝑁Nitalic_N identified as anomalous by AnoDetNet, their LoS-AoA estimations are discarded. To clarify, trajectory points at the midpoint of these discarded segments are referred to as discarded. Our analysis primarily targeted IoT9, noted for its complex electromagnetic wave reflection environment, featuring a variety of paths and their dynamics. We examined these methodologies across three trajectory scenarios (A to C), depicted in Fig. 3, where channel conditions deteriorate progressively, each scenario comprising two trajectories to encapsulate diverse channel conditions comprehensively. To quantify the efficiency of data utilization post-AD processing in a trajectory, we introduced the metric of the useful-data rate:

ρ=DT,𝜌𝐷𝑇\rho=\frac{D}{T},italic_ρ = divide start_ARG italic_D end_ARG start_ARG italic_T end_ARG , (10)

where D𝐷Ditalic_D is the count of trajectory points of a trajectory discarded by AnoDetNet, and T𝑇Titalic_T signifies the total number of points included in the evaluation.

The outcomes of our evaluation are comprehensively detailed in Table IV. The direct implementation of the NOMP algorithm exhibits notable performance in favorable channel conditions. Specifically, in Scenario A—characterized by the close proximity between the IoT device and smartphone, along with a predominant LoS path—the RSS and NEAR estimation methods demonstrate high accuracy, with estimation errors approximately 5superscript55^{\circ}5 start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT. This close accuracy between the two methods substantiates that the strongest RSS signal indeed aligns with the LoS path. Furthermore, LoSEstNet, by incorporating multipath channel parameters from adjacent trajectory points, significantly enhances estimation accuracy beyond these initial methods, reducing errors to 2.27superscript2.272.27^{\circ}2.27 start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT. In contrast, the FC network, relying solely on single-snapshot inputs, exhibits estimation errors similar to those of RSS estimation. This relative underperformance can be ascribed to the lack of feature extraction and information fusion capabilities, a limitation observed consistently across various scenarios and therefore not further dissected in subsequent analyses. Additionally, the inherent complexities of indoor environments, coupled with the 20 MHz narrow bandwidth, invariably result in τt,lsubscript𝜏𝑡𝑙\tau_{t,l}italic_τ start_POSTSUBSCRIPT italic_t , italic_l end_POSTSUBSCRIPT producing consistently suboptimal outcomes.

As channel conditions deteriorate, the direct application of the NOMP algorithm becomes increasingly impractical. Nonetheless, LoSEstNet demonstrates resilience in challenging environments. In Scenario B, which features distant LoS paths or trajectories partially obstructed by wooden walls, RSS estimation proves to be ineffective, yielding errors around 20superscript2020^{\circ}20 start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT. In contrast, NEAR estimation incurs errors of 5.63superscript5.635.63^{\circ}5.63 start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT and 10.66superscript10.6610.66^{\circ}10.66 start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT. The notable discrepancy between NEAR and RSS estimations arises from the difficulty in differentiating LoS from NLoS paths in scenarios characterized by long signal propagation distances and a prevalence of NLoS paths. Consequently, the energy associated with the LoS path significantly wanes, and NLoS paths may overlap, leading to inaccuracies in RSS estimation. For example, in trajectory B1, the path with the highest energy identified by the NOMP algorithm is an NLoS path, typically resulting from reflections off glass surfaces, thus rendering RSS estimation ineffective. By capitalizing on the continuity inherent in LoS-AoA changes, LoSEstNet’s BiLSTM module effectively reduces errors from 23.63superscript23.6323.63^{\circ}23.63 start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT to 5.93superscript5.935.93^{\circ}5.93 start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT. Conversely, the initial segment of trajectory B2 encounters challenges in accurately extracting the LoS path due to obstructions by wooden walls, rendering RSS estimation nonviable. LoSEstNet, however, manages to limit errors to 4.17superscript4.174.17^{\circ}4.17 start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT through its capability to fuse information from multiple trajectory points.

Even in trajectory C1, where obstructions by wooden walls or glass are minimal, LoSEstNet maintains an error rate of 5.69superscript5.695.69^{\circ}5.69 start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT. In more adverse conditions, such as trajectory C2, the efficacy of LoSEstNet diminishes, with LoS-AoA estimation errors escalating to 24.38superscript24.3824.38^{\circ}24.38 start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT. The predominant challenge here is the obstruction of signals by concrete pillars, although the aggregation of NLoS paths still satisfies signal strength requirements, which could significantly impact localization efforts. The following subsection will delve further into addressing this challenge.

