期刊文献+

物联网中无线传感节点跨层数据收集协议 被引量:2

Cross-layer Data Gathering Protocol for Wireless Sensing Node in Internet of Thing
下载PDF
导出
摘要 为满足事件检测与报告型物联网的应用要求,提出一种无线传感节点跨层数据收集收集协议(DRGC),设计平衡同步精度和能耗量的时钟同步算法,给出融合介质访问控制和路由为一体的跨层数据收集算法。仿真实验结果表明,与LEACH和PEGASIS协议相比,DRGC协议可有效延长网络存活时间,降低数据传输时延。 In the Intemet of Thing(loT), wireless data transmission is an important way for the information acquisition layer to abtain the information. This paper presents a Data Reliable Gathering Cross-layer protocol(DRGC) for wireless sensor nodes in the Internet of Thing(loT) for the event detecting and reporting. This protocol includes a clock synchronization algorithm that balanced precision and energy consumption, and a cross-layer data gathering algorithm that fuses MAC and routing strategy. Simulation results show that DRGC effectively prolongs the network lifetime and reduces the communication delay in comparison with LEACH and PEGASIS.
作者 卢旭 程良伦
出处 《计算机工程》 CAS CSCD 2013年第5期110-113,共4页 Computer Engineering
基金 国家自然科学基金-广东省联合基金资助重点项目(U0935002) 广东省中国科学院全面战略合作基金资助项目(2010B090301041) 广东省省部产学研结合基金资助项目(2010B090400211)
关键词 物联网 无线传感节点 数据收集 跨层协议 时钟同步 介质访问控制 Internet of Thing(IoT) wireless sensing node data gathering cross-layer protocol clock synchronization MediaAccess Control(MAC)
  • 相关文献

参考文献10

  • 1Commission of the European Communities. Internet of Things An Action Plan for Europe[C]//Proceedings of the 48th Annual Conference of Metallurgists. Brussels, Belgium:[s. n.], 2009: 1-12.
  • 2张忠,徐秋亮.物联网环境下UC安全的组证明RFID协议[J].计算机学报,2011,34(7):1188-1194. 被引量:23
  • 3Cristescu R, Beferull-Lozano B, Vetterli M. On Network Correlated Data Gathering[C]//Proceedings of the 23rd IEEE Conference on Computer Communications. Piscataway, USA: IEEE Press, 2004: 2571-2582.
  • 4Tilak S, Abu-Ghazaleh N B, Heinzelman W. A Taxonomy of Wireless Microsensor Network Models[J]. ACM Mobile Computing and Communications Review, 2002, 6(2): 28-36.
  • 5Heinzelman W R, Kulik J, Balakrishnan H. Adaptive Protocols for Information Dissemination in Wireless Sensor Networks[C]//Proceedings of the 5th Ann. Int'l Conference on Mobile Computing and Networking. [S. l.]: IEEE Press, 2001: 174-185.
  • 6Lindsey S, Raghavendra C S. Pegasis: Power-efficient Gathering in Sensor Information Systems[C]//Proceedings of IEEE Int'l Conference on Computer Systems. San Francisco, USA: IEEE Press, 2002: 1-6.
  • 7Heinzelman W R. An Application-specific Protocol Architecture for Wireless Microsensor Networks[J]. IEEE Trans. on Wireless Communications, 2002, 1 (4): 660-670.
  • 8TelG分布式算法导论[M].霍红卫,译.北京:机械工业出版社,2004.
  • 9陈伟,程良伦,卢旭.融合MAC和路由的跨层设计节能协议[J].计算机工程,2010,36(19):132-133. 被引量:3
  • 10Heinzelman W, Chandrakasan A, Balakrishnan H. Energy- efficient Communication Protocol for Wireless Microsensor Networks[C]//Proceedings of the 33rd Annual Hawaii International Conference on System Sciences. Maul, USA: [s. n.], 2000: 1-10.

二级参考文献26

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2Tilak S, Abu-Ghazaleh N B, Heinzelman W. A Taxonomy of Wireless Microsensor Network Models[J]. ACM Mobile Computing and Communications Review, 2002, 6(2): 28-36.
  • 3Demirkol I, Ersoy C, Alagoz F. MAC Protocols for Wireless Sensor Networks: A Survey[J]. IEEE Communications Magazine, 2006, 44(4): 115-121.
  • 4Kulkarni S, Iyer A. An Address-light, Integrated MAC and Routing Protocol for Wireless Sensor Networks[J]. IEEE/ACM Trans. on Networking, 2006, 14(4): 793-806.
  • 5International Telecommunication Union. ITU Internet Reports 2005: The Internet of Things, ITU, 2005.
  • 6van Deursen T, Mauw S, Radomirovic S. Untraceability of RFID protocols//Proceedings of the 2nd International Workshop on Information Security Theory and Practice. Seville, Spain, 2008:1-15.
  • 7Ha J, Moon S, Zhou J, Ha J. A new formal proof model for RFID location privacy//Proceedings of the 13th European Symposium on Research in Computer Security. Mddaga, Spain, 2008: 267-281.
  • 8van Deursen T, Radomirovic S. On a new formal proof model for RFID location privacy. Information Processing Letters, 2009, 110(2): 57-61.
  • 9Lim C H, Kwon T. Strong and robust RFID authentication enabling perfect ownership transfer//Proeeedings of the 8th International Conference on Information and Communications Security. Raleigh, NC, USA, 2006:1-20.
  • 10Le T V, Burmester M, de Medeiros B. Universally composable and forward-secure RFID authentication and authenticated key exehange//Proceedings of the 2007 ACM Symposium on InformAtion, Computer and Communications Security. Singapore, 2007:242-252.

共引文献24

同被引文献17

引证文献2

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部