2023
DOI: 10.3390/s23146393
|View full text |Cite
|
Sign up to set email alerts
|

A Secure ZUPT-Aided Indoor Navigation System Using Blockchain in GNSS-Denied Environments

Ali Shakerian,
Ali Eghmazi,
Justin Goasdoué
et al.

Abstract: This paper proposes a novel Blockchain-based indoor navigation system that combines a foot-mounted dual-inertial measurement unit (IMU) setup and a zero-velocity update (ZUPT) algorithm for secure and accurate indoor navigation in GNSS-denied environments. The system estimates the user’s position and orientation by fusing the data from two IMUs using an extended Kalman filter (EKF). The ZUPT algorithm is employed to detect and correct the error introduced by sensor drift during zero-velocity intervals, thus en… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 32 publications
0
2
0
Order By: Relevance
“…The framework gathers information from four main layers, namely, the IoT layer, network layer, fog layer, and cloud layer to monitor and analyse the network traffic among IoT devices. The authors in [ 23 , 24 ] proposed blockchain-based solutions to detect malicious vehicles and IoT devices. The main difference between our work and the work proposed in [ 23 ] is that in the latter case, the malicious behaviour of the vehicles is detected using machine learning (neural networks), while in our case we focus on the lateral movement among the endpoints installed inside the vehicles.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The framework gathers information from four main layers, namely, the IoT layer, network layer, fog layer, and cloud layer to monitor and analyse the network traffic among IoT devices. The authors in [ 23 , 24 ] proposed blockchain-based solutions to detect malicious vehicles and IoT devices. The main difference between our work and the work proposed in [ 23 ] is that in the latter case, the malicious behaviour of the vehicles is detected using machine learning (neural networks), while in our case we focus on the lateral movement among the endpoints installed inside the vehicles.…”
Section: Introductionmentioning
confidence: 99%
“…The main difference between our work and the work proposed in [ 23 ] is that in the latter case, the malicious behaviour of the vehicles is detected using machine learning (neural networks), while in our case we focus on the lateral movement among the endpoints installed inside the vehicles. The authors in [ 24 ] addressed the problem of indoor navigation and proposed a new secure communication approach based on blockchain, which is different from the objective of our paper.…”
Section: Introductionmentioning
confidence: 99%