Before concluding this subsection, we undertook a series of tests involving randomly generated trajectories for IoT9. These tests were designed to gather statistical data and validate the effectiveness of LoSEstNet in scenarios dominated by LoS paths, exemplified by Scenario A. These trajectories were generated within the area annotated in Fig. 3, ensuring that the smartphone could reliably receive LoS path signals from IoT9. Out of the total, 500 trajectories were selected for analysis, with a focus on examining LoS-AoA estimation errors. In environments predominantly characterized by LoS paths, RSS estimation is known to provide high accuracy, which sets a high bar for achieving further improvements in accuracy. However, as illustrated in the cumulative distribution function (CDF) plot in Fig. 5, our LoSEstNet demonstrates a significant enhancement in performance, achieving a 95% CDF accuracy of 6.5superscript6.56.5^{\circ}6.5 start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT, surpassing the best benchmark of 10superscript1010^{\circ}10 start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT. This improvement indicates that, despite the inherent precision of RSS estimation in optimal conditions, LoSEstNet substantially enhances accuracy, nearly doubling it and underscoring its superior effectiveness in accurately estimating LoS-AoA.

V-C Performance of AD

In challenging indoor localization scenarios, LoSEstNet’s performance may not always meet expectations. For example, Scenario C, characterized by significant obstruction from concrete, resulted in considerable estimation errors due to the absence of LoS signals. To address this issue and improve LoS AoA estimation accuracy, we employ AnoDetNet. AnoDetNet effectively mitigates inaccurate LoS-AoA estimations caused by adverse channel conditions, as demonstrated by the trajectory points in Fig. 6, where points not enclosed in red boxes are those eliminated by AD.

Table IV demonstrates that the AnoDetNet network effectively eliminates inaccurately estimated LoS-AoA points in both NLoS and LoS conditions, thereby improving overall LoS-AoA estimation accuracy. For example, a significant improvement in accuracy for trajectory C2 is observed, where the error was reduced from 24.38superscript24.3824.38^{\circ}24.38 start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT to 3.42superscript3.423.42^{\circ}3.42 start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT by excluding points blocked by concrete. In trajectory C2, concrete blocks signal transmission, creating NLoS conditions for the initial points. The absence of AoA estimation results near the Groundtruth in Fig. 6(f) corroborates this observation.

Scenario B involves situations with excessively long signal propagation distances or obstructed LoS (OLoS) conditions, which hinder the accurate extraction of LoS component information. Despite being LoS situations, Scenario B lacks precise LoS-AoA estimates extracted by the NOMP algorithm, as evident in Fig. 6(c) and Fig  6(d). However, LoSEstNet still demonstrates commendable generalization capabilities, providing reasonable estimation accuracy. With the support of AnoDetNet, the larger errors in LoS-AoA estimation are filtered out, resulting in a further reduction of the error to approximately 3superscript33^{\circ}3 start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT, closely matching the precision observed in Scenario A.

AnoDetNet effectively eliminates inaccurately estimated trajectory points in OLoS situations, as evident in Fig. 6(d). Although all points in trajectory C1 are situated within OLoS situations, LoSEstNet’s excellent fusion gain ensures accurate estimation in the initial segment of the trajectory. AnoDetNet successfully retains these accurately estimated points. Notably, Scenario A, characterized by ideal channel conditions, does not exhibit anomalies. The maintaining rate ρ𝜌\rhoitalic_ρ in Table IV and the red-boxed trajectory points in Fig. 6(a) and Fig. 6(b) illustrate AnoDetNet’s judicious data elimination. This minimizes data wastage and demonstrates our ability to achieve LoS-AoA estimation accuracy comparable to Scenario A, irrespective of location within the indoor environment, through anomaly sequence filtration.

Extensive testing was conducted using randomly generated trajectories specific to IoT9, offering a thorough evaluation. The smartphone’s random movement throughout the indoor space allowed for exposure to a broad range of channel conditions, facilitating a comprehensive assessment. Our analysis, based on generating and evaluating 500 trajectories, revealed that transitioning to a “global” scenario, which includes all areas shown in Fig. 3, typically introduces greater complexity, often resembling Scenarios B and C, and results in diminished performance across various LoS-AoA estimation methods. However, as depicted in Fig. 7, the AD-LoSEstNet scheme sustains performance levels comparable to those in the annotated scenario, significantly outperforming other methods. The data utilization ratio, standing at 357 out of 500 trajectories, indicates efficient AoA acquisition and localization acceleration in relatively short trajectories. Given that errors from different hardware components tend to accumulate over time, the pivotal role of LoSEstNet in LoS environments becomes evident, with AD-LoSEstNet showcasing even greater robustness. Further exploration of this aspect will be undertaken in our experiments.

Refer to caption
Figure 7: Comparison of angular estimation performances across different LoS-AoA estimation methods in a global scenario.

V-D Localization

Refer to caption
Figure 8: Comparison of localization performances across different LoS-AoA estimation methods in a global scenario.

