期刊文献+

传感环境下基于局部Voronoi图的启发式反监控路径发现算法 被引量:1

Heuristic anti-monitoring path finding algorithm based on local Voronoi tessellation in sensory field
下载PDF
导出
摘要 针对移动对象通过传感区域时的安全问题,提出了一种基于局部Voronoi图(VT)的启发式反监控路径发现算法。首先,给出了一种基于局部Voronoi图的路径暴露风险近似估算模型。在该模型中,移动目标可依据当前探测到的传感器节点位置信息动态生成局部Voronoi图,并可依据定义的暴露风险计算公式近似估算出局部Voronoi图中各条边所对应路径的暴露风险。然后,在此基础上设计并实现了一种启发式的反监控路径发现算法。在该算法中,移动目标可首先基于局部Voronoi图确定自己的下一跳位置点候选集,然后再基于定义的启发式代价函数从候选集中选择一个风险代价最小的位置点作为其下一跳目标位置点。最后,沿着局部Voronoi图中对应的最小暴露风险路径移动到该目标位置点。理论分析和实验结果表明,所提算法具有良好的反监控性能,针对部署有n个传感器节点的区域,能够使得移动对象在不超过O(n log n)的时间内快速找到一条具有较低暴露风险的路径来穿越整个传感区域。 Considering the safety problem of mobile objects while traversing through a sensory field, a novel heuristic anti-monitoring path finding algorithm based on local Voronoi Tessellation( VT) was proposed in this paper. First, an approximate estimation model of path exposure based on local Voronoi tessellation was presented, in which, the mobile object could generate the local Voronoi tessellation dynamically based on currently detected sensor nodes information, and approximately estimated the exposure risk of each path corresponding to an edge of the local Voronoi tessellation based on the newly defined exposure risk computation formula. And then, based on the newly given exposure model, a novel heuristic antimonitoring path finding algorithm was designed, in which, the mobile object could firstly determine its candidate set of next hop location points based on the local Voronoi tessellation, and then selected a location point with the minimum risk cost from its candidate set as its actual next hop location based on the newly defined heuristic cost function, and therefore, moved along the corresponding path with the minimum exposure risk in the local Voronoi tessellation to the selected next hop location. The theoretical analysis and simulation results show that the proposed algorithm has good anti-monitoring performance, and as for a sensory field with total n sensor nodes, the mobile object can select a path with relatively small risk to get to the destination within the time no more than O( n log n).
作者 陈娟
出处 《计算机应用》 CSCD 北大核心 2015年第1期15-18,22,共5页 journal of Computer Applications
关键词 传感器网络 VORONOI图 反监控 启发式算法 暴露风险 sensor network Voronoi Tessellation(VT) anti-monitoring heuristic algorithm exposure risk
  • 相关文献

参考文献13

  • 1ZENG W, LIN Y, YU J, et al. Privacy-preserving data aggregation scheme based on the p-function set in wireless sensor networks [ J]. Ad Hoc and Sensor Wireless Networks, 2014, 21( 1/2): 21 -58.
  • 2王瑞锦,秦志光,王佳昊.无线传感器网络分簇路由协议分析[J].电子科技大学学报,2013,42(3):400-405. 被引量:20
  • 3BEN-OTHMAN J, YAHYA B. Energy efficient and QoS based rou- ting protocol for wireless sensor networks [ J]. Journal of Parallel and Distributed Computing, 2010, 70(8): 849-857.
  • 4CHEN T, YANG Z, LIU Y, et al. Localization-oriented network adjustment in wireless Ad Hoc and sensor networks [ J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25 (1): 146 - 155.
  • 5陈喆,王雷.传感环境下一种启发式反监控路径搜索算法[J].计算机应用,2008,28(11):2767-2770. 被引量:5
  • 6VELTRI G, HUANG Q, Qu G. Minimal and maximal exposure path algorithms for wireless embedded sensor networks [ C ]// SenSys'03: Proceedings of the I st International Conference on Em- bedded Networked Sensor Systems. New York: ACM, 2003:40 - 50.
  • 7GUSRIALDI A, HIRCHE S, HATANAKA T, et al. Voronoi based coverage control with anisotropic sensors [ C]// Proceedings of the 2008 American Control Conference. Piscataway: IEEE, 2008:736 - 741.
  • 8RAHMAN M O, HONG C S. Probabilistic exposure identification for wireless sensor network [ C]//Proceedings of the 26th KIPS Fall Conference. Piscataway: IEEE, 2006: 1359- 1362.
  • 9MEGUERDICHIAN S, KOUSHANFAR F, QU G, et al. Exposure in wireless Ad-Hoc sensor networks [ C]// Proceedings of the 7th Annual International Conference on Mobile Computing and Networ- king. New York: ACM, 2001: 139-150.
  • 10MEGUERDICHIAN S, KOUSHANFAR F, POTKONJAK M, et al. Coverage problems in wireless Ad-Hoc sensor networks [ C]//INFOCOM 2001 : Proceedings of the Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Piscataway: IEEE, 2001, 3: 1380-1387.

二级参考文献50

共引文献33

同被引文献9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部