期刊文献+

基于梯度博弈的RFID室内定位算法 被引量:7

Gradient and Constant-game Based RFID Indoor Localization Algorithm
下载PDF
导出
摘要 随着普适计算的不断发展,室内定位技术成为了当今研究的热点问题。室内空间的复杂性使得室内空间的定位精度一直无法满足应用的需求。为了获得更加高效稳定的算法,提出了一种基于梯度和博弈论的室内定位算法,其能够较为有效地提高室内空间的定位精度。在算法中,提出了一种室内的符号划分方法,并利用其对室内空间进行了分割以辅助定位算法。最后以室内为实验环境对算法进行了验证,分析结果表明,该算法拥有良好的定位效果,并且相对于现有算法更稳定。 With the continuous development of universal computing research,indoor localization technology has become a hot topic in current research. Due to the complexity of the indoor space,enhancing the positioning accuracy of the in- door space has been unable to meet the needs of the application. In order to obtain a more efficient and stable algorithm, this paper proposed an indoor localization algorithm based on gradient and game theory. The algorithm can more effec- tively improve the positioning accuracy in indoor space. In the algorithm,a method of dividing the indoor space based on the symbol is proposed. At the same time, it segments the indoor space to support localization. Finally, the results of ex- perimental validation of the algorithm show that the algorithm has good effect, and has more stable effect than the exi-sting algorithm.
出处 《计算机科学》 CSCD 北大核心 2015年第11期138-143,共6页 Computer Science
基金 国家自然科学基金项目(61373015 61300052) 国家教育部高等学校博士学科点博导(20103218110017) 江苏高校优势学科建设工程资助项目(PAPD) 中央高校基本科研业务费专项项目(NP2013307)资助
关键词 RFID 符号位置 定位 博弈论 梯度 RFID, Symbol position, Localization, Game theory, Gradient
  • 相关文献

参考文献2

二级参考文献28

  • 1Juels A. RFID Security and Privacy: A Research Survey [J]. IEEE Journal on Selected Areas in Communications, 2006, 24 (2) : 381-394. 被引量:1
  • 2Juels A. Strengthening EPC Tag against Cloning [C]//Procee- dings of the 4th ACM Workshop on Wireless Security. ACM, 2005 : 67-76. 被引量:1
  • 3Liu Ya-li, Qin Xiao-lin, Li Bo-han, et al. A Forward-Secure Grouping-proof Protocol for Multiple RFID tags [J]. Interna- tional Journal of Computational Intelligence Systems, 2012, 5 (5) : 824-833. 被引量:1
  • 4Chien H Y, Chen C H. Mutual Authentication Protocol for RFID Conforming to EPC Class-1 Generation-2 Standards [J]. Computer Standards and Interfaces, 2007,29(2) : 254-259. 被引量:1
  • 5Rotter P. A Framework for Assessing RFID System Security and Privacy Risks [J]. IEEE Pervasive Computing, 2008, 7 (2): 70-77. 被引量:1
  • 6Zuo Y. Survivable RFID Systems: Issues, Challenges, and Tech- niques [J]. IEEE Transactions on Systems, Man, and Cyberne- tics-Part C: Applications and Reviews, 2010,40(4) : 406-418. 被引量:1
  • 7Chien H Y. SASI: A New Ultralightweight RFID Authentica- tion Protocol Providing Strong Authentication and Strong Integ- rity [J]. IEEE Transactions on Dependable and Secure Compu- ting,2007,4(4) :337-340. 被引量:1
  • 8Peris-Lopez P, Hernandez-Castro J C, Estevez-Tapiador J M, et al. LMAP:A Real Lightweight Mutual Authentication Protocol for Low-Cost RFID Tags [C] Proe. Second Workshop RFID Security. Graz, Austria, 2006 : 12-14. 被引量:1
  • 9Peris-Lopez P, Hernandez-Castro J C, Estevez-Tapiador J M, et al. EMAP: An Efficient Mutual Authentication Protocol for Low-Cost RFID Tags [C] Proe. OTM Federated Conf. and Workshop: IS Workshop (IS' 06). LNCS 4277, Springer-Verlag, Berlin Heidelberg, 2006 : 352-361. 被引量:1
  • 10Peris-Lopez P, Hernandez-Castro J C, Estevez-Tapiador J M, et al. M2AP: A Minimalist Mutual-Authentication Protocol forLow-Cost RFID Tags [C]Proc. Int'l Conf. Ubiquitous Intelli- gence and Computing (UIC]06). LNCS 4159,2006:912-923. 被引量:1

共引文献18

同被引文献24

引证文献7

二级引证文献58

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部