IEEE journal on selected areas in communications : a publication of the IEEE Communications Society最新文献

筛选
英文 中文
Wireless Localization and Formation Control With Asynchronous Agents 异步代理的无线定位和编队控制
Weijie Yuan;Zhaohui Yang;Liangming Chen;Ruiheng Zhang;Yiheng Yao;Yuanhao Cui;Hong Zhang;Derrick Wing Kwan Ng
{"title":"Wireless Localization and Formation Control With Asynchronous Agents","authors":"Weijie Yuan;Zhaohui Yang;Liangming Chen;Ruiheng Zhang;Yiheng Yao;Yuanhao Cui;Hong Zhang;Derrick Wing Kwan Ng","doi":"10.1109/JSAC.2024.3414616","DOIUrl":"10.1109/JSAC.2024.3414616","url":null,"abstract":"The formation control of multi-agent systems has increasingly drawn attention for fulfilling numerous emerging applications and services. To achieve high-accuracy formation, the location awareness of all agents becomes an essential requirement. In this paper, we address the problem of network localization and formation control in a cooperative system with asynchronous agents. In particular, we formulate the joint localization and synchronization of agents as a statistical inference problem. The underlying probabilistic model is represented by a factor graph from which a message-passing algorithm is designed that computes approximations of the marginals of unknown variables, i.e. agents’ locations and clock offsets. Due to the Euclidean-norm operator involved in their computation no parametric closed-form expressions of the messages exist. As a compromise, implemented message-passing methods therefore resort to approximations of these messages. Conventional methods rely either on a first-order Taylor expansion of the norm operation or on non-parametric representations, e.g. by means particle filters (PFs), to compute such approximations. However, the former approach suffers from poor performance while the latter one experiences high complexity. The proposed message-passing algorithm in this paper is parametric. Specifically, it passes Gaussian messages that can be essentially obtained by suitably augmenting the factor graph and applying on it a hybrid method for combining belief propagation and variational message passing. Subsequently, the agents can exploit the estimated locations for determining the control policy. Two types of control policy are designed based on the optimization of a generalized cost function. We show that the proposed scheme enjoys a reduced complexity for multi-agent localization while achieving the desired formation with excellent accuracy.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141933172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Active Aerial Reconfigurable Intelligent Surface Assisted Secure Communications: Integrating Sensing and Positioning 主动式空中可重构智能表面辅助安全通信:传感与定位一体化
Dawei Wang;Zijun Wang;Keping Yu;Zhiqiang Wei;Hongbo Zhao;Naofal Al-Dhahir;Mohsen Guizani;Victor C. M. Leung
{"title":"Active Aerial Reconfigurable Intelligent Surface Assisted Secure Communications: Integrating Sensing and Positioning","authors":"Dawei Wang;Zijun Wang;Keping Yu;Zhiqiang Wei;Hongbo Zhao;Naofal Al-Dhahir;Mohsen Guizani;Victor C. M. Leung","doi":"10.1109/JSAC.2024.3414621","DOIUrl":"10.1109/JSAC.2024.3414621","url":null,"abstract":"This paper proposes an active aerial reconfigurable intelligent surface (ARIS) assisted secure communication framework by integrating sensing and positioning against a mobile eavesdropper. In the proposed scheme, the base station (BS) beamforms the private information to the legitimate user and jams the eavesdropper with artificial noise (AN), while reconfiguring the phases and amplitudes of the passive signal by the active ARIS for promoting secure communications. To acquire the channel state information of the time-vary wiretap channel, the BS tracks the position of the eavesdropper by exploiting the reflected AN. Based on the tracked position of the eavesdropper in the previous time slot, we propose a secure communication scheme that aims to maximize the secrecy rate in the current time slot. This scheme is assisted by the ARIS through jointly optimizing the passive beamforming of the privacy information and AN, the reflection matrix of the ARIS, and the position of the ARIS. In the case of this non-convex quandary with highly coupled variables, we opt to disassemble it into three constituent subproblems and design an alternating optimization framework, where the optimal power beamforming at the BS is derived using a successive convex approximation method and semi-positive definite relaxation technique, the reconfigurable coefficient of the ARIS is optimized using the majorization-minimization algorithm, and the optimal position of the ARIS using the three-dimensional network is obtained by the deep deterministic policy gradient algorithm. Simulation results demonstrate the superior performance of the proposed scheme in the context of the secrecy rate when compared with benchmark schemes. By adopting the active beamforming and positioning technique, the secrecy rate can be increased by 38.3% and 10.8%, respectively.