Abstract
Topology control is important for extending networks lifetime and reducing interference. The accuracy of topology identification plays a crucial role in topology control. Traditional passive interception can only identify the connectivity among cooperative sensor networks with known protocol. This paper proposes a novel method called Active Interfere and Passive Interception (AIPI) to identify the topology of non-cooperative sensor networks by using both active and passive interceptions. Active interception uses full duplex sensors to disrupt communication until frequency hopped to acquire distance information, and thus, infer their connectivity and calculate the location after modifying error in a non-cooperative sensor network. Passive interception uses Granger causality to infer the connectivity between two communication nodes after getting the time frame structure in physical layer. Passive interception is applied to conserve power consumption after obtaining physical information via active interception. Simulation results indicate that AIPI can identify the topology of non-cooperative sensor networks with a higher accuracy than traditional method.
1. Introduction
Wireless Sensor Networks (WSN) consisting of a large number of self-organizing nodes are widely deployed in environmental monitoring, smart homes, and healthcare. In these applications, network topology plays a crucial role. Topology not only affects capacity and energy consumption but also directly impacts the data collection and reliability of the network. Some algorithms including routing algorithms [], data aggregation algorithms, load balancing, and some data aggregation algorithms [] need to know the topology to ensure optimal performance. Therefore, identifying the topology of WSN is meaningful for maintaining their operation. Traditional passive interception methods include the correlation-based method [], information-theory-based method [], Granger-causality-test-based method [], compression-sensing-based method [], drive-response-based method [], and graph-based neural network method []. Passive interception obtains the connections between nodes by capturing and decoding data packets, and it is susceptible to channel noise. The existing literature demonstrates that passive interception can identify the topology of sensor network assuming known protocol [,,,,,], in which the type and structure of the data package is known. Unlike cooperative WSN, the communication protocols of non-cooperative WSN are unknown. Such assumption limited their application scope under non-cooperative WSN.
In response to non-cooperative networks, Xu et al. [] first introduced the concept of active interception, utilizing full-duplex on interception device. This method can interfere signal reception of the suspicious receiver, thus intercepting suspicious information, and thereby, enhancing eavesdropping. Subsequently, some scholars have further applied the strategy of Xu. Hui et al. [] studied the problem of maximizing the average monitoring rate of a lawful monitoring system which actively intercepts on suspicious wireless links through interfering Rayleigh fading channels. Yunlong et al. [] investigated millimeter-wave information monitoring systems, where suspicious transmitters in the network send messages to suspicious receivers under the supervision of a monitoring controller, achieving lawful surveillance of suspicious links. In order to increase the probability of successful intercepting, Yitao et al. [] proposed cognitive interference to alter the long-term trust of the suspicious links under parallel channels, thereby encourage the links to transmit on a smaller subset of unblocked channels with a lower transmission rate. Hu et al. [] investigated active intercepting of half-duplex lawful monitor in a wireless power supply multi-channel suspicious system, where the suspicious transmitters harvest energy from power beacons and then communicate with the suspicious destination through parallel channels. Additionally, single-hop relay networks [], unmanned aerial vehicle (UAV)-assisted downlink multicast [], broadcast and uplink multi-access [], multi-user communication [], collaborative monitoring systems [], and intelligent reflecting surface-assisted intercepting networks [] all applied active interception. Compare to passive interception, active interception exchange the information through interfering actively, which avoids decoding data package. In order to identify the topology of sensor network accurately, combining localization and active interception is a promising direction. The location of the communication nodes provide extra information about topology. Existing localization algorithm include range-dependent [,,] and range-independent [,]. These techniques often require additional hardware and consume significant resources. Recent advancements in sensing technologies [] and distributed systems [,] offer potential solutions to these challenges. To address the limitations of these methods, the level of the power of signal from interfering device can used to infer position information (PI).
Therefore, this paper combines active interception and local information extraction to identify the topology of sensor network with unknown communication protocol and use passive interception with the Granger causality test to identify the topology of sensor network while the communication protocol is decoded. The topology sensing model shown in Figure 1 is considered in this paper, where three full duplex sensors transmit the information from target WSN to fusion center. Fusion center can apply active interception or passive interception in different stage. Figure 2 illustrates the overall framework of the AIPI method. In the initial stage, the AIPI method applies active interception to identify topology and obtain physical layer information. To conserve power consumption, the AIPI method applies passive interception to track dynamic topology constantly.

