Real traffic information was analyzed in the statistical characteristics and approximated as a Gaussian time series. A data source model, called two states constant bit rate (TSCBR), was proposed in dynamic traffic mo...Real traffic information was analyzed in the statistical characteristics and approximated as a Gaussian time series. A data source model, called two states constant bit rate (TSCBR), was proposed in dynamic traffic monitoring sensor networks. Analysis of autocorrelation of the models shows that the proposed TSCBR model matches with the statistical characteristics of real data source closely. To further verify the validity of the TSCBR data source model, the performance metrics of power consumption and network lifetime was studied in the evaluation of sensor media access control (SMAC) algorithm. The simulation results show that compared with traditional data source models, TSCBR model can significantly improve accuracy of the algorithm evaluation.展开更多
Multi-target tracking(MTT) is a research hotspot of wireless sensor networks at present.A self-organized dynamic cluster task allocation scheme is used to implement collaborative task allocation for MTT in WSN and a s...Multi-target tracking(MTT) is a research hotspot of wireless sensor networks at present.A self-organized dynamic cluster task allocation scheme is used to implement collaborative task allocation for MTT in WSN and a special cluster member(CM) node selection method is put forward in the scheme.An energy efficiency model was proposed under consideration of both energy consumption and remaining energy balance in the network.A tracking accuracy model based on area-sum principle was also presented through analyzing the localization accuracy of triangulation.Then,the two models mentioned above were combined to establish dynamic cluster member selection model for MTT where a comprehensive performance index function was designed to guide the CM node selection.This selection was fulfilled using genetic algorithm.Simulation results show that this method keeps both energy efficiency and tracking quality in optimal state,and also indicate the validity of genetic algorithm in implementing CM node selection.展开更多
To deploy sensor nodes over the area of interest,a scheme,named node scattering manipulation,was proposed.It adopted the following method:during node scattering,the initial states of every node,including the velocity ...To deploy sensor nodes over the area of interest,a scheme,named node scattering manipulation,was proposed.It adopted the following method:during node scattering,the initial states of every node,including the velocity and direction,were manipulated so that it would land in a region with a certain probability;every sensor was relocated in order to improve the coverage and connectivity.Simultaneously,to easily analyze the process of scattering sensors,a trajectory model was also proposed.Integrating node scattering manipulation with trajectory model,the node deployment in wireless sensor network was thoroughly renovated,that is,this scheme can scatter sensors.In practice,the scheme was operable compared with the previous achievements.The simulation results demonstrate the superiority and feasibility of the scheme,and also show that the energy consumption for sensors relocation is reduced.展开更多
Data aggregation technology reduces traffic overhead of wireless sensor network and extends effective working time of the network,yet continued operation of wireless sensor networks increases the probability of aggreg...Data aggregation technology reduces traffic overhead of wireless sensor network and extends effective working time of the network,yet continued operation of wireless sensor networks increases the probability of aggregation nodes being captured and probability of aggregated data being tampered.Thus it will seriously affect the security performance of the network. For network security issues,a stateful public key based SDAM( secure data aggregation model) is proposed for wireless sensor networks( WSNs),which employs a new stateful public key encryption to provide efficient end-to-end security. Moreover,the security aggregation model will not impose any bound on the aggregation function property,so as to realize the low cost and high security level at the same time.展开更多
How to energy-efficiently maintain the topology of wireless sensor networks(WSNs) is still a difficult problem because of their numerous nodes,highly dynamic nature,varied application scenarios and limited resources.A...How to energy-efficiently maintain the topology of wireless sensor networks(WSNs) is still a difficult problem because of their numerous nodes,highly dynamic nature,varied application scenarios and limited resources.An energy-efficient multi-mode clusters maintenance(M2CM) method is proposed based on localized and event-driven mechanism in this work,which is different from the conventional clusters maintenance model with always periodically re-clustered among the whole network style based on time-trigger for hierarchical WSNs.M2 CM can meet such demands of clusters maintenance as adaptive local maintenance for the damaged clusters according to its changes in time and space field.,the triggers of M2 CM include such events as nodes' residual energy being under the threshold,the load imbalance of cluster head,joining in or exiting from any cluster for new node or disable one,etc.Based on neighboring relationship of the damaged clusters,one can start a single cluster(inner-cluster) maintenance or clusters(inter-cluster) maintenance program to meet diverse demands in the topology management of hierarchical WSNs.The experiment results based on NS2 simulation show that the proposed method can significantly save energy used in maintaining a damaged network,effectively narrow down the influenced area of clusters maintenance,and increase transmitted data and prolong lifetime of network compared to the traditional schemes.展开更多
In wireless sensor networks,node localization is a fundamental middleware service.In this paper,a robust and accurate localization algorithm is proposed,which uses a novel iterative clustering model to obtain the most...In wireless sensor networks,node localization is a fundamental middleware service.In this paper,a robust and accurate localization algorithm is proposed,which uses a novel iterative clustering model to obtain the most representative intersection points between every two circles and use them to estimate the position of unknown nodes.Simulation results demonstrate that the proposed algorithm outperforms other localization schemes (such as Min-Max,etc.) in accuracy,scalability and gross error tolerance.展开更多
In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and ...In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and flexible model to predict overheads of these mechanisms. This model is based on overheads of basic operations frequently used in cryptography algorithms, which are essential elements of security mechanisms. Several popular cryptography algorithms and security mechanisms are evaluated using this model. According to simulation results, relative prediction errors are less than 7% for most cryptography algorithms and security mechanisms.展开更多
基金The National Natural Science Foundation ofChia(No60372076)The Important cienceand Technology Key Item of Shanghai Science and Technology Bureau ( No05dz15004)
文摘Real traffic information was analyzed in the statistical characteristics and approximated as a Gaussian time series. A data source model, called two states constant bit rate (TSCBR), was proposed in dynamic traffic monitoring sensor networks. Analysis of autocorrelation of the models shows that the proposed TSCBR model matches with the statistical characteristics of real data source closely. To further verify the validity of the TSCBR data source model, the performance metrics of power consumption and network lifetime was studied in the evaluation of sensor media access control (SMAC) algorithm. The simulation results show that compared with traditional data source models, TSCBR model can significantly improve accuracy of the algorithm evaluation.
