In this paper, an optimized rmlicious nodes detection algorithm, based on Weighted Confidence Filter (WCF), is proposed to protect sensor networks from attacks. In this algorithm, each cluster head in a cluster-base...In this paper, an optimized rmlicious nodes detection algorithm, based on Weighted Confidence Filter (WCF), is proposed to protect sensor networks from attacks. In this algorithm, each cluster head in a cluster-based hierarchical network figures out an average confidence degree by means of messages from its child nodes. The cluster head only accepts a message from the child node whose confidence degree is higher than the average. Meanwhile, it updates the confidence degrees for each of its child nodes by comparing the aggregation value and the received messages, and regards them as the weight of exactness of messages from nodes. A sensor node is judged to be rmlicious if its weight value is lower than the predefined threshold. Comparative simulation results verify that the proposed WCF algorithm is better than the Weighted Trust Evaluation (WTE) in terms of the detection ratio and the false alarm ratio. More specifically, with the WCF, the detection ratio is significantly improved and the false alarm ratio is observably reduced, especially when the malicious node ratio is 0.25 or greater. When 40% of 100 sensors are malicious, the detection accuracy is above 90% and the false alarm ratio is nearly only 1.8%.展开更多
A fuzzy neural network (FNN) model is developed to predict the 4-CBA concentration of the oxidation unit in purified terephthalic acid process. Several technologies are used to deal with the process data before modeli...A fuzzy neural network (FNN) model is developed to predict the 4-CBA concentration of the oxidation unit in purified terephthalic acid process. Several technologies are used to deal with the process data before modeling.First,a set of preliminary input variables is selected according to prior knowledge and experience. Secondly,a method based on the maximum correlation coefficient is proposed to detect the dead time between the process variables and response variables. Finally, the fuzzy curve method is used to reduce the unimportant input variables.The simulation results based on industrial data show that the relative error range of the FNN model is narrower than that of the American Oil Company (AMOCO) model. Furthermore, the FNN model can predict the trend of the 4-CBA concentration more accurately.展开更多
Target tracking in wireless sensor network usually schedules a subset of sensor nodes to constitute a tasking cluster to collaboratively track a target.For the goals of saving energy consumption,prolonging network lif...Target tracking in wireless sensor network usually schedules a subset of sensor nodes to constitute a tasking cluster to collaboratively track a target.For the goals of saving energy consumption,prolonging network lifetime and improving tracking accuracy,sensor node scheduling for target tracking is indeed a multi-objective optimization problem.In this paper,a multi-objective optimization sensor node scheduling algorithm is proposed.It employs the unscented Kalman filtering algorithm for target state estimation and establishes tracking accuracy index,predicts the energy consumption of candidate sensor nodes,analyzes the relationship between network lifetime and remaining energy balance so as to construct energy efficiency index.Simulation results show that,compared with the existing sensor node scheduling,our proposed algorithm can achieve superior tracking accuracy and energy efficiency.展开更多
The optimization of network performance in a movement-assisted data gathering scheme was studied by analyzing the energy consumption of wireless sensor network with node uniform distribution. A theoretically analytica...The optimization of network performance in a movement-assisted data gathering scheme was studied by analyzing the energy consumption of wireless sensor network with node uniform distribution. A theoretically analytical method for avoiding energy hole was proposed. It is proved that if the densities of sensor nodes working at the same time are alternate between dormancy and work with non-uniform node distribution. The efficiency of network can increase by several times and the residual energy of network is nearly zero when the network lifetime ends.展开更多
In this paper, a sensing model for the coverage analysis of wireless sensor networks is provided. Using this model and Monte Carlo method, the ratio of private range to sensing range required to obtain the desired cov...In this paper, a sensing model for the coverage analysis of wireless sensor networks is provided. Using this model and Monte Carlo method, the ratio of private range to sensing range required to obtain the desired coverage can be derived considering the scale of deployment area and the number of sensor nodes. Base on the coverage analysis, an energy-efficient distributed node scheduling scheme is proposed to prolong the network lifetime while maintaining the desired sensing coverage, which does not need the geographic or neighbor information of nodes. The proposed scheme can also handle uneven distribution, and it is robust against node failures. Theoretical and simulation results demonstrate its efficiency and usefulness.展开更多
When using traditional game methods to study information security of the wireless sensor networks,players are mostly based on the assumption of completely rational.Based on bounded rationality,the evolutionary game th...When using traditional game methods to study information security of the wireless sensor networks,players are mostly based on the assumption of completely rational.Based on bounded rationality,the evolutionary game theory is used to establish the attack-defense model,analyze the strategy selection process of players,solve the evolutionarily stable strategy and design the optimal strategy selection algorithm.Then,considering the strategy dependence,the incentive and punishment mechanism is introduced to improve the replicator dynamic equation.The simulation results show that the model is reasonable and the algorithm is effective,which provides new theoretical support for the security of wireless sensor networks.展开更多
