期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
面向青藏铁路的军民融合式动态监控系统无线传感器网络模型 被引量:1
1
作者 王正贤 《军事交通学院学报》 2013年第5期20-24,共5页
在分析比较无线传感器网络的技术优势及发展趋势的基础上,着眼青藏铁路特点和构建军民融合式交通运输动态监控系统的需求,阐述了无线传感器网络技术在青藏铁路军事运输和民用运输动态监控中的具体应用,提出了无线传感器网络的应用模... 在分析比较无线传感器网络的技术优势及发展趋势的基础上,着眼青藏铁路特点和构建军民融合式交通运输动态监控系统的需求,阐述了无线传感器网络技术在青藏铁路军事运输和民用运输动态监控中的具体应用,提出了无线传感器网络的应用模型,为研究和开发基于无线传感器网络的铁路军民融合式交通运输动态监控系统进行了积极探索。 展开更多
关键词 青藏铁路 军民融合 动态监控系统 无线传感器网络模型
下载PDF
无线传感器网络网络模型对比与分析 被引量:2
2
作者 刘海 刘家磊 董莹 《电脑知识与技术》 2021年第1期56-57,共2页
在无线传感器网络中,由于传感器节点本身能量、存储和通信距离的受限,因此如何有效的构建一个高效、节能和健壮的无线数据传输网络已经成为目前物联网领域的一个研究重点和热点。该文对比和分析了目前在无线传感器网络领域最主流的两种... 在无线传感器网络中,由于传感器节点本身能量、存储和通信距离的受限,因此如何有效的构建一个高效、节能和健壮的无线数据传输网络已经成为目前物联网领域的一个研究重点和热点。该文对比和分析了目前在无线传感器网络领域最主流的两种无线网络模型:确定性无线传感器网络模型和概率性无线传感器网络模型,这两种网络模型都是根据无线传感器节点的实际工作过程总结出来的,因此在科学研究和实际应用中都具有十分重要的应用价值。 展开更多
关键词 确定性无线传感器网络模型 概率性无线传感器网络模型 通信距离 递交概率 能耗
下载PDF
基于薄弱点分析的物联网攻击主动防御仿真 被引量:1
3
作者 魏利梅 朱红康 《计算机仿真》 北大核心 2023年第2期438-442,共5页
物联网允许机器和设备之间互相连接,其应用程序不仅可以收集数据,还能够在任何时间、任何地点实现数据传输,因此物联网更易受到黑客攻击,数据的高噪声性也导致安全防御难度较高。为了提高物联网的主动防御能力,提出基于改进降噪算法的... 物联网允许机器和设备之间互相连接,其应用程序不仅可以收集数据,还能够在任何时间、任何地点实现数据传输,因此物联网更易受到黑客攻击,数据的高噪声性也导致安全防御难度较高。为了提高物联网的主动防御能力,提出基于改进降噪算法的物联网攻击主动防御的方法。利用改进降噪算法优化物联网节点,从抗全局截获分析攻击能力、抗拒绝服务攻击能力和抗内部威胁能力三个方面分析物联网的薄弱点。采用基础防御信息和防御模式匹配算法,构建与物联网薄弱点相匹配的无线传感器网络病毒传播模型,实现物联网攻击的主动防御。实验结果显示,提出方法能够在1.6s内完成攻击防御,且对物联网数据的降噪效果显著,以上测试验证了说明研究方法的主动防御效率更高,应用性更优。 展开更多
关键词 改进降噪算法 物联网 安全性分析 无线传感器网络病毒传播模型 主动防御
下载PDF
Two States CBR Modeling of Data Source in Dynamic Traffic Monitoring Sensor Networks 被引量:1
4
作者 罗俊 蒋铃鸽 +2 位作者 何晨 冯宸 郑春雷 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第5期618-622,共5页
Real traffic information was analyzed in the statistical characteristics and approximated as a Gaussian time series. A data source model, called two states constant bit rate (TSCBR), was proposed in dynamic traffic mo... Real traffic information was analyzed in the statistical characteristics and approximated as a Gaussian time series. A data source model, called two states constant bit rate (TSCBR), was proposed in dynamic traffic monitoring sensor networks. Analysis of autocorrelation of the models shows that the proposed TSCBR model matches with the statistical characteristics of real data source closely. To further verify the validity of the TSCBR data source model, the performance metrics of power consumption and network lifetime was studied in the evaluation of sensor media access control (SMAC) algorithm. The simulation results show that compared with traditional data source models, TSCBR model can significantly improve accuracy of the algorithm evaluation. 展开更多
关键词 wireless sensor network (WSN) traffic monitoring data source model AUTOCORRELATION
下载PDF
Dynamic cluster member selection method for multi-target tracking in wireless sensor network 被引量:8
5
作者 蔡自兴 文莎 刘丽珏 《Journal of Central South University》 SCIE EI CAS 2014年第2期636-645,共10页
Multi-target tracking(MTT) is a research hotspot of wireless sensor networks at present.A self-organized dynamic cluster task allocation scheme is used to implement collaborative task allocation for MTT in WSN and a s... Multi-target tracking(MTT) is a research hotspot of wireless sensor networks at present.A self-organized dynamic cluster task allocation scheme is used to implement collaborative task allocation for MTT in WSN and a special cluster member(CM) node selection method is put forward in the scheme.An energy efficiency model was proposed under consideration of both energy consumption and remaining energy balance in the network.A tracking accuracy model based on area-sum principle was also presented through analyzing the localization accuracy of triangulation.Then,the two models mentioned above were combined to establish dynamic cluster member selection model for MTT where a comprehensive performance index function was designed to guide the CM node selection.This selection was fulfilled using genetic algorithm.Simulation results show that this method keeps both energy efficiency and tracking quality in optimal state,and also indicate the validity of genetic algorithm in implementing CM node selection. 展开更多