基金Projects(90820302,60805027)supported by the National Natural Science Foundation of ChinaProject(200805330005)supported by the Research Fund for the Doctoral Program of Higher Education,ChinaProject(2009FJ4030)supported by Academician Foundation of Hunan Province,China
文摘Multi-target tracking(MTT) is a research hotspot of wireless sensor networks at present.A self-organized dynamic cluster task allocation scheme is used to implement collaborative task allocation for MTT in WSN and a special cluster member(CM) node selection method is put forward in the scheme.An energy efficiency model was proposed under consideration of both energy consumption and remaining energy balance in the network.A tracking accuracy model based on area-sum principle was also presented through analyzing the localization accuracy of triangulation.Then,the two models mentioned above were combined to establish dynamic cluster member selection model for MTT where a comprehensive performance index function was designed to guide the CM node selection.This selection was fulfilled using genetic algorithm.Simulation results show that this method keeps both energy efficiency and tracking quality in optimal state,and also indicate the validity of genetic algorithm in implementing CM node selection.
基金Project(2007AA01Z224) supported by National High-Tech Research and Development Program of China
文摘To deploy sensor nodes over the area of interest,a scheme,named node scattering manipulation,was proposed.It adopted the following method:during node scattering,the initial states of every node,including the velocity and direction,were manipulated so that it would land in a region with a certain probability;every sensor was relocated in order to improve the coverage and connectivity.Simultaneously,to easily analyze the process of scattering sensors,a trajectory model was also proposed.Integrating node scattering manipulation with trajectory model,the node deployment in wireless sensor network was thoroughly renovated,that is,this scheme can scatter sensors.In practice,the scheme was operable compared with the previous achievements.The simulation results demonstrate the superiority and feasibility of the scheme,and also show that the energy consumption for sensors relocation is reduced.
基金Support by the National High Technology Research and Development Program of China(No.2012AA120802)the National Natural Science Foundation of China(No.61302074)+1 种基金Specialized Research Fund for the Doctoral Program of Higher Education(No.20122301120004)Natural Science Foundation of Heilongjiang Province(No.QC2013C061)
文摘Data aggregation technology reduces traffic overhead of wireless sensor network and extends effective working time of the network,yet continued operation of wireless sensor networks increases the probability of aggregation nodes being captured and probability of aggregated data being tampered.Thus it will seriously affect the security performance of the network. For network security issues,a stateful public key based SDAM( secure data aggregation model) is proposed for wireless sensor networks( WSNs),which employs a new stateful public key encryption to provide efficient end-to-end security. Moreover,the security aggregation model will not impose any bound on the aggregation function property,so as to realize the low cost and high security level at the same time.
基金supported by the National Natural Science Foundation of China(Grant No.61170219)the Joint Research Foundation of the Ministry of Education of the People’s Republic of China and China Mobile(Grant No.MCM20150202)the Science and Technology Project Affiliated to Chongqing Education Commission(KJ1602201)
文摘How to energy-efficiently maintain the topology of wireless sensor networks(WSNs) is still a difficult problem because of their numerous nodes,highly dynamic nature,varied application scenarios and limited resources.An energy-efficient multi-mode clusters maintenance(M2CM) method is proposed based on localized and event-driven mechanism in this work,which is different from the conventional clusters maintenance model with always periodically re-clustered among the whole network style based on time-trigger for hierarchical WSNs.M2 CM can meet such demands of clusters maintenance as adaptive local maintenance for the damaged clusters according to its changes in time and space field.,the triggers of M2 CM include such events as nodes' residual energy being under the threshold,the load imbalance of cluster head,joining in or exiting from any cluster for new node or disable one,etc.Based on neighboring relationship of the damaged clusters,one can start a single cluster(inner-cluster) maintenance or clusters(inter-cluster) maintenance program to meet diverse demands in the topology management of hierarchical WSNs.The experiment results based on NS2 simulation show that the proposed method can significantly save energy used in maintaining a damaged network,effectively narrow down the influenced area of clusters maintenance,and increase transmitted data and prolong lifetime of network compared to the traditional schemes.
基金supported in part by the Key Program of National Natural Science Foundation of China(Grant No.60873244,60973110,61003307)the Beijing Municipal Natural Science Foundation(Grant No.4102059)
文摘In wireless sensor networks,node localization is a fundamental middleware service.In this paper,a robust and accurate localization algorithm is proposed,which uses a novel iterative clustering model to obtain the most representative intersection points between every two circles and use them to estimate the position of unknown nodes.Simulation results demonstrate that the proposed algorithm outperforms other localization schemes (such as Min-Max,etc.) in accuracy,scalability and gross error tolerance.
基金Supported by 863 Project of China (No.2006AA01Z224)
文摘In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and flexible model to predict overheads of these mechanisms. This model is based on overheads of basic operations frequently used in cryptography algorithms, which are essential elements of security mechanisms. Several popular cryptography algorithms and security mechanisms are evaluated using this model. According to simulation results, relative prediction errors are less than 7% for most cryptography algorithms and security mechanisms.