Recently, the use of ubiquitous sensor network technology has spread vastly. The ubiquitous sensor networks are widely de- ployed in factory auttxnation as they provide effective measuring solution for instruments. Th...Recently, the use of ubiquitous sensor network technology has spread vastly. The ubiquitous sensor networks are widely de- ployed in factory auttxnation as they provide effective measuring solution for instruments. The wired/wireless network module, which provides the interface to connect to the u-sensor network, is needed but there is no perfect standardization about the interface. In this situation, the interface compatibility between measuring instrument can be maintained using the IEEEI451 international standard. In this paper, the Wireless Transducer Interface Mcduie (WTIM) based on IEEE1451.5 was designed. It coxnects to the measuring instnmnt, like the muiti-meter, power meter, and etc., to support the RS232 interface. As these devices cannot connect to network without a mod- ule, we use the WTIM to help these devices connect to network sys- ton. Its ftmction was verified through the ubiquitous network connection and data transfer between monitoring PC and measuring instrument. This technology is expected to reduce cost in order to construct the wireless industry automation system using existing devices.展开更多
Sensor network deployment is the key for sensors to play an important performance. Based on game theory, first, the authors propose a multi-type sensor target allocation method for the autonomous deployment of sensors...Sensor network deployment is the key for sensors to play an important performance. Based on game theory, first, the authors propose a multi-type sensor target allocation method for the autonomous deployment of sensors, considering exploration cost, target detection value, exploration ability and other factors. Then, aiming at the unfavorable environment, e.g., obstacles and enemy interference, the authors design a method to maintain the connectivity of sensor network, under the conditions of effective detection of the targets. Simulation result shows that the proposed deployment strategy can achieve the dynamic optimization deployment under complex conditions.展开更多
Wireless sensor networks consist of hundreds or thousands of sensor nodes that involve numerous restrictions in-cluding computation capability and battery capacity.Topology control is an important issue for achieving ...Wireless sensor networks consist of hundreds or thousands of sensor nodes that involve numerous restrictions in-cluding computation capability and battery capacity.Topology control is an important issue for achieving a balanced placement of sensor nodes.The clustering scheme is a widely known and efficient means of topology control for transmitting information to the base station in two hops.The automatic routing scheme of the self-organizing technique is another critical element of wireless sensor networks.In this paper we propose an optimal algorithm with cluster balance taken into consideration,and compare it with three well known and widely used approaches,i.e.,LEACH,MEER,and VAP-E,in performance evaluation.Experimental results show that the proposed approach increases the overall network lifetime,indicating that the amount of energy required for com-munication to the base station will be reduced for locating an optimal cluster.展开更多
基金Acknowledgements This paper was supported by the National Natural Science Foundation of China under Cant No. 61170219 the Natural Science Foundation Project of CQ CSTC under Grants No. 2009BB2278, No201 1jjA40028 the 2011 Talent Plan of Chongqing Higher Education.
文摘In this paper, an optimized rmlicious nodes detection algorithm, based on Weighted Confidence Filter (WCF), is proposed to protect sensor networks from attacks. In this algorithm, each cluster head in a cluster-based hierarchical network figures out an average confidence degree by means of messages from its child nodes. The cluster head only accepts a message from the child node whose confidence degree is higher than the average. Meanwhile, it updates the confidence degrees for each of its child nodes by comparing the aggregation value and the received messages, and regards them as the weight of exactness of messages from nodes. A sensor node is judged to be rmlicious if its weight value is lower than the predefined threshold. Comparative simulation results verify that the proposed WCF algorithm is better than the Weighted Trust Evaluation (WTE) in terms of the detection ratio and the false alarm ratio. More specifically, with the WCF, the detection ratio is significantly improved and the false alarm ratio is observably reduced, especially when the malicious node ratio is 0.25 or greater. When 40% of 100 sensors are malicious, the detection accuracy is above 90% and the false alarm ratio is nearly only 1.8%.
基金Supported by the National Outstanding Youth Science Foundation of China (No. 60025308).
文摘A fuzzy neural network (FNN) model is developed to predict the 4-CBA concentration of the oxidation unit in purified terephthalic acid process. Several technologies are used to deal with the process data before modeling.First,a set of preliminary input variables is selected according to prior knowledge and experience. Secondly,a method based on the maximum correlation coefficient is proposed to detect the dead time between the process variables and response variables. Finally, the fuzzy curve method is used to reduce the unimportant input variables.The simulation results based on industrial data show that the relative error range of the FNN model is narrower than that of the American Oil Company (AMOCO) model. Furthermore, the FNN model can predict the trend of the 4-CBA concentration more accurately.
基金Supported by the National Natural Science Foundation of China(No.90820302,60805027)the Research Fund for Doctoral Program of Higher Education(No.200805330005)the Academician Foundation of Hunan(No.2009FJ4030)
文摘Target tracking in wireless sensor network usually schedules a subset of sensor nodes to constitute a tasking cluster to collaboratively track a target.For the goals of saving energy consumption,prolonging network lifetime and improving tracking accuracy,sensor node scheduling for target tracking is indeed a multi-objective optimization problem.In this paper,a multi-objective optimization sensor node scheduling algorithm is proposed.It employs the unscented Kalman filtering algorithm for target state estimation and establishes tracking accuracy index,predicts the energy consumption of candidate sensor nodes,analyzes the relationship between network lifetime and remaining energy balance so as to construct energy efficiency index.Simulation results show that,compared with the existing sensor node scheduling,our proposed algorithm can achieve superior tracking accuracy and energy efficiency.
