期刊文献+

无线传感网络信道破坏程度与通信效果建模 被引量:1

Wireless Sensor Network Channel Modelingextent of Damage and Communication Effect
下载PDF
导出
摘要 在无线传感网络信道破坏程度与通信效果建模的研究中,为保证传感网络通信性能,传感网络通信节点选择具备一定的随机性,虽然部分节点被破坏,但是,可通过其它节点完成信道通信。这就造成传统建模方法无法通过节点数量的损坏衡量信道的通信破坏程度,分析模型可靠性降低。为此提出一种采用粒子群神经网络混合算法的二者关系建模方法。利用通信效果与被破坏节点的关系得到被破坏传感节点的约束条件,利用粒子群算法原理实现对被破坏节点的准确定位,利用被破坏节点的数目约束模糊聚类结果能够建立二者关系模型。实验结果表明,利用改进算法进行二者关系建模,能够有效提高模型的可靠性。 Wireless sensor network channel damage modeling and communication effect on sensor network com- munication have important significance. The paper proposed a modeling method for the relations of the damage and communication effect using a hybrid algorithm based on particle swarm and neural network. The relations were used to obtain the constraint conditions of the destroyed sensor nodes, the particle swarm algorithm principle was used to accurately positioning the destroyed nodes, and the number of the destroyed nodes was used to constraint the fuzzy clustering results to establish the relation model. Experimental results show that the improved algorithm which was used to model the relationship between the damage and communication effect, can effectively improve the reliability of the model.
作者 孙忠阁
出处 《计算机仿真》 CSCD 北大核心 2015年第2期320-323,373,共5页 Computer Simulation
关键词 无线传感网络 信道破坏 通信效果 建模 Wireless sensor network ( WSN ) Channel damage Communication effect Modeling
  • 相关文献

参考文献10

二级参考文献40

  • 1李元杰,杨绿溪,何振亚.基于训练序列的MIMO信道估计[J].通信学报,2006,27(5):1-5. 被引量:8
  • 2Boyd C, Mathuria A. Key establishment protocols for secure mobile communications: a selective survey [ C]//Australasian Conference on Information Security and Privacy. Brisbane: Springer, 1998:344- 355.
  • 3Law Y W, Corin R, Etalle S, et al. A formally verified decentralized key management architecture for wireless sensor networks[C]//Lecture Notes of Computer Science: Personal Wireless Conununieations. Berlin: Springer-Verlag, 2003:27-39.
  • 4Perrig A, Szewczyk R, Wen V, et al. SPINS: security protocols for sensor networks[J]. Wireless Networks, 2002, 8(5) :521 - 534.
  • 5Sabbah E, Majeed A, Kang K D, et al. An applicationdriven perspective on wireless sensor network security[C]// Proceedings of the 2nd ACM International Workshop on Quality of Service & Security for Wireless and Mobile Networks. Terromolinos: ACM Press, 2006:1 - 8.
  • 6Liu D G, Ning P. Multilevel μTESLA: broadcast authentication for distributed sensor networks [ J ]. ACM Transactions on Embedded Computing Systems, 2004, 3 (4) :800 - 836.
  • 7Khalil I, Bagchi S. SECOS: key management for scalable and energy efficient crypto on sensorsE R]. West Lafayette: Purdue University, 2006.
  • 8Krishna P, Vaidya N H, Chatterjee M, et al. A clusterbased approach for routing in dynamic networks [ J ]. ACM SIGCOMM Computer Communication Review, 1997, 27 (2) :49 - 64.
  • 9Mishra A, Nadkarni K, Patcha A. Intrusion detection in wireless ad hoc networks [ J ]. IEEE Wireless Communications, 2004,11 ( 1 ) : 48 - 60.
  • 10Buchegger S, Boudec J L. Performance analysis of the CONFIDANT protocol[C]//Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoe Networking & Computing. Lausanne: ACM Press, 2002:226- 236.

共引文献473

同被引文献10

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部