摘要基于AD8361芯片,通过对信号强度检测实现节点间的测距。给出了节点定位算法。Based on AD8361,distance range is realized by means of signal density detection.We give an algorithm for node location
2Neal Patwari,Alfred O,Hero III,et al.Relative location estimation in wireless sensor networks[J].IEEE Transactions on Signal Processing,2003,51(8):2137-2148.
4Meguerdichian S,Koushanfar F,Potkonjak M,et al.Coverage problems in wireless ad-hoc sensor networks[C].//Proc.of the IEEE INFOCOM.Anchorage:IEEE Computer and Communications Societies,2001(3):1380-1387.
5Niculescu D,Nath B.Ad hoc positioning system[C].//Conference Record of IEEE Global Telecommunications Conference,GLOBECOM'2001,Vol 5.San Antonio (TX,USA),2001.Piscataway (NJ,USA):IEEE,2001:2926-2931.
1Paramvir Bahl,Venkata N Padmanabhan.RADAR:An in-building RF-based user location and tracking system[C].In:Proceedings of Infocom'2000,Tel Aviv,Israel:IEEE Computer and Communications Societies,2000;2:775~584
2J Beutel.Geolocation in a PicoRadio Environment[Dl.M S Thsis.ETH Zurich Electronics Laboratory.1999-12
3Nirupama Bulusu,John Heidemann,Deborah Estrin.GPS-less Low Cost Outdoor Localization for Very Small Devices[J].IEEE Personal Communications,2000;7 (5):28~34
4Chris Savarese,Jan M Rabaey,Jan Beutel.Locationing in Distributed Ad-Hoc wireless sensor network[C].In:Proceedings of IEEE International Conference on Acoustics,Speech,and Signal(ICASSP '01),Salt Lake,USA:IEEE Computer Society,2001;4:2037~2040
5Srdjan Capkun,Maher Hamdi,Jean-pierre Hubaux.GPS-Free Positioning in Mobile Ad-Hoc Networks[C].In:Proceedings of the 34th Annual Hawaii International Conference on System Sciences,Maui,Hawaii,USA:IEEE Computer Society,2001:3481~3490
6Lance Doherty,Laurent El Ghaoui,Kristofer S J Pister.Convex Position Estimation in Wireless Sensor Networks[C].In:Proceedings of Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies ( INFOCOM 2001 ),Anchorage,AK,USA:IEEE Computer and Communications Societies,2001;3:1655~1663
7Lewis Girod,Deborah Estrin.Robust Range Estimation using Acoustic and Multimodal Sensing[C].In:Proceedings of IEEE/RSJ International Conference on Intelligent Robots and Systems(IROS'01),Maui,Hawaii,USA:IEEE Computer Society,2001;3:1312~1320
8A Harter,A Hopper,P Steggles et al.The anatomy of a context-aware application[C].In:Proceedings of Mobile Computing and Networking(MOBICOM'99),Seattle,Washington,USA:ACM Press,1999:59~68
9Jeffrey Hightower,Gaetano Boriello.Location Systems for Ubiquitous Computing[J].IEEE Computer,2001;34 (8):57~66
10Seapahn Meguerdichian,Farinaz Koushanfar,Miodrag Potkonjak et al.Coverage problems in wireless ad-hoc sensor networks[C].In:Proceedings of Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2001 ),Anchorage,Alaska,USA:IEEE Computer and Communications Societies,2001;3:1380~1387
2Zhang W, Tran M, Zhu S, et al. A random pertur- bation-based scheme for pairwise key establishment in sensor networks [C]//ACM Mobihoc, 2007 : 90- 99.
3Younis M, Ghunnnank Eltoweissy M. Location-A- ware combinatorial key management scheme for clustered sensor networks[J]. IEEE Tram. on Par- allel and Distribution System, 2006, 17 (8): 865- 882.
4Arvinderpal S Wander, Nils Gura, Hans Eberle, et al. Energy analysis of public-key cryptography for wireless sensor networks[C]//Third IEEE In- ternational Conference on Pervasive Computing, 2005.
5Liu D, Ning P. Multileve /zTESLA: Broadcast au- thentication for distributed sensor networks[J]. On Embedded Computer Systems, 2004,3 (4) :800-836.
6Liu D, Ning P. Practical broadcast authentication in sensor networks[C]//Proc, of the 2nd Annual Int'l conf. on Mobile and Ubiquitous Systcms.-Networ- king and Services,2005 : 118-129.
7Perring A D. Efficient authentication and signing ofmnlticast streams over lossy channels[C]//Proc 2000 IEEE Symp On Security and Privacy, 2000: 56.
8Chan H, Perrig A, Song D. Random key pre-dis- tribution schemes for sensor networks[C]//Proc. of 2003 IEEE Symposium on Research in Security and Privacy, 2003 : 197-213.
9Boneh D, Franklin M. Identity-based Encryption from the weil pairing[C]//Proceedings of Cryptol- ogy-Crypto'01. Berlin, Germany: Springer-Ver- lag,2001:213-229.
10Shamir A. Identity-based cryptosystems and signa- tureschemes[C]//Proc. Advances in Cryptology- CRYPTO~84, LectureNotes in Computer Science 196. Berlin: Springer-Verlag,1985:47-53.