Figure 1.
The system model of topology sensing.

Figure 2.
Overall framework of AIPI.
The three main contribution of this paper are as follows:
- (1)
- Active interception identifies topology through interfering node communication with an energy-effective dichotomy;
- (2)
- Local information extraction with self-adaptive error distribution provides extra effective information for active interception;
- (3)
- Passive interception with the Granger causality test is proposed to track topology of WSN with physical layer information.
Traditional passive interception such as the Granger causality test [] and Hawkess process [] have advantages regarding power consumption because they only need to sense the signal. However, they are susceptible to noise and are only applicable to cooperative WSN. AINL [] is applicable to non-cooperative and cooperative WSN, but it can only extract the node PI with dichotomy in a small noise environment. AIPI can not only extract node PI with energy effective dichotomy, but it is also insensitive to noise in non-cooperative WSN, which means that it has superior performance on universality, ennergy efficience, and anti-interference. AIPI applies active and passive interception at different stages, causing higher power consumption than pure passive interception and less than pure AINL. A comparison of AIPI with existing works on topology inference is shown in Figure 3.

Figure 3.
The comparison of AIPI with existing works on topology inference.
The rest of this paper is organized as follows. In Section 2, we introduce the use of active interference for local information extraction, and explain self-adaptive error correction mechanism in our proposed method using the maximum likelihood function. Finally, we apply passive interception to infer topology based on Granger causality. The simulation results are given in Section 3 and the conclusions for the work are provided in Section 4.
2. Theoretical Basis
2.1. Problem Formulation
In mathematical notation, a network graph can be represented by , where denotes the set of vertices, N is the number of elements in v, that is, the number of nodes in the network, and denotes the set of edge. The element in the adjacency matrix of the network can be represented as (1),
where . We formulate the topology inference problem as (2),
where represents estimated node coordinate, X represents real node coordinate, and represents the inference topology.
2.2. Active Interception
We use active interception to identify the topology of WSN with unknown protocol. Assuming WSN has N communication nodes, while all the nodes can transmit and 20% nodes can receive. In the target network, different node pairs communicate using different frequency bands, preventing collisions. Three full duplex sensors locate the target node by colliding on the corresponding frequency bands. As shown in Figure 4, T denotes the transmitter, R denotes the receiver, and EVE nodes represent three interfering nodes. T and R are communicating at X band, and then three full duplex sensors EVE1, EVE2, and EVE3 send interference signals with different power levels until the frequency hopped in communication. PI and connectivity are deduced through trilateration after transforming power level into distance. We can distinguish different communication node when the error between the real coordinate and the estimated coordinate is less than a threshold.

Figure 4.
Full duplex sensors extract transmitter and receiver position information.
Algorithm 1 explains the strategy of power adapting for EVE. Define the upper and lower bounds on EVE transmission pseudo-noise power as and , the transmission distance is bounded by and . Define the to be the real distance between R and EVE. Change power of EVE through dichotomy coefficient until the error between and is less than error . Apply same strategy to T can also obtain the coordinate.
The error of distance between R and EVE will inevitably occur when using the dichotomy to calculate it. The lead to the three circles cannot intersect at a single point based on trilateration as shown in Figure 5. The error is actually subtle, and thus, for interpreting, we enlarge it. In this case, we consider the midpoint (green) of the line connecting the two closest intersection points (red) as the result of local information extraction.
Algorithm 1 Interference Strategy of Active Interception. |
|

