CN115103351A - Wireless sensor network distributed positioning method under privacy protection - Google Patents
Wireless sensor network distributed positioning method under privacy protection Download PDFInfo
- Publication number
- CN115103351A CN115103351A CN202210634055.2A CN202210634055A CN115103351A CN 115103351 A CN115103351 A CN 115103351A CN 202210634055 A CN202210634055 A CN 202210634055A CN 115103351 A CN115103351 A CN 115103351A
- Authority
- CN
- China
- Prior art keywords
- node
- anchor
- nodes
- wireless sensor
- sensor network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 18
- 239000011159 matrix material Substances 0.000 claims description 7
- 230000004931 aggregating effect Effects 0.000 claims description 2
- 230000002708 enhancing effect Effects 0.000 claims description 2
- 230000003993 interaction Effects 0.000 abstract description 7
- 238000004891 communication Methods 0.000 abstract description 4
- 238000010586 diagram Methods 0.000 description 4
- 240000007651 Rubus glaucus Species 0.000 description 2
- 235000011034 Rubus glaucus Nutrition 0.000 description 2
- 235000009122 Rubus idaeus Nutrition 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000005259 measurement Methods 0.000 description 2
- 235000015108 pies Nutrition 0.000 description 2
- 241001137251 Corvidae Species 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 238000012804 iterative process Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W64/00—Locating users or terminals or network equipment for network management purposes, e.g. mobility management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a distributed positioning method of a wireless sensor network under privacy protection.A scene is assumed that all sensor nodes are positioned in a convex hull of an anchor node, and each sensor node can find three adjacent nodes as a triangular splitting set so as to be positioned in the convex hull formed by the adjacent nodes; the sensor node and the adjacent node can communicate in pairs, and meanwhile, the privacy of the node position is considered; when the sensor performs communication interaction, time-varying incremental noise is added to the node position information based on a privacy protection strategy, so that an attacker cannot steal the private position of the node, and the wireless sensor network can be accurately positioned under the condition of protecting the private position of the node.
Description
Technical Field
The invention relates to the technical field of wireless sensor network positioning, in particular to a distributed positioning method of a wireless sensor network under privacy protection.
Background
Positioning is a fundamental problem of wireless sensor networks, and has attracted extensive attention of researchers in recent years, exciting many potential applications, such as location support services, smart home systems, and target tracking. Sensor location information is critical to accurately processing sensor measurements, but in applications where sensors are deployed randomly, the exact location of the sensor is unknown. Therefore, how to design a proper positioning algorithm is the key to realize the efficient and accurate work of the sensor.
At present, a distributed iterative positioning algorithm based on barycentric coordinates becomes a widely applied high-precision distributed positioning algorithm, and the algorithm represents a positioning process as an iterative process in a matrix vector form by measuring relative distances among sensor nodes, so that the overall convergence to the precise position of a sensor can be realized. It is worth noting that although distributed framework-based sensor positioning algorithms have been proposed, most of them do not consider that information interaction between sensors causes serious privacy problem.
Information interaction in an unencrypted plaintext form is easily attacked by an external attacker, and the attacker can steal information through a communication link between the invading nodes, so that the privacy information of the sensor nodes is invaded, and the whole positioning system is damaged. In addition, the attacker can also infer the location of other non-anchor nodes by associating distance measurements with the monitored area. Therefore, it is a concern to develop a corresponding policy to protect the private location of the sensor node.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provide a distributed positioning method of a wireless sensor network under privacy protection.