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141933167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two-Dimensional Direction-of-Arrival Estimation Using Stacked Intelligent Metasurfaces 利用堆叠智能元曲面进行二维到达方向估计
Jiancheng An;Chau Yuen;Yong Liang Guan;Marco Di Renzo;Mérouane Debbah;H. Vincent Poor;Lajos Hanzo
{"title":"Two-Dimensional Direction-of-Arrival Estimation Using Stacked Intelligent Metasurfaces","authors":"Jiancheng An;Chau Yuen;Yong Liang Guan;Marco Di Renzo;Mérouane Debbah;H. Vincent Poor;Lajos Hanzo","doi":"10.1109/JSAC.2024.3414613","DOIUrl":"10.1109/JSAC.2024.3414613","url":null,"abstract":"Stacked intelligent metasurfaces (SIMs) are capable of emulating reconfigurable physical neural networks by utilizing electromagnetic (EM) waves as carriers. They can also perform various complex computational and signal processing tasks. An SIM is constructed by densely integrating multiple metasurface layers, each consisting of a large number of small meta-atoms that can control the EM waves passing through it. In this paper, we harness an SIM for two-dimensional (2D) direction-of-arrival (DOA) estimation. In contrast to conventional designs, an advanced SIM in front of a receiver array can be designed to automatically compute the 2D discrete Fourier transform (DFT) as the incident waves propagate through it. As a result, a receiver array can directly observe the angular spectrum of the incoming signal, and it can estimate the DOA by simply using probes to detect the energy distribution on the receiver array. This avoids the need for power inefficient radio frequency chains. To enable an SIM to perform the 2D DFT in the wave domain, we formulate an optimization problem that minimizes the mean square error (MSE) between the SIM’s EM response and the 2D DFT matrix. Then, a gradient descent algorithm is customized for iteratively updating the phase shift applied by each meta-atom of the SIM. To further improve the DOA estimation accuracy, we configure the phase shifts of the input layer of the SIM to generate a set of 2D DFT matrices associated with orthogonal spatial frequency bins. Additionally, we analytically evaluate the performance of the proposed SIM-based DOA estimator by deriving a tight upper bound for the MSE. Extensive numerical simulations verify the capability of an optimized SIM to perform DOA estimation and corroborate the theoretical analysis. Specifically, we show that an SIM is capable of performing DOA estimation with an MSE of the order of \u0000<inline-formula> <tex-math>$10^{-4}$ </tex-math></inline-formula>\u0000.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141933186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cooperative Sensing for 6G Mobile Cellular Networks: Feasibility, Performance, and Field Trial 6G 移动蜂窝网络的合作传感:可行性、性能和现场试验
Guangyi Liu;Rongyan Xi;Zixiang Han;Lincong Han;Xiaozhou Zhang;Liang Ma;Yajuan Wang;Mengting Lou;Jing Jin;Qixing Wang;Jiangzhou Wang
{"title":"Cooperative Sensing for 6G Mobile Cellular Networks: Feasibility, Performance, and Field Trial","authors":"Guangyi Liu;Rongyan Xi;Zixiang Han;Lincong Han;Xiaozhou Zhang;Liang Ma;Yajuan Wang;Mengting Lou;Jing Jin;Qixing Wang;Jiangzhou Wang","doi":"10.1109/JSAC.2024.3414596","DOIUrl":"10.1109/JSAC.2024.3414596","url":null,"abstract":"The combination of communication and sensing is envisioned as a novel feature in the forthcoming sixth-generation (6G) wireless communication. The conventional approach to the joint sensing and communication (JSAC) system is utilizing one base station (BS) as both a sensing transmitter and a sensing receiver, which is known as monostatic sensing. However, the resulting self-interference issue requires additional hardware promotion to achieve full-duplexing. To overcome this issue, in this paper, we focus