期刊文献+

基于蚁群优化的WSN负载均衡数据汇集算法 被引量:2

Load-balancing data gathering algorithm for wireless sensor networks based on ACO
下载PDF
导出
摘要 针对无线传感器网络(WSN)数据汇集应用中负载分配不均衡,使得网络节点出现早死,网络寿命缩短的问题,提出了一种基于蚁群优化(ACO)的负载均衡的数据汇集(Load-balancing data gathering based on ACO,L-ACO)算法。根据不同的任务,L-ACO算法将蚂蚁分为三类:前向探索蚂蚁(FD-ANT)、前向运输蚂蚁(Fr-ANT)和后向蚂蚁(B-ANT)。此算法定义蚂蚁的转移概率与路径信息素成反比,并采用父节点负载作为启发因子,使得蚂蚁趋向于走负载低的路径。通过前向蚂蚁与后向蚂蚁的分工合作,使得各条路径上的负载逐渐趋于均衡,从而延长网络寿命。仿真实验表明L-ACO算法可行。 To solve the problem that the unbalanced load in wireless sensor networks (WSNs) performing data gathering causes premature death of sensor nodes and shortens the network lifetime, the paper proposes an algorithm of L-ACO, a new load-balancing data gathering algorithm based on the ant colony optimization (ACO) for WSNs. According to different tasks, the algorithm divides ants into three categories: forward ants (FD-ANT), forward transport ants (FT-ANT) and backward ants (B-ANT). In L-ACO, ants choose the next hop according to the lower pheromone higher probability principle, and the load of parents is taken as the heuristic factor. Through the cooperation of forward ants and backward ants, a certain degree load-balancing is reached step by step, and the network lifetime is extended. The simulation results validated the effectiveness of this approach.
出处 《高技术通讯》 EI CAS CSCD 北大核心 2010年第8期784-791,共8页 Chinese High Technology Letters
基金 863计划(2006AA780201-2) 教育部博士点基金(20060611010)资助项目
关键词 无线传感器网络(WSN) 数据汇集 负载均衡 蚁群优化(ACO) wireless sensor networks (WSN), data gathering, load-balancing, ant colony optimization (ACO)
  • 相关文献

参考文献21

  • 1Akkaya K,Younis M.A survey on routing protocols for wireless sensor networks.Ad Hoc Networks.2005,3(3):325-349.
  • 2Akyildiz I F,Weilian S,Sankarasubramaniam Y,et al.A survey on sensor networks.Ad Hoc Networks.2002,40(8):102-114.
  • 3Perillo M,Zhao C,Heinzelman W.On the problem of unbalanced load distribution in wireless sensor networks.In:Proceedings of the Global Telecommunications Conference Workshops,Texas,USA.2004.74-79.
  • 4张重庆,李明禄,伍民友.数据收集传感器网络的负载平衡网络构建方法[J].软件学报,2007,18(5):1110-1121. 被引量:29
  • 5Dorigo M,Stutzle T.Ant Colony Optimization.MA:MIT Press,2004.
  • 6Hsiao P H,Hwang A,Kung H T,et al.Load-balancing routing for wireless access networks.In:Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies,Hong Kong,China.2001.986-995.
  • 7Hui D,Han R.A node-centric load balancing algorithm for wireless sensor networks.In:Proceedings of the Global Telecommunications Conference,San Francisco,CA,USA.2003.548-552.
  • 8Ruihua Z,Lin W,Shichao G,et al.A balanced cluster routing protocol of wireless sensor network.In:Proceedings of the International Conference on Embedded Software and Systems Symposia,Chengdu,China.2008.221-225.
  • 9Liansheng T,Yanlin G,Gong C.A balanced parallel clustering protocol for wireless sensor networks using k-means techniques.In:Proceedings of the International Conference on Sensor Technologies and Applications,Cap Esterel,France.2008.300-305.
  • 10Yanlin G,Gong C,Liansheng T.A balanced serial k-means based clustering protocol for wireless sensor networks.In:Proceedings of the International Conference on Wireless Communications,Dalian,China.2008.1-6.

二级参考文献37

  • 1李晖,彭志威,陈克非.无线传感器网络及其安全问题[J].中兴通讯技术,2004,10(B10):30-34. 被引量:13
  • 2崔莉,鞠海玲,苗勇,李天璞,刘巍,赵泽.无线传感器网络研究进展[J].计算机研究与发展,2005,42(1):163-174. 被引量:730
  • 3林恺,赵海,尹震宇,张希元.无线传感器网络路由中的能量预测及算法实现[J].通信学报,2006,27(5):21-27. 被引量:27
  • 4沈玉龙,裴庆祺,马建峰.MMμTESLA:多基站传感器网络广播认证协议[J].计算机学报,2007,30(4):539-546. 被引量:18
  • 5TSENG H C, et al. Sinkhole intrusion indicators in DSR MANETs culpepper[A]. Proceedings First International Conference on Broad- band Networks[C]. 2004.681-688.
  • 6DOUCEUR J R. The sybil attack[A]. 1st International Workshop on Peer-to-Peer Systems (IPTPS '02)[C]. 2002.
  • 7HU Y C, PERRIG A. Wormhole detection in wireless ad hoc net-works[J]. IEEE Journal on Selected Areas in Communications, 2006.370-379.
  • 8DENG J, HAN R, MISHRA S. INSENS: Intrusion-tolerant routing in wireless sensor networks[A]. Proceedings of the International Conference on Dependable Systems and Networks[C]. 2004. 637-646.
  • 9SAPON T, PINALKUMAR D, ROHAN B, et al. Secure locations: routing on trust and isolating compromised sensors in location-aware sensor networks[A]. Proceedings of the First International Conference on Embedded Networked Sensor Systems[C]. 2003. 324-325.
  • 10PERRIG A. SPINS: security protocols for sensor networks[J]. Wire-less Networks, 2002, 8(8): 521-534.

共引文献59

同被引文献11

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部