In order to achieve the above object, the present invention provides a distributed positioning method for a wireless sensor network under privacy protection, which is characterized by comprising the following steps:
(1) setting a wireless sensor network
Setting a wireless sensor network to be positioned, wherein the wireless sensor network consists of n nodes in a two-dimensional space, and each node represents a wireless sensor;
in the wireless sensor network to be positioned, nodes with known self coordinate positions are marked as anchor nodes, nodes with unknown self coordinate positions are marked as non-anchor nodes, and therefore the nodes in the wireless sensor network are divided into anchor node setsAnd a set of non-anchor nodesWherein the anchor node setFrom s anchor nodes X i Composition of, isAnchorage node setFrom n-s non-anchor nodes Y j Composition of, is
(2) Recording the coordinates of the anchor nodes and the non-anchor nodes;
recording anchor node setCoordinates of each anchor node in P a =[p 1 ,...,p i ,...,p s ] T Wherein p is i For the ith anchor node X i The coordinates of (a);
aggregating non-anchor nodesNon-anchor inThe coordinates of the nodes are denoted as P b =[p s+1 ,...,p s+j ,...,p n ] T ,p s+j Representing the jth non-anchor node Y j The coordinates of (a);
(3) setting an adjacent node set of non-anchor nodes;
defining non-anchor nodes Y j Adjacent node set ofWherein, K j Is formed by a distance non-anchor node Y j Nearest 3 nodes d j1 ,d j2 ,d j3 Forming;
(4) establishing a distributed positioning model of the non-anchor node position;
assuming a set of non-anchor nodesWherein all non-anchor nodes are located in the anchor node setWithin the convex hull of the anchor node, traverse through the set of non-anchor nodesAt each iteration time t, updating the non-anchor node Y j The position of (a);
wherein p is j (t) denotes the jth non-anchor node Y j Coordinate at time t, gamma is the gain factor, p k For non-anchor node Y at time t j Adjacent node d jk Position coordinates of a jk Is a non-anchor node Y j Relative to its neighboring node d jk The barycentric coordinates of (a);
(5) synchronously and iteratively positioning the position of the non-anchor node under privacy protection;
(5.1) set maximum iteration time t * (ii) a Randomly setting anchor node X i And non-anchor node Y j In which the anchor node X i Is set to p i (0)=p i Randomly setting non-anchor node Y j Is p as the initial position j (0);
Setting time-varying incremental noise of each node in wireless sensor networkWherein anchor node X i Noise parameter delta of i 1 is ═ 1; non-anchor node set Y j Noise parameter delta of j Satisfy constraints
(5.2) adding a time-varying delta noise sigma to the position estimate of each node at iteration time t w (t), further enhancing privacy protection;
wherein, zeta 0 & lt 1 is a constant parameter;
(5.3) respectively calculating anchor nodes X at iteration time t i And non-anchor node set Y j The position estimate after introducing time-varying delta noise is:
(5.4) after the privacy protection operation of the formula (3), each node sends the position estimation of the current time of the node to the adjacent node, and further obtains the position estimation of each node at the next time;
(5.5) all non-anchor nodes relative to the adjacent node set K j The barycentric coordinates of (a) are written in a matrix-vector form:
wherein F, H are all sub-random matrices, [ F H ]]As a random matrix of rows, when adjacent nodes d jk Belonging to non-anchor nodes Y j When the triangle is split into two sets, [ F H ]] jk =a jk When the adjacent node d jk Not belonging to non-anchor nodes Y j When the triangle is split into two sets, [ F H ]] jk =0,I s And I n-s Is an identity matrix;
(5.6) when the iteration time t reaches the set maximum iteration time t * Then, a set of non-anchor nodes is calculatedBased on anchor node setThe positions indicated are:
to this end, a set of non-anchor nodes based on a privacy preserving policyThe position location of (2) is completed.
The invention aims to realize the following steps:
the invention discloses a distributed positioning method of a wireless sensor network under privacy protection.A scene is assumed that all sensor nodes are positioned in a convex hull of an anchor node, and each sensor node can find three adjacent nodes as a triangular cross section set so as to be positioned in the convex hull formed by the adjacent nodes; the sensor node and the adjacent node can communicate in pairs, and meanwhile, the privacy of the node position is considered; when the sensor performs communication interaction, time-varying incremental noise is added to the node position information based on a privacy protection strategy, so that an attacker cannot steal the private position of the node, and the wireless sensor network can be accurately positioned under the condition of protecting the private position of the node.
Meanwhile, the wireless sensor network distributed positioning method under privacy protection of the invention also has the following beneficial effects:
(1) in the distributed positioning iteration process, the noise item meeting the constraint condition is added into the position estimation of the sensor node, the method has no influence on the positioning precision of the sensor network, and the privacy of the accurate position of the node can be effectively ensured under the condition that an attacker steals the position information of the neighbor node.
