2016
DOI: 10.3390/s16071041
|View full text |Cite
|
Sign up to set email alerts
|

An MEF-Based Localization Algorithm against Outliers in Wireless Sensor Networks

Abstract: Precise localization has attracted considerable interest in Wireless Sensor Networks (WSNs) localization systems. Due to the internal or external disturbance, the existence of the outliers, including both the distance outliers and the anchor outliers, severely decreases the localization accuracy. In order to eliminate both kinds of outliers simultaneously, an outlier detection method is proposed based on the maximum entropy principle and fuzzy set theory. Since not all the outliers can be detected in the detec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…At the same time, the PPM can be used in the distributed cooperative scenario, which significantly reduces the pressure of information interaction between the two nodes. An outlier detection method was proposed by Wang et al [35] based on the maximum entropy principle and fuzzy set theory.…”
Section: Introductionmentioning
confidence: 99%
“…At the same time, the PPM can be used in the distributed cooperative scenario, which significantly reduces the pressure of information interaction between the two nodes. An outlier detection method was proposed by Wang et al [35] based on the maximum entropy principle and fuzzy set theory.…”
Section: Introductionmentioning
confidence: 99%
“…When modified observations from attackers (or as we called them, the malicious observations) are unavoidable, the researchers propose detecting and eliminating the malicious observations and then using the remaining honest observations to achieve node localization [8,9,10]. This strategy can be called the secure localization strategy based on malicious node detection.…”
Section: Introductionmentioning
confidence: 99%
“…This strategy can be called the secure localization strategy based on malicious node detection. A typical work is the MEF-based localization algorithm proposed in Reference [8]. A common feature of this type of method is that the detection of malicious nodes usually needs to compare a large amount of data, thus causing a heavy calculation overhead.…”
Section: Introductionmentioning
confidence: 99%