Distributed maximum likelihood estimation for bandwidth-constrained wireless sensor networks

Wang Wei, Li Hongbin

Research output: Contribution to conferencePaperpeer-review

4 Scopus citations

Abstract

In this paper, distributed maximum likelihood estimation for bandwidth constrained wireless sensor networks is investigated. We consider an estimation system that involves temporal and spatial domain observations. In particular, we consider the case where there are a total of K sensors, each making N temporal observations. We choose different K and N, but fix KN = M, which means that the total number of temporal and spatial observations is fixed, to examine the trade-off of having a larger K with a smaller N versus having a smaller K with a larger N. The temporal signals observed at each local sensor node are quantized before transmission to a fusion center and estimation at the fusion center is made based on these quantized data. For fair comparison and to bring out the effect of different choices of K and N, we fix the total number of bits used by the K sensors to be γM. That is, each sensor sends γN bits of the quantized data. We derive the maximum likelihood estimator and examine its estimation accuracy in term of mean-squared error (MSE), as well as the Cramer Rao lower bound (CRLB) for the above distributed estimation problem.

Original languageEnglish
Pages506-510
Number of pages5
DOIs
StatePublished - 2006
Event2006 IEEE 12th Digital Signal Processing Workshop and 4th IEEE Signal Processing Education Workshop, DSPWS - Moose, WY, United States
Duration: 24 Sep 200627 Sep 2006

Conference

Conference2006 IEEE 12th Digital Signal Processing Workshop and 4th IEEE Signal Processing Education Workshop, DSPWS
Country/TerritoryUnited States
CityMoose, WY
Period24/09/0627/09/06

Keywords

  • Bandwidth constraint
  • Distributed estimation
  • Quantization
  • Wireless sensor networks

Fingerprint

Dive into the research topics of 'Distributed maximum likelihood estimation for bandwidth-constrained wireless sensor networks'. Together they form a unique fingerprint.

Cite this