on cooperative sensing where the transmitter and receivers are non-co-located, which includes the bistatic and multistatic sensing. Specifically, the system model of cooperative sensing based on mobile networks is established. To demonstrate the feasibility of cooperative sensing, the bistatic radar cross section (RCS) is provided. As for the sensing method, a refined orthogonal matching pursuit (R-OMP) method is proposed to estimate the channel parameters and data fusion is also provided to derive the objects’ positions and velocities. Considering the non-negligible interference in the cooperative JSAC networks, we also discuss interference management in this paper. Simulation results show that the proposed cooperative sensing system improves the position and velocity estimation accuracy by over 20% when compared with monostatic sensing. The preliminary experiment results also verify the feasibility of the proposed system.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141933105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cooperative Coherent Multistatic Imaging and Phase Synchronization in Networked Sensing 网络传感中的合作相干多静态成像和相位同步
Dario Tagliaferri;Marco Manzoni;Marouan Mizmizi;Stefano Tebaldini;Andrea Virgilio Monti-Guarnieri;Claudio Maria Prati;Umberto Spagnolini
{"title":"Cooperative Coherent Multistatic Imaging and Phase Synchronization in Networked Sensing","authors":"Dario Tagliaferri;Marco Manzoni;Marouan Mizmizi;Stefano Tebaldini;Andrea Virgilio Monti-Guarnieri;Claudio Maria Prati;Umberto Spagnolini","doi":"10.1109/JSAC.2024.3414609","DOIUrl":"10.1109/JSAC.2024.3414609","url":null,"abstract":"Coherent multistatic radio imaging represents a pivotal opportunity for forthcoming wireless networks, which involves distributed nodes cooperating to achieve accurate sensing resolution and robustness. This paper delves into cooperative coherent imaging for vehicular radar networks. Herein, multiple radar-equipped vehicles cooperate to improve collective sensing capabilities and address the fundamental issue of distinguishing weak targets in close proximity to strong ones, a critical challenge for vulnerable road users’ protection. We prove the significant benefits of cooperative coherent imaging in the considered automotive scenario in terms of both probability of correct detection, evaluated considering several system parameters, as well as resolution capabilities, showcased by a dedicated experimental campaign wherein the collaboration between two vehicles enables the detection of the legs of a pedestrian close to a parked car. Moreover, as coherent processing of several sensors’ data requires very tight accuracy on clock synchronization and sensor’s positioning—referred to as phase synchronization—(such that to predict sensor-target distances up to a fraction of the carrier wavelength), we present a general three-step cooperative multistatic phase synchronization procedure, detailing the required information exchange among vehicles in the specific automotive radar context and assessing its feasibility and performance by hybrid Cramér-Rao bound.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141933187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generative Artificial Intelligence Assisted Wireless Sensing: Human Flow Detection in Practical Communication Environments 生成式人工智能辅助无线传感:实用通信环境中的人流检测
Jiacheng Wang;Hongyang Du;Dusit Niyato;Zehui Xiong;Jiawen Kang;Bo Ai;Zhu Han;Dong In Kim
{"title":"Generative Artificial Intelligence Assisted Wireless Sensing: Human Flow Detection in Practical Communication Environments","authors":"Jiacheng Wang;Hongyang Du;Dusit Niyato;Zehui Xiong;Jiawen Kang;Bo Ai;Zhu Han;Dong In Kim","doi":"10.1109/JSAC.2024.3414628","DOIUrl":"10.1109/JSAC.2024.3414628","url":null,"abstract":"Groundbreaking applications such as ChatGPT have heightened research interest in generative artificial intelligence (GAI). Essentially, GAI excels not only in content generation but also signal processing, offering support for wireless sensing. Hence, we introduce a novel GAI-assisted human flow detection system (G-HFD). Rigorously, G-HFD first uses the channel state information (CSI) to estimate the velocity and acceleration of propagation path length change of the human induced reflection (HIR). Then, given the strong inference ability of the diffusion model, we propose a unified weighted conditional diffusion model (UW-CDM) to denoise