12,260 research outputs found
A survey of localization in wireless sensor network
Localization is one of the key techniques in wireless sensor network. The location estimation methods can be classified into target/source localization and node self-localization. In target localization, we mainly introduce the energy-based method. Then we investigate the node self-localization methods. Since the widespread adoption of the wireless sensor network, the localization methods are different in various applications. And there are several challenges in some special scenarios. In this paper, we present a comprehensive survey of these challenges: localization in non-line-of-sight, node selection criteria for localization in energy-constrained network, scheduling the sensor node to optimize the tradeoff between localization performance and energy consumption, cooperative node localization, and localization algorithm in heterogeneous network. Finally, we introduce the evaluation criteria for localization in wireless sensor network
On the Security of the Automatic Dependent Surveillance-Broadcast Protocol
Automatic dependent surveillance-broadcast (ADS-B) is the communications
protocol currently being rolled out as part of next generation air
transportation systems. As the heart of modern air traffic control, it will
play an essential role in the protection of two billion passengers per year,
besides being crucial to many other interest groups in aviation. The inherent
lack of security measures in the ADS-B protocol has long been a topic in both
the aviation circles and in the academic community. Due to recently published
proof-of-concept attacks, the topic is becoming ever more pressing, especially
with the deadline for mandatory implementation in most airspaces fast
approaching.
This survey first summarizes the attacks and problems that have been reported
in relation to ADS-B security. Thereafter, it surveys both the theoretical and
practical efforts which have been previously conducted concerning these issues,
including possible countermeasures. In addition, the survey seeks to go beyond
the current state of the art and gives a detailed assessment of security
measures which have been developed more generally for related wireless networks
such as sensor networks and vehicular ad hoc networks, including a taxonomy of
all considered approaches.Comment: Survey, 22 Pages, 21 Figure
BOUNDARY DETECTION ALGORITHMS IN WIRELESS SENSOR NETWORKS: A SURVEY
Wireless sensor networks (WSNs) comprise a large number of sensor nodes, which are spread out within a region and communicate using wireless links. In some WSN applications, recognizing boundary nodes is important for topology discovery, geographic routing and tracking. In this paper, we study the problem of recognizing the boundary nodes of a WSN. We firstly identify the factors that influence the design of algorithms for boundary detection. Then, we classify the existing work in boundary detection, which is vital for target tracking to detect when the targets enter or leave the sensor field
Distributed Cooperative Localization in Wireless Sensor Networks without NLOS Identification
In this paper, a 2-stage robust distributed algorithm is proposed for
cooperative sensor network localization using time of arrival (TOA) data
without identification of non-line of sight (NLOS) links. In the first stage,
to overcome the effect of outliers, a convex relaxation of the Huber loss
function is applied so that by using iterative optimization techniques, good
estimates of the true sensor locations can be obtained. In the second stage,
the original (non-relaxed) Huber cost function is further optimized to obtain
refined location estimates based on those obtained in the first stage. In both
stages, a simple gradient descent technique is used to carry out the
optimization. Through simulations and real data analysis, it is shown that the
proposed convex relaxation generally achieves a lower root mean squared error
(RMSE) compared to other convex relaxation techniques in the literature. Also
by doing the second stage, the position estimates are improved and we can
achieve an RMSE close to that of the other distributed algorithms which know
\textit{a priori} which links are in NLOS.Comment: Accepted in WPNC 201
- …