Node localization through physical layer network coding: Bootstrap, security, and accuracy

被引:3
作者
Li, Zhiwei [1 ]
Wang, Weichao [1 ]
机构
[1] UNC Charlotte, Dept SIS, Charlotte, NC 28223 USA
基金
美国国家科学基金会;
关键词
Physical layer network coding; Node localization; Wireless networks; LOCATION-BASED SERVICES; WIRELESS NETWORKS; INTERFERENCE; PERFORMANCE; MANAGEMENT; ATTACKS;
D O I
10.1016/j.adhoc.2012.04.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Previous research on physical layer network coding (PNC) focuses on the improvements in bandwidth usage efficiency. Its capability to assist wireless nodes in localization was first discussed in [1]. In that paper, however, the authors discussed only the basic idea to detect and separate the interfered signals for calculating the node positions. Many important issues to turn the idea into a practical approach are not extensively studied. In this paper, we plan to investigate these problems. Specifically, our research focuses on the bootstrap procedures, security, and localization accuracy of the PNC based mechanism. We first study the required node density to bootstrap the localization procedure in both infrastructure-based and self-organized networks. With this question answered, researchers can recognize the network scenarios to which PNC based localization can be applied. We design mechanisms to protect integrity of the exchanged information and defend against node impersonation attacks so that the localization procedures will be robust against malicious activities. For localization accuracy, we study the negative impacts of the position errors of the anchor nodes. We design two mechanisms to reduce the localization inaccuracy for both individual nodes and cumulative procedures through excluding the anchor nodes with positioning errors and introducing multiple bootstrap areas. Both simulation and theoretical analysis are used to support our investigation. This research shows that PNC based node localization can satisfy the security and accuracy requirements of different types of wireless networks and it can be widely deployed. (C) 2012 Elsevier B.V. All rights reserved.
引用
收藏
页码:1267 / 1277
页数:11
相关论文
共 64 条
[1]  
Ahmad U, 2006, IEEE IJCNN, P3465
[2]   Self-management in chaotic wireless deployments [J].
Akella, Aditya ;
Judd, Glenn ;
Seshan, Srinivasan ;
Steenkiste, Peter .
WIRELESS NETWORKS, 2007, 13 (06) :737-755
[3]  
Amundson I, 2009, LECT NOTES COMPUT SC, V5801, P235, DOI 10.1007/978-3-642-04385-7_16
[4]  
[Anonymous], 2010, P 8 INT C MOBILE SYS
[5]  
[Anonymous], J ELECT COMPUTER ENG
[6]  
[Anonymous], AD HOC NETWORKS, DOI DOI 10.1016/S1570-8705(03)00008-8
[7]  
[Anonymous], 2004, the third international symposium on Information processing in sensor networks
[8]  
[Anonymous], UN SOFTW RAD PER
[9]  
Ardagna C.A., 2010, MOBILE INTELLIGENCE
[10]   Location-based services:: Back to the future [J].
Bellavista, Paolo ;
Kuepper, Axel ;
Helal, Sumi .
IEEE PERVASIVE COMPUTING, 2008, 7 (02) :85-89