Noninteractive Localization of Wireless Camera Sensors with Mobile Beacon

被引:26
作者
He, Yuan [1 ,2 ]
Liu, Yunhao [1 ,2 ,3 ]
Shen, Xingfa [4 ]
Mo, Lufeng [5 ,6 ]
Dai, Guojun [4 ]
机构
[1] Tsinghua Univ, TNLIST, Beijing 100084, Peoples R China
[2] Tsinghua Univ, Sch Software, Beijing 100084, Peoples R China
[3] Hong Kong Univ Sci & Technol, Hong Kong, Hong Kong, Peoples R China
[4] Hangzhou Dianzi Univ, Coll Comp Sci, Hangzhou 310018, Zhejiang, Peoples R China
[5] Zhejiang Agr & Forestry Univ, Sch Informat Engn, Univ Lib 311300, Zhejiang, Peoples R China
[6] Xi An Jiao Tong Univ, Xian, Peoples R China
基金
中国博士后科学基金;
关键词
Wireless camera sensor network; localization; mobile;
D O I
10.1109/TMC.2011.278
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent advances in the application field increasingly demand the use of wireless camera sensor networks (WCSNs), for which localization is a crucial task to enable various location-based services. Most of the existing localization approaches for WCSNs are essentially interactive, i.e., require the interaction among the nodes throughout the localization process. As a result, they are costly to realize in practice, vulnerable to sniffer attacks, inefficient in energy consumption and computation. In this paper, we propose LISTEN, a noninteractive localization approach. Using LISTEN, every camera sensor node only needs to silently listen to the beacon signals from a mobile beacon node and capture a few images until determining its own location. We design the movement trajectory of the mobile beacon node, which guarantees to locate all the nodes successfully. We have implemented LISTEN and evaluated it through extensive experiments. Both the analytical and experimental results demonstrate that it is accurate, cost-efficient, and especially suitable for WCSNs that consist of low-end camera sensors.
引用
收藏
页码:333 / 345
页数:13
相关论文
共 25 条
[1]  
Abdelzaher T.F., 2004, P IEEE 25 INT REAL T
[2]   A survey on wireless multimedia sensor networks [J].
Akyildiz, Ian F. ;
Melodia, Tommaso ;
Chowdhury, Kaushik R. .
COMPUTER NETWORKS, 2007, 51 (04) :921-960
[3]  
[Anonymous], 2008, P 6 ACM C EMB NETW S
[4]  
Bidgoli H., 2006, Handbook of information security, threats, vulnerabilities, prevention, and management
[5]  
CHANG HL, 2008, P 6 ACM C EMB NETW S
[6]  
Chi Feng W., 2005, ACM Transactions on Multimedia Computing, Communications and Applications, V1, P151, DOI DOI 10.1145/1062253.1062256
[7]  
Devarajan D, 2006, ACM T SENSOR NETWORK, V2
[8]  
Faugeras O., 1987, P IEEE 1 INT C COMP
[9]  
Guo Z., 2008, P IEEE REAL TIM SYST
[10]   In defense of the eight-point algorithm [J].
Hartley, RI .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1997, 19 (06) :580-593