2010
DOI: 10.1007/s11227-010-0501-4
|View full text |Cite
|
Sign up to set email alerts
|

Secure localization and location verification in wireless sensor networks: a survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
37
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 81 publications
(37 citation statements)
references
References 51 publications
0
37
0
Order By: Relevance
“…The algorithm implementation of wireless sensor network node optimal coverage based on improved genetic algorithm and binary ant colony algorithm is as follows [34][35][36][37][38][39]. …”
Section: Improved Genetic Algorithm and Binary Ant Colony Algorithmmentioning
confidence: 99%
“…The algorithm implementation of wireless sensor network node optimal coverage based on improved genetic algorithm and binary ant colony algorithm is as follows [34][35][36][37][38][39]. …”
Section: Improved Genetic Algorithm and Binary Ant Colony Algorithmmentioning
confidence: 99%
“…Usually, this kind of centralized algorithm has heavy communication traffic and sink nodes or background computers with strong computing power are required as well, hence it is not suitable for large scale WSN networks. There are certain related works which verify the anchor location by introducing a hidden localization verification station [11], which is also a centralized algorithm. In [12,13] rigidity theory is introduced to exclude outliers to provide reliable localization, however, rigidity theory requires pretty high ranging accuracy and it is computationally intensive.…”
Section: Reliable Localization Based On Anchor Filtrationmentioning
confidence: 99%
“…Usually, this kind of centralized algorithm has heavy communication traffic and sink nodes or background computers with strong computing power are required as well, hence it is not suitable for large scale randomly deployed WSN networks. There are certain related works which verify the anchor location by adopting a hidden localization verification station [19], which is also a centralized algorithm. In [20,21] rigidity theory is introduced to exclude outliers to provide reliable localization results, however, rigidity theory requires high ranging accuracy and it is computationally intensive.…”
Section: Related Workmentioning
confidence: 99%