the estimation results, enabling detection of the number of targets. Next, we use the CSI obtained by a uniform linear array with wavelength spacing to estimate the HIR’s time of flight and direction of arrival (DoA). In this process, UW-CDM solves the problem of ambiguous DoA spectrum, ensuring accurate DoA estimation. Finally, through clustering, G-HFD determines the number of subflows and the number of targets in each subflow, i.e., the subflow size. The evaluation based on practical downlink communication signals shows G-HFD’s accuracy of subflow size detection can reach 91%. This validates its effectiveness and underscores the significant potential of GAI in the context of wireless sensing.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141933168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VSpatial: Enabling Private and Verifiable Spatial Keyword-Based Positioning in 6G-Oriented IoT VSpatial:在面向 6G 的物联网中实现基于关键字的私有和可验证空间定位
Weiting Zhang;Mingyang Zhao;Zhuoyu Sun;Chuan Zhang;Jinwen Liang;Liehuang Zhu;Song Guo
{"title":"VSpatial: Enabling Private and Verifiable Spatial Keyword-Based Positioning in 6G-Oriented IoT","authors":"Weiting Zhang;Mingyang Zhao;Zhuoyu Sun;Chuan Zhang;Jinwen Liang;Liehuang Zhu;Song Guo","doi":"10.1109/JSAC.2024.3414605","DOIUrl":"10.1109/JSAC.2024.3414605","url":null,"abstract":"For increasing Internet of Things (IoT) devices, 6G wireless technology aims for ubiquitous communications in which positioning services are necessary. Private spatial keyword-based positioning service is promising in 6G-oriented IoT since it positions users based on spatial locations and textual keywords while protecting user privacy. However, due to economic benefits or malicious attacks, positioning service providers may return erroneous or incomplete results, which cause tremendous economic damage and security threats, e.g., always assigning a selective driver for the specific car-hailing user. A technical challenge for extending existing private schemes to enable users to verify the correctness and completeness of positioning results is the distinctive positioning paradigm between compared spatial locations and matched textual keywords. This paper proposes a private and verifiable spatial keyword positioning scheme named VSpatial in 6G-oriented IoT. VSpatial enables users to verify the correctness and completeness of spatial keyword-based positioning results while preserving user privacy. The main inspiration for addressing the technical challenge is converting both spatial locations and textual keywords into an internal status, i.e., adapting comparison and matching to existence judging by multiple cryptographic tools, such as hierarchical cube and pseudorandom function. Based on this inspiration, we design a novel private authenticated data structure (named PVTree), and then propose two constructions of VSpatial, i.e., VSpatial-S and VSpatial-D, to suit static and dynamic environments, respectively. The core idea for adapting VSpatial-S to VSpatial-D is transferring one whole PVTree into multiple exponential-size partitions. Security analysis proves the security and verifiability of VSpatial. Theoretical and experimental evaluations show that VSpatial achieves faster-than-linear positioning efficiency and linear verification overhead.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141933189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WiShield: Privacy Against Wi-Fi Human Tracking WiShield:防止 Wi-Fi 人体追踪的隐私保护
Jingyang Hu;Hongbo Jiang;Siyu Chen;Qibo Zhang;Zhu Xiao;Daibo Liu;Jiangchuan Liu;Bo Li
{"title":"WiShield: Privacy Against Wi-Fi Human Tracking","authors":"Jingyang Hu;Hongbo Jiang;Siyu Chen;Qibo Zhang;Zhu Xiao;Daibo Liu;Jiangchuan Liu;Bo Li","doi":"10.1109/JSAC.2024.3414597","DOIUrl":"10.1109/JSAC.2024.3414597","url":null,"abstract":"Wi-Fi signals contain information about the surrounding propagation environment and have been widely used in various sensing applications such as gesture recognition, respiratory monitoring, and indoor position. Nevertheless, this information can also be easily stolen by eavesdroppers to obtain private information. In this paper, we propose WiShield, a new framework that protects legitimate users using Wi-Fi sensing applications while preventing unauthorized privacy attacks. The implementation of WiShield is based on a simple principle of physically encrypting Wi-Fi channel status information (CSI) to prevent eavesdroppers from inferring sensitive information through stolen CSI. To achieve a balance between encryption strength, sensing accuracy, and communication quality, we design an efficient multi-objective optimization framework that can safely deliver decryption keys to legitimate users and prevent illegal eavesdropping by eavesdroppers. We implemented the WiShield prototype on an SDR platform and conducted extensive experiments to verify its effectiveness in common Wi-Fi sensing applications. We believe that the implementation of WiShield can improve the privacy standards of Wi-Fi sensing applications, and it is also an important step towards making the integration of Integrated Sensing and Communications (ISAC).","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141933102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
L3P-DLI: A Lightweight Positioning-Privacy Protection Scheme With Double-Layer Incentives for Wireless Crowd Sensing Systems L3P-DLI:针对无线人群感应系统的双层激励轻量级定位-隐私保护方案
Jing Bai;Jinsong Gui;Neal N. Xiong;Anfeng Liu;Jie Wu
{"title":"L3P-DLI: A Lightweight Positioning-Privacy Protection Scheme With Double-Layer Incentives for Wireless Crowd Sensing Systems","authors":"Jing Bai;Jinsong Gui;Neal N. Xiong;Anfeng Liu;Jie Wu","doi":"10.1109/JSAC.2024.3414580","DOIUrl":"10.1109/JSAC.2024.3414580","url":null,"abstract":"Mobile Crowd Sensing (MCS), as a promising sensing paradigm, significantly relies on wireless communication networks and widely distributed mobile workers to capture data from the surroundings. However, the positioning-dependent nature of most MCS tasks often requires workers to embed their positionings in reports, which may result in privacy leakage and a decline in their participation enthusiasm. Considering workers’ diverse perceptions of positioning privacy, in this paper we propose the Lightweight Positioning-Privacy Protection Scheme with Double-Layer Incentives (L3P-DLI) to meet their personalized privacy requirements in an efficient and low-cost way while stimulating their participation. To the best of our knowledge, this scheme is the first attempt to employ proxy forwarding to protect workers’ sensitive positionings while ensuring high-quality sensing results. Moreover, our double-layer incentivizing mechanism is elaborately designed to motivate workers to actively participate or serve as proxies. Specifically, the bidirectional auction between data collectors and proxies can safeguard the security of data collectors, and compensate for the potential privacy leakage cost of proxies helping to forward data. Additionally, the reverse auction mechanism enables the platform to reward recruited workers to compensate for their various costs. Extensive experiments conducted on real-world datasets validate that L3P-DLI effectively preserves workers’ positioning privacy while maximizing their income to encourage participation.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141933171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cooperative Positioning of Wireless Networks in Complex Propagation Environments 复杂传播环境中的无线网络合作定位
Peiyue Jiang;Xiaobo Gu;Haibo Zhou
{"title":"Cooperative Positioning of Wireless Networks in Complex Propagation Environments","authors":"Peiyue Jiang;Xiaobo Gu;Haibo Zhou","doi":"10.1109/JSAC.2024.3414589","DOIUrl":"10.1109/JSAC.2024.3414589","url":null,"abstract":"Cooperative positioning in wireless networks has attracted great attention in recent years, as many applications require the exact location of all member nodes. The pairwise distance between the member nodes is conventionally constructed as an Euclidean Distance Matrix (EDM) for subsequent location estimation. In this paper, we address the problem of cooperative positioning in complex propagation environments, which results in an incomplete EDM. We proposed an improved EDM recovery algorithm based on low tank matrix completion (LRMC), which makes use of the sensor correlation by Laplacian and trace minimization. In addition, we derive a semi-definite relaxation estimator to localize the unknown sensors. Simulations are conducted to evaluate the performance of the proposed algorithm and the results show that the proposed method outperforms existing ones in both matrix completion and positioning accuracy.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141933170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信