(2) The invention considers that in some real sensor network environments, an attacker with remote observation capability can steal part of inbound information of the neighbor, and the classical privacy protection method is limited to the situation that the attacker can only steal outbound information of the neighbor node but cannot steal inbound information of the neighbor node. Therefore, the invention provides a privacy protection new strategy introducing time-varying incremental noise, which can still well protect the privacy of the node under the condition that an attacker steals the inbound information of the neighbor node.
Drawings
FIG. 1 is a flow chart of a distributed positioning method of a wireless sensor network under privacy protection according to the present invention;
FIG. 2 is a schematic diagram of a set of raspberry pie placements set up in an experiment;
FIG. 3 is a schematic diagram of a convex hull in which a node is located in its neighborhood in a wireless sensor network;
FIG. 4 is a topological diagram of interaction among 10 sensor nodes in a wireless sensor network;
FIG. 5 is an initial position of 7 non-anchor nodes in the wireless sensor network, which is randomly set;
fig. 6 is the exact position to which the 7 non-anchor nodes eventually converge after 40 iterations.
Detailed Description
The following description of the embodiments of the present invention is provided in order to better understand the present invention for those skilled in the art with reference to the accompanying drawings. It is to be expressly noted that in the following description, a detailed description of known functions and designs will be omitted when it may obscure the subject matter of the present invention.
Examples
Fig. 1 is a flowchart of a distributed positioning method for a wireless sensor network under privacy protection according to the present invention.
In this embodiment, as shown in fig. 1, a method for distributed positioning of a wireless sensor network under privacy protection according to the present invention includes the following steps:
s1, setting a wireless sensor network;
in this embodiment, as shown in fig. 2, a wireless sensor network is located in a distributed manner by a group of raspberry pies, where n is 10 total nodes in a two-dimensional space, each node represents a wireless sensor, and the nodes in the wireless sensor network are further divided into anchor node setsAnd a set of non-anchor nodesThe location of the anchor node is statically known. In this embodiment, a set of anchor nodesBy 3 anchor nodes X i Composition of, isNon-anchor node setFrom 7 non-anchor nodes Y j Composition of, is
S2, recording coordinates of the anchor node and the non-anchor node;
Assembling non-anchor nodesThe coordinates of the non-anchor nodes of these unknown coordinates are denoted as P b =[p 4 ,...,p 3+j ,...,p 10 ] T ,p 3+j Representing the jth non-anchor node Y j The coordinates of (a);
s3, setting an adjacent node set of non-anchor nodes;
defining non-anchor nodes Y j Adjacent node set ofWherein, K j By distance from non-anchor node Y j Nearest 3 nodes d j1 ,d j2 ,d j3 Forming;
s4, establishing a distributed positioning model of the non-anchor node position;
in this embodiment, fig. 4 is an interaction topology diagram of each sensor in the wireless sensor network. The wireless sensor network has 3 anchor nodes, which are represented by Anchori (i is 1,2, 3); there are 7 non-anchor nodes in the network, denoted by nodej (j-4, 5.., 10). Assuming a set of non-anchor nodesWherein all non-anchor nodes are locatedWithin the convex hull of the anchor node, traverse through the set of non-anchor nodesAt each iteration time t, updating the non-anchor node Y j The position of (a);
wherein p is j (t) denotes the jth non-anchor node Y j Coordinate at time t, gamma is the gain factor, p k For non-anchor node Y at time t j Adjacent node d jk Position coordinates of a jk Is a non-anchor node Y j Relative to its neighboring node d jk The barycentric coordinates of (a); .
