2021
DOI: 10.1155/2021/6677896
|View full text |Cite
|
Sign up to set email alerts
|

V2X-Based Mobile Localization in 3D Wireless Sensor Network

Abstract: In a wireless sensor network (WSN), node localization is a key requirement for many applications. The concept of mobile anchor-based localization is not a new concept; however, the localization of mobile anchor nodes gains much attention with the advancement in the Internet of Things (IoT) and electronic industry. In this paper, we present a range-free localization algorithm for sensors in a three-dimensional (3D) wireless sensor networks based on flying anchors. The nature of the algorithm is also suitable fo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(16 citation statements)
references
References 29 publications
0
14
0
Order By: Relevance
“…Many schemes are proposed to extract secret keys from RSS, as it is supportive for most devices. In [16], a scheme is proposed which suggested two-level execution for generating security bits for this CIR, and RSS is used to perform validation. Now, the results show the feasibility of this scheme.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Many schemes are proposed to extract secret keys from RSS, as it is supportive for most devices. In [16], a scheme is proposed which suggested two-level execution for generating security bits for this CIR, and RSS is used to perform validation. Now, the results show the feasibility of this scheme.…”
Section: Related Workmentioning
confidence: 99%
“…This review has been compiled in Table 1. [15] RSS 3 [16] two-level execution using CIR and RSS 4 [17] Blocks and a two-level quantifier 5 [18] Key generation ranking mechanisms and interpolation 6 [19] Technique based on the KLT (Karhunen-Loeve Transform) 7…”
Section: Related Workmentioning
confidence: 99%
“…Nowadays, Internet of Things (IoT) and cloud computing networks are dominant in the Internet. The fast development in wireless sensor network technology has made the IoT network becomes more complex in term of applications [2] and routing [3]. Naturally, security turns out to be extremely important, especially in cloud environment [4].…”
Section: Related Workmentioning
confidence: 99%
“…A mamdani fuzzy logic system is proposed to process the sensor readings and output flood warnings, with a 96.96% accuracy achieved experimentally. Another recent work [23] implemented a novel localization technique named C-CURVE to localize sensor nodes in a WSN, achieving high accuracy in comparison to other state-of-the-art methods. The monitoring of WSN systems is also a point of interest for researchers.…”
Section: Wireless Sensor Network Vs Virtual Sensor Networkmentioning
confidence: 99%