期刊文献+

基于AD8361无线传感器网络节点的测距电路设计 被引量:2

Design of the range measurements circuit of node in WSN based on AD8361
下载PDF
导出
摘要 基于AD8361芯片,通过对信号强度检测实现节点间的测距。给出了节点定位算法。 Based on AD8361,distance range is realized by means of signal density detection.We give an algorithm for node location
出处 《长春工业大学学报》 CAS 2010年第1期15-18,共4页 Journal of Changchun University of Technology
关键词 节点定位 无线传感器网络 测距 AD8361 node location Wireless Sensor Network(WSN) distance range AD8361.
  • 相关文献

参考文献8

二级参考文献51

  • 1Paramvir Bahl,Venkata N Padmanabhan.RADAR:An in-building RF-based user location and tracking system[C].In:Proceedings of Infocom'2000,Tel Aviv,Israel:IEEE Computer and Communications Societies,2000;2:775~584
  • 2J Beutel.Geolocation in a PicoRadio Environment[Dl.M S Thsis.ETH Zurich Electronics Laboratory.1999-12
  • 3Nirupama Bulusu,John Heidemann,Deborah Estrin.GPS-less Low Cost Outdoor Localization for Very Small Devices[J].IEEE Personal Communications,2000;7 (5):28~34
  • 4Chris Savarese,Jan M Rabaey,Jan Beutel.Locationing in Distributed Ad-Hoc wireless sensor network[C].In:Proceedings of IEEE International Conference on Acoustics,Speech,and Signal(ICASSP '01),Salt Lake,USA:IEEE Computer Society,2001;4:2037~2040
  • 5Srdjan Capkun,Maher Hamdi,Jean-pierre Hubaux.GPS-Free Positioning in Mobile Ad-Hoc Networks[C].In:Proceedings of the 34th Annual Hawaii International Conference on System Sciences,Maui,Hawaii,USA:IEEE Computer Society,2001:3481~3490
  • 6Lance Doherty,Laurent El Ghaoui,Kristofer S J Pister.Convex Position Estimation in Wireless Sensor Networks[C].In:Proceedings of Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies ( INFOCOM 2001 ),Anchorage,AK,USA:IEEE Computer and Communications Societies,2001;3:1655~1663
  • 7Lewis Girod,Deborah Estrin.Robust Range Estimation using Acoustic and Multimodal Sensing[C].In:Proceedings of IEEE/RSJ International Conference on Intelligent Robots and Systems(IROS'01),Maui,Hawaii,USA:IEEE Computer Society,2001;3:1312~1320
  • 8A Harter,A Hopper,P Steggles et al.The anatomy of a context-aware application[C].In:Proceedings of Mobile Computing and Networking(MOBICOM'99),Seattle,Washington,USA:ACM Press,1999:59~68
  • 9Jeffrey Hightower,Gaetano Boriello.Location Systems for Ubiquitous Computing[J].IEEE Computer,2001;34 (8):57~66
  • 10Seapahn Meguerdichian,Farinaz Koushanfar,Miodrag Potkonjak et al.Coverage problems in wireless ad-hoc sensor networks[C].In:Proceedings of Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2001 ),Anchorage,Alaska,USA:IEEE Computer and Communications Societies,2001;3:1380~1387

共引文献223

同被引文献23

  • 1ErdalCayirci,ChunmingRong.无线自组织网络和传感器网络安全[M].李勇,译.北京:机械工业出版社,2011.
  • 2Zhang W, Tran M, Zhu S, et al. A random pertur- bation-based scheme for pairwise key establishment in sensor networks [C]//ACM Mobihoc, 2007 : 90- 99.
  • 3Younis M, Ghunnnank Eltoweissy M. Location-A- ware combinatorial key management scheme for clustered sensor networks[J]. IEEE Tram. on Par- allel and Distribution System, 2006, 17 (8): 865- 882.
  • 4Arvinderpal S Wander, Nils Gura, Hans Eberle, et al. Energy analysis of public-key cryptography for wireless sensor networks[C]//Third IEEE In- ternational Conference on Pervasive Computing, 2005.
  • 5Liu D, Ning P. Multileve /zTESLA: Broadcast au- thentication for distributed sensor networks[J]. On Embedded Computer Systems, 2004,3 (4) :800-836.
  • 6Liu D, Ning P. Practical broadcast authentication in sensor networks[C]//Proc, of the 2nd Annual Int'l conf. on Mobile and Ubiquitous Systcms.-Networ- king and Services,2005 : 118-129.
  • 7Perring A D. Efficient authentication and signing ofmnlticast streams over lossy channels[C]//Proc 2000 IEEE Symp On Security and Privacy, 2000: 56.
  • 8Chan H, Perrig A, Song D. Random key pre-dis- tribution schemes for sensor networks[C]//Proc. of 2003 IEEE Symposium on Research in Security and Privacy, 2003 : 197-213.
  • 9Boneh D, Franklin M. Identity-based Encryption from the weil pairing[C]//Proceedings of Cryptol- ogy-Crypto'01. Berlin, Germany: Springer-Ver- lag,2001:213-229.
  • 10Shamir A. Identity-based cryptosystems and signa- tureschemes[C]//Proc. Advances in Cryptology- CRYPTO~84, LectureNotes in Computer Science 196. Berlin: Springer-Verlag,1985:47-53.

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部