Utilizing LoS-AoAs derived from the previous subsection, combined with smartphone positions, we employed the LS algorithm for effective localization of IoT devices. The smartphone was programmed to navigate the indoor environment from a random starting point, covering a distance of 3 meters in any direction. Each trajectory comprised 15 points, spaced 0.2 meters apart, to facilitate LoS-AoA estimation. We imposed two specific constraints on trajectories for statistical analysis:333Many applications still exist that can meet these constraints. For instance, within crowdsourcing contexts, a vast pool of data is readily available for selection. In IoT localization, trajectories can be customized based on LoS-AoA estimations to comply with the specified constraints.

Constraint 1: Short trajectories must contain at least 5 points, with a minimum distance of 0.4 meters between points, to prevent the LS algorithm’s matrix from nearing singularity.

Constraint 2: Trajectories should span at least 20 degrees in AoA values to ensure significant angular diversity, minimizing potential localization errors from an inadequate LoS-AoA estimation range.

A total of 500 trajectories were randomly generated within the global area, with localization outcomes depicted in Fig. 8. These results demonstrate the exceptional localization accuracy achieved by the AD-LoSEstNet solution. Approximately 68% of data points fall within a range smaller than 0.68 meters, and nearly 95% exhibit precision within 2 meters. This success is attributed to the synergistic effect of LoSEstNet and AnoDetNet, where anomaly detection efficiently filters out trajectory points with inaccurate AoA estimates, ensuring the reliability of localization results. While this filtering necessitates the exclusion of certain data points—sometimes up to 50%—the impact remains acceptable in real-world scenarios, considering the abundance of available data. Moreover, given the relatively short trajectory length and the algorithm’s minimal processing time compared to human walking speed, it can swiftly provide results to users. In contrast, other localization methods show varying accuracy levels based on the quality of LoS-AoA estimation but have limited practicality. Even the NEAR algorithm, the best performer among them, fails to achieve localization accuracy within 7 meters in more than 20% of cases. Furthermore, its dependence on prior knowledge of the LoS path AoA renders it impractical for many applications. Consequently, our rapid localization method, the AD-LoSEstNet solution, has proven to be highly reliable and effective in complex environments.

VI Experiments

Refer to caption
Figure 9: Architectural configuration and test platform overview: (a) platform layout, (b) dipole antenna setup at the IoT device, (c) patch antennas, (d) measurement area at National Sun Yat-sen University, (e) trajectory path map for test.
Refer to caption
(a) (a) Scenario II-A
Refer to caption
(b) (b) Scenario II-B
Refer to caption
(c) (c) Scenario II-C
Refer to caption
(d) (d) Scenario II-D
Refer to caption
(e) (e) Scenario III-A
Refer to caption
(f) (f) Scenario III-B
Refer to caption
(g) (g) Scenario III-C
Refer to caption
(h) (h) Scenario III-D
Figure 10: LoS-AoA estimation results across different scenarios. Scenario II: the orientation of the antenna is right with consistently LoS path signal reception, Scenario III: the orientation of the antenna is up with partial LoS path signal reception. Each column of subfigures corresponds to trajectories A-D respectively.
TABLE V: Comparison of LoS-AoA Estimation Error for Different Antenna Orientations and Trajectories in Real-World Scenarios
RSS ToA FC NEAR LoSEstNet AD-LoSEstNet ρ𝜌\rhoitalic_ρ
Scenario II
Right-A 10.30 34.66 10.60 9.68 4.86 4.96 13/16
Right-B 9.40 55.03 10.27 9.15 3.93 4.63 10/16
Right-C 13.63 61.73 14.03 11.38 5.37 5.20 8/16
Right-D 13.50 68.17 14.27 11.75 7.10 6.91 7/16
Scenario III
Up-A 50.36 89.53 51.85 25.23 56.66 9.66 8/16
Up-B 58.90 101.56 59.09 41.85 59.53 7.42 7/16
Up-C 73.41 78.76 64.91 36.85 62.63 3.31 7/16
Up-D 66.87 64.19 63.15 44.95 66.38 12.63 5/16

In this section, we evaluate the performance and feasibility of the proposed LoS-AoA estimation method using real-world measurements. The experimental setup was established in the indoor corridor in front of the elevator on the 9th floor of the National Sun Yat-sen University Electricity Building, as depicted in Fig. 9. The testing area measures approximately 19.7m19.7m19.7{\rm m}19.7 roman_m by 5.93m5.93m5.93{\rm m}5.93 roman_m with a ceiling height of 2.8m2.8m2.8{\rm m}2.8 roman_m. We utilized the SGT100A RF vector signal generator with a WLAN dipole antenna (model 0030DGTA1CL016) produced by Walken Technology as the IoT device, positioned centrally. The receiver (smartphone) is equipped with an RTO2000 digital oscilloscope and three movable patch antennas, with the third antenna differing in height from the others to simulate the single-sided reception capability of a typical smartphone Wi-Fi antenna. Both the IoT device and the smartphone are set at a height of 0.83m0.83m0.83{\rm m}0.83 roman_m. The proposed network parameters remain consistent with those described in Section V.

