期刊文献+

一种基于代码克隆检测技术的WSNs重编程方法 被引量:4

The WSNs Reprogramming Method Based on Code Clone Detection Technology
下载PDF
导出
摘要 提出了基于代码克隆检测技术的无线传感器网络WSNs(Wireless Sensor Networks)重编程方法。通过代码克隆检测方法来解决重编程过程中生成差异补丁的4个关键问题:分支、全局变量、相对跳转和间接地址。然后将差异补丁以无线方式传输给传感器节点,实现WSNs重编程。实验结果表明,该方法是可行的,且能够有效的提高WSNs重编程的效率,延长无线传感器网络的生命周期。 A WSNs reprogramming method is proposed based on code clone detection technology. By using code clone detection technology, the method addresses four major technical issues in the process of differential patch creation :branches, global variables, relative jumps and indirect addresses. Then it transmits differential patch to sensor nodes over the air and implements WSNs reprogramming. The experimental results show that the method is feasible, and it can improve the efficiency of WSNs reprogramming and prolong the life of WSNs.
出处 《传感技术学报》 CAS CSCD 北大核心 2013年第9期1288-1292,共5页 Chinese Journal of Sensors and Actuators
关键词 无线传感器网络 重编程 代码克隆检测技术 差异补丁 WSNs(Wireless Sensor Networks) reprogramming code clone detection technology differential patch
  • 相关文献

参考文献18

  • 1Gajjar S H,Pradhan S N, Dasgupta K S. Wireless Sensor Network: Application Led Research Perspective [ J ]. Recent Advances in Intelligent Computational Systems( RAICS), IEEE ,2011:25-30.
  • 2Wang Qiang, Zhu Yaoyao, Cheng Liang. Reprogramming Wireless Sensor Networks : Challenges and Approaches [ J ]. IEEE Network, 2006,20 ( 3 ) :48-55.
  • 3Sun Junzhao. OS-Based Reprogramming Techniques in Wireless Sensor Networks: A Survey [ C ]//Ubi-Media Computing ( U- Media) ,2010 3rd IEEE International Conference on,2010:17-23.
  • 4谭劲,康顺利,金宁.一种基于OLSR的传感网络再编程可靠与能量有效传输协议[J].传感技术学报,2010,23(8):1146-1152. 被引量:5
  • 5谭劲,张曼曼,禇娜.具有范围选择的传感网络再编程协议算法研究[J].传感技术学报,2012,25(2):251-257. 被引量:2
  • 6Hui J W,David C. The Dynamic Behavior of a Data Dissemination Protocol for Network Programming at Scale [ C ]//Stankovie JA, ed. Pt: of the ACM 2nd lnt' 1 Conf on Embedded Networked Sensor Systems( SenSys 2004). Baltimore: ACM Press ,2004:84-91.
  • 7Dong W,IJu Y,Wu X, et al. Elon:Enabling Efficient and Long-Term Reprogramming for Wireless Sensor Networks [ C ]//Proceedings of the ACM Sigmetries International Conference on Measurement and Modeling of Computer Systems ,2010,38( 1 ) :49-60.
  • 8Panta R, Bagchi S, Midkiff S. Zephyr: Efficient Incremental Repro- gramming of Sensor Nodes Using Function Call Indirections and l)ifference Computation[ C ]//Proc of USENIX Annual Technical Conference,2009 : 175 - 181.
  • 9Panta R K, Bagehi S. Hermes : Fast and EnerD' Efficient Incremental Code Updates for Wireless Sensor Networks [ C 1//Kurose J, ed. Proc of the 28th Int' 1 Conf. Computer Communications (INFOCOM 2009 ). Rio de Janeiro : IEEE Computer Society ,2009:639-647.
  • 10Koshy J, Pandey R. Remote Incremental Linking hr Energy- Efficienl Reprogramming of Sensor Networks [ C ]//Cayirei E, ed. Proe of the 2nd European Workshop on Wireless Sensor Networks ( EWSN 2005 ). lstanbul : IEEE Press ,2005:354-365.

