期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
一种优化网络生存时间的移动传感节点覆盖调度算法 被引量:9
1
作者 杨海波 陈友荣 +2 位作者 刘半藤 祝云凯 苏子漪 《电信科学》 2018年第5期39-49,共11页
为解决异构静态传感节点部署和失效引起的覆盖盲区问题,提出一种优化网络生存时间的移动传感节点覆盖调度算法(coverage scheduling algorithm,CSA)。CSA考虑静态传感节点的感知半径异构,根据周围邻居传感节点信息计算移动传感节点的停... 为解决异构静态传感节点部署和失效引起的覆盖盲区问题,提出一种优化网络生存时间的移动传感节点覆盖调度算法(coverage scheduling algorithm,CSA)。CSA考虑静态传感节点的感知半径异构,根据周围邻居传感节点信息计算移动传感节点的停留位置。根据静态传感节点上报的位置,建立覆盖调度模型,并采用启发式求解方法求解调度模型,获得移动传感节点的停留位置较优方案。仿真结果表明:CSA可提高区域覆盖率和静态传感节点存活个数,提高网络生存时间和降低平均静态传感节点能耗。在一定的条件下,CSA比Mno、MNode和MGrid等算法性能更优。 展开更多
关键词 无线 异构传感节点 移动调度 网络覆盖
下载PDF
Cluster Based Secure Dynamic Keying Technique for Heterogeneous Mobile Wireless Sensor Networks 被引量:1
2
作者 Thiruppathy Kesavan.V Radhakrishnan.S 《China Communications》 SCIE CSCD 2016年第6期178-194,共17页
In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or... In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or cluster member. This causes the cluster or the whole network to be controlled by the malicious nodes. To offer high level of security, the mobile sensor nodes need to be authenticated. Further, clustering of nodes improves scalability, energy efficient routing and data delivery. In this paper, we propose a cluster based secure dynamic keying technique to authenticate the nodes during mobility. The nodes with high configuration are chosen as cluster heads based on the weight value which is estimated using parameters such as the node degree, average distance, node's average speed, and virtual battery power. The keys are dynamically generated and used for providing security. Even the keys are compromised by the attackers, they are not able to use the previous keys to cheat or disuse the authenticated nodes. In addition, a bidirectional malicious node detection technique is employed which eliminates the malicious node from the network. By simulation, it is proved that the proposed technique provides efficient security with reduced energy consumption during node mobility. 展开更多
关键词 CLUSTER dynamic key HETEROGENEOUS MOBILITY wireless sensor network WEIGHT
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部