{"title":"Perimeter Echo Algorithm for network localization","authors":"S. Chinnappen-Rimer, G. Hancke","doi":"10.1109/AFRCON.2009.5308395","DOIUrl":null,"url":null,"abstract":"We propose an algorithm, the Perimeter Echo Algorithm (PEA), to accurately determine the location of sensor nodes in a wireless network. The algorithm assumes a limited number of nodes (beacons) in the network are equipped with a location finding mechanism such as GPS. Nodes on the perimeter range of a beacon echo the beacons virtual ID to all nodes within range. This approach reduces the number of messages required to achieve network localization.The advantage of PEA is reduced power consumption and reduced flooding of the network because the beacon nodes only transmit an initialisation message once within a specific range and only those sensor nodes on the edge of a transmitting node's range, re-transmits the message.","PeriodicalId":122830,"journal":{"name":"AFRICON 2009","volume":"75 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"AFRICON 2009","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AFRCON.2009.5308395","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
We propose an algorithm, the Perimeter Echo Algorithm (PEA), to accurately determine the location of sensor nodes in a wireless network. The algorithm assumes a limited number of nodes (beacons) in the network are equipped with a location finding mechanism such as GPS. Nodes on the perimeter range of a beacon echo the beacons virtual ID to all nodes within range. This approach reduces the number of messages required to achieve network localization.The advantage of PEA is reduced power consumption and reduced flooding of the network because the beacon nodes only transmit an initialisation message once within a specific range and only those sensor nodes on the edge of a transmitting node's range, re-transmits the message.