To bridge the gap between measured and simulated data, thus enhancing the real-world applicability of our algorithm, we introduced two key differences. First, the antenna configuration was altered; while simulated data employed omnidirectional antennas placed horizontally, measured data was limited to signals within the (0,180)superscript0superscript180(0^{\circ},180^{\circ})( 0 start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT , 180 start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT ) range due to practical antenna constraints. Second, acknowledging the challenge of achieving perfect synchronization between devices, the delay values in measured data represent the time difference of arrival, as opposed to ToA in simulated data. Notably, the same training model and parameters were applied to both data sets. In the experiments, signal reception by Rx occurred along a straight track with 0.3m0.3m0.3{\rm m}0.3 roman_m step distance and a total track length of 6m6m6{\rm m}6 roman_m. We analyzed three scenarios based on antenna orientation: left, down, and right, corresponding to Scenarios I, II, and III, respectively. Different antenna orientations result in varying channel conditions.

We provide statistical insights for each trajectory in Scenarios II and III in Table V and Fig. 10. In Scenario I, where the antenna is oriented to the left, it is unable to receive any LoS signals, rendering all LoS-AoA estimations unavailable. AnoDetNet successfully filters all trajectory points in this scenario, underscoring the significance of data removal in practical applications. We provide statistical insights for each trajectory in Scenarios II and III in Table V and Fig. 10. In Scenario II, with the antenna oriented rightwards, the consistent presence of LoS path signals facilitates RSS estimation, yielding LoS-AoA errors around 10, closely approximating the NEAR method. However, LoSEstNet, through fusion techniques, significantly reduces the error to about 4superscript44^{\circ}4 start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT. AnoDetNet’s screening, despite eliminating roughly 50% of trajectory points, minimally impacts LoSEstNet’s accuracy. Scenario III, with the antenna directed upwards, exhibits significant estimation errors across all methods due to LoS path signal absence in the trajectory’s latter half. AnoDetNet’s elimination of signals lacking LoS information ensures the precision of LoS-AoA estimations.

For the purpose of statistical analysis, 500 trajectories were generated within the confines of a 4.5-meter span inside the room, adhering to Constraints 1 and 2 as outlined in Section V-D. Throughout these trajectories, the orientation of the antenna was altered randomly at each trajectory point. The results, as depicted in Fig. 11, showcase the exceptional performance of AD-LoSEstNet in the localization process. This method successfully identified IoT device positions within 1 meter in 90% of instances—a level of accuracy that significantly surpasses that achieved by other evaluated methods.

Refer to caption
Figure 11: Comparison localization performances using various LoS-AoA estimation methods.
TABLE VI: Comparison of LoS-AoA Estimation Error for Different Scenarios.
RSS ToA FC NEAR LoSEstNEt AD-LoSEstNet [52]-LoSEstNet ρ𝜌\rhoitalic_ρ (AD) ρ𝜌\rhoitalic_ρ [52]
Wi-Fi
Direction-LoS 8.77 12.53 9.59 5.13 4.02 4.19 19/30 0/30
Direction-Right 76.30 77.19 75.86 48.55 78.45 6.17 6/30 0/30
Direction-Up 37.69 47.40 39.01 24.21 34.77 6.98 8/30 0/30
UWB
Direction-LoS 0.99 4.74 3.20 0.96 5.15 6.30 4.82 20/30 4/30
Direction-Right 66.23 57.74 67.16 40.01 68.94 6.94 5/30 0/30
Direction-Up 24.89 29.19 28.00 15.83 22.54 5.84 14/30 0/30
Refer to caption
Figure 12: Illustration of the Simulation Scenario: Fixed IoT devices and smartphones on the move.
Refer to caption
(a) (a) Wi-Fi: Direction-LoS
Refer to caption
(b) (c) Wi-Fi: Direction-Right
Refer to caption
(c) (e) Wi-Fi: Direction-Up
Refer to caption
(d) (b) UWB: Direction-LoS
Refer to caption
(e) (d) UWB: Direction-Right
Refer to caption
(f) (f) UWB: Direction-Up
Figure 13: LoS-AoA estimation results across different scenarios. Each scatter plot illustrates AoAs extracted by the NOMP algorithm for five signal paths, with darker colors denoting higher absolute RSS-based complex gain values. “Ground Truth” represents the theoretical LoS-AoA, whereas “Predict” indicates the LoS-AoA as estimated by LoSEstNet. Points enclosed in red boxes ({\color[rgb]{1,0,0}\Box}) are those preserved by AD. Points enclosed in blue boxes ({\color[rgb]{0,0,1}\Box}) are those preserved by the benckmark[52].