二级参考文献133

  • 1Wang Q,Zhu Y-Y,Cheng L.Reprogramming Wireless Sensor Networks:Challenges and Approaches[J].IEEE Networks,2006,20(3):48-55.
  • 2Diao Y,Ganesan D,Mathur G,et al.Rethinking Data Management for Storage-Centric Sensor Networks[C]//Proc.of the Third Biennial Conference on Innovative Data Systems Research,Asilomar,CA,USA,January 2007.
  • 3Liang M C-J,Musaloiu-E R,Terzis A.Typhoon:A Reliable Data Dissemination Protocol for Wireless Sensor Networks[C]//Proc.of 5th European Conference on Wireless Sensor Networks (EWSN),Bologna,Italy,Jan.2008.
  • 4Li J,Blake C,Couto D,et al.Capacity of Ad Hoc Wireless Networks[C]//Proc.of the 7th Annual International Conference on Mobile Computing and Networking,Rome,Italy,July 2001.
  • 5Vijayakumar D S,Ram S V.A Network Processor Implementation for Solving the ACK Implosion Problem[C]//Proc.of the 44 th annual Southeast Regional Conference,Melbourne,Florida,USA,March 2006.
  • 6Park S-J,Vedantham R,Sivakumar R,et al.A Scalable Approach for Reliable Downstream Data Delivery in Wireless Sensor Networks[C]//Proc.of ACM International Symposium on Mobile Ad Hoc Networking and Computing,Tokyo,Japan,May 2004.
  • 7Park S-J,Vedantham R,Sivakumar R,et al.GARUDA:Achieving Effective Reliability for Downstream Communication in Wireless Sensor Networks[J].IEEE Transactions on Mobile Computing,2008,7(2):214-230.
  • 8Huang L,Setia S.CORD:Energy-Efficient Reliable Bulk Data Dissemination in Sensor Networks[C]//Proc.of the 27th Conference on Computer Communications,Phoenix,AZ,USA,April 2008.
  • 9Adjih C,Clausen T,Jacquet P,et al.Optimized Link State Routing Protocol[S],RFC 3626,IETF,October 2003.
  • 10Crossbow Technology.Inc.Mote In-Network Programming User Reference[EB/OL].2003,http://webs.cs.berkeley.edu /tos/tinyos-1.x/doc/Xnp.pdf.

共引文献9

同被引文献26

  • 1徐军.无线传感器网络恶意节点攻击若干问题研究[D].合肥:中国科学技术大学,2012.
  • 2Parno B, Perrig B, Gligpr A. Distributed Detection of Node Replication Attacks Sensor Networks [ C ]//Proceedings of the 2005 IEEE Symposium on Security and Privacy Washington D C.USA[ s. n. ]. 2005:49-63.
  • 3Khan W, Aalsalem M. Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks:A Survey[ J]. In- ternational Journal of Distributed Sensor Networks, 2013,2013 : 1-22.
  • 4Zhu W T. Detecting Node Replication Attacks in Wireless Sensor Networks:A Survey Review Article [ J ]. Journal of Network and Computer Applications,2012,35 (3) : 1022-1034.
  • 5Conti M, Di Pietro R, Mancini LV, et al. A Randomized, Efficient, Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Network[ C ]//Proceedings of the 8th ACM In- ternational Symposium on Mobile Ad Hoc Networking and Computing( MobiHoc'07 ) ;2007:80-89.
  • 6Zeng Y, Cao J, Zhang S. Random Walk Based Approach to Detect Clone Attacks in Wireless Sensor Networks [ J ]. IEEE Journal onSelected Areas in Communications ,2010,28 (5) : 677-691.
  • 7Lou Y, Zhang Y. Single Hop Detection of Node Clone Attaeks in Mobile Wireless Sensor Networks [ C ]//Proceedings of the International Workshop on Information and Electronics Engineering (IWIEE) ,Harbin China, 10-11 March 2012:2798-2803.
  • 8Hess F. Efficient Identity Based Signature Schemes Based on Pairings[ C]//Proc Ninth ANN Int'l Workshop Selected Areas in Cryptography ( SAC '02 ). 2002 : 310- 324.
  • 9高山,袁杰.基于无线传感器网络节点的串行通信技术[J].现代电子技术,2010,33(18):151-153. 被引量:4
  • 10章春华,陈宏伟.LEACH协议簇头选择算法的改进与研究[J].湖北工业大学学报,2012,27(2):19-22. 被引量:2

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部