2022
DOI: 10.32604/cmc.2022.023634
|View full text |Cite
|
Sign up to set email alerts
|

Distance Matrix and Markov Chain Based Sensor Localization in WSN

Abstract: Applications based on Wireless Sensor Networks (WSN) have shown to be quite useful in monitoring a particular geographic area of interest. Relevant geometries of the surrounding environment are essential to establish a successful WSN topology. But it is literally hard because constructing a localization algorithm that tracks the exact location of Sensor Nodes (SN) in a WSN is always a challenging task. In this research paper, Distance Matrix and Markov Chain (DM-MC) model is presented as node localization tech… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 33 publications
0
5
0
Order By: Relevance
“…The government will no longer have the responsibility of verifying to make sure that the certificates are valid. In the SSI system, the government only needs to issue digital certificates and register cryptographic proofs in certificates in a public and decentralized network, removing the government's need to maintain additional infrastructure [87,88]. Individuals will have full control over the sharing of data.…”
Section: Issuing Of Verifiable Credentials/certificationsmentioning
confidence: 99%
“…The government will no longer have the responsibility of verifying to make sure that the certificates are valid. In the SSI system, the government only needs to issue digital certificates and register cryptographic proofs in certificates in a public and decentralized network, removing the government's need to maintain additional infrastructure [87,88]. Individuals will have full control over the sharing of data.…”
Section: Issuing Of Verifiable Credentials/certificationsmentioning
confidence: 99%
“…Step 10: Improve the sensor node with the worst fitness according to (4) and (5). When the subsensor network completes its iteration times and conforms to the full network iteration times, the update ends and the optimal value of the entire network is output.…”
Section: Application Of Pso-sfla Algorithm In Multipath Transmission ...mentioning
confidence: 99%
“…For example, the redundant transmission mode adopted in the network leads to a decrease in the reliability and stability of the transmission path of the network [ 4 ]. At the same time, the number of redundant transmissions is increased, and due to the uneven consumption of node energy consumption, the energy of some nodes will be completely lost, making the sensor nodes in some areas of the entire network unable to work [ 5 ]. Ultimately, it leads to the failure of the sensor network system and affects the network's lifetime.…”
Section: Introductionmentioning
confidence: 99%
“…The detection of proposed work can be evaluated by considering the attacks such as DoS11, DoS53s, DoS53a, Scan11, Scan44, Botnet, IP in Blacklist, UDP Scan, SSH Scan, SPAM with the existing works such as SVM [27], MLP [28], Faster RCNN [29], CNN [30], and DCGAN approaches [31]. Fig.…”
Section: Classification Of Attacks Analysismentioning
confidence: 99%