• 学术论文 •

### 无线传感器网络定位的分布式求精算法

1. 1 杭州电子科技大学 通信工程学院，浙江 杭州 310018
2 东南大学 移动通信国家重点实验室，江苏 南京 211189
• 出版日期:2015-01-25 发布日期:2017-06-21
• 基金资助:
国家自然科学基金资助项目

### Distributed refinement algorithm for WSN localization

Ying-biao YAO1,Nan-lan JIANG1,2

1. 1 College of Communication Engineering,Hangzhou Dianzi University,Hangzhou 310018,China
2 National Mobile Communications Research Laboratory,Southeast University,Nanjing 211189,China
• Online:2015-01-25 Published:2017-06-21
• Supported by:
The National Natural Science Foundation of China

Abstract:

A distributed refinement algorithm was proposed based on the error analyzing of range-based WSN localization.In each iteration,the proposed algorithm identified “error nodes” and “effective nodes” according to the idea of“magnetic pole”at first; then,it choosed two nodes with the minimum relative deviations in the 1-hop neighbors set of error node,and getted the intersection points of two circles whose centers were the positions of above two nodes and radiuses are the range distances from above two nodes to the error node respectively; at last,it choosed the position with minimum error,from its current position and above two intersection points as refinement position of error node after this iteration.Simulation results show that the proposed algorithm can reduce the localization error of multilateral positioning model and improve the localization accuracy efficiently.

 [1] 张云霞,田烨. M2M应用浅析[J]. 电信科学, 2009, 25(12): 4 -8 . [2] 范建存,殷勤业,王文杰,冯 昂. 无线传感器网络中协作波束形成的能量有效性分析[J]. 通信学报, 2008, 29(11): 19 -151 . [3] 成小良,邓志东. 基于ZigBee规范构建大规模无线传感器网络[J]. 通信学报, 2008, 29(11): 21 -164 . [4] 魏悦川,孙兵,李超. FOX密码的不可能差分攻击[J]. 通信学报, 2010, 0(9): 8 -29 . [5] 朱幼莲,鲁有宏,史国栋. 通信系统中自适应回波抵消的一种新方法[J]. 通信学报, 2007, 28(5): 11 -72 . [6] 朱近康,许莉. 绿色蜂窝网络的频谱效率与能效函数[J]. 通信学报, 2013, 34(1): 1 -7 . [7] 曾涛,沈成彬,蒋铭. 智能光纤基础设施管理技术研究[J]. 电信科学, 2014, 30(6): 142 -147 . [8] 胡 超，彭 军，于文涛. 基于PSO算法的医疗大数据任务调度策略[J]. 通信学报, 2014, 35(Z1): 13 -71 . [9] 沙志超，黄知涛，周一宇，王军华. 基于稀疏重构的跳频信号时频分析方法[J]. 通信学报, 2013, 34(5): 12 -112 . [10] 田俊峰，鲁玉臻，李 宁. 基于推荐的信任链管理模型[J]. 通信学报, 2011, 32(10): 1 -9 .