• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Lin Feng, Zhang Lei, Li Guinan, Wang Zhi. Acoustic Self-Calibrating Indoor Localization System via Smartphones[J]. Journal of Computer Research and Development, 2017, 54(12): 2741-2751. DOI: 10.7544/issn1000-1239.2017.20160727
Citation: Lin Feng, Zhang Lei, Li Guinan, Wang Zhi. Acoustic Self-Calibrating Indoor Localization System via Smartphones[J]. Journal of Computer Research and Development, 2017, 54(12): 2741-2751. DOI: 10.7544/issn1000-1239.2017.20160727

Acoustic Self-Calibrating Indoor Localization System via Smartphones

More Information
  • Published Date: November 30, 2017
  • Growing needs for the indoor location based service (ILBS) bring newer and higher requirements for indoor localization systems, such as high accuracy, hardware compatibility, low cost for commercial application, instantaneity and fast data update rate etc. In order to meet those requirements with commercial smartphone platform, we design an indoor localization system named LinLoc, which includes a new self-calibrating approach and a new localization method. Based on TPSN ranging, LinLoc applies time-of-arrival (TOA) method with acoustic signals to achieve real-time users' localization on normal commercial smartphone platform. With no extra time synchronization need, it can achieve centimeter-level accuracy. Furthermore, we propose a new self-calibrating approach based on acoustic TPSN ranging and semidefinite programming (SDP) algorithm. Through the interaction of every anchor nodes in the network, the new approach helps to solve the problem of self-calibrating in large-scale anchor network, and also helps to remove the heavy maintenance requirements afterwards. Then, LinLoc system which consists of a special-designed anchor network, smartphones installed with real-time app inside, and a backend server for processing is implemented. Simulations and experiments have been performed. The results show that LinLoc has nice indoor localization performance and its accuracy can be 0.05~0.3m, which provides accurate ILBS for users.
  • Related Articles

    [1]Chen Ruoxi, Chen Jinyin, Zheng Haibin, Yang Xueyan, Ji Shouling, Chen Tieming. Security of Deep Neural Network Supply Chains: A Survey[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440327
    [2]Liu Feng, Yang Jie, Li Zhibin, Qi Jiayin. A Secure Multi-Party Computation Protocol for Universal Data Privacy Protection Based on Blockchain[J]. Journal of Computer Research and Development, 2021, 58(2): 281-290. DOI: 10.7544/issn1000-1239.2021.20200751
    [3]Wei Lifei, Chen Congcong, Zhang Lei, Li Mengsi, Chen Yujiao, Wang Qin. Security Issues and Privacy Preserving in Machine Learning[J]. Journal of Computer Research and Development, 2020, 57(10): 2066-2085. DOI: 10.7544/issn1000-1239.2020.20200426
    [4]Chen Dongdong, Cao Zhenfu, Dong Xiaolei. Online/Offline Ciphertext-Policy Attribute-Based Searchable Encryption[J]. Journal of Computer Research and Development, 2016, 53(10): 2365-2375. DOI: 10.7544/issn1000-1239.2016.20160416
    [5]Lin Hui, Tian Youliang, Xu Li, Hu Jia. A Novel Privacy Aware Secure Routing Protocol for HWMN[J]. Journal of Computer Research and Development, 2015, 52(8): 1883-1892. DOI: 10.7544/issn1000-1239.2015.20140606
    [6]Ma Zhuo, Zhang Junwei, Ma Jianfeng, and Ji Wenjiang. Provably Secure Certificateless Trusted Access Protocol for WLAN Without Pairing[J]. Journal of Computer Research and Development, 2014, 51(2): 325-333.
    [7]Xin Wei, Sun Huiping, Chen Zhong. Analysis and Design of Distance-Bounding Protocols for RFID[J]. Journal of Computer Research and Development, 2013, 50(11): 2358-2366.
    [8]Wang Shaohui, Liu Sujuan, Chen Danwei. Scalable RFID Mutual Authentication Protocol with Backward Privacy[J]. Journal of Computer Research and Development, 2013, 50(6): 1276-1284.
    [9]Zhang Xiaoliang, Tu Yongce, Ma Hengtai, Yang Zhian, Hu Xiaohui. An End-to-End Authentication Protocol for Satellite Communication Network[J]. Journal of Computer Research and Development, 2013, 50(3): 540-547.
    [10]Ding Zhenhua, Li Jintao, Feng Bo. Research on Hash-Based RFID Security Authentication Protocol[J]. Journal of Computer Research and Development, 2009, 46(4): 583-592.

Catalog

    Article views (1239) PDF downloads (532) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return