Computer Science ›› 2014, Vol. 41 ›› Issue (1): 156-162.

Previous Articles     Next Articles

Gradient Based Approach to Secure Localization Algorithm in Constrained Space

WANG Ning,QIN Xiao-lin and SHEN Yao   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Existing wireless sensor network location technology can not satisfy the location demands,not only because it calls for a lot of calculation time and processing resources but also for it is interfered by environmental factors,attacks from other users and its positional accuracy is low.Therefore,in order to improve location accuracy in constrained space,a gradient-based security location algorithm was proposed in this paper,in which gradient is brought based on hyperbolic location model.This algorithm lowers the computational complexity so that it can satisfy the environmental demands of constrained space and achieve the high-accuracy localization.Meanwhile,to improve the security of the algorithm,the resistant ability was enhanced and the selective pruning process for inconsistency measuring was also adop-ted.We finally improved the location accuracy by using main frequency strategy according to the simulation results of indoor corridor experiments.And the results show that the proposed algorithm has higher performances not only on lo-calization accuracy and energy consumption but also on anti-interference ability than the existing one.

Key words: Hyperbolic location model,Gradient,Constrained space,Secure localization

[1] Mainwaring A M,Culler D E,Polastre J,et al.Wireless sensor networks for habitat monitoring[C]∥WSNA.2002:88-97
[2] Noury N,Hervé T,Rialle V,et al.Monitoring behavior in home using a smart fall sensor and position sensors [C]∥Microtech-nologies in Medicine and Biology,1st Annual International,Conference on 2000.IEEE,2000:607-610
[3] Meyer S,Rakotonirainy A.A survey of research on context-a-ware homes[C]∥Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003.Volume 21,Australian Computer Society,Inc.,2003:159-168
[4] Knaian A N.A wireless sensor network for smart roadbeds and intelligent transportation systems[D].Massachusetts Institute of Technology,2000
[5] Yu L,Wang N,Meng X.Real-time forest fire detection withwireless sensor networks[C]∥Proceedings.2005International Conference on Wireless Communications,Networking and Mobile Computing,2005.IEEE,2005,2:1214-1217
[6] IEEE Std 1149.7-2009.Rsduced-Pin and Enhanced-Functionali-ty Test Access Port and Boundary-Scan Architecture[S].IEEE Standard Board,2009
[7] Mao G,Fidan B,Anderson B.Wireless sensor network localization techniques[J].Computer Networks,2007,51(10):2529-2553
[8] Zhu W,Cao J,Xu Y,et al.Fault-tolerant RFID reader localization based on passive RFID tags[C]∥INFOCOM,2012Proceedings IEEE.IEEE,2012:2183-2191
[9] Muoz D.Position location techniques and applications[M].Academic Press,2009
[10] Zhu S,Ding Z.A simple approach of range-based positioningwith low computational complexity[J].IEEE Transactions on Wireless Communications,2009,8(12):5832-5836
[11] Heidari M,Alsindi N A,Pahlavan K.UDP identification and error mitigation in ToA-based indoor localization systems using neural network architecture[J].IEEE Transactions on Wireless Communications,2009,8(7):3597-3607
[12] Bahl P,Padmanabhan V N.RADAR:An in-building RF-based user location and tracking system[C]∥INFOCOM 2000,Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE,2000,2:775-784
[13] Harter A,Hopper A,Steggles P,et al.The anatomy of a context-aware application[J].Wireless Networks,2002,8(2):187-197
[14] Girod L,Estrin D.Robust range estimation using acoustic andmultimodal sensing[C]∥ 2001IEEE/RSJ International Conference on Intelligent Robots and Systems,2001.IEEE,2001,3:1312-1320
[15] Niculescu D,Nath B.Ad hoc positioning system (APS) using AOA[C]∥INFOCOM 2003,Twenty-Second Annual Joint Conference of the IEEE Computer and Communications,IEEE Socie-ties.IEEE,2003,3:1734-1743
[16] Bulusu N,Heidemann J,Estrin D.GPS-less low-cost outdoor localization for very small devices[J].Personal Communications,IEEE,2000,7(5):28-34
[17] He T,Huang C,Blum B M,et al.Range-free localizationschemes for large scale sensor networks[C]∥Proceedings of the 9th annual international conference on Mobile computing and networking.ACM,2003:81-95
[18] Bulusu N,Estrin D,Girod L,et al.Scalable coordination forwireless sensor networks:self-configuring localization systems[C]∥International Symposium on Communication Theory and Applications (ISCTA 2001).Ambleside,UK,2001
[19] 王新生,赵衍静,李海涛.基于 DV-Hop 定位算法的改进研究[J].计算机科学,2011,38(2):76-78
[20] Anjum F,Pandey S,Agrawal P.Secure localization in sensornetworks using transmission range variation[C]∥ IEEE International Conference on Mobile Adhoc and Sensor Systems Conference,2005.IEEE,2005:9-203
[21] Du W,Fang L,Peng N.Lad:Localization anomaly detection for wireless sensor networks[J].Journal of Parallel and Distributed Computing,2006,66(7):874-886
[22] Liu D,Ning P,Liu A,et al.Attack-resistant location estimation in wireless sensor networks[J].ACM Transactions on Information and System Security (TISSEC),2008,11(4):22
[23] Qiao D,乔大鹏.Solutions for wireless sensor network localization[J].IEEE Transactions on Evolutionary Computation,2011,15:4-31
[24] Patwari N.Location estimation in sensor networks[D].The University of Michigan,2005
[25] FengYuan.Windows图形编程[M].北京:机械工业出版社,2002:15-17

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!