期刊文献+

基于MCN和WSN的融合技术研究

Research of Convergence of MCN and WSN
下载PDF
导出
摘要 近年来,为了满足以数据为中心的无线服务和应用程序等业务的快速增长的需求,不需要人类参与的M2M通信得到了迅猛发展;为了支持M2M通信,移动蜂窝网络(MCN)和无线传感网络(WSN)正逐渐从独立的网络走向融合;这里讨论了MCN和WSN融合所面临的技术难题;提出在融合网络中,可以使MCN中的移动终端扮演传感器节点和WSN中网关的角色;评估了这种方法的性能,仿真表明采用与MCN交互式优化的方法能够提高WSN的吞吐量、延时、网络寿命等性能。 In recent years, machine--to--machine (M2M) communications, which do not need direct interactions from human beings, are booming to meet the fast--increasing requirements of data centric wireless services and applications. Mobile cellular networks (MCN) and wireless sensor networks (WSN) are evolving from heterogeneous networks to converged networks, in order to support M2M communica- tions. In this article, we investigate and discuss key technical challenges and opportunities for the convergence of MCN and WSN. We pro- pose that the mobile terminals in MCN act as both sensor nodes and gateways for WSN in the converged networks. We evaluated the per- formance gain, and our simulation results show that better system performance, in terms of throughput, delay, and network lifetime, can be achieved in WSN by using interactive optimization with MCN.
作者 王文凡 申杰
出处 《计算机测量与控制》 北大核心 2014年第5期1555-1558,共4页 Computer Measurement &Control
关键词 M2M通信 移动蜂窝网络 无线传感网络 交互式优化 M2M MCN WSN interactive optimization
  • 相关文献

参考文献9

二级参考文献79

  • 1王福豹,史龙,任丰原.无线传感器网络中的自身定位系统和算法[J].软件学报,2005,16(5):857-868. 被引量:673
  • 2肖玲,李仁发,罗娟.基于非度量多维标度的无线传感器网络节点定位算法[J].计算机研究与发展,2007,44(3):399-405. 被引量:38
  • 3LIU D,NING P, DU W. Detecting malicious beacon nodes for secure location discovery in wireless sensor networks[A].The 25th ICDCS[C] Columbus ,Ohio ,USA. 2005:609-619.
  • 4DU W, FANG L, NING P. Lad: localization anomaly detection forwireless sensor networks[A]. The 19th IPDPS[C]. 2005.41.
  • 5RITESH M, GAO J, DAS S R. Detecting wormhole attacks in wireless networks using connectivity information[A]. Proc of the 26th Annual IEEE Conference on Computer Communications(INFOCOM '07)[C].Anchorage, Alaska, 2007.107-115.
  • 6MEADOWS C,POOVENDRAN R,PAVLOVIC D, et al, Distance bounding protocols: Authentication logic analysis and collusion attacks[A]. Poovendran R,et al,eds.Secure Localization and Time Synchronization for Wireless Sensor and Ad Networks Springer-Verlag[C] 2007.
  • 7BRANDS S, CHAUM D. Distance-bounding protocols[A]. Proc of Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology[C]. LNCS 765: Springer-Verlag, 1994. 344-359.
  • 8SASTRY N,SHANKAR U,WAGNER D.Secure verification of locations[A]. Maughan D,Perrig A,eds.Proc.of the 2003 ACM Workshop on Wireless security(WlSE)[C].New York:ACM Press,2003.1-10.
  • 9CAPKUN S, HUBAUX J P. Secure positioning in wireless networks[J]. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 221-232.
  • 10ZHANG Y, LIN W, FANG Y, et al.Secure localization and authentication in ultra-wideband sensor networks[J]. IEEE Journal on Selected Areas in Communications, 2006,24(4):829-835.

共引文献58

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部