Research on Impact of Radio Irregularity on Self-Localization of WSN

2011 ◽  
Vol 474-476 ◽  
pp. 2161-2166 ◽  
Author(s):  
Jia Zhang ◽  
Hai Yan Zhang ◽  
Jin Na Lv ◽  
Li Qiang Yin

Localization is a vital foundation work in Wireless Sensor Network (WSN). Almost all of location algorithms at present need the position information of reference nodes to locate the unknown nodes. But most of algorithms assume an idealistic radio propagation model that is far from the reality. This will lead to obvious difference compared with real localization of WSN. In this paper we investigate the impact of radio irregularity on the localization algorithms performance in WSN. We introduce the Radio Irregularity Model (RIM) which is established upon empirical data. With this model, this paper analyzes the impact of radio irregularity on localization algorithms. We compare three typical coarse-grained localization algorithms: APIT, Centroid and DV-HOP in simulated realistic settings. Our experimental results show that radio irregularity has a significant impact on some main evaluation aspects of localization algorithms. Some interesting phenomena is worthy of further study.

2011 ◽  
Vol 474-476 ◽  
pp. 2247-2252
Author(s):  
Jia Zhang ◽  
Hai Yan Zhang ◽  
Jin Na Lv ◽  
Yan Chang Liu

In many applications of wireless sensor network (WSN), it is essential to ensure that sensors can determine their location, even in the presence of malicious adversaries. However, almost all the localization algorithms need the location information of reference nodes to locate the unknown nodes. When the location information is tempered by the attacks, the accuracy of these algorithms will degrade badly. We present a novel mechanism for secure localization. The mechanism aims to filter out malicious reference signals on the basis of the normal distribution trait among multiple reference signals. This will ensure each node to obtain correct information about its position in the presence of attackers. In this paper, a simulation circumstance which might be attacked is constructed to compare the improved algorithm with original one. The experiment results demonstrate that the proposed mechanism can effectively survive malicious attacks.


Sign in / Sign up

Export Citation Format

Share Document