1,497 research outputs found

    Lower bounds for Arrangement-based Range-Free Localization in Sensor Networks

    Full text link
    Colander are location aware entities that collaborate to determine approximate location of mobile or static objects when beacons from an object are received by all colanders that are within its distance RR. This model, referred to as arrangement-based localization, does not require distance estimation between entities, which has been shown to be highly erroneous in practice. Colander are applicable in localization in sensor networks and tracking of mobile objects. A set SR2S \subset {\mathbb R}^2 is an (R,ϵ)(R,\epsilon)-colander if by placing receivers at the points of SS, a wireless device with transmission radius RR can be localized to within a circle of radius ϵ\epsilon. We present tight upper and lower bounds on the size of (R,ϵ)(R,\epsilon)-colanders. We measure the expected size of colanders that will form (R,ϵ)(R, \epsilon)-colanders if they distributed uniformly over the plane

    Localization by decreasing the impact of obstacles in wireless sensor networks

    Get PDF
    In sensor networks ,Localization techniques makes use of small number of reference nodes, whose locations are known in prior, and other nodes estimate their coordinate position from the messages they receive from the anchor nodes. Localization protocol can be divided into two categories: (i) range-based and (ii) range-free protocols. Range-based protocols depend on knowing the distance between the nodes. Where as, range-free protocols consider the contents of message sent from the anchor node to all other sensor node. Previous range-free based localization methods requires at least three anchor nodes ,whose positions already known ,in order to find the position of unknown sensor node and these methods might not guarantee for complete solution and an infeasible case could occur. The convex position estimation method takes the advantage of solving the above problem. Here different approach to solve the localization problem is described. In which it considers a single moving anchor node and each node will have a set of mobile anchor node co-ordinates. Later this algorithm checks for the connectivity between the nodes to formulate the radical constraints and finds the unknown sensor node location. The nodes position obtained using convex position estimation method will have less location error. However, Network with obstacles is most common. Localizing these networks, some nodes may have higher location error. The new method is described to decrease the impact of obstacle, in which nodes near or within the obstacle that fail to get minimum of three anchor node position values get the anchor position set from its neighbor nodes, applies the convex position estimation method and gets localized with better position accuracy. The Convex position estimation method is range-free that solves localization problem when infeasible case occurs and results in better location accuracy

    Distance Measurement-Based Cooperative Source Localization: A Convex Range-Free Approach

    Get PDF
    One of the most essential objectives in WSNs is to determine the spatial coordinates of a source or a sensor node having information. In this study, the problem of range measurement-based localization of a signal source or a sensor is revisited. The main challenge of the problem results from the non-convexity associated with range measurements calculated using the distances from the set of nodes with known positions to a xed sen- sor node. Such measurements corresponding to certain distances are non-convex in two and three dimensions. Attempts recently proposed in the literature to eliminate the non- convexity approach the problem as a non-convex geometric minimization problem, using techniques to handle the non-convexity. This study proposes a new fuzzy range-free sensor localization method. The method suggests using some notions of Euclidean geometry to convert the problem into a convex geometric problem. The convex equivalent problem is built using convex fuzzy sets, thus avoiding multiple stable local minima issues, then a gradient based localization algorithm is chosen to solve the problem. Next, the proposed algorithm is simulated considering various scenarios, including the number of available source nodes, fuzzi cation level, and area coverage. The results are compared with an algorithm having similar fuzzy logic settings. Also, the behaviour of both algorithms with noisy measurements are discussed. Finally, future extensions of the algorithm are suggested, along with some guidelines

    Secure location-aware communications in energy-constrained wireless networks

    Get PDF
    Wireless ad hoc network has enabled a variety of exciting civilian, industrial and military applications over the past few years. Among the many types of wireless ad hoc networks, Wireless Sensor Networks (WSNs) has gained popularity because of the technology development for manufacturing low-cost, low-power, multi-functional motes. Compared with traditional wireless network, location-aware communication is a very common communication pattern and is required by many applications in WSNs. For instance, in the geographical routing protocol, a sensor needs to know its own and its neighbors\u27 locations to forward a packet properly to the next hop. The application-aware communications are vulnerable to many malicious attacks, ranging from passive eavesdropping to active spoofing, jamming, replaying, etc. Although research efforts have been devoted to secure communications in general, the properties of energy-constrained networks pose new technical challenges: First, the communicating nodes in the network are always unattended for long periods without physical maintenance, which makes their energy a premier resource. Second, the wireless devices usually have very limited hardware resources such as memory, computation capacity and communication range. Third, the number of nodes can be potentially of very high magnitude. Therefore, it is infeasible to utilize existing secure algorithms designed for conventional wireless networks, and innovative mechanisms should be designed in a way that can conserve power consumption, use inexpensive hardware and lightweight protocols, and accommodate with the scalability of the network. In this research, we aim at constructing a secure location-aware communication system for energy-constrained wireless network, and we take wireless sensor network as a concrete research scenario. Particularly, we identify three important problems as our research targets: (1) providing correct location estimations for sensors in presence of wormhole attacks and pollution attacks, (2) detecting location anomalies according to the application-specific requirements of the verification accuracy, and (3) preventing information leakage to eavesdroppers when using network coding for multicasting location information. Our contributions of the research are as follows: First, we propose two schemes to improve the availability and accuracy of location information of nodes. Then, we study monitoring and detection techniques and propose three lightweight schemes to detect location anomalies. Finally, we propose two network coding schemes which can effectively prevent information leakage to eavesdroppers. Simulation results demonstrate the effectiveness of our schemes in enhancing security of the system. Compared to previous works, our schemes are more lightweight in terms of hardware cost, computation overhead and communication consumptions, and thus are suitable for energy-constrained wireless networks

    A survey on gas leakage source detection and boundary tracking with wireless sensor networks

    Get PDF
    Gas leakage source detection and boundary tracking of continuous objects have received a significant research attention in the academic as well as the industries due to the loss and damage caused by toxic gas leakage in large-scale petrochemical plants. With the advance and rapid adoption of wireless sensor networks (WSNs) in the last decades, source localization and boundary estimation have became the priority of research works. In addition, an accurate boundary estimation is a critical issue due to the fast movement, changing shape, and invisibility of the gas leakage compared with the other single object detections. We present various gas diffusion models used in the literature that offer the effective computational approaches to measure the gas concentrations in the large area. In this paper, we compare the continuous object localization and boundary detection schemes with respect to complexity, energy consumption, and estimation accuracy. Moreover, this paper presents the research directions for existing and future gas leakage source localization and boundary estimation schemes with WSNs

    A survey: localization and tracking mobile targets through wireless sensors network

    Get PDF
    Wireless sensor network applications have been deployed widely. Sensor networks involve sensor nodes which are very small in size. They are low in cost, and have a low battery life. Sensor nodes are capable of solving a variety of collaborative problems, such as, monitoring and surveillance. One of the critical components in wireless sensor networks is the localizing tracking sensor or mobile node. In this paper we will discuss the various location system techniques and categorize these techniques based on the communication between nodes into centralized and decentralized localization techniques. The tracking techniques are categorized into four main types. Each type will be compared and discussed in detail. We will suggest ways of implementing the techniques and finally carry out an evaluation
    corecore