1,530 research outputs found
Lower bounds for Arrangement-based Range-Free Localization in Sensor Networks
Colander are location aware entities that collaborate to determine
approximate location of mobile or static objects when beacons from an object
are received by all colanders that are within its distance . This model,
referred to as arrangement-based localization, does not require distance
estimation between entities, which has been shown to be highly erroneous in
practice. Colander are applicable in localization in sensor networks and
tracking of mobile objects.
A set is an -colander if by placing
receivers at the points of , a wireless device with transmission radius
can be localized to within a circle of radius . We present tight
upper and lower bounds on the size of -colanders. We measure the
expected size of colanders that will form -colanders if they
distributed uniformly over the plane
Localization by decreasing the impact of obstacles in wireless sensor networks
In sensor networks ,Localization techniques makes use of small number of reference nodes, whose locations are known in prior, and other nodes estimate their coordinate position from the messages they receive from the anchor nodes. Localization protocol can be divided into two categories: (i) range-based and (ii) range-free protocols. Range-based protocols depend on knowing the distance between the nodes. Where as, range-free protocols consider the contents of message sent from the anchor node to all other sensor node. Previous range-free based localization methods requires at least three anchor nodes ,whose positions already known ,in order to find the position of unknown sensor node and these methods might not guarantee for complete solution and an infeasible case could occur. The convex position estimation method takes the advantage of solving the above problem. Here different approach to solve the localization problem is described. In which it considers a single moving anchor node and each node will have a set of mobile anchor node co-ordinates. Later this algorithm checks for the connectivity between the nodes to formulate the radical constraints and finds the unknown sensor node location. The nodes position obtained using convex position estimation method will have less location error. However, Network with obstacles is most common. Localizing these networks, some nodes may have higher location error. The new method is described to decrease the impact of obstacle, in which nodes near or within the obstacle that fail to get minimum of three anchor node position values get the anchor position set from its neighbor nodes, applies the convex position estimation method and gets localized with better position accuracy. The Convex position estimation method is range-free that solves localization problem when infeasible case occurs and results in better location accuracy
Distance Measurement-Based Cooperative Source Localization: A Convex Range-Free Approach
One of the most essential objectives in WSNs is to determine the spatial coordinates
of a source or a sensor node having information. In this study, the problem of range
measurement-based localization of a signal source or a sensor is revisited. The main challenge of the problem results from the non-convexity associated with range measurements
calculated using the distances from the set of nodes with known positions to a xed sen-
sor node. Such measurements corresponding to certain distances are non-convex in two
and three dimensions. Attempts recently proposed in the literature to eliminate the non-
convexity approach the problem as a non-convex geometric minimization problem, using
techniques to handle the non-convexity.
This study proposes a new fuzzy range-free sensor localization method. The method
suggests using some notions of Euclidean geometry to convert the problem into a convex
geometric problem. The convex equivalent problem is built using convex fuzzy sets, thus
avoiding multiple stable local minima issues, then a gradient based localization algorithm
is chosen to solve the problem.
Next, the proposed algorithm is simulated considering various scenarios, including the
number of available source nodes, fuzzi cation level, and area coverage. The results are
compared with an algorithm having similar fuzzy logic settings. Also, the behaviour of
both algorithms with noisy measurements are discussed. Finally, future extensions of the
algorithm are suggested, along with some guidelines
Secure location-aware communications in energy-constrained wireless networks
Wireless ad hoc network has enabled a variety of exciting civilian, industrial and military applications over the past few years. Among the many types of wireless ad hoc networks, Wireless Sensor Networks (WSNs) has gained popularity because of the technology development for manufacturing low-cost, low-power, multi-functional motes. Compared with traditional wireless network, location-aware communication is a very common communication pattern and is required by many applications in WSNs. For instance, in the geographical routing protocol, a sensor needs to know its own and its neighbors\u27 locations to forward a packet properly to the next hop.
The application-aware communications are vulnerable to many malicious attacks, ranging from passive eavesdropping to active spoofing, jamming, replaying, etc. Although research efforts have been devoted to secure communications in general, the properties of energy-constrained networks pose new technical challenges: First, the communicating nodes in the network are always unattended for long periods without physical maintenance, which makes their energy a premier resource. Second, the wireless devices usually have very limited hardware resources such as memory, computation capacity and communication range. Third, the number of nodes can be potentially of very high magnitude. Therefore, it is infeasible to utilize existing secure algorithms designed for conventional wireless networks, and innovative mechanisms should be designed in a way that can conserve power consumption, use inexpensive hardware and lightweight protocols, and accommodate with the scalability of the network.
In this research, we aim at constructing a secure location-aware communication system for energy-constrained wireless network, and we take wireless sensor network as a concrete research scenario. Particularly, we identify three important problems as our research targets: (1) providing correct location estimations for sensors in presence of wormhole attacks and pollution attacks, (2) detecting location anomalies according to the application-specific requirements of the verification accuracy, and (3) preventing information leakage to eavesdroppers when using network coding for multicasting location information. Our contributions of the research are as follows: First, we propose two schemes to improve the availability and accuracy of location information of nodes. Then, we study monitoring and detection techniques and propose three lightweight schemes to detect location anomalies. Finally, we propose two network coding schemes which can effectively prevent information leakage to eavesdroppers. Simulation results demonstrate the effectiveness of our schemes in enhancing security of the system. Compared to previous works, our schemes are more lightweight in terms of hardware cost, computation overhead and communication consumptions, and thus are suitable for energy-constrained wireless networks
A survey on gas leakage source detection and boundary tracking with wireless sensor networks
Gas leakage source detection and boundary tracking of continuous objects have received a significant research attention in the academic as well as the industries due to the loss and damage caused by toxic gas leakage in large-scale petrochemical plants. With the advance and rapid adoption of wireless sensor networks (WSNs) in the last decades, source localization and boundary estimation have became the priority of research works. In addition, an accurate boundary estimation is a critical issue due to the fast movement, changing shape, and invisibility of the gas leakage compared with the other single object detections. We present various gas diffusion models used in the literature that offer the effective computational approaches to measure the gas concentrations in the large area. In this paper, we compare the continuous object localization and boundary detection schemes with respect to complexity, energy consumption, and estimation accuracy. Moreover, this paper presents the research directions for existing and future gas leakage source localization and boundary estimation schemes with WSNs
A survey: localization and tracking mobile targets through wireless sensors network
Wireless sensor network applications have been
deployed widely. Sensor networks involve sensor nodes which are
very small in size. They are low in cost, and have a low battery
life. Sensor nodes are capable of solving a variety of collaborative
problems, such as, monitoring and surveillance. One of the
critical components in wireless sensor networks is the localizing
tracking sensor or mobile node. In this paper we will discuss the
various location system techniques and categorize these
techniques based on the communication between nodes into
centralized and decentralized localization techniques. The
tracking techniques are categorized into four main types. Each
type will be compared and discussed in detail. We will suggest
ways of implementing the techniques and finally carry out an
evaluation
- …