TITLE

A node division location detection scheme for chain-type wireless sensor networks

AUTHOR(S)
Guangzhu Chen; Jiusheng Bao; Lei Zhang
PUB. DATE
January 2016
SOURCE
Wireless Communications & Mobile Computing;Jan2016, Vol. 16 Issue 1, p79
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
As a special type of wireless sensor network, the chain-type wireless sensor networks can be used to monitor narrow and long regions, such as roads, underground mine tunnels, rivers, and bridges. In this study, a perpendicular bisector division (PB) method was first presented, in which the location may be divided into more location sub-areas by a perpendicular bisector of each of two location nodes. Compared with the triangulation division method in Approximate Point-in-Triangulation Test (APIT), the computable complexity of PB is lower, and the number of division areas is larger. Furthermore, in order to locate targets under rare location nodes, a virtual location node-perpendicular bisector division (VPB) was presented by a virtual location node based on the geographic shape of the monitored area. Virtual location nodes increase the density of location nodes, which can improve the accuracy of the location in the location algorithm. Second, two range-free location algorithms were proposed: the location algorithm based on PB (LAPB) and the location algorithm based on VPB (LAVPB). In the end, the location errors performance of APIT, LAPB, and LAVPB for locating miners in an underground mine tunnel was tested. The results show that LAPB and LAVPB have higher location accuracy and are more robust than APIT. LAVPB is more suitable for locating targets in harsh environments.
ACCESSION #
111550980

 

Related Articles

  • Enhancement of an Error Minimizing Framework for Localizing Jammers in Wireless Networks: A Survey. Sivakumar, P.; Padmapriya, S.; Senthil, M. // International Journal of Engineering & Technology (0975-4024);Dec2013/Jan2014, Vol. 5 Issue 6, p5088 

    Jammers can sternly mess up the communication in wireless networks. The jamming attacks can be aggressively eradicate by the protector thus permits by the jammer location information. Our intensions to plan a framework that can be localize multiple jammers with high accuracy. Maximum of...

  • Trading sensing coverage for an extended network lifetime. Lim, Jong; Bleakley, C. // Telecommunication Systems;Apr2013, Vol. 52 Issue 4, p2667 

    One of the main benefits of using Wireless Sensor Networks (WSNs) is that they can be deployed in remote locations without any prior infrastructure. Because of this nodes are normally battery powered. This limits the lifetime of the network. In this paper, we propose a novel method of scheduling...

  • Joint Detection for Image Transmission Based on Schur Algorithm over Wireless Sensor Network. Yanjun Hu // Communications & Network;Nov2009, Vol. 1 Issue 2, p91 

    To achieve much efficient multimedia transmission over an error-prone wireless network, there are still some problem must to be solved, especially in energy limited wireless sensor network. In this paper, we propose a joint detection based on Schur Algorithm for image wireless transmission over...

  • The Comparative Research on the Location Technology of Wireless Sensor Networks. Jijun Zhao; Hua Li; Xin Zhao // Communications & Network;Nov2009, Vol. 1 Issue 2, p114 

    Wireless Sensor Network (WSN) which is composed of lots of self-organizational intelligence nodes has become new technology of information acquisition and processing. Location technology is one of the key technologies in WSN. There are many kinds of location algorithms currently and the research...

  • On Performance of Node Placement Approaches for Hierarchical Heterogeneous Sensor Networks. Pandey, Santhosh; Shaoqiang Dong; Agrawal, Prathima; Sivalingam, Krishna M. // Mobile Networks & Applications;Aug2009, Vol. 14 Issue 4, p401 

    This paper considers a two-tier hierarchical heterogeneous wireless sensor network using the concept of clustering. The network has two type of nodes: regular sensor nodes (litenodes or LN) with limited communications, storage, energy, and computation power; and high-end sophisticated nodes...

  • Joint Closed-Loop Power Control and Adaptive Beamforming for Wireless Networks with Antenna Arrays in a 2D Urban Environment. Moghadam, Mohamad Dosaranian; Bakhshi, Hamidreza; Dadashzadeh, Gholamreza // Communications & Network;Nov2010, Vol. 2 Issue 4, p869 

    The interference reduction capability of antenna arrays and the power control algorithms have been considered separately as means to decrease the interference in wireless communication networks. In this paper, we propose smart step closed-loop power control (SSPC) algorithm in wireless networks...

  • A Hierarchical Scheduling Scheme in WSNs Based on Node-Failure Pretreatment. Liu, Hai-yuan; Guo, Yi-nan; Chen, Mei-rong; Zhu, Yuan-shun // International Journal of Distributed Sensor Networks;7/7/2015, Vol. 2015, p1 

    One of the most important challenges in designing wireless sensor networks is how to recover a broken network within a very short time as the active nodes are failed or out-of-energy. Focusing on this problem, a hierarchical scheduling scheme based on node-failure pretreatment is proposed, in...

  • Localization algorithms of Wireless Sensor Networks: a survey. Han, Guangjie; Xu, Huihui; Duong, Trung; Jiang, Jinfang; Hara, Takahiro // Telecommunication Systems;Apr2013, Vol. 52 Issue 4, p2419 

    In Wireless Sensor Networks (WSNs), localization is one of the most important technologies since it plays a critical role in many applications, e.g., target tracking. If the users cannot obtain the accurate location information, the related applications cannot be accomplished. The main idea in...

  • Based on ETEO Pattern Abnormal Event Detection in Wireless Sensor Networks. Bo Tian; Dianhong Wang; Fenxiong Chen; Zhengpu Zhang // Advanced Materials Research;2014, Issue 926-930, p1886 

    This paper presents a new algorithm for the detection of abnormal events in Wireless Sensor Networks (WSN). Abnormal events are sets of data points that correspond to interesting patterns in the underlying phenomenon that the network monitors. This algorithm is inspired from time-series data...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics