Generation of communications networks demands, real-time localization and position-based services that are accurate, low cost, energy-efficient and reliable [26,35]. Every day, Wireless Sensor Networks (WSNs) technique can be used in many applications, such as targets tracking, natural resources realization, monitoring in difficult reachable places ….etc. In these applications, the information is collected and transferred by the sensor nodes. many applications request these sensor nodes’ location information. Moreover, the location information is also necessary for geographic routing protocols and clustering [25,26]. All these mentioned above make localization algorithms important in WSNs services. Due to that, locations of sensor nodes are important for operations in WSNs.\n In the simplest way localization mean identifying the location of the node. In WSN distribution of nodes will be randomly in a huge area, also to overcome high coast little number of sensors can be connected to GPS (nodes with known positions). it is important to determine the place which has an unstable environment under hard constraints. Global Positioning nodes (GPS) are not always possible GPS cannot work indoors, and power consumption is very high. Other sensor nodes estimate their distances to anchor nodes and calculate positions with multi-literation techniques. These methods provide a different level of accuracy with a small proportion of anchor nodes in WSNs [19,20]. The sensor nodes are randomly placed in unreachable positions by the vehicle robots or aircrafts to be used in many promising applications, such as health surveillance, battlefield surveillance, environmental monitoring, coverage, routing, location service, target tracking, and rescue [29].\n Localization algorithms can be classified into two categories which are range free and range based. Various localization algorithms and methodologies have been proposed to deal with different problems in different applications.\n This chapter discusses the techniques used in localization and compares them to illustrate the choice of technique used in the network depend upon the application request.