Node deployment strategy plays an important role in wireless sensor networks(WSNs)application because it determines the coverage,connectivity and network lifetime of WSNs.This paper reports the current research on the...Node deployment strategy plays an important role in wireless sensor networks(WSNs)application because it determines the coverage,connectivity and network lifetime of WSNs.This paper reports the current research on the optimization means for achieving the desirable design goals in various applications.We categorize the placements strategies into are the static and the dynamic according to whether the node position change after the network is operational.The coverage,connectivity and energy consumption of WSNs are analysed and discussed in detail.展开更多
In hybrid wireless sensor networks composed of both static and mobile sensor nodes, the random deployment of stationary nodes may cause coverage holes in the sensing field. Hence, mobile sensor nodes are added after t...In hybrid wireless sensor networks composed of both static and mobile sensor nodes, the random deployment of stationary nodes may cause coverage holes in the sensing field. Hence, mobile sensor nodes are added after the initial deployment to overcome the coverage holes problem. To achieve optimal coverage, an efficient algorithm should be employed to find the best positions of the additional mobile nodes. This paper presents a genetic algorithm that searches for an optimal or near optimal solution to the coverage holes problem. The proposed algorithm determines the minimum number and the best locations of the mobile nodes that need to be added after the initial deployment of the stationary nodes. The performance of the genetic algorithm was evaluated using several metrics, and the simulation results demonstrated that the proposed algorithm can optimize the network coverage in terms of the overall coverage ratio and the number of additional mobile nodes.展开更多
In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or...In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or cluster member. This causes the cluster or the whole network to be controlled by the malicious nodes. To offer high level of security, the mobile sensor nodes need to be authenticated. Further, clustering of nodes improves scalability, energy efficient routing and data delivery. In this paper, we propose a cluster based secure dynamic keying technique to authenticate the nodes during mobility. The nodes with high configuration are chosen as cluster heads based on the weight value which is estimated using parameters such as the node degree, average distance, node's average speed, and virtual battery power. The keys are dynamically generated and used for providing security. Even the keys are compromised by the attackers, they are not able to use the previous keys to cheat or disuse the authenticated nodes. In addition, a bidirectional malicious node detection technique is employed which eliminates the malicious node from the network. By simulation, it is proved that the proposed technique provides efficient security with reduced energy consumption during node mobility.展开更多
This paper describes the deployment optimization technology and the cross-layer design of a surveil-lance WSN system applied in relic protection.Facing the typical technical challenges in the applicationcontext of rel...This paper describes the deployment optimization technology and the cross-layer design of a surveil-lance WSN system applied in relic protection.Facing the typical technical challenges in the applicationcontext of relic protection,we firstly propose a deployment technology based on ant colony optimization al-gorithm(DT-ACO)to overcome the difficulties in communication connectivity and sensing coverage.Meanwhile,DT-ACO minimizes the overall cost of the system as much as possible.Secondly we proposea novel power-aware cross-layer scheme(PACS)to facilitate adjustable system lifetime and surveillanceaccuracy.The performance analysis shows that we achieve lower device cost,significant extension of thesystem lifetime and improvement on the data delivery rate compared with the traditional methods.展开更多
Sensing coverage and energy consumption are two primary issues in wireless sensor networks. Sensing coverage is closely related to network energy consumption. The performance of a sensor network depends to a large ext...Sensing coverage and energy consumption are two primary issues in wireless sensor networks. Sensing coverage is closely related to network energy consumption. The performance of a sensor network depends to a large extent on the sensing coverage, and its lifetime is determined by its energy consumption. In this paper, an energy-efficient Area Coverage protocol for Heterogeneous Energy sensor networks (ACHE) is proposed. ACHE can achieve a good performance in terms of sensing area coverage, lifetime by minimizing energy consumption for control overhead, and balancing the energy load among all nodes. Adopting the hierarchical clustering idea, ACHE selects the active nodes based on the average residual energy of neighboring nodes and its own residual energy parameters. Our simulation demonstrates that ACHE not only provide the high quality of sensing coverage, but also has the good performance in the energy efficiency. In addition, ACHE can better adapt the applications with the great heterogeneous energy capacities in the sensor networks, as well as effectively reduce the control overhead.展开更多