VII Generalization to UWB

In this section, we assess the generalization capability of the proposed LoS-AoA estimation method in a completely different system. Specifically, we consider the ultra-wideband (UWB) communication system.

Inaccurate estimates often stem from NLoS conditions. Therefore, by identifying NLoS conditions, inaccurate estimates can be eliminated. In the UWB context, [52] introduced a method that utilizes the raw CIR sequence directly instead of applying radio parameters as those in (3), thereby enhancing the accuracy of NLoS identification. This method stands as one of the most advanced techniques for NLoS identification, serving as an appropriate benchmark for our evaluation. For convenience, the enhanced version of LoSEstNet, incorporating the method of [52] for NLoS conditions filtration, is referred to as [52]-LoSEstNet. The proposed network parameters remain consistent with those described in Section V, while the benchmark utilizes the originally trained parameters provided by the authors.

We employ Wireless Insite software to simulate a 2.4 GHz OFDM system with a 20 MHz channel bandwidth for Wi-Fi environments and a 1.28 GHz bandwidth for UWB environments. The IoT device is equipped with a vertical dipole antenna, while the smartphone’s receiving antenna comprises two patch antennas receiving signals within the (0,180)superscript0superscript180(0^{\circ},180^{\circ})( 0 start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT , 180 start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT ) range of antenna orientation. The environment simulated represents an indoor corridor covering approximately 10 m×4 m10 m4 m10\text{ m}\times 4\text{ m}10 m × 4 m. The smartphone follows a long track with a step distance of 0.4 m0.4 m0.4\text{ m}0.4 m and a total track length of 13.2 m13.2 m13.2\text{ m}13.2 m, as depicted by the blue trajectory in Fig. 12. The receiving antenna orientation can be configured to four directions: up, down, left, and right, for analysis purposes. We analyze three scenarios based on antenna orientation:

  • Direction-LoS: The antenna direction follows right, up, and left for steps 1-11, 12-24, and 25-34 of the smartphone trajectory, respectively, ensuring continuous LoS signal reception by the smartphone.

  • Direction-Right/Up: The antenna direction remains fixed at right/up throughout the smartphone movement, resulting in partial LoS signal reception along the smartphone trajectory.

AD-LoSEstNet demonstrates remarkable generalization capabilities, as evidenced by the results presented in Table VI and Fig. 13. In Fig. 13(a) and Fig. 13(b), all trajectory points are under LoS conditions, resulting in excellent RSS estimation performance. The LoS-AoA estimation errors are 8.77 and 0.99 for Wi-Fi and UWB, respectively. The superior performance of UWB is attributed to its increased bandwidth, which enables more effective path resolution, resulting in a significantly lower AoA estimation error compared to Wi-Fi. The fusion gain from LoSEstNet reduces the error in Wi-Fi to 4.02. However, in UWB, the performance is inferior to the RSS estimation. This discrepancy arises from testing with receiving antennas, bandwidths, and layouts that differ entirely from the training data. In Fig. 13(c)-(f), corresponding to the Direction-Right/Up scenario, there are noticeable errors between predicted points and Ground Truth, particularly for trajectory points under NLoS conditions, as shown in Fig. 12. These NLoS conditions cause the failure of various methods. Identifying and excluding these NLoS trajectory points will reduce the LoS-AoA estimation error.

Whether in Wi-Fi environments or UWB, AD-LoSEstNet effectively eliminates points with large LoS-AoA estimation errors, maintaining the LoS-AoA errors across all three scenarios at approximately 5. In contrast, the benchmark method fails completely, treating all Direction-Right/Up scenarios as NLoS conditions. As a result, [52]-LoSEstNet is not able to perform, and thus is marked “--” in Table VI. Even in the Direction-LoS scenario of UWB, the benchmark retains a rate of ρ=4/30𝜌430{\rho=4/30}italic_ρ = 4 / 30, leading to significant data wastage, while AD-LoSEstNet retains a rate of 20/30203020/3020 / 30. This sufficiently demonstrates the generalization capability of AnoDetNet.

VIII Conclusion

This study addresses the significant challenge of localizing indoor Wi-Fi transmitters, focusing on IoT devices. By utilizing smartphones equipped with motion sensors for accurate self-localization, we developed a smartphone-based localization system that overcomes the limitations posed by restricted bandwidth and angular resolution. Our approach capitalizes on the continuous variations in LoS-AoA across adjacent trajectory points. Employing the LoSEstNet, our system fuses channel features from these points, facilitating precise LoS-AoA estimation. To counteract the detrimental effects of complex multipath channels and NLoS conditions on LoS-AoA accuracy, we incorporated the AnoDetNet. This network reverse-reconstructs features extracted from CSI, leveraging the correlation between reconstruction error and LoS-AoA estimation precision by LoSEstNet. This method enables us to discard a significant number of unreliable measurements, thereby enhancing the accuracy of our localization algorithm. AnoDetNet demonstrates strong generalization capability, effectively filtering out unreliable measurements even in UWB environments with receiving antennas, bandwidths, and layouts that differ entirely from the training data. Remarkably, our technique has markedly improved IoT device positioning accuracy, reducing errors to 0.6 meters in 68% of cases and to 2 meters in 95% of cases, compared to the best benchmarks. Moreover, our system achieved decimeter-level localization accuracy in nearly 90% of instances, even in challenging real-world conditions.