In this embodiment, as shown in fig. 3, a non-anchor node Y in a wireless sensor network j A triangulation of the non-anchor node Y j The barycentric coordinate relative to three adjacent nodes r, s and t is a jr 、a js 、a jt Non-anchor node Y j Position coordinate p of j Satisfies the following conditions:
p j =a jr p r +a js p s +a jt p t (2)
wherein, a jr +a js +a jt =1;
Non-anchor node Y j The barycentric coordinates of (c) can be calculated by specifying the ratio of the signed areas between the triangles:
wherein S is Δjst 、S Δjrt 、S Δjrs 、S Δrst Can be obtained by measuring the relative distance between nodes, and is calculated by Cayley-Menger determinant as S Δjst For example, the following steps are carried out:
s5, synchronously and iteratively positioning the position of the non-anchor node under privacy protection;
s5.1, set maximum iteration time t * (ii) a Randomly setting anchor node X i And non-anchor node Y j Initial position of, wherein, anchor node X i Is set to p i (0)=p i Randomly setting non-anchor node Y j Is p as the initial position j (0);
As shown in fig. 4, there are frequent communication interactions between nodes of the wireless sensor network. In the process of information exchange of nodes, in order to prevent an attacker from stealing information, a privacy protection strategy of time-varying incremental noise is introduced.
Setting time-varying incremental noise of each node in wireless sensor networkWherein anchor node X i Noise parameter delta of i 1 is ═ 1; set of non-anchor nodes Y j Noise parameter delta of j Satisfy constraints
S5.2, adding time-varying incremental noise to position estimation of each nodeThen at iteration time t, a time-varying delta noise σ is added to the position estimate for each node w (t) is:
where 0 < ζ < 1 is a constant parameter set randomly, it can be seen that the noise added increases as the iteration time goes on.
S5.3, respectively calculating anchor nodes X at iteration time t i And a set of non-anchor nodes Y j The position estimate after introducing time-varying delta noise is:
s5.4, after the privacy protection operation of the formula (6), each node sends the position estimation of the current time of the node to the adjacent node, and further obtains the position estimation of each node at the next time;
s5.5, in the embodiment, 7 non-anchor nodes are opposite to the adjacent node set K j The barycentric coordinates of (a) are written in a matrix-vector form:
wherein F, H are all sub-random matrices, [ F H ]]Is a row random matrix when the adjacent node d jk Belonging to non-anchor nodes Y j When the triangle is split into two sets, [ F H ]] jk =a jk When the adjacent node d jk Not belonging to non-anchor nodes Y j When the triangulation is divided into two sets, [ F H ]] jk =0,I s And I n-s Is an identity matrix;
s5.6, when the iteration time t reaches the set maximum iteration time t * Then, a set of non-anchor nodes is calculatedBased on anchor node setThe positions indicated are:
to this end, based on the non-anchor node set under the privacy protection strategyThe position location of (2) is completed.
Fig. 5 shows initial positions of 7 non-anchor nodes randomly arranged in a wireless sensor network, where Node j (j ═ 4, 5.., 10) is a given initial position estimate of the non-anchor nodes, and it can be seen that the initial estimate has a large error from an actual position. By using the iterative positioning algorithm under privacy protection, the estimated position of the non-anchor node is gradually close to the actual position. Fig. 6 shows the accurate positions of 7 non-anchor nodes in the sensor network after 40 iterations, and it can be seen that all the non-anchor nodes Node j (j is 4, 5., 10) can converge to the actual positions of the sensor nodes.
Although the illustrative embodiments of the present invention have been described in order to facilitate those skilled in the art to understand the present invention, it is to be understood that the present invention is not limited to the scope of the embodiments, and that various changes may be made apparent to those skilled in the art as long as they are within the spirit and scope of the present invention as defined and defined in the appended claims, and all matters of the invention using the inventive concepts are protected.
