Data Fusion in Wireless Communication Network Node Positioning
نویسندگان
چکیده
منابع مشابه
Node Positioning in a Limited Resource Wireless Network
By using a non-standard limited resource technique in wireless networks it is possible to reach features, which are more suitable for sensor networks and personal embedded applications than using standard protocols. Using new heavily integrated controller chips and RF-modems, it is possible to implement new features, for example, low-power routing, positioning and dynamic flat topology in limit...
متن کاملWireless Sensor Network Achieved by Automatic Positioning System Node
In application of wireless sensor network, the position information of sensor node is crucial within life cycle in the whole network. In order to design algorithm of node positioning with high-efficiency, high-precision and low-consumption, this paper puts forward using the encryption algorithm of space control node originally applied in field of engineering measurement, by using SDI algorithm ...
متن کاملRobust Node Positioning in Wireless Sensor Networks
Secure sensor localization is a prerequisite for many sensor networks to retrieve trustworthy data. However, most of existing node positioning systems were studied in trust environment and are therefore vulnerable to malicious attacks. In this work, we develop a robust node positioning mechanism(ROPM) to protect localization techniques from position attacks. Instead of introducing countermeasur...
متن کاملGeographic and Clustering Routing for Energy Saving in Wireless Sensor Network with Pair of Node Groups
Recently, wireless sensor network (WSN) is the popular scope of research. It uses too many applications such as military and non-military. WSN is a base of the Internet of Things (IoT), pervasive computing. It consists of many nodes which are deployed in a specific filed for sense and forward data to the destination node. Routing in WSN is a very important issue because of the limitation of the...
متن کاملNode Verification in Wireless Network
Proof of user identity on network is just like challenge for current scenario. Node verification is the vital procedure for wireless communication. We proposed a verification technique that use hash code for verification and also proposed 2D cryptography technique to maintain data integrity and confidentiality during transmission.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Transactions on Networks and Communications
سال: 2018
ISSN: 2054-7420
DOI: 10.14738/tnc.66.5833