2019
DOI: 10.32604/cmc.2019.03626
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Multi-Hop Algorithm for Wireless Network with Unevenly Distributed Nodes

Abstract: Node location estimation is not only the promise of the wireless network for target recognition, monitoring, tracking and many other applications, but also one of the hot topics in wireless network research. In this paper, the localization algorithm for wireless network with unevenly distributed nodes is discussed, and a novel multi-hop localization algorithm based on Elastic Net is proposed. The proposed approach is formulated as a regression problem, which is solved by Elastic Net. Unlike other previous loca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(3 citation statements)
references
References 14 publications
(19 reference statements)
0
3
0
Order By: Relevance
“…Trust analysis is also introduced in cyber-physical systems (CPS), e.g., wireless sensor networks [88,89,90,91,92,93,94,95,96,97] and vehicular networks [98,99,100,101]. For example, a trust based framework is proposed to secure data aggregation in wireless sensor networks [102], which evaluates the trustworthiness of each sensor node by the Kullback-Leibler (KL) distance to identify the compromised nodes through an unsupervised learning technique.…”
Section: Trust In Cyber-physical and Edge Computing Systemsmentioning
confidence: 99%
“…Trust analysis is also introduced in cyber-physical systems (CPS), e.g., wireless sensor networks [88,89,90,91,92,93,94,95,96,97] and vehicular networks [98,99,100,101]. For example, a trust based framework is proposed to secure data aggregation in wireless sensor networks [102], which evaluates the trustworthiness of each sensor node by the Kullback-Leibler (KL) distance to identify the compromised nodes through an unsupervised learning technique.…”
Section: Trust In Cyber-physical and Edge Computing Systemsmentioning
confidence: 99%
“…Recently, trust was introduced in the concept of social cloud [20,21,22,23,24,25,26,27,28]. Trust is also introduced in cyber-physical and edge computing systems, e.g., wireless sensor networks [29,30,31,32,33,34,35,36,37,38] and vehicular networks [39,40,41,42]. Another important domain in which trust analysis is widely applied is Sybil defense and spam detection [43,3,44,16,45].…”
Section: Related Workmentioning
confidence: 99%
“…It has been widely used in advertisement delivery, user positioning, tracking attack source and so on [2][3][4]. High-precision and reliable IP geolocation technology is getting more and more attention in the development of the Internet [5]. But geolocating a host with its IP address is still a challenging problem because there is no direct relationship between geographic location and IP address [6].…”
Section: Introductionmentioning
confidence: 99%