An improved LEACH for heterogeneous wireless sensor networks is proposed. Nodes are distributed in a sensing area that is divided into a number of same equilateral hexagons. Heterogeneous nodes act as the cluster head...An improved LEACH for heterogeneous wireless sensor networks is proposed. Nodes are distributed in a sensing area that is divided into a number of same equilateral hexagons. Heterogeneous nodes act as the cluster heads and ordinary nodes act as those cluster sensors in all clusters. The structure of WSNs is a two-layer structure. The upper layer consists of all cluster heads and the lower layer consists of all ordinary sensors managed by their corresponding cluster heads. The cluster heads and the ordinary sensors establish their pairwise keys respectively through utilizing different methods. The arithmetic balances energy expense among all kinds of nodes, saves the node energy, and prolongs the life of wireless sensor networks. Additionally, Analysis demonstrates that the security of wireless sensor networks has been improved obviously even with some heterogeneous nodes.展开更多
Heterogeneous wireless sensor network( HWSN) is composed of different functional nodes and is widely applied. With the deployment in hostile environment,the secure problem of HWSN is of great importance; moreover,it b...Heterogeneous wireless sensor network( HWSN) is composed of different functional nodes and is widely applied. With the deployment in hostile environment,the secure problem of HWSN is of great importance; moreover,it becomes complex due to the mutual characteristics of sensor nodes in HWSN. In order to enhance the network security,an asymmetric key pre-distributed management scheme for HWSN is proposed combining with authentication process to further ensure the network security; meanwhile,an effective authentication method for newly added nodes is presented. Simulation result indicates that the proposed scheme can improve the network security while reducing the storage space requirement efficiently.展开更多
Heterogeneous wireless sensor networks(HWSNs)are vulnerable to malware propagation,because of their low configuration and weak defense mechanism.Therefore,an optimality system for HWSNs is developed to suppress malwar...Heterogeneous wireless sensor networks(HWSNs)are vulnerable to malware propagation,because of their low configuration and weak defense mechanism.Therefore,an optimality system for HWSNs is developed to suppress malware propagation in this paper.Firstly,a heterogeneous-susceptible-exposed-infectious-recovered-susceptible(HSEIRS)model is proposed to describe the state dynamics of heterogeneous sensor nodes(HSNs)in HWSNs.Secondly,the existence of an optimal control problem with installing antivirus on HSNs to minimize the sum of the cumulative infection probabilities of HWSNs at a low cost based on the HSEIRS model is proved,and then an optimal control strategy for the problem is derived by the optimal control theory.Thirdly,the optimal control strategy based on the HSEIRS model is transformed into corresponding Hamiltonian by the Pontryagin’s minimum principle,and the corresponding optimality system is derived.Finally,the effectiveness of the optimality system is validated by the experimental simulations,and the results show that the infectious HSNs will fall to an extremely low level at a low cost.展开更多
In wireless sensor networks(WSNs) with single sink,the nodes close to the sink consume their energy too fast due to transferring a large number of data packages,resulting in the "energy hole" problem.Deployi...In wireless sensor networks(WSNs) with single sink,the nodes close to the sink consume their energy too fast due to transferring a large number of data packages,resulting in the "energy hole" problem.Deploying multiple sink nodes in WSNs is an effective strategy to solve this problem.A multi-sink deployment strategy based on improved particle swarm clustering optimization(IPSCO) algorithm for WSNs is proposed in this paper.The IPSCO algorithm is a combination of the improved particle swarm optimization(PSO) algorithm and K-means clustering algorithm.According to the sink nodes number K,the IPSCO algorithm divides the sensor nodes in the whole network area into K clusters based on the distance between them,making the total within-class scatter to minimum,and outputs the center of each cluster.Then,multiple sink nodes in the center of each cluster can be deployed,to achieve the effects of partition network reasonably and deploy multi-sink nodes optimally.The simulation results show that the deployment strategy can prolong the network lifetime.展开更多
In the era of big data,sensor networks have been pervasively deployed,producing a large amount of data for various applications.However,because sensor networks are usually placed in hostile environments,managing the h...In the era of big data,sensor networks have been pervasively deployed,producing a large amount of data for various applications.However,because sensor networks are usually placed in hostile environments,managing the huge volume of data is a very challenging issue.In this study,we mainly focus on the data storage reliability problem in heterogeneous wireless sensor networks where robust storage nodes are deployed in sensor networks and data redundancy is utilized through coding techniques.To minimize data delivery and data storage costs,we design an algorithm to jointly optimize data routing and storage node deployment.The problem can be formulated as a binary nonlinear combinatorial optimization problem,and due to its NP-hardness,designing approximation algorithms is highly nontrivial.By leveraging the Markov approximation framework,we elaborately design an efficient algorithm driven by a continuous-time Markov chain to schedule the deployment of the storage node and corresponding routing strategy.We also perform extensive simulations to verify the efficacy of our algorithm.展开更多
