Node localization through physical layer network coding: Bootstrap, security, and accuracy
نویسندگان
چکیده
Previous research on physical layer network coding (PNC) focuses on the improvements in bandwidth usage efficiency. Its capability to assist wireless nodes in localization was first discussed in [1]. In that paper, however, the authors discussed only the basic idea to detect and separate the interfered signals for calculating the node positions. Many important issues to turn the idea into a practical approach are not extensively studied. In this paper, we plan to investigate these problems. Specifically, our research focuses on the bootstrap procedures, security, and localization accuracy of the PNC based mechanism. We first study the required node density to bootstrap the localization procedure in both infrastructurebased and self-organized networks. With this question answered, researchers can recognize the network scenarios to which PNC based localization can be applied. We design mechanisms to protect integrity of the exchanged information and defend against node impersonation attacks so that the localization procedures will be robust against malicious activities. For localization accuracy, we study the negative impacts of the position errors of the anchor nodes. We design two mechanisms to reduce the localization inaccuracy for both individual nodes and cumulative procedures through excluding the anchor nodes with positioning errors and introducing multiple bootstrap areas. Both simulation and theoretical analysis are used to support our investigation. This research shows that PNC based node localization can satisfy the security and accuracy requirements of different types of wireless networks and it can be widely deployed. 2012 Elsevier B.V. All rights reserved.
منابع مشابه
Improve range-free localization accuracy in wireless sensor network using DV-hop and zoning
In recent years, wireless sensor networks have drawn great attention. This type of network is composed of a large number of sensor nodes which are able to sense, process and communicate. Besides, they are used in various fields such as emergency relief in disasters, monitoring the environment, military affairs and etc. Sensor nodes collect environmental data by using their sensors and send them...
متن کاملA multi-hop PSO based localization algorithm for wireless sensor networks
A sensor network consists of a large number of sensor nodes that are distributed in a large geographic environment to collect data. Localization is one of the key issues in wireless sensor network researches because it is important to determine the location of an event. On the other side, finding the location of a wireless sensor node by the Global Positioning System (GPS) is not appropriate du...
متن کاملWeak percolation on multiplex networks
Bootstrap percolation is a simple but nontrivial model. It has applications in many areas of science and has been explored on random networks for several decades. In single-layer (simplex) networks, it has been recently observed that bootstrap percolation, which is defined as an incremental process, can be seen as the opposite of pruning percolation, where nodes are removed according to a conne...
متن کاملExploring the Security Capabilities of Physical Layer Network Coding
In wireless networks, the bandwidth is considered one of the most scarce and valuable resources. The physical layer network coding (PNC) technique encourages strategically picked senders to interfere so that the destination nodes can leverage the network level information to recover the signals. PNC can yield higher capacity than network layer network coding when applied to wireless networks. H...
متن کاملOptimal SVD-based Precoding for Secret Key Extraction from Correlated OFDM Sub-Channels
Secret key extraction is a crucial issue in physical layer security and a less complex and, at the same time, a more robust scheme for the next generation of 5G and beyond. Unlike previous works on this topic, in which Orthogonal Frequency Division Multiplexing (OFDM) sub-channels were considered to be independent, the effect of correlation between sub-channels on the secret key rate is address...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Ad Hoc Networks
دوره 10 شماره
صفحات -
تاریخ انتشار 2012