CFP last date
20 January 2025
Reseach Article

A Localization Technique in Wireless Sensor Network based on Angle of Arrival

by Deeksha Verma, Sachin Umrao, Rahul Verma, Arun Kumar Tripathi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 98 - Number 7
Year of Publication: 2014
Authors: Deeksha Verma, Sachin Umrao, Rahul Verma, Arun Kumar Tripathi
10.5120/17197-7397

Deeksha Verma, Sachin Umrao, Rahul Verma, Arun Kumar Tripathi . A Localization Technique in Wireless Sensor Network based on Angle of Arrival. International Journal of Computer Applications. 98, 7 ( July 2014), 26-29. DOI=10.5120/17197-7397

@article{ 10.5120/17197-7397,
author = { Deeksha Verma, Sachin Umrao, Rahul Verma, Arun Kumar Tripathi },
title = { A Localization Technique in Wireless Sensor Network based on Angle of Arrival },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 98 },
number = { 7 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 26-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume98/number7/17197-7397/ },
doi = { 10.5120/17197-7397 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:25:36.570961+05:30
%A Deeksha Verma
%A Sachin Umrao
%A Rahul Verma
%A Arun Kumar Tripathi
%T A Localization Technique in Wireless Sensor Network based on Angle of Arrival
%J International Journal of Computer Applications
%@ 0975-8887
%V 98
%N 7
%P 26-29
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless sensor network (WSN) consists many sensor nodes across the network. In this paper every sensor node is aware about the physical position of sensor nodes in wireless sensor network. The determination of position of sensor nodes can be released in range measurements including angle of arrival. We proposed a new localization technique based on angle-of- arrival between sensor nodes in a particular area of Wireless sensor network. This technique is derived under the assumption of angle measurement. This article emphasizes the basic localization technique to understand the angle-of-arrival of sensor nodes and to make progress in new and large open area of sensor network localization research.

References
  1. Mukherjee, B, Ghoshal, D. , Yick, J. : Wireless Sensor network survey. Computer Network 52(12), 2292-2330(2008)
  2. Al-Sakib Khan Pathan, Hyung-Woo Lee, Choong Scon Hong, "Security in wireless Sensor Network: Issues and Challenges". International Conference on advanced computing Technologies, Page 1043-1045, year 2006
  3. Zhenwei Yu, Jeffrey J. P. Tsai. A Framework of Machine Learning Based Instruction Detection for Wireless Sensor Networks, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. 2008
  4. www. enggpedia. com/computer-engineering encyclopedia/dictionary/computer-network/1617-channel-allocation-dynamic-a-static-channel-allocation
  5. Wang, C. , Ning,P. , Sun, K. : Secure and resilient clock synchronization in Wireless Sensor Networks. IEEE Journal on selected areas in Communications 24(2),395-408(2006)
  6. Ganeriwal, S. , Propper, C. , Capkun, S. , Srivastava, M. B. : Secure Time Synchronization in Sensor Networks, ACM Transactions on information and System Security, Article No. 23,11(4)(2008)
  7. Sachin Umrao and A. K. Tripathi "Time Synchronization Protocol in wireless Sensor Network based on Hash Code" International Journal of Computer Application (IJCA), vol-68 Number 23, Article No. 6,2012.
  8. Song, H. , Zhu, G. C. S. : Attack resilient time synchronization for wireless sensor network In: IEEE International conference on Mobile Adhoc and Sensor System Conference, p. 772(2005)
  9. Li, H. , Chen, K. , Wen, M. , Zheng, Y. : A Secure Time Synchronization Protocol for sensor network. In: Washio, T. , Zhou, Z. , -H, Huang, J. Z. , Hu, X. , Li, J. , Xie, C. , He, J. , Zou, D. , Li, K. , -C. , Freire, M. M. (eds. ) PAKDD 2007. LNCS(LNAI), vol. 4819, pp. 515-526, Springer, Heidelberg(2007)
  10. Sachin Umrao, Deeksha Verma and A. K. Tripathi "Node Replication and Pulse Delay Attack in Wireless Sensor Network". IEEE International conference in MOOC, ISBN: 978-1-4799-1625-2, pp390-392, 2013
  11. Arun Kumar Tripathi, Ajay Agarwal, "Approach towards Time Synchronization Based Secure Protocol for Wireless Sensor Network", International Conference at NDT'2010, published by the "Communications in Computer and Information Science" (CCIS) Series of Springer LNCS, Springer, Vol. CCIS-88, Issue-2, pp: 321-332(2010).
  12. Sachin Umrao, Deeksha Verma and A. K. Tripathi "Node Replication and Pulse Delay Attack in Wireless Sensor Network". IEEE International conference in MOOC, ISBN: 978-1-4799-1625-2, pp390-392, 2013
  13. Hu, H. , Atakli, I. M. , Chen, Y. , Ku, W. S, Su, Z. , Malicious Node Detection in Wireless Sensor Networks. In: The Symposium on Simulation of Systems Security, pp. 836-843(2008)
  14. Kopetz, H. , Ochsenreiter, W. : Clock Synchronization in Distributed Real- Time System. IEEE Transaction on Computers 36(8),933-940(1987)
  15. D. Niculescu and B. Nath, "Ad hoc positioning system (APS) using AOA," in IEEE INFOCOM, Apr, 2003.
  16. C. Savarese, J. M. Rabaey, and J. Beutel, "Locationing in distributed Ad hoc wireless sensor network," in Proc. Of ICASSP' 01, vol. 4, 2001, pp. 2037-2040.
  17. Rong Peng and Mihail L. Sichitiu, "Robust, Probabilistic, constraint- based Localization for wireless sensor network," in Proc. Of SECON 2005, Santa Clara, CA, Sept. 2005.
  18. D. Niculescu and B. Nath, "Ad hoc Positioning system (APS) using AOA," in IEEE INFOCOM, Apr. 2003.
  19. J. B. Andersen and K. I. Pedersen, "Angle of arrival statistics for low resolution antennas," in IEEE Transactions of Antennas and Propagation, vol. 50, no. 3, Bern, Switzerland, Mar. 2002.
  20. Francisco Santos, "Localization in wireless sensor networks", ACM Journal, Vol 5, November 2008.
  21. Bonnet, P. , Gehrke, J. , and Senhadri, P. "Towards database systems," International conference on mobile data management. ACM Journal Vol. 5. Springer- Verlag, London, UK, 3-14. November 2008.
Index Terms

Computer Science
Information Sciences

Keywords

WSN mitigation Ad-hoc pulse delay attack intruder node replication attack countermeasure angle-of-arrival localization technique security protocol