关键词 wireless sensor networks multi-target tracking collaborative task allocation dynamic cluster comprehensive performance index function
下载PDF
Node scattering manipulation based on trajectory model in wireless sensor network 被引量:2
6
作者 裴智强 徐昌庆 藤劲 《Journal of Central South University》 SCIE EI CAS 2010年第5期991-999,共9页
To deploy sensor nodes over the area of interest,a scheme,named node scattering manipulation,was proposed.It adopted the following method:during node scattering,the initial states of every node,including the velocity ... To deploy sensor nodes over the area of interest,a scheme,named node scattering manipulation,was proposed.It adopted the following method:during node scattering,the initial states of every node,including the velocity and direction,were manipulated so that it would land in a region with a certain probability;every sensor was relocated in order to improve the coverage and connectivity.Simultaneously,to easily analyze the process of scattering sensors,a trajectory model was also proposed.Integrating node scattering manipulation with trajectory model,the node deployment in wireless sensor network was thoroughly renovated,that is,this scheme can scatter sensors.In practice,the scheme was operable compared with the previous achievements.The simulation results demonstrate the superiority and feasibility of the scheme,and also show that the energy consumption for sensors relocation is reduced. 展开更多
关键词 WORK node scattering manipulation trajectory model energy consumption
下载PDF
Research on stateful public key based secure data aggregation model for wireless sensor networks 被引量:2
7
作者 秦丹阳 Jia Shuang +2 位作者 Yang Songxiang Wang Erfu Ding Qun 《High Technology Letters》 EI CAS 2017年第1期38-47,共10页
Data aggregation technology reduces traffic overhead of wireless sensor network and extends effective working time of the network,yet continued operation of wireless sensor networks increases the probability of aggreg... Data aggregation technology reduces traffic overhead of wireless sensor network and extends effective working time of the network,yet continued operation of wireless sensor networks increases the probability of aggregation nodes being captured and probability of aggregated data being tampered.Thus it will seriously affect the security performance of the network. For network security issues,a stateful public key based SDAM( secure data aggregation model) is proposed for wireless sensor networks( WSNs),which employs a new stateful public key encryption to provide efficient end-to-end security. Moreover,the security aggregation model will not impose any bound on the aggregation function property,so as to realize the low cost and high security level at the same time. 展开更多
关键词 wireless sensor networks WSNs) secure data aggregation homomorphic encryp-tion simple power analysis
下载PDF
Energy-Efficient Multi-Mode Clusters Maintenance(M^2CM) for Hierarchical Wireless Sensor Networks
8
作者 Xiangdong Hu Zhulin Liu 《China Communications》 SCIE CSCD 2017年第6期1-12,共12页
How to energy-efficiently maintain the topology of wireless sensor networks(WSNs) is still a difficult problem because of their numerous nodes,highly dynamic nature,varied application scenarios and limited resources.A... How to energy-efficiently maintain the topology of wireless sensor networks(WSNs) is still a difficult problem because of their numerous nodes,highly dynamic nature,varied application scenarios and limited resources.An energy-efficient multi-mode clusters maintenance(M2CM) method is proposed based on localized and event-driven mechanism in this work,which is different from the conventional clusters maintenance model with always periodically re-clustered among the whole network style based on time-trigger for hierarchical WSNs.M2 CM can meet such demands of clusters maintenance as adaptive local maintenance for the damaged clusters according to its changes in time and space field.,the triggers of M2 CM include such events as nodes' residual energy being under the threshold,the load imbalance of cluster head,joining in or exiting from any cluster for new node or disable one,etc.Based on neighboring relationship of the damaged clusters,one can start a single cluster(inner-cluster) maintenance or clusters(inter-cluster) maintenance program to meet diverse demands in the topology management of hierarchical WSNs.The experiment results based on NS2 simulation show that the proposed method can significantly save energy used in maintaining a damaged network,effectively narrow down the influenced area of clusters maintenance,and increase transmitted data and prolong lifetime of network compared to the traditional schemes. 展开更多
关键词 HIERARCHICAL iterative clustering MULTI-MODE EVENT-DRIVEN adaptive ENERGY-EFFICIENT
下载PDF
An Iterative Clustering-Based Localization Algorithm for Wireless Sensor Networks 被引量:1
9
作者 罗海勇 李慧 +1 位作者 赵方 彭金华 《China Communications》 SCIE CSCD 2011年第1期58-64,共7页
In wireless sensor networks,node localization is a fundamental middleware service.In this paper,a robust and accurate localization algorithm is proposed,which uses a novel iterative clustering model to obtain the most... In wireless sensor networks,node localization is a fundamental middleware service.In this paper,a robust and accurate localization algorithm is proposed,which uses a novel iterative clustering model to obtain the most representative intersection points between every two circles and use them to estimate the position of unknown nodes.Simulation results demonstrate that the proposed algorithm outperforms other localization schemes (such as Min-Max,etc.) in accuracy,scalability and gross error tolerance. 展开更多
关键词 wireless sensor network node localization iterative clustering model
下载PDF
AN ACCURATE PREDICTION MODEL FOR COMPUTATIONAL OVERHEADS OF SECURITY MECHANISMS IN WIRELESS SENSOR NETWORKS
10
作者 Liu Wei Luo Rong Yang Huazhong 《Journal of Electronics(China)》 2009年第5期699-705,共7页
In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and ... In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and flexible model to predict overheads of these mechanisms. This model is based on overheads of basic operations frequently used in cryptography algorithms, which are essential elements of security mechanisms. Several popular cryptography algorithms and security mechanisms are evaluated using this model. According to simulation results, relative prediction errors are less than 7% for most cryptography algorithms and security mechanisms. 展开更多
关键词 Wireless Sensor Network (WSN) Cryptography algorithm Security mechanism Computational overhead
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部