Claims (1)
1. A wireless sensor network distributed positioning method under privacy protection is characterized by comprising the following steps:
(1) setting a wireless sensor network;
the method comprises the steps that a wireless sensor network to be positioned is arranged and composed of n nodes in a two-dimensional space, and each node represents a wireless sensor;
in the wireless sensor network to be positioned, nodes with known self coordinate positions are marked as anchor nodes, nodes with unknown self coordinate positions are marked as non-anchor nodes, and therefore the nodes in the wireless sensor network are divided into anchor node setsAnd a set of non-anchor nodesWherein the set of anchor nodesBy s anchor nodes X i Composition of, isAnchorage node setFrom n-s non-anchor nodes Y j Composition, as
(2) Recording the coordinates of the anchor nodes and the non-anchor nodes;
recording anchor node setCoordinates of each anchor node in P a =[p 1 ,…,p i ,…,p s ] T Wherein p is i For the ith anchor node X i The coordinates of (a);
aggregating non-anchor nodesCoordinate of the non-anchor node in (1) is expressed as P b =[p s+1 ,…,p s+j ,…,p n ] T ,p s+j Denotes the jth non-anchor node Y j The coordinates of (a);
(3) setting an adjacent node set of non-anchor nodes;
defining non-anchor nodes Y j Adjacent node set ofWherein, K j Is formed by a distance non-anchor node Y j Nearest 3 nodes d j1 ,d j2 ,d j3 Forming;
(4) establishing a distributed positioning model of the non-anchor node position;
assuming a set of non-anchor nodesWherein all non-anchor nodes are located in the anchor node setWithin the convex hull of the anchor node, traverse through the set of non-anchor nodesAt each iteration time t, updating the non-anchor node Y j The position of (a);
wherein p is j (t) denotes the jth non-anchor node Y j Coordinate at time t, gamma is the gain factor, p k Is a non-anchor node Y at time t j Adjacent node d jk Position coordinates of (a) jk Is a non-anchor node Y j Relative to its neighboring node d jk The barycentric coordinates of (a);
(5) synchronously and iteratively positioning the position of the non-anchor node under privacy protection;
(5.1) set maximum iteration time t * (ii) a Randomly setting anchor node X i And non-anchor node Y j In which the anchor node X i Is set to p i (0)=p i Randomly setting non-anchor node Y j Is p as the initial position j (0);
Setting time-varying incremental noise of each node in wireless sensor networkWherein anchor node X i Noise parameter delta of i 1 is ═ 1; set of non-anchor nodes Y j Noise parameter delta of j Satisfy constraints
(5.2) adding a time-varying delta noise sigma to the position estimate of each node at iteration time t w (t), further enhancing privacy protection;
wherein, zeta 0 & lt 1 is a constant parameter;
(5.3) respectively calculating anchor nodes X at iteration time t i And a set of non-anchor nodes Y j The position estimate after introducing time-varying delta noise is:
(5.4) after the privacy protection operation of the formula (3), each node sends the position estimation of the current time of the node to the adjacent node, and further obtains the position estimation of each node at the next time;
(5.5) all non-anchor nodes relative to the adjacent node set K j The barycentric coordinates of (a) are written in a matrix-vector form:
wherein F, H are all sub-random matrices, [ F H ]]Is a row random matrix when the adjacent node d jk Belonging to non-anchor nodes Y j When the triangle is split into two sets, [ F H ]] jk =a jk When the adjacent node d jk Not belonging to non-anchor nodes Y j When the triangle is split into two sets, [ F H ]] jk =0,I s And I n-s Is an identity matrix;
(5.6) when the iteration time t reaches the set maximum iteration time t * Then, a set of non-anchor nodes is calculatedBased on anchor node setThe positions indicated are:
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210634055.2A CN115103351B (en) | 2022-06-07 | 2022-06-07 | Wireless sensor network distributed positioning method under privacy protection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210634055.2A CN115103351B (en) | 2022-06-07 | 2022-06-07 | Wireless sensor network distributed positioning method under privacy protection |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115103351A true CN115103351A (en) | 2022-09-23 |
CN115103351B CN115103351B (en) | 2024-07-30 |
Family
ID=83289020