Figure 5.
The error from trilateration.
It is impossible to extract the local information with a very small error because of the environment noise. To extract the local information with a bigger error accurately, we deploy data from train sample with same strategy to extract local information of unknown WSN with self-adaptive error. Assuming a WSN whose PI is known, we use represent the result of local information extraction through trilateration and represent the real PI, so that the error between them can be denoted as . Calculate the errors of coordinates for all communication nodes. Since the coordinates of the nodes are represented in two dimensions, we use two Gaussian functions to fit the obtained errors through Algorithm 2.
The Gaussian Mixture Models can be represented as a linear combination of Gaussian distributions as shown in (3):
where follows a Gaussian distribution, and are the mean and covariance matrix corresponding of the Gaussian distribution, and is the probability of each Gaussian distribution with satisfying . Solve the variable of Gaussian distribution fitting and fitting through Expectation-Maximization (EM) algorithm.
Algorithm 2 EM Algorithm for Gaussian Mixture Model Parameter Estimation |
|
For acquiring PI of an unknown WSN, apply the parameter and u to extract position information. The coordinates of R is . The coordinates of EVE are , and the distance between R and EVE are , where . Construct a set of trilateration equations as shown in (4):
Derive (5) from (4):
Transform (5) into matrix to obtain (6),
where , and the matrix equation can be simplified to represent as . Using (6) and the two Gaussian functions obtained from fitting the errors, construct (7):
Derive (8) from (7):
Since follows a Gaussian distribution, also follows a Gaussian distribution with the same parameters. Let M represent , then the distribution of M is expressed as (9),
of which log-likelihood function, after taking the logarithm, can be expressed as (10):
Opening the , we can obtain (11):
Since is independent, derive (12) from (10) and (11):
Let Equation (12) equal zero, solve for X, and thus, obtain the PI. Distinguishing the different communication nodes in WSN, we can identify the topology of WSN.
2.3. Passive Interception
After active interception distinguish communication mode in physical layer, we apply steadily passive interception to monitor the topology of WSN in a long time, which can conserve energy effectively. Assume the WSN applies Transmission Control Protocol/Internet Protocol (TCP/IP) and Automatic Repeat-reQuest (ARQ) protocol, which means that communication node will receive an Acknowledge character package (ACK) from the other communication node after transmitting data package successfully. The EVE captures the package from WSN at a period T and then acquire its transmission time and transmitter information. Divide period T time into L slots to acquire the time series. In the IEEE 802.15.4 standard, the baud rate is 250 kbps. The time slot length t should be less than the data transmission time , where is the data package length and the is the baud rate. The optimal number of slots L can be obtain through . Considering the WSN is sparse and undirected, apply the Granger causality to infer two time series from two communication nodes whether exist causality relationship and then identify the connectivity. We can identify the topology of WSN after deducing all pairs of communication if there exists connectivity.
For each node , a time series is generated when the node transmits a data package and an ACK package. More precisely, for the set of packet transmitting times , the binary time series is represented as (13),
where i represents the node ID, I indicates the time slot index, L is the total number of time slots, and represents the length of the time slots. The schematic diagram of the node’s time series can be represented as shown in Figure 6.

