期刊文献+

无线传感网络的冲突感知MAC协议研究 被引量:1

Design of collision aware MAC protocol for wireless sensor network
下载PDF
导出
摘要 无线传感网络是事件触发的网络,其中包含大量的节点。提出了同源冲突和非同源冲突的概念:将同一事件触发多个节点动作称为同源冲突;不同事件触发的多个节点动作称为非同源冲突。这两种冲突都会造成网络数据流量的下降和节点能量的浪费。因此,需要在现有无线传感的MAC层协议的基础上,实现MAC层的冲突避免。使用筛选和功率控制思想设计了冲突感知MAC协议CAMAC,详细论述了CAMAC对不同类型冲突的处理原理,使用NS进行仿真,并给出了仿真结果。 The wireless sensor network is event triggering network, which contains many nodes. The concepts of same source collision and different source collision were put forward. The collision caused by identical event triggering several nodes' movement was regarded as same source collision and the collision caused by different events triggering different nodes' movement was regarded as different source collision. All these two collisions can cause the decline of network data stream and the waste of nodes energy. Therefore, it is necessary to realize collision avoidance for MAC layer based on existing MAC protocol of wireless sensor. The collision aware MAC (CAMAC) using the idea of filter and power control was proposed. The principle of CAMAC handling different collisions was discussed, and CAMAC was simulated by NS.
作者 廖传书 韩屏
出处 《计算机应用》 CSCD 北大核心 2007年第7期1572-1575,共4页 journal of Computer Applications
关键词 无线传感网络 冲突感知 介质存取控制协议 wireless sensor network collision aware Medium Access Control (MAC) protocol
  • 相关文献

参考文献8

  • 1YE W,HEIDEMANN J,ESTRIN D.An energy-efficient MAC protocol for wireless sensor networks[C]// Proceedings of 21st International Annual Joint Conference on IEEE Computer and Communications Societies (INFOCOM 2002).New York:IEEE Computer Society,2002.
  • 2Van DAM T,LANGENDOEN K.An adaptive energy-efficient MAC protocol for wireless sensor[C]// Proceedings of 1st International Conference on Embedded Networked Sensor Systems (SenSys 2003).Los Angeles,CA:ACM Press,2003:171-180.
  • 3GOMEZ J,CAMPBELL A T,NAGHSHINEH M,et al.Conserving transmission power in wireless ad hoc networks[C]// Proceedings of the 9th International Conference on Network Protocols (ICNP'01).Washington,DC:IEEE Computer Society Press,2001:24-34.
  • 4MUQATTASH A,KRUNZ M.A single-channel solution for transmission power control in wireless ad hoc networks[C]// Proceedings of the ACM MobiHoc'04.Roppongi,Japan:[s.n.],2004:210-221.
  • 5BHARGHAVAN V,DEMERS A,SHENKER S,et al.MACA:A media access protocol for wireless LAN's[J].Proceedings of ACM SIGCOMM,1994,24(4):212-225.
  • 6KARN P.MACA-A new channel access method for packet radio[C]// ARRL/CRRL Amateur Radio 9th Computer Networking Conference.London:ARRL,1990:134-140.
  • 7JAMIESON K,BALAKRISHNAN H,TAY Y C.Sift:a MAC protocol for event-driven wireless sensor networks,MIT-LCS-TR-894[R].USA:MIT,2003.
  • 8MONKS J P,BHARGHAVAN V,WMW H W U.Transmission power control for multiple access wireless packet networks[C]// Proceedings of the IEEE Infocom Conference.NJ:IEEE Communication Society,2001:219-228.

同被引文献14

  • 1余群,张建明.无线传感器网络中的Sybil攻击检测[J].计算机应用,2006,26(12):2897-2899. 被引量:7
  • 2Akyildiz I F,Su W,Sankarasubramaniam Y,et al.Wireless sensornetworks:A survey[J].Computer Networks,Elsevier Science,2002,38(4):393-422.
  • 3Mpitziopoulos A,Gavalas D,Konstantopoulos C,et al.A surveyon jamming attacks and countermeasures in WSNs[J].Commu-nications Surveys&Tutorials,IEEE,2009,11(4):42-56.
  • 4Wang Yong,Garhan A,Byrav R.A survey of security issues inwireless sensor networks[J].Communications Surveys&Tuto-rials,IEEE,2006,8(2):2-23.
  • 5Xiao Yang,Chen Hsiao-hwa,Sun Bo,et al.MAC security and se-curity overhead analysis in the IEEE 802.15.4 wireless sensornetworks[J].EURASIP Journal on Wireless Communicationsand Networking,2006(2):1-12.
  • 6Wood A D,Stankovic J A.Denial of service in sensor networks[J].IEEE Computer,2002(8):54-62.
  • 7Aymond R D R,Midkiff S F.Denial of service in wireless sensornetworks:Attacks and defences[J].IEEE Security and Privacy,2008,7(1):74-81.
  • 8Pelechrinis M I K,Krishnamurthy S V.Denial of service attacksin wireless networks:The case of jammers[J].IEEE Communi-cations Surveys&Tutorials,2011(2):1-13.
  • 9Karlof C,Wagner D.Secure routing in wireless sensor networks:Attacks and countermeasures[J].Ad Hoc Networks,2003,1(2-3):293-315.
  • 10Ssu K F,Wang W T.Detecting sybil attacks in wireless sensornetworks using neighboring information[J].Computer Networks,2009,53(18):3042-3056.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部