期刊文献+

Locomotion trajectory with cooperative metrics in wireless sensor networks 被引量:1

Locomotion trajectory with cooperative metrics in wireless sensor networks
原文传递
导出
摘要 Detection coverage control is one of the most important topics in the intrusion detection problem of wireless sensor networks (WSN). However, its converse, i.e., to design an object locomotion trajectory in WSN, has not received enough attention. This article proposes a heuristic algorithm, namely, the security & speed (SS) algorithm, to depict such a trajectory that takes into consideration both security and speed. The merit of the SS algorithm is its topology independency. When compared with traditional algorithms, the SS algorithm approaches the optimal trajectory better, and enjoys considerably lower computational load, and a better and adjustable tradeoff between trajectory security and speed. Detection coverage control is one of the most important topics in the intrusion detection problem of wireless sensor networks (WSN). However, its converse, i.e., to design an object locomotion trajectory in WSN, has not received enough attention. This article proposes a heuristic algorithm, namely, the security & speed (SS) algorithm, to depict such a trajectory that takes into consideration both security and speed. The merit of the SS algorithm is its topology independency. When compared with traditional algorithms, the SS algorithm approaches the optimal trajectory better, and enjoys considerably lower computational load, and a better and adjustable tradeoff between trajectory security and speed.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2007年第2期64-68,74,共6页 中国邮电高校学报(英文版)
基金 the National Natural Science Foundation of China (60672107) the Hi-tech Research and Development Program of China (10Z2,10A3) the National Basic Research Program of China (2007CB307105).
关键词 WSN coverage control locomotion trajectory algorithm WSN, coverage control, locomotion trajectory algorithm
  • 相关文献

参考文献3

二级参考文献33

  • 1屈玉贵,翟羽佳,蔺智挺,赵保华,张英堂.一种新的无线传感器网络传感器放置模型[J].北京邮电大学学报,2004,27(6):1-5. 被引量:24
  • 2邹仕洪,张丽娜,程时端.一种高效的移动自组网MAC协议[J].北京邮电大学学报,2005,28(1):43-47. 被引量:13
  • 3Jun Lu, Suda T. Coverage-aware self-scheduling in sensot networks[A]. Proceedings of IEEE CCW 2003 [C].California:IEEE, 2003. 117-123.
  • 4Tian D, Georganas N D. A Coverage-preserved node scheduling scheme for large wireless sensor networks[A].Proceeding of ACM WSNA' 02 [ C]. Atlanta: ACM,2002. 32-41.
  • 5Huang Chifu, Tseng Yuchee . The coverage problem in a wireless sensor network[A]. Proceedings of ACM WSNA'03[C]. San Diego:ACM, 2003. 115-121.
  • 6Slijepcevic S, Potkonjak M. Power efficient organization of wireless sensor networks[A]. Proceeding of IEEE ICC 2001[C]. Helsinki:IEEE, 2001. 472-476.
  • 7ESCHENAUER L,GL IGOR V D.A key-management scheme for distributed sensor net works[C]// Proceedings of the 9th ACM Conference on Computer and Communications Security,Nov 18-22,2002,Washington,DC,USA.New York,NY,USA:ACM Press,2002:41 -47.
  • 8DI PIETRO R,MANCINI L V,MEI A.Random key assignment for secure wireless sensor networks[C]//Proceedings of 1st ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN '03),Oct 31,2003,Fairfax,VA,USA.New York,NY,USA:ACM Press,2003:62-71.
  • 9CHAN H,PERRIG A,SONG D.Random key predistribution schemes for sensor networks[C]//Proceedings of IEEE Symposium on Research in Security and Privacy,May 11 -14,2003,Berkeley,CA,USA.Piscataway,NJ,USA:IEEE,2003:197-213.
  • 10LAUTER K.The advantages of elliptic curve cryptography for wireless security[J].IEEE Wireless Communications,2004,11(1):62-67.

共引文献189

同被引文献12

  • 1TILAK S,ABUGHAZALEH N B,HEINELMAN W.A taxonomy of wireless micro-sensor network models[J].Mobile Computing and Communications Review,2002,1(2):1-8.
  • 2CHAKRABATTY K,IYENGAR S S,QI Hai-rong,et al.Grid cove-rage for surveillance and target location in distributed sensor networks[J].IEEE Trans on Computers,2002,51(12):1448-1453.
  • 3CHAKRABATTY K,IYENGAR S S,QI Hai-rong,et al.Coding theo-ry framework for target location in distributed sensor networks[C]// Proc of International Conference on Information Technology:Coding and Computing.Washington DC:IEEE Computer Society,2001:130-134.
  • 4ZO Y.Coverage-driven sensor deployment and energy-efficient information processing in wireless sensor networks[D].Durham:Duke University,2004.
  • 5MEGUERDICHIAN S,KOUSHANFAR F,QU Gang,et al.Exposure in wireless Ad hoc sensor networks[C]//Proc of the 7th International Conference on Mobile Computing and Networking.New York:ACM Press,2001:139-150.
  • 6HOLGER K,ANDREAS W.无线传感器网络协议与体系结构[M].邱天爽,唐洪,李婷,等译.北京:电子工业出版社,2007:76-83.
  • 7VELTRI G,HUANG Qing-feng,QU Gang,et al.Minimal and maximal exposure path algorithms for wireless emended sensor networks[C]//Proc of the 15th International Conference on Embedded Networked Sensor.2003:40-50.
  • 8LI Shi-jian,XU Cong-fu,PAN Wei-ke,et al.Sensor deployment optimization for detecting maneuvering targets[C]//Proc of the 7th International Conference on Information Fusion.2005:1-7.
  • 9ADLAKHA S,SRIVASTAVA M.Critical density thresholds for cove-rage in wireless sensor networks[C]// Proc of IEEE Wireless Communications and Networking Conference.2003:1615-1620.
  • 10蒋鹏,陈峰.基于概率的三维无线传感器网络K-覆盖控制方法[J].传感技术学报,2009,22(5):706-711. 被引量:18

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部