Vehicular Node Localization Using Received-Signal-Strength Indicator

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Maritime Management Using Received Signal Strength Indicator

For location finding through Wireless Sensor Networks (WSNs), the RSSI is regularly assumed to have a linear signal strength by the whole of the logarithm of the communication distance. However, this is not true in certain cases because there are uncertainties in RSSI readings to obstacles, receiver interferences etc. In this complimentary, we specifically ask for the hand of a new RSSI-based c...

متن کامل

Received Signal Strength Indicator Node Localization Algorithm Based on Constraint Particle Swarm Optimization

Because the received signal strength indicator (RSSI) value greatly changes, the direct use of RSSI value has more errors in the positioning process as the basis to calculate the position of anchor nodes. This paper proposes a RSSI node localization algorithm based on constraint particle swarm optimization (PSO-RSSI). In the algorithm, particle swarm optimization is used to select anchor nodes ...

متن کامل

Emitter localization using received-strength-signal data

This paper considers a scenario in which signals from an emitter at an unknown location are received at a number of different collinear locations. The receiver can determine the received signal strength, but no other parameters of the signal. Postulating a log-normal transmission model with a constant but unknown path loss exponent and, also, an unknown transmit power and known noise variance, ...

متن کامل

Using received signal strength indicator to detect node replacement and replication attacks in wireless sensor networks

With the advent of powerful and efficient wireless sensor nodes, the usage of wireless sensor networks (WSNs) has been greatly increased. However, various kinds of security breaches have also been introduced, which exposes the vulnerability of these nodes to defend the valuable data from some specific types of attacks. In this paper, we address node replication, replacement, and man-in-the-midd...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Vehicular Technology

سال: 2007

ISSN: 0018-9545

DOI: 10.1109/tvt.2007.907687