Figure 6.
Schematic diagram of the time series data.
Granger causality is used to compare prediction error to determine whether two variables are related. For the time series and , if the knowledge of past values of Y contributes some additional information about more than the knowledge of just past of X, we consider that Y Granger causes X. Granger causality is always modeled as a hypothesis test problem, where the null hypothesis means that Y does not Granger cause X and the alternative hypothesis means that Y Granger X. The hypothesis test is represented as (14) and (15),
where is the value of X in the nth slot, and are the parameters of the regression, which quantify the relative importance of the past values, k is the order of the model, and and are the errors of and , respectively. If the knowledge of the past of Y cannot contribute additional information about , will have less error variance than .
We denote the squared-sum residuals of as , and similarly, the squared-sum residuals of as , where and L is the number of data points. Therefore, the F-statistic is given by (16),
where and . will be rejected if is greater than the critical value of F-distribution. The connectivity of two nodes will be existed if the time series of them display Granger causality. We acquired all the connectivity of WSN after deducing Granger causality among all nodes.
3. Experiment and Analysis
The console object specifies the number of communication nodes, randomly generates the positions of communication nodes within a 100 × 100 rectangular area, and stipulates that the distance between two nodes cannot be less than a certain threshold. All communication nodes have the capability to transmit information within the specified range. Additionally, it defines the connectivity, creating channels with ten frequency bands in each one. The console is also responsible for allocating channels between communication nodes and reallocating frequency bands after frequency hopping.
3.1. Experimental Setup
Considering the small error of dichotomy in a known WSN, the result of fitting the coordinate error with a Gaussian mixture model is shown in Figure 7, where the vertical axis represents the error on the y-axis, and the horizontal axis represents the error on the x-axis. The two Gaussian distributions are denoted by two sets of contour lines.
We deployed the parameter to extract local information with self-adaptive error distribution. The comparison of the local information extraction error obtained through the maximum likelihood function and the local information extraction error obtained through trilateration is shown in Figure 8. The horizontal axis represents the node number. The values of the red bars indicate the distance between the estimated coordinates obtained through trilateration and the true coordinates. The values of the blue bars represent the distance between the estimated coordinates applied maximum likelihood function and the true coordinates. It is evident that the overall blue bars are lower than the red bars, which means that extract PI with the maximum likelihood function significantly reduces the error.
The console generates the coordinates of 90 communication nodes and the connectivity, as shown in Figure 9a.The visualization of the topology matrix is shown in Figure 9b, whose transverse and longitudinal axis represent the node numbers and a white block is displayed when there is a connectivity between two nodes and a black block is displayed when there is no connectivity.
The console generates channels with each channel having 10 frequency bands, and each frequency band corresponds to a different Signal-to-Noise Ratio (SNR). The corresponding relationships are shown in Table 1. The console also allocates channels and frequency bands to each pair of communication nodes as shown in Table 2.

Table 1.
Channel-band-SNR allocation chart.

Table 2.
Channel and band of the communication node.
EVE draws interfering circles around the transmitting and receiving nodes. After interfering all communication nodes, the identified topology matrix visualization is shown in Figure 9c.

Figure 7.
Gaussian mixture model fitting error.

Figure 8.
Comparison of PI errors.
In order to reduce the error, we extract PI with the maximum likelihood function. Deploying the extra effective information, we can identify the more precise topology, as shown in Figure 9d.
As time goes on, the topology of WSN changes, whose matrix visualization is shown in Figure 9e. We utilized the BIC model [] to determine the maximum lag order of the time series and deployed the Granger causality test to infer whether there is a connectivity between two nodes. The identified topology matrix is shown in Figure 9f.


