Step Length Measurements Using the Received Signal Strength Indicator
نویسندگان
چکیده
منابع مشابه
Maritime Management Using Received Signal Strength Indicator
For location finding through Wireless Sensor Networks (WSNs), the RSSI is regularly assumed to have a linear signal strength by the whole of the logarithm of the communication distance. However, this is not true in certain cases because there are uncertainties in RSSI readings to obstacles, receiver interferences etc. In this complimentary, we specifically ask for the hand of a new RSSI-based c...
متن کاملΠ8: Indoor Positioning System using WLAN Received Signal Strength Measurements
In this deliverable we provide the details of building an indoor positioning system using WLAN Received Signal Strength (RSS) fingerprints. The positioning system has been deployed at the premises of KIOS Research Center and follows a terminal-based-network-assisted architecture. In our case, users that carry a terminal (Tablet PC) are able to self-locate and positioning is performed entirely o...
متن کاملEmitter localization using received-strength-signal data
This paper considers a scenario in which signals from an emitter at an unknown location are received at a number of different collinear locations. The receiver can determine the received signal strength, but no other parameters of the signal. Postulating a log-normal transmission model with a constant but unknown path loss exponent and, also, an unknown transmit power and known noise variance, ...
متن کاملDetecting Evil-twin Attacks in Smart Homes Using The Received Signal Strength Indicator
Evil-twin is a common attack in WIFI environments, with which an attacker can set up a fake AP to steal sensitive information from the connected devices. The current approaches of detecting Evil-twin AP use some identities or fingerprints (such as SSIDs, MAC address and network traffic patterns) to verify the identify of the AP. However, such information can be easily obtained and faked by the ...
متن کاملUsing received signal strength indicator to detect node replacement and replication attacks in wireless sensor networks
With the advent of powerful and efficient wireless sensor nodes, the usage of wireless sensor networks (WSNs) has been greatly increased. However, various kinds of security breaches have also been introduced, which exposes the vulnerability of these nodes to defend the valuable data from some specific types of attacks. In this paper, we address node replication, replacement, and man-in-the-midd...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Sensors
سال: 2021
ISSN: 1424-8220
DOI: 10.3390/s21020382