Wireless sensor networks(WSN)can be used in many fields.In wireless sensor networks,sensor nodes transmit data in multi hop mode.The large number of hops required by data transmission will lead to unbalanced energy co...Wireless sensor networks(WSN)can be used in many fields.In wireless sensor networks,sensor nodes transmit data in multi hop mode.The large number of hops required by data transmission will lead to unbalanced energy consumption and large data transmission delay of the whole network,which greatly affects the invulnerability of the network.Therefore,an optimal deployment of heterogeneous nodes(ODHN)algorithm is proposed to enhance the invulnerability of the wireless sensor networks.The algorithm combines the advantages of DEEC(design of distributed energy efficient clustering)clustering algorithm and BAS(beetle antenna search)optimization algorithm to find the globally optimal deployment locations of heterogeneous nodes.Then,establish a shortcut to communicate with sink nodes through heterogeneous nodes.Besides,considering the practical deployment operation,we set the threshold of the mobile location of heterogeneous nodes,which greatly simplifies the deployment difficulty.Simulation results show that compared with traditional routing protocols,the proposed algorithm can make the network load more evenly,and effectively improve energy-utilization and the fault tolerance of the whole network,which can greatly improve the invulnerability of the wireless sensor networks.展开更多
Sensor nodes are mainly shielded in the field with limited power supply. In Wireless Sensor Networks, there must be a requirement of an efficient power management, because sensor nodes are deployed in unman attended a...Sensor nodes are mainly shielded in the field with limited power supply. In Wireless Sensor Networks, there must be a requirement of an efficient power management, because sensor nodes are deployed in unman attended area with non-rechargeable batteries. Power management can be done by different methods of routing protocols. The proposed Reliable Rim Routing (3R) technique is based on hybrid routing protocol for homogeneous and heterogeneous system for WSNs to ameliorate the performance of the overall system. In 3R, total node deployment area can be multipart in terms of rim and in each rim, and some of the sensor nodes transmit their sensed data directly to base station, and meanwhile remaining sensor nodes send the data through clustering technique to base station like SEP. Proposed 3R technique implementation proves its enhanced WSNs lifetime of 70% energy consumption and 40% throughput compared with existing protocols. Simulation and evaluation results outperformed in terms of energy consumption with increased throughput and network lifetime.展开更多
Wireless sensor networks (WSNs) are very important for monitoring underground mine safety. Sensor node deployment affects the performances of WSNs. In our study, a chain-type wireless underground mine sensor network (...Wireless sensor networks (WSNs) are very important for monitoring underground mine safety. Sensor node deployment affects the performances of WSNs. In our study, a chain-type wireless underground mine sensor network (CWUMSN) is first pre- sented. A CWUMSN can monitor the environment and locate miners in underground mines. The lowest density deployment strate- gies of cluster head nodes are discussed theoretically. We prove that the lifetime of CWUMSN with a non-uniform deployment strategy is longer than with a uniform deployment strategy. Secondly, we present the algorithm of non-uniform lowest density de- ployment of cluster head nodes. Next, we propose a dynamic choice algorithm of cluster head nodes for CWUMSN which can im- prove the adaptability of networks. Our experiments of CWUMSN with both non-uniform lowest density and uniform lowest den- sity deployments are simulated. The results show that the lifetime of CWUMSN with non-uniform lowest density deployment is almost 2.5 times as long as that of the uniform lowest density deployment. This work provides a new deployment strategy for wire- less underground mine sensor networks and then effectively promotes the application of wireless sensor networks to underground mines.展开更多
A complete study for the implementation of wireless sensor networks in the intelligent building is presented. We carry out some experiments to find out the factors affecting the network performance. Several vital para...A complete study for the implementation of wireless sensor networks in the intelligent building is presented. We carry out some experiments to find out the factors affecting the network performance. Several vital parameters which are related to the link quality are measured before deploying the actual system. And then, we propose an optimized routing protocol based on the analysis of the test data. We evaluate the deployment strategies to ensure the excellent performance of the wireless sensor networks under the real working conditions. And the evaluation results show that the presented system could satisfy the requirements of the applications in the intelligent building.展开更