Figure 9.
Topology of WSN. (a) Network topology diagram. (b) Initial topology matrix. (c) Topology matrix without modifying. (d) Topology matrix after modifying. (e) Dynamic topology matrix. (f) Dynamic topology deduced by passive interception.
3.2. Comparison Result
Based on similar framework AINL also proposed interference strategy. However, the author’s simulation experiments only considered the low noise of interference strategy, and the number of simulations was relatively small. When reproducing the experiment, we increased the noise and continuously changed the positions of the communication nodes to obtain more convincing simulation results.
The number of communication nodes can be regarded as an important indicator of wireless sensor networks scale. We compared the accuracy rates of AIPI, AINL, and passive interception for network topology identification under different network scales and physical layer communication modes. We changed the network scale and the communication mode of the physical layer with Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), Orthogonal Frequency Division Multiplexing (OFDM), and Code Division Multiple Access (CDMA). The accuracy rates of the identified topology are shown in Figure 10a, Figure 10b, Figure 10c, and Figure 10d, respectively. These four simulation diagrams are obtained by taking the average five repetitions, in order to avoid contingency. It can be seen from Figure 10 and Table 3 that when facing different network scales and physical layer mode, the accuracy rate of our method for network topology identification is above 99%. It has an obvious advantage over the AINL method especially in small-scale networks. The WSN network is sparse, with most nodes not being connected. As the number of nodes increases, the number of non-connected relationships far exceeds the connected ones. AINL method has low positioning accuracy, making it difficult to distinguish between different nodes, which leads to a significant drop in accuracy when dealing with small-scale networks. The passive interception method is generally inferior to the other two methods. This is because passive interception depends on the accuracy of packet decoding. When the channel conditions are poor, the source or type of data packets cannot be accurately decoded, resulting in a low accuracy rate of topology identification. The impact of noise on the four communication modes is similar. Taking OFDM as an example, we define the network size as 40 and conduct topology identification simulations under different SNR levels. As shown in Figure 11, with the increasing of SNR, the accuracy of passive interception, including the Granger causality test and Hawkess process, shows an upward trend. AINL shows an steady performance in different SNR, while AIPI shows an better performance. We considered using four different methods to perform topology identification on the same network five times. As shown in Figure 12, with the increase of the network scale, the power consumption of four methods show the same trend. Given the premise that topology inference requires successfully deciphering non-cooperative network packets, passive interception only requires signal sensing to infer the topology, resulting in the lowest energy consumption. AINL, on the other hand, conducts active interception in every topology identification process, leading to the highest energy consumption. In contrast, AIPI performs active interception only during the initial identification process and utilizes the acquired information for passive interception in subsequent topology identification processes, resulting in moderate energy consumption.

Figure 10.
The accuracy rates of the identified topology with different communication modes: (a) TDMA, (b) FDMA, (c) OFDM, and (d) CDMA.

Table 3.
Comparison of the average accuracy of different methods with various network scales.

Figure 11.
The accuracy rates of the identified topology with FDMA based on different SNRs.