References

  • [1] R. **, J. Zhou, J. Hu, P. Guo, Y. Wu et al., “Towards Practical Lightweight Passive Human Tracking Using WiFi Sensing,” IEEE Internet Things J., vol. 10, no. 15, pp. 13 769–13 783, 2023.
  • [2] L. Jiang, L. N. Hoe, and L. L. Loon, “Integrated UWB and GPS location sensing system in hospital environment,” in Proc. IEEE Conf. Ind. Electron. Appl., ICIEA, 2010, pp. 286–289.
  • [3] L. Terças, H. Alves, C. H. M. de Lima, and M. Juntti, “Bayesian-Based Indoor Factory Positioning Using AOA, TDOA and Hybrid Measurements,” IEEE Internet Things J, pp. 1–1, 2024.
  • [4] H. Li, J. K. Ng, V. C. Cheng, and W. K. Cheung, “Fast indoor localization for exhibition venues with calibrating heterogeneous mobile devices,” Internet Things, vol. 3, pp. 175–186, 2018.
  • [5] M. Zhao, “Technology of internet of things technology in the construction of smart mine,” in Proc. 3rd Int. Conf. Artif. Intell. Big Data (ICAIBD), Chengdu, China, 2020, pp. 289–292.
  • [6] R. Faragher and R. Harle, “Location fingerprinting with bluetooth low energy beacons,” IEEE J. Select. Areas Commun., vol. 33, no. 11, pp. 2418–2428, 2015.
  • [7] M. I. ul Haq and D. Kim, “A novel localization algorithm for internet of things in 3D,” in Proc. Int. Conf. Inf. Commun. Technol. Convergence (ICTC), 2015, pp. 237–241.
  • [8] D. Feng, C. Wang, C. He, Y. Zhuang, and X.-G. Xia, “Kalman-filter-based integration of imu and uwb for high-accuracy indoor positioning and navigation,” IEEE Internet Things J, vol. 7, no. 4, pp. 3133–3146, 2020.
  • [9] J. Ding, Y. Wang, H. Si, S. Gao, and J. Xing, “Three-dimensional indoor localization and tracking for mobile target based on wifi sensing,” IEEE Internet Things J, vol. 9, no. 21, pp. 21 687–21 701, 2022.
  • [10] S. Alletto, R. Cucchiara, G. Del Fiore, L. Mainetti, V. Mighali, L. Patrono, and G. Serra, “An indoor location-aware system for an iot-based smart museum,” IEEE Internet Things J, vol. 3, no. 2, pp. 244–253, 2016.
  • [11] S. Ma, Q. Liu, and P. C.-Y. Sheu, “Foglight: Visible light-enabled indoor localization system for low-power iot devices,” IEEE Internet Things J, vol. 5, no. 1, pp. 175–185, 2018.
  • [12] Y. Shu, C. Bo, G. Shen, C. Zhao, L. Li, and F. Zhao, “Magicol: Indoor localization using pervasive magnetic field and opportunistic WiFi sensing,” IEEE J. Sel. Areas Commun., vol. 33, no. 7, pp. 1443–1457, 2015.
  • [13] D. Chiasson, Y. Lin, M. Kok, and P. B. Shull, “Asynchronous hyperbolic uwb source-localization and self-localization for indoor tracking and navigation,” IEEE Internet Things J, vol. 10, no. 13, pp. 11 655–11 668, 2023.
  • [14] X. Geng, R. Peng, M. Li, W. Liu, G. Jiang, H. Jiang, and J. Luo, “A lightweight approach for passive human localization using an infrared thermal camera,” IEEE Internet Things J, vol. 9, no. 24, pp. 24 800–24 811, 2022.
  • [15] Y. Lin, K. Yu, L. Hao, J. Wang, and J. Bu, “An indoor Wi-Fi localization algorithm using ranging model constructed with transformed rssi and BP neural network,” IEEE Trans. Commun., vol. 70, no. 3, pp. 2163–2177, 2022.
  • [16] X. Tong, H. Wang, X. Liu, and W. Qu, “MapFi: Autonomous map** of Wi-Fi infrastructure for indoor localization,” IEEE Trans. Mobile Comput., vol. 22, no. 3, pp. 1566–1580, 2021.
  • [17] L. Gong, C. Wang, L. Zhu, J. Zhang, W. Yang, Y. Zhao, and C. Xiang, “LAMP: Lightweight and accurate malicious access points localization via channel phase information,” in Proc. Int. Conf. Wireless Algorithms Syst. Appl., 2018, pp. 748–753.
