Step Length Measurements Using the Received Signal Strength Indicator

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Maritime Management Using Received Signal Strength Indicator

For location finding through Wireless Sensor Networks (WSNs), the RSSI is regularly assumed to have a linear signal strength by the whole of the logarithm of the communication distance. However, this is not true in certain cases because there are uncertainties in RSSI readings to obstacles, receiver interferences etc. In this complimentary, we specifically ask for the hand of a new RSSI-based c...

متن کامل

Π8: Indoor Positioning System using WLAN Received Signal Strength Measurements

In this deliverable we provide the details of building an indoor positioning system using WLAN Received Signal Strength (RSS) fingerprints. The positioning system has been deployed at the premises of KIOS Research Center and follows a terminal-based-network-assisted architecture. In our case, users that carry a terminal (Tablet PC) are able to self-locate and positioning is performed entirely o...

متن کامل

Emitter localization using received-strength-signal data

This paper considers a scenario in which signals from an emitter at an unknown location are received at a number of different collinear locations. The receiver can determine the received signal strength, but no other parameters of the signal. Postulating a log-normal transmission model with a constant but unknown path loss exponent and, also, an unknown transmit power and known noise variance, ...

متن کامل

Detecting Evil-twin Attacks in Smart Homes Using The Received Signal Strength Indicator

Evil-twin is a common attack in WIFI environments, with which an attacker can set up a fake AP to steal sensitive information from the connected devices. The current approaches of detecting Evil-twin AP use some identities or fingerprints (such as SSIDs, MAC address and network traffic patterns) to verify the identify of the AP. However, such information can be easily obtained and faked by the ...

متن کامل

Using received signal strength indicator to detect node replacement and replication attacks in wireless sensor networks

With the advent of powerful and efficient wireless sensor nodes, the usage of wireless sensor networks (WSNs) has been greatly increased. However, various kinds of security breaches have also been introduced, which exposes the vulnerability of these nodes to defend the valuable data from some specific types of attacks. In this paper, we address node replication, replacement, and man-in-the-midd...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Sensors

سال: 2021

ISSN: 1424-8220

DOI: 10.3390/s21020382