期刊文献+

一种改进的传感器网络分簇分层路由协议 被引量:2

An improved clustering hierarchical routing protocol for wireless sensor networks
下载PDF
导出
摘要 在分析了无线传感器网络中传统的LEACH和LEACH-C路由协议基础上,结合MTE路由协议思想,提出了一种新的改进型分簇分层路由协议(improved clustering hierarchical routing protocol,ICH).文中簇首节点可以采用多跳方式传输数据包,且在选择中继节点时考虑节点剩余能量,对进入下一轮的条件进行了限制.实验表明,改进后的ICH协议的节点存活率比LEACH-C好. After analyzing the LEACH,LEACH-C hierarchical protocols and MTE protocol,we proposed a new routing protocol called ICH(improved clustering hierarchical routing protocol) for wireless sensor networks.The cluster-heads use the multi-hop communication mode to transfer data packets.And the energy of the node was considered in the selection of relaying nodes.We put forward the restrictive conditions when the network will go into the next round.Experiment result shows that the ICH acts better than LEACH-C at the...
出处 《中国计量学院学报》 2010年第3期241-245,270,共6页 Journal of China Jiliang University
基金 浙江省科技攻关计划项目(No.2007c23098)
关键词 无线传感器网络 分簇 分层路由协议 wireless sensor networks clustering hierarchical routing protocol
  • 相关文献

参考文献15

二级参考文献257

共引文献2439

同被引文献17

  • 1黄俊.传感器网络目标恢复算法研究[J].中国计量学院学报,2006,17(3):228-232. 被引量:4
  • 2Adrian Perrig,Robert Szewczyk,J.D. Tygar,Victor Wen,David E. Culler.SPINS: Security Protocols for Sensor Networks[J]. Wireless Networks . 2002 (5)
  • 3YANG L S,ZHU H,WEI Y,et al.A trust evaluationframework in distributed networks:Vulnerability analysisand defense against attacks. Proceedings of 25th IEEEinternational conference on computer communications . 2007
  • 4CURICA D,BANIAS O,DRANGA O.Malicious node de-tection in wireless sensor networks using an autoregressiontechnique. Third international conference on networ-king and services (ICNS07) . 2008
  • 5ZHANG M W,YANG B,ZHANG W Z,et al.Using trust metric to detect malicious behaviors in WSNs. 8th ACIS international conference on software engineer-ing,artificial intelligence,networking,and parallel dis-tributed computing . 2007
  • 6CURIAC D I,Madalin P,BANIAS O,et al.Software de-velopment for malicious nodes discovery in wireless sensornetwork security. 4th international conference onsensor technologies and applications . 2010
  • 7FANG L,CHENG X Z,CHEN C.Insider attacker detec-tion in wireless sensor networks. 26th internationalconference on computer communications . 2007
  • 8GANERIWAL S,SRIVASTAVA M B.Reputation-basedframework for high integrity sensor networks. Pro-ceedings of the 2nd ACM workshop on Security of ad hocand sensor networks (SASN 04) . 2004
  • 9ATAKLI I M,HUHong-bing,CHEN Yu,et al.Malicious node de-tection in wireless sensor networks using weighted trust evaluation. Proc of Spring Simulation Multi Conference . 2008
  • 10W. R. Pires,T. H. P. Figueiredo,H. C. Wong,A. A. F. Loureiro.Malicious node detection in wireless sensor networks. 18th Int‘l Parallel and Distributed Processing Symp . 2004

引证文献2

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部