  • [18] H. Zou, B. Huang, X. Lu, H. Jiang, and L. Xie, “A robust indoor positioning system based on the procrustes analysis and weighted extreme learning machine,” IEEE Trans. Wireless Commun., vol. 15, no. 2, pp. 1252–1266, 2015.
  • [19] Y. Zhuang, Z. Syed, J. Georgy, and N. El-Sheimy, “Autonomous smartphone-based WiFi positioning system by using access points localization and crowdsourcing,” Pervasive Mob. Comput., vol. 18, pp. 118–136, 2015.
  • [20] H. Zhao, B. Huang, and B. Jia, “Applying kriging interpolation for WiFi fingerprinting based indoor positioning systems,” in IEEE Wireless Commun. Networking Conf. WCNC, 2016, pp. 1–6.
  • [21] A. Yassin, Y. Nasser, M. Awad, A. Al-Dubai, R. Liu, C. Yuen, R. Raulefs, and E. Aboutanios, “Recent advances in indoor localization: A survey on theoretical approaches and applications,” IEEE Commun. Surv. Tutorials, vol. 19, no. 2, pp. 1327–1346, 2016.
  • [22] B. Jia, B. Huang, H. Gao, W. Li, and L. Hao, “Selecting critical WiFi APs for indoor localization based on a theoretical error analysis,” IEEE Access, vol. 7, pp. 36 312–36 321, 2019.
  • [23] S. He and S.-H. G. Chan, “Wi-Fi fingerprint-based indoor positioning: Recent advances and comparisons,” IEEE Commun. Surveys Tuts., vol. 18, no. 1, pp. 466–490, 2015.
  • [24] H.-H. Hsu, W.-J. Peng, T. K. Shih, T.-W. Pai, and K. L. Man, “Smartphone indoor localization with accelerometer and gyroscope,” in Proc. Int. Conf. Netw.-Based Inf. Syst., NBiS, 2014, pp. 465–469.
  • [25] J. Jeong, S. Yeon, T. Kim, H. Lee, S. M. Kim, and S.-C. Kim, “SALA: Smartphone-assisted localization algorithm for positioning indoor IoT devices,” Wireless Netw., vol. 24, pp. 27–47, 2018.
  • [26] W.-T. Shih, C.-K. Wen, S.-H. Tsai, R. Liu, and C. Yuen, “EasyAPPos: Positioning Wi-Fi access points by using a mobile phone,” IEEE Internet Things J., vol. 10, no. 15, pp. 13 385–13 400, 2023.
  • [27] T. Hao, R. Zhou, G. Xing, M. W. Mutka, and J. Chen, “Wizsync: Exploiting Wi-Fi infrastructure for clock synchronization in wireless sensor networks,” IEEE Trans. Mobile Comput., vol. 13, no. 6, pp. 1379–1392, 2013.
  • [28] R. Schmidt, “Multiple emitter location and signal parameter estimation,” IEEE Trans. Antennas Propag., vol. 34, no. 3, pp. 276–280, 1986.
  • [29] B. Mamandipoor, D. Ramasamy, and U. Madhow, “Newtonized orthogonal matching pursuit: Frequency estimation over the continuum,” IEEE Trans. Signal Process, vol. 64, no. 19, pp. 5066–5081, 2016.
  • [30] X. Tong, H. Li, X. Tian, and X. Wang, “Wi-Fi localization enabling self-calibration,” IEEE/ACM Trans. Netw., vol. 29, no. 2, pp. 904–917, 2021.
  • [31] M. Asim, M. O. Iqbal, W. Aman, M. M. U. Rahman, and Q. H. Abbasi, “Pathloss-based non-Line-of-Sight identification in an indoor environment: An experimental study,” arXiv preprint arXiv:2307.15995, 2023.
  • [32] X. Li, X. Cai, Y. Hei, and R. Yuan, “NLOS identification and mitigation based on channel state information for indoor Wi-Fi localization,” IET Commun., vol. 11, no. 4, pp. 531–537, 2017.
  • [33] W. Xue, W. Qiu, X. Hua, and K. Yu, “Improved Wi-Fi RSSI measurement for indoor localization,” IEEE Sens. J., vol. 17, no. 7, pp. 2224–2230, 2017.
  • [34] P. Chen and S. Zhang, “DeepMetricFi: Improving Wi-Fi Fingerprinting Localization by Deep Metric Learning,” IEEE Internet Things J., vol. 11, no. 4, pp. 6961–6971, 2023.
  • [35] S.-M. Chun, S.-M. Lee, J.-W. Nah, J.-H. Choi, and J.-T. Park, “Localization of Wi-Fi access point using smartphone’s GPS information,” in Int. Conf. Sel. Top. Mob. Wirel. Networking, iCOST, 2011, pp. 121–126.
