2018
DOI: 10.1109/tvt.2018.2864270
|View full text |Cite
|
Sign up to set email alerts
|

DV-Hop Localization With Protocol Sequence Based Access

Abstract: Among typical range-free localization schemes for sensor networks, DV-Hop has its distinguishing advantage of the capability to localize unknown nodes, which have less than three or even no neighbor anchors. However, existing DV-Hop based localization methods have not considered the problem of packet collisions, which can frequently happen during the throughoutwhole-network broadcast of numerous data packets at the first two steps of DV-Hop. In order to effectively improve the success rate of packet transmissi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(4 citation statements)
references
References 34 publications
(51 reference statements)
0
4
0
Order By: Relevance
“…Each node sends data according to the assigned protocol sequence, ensuring that the data is successfully transmitted within a fixed delay and providing good stability for short-term communication performance. Up to now, there have been a lot of constructions of protocol sequence, such as Chinese Remainder Theorem(CRT) sequence, prime sequence, extended prime sequence [23][24][25][26], etc. Conflict-avoiding code is used to ensure that each node can successfully send data at least once within a sequence cycle under time slot synchronization [?, 27,28].…”
Section: Access In Data Linkmentioning
confidence: 99%
“…Each node sends data according to the assigned protocol sequence, ensuring that the data is successfully transmitted within a fixed delay and providing good stability for short-term communication performance. Up to now, there have been a lot of constructions of protocol sequence, such as Chinese Remainder Theorem(CRT) sequence, prime sequence, extended prime sequence [23][24][25][26], etc. Conflict-avoiding code is used to ensure that each node can successfully send data at least once within a sequence cycle under time slot synchronization [?, 27,28].…”
Section: Access In Data Linkmentioning
confidence: 99%
“…In addition, the main idea is that the unknown node is first located will be considered an anchor node and then locate other unknown nodes. To combat the conflict problem of the packet transmission process, Gui et al proposed a medium access control method, which is based on Chinese Remainder Theorem (CRT) protocol sequence. Phoemphon et al reduced positioning errors by reducing anchor nodes and narrowing coverage to specific areas, and solving them using particle swarm optimization (PSO) algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…A cross-layer distributed cooperative MAC has been identified where the best cooperative nodes are selected on the basis of residual energy and location information [67]. A new medium access control (MAC) for the DV-HOP localization algorithm has been proposed using the Chinese remainder theorem (CRT) protocol sequence to improve the packet transmission success rate [68].…”
Section: Present State Of Research and Research Gapsmentioning
confidence: 99%