基金Project(60873081)supported by the National Natural Science Foundation of ChinaProject(NCET-10-0787)supported by Program for New Century Excellent Talents in UniversityProject(11JJ1012)supported by the Natural Science Foundation of Hunan Province,China
文摘The optimization of network performance in a movement-assisted data gathering scheme was studied by analyzing the energy consumption of wireless sensor network with node uniform distribution. A theoretically analytical method for avoiding energy hole was proposed. It is proved that if the densities of sensor nodes working at the same time are alternate between dormancy and work with non-uniform node distribution. The efficiency of network can increase by several times and the residual energy of network is nearly zero when the network lifetime ends.
基金Supported by China Scholarship Council(No.201306255014)
文摘In this paper, a sensing model for the coverage analysis of wireless sensor networks is provided. Using this model and Monte Carlo method, the ratio of private range to sensing range required to obtain the desired coverage can be derived considering the scale of deployment area and the number of sensor nodes. Base on the coverage analysis, an energy-efficient distributed node scheduling scheme is proposed to prolong the network lifetime while maintaining the desired sensing coverage, which does not need the geographic or neighbor information of nodes. The proposed scheme can also handle uneven distribution, and it is robust against node failures. Theoretical and simulation results demonstrate its efficiency and usefulness.
基金National Natural Science Foundation of China(No.11461038)Innovation Foundation of Colleges and Universities in Gansu Province(No.2020A-033)。
文摘When using traditional game methods to study information security of the wireless sensor networks,players are mostly based on the assumption of completely rational.Based on bounded rationality,the evolutionary game theory is used to establish the attack-defense model,analyze the strategy selection process of players,solve the evolutionarily stable strategy and design the optimal strategy selection algorithm.Then,considering the strategy dependence,the incentive and punishment mechanism is introduced to improve the replicator dynamic equation.The simulation results show that the model is reasonable and the algorithm is effective,which provides new theoretical support for the security of wireless sensor networks.
基金supported by the GRRC program of Gyeong-gi province:[GRRC Hanyang2009-B01,Building/Home USN Technology for Smart Grid]
文摘Recently, the use of ubiquitous sensor network technology has spread vastly. The ubiquitous sensor networks are widely de- ployed in factory auttxnation as they provide effective measuring solution for instruments. The wired/wireless network module, which provides the interface to connect to the u-sensor network, is needed but there is no perfect standardization about the interface. In this situation, the interface compatibility between measuring instrument can be maintained using the IEEEI451 international standard. In this paper, the Wireless Transducer Interface Mcduie (WTIM) based on IEEE1451.5 was designed. It coxnects to the measuring instnmnt, like the muiti-meter, power meter, and etc., to support the RS232 interface. As these devices cannot connect to network without a mod- ule, we use the WTIM to help these devices connect to network sys- ton. Its ftmction was verified through the ubiquitous network connection and data transfer between monitoring PC and measuring instrument. This technology is expected to reduce cost in order to construct the wireless industry automation system using existing devices.
基金supported by the Foundation for Innovative Research Groups of the National Natural Science Foundation of China under Grant No.61321002the Program for Changjiang Scholars and Innovative Research Team in University under Grant No.IRT1208+1 种基金the Changjiang Scholars Programthe Beijing Outstanding Ph.D. Program Mentor under Grant No.20131000704
文摘Sensor network deployment is the key for sensors to play an important performance. Based on game theory, first, the authors propose a multi-type sensor target allocation method for the autonomous deployment of sensors, considering exploration cost, target detection value, exploration ability and other factors. Then, aiming at the unfavorable environment, e.g., obstacles and enemy interference, the authors design a method to maintain the connectivity of sensor network, under the conditions of effective detection of the targets. Simulation result shows that the proposed deployment strategy can achieve the dynamic optimization deployment under complex conditions.
基金supported by the Chung-Ang University Research Scholarship Grants,Korea
文摘Wireless sensor networks consist of hundreds or thousands of sensor nodes that involve numerous restrictions in-cluding computation capability and battery capacity.Topology control is an important issue for achieving a balanced placement of sensor nodes.The clustering scheme is a widely known and efficient means of topology control for transmitting information to the base station in two hops.The automatic routing scheme of the self-organizing technique is another critical element of wireless sensor networks.In this paper we propose an optimal algorithm with cluster balance taken into consideration,and compare it with three well known and widely used approaches,i.e.,LEACH,MEER,and VAP-E,in performance evaluation.Experimental results show that the proposed approach increases the overall network lifetime,indicating that the amount of energy required for com-munication to the base station will be reduced for locating an optimal cluster.