  • [36] M. Ji, J. Kim, Y. Cho, Y. Lee, and S. Park, “A novel Wi-Fi AP localization method using monte carlo path-loss model fitting simulation,” in Proc. IEEE 24th Annu. Int. Symp. Pers. Indoor Mobile Radio Commun. (PIMRC), 2013, pp. 3487–3491.
  • [37] Y. Zhuang, Y. Li, H. Lan, Z. Syed, and N. El-Sheimy, “Wireless access point localization using nonlinear least squares and multi-level quality control,” IEEE Wireless Commun. Lett., vol. 4, no. 6, pp. 693–696, 2015.
  • [38] J. Koo and H. Cha, “Localizing Wi-Fi access points using signal strength,” IEEE Commun. Lett., vol. 15, no. 2, pp. 187–189, 2010.
  • [39] S. Y. Nam, “Localization of access points based on signal strength measured by a mobile user node,” IEEE Commun. Lett., vol. 18, no. 8, pp. 1407–1410, 2014.
  • [40] F. Zhao, H. Luo, H. Geng, and Q. Sun, “An RSSI gradient-based AP localization algorithm,” China Commun., vol. 11, no. 2, pp. 100–108, 2014.
  • [41] F. Zafari, A. Gkelias, and K. K. Leung, “A survey of indoor localization systems and technologies,” IEEE Commun. Surv. Tutorials, vol. 21, no. 3, pp. 2568–2599, 2019.
  • [42] X. Tong, H. Li, X. Tian, and X. Wang, “Triangular antenna layout facilitates deployability of CSI indoor localization systems,” in Annu. IEEE Commun.Soc. Conf. Sens., Mesh Ad Hoc Commun. Netw. workshops, 2019, pp. 1–9.
  • [43] R. Ayyalasomayajula, A. Arun, C. Wu, A. Shaikh, S. Rajagopalan, Y. Hu, S. Ganesaraman, C. J. Rossbach, A. Seetharaman, E. Witchel et al., “LocAP: Autonomous millimeter accurate map** of Wi-Fi infrastructure,” in Proc. USENIX Symp. Networked Syst. Des. Implement., NSDI, 2020, pp. 1115–1129.
  • [44] K. Hundman, V. Constantinou, C. Laporte, I. Colwell, and T. Soderstrom, “Detecting Spacecraft Anomalies Using LSTMs and Nonparametric Dynamic Thresholding,” in Proc. 24th ACM SIGKDD Int. Conf. Knowl. Disc. Data Min. (KDD), Jul. 2018, pp. 387–395.
  • [45] P. Malhotra, A. Ramakrishnan, G. Anand, L. Vig, P. Agarwal, and G. Shroff, “LSTM-based encoder-decoder for multi-sensor anomaly detection,” arXiv preprint arXiv:1607.00148, 2016.
  • [46] B. Zong, Q. Song, M. R. Min, W. Cheng, C. Lumezanu, D. Cho, and H. Chen, “Deep autoencoding gaussian mixture model for unsupervised anomaly detection,” in Int. Conf. Learn. Represent., ICLR - Conf. Track Proc, 2018.
  • [47] D. Park, Y. Hoshi, and C. C. Kemp, “A multimodal anomaly detector for robot-assisted feeding using an LSTM-Based variational autoencoder,” IEEE Rob. Autom. Lett., vol. 3, no. 3, pp. 1544–1551, 2018.
  • [48] B. Mamandipoor, D. Ramasamy, and U. Madhow, “Newtonized orthogonal matching pursuit: Frequency estimation over the continuum,” IEEE Trans. Signal Process., vol. 64, no. 19, pp. 5066–5081, 2016.
  • [49] F. Remcom, “Wireless InSite: 3D Wireless Prediction Software,” 2021, [Online]. Available: https://www.remcom.com/wireless-insite-empropagation-software.
  • [50] I. . W. Group et al., “Part 11: Wireless LAN medium access control (mac) and physical layer (phy) specifications,” ANSI/IEEE Std. 802.11, 1999 Edition, 1999.
  • [51] C. Zhang, S. Bengio, M. Hardt, B. Recht, and O. Vinyals, “Understanding deep learning (still) requires rethinking generalization,” Commun. ACM, vol. 64, no. 3, pp. 107–115, 2021.
  • [52] C. Jiang, J. Shen, S. Chen, Y. Chen, D. Liu, and Y. Bo, “UWB NLOS/LOS classification using deep learning method,” IEEE Commun. Lett., vol. 24, no. 10, pp. 2226–2230, 2020.