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210634055.2A Active CN115103351B (en) | 2022-06-07 | 2022-06-07 | Wireless sensor network distributed positioning method under privacy protection |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115103351B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140047242A1 (en) * | 2011-04-21 | 2014-02-13 | Tata Consultancy Services Limited | Method and system for preserving privacy during data aggregation in a wireless sensor network |
CN109511149A (en) * | 2018-12-22 | 2019-03-22 | 山西财经大学 | A kind of wireless sensor network routing method based on pseudo- spiral |
CN113453143A (en) * | 2021-05-14 | 2021-09-28 | 浙江工业大学 | Source position privacy protection method of dynamic phantom node strategy |
CN113891244A (en) * | 2021-11-16 | 2022-01-04 | 电子科技大学 | Wireless sensor network positioning method under DoS attack |
-
2022
- 2022-06-07 CN CN202210634055.2A patent/CN115103351B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140047242A1 (en) * | 2011-04-21 | 2014-02-13 | Tata Consultancy Services Limited | Method and system for preserving privacy during data aggregation in a wireless sensor network |
CN109511149A (en) * | 2018-12-22 | 2019-03-22 | 山西财经大学 | A kind of wireless sensor network routing method based on pseudo- spiral |
CN113453143A (en) * | 2021-05-14 | 2021-09-28 | 浙江工业大学 | Source position privacy protection method of dynamic phantom node strategy |
CN113891244A (en) * | 2021-11-16 | 2022-01-04 | 电子科技大学 | Wireless sensor network positioning method under DoS attack |
Non-Patent Citations (3)
Title |
---|
FRANCESCO BUCCAFURRI ECT.: "A Privacy-Preserving Localization Service for Assisted Living Facilities", 《IEEE TRANSACTIONS ON SERVICES COMPUTING》, 29 December 2016 (2016-12-29) * |
YUNKAI LV ECT.: "Distributed Localization of Multiagent Systems With Imperfect Channels Based on Iterative Learning", 《IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS》, 27 October 2021 (2021-10-27) * |
任鹏飞;谷灵康;: "基于粒子群进化的输电网络WSN节点定位算法", 沈阳工业大学学报, no. 05, 29 August 2018 (2018-08-29) * |
Also Published As
Publication number | Publication date |
---|---|
CN115103351B (en) | 2024-07-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113891244B (en) | Wireless sensor network positioning method under DoS attack | |
Al Shayokh et al. | Bio inspired distributed WSN localization based on chicken swarm optimization | |
Dhillon et al. | Sensor placement for effective coverage and surveillance in distributed sensor networks | |
Kumar et al. | Computational intelligence based algorithm for node localization in wireless sensor networks | |
CN108966120B (en) | Combined trilateral positioning method and system for dynamic cluster network improvement | |
CN114326403B (en) | Multi-intelligent system security convergence control method based on node information privacy protection | |
Brust et al. | Multi‐hop localization system for environmental monitoring in wireless sensor and actor networks | |
Wang et al. | Fully distributed observer design for mobile targets | |
Banihashemian et al. | A novel robust soft-computed range-free localization algorithm against malicious anchor nodes | |
CN112953943B (en) | False data injection attack resisting method based on trust mechanism in distributed estimation | |
CN115103351A (en) | Wireless sensor network distributed positioning method under privacy protection | |
Wu et al. | Mobile sensor networks self localization based on multi-dimensional scaling | |
Kranakis et al. | Displacing random sensors to avoid interference | |
Wardega et al. | Byzantine resilience at swarm scale: A decentralized blocklist protocol from inter-robot accusations | |
Goyal et al. | Performance of BAT algorithm on localization of wireless sensor network | |
CN115967550A (en) | Privacy protection and mean convergence control method for unmanned cluster system | |
Mazinani et al. | Secure localization approach in wireless sensor network | |
Sharma et al. | Enhanced range free localization in wireless sensor networks | |
Piperigkos et al. | 5G enabled cooperative localization of connected and semi-autonomous vehicles via sparse Laplacian processing | |
Mirzaeifard et al. | Robust Networked Federated Learning for Localization | |
Wang et al. | Research on improved dv-hop localization algorithm based on rssi | |
Wang et al. | Distributed iterative localization for wireless sensor networks subject to DoS attacks | |
CN106199513B (en) | A kind of distributed multi-source location algorithm for wireless sensor network | |
Prateek et al. | Range free localization technique under erroneous estimation in wireless sensor networks | |
Song et al. | Circular formation control of mobile agents with limited interaction range and input saturation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |