173
Views
0
CrossRef citations to date
0
Altmetric
Articles

Modified Energy-Efficient Range-Free Localization Using Teaching–Learning-Based Optimization for Wireless Sensor Networks

ORCID Icon &

REFERENCES

  • I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci. (2002). “A survey on sensor networks,” IEEE Commun. Mag., 40 (8), pp. 102–114.
  • K. Romer and F. Mattern. (2004). “The design space of wireless sensor networks,” IEEE Wirel. Commun., 11 (6), pp. 54–61.
  • R. Middya, N. Chakravarty and M. K. Naskar. (2016). “Compressive sensing in wireless sensor networks – a survey,” IETE Tech. Rev., pp. 1–13. doi:10.1080/02564602.2016.1233835
  • R. V. Potukuchi and K. Kant. (2015). “Detecting location-based attacks in wireless sensor networks using sequential analysis,” IETE J. Res., 61 (5), pp. 541–551.
  • B. Hofmann-Wellenhof, H. Lichtenegger and J. Collins. (2012). Global Positioning System: Theory and Practice. Wien: Springer-Verlaga.
  • D. Niculescu and B. Nath. “Ad hoc positioning system (APS).” in Global Telecommun. Conf., 2001. GLOBECOM'01, San Antonio, TX, vol. 5, pp. 2926–2931, 2001.
  • N. Bulusu, J. Heidemann and D. Estrin. (2000). “GPS-less low-cost outdoor localization for very small devices,” IEEE Pers. Commun., 7 (5), pp. 28–34.
  • A. Ward, A. Jones and A. Hopper. (1997). “A new location technique for the active office,” IEEE Pers. Commun., 4 (5), pp. 42–47.
  • J. Zheng, C. Wu, H. Chu and Y. Xu. (2011). “An improved RSSI measurement in wireless sensor networks,” Procedia Eng., 15, pp. 876–880.
  • P. R. Vamsi and K. Kant. (2016). “Trust and location-aware routing protocol for wireless sensor networks,” IETE J. Res., 62 (5), pp. 634–644.
  • L. Doherty and L. El Ghaoui. “Convex position estimation in wireless sensor networks.” in INFOCOM 2001. Twentieth IEEE Annu. Joint Conf. Comput. Commun. Soc. Proc., Vol. 3, pp. 1655–1663, 2001.
  • T. He, C. Huang, B. M. Blum, J. A. Stankovic and T. F. Abdelzaher. (2005). “Range-free localization and its impact on large scale sensor networks,” ACM Trans. Embd. Comput. Syst., 4 (4), pp. 877–906.
  • D. Niculescu and B. Nath. (2003). “DV based positioning in ad hoc networks.” Telecommun. Syst., 22 (1–4), pp. 267–280.
  • Q. Qian, X. Shen and H. Chen. (2011). “An improved node localization algorithm based on DV-Hop for wireless sensor networks,” Comput. Sci. Inf. Syst., 8 (4), pp. 953–972.
  • S. Kumar and D. K. Lobiyal. (2013). “Power efficient range-free localization algorithm for wireless sensor networks,” Wirel. Networks, 20 (4), pp. 681–694.
  • R. V. Rao, V. J. Savsani and D. P. Vakharia. (2011). “Teaching–learning-based optimization: A novel method for constrained mechanical design optimization problems,” Comput.-Aided Des., 43 (3), pp. 303–315.
  • R. V. Rao, V. J. Savsani and D. P. Vakharia. (2012). “Teaching–Learning-Based optimization: An optimization method for continuous non-linear large scale problems,” Inf. Science, 183 (1), pp. 1–15.
  • Y. Shang, W. Ruml, Y. Zhang and M. P. J. Fromherz. “Localization from mere connectivity.” in Proc. of the 4th ACM Int. Symp. on Mob. Ad Hoc Netw. Comput., Annapolis, MD, pp. 201–212, 2003.
  • F. Gzara and E. Erkut. (2010). “Telecommunications network design with multiple technologies,” Telecommun. Syst., 46 (2), pp. 149–161.
  • Z. Dengyi and L. Feng. “Improvement of DV-Hop localization algorithms in wireless sensor networks,” in Int. Symp. Inst. Meas. Sens. Netw. Autom. (IMSNA), Sanya, China, Vol. 2, pp. 567–569, 2012.
  • W. Fang and G. Yang. “Improvement based on DV-Hop localization algorithm of wireless sensor network,” in Int. Conf. Mech. Sci., Electr. Engg. Comput. (MEC), Jilin, China, pp. 2421–2424, 2011.
  • X. Chen and B. Zhang. (2012). “Improved DV-Hop Node localization algorithm in wireless sensor networks,” Int. J. Distrib. Sens. Networks, 2012, pp. 1–7.
  • Y. T. Chan and K. C. Ho. (1994). “A simple and efficient estimator for hyperbolic location,” IEEE Trans. Signal Process., 42 (8), pp. 1905–1915.
  • D. Ying, W. Jianping and Z. Chongwei. “Improvement of DV-Hop localization algorithms for wireless sensor networks,” in 6th Int. Conf. on Wirel. Commun. Netw, and Mob. Comput. (WiCOM), Chengdu, China, pp. 1–4, 2010.
  • B. Peng and L. Li. “An improved localization algorithm based on genetic algorithm in wireless sensor networks,” Cogn. Neurodyn., 9 (2), pp. 249–256.
  • J. Holland. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence. Cambridge, MA: MIT Press, 1975.
  • R. Poli, J. Kennedy and T. Blackwell. (2007). “Particle swarm optimization,” Swarm Intelligence, 1 (1), pp. 33–57.
  • R. Storn and K. Price. (1997). “Differential evolution–a simple and efficient heuristic for global optimization over continuous spaces.” J. Glob. Optim., 11 (4), pp. 341–359.
  • D. Simon. (2008). “Biogeography-Based optimization,” IEEE Trans. Evol. Comput., 12 (6), pp. 702–713.
  • Y. Wang, X. Wang, B. Xie, D. Wang, and D.P. Agrawal. (2008). “Intrusion detection in homogeneous and heterogeneous wireless sensor networks,” IEEE Trans. Mob. Comput., 7 (6), pp. 698–711.
  • Crossbow Technology [ Online]. Available: http://www.xbow.com/.
  • G. Zhou, T. He, S. Krishnamurthy and J.A. Stankovic. (2006). “Models and solutions for radio irregularity in wireless sensor networks,” ACM Trans. Sens. Netw. (TOSN), 2 (2), pp. 221–262.
  • S. Kumar and D.K. Lobiyal. (2016). “Novel DV-Hop localization algorithm for wireless sensor networks,” Telcommun. Syst., 62 (3), pp. 1–16.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.