Figure 12.
Power loss of four methods with different network scales for five-time identification.
4. Conclusions
Even if the network nodes are in a disconnected state, these four methods can still perform real-time identification of the network topology, and AIPI has a higher accuracy rate. The simulation experiments indicate that AIPI combine active and passive interception can inference topology of WSN with high accuracy rates. Active interception is suitable for any protocol but consumes large amounts of energy, and passive interception consumes less energy but is only suitable for the specified protocol. AIPI balances consumption and applicability properly.
The system generates communication nodes within a certain rectangular area, but when the number of communication nodes is excessive, the system’s local information extraction error is relatively large. However, establishing a mixed Gaussian model requires a larger dataset to avoid randomness. When the number of nodes is small, the Gaussian mixture model cannot fit the errors well, which also means that the correction of errors does not achieve a satisfactory effect, leaving considerable room for improvement in error correction.
Author Contributions
Conceptualization, P.J. and R.F.; methodology, P.J. and J.C.; software, P.J. and X.F.; validation, J.C.; formal analysis, P.J.; investigation, P.J.; resources, R.F.; writing-original draft, X.F.; writing-reviewing and editing, X.F. and J.C.; visualization, X.F. and R.F.; supervision, P.J.; project administration, R.F. All authors have read and agreed to the published version of the manuscript.
Funding
This work was supported by the Natural Science Foundation of China (62271349) and the Science Technology Development Fund of Tianjin Education Commission for Higher Ed-ucation (2023KJ248).
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
The data presented in this study are available on request from the corresponding author (due to privacy).
Conflicts of Interest
Author Peng Jiang was employed by Tianjin motimo membrane tech. Co., Ltd. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
References
- Zagrouba, R.; Kardi, A. Comparative Study of Energy Efficient Routing Techniques in Wireless Sensor Networks. Information 2021, 12, 42. [Google Scholar] [CrossRef]
- Kenyeres, M.; Kenyeres, J. Distributed Mechanism for Detecting Average Consensus with Maximum-Degree Weights in Bipartite Regular Graphs. Mathematics 2021, 9, 3020. [Google Scholar] [CrossRef]
- Kullmann, L.; Kertész, J.; Kaski, K. Time-dependent cross-correlations between different stock returns: A directed network of influence. Phys. Rev. E 2002, 66, 026125. [Google Scholar] [CrossRef]
- Stetter, O.; Battaglia, D.; Soriano, J.; Geisel, T. Model-free reconstruction of excitatory neuronal connectivity from calcium imaging signals. PLoS Comput. Biol. 2012, 8, e1002653. [Google Scholar] [CrossRef]
- Runge, J.; Bathiany, S.; Bollt, E.; Camps-Valls, G.; Coumou, D.; Deyle, E.; Glymour, C.; Kretschmer, M.; Mahecha, M.D.; Muñoz-Marí, J.; et al. Inferring causation from time series in Earth system sciences. Nat. Commun. 2019, 10, 2553. [Google Scholar] [CrossRef] [PubMed]
- Wang, W.X.; Lai, Y.C.; Grebogi, C. Data based identification and prediction of nonlinear and complex dynamical systems. Phys. Rep. 2016, 644, 1–76. [Google Scholar] [CrossRef]
- Nitzan, M.; Casadiego, J.; Timme, M. Revealing physical interaction networks from statistics of collective dynamics. Sci. Adv. 2017, 3, e1600396. [Google Scholar] [CrossRef] [PubMed]
- Battaglia, P.W.; Hamrick, J.B.; Bapst, V.; Sanchez-Gonzalez, A.; Zambaldi, V.; Malinowski, M.; Tacchetti, A.; Raposo, D.; Santoro, A.; Faulkner, R.; et al. Relational inductive biases, deep learning, and graph networks. arXiv 2018, arXiv:1806.01261. [Google Scholar]
- Xu, J.; Duan, L.; Zhang, R. Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels. IEEE Wirel. Commun. Lett. 2016, 5, 80–83. [Google Scholar] [CrossRef]
- Cai, H.; Zhang, Q.; Li, Q.; Qin, J. Proactive Monitoring Via Jamming for Rate Maximization Over MIMO Rayleigh Fading Channels. IEEE Commun. Lett. 2017, 21, 2021–2024. [Google Scholar] [CrossRef]
