• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Xiaoping, Luo Jun, Shen Changxiang. Theory and Algorithms on Localization in Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2011, 48(3): 353-363.
Citation: Wang Xiaoping, Luo Jun, Shen Changxiang. Theory and Algorithms on Localization in Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2011, 48(3): 353-363.

Theory and Algorithms on Localization in Wireless Sensor Networks

More Information
  • Published Date: March 14, 2011
  • As a basis of many network protocols and applications, localization is one of the major supportive technologies for wireless sensor networks, making it an indispensable part in the design of wireless sensor networks. In this paper, we comprehensively survey the recent advancements of the theory and algorithms on localization. We completely summarize the following aspects on localization theory. Firstly, we describe the formal definition of localization problem. Then, we analyze the computational complexity of the localization problem under various configurations. Next, we introduce the localization theory, which is developed from the rigidity theory. Finally, we present a special kind of location computable network: sequentially localizable network. In a global view, the study of localization theory is the basis of all the achievements, which not only shows great insights on the localization problem, but also further solves many fundamental problems of localization, especially in two-dimensional case. By localization theory, a lot of new localization algorithms are proposed. We also conclude the typical localization algorithms related to localization theory. We place special emphasis on their design ideas, as well as the application scope and disadvantage, for each localization algorithm. Finally, we point out the possible directions in both localization theory and localization algorithm for further research.
  • Related Articles

    [1]Xu He, Wu Di, Lu Jiwu, Li Renfa. An Intrusion Detection Algorithm and Its Hardware Acceleration for CAN in Vehicles[J]. Journal of Computer Research and Development, 2023, 60(12): 2783-2796. DOI: 10.7544/issn1000-1239.202220035
    [2]Yin Shenglin, Zhang Xinglan, Zuo Liyu. Intrusion Detection System for Dual Route Deep Capsule Network[J]. Journal of Computer Research and Development, 2022, 59(2): 418-429. DOI: 10.7544/issn1000-1239.20200825
    [3]Ren Jiadong, Liu Xinqian, Wang Qian, He Haitao, Zhao Xiaolin. An Multi-Level Intrusion Detection Method Based on KNN Outlier Detection and Random Forests[J]. Journal of Computer Research and Development, 2019, 56(3): 566-575. DOI: 10.7544/issn1000-1239.2019.20180063
    [4]Shi Shengfei, Zhang Wei, Li Jianzhong. A Complex Event Detection Algorithm Based on Correlation Analysis[J]. Journal of Computer Research and Development, 2014, 51(8): 1871-1879. DOI: 10.7544/issn1000-1239.2014.20120813
    [5]Wang Qi'an and Chen Bing. Intrusion Detection System Using CVM Algorithm with Extensive Kernel Methods[J]. Journal of Computer Research and Development, 2012, 49(5): 974-982.
    [6]Mao Guojun and Zong Dongjun. An Intrusion Detection Model Based on Mining Multi-Dimension Data Streams[J]. Journal of Computer Research and Development, 2009, 46(4): 602-609.
    [7]Li Qinghua and Zhao Feng. The PBL Method: A Novel Parallel Error Detection Method for Intrusion Tolerance Systems[J]. Journal of Computer Research and Development, 2006, 43(8): 1411-1416.
    [8]Yang Wu, Yun Xiaochun, Li Jianhua. An Efficient Approach to Intrusion Detection Based on Boosting Rule Learning[J]. Journal of Computer Research and Development, 2006, 43(7): 1252-1259.
    [9]Mu Chengpo, Huang Houkuan, and Tian Shengfeng. A Survey of Intrusion-Detection Alert Aggregation and Correlation Techniques[J]. Journal of Computer Research and Development, 2006, 43(1): 1-8.
    [10]Wang Jin, Li Dequan, and Feng Dengguo. An Autonomous Agent-Based Adaptive Distributed Intrusion Detection System[J]. Journal of Computer Research and Development, 2005, 42(11): 1934-1939.

Catalog

    Article views (903) PDF downloads (1867) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return