期刊文献+

无线传感网络中基于生日悖论的分簇算法 被引量:1

Clustering Arithmetic Based on Birthday Paradox in Wireless Sensor Network
下载PDF
导出
摘要 节点能量有限是无线传感网络的一个基本特性,本文为节省节点能量和延长网络生存周期,将生日悖论理论引入到分簇算法中.通过在每个节点的时槽内,对工作、侦听、休眠三种工作状态进行合理的分配,保证网络中所有节点在最少能量消耗下进行分簇和选择簇头工作,有效的延长了网络生存周期.并且给出了仿真结果. The finite energy is one of the basic features of wireless sensor network, this paper imports the theory of birthday paradox to the clustering arithmetic, which aims at saving energy of the nodes and prolonging the survival period, distributes reasonably the time slots of every node among the working, interception and dormancy status, ensures all the nodes in the network do the clustering and choose cluster-heads with least energy consumption, and prolongs effectively survival period of the network. Also, the paper provides the result of simulation.
作者 韩屏 李方敏
出处 《小型微型计算机系统》 CSCD 北大核心 2007年第11期2028-2032,共5页 Journal of Chinese Computer Systems
基金 教育部博士点基金项目"无线传感网络在结构健康监测中的数据同步和融合技术研究"(20050497006)资
关键词 生日悖论 分簇 LEACH HEED birthday paradox clustering LEACH HEED
  • 相关文献

参考文献5

  • 1Heinzelman W R,Chandrakasan A,Balakrishnan H.An application-specific protocol architecture for wireless microsensor networks[J].IEEE Transactions on Wireless Communications,2002,1(4):660-670.
  • 2Younis O,Fahmy S.Distributed clustering in ad-hoc sensor networks:A hybrid,energy-efficient approach[C].In:Proc 13th Joint Conf on IEEE Computer and Communications Societies,March 2004.
  • 3The Birthday Paradox,Philip J.Erdelsky[EB/OL].http://efgh.com/math/birthday.btm,(2006-07-09).
  • 4Michael J.McGlynn,Steven A,Borbash.Birthday protocolsfor low energy deployment and flexible neighbor discovery in ad hoc wireless networks[C].In Proceedings of the SecondACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2001),Long Beach,California,October 2001:137-145.
  • 5Santashil PalChaudhuri,David B,Johnson.Birthday paradox for energy conservation in sensor networks[J].Computer Science,Rice University.Houston,Texas.

同被引文献17

  • 1覃伯平,周贤伟,杨军,宋存义.无线传感器网络的安全路由技术研究[J].传感技术学报,2006,19(1):16-19. 被引量:18
  • 2刘帅,林亚平,余建平.基于簇的传感器网络节点复制攻击检测[J].计算机仿真,2007,24(6):129-132. 被引量:3
  • 3Lou W, Liu W, Fang Y. Spread : Enhancing Data Confidentiality in Mobile Ad Hoc Networks [ C ]//Proc. IEEE INFOCOM Conference, Mar. 2004, vol. 4, pages 2404-2413.
  • 4Lou W,Kwon Y. H-spread:A Hybrid Muhipath Scheme for Secure and Reliable Data Collection in Wireless Sensor Networks [ J ]. IEEE Transactions on Vehicular Technology, Jul. 2006,55 ( 4 ) : 1320-1330.
  • 5Lee P C, Misra V, Rubenstein D. Distributed Algorithms for Secure Muhipath Routing in Attack-Resistant Networks [ J]. IEEE/ACM Transactions on Networking, Dec. 2007,15 (6) : 1490-1501.
  • 6Ye Z, Krishnamurthy V, Tripathi S K. A Framework for Reliable Routing in Mobile Ad Hoe Networks - C ]//Proe. IEEE Infocom Conference, Mar. 2003, vol. 1, pages 270-280.
  • 7Shu T, Liu S, Krunz M. Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes [ J ]. IEEE Transactions on Mobile Computing, 2010, pages 941-954.
  • 8Du W, Deng J, Han Y S. A Witness-Based Approach for Data Fusion Assurance in Wireless Sensor Networks [ C ]//Proc. IEEE Global Telecomm Conference, Dec. 2003, vol. 3, pages 1435 -1439.
  • 9Pai H T, Han Y S. Power-Efficient Direct-Voting Assurance for Data Fusion in Wireless Sensor Networks [ J ]. IEEE Transactions on Computers, Feb. 2008,57 (2) :261-273.
  • 10Akyildiz I F, Su W, Sankarasubramaniam Y, et al. A Survey on Sensor Networks[ J ]. IEEE Communications Magazine, Aug. 2002, 40(8) :102-114.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部