IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing - Vol 2 - Workshops
DOI: 10.1109/sutc.2006.83
|View full text |Cite
|
Sign up to set email alerts
|

Localization and Tracking in Sensor Systems

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(13 citation statements)
references
References 31 publications
0
13
0
Order By: Relevance
“…A mean squared estimation(MMSE) [4], a technique for estimations, identification and removal of malicious location information was proposed in the same year. In 2006, based on features of the object location and trekking system, a hierarchical taxonomy was proposed [5]. Same year, two lightweight algorithms namely, Greedy Filtering by Matrix(GFM) and Trust Indicator(TI) for location verification were proposed [6].…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…A mean squared estimation(MMSE) [4], a technique for estimations, identification and removal of malicious location information was proposed in the same year. In 2006, based on features of the object location and trekking system, a hierarchical taxonomy was proposed [5]. Same year, two lightweight algorithms namely, Greedy Filtering by Matrix(GFM) and Trust Indicator(TI) for location verification were proposed [6].…”
Section: Literature Surveymentioning
confidence: 99%
“…Localization(finding location of a sensor)of a Wireless Sensor Networks(WSNs) poses an uphill task mainly as the extended community cost, bad localization, accuracy and restrained nodes are not addressed properly. Various models for Indoor localization [1], Surveillance [2] and outdoor localization [3][4][5][6][7][8][9][10][11][12][13][14][15][16][17] have already been presented but the main concern is Quality of Service(QOS) which includes accurate but secured location detection. A network could easily be attacked using man-inthe-middle 1 attack, Brute force 1 or social networking 1 .…”
Section: Introductionmentioning
confidence: 99%
“…Localization is the process of determining the position of an object in space [39]. Sensors are randomly distributed across the entire target area with uniform density.…”
Section: Animal Sensor Localizationmentioning
confidence: 99%
“…Tracking seeks to identify the position of an object over time [39]. Accurate and energy efficient location estimation is essential for any successful deployment and application of WSN.…”
Section: Animal Sensor Localizationmentioning
confidence: 99%
“…Therefore, the asynchronous MAC may work without the clock synchronization. However, WSNs commonly use time information at an application level to order the chronology of the sensing events or to compute the location information of an event [14]. Thus, sensor networks with the asynchronous wakeup scheduling still require a reference time to validate the time information.…”
Section: Introductionmentioning
confidence: 99%