- Cai, Y.; Zhao, C.; Shi, Q.; Li, G.Y.; Champagne, B. Joint Beamforming and Jamming Design for mmWave Information Surveillance Systems. IEEE J. Sel. Areas Commun. 2018, 36, 1410–1425. [Google Scholar] [CrossRef]
- Han, Y.; Duan, L.; Zhang, R. Jamming-Assisted Eavesdropping Over Parallel Fading Channels. IEEE Trans. Inf. Forensics Secur. 2019, 14, 2486–2499. [Google Scholar] [CrossRef]
- Hu, G.; Cai, Y. Proactive Eavesdropping Via Jamming for Ergodic Rate Maximization Over Wireless-Powered Multichannel Suspicious System. IEEE Commun. Lett. 2020, 24, 1830–1834. [Google Scholar] [CrossRef]
- Hu, D.; Zhang, Q.; Yang, P.; Qin, J. Proactive Monitoring via Jamming in Amplify-and-Forward Relay Networks. IEEE Signal Process. Lett. 2017, 24, 1714–1718. [Google Scholar] [CrossRef]
- Lu, H.; Zhang, H.; Dai, H.; Wu, W.; Wang, B. Proactive Eavesdropping in UAV-Aided Suspicious Communication Systems. IEEE Trans. Veh. Technol. 2019, 68, 1993–1997. [Google Scholar] [CrossRef]
- Hu, G.; Si, J.; Cai, Y.; Zhu, F. Proactive Eavesdropping via Jamming in UAV-Enabled Suspicious Multiuser Communications. IEEE Wirel. Commun. Lett. 2022, 11, 3–7. [Google Scholar] [CrossRef]
- Li, B.; Yao, Y.; Chen, H.; Li, Y.; Huang, S. Wireless Information Surveillance and Intervention Over Multiple Suspicious Links. IEEE Signal Process. Lett. 2018, 25, 1131–1135. [Google Scholar] [CrossRef]
- Moon, J.; Lee, H.; Song, C.; Kang, S.; Lee, I. Relay-Assisted Proactive Eavesdropping With Cooperative Jamming and Spoofing. IEEE Trans. Wirel. Commun. 2018, 17, 6958–6971. [Google Scholar] [CrossRef]
- Yao, J.; Wu, T.; Zhang, Q.; Qin, J. Proactive Monitoring via Passive Reflection Using Intelligent Reflecting Surface. IEEE Commun. Lett. 2020, 24, 1909–1913. [Google Scholar] [CrossRef]
- Luo, Q.; Peng, Y.; Li, J.; Peng, X. RSSI-based localization through uncertain data mapping for wireless sensor networks. IEEE Sens. J. 2016, 16, 3155–3162. [Google Scholar] [CrossRef]
- Wang, T.; Ding, H.; Xiong, H.; Zheng, L. A compensated multi-anchors TOF-based localization algorithm for asynchronous wireless sensor networks. IEEE Access 2019, 7, 64162–64176. [Google Scholar] [CrossRef]
- Wang, T.; Xiong, H.; Ding, H.; Zheng, L. TDOA-based joint synchronization and localization algorithm for asynchronous wireless sensor networks. IEEE Trans. Commun. 2020, 68, 3107–3124. [Google Scholar] [CrossRef]
- Gui, L.; Xiao, F.; Zhou, Y.; Shu, F.; Val, T. Connectivity based DV-hop localization for Internet of Things. IEEE Trans. Veh. Technol. 2020, 69, 8949–8958. [Google Scholar] [CrossRef]
- Hartung, S.; Bochem, A.; Zdziarstek, A.; Hogrefe, D. Applied Sensor-Assisted Monte Carlo Localization for Mobile Wireless Sensor Networks. In Proceedings of the 2016 International Conference on Embedded Wireless Systems and Networks, Graz, Austria, 15–17 February 2016; pp. 181–192. [Google Scholar]
- Yousaf, M.Z.; Tahir, M.F.; Raza, A.; Khan, M.A.; Badshah, F. Intelligent Sensors for dc Fault Location Scheme Based on Optimized Intelligent Architecture for HVdc Systems. Sensors 2022, 22, 9936. [Google Scholar] [CrossRef]
- Feng, R.; Yuan, W.; Ge, L.; Ji, S. Nonintrusive Load Disaggregation for Residential Users Based on Alternating Optimization and Downsampling. IEEE Trans. Instrum. Meas. 2021, 70, 1–12. [Google Scholar] [CrossRef]
- Feng, R.; Dai, M.; Wang, H. Distributed Beamforming in MISO SWIPT System. IEEE Trans. Veh. Technol. 2017, 66, 5440–5445. [Google Scholar] [CrossRef]
- Liu, Z.; Wang, W.; Ding, G.; Wu, Q.; Wang, X. Topology Sensing of Non-Collaborative Wireless Networks with Conditional Granger Causality. IEEE Trans. Netw. Sci. Eng. 2022, 9, 1501–1515. [Google Scholar] [CrossRef]
- Liu, Z.; Ding, G.; Wang, Z.; Zheng, S.; Sun, J.; Wu, Q. Cooperative Topology Sensing of Wireless Networks with Distributed Sensors. IEEE Trans. Cogn. Commun. Netw. 2021, 7, 524–540. [Google Scholar] [CrossRef]
- Feng, R.; Cui, J. AINL: Network Topology Identification of Multiple Communication Modes via Active Intercepting and Node Locating. IEEE Access 2023, 11, 121399–121409. [Google Scholar] [CrossRef]
- Akaike, H. Canonical correlation analysis of time series and the use of an information criterion. In Mathematics in Science and Engineering; Elsevier: Amsterdam, The Netherlands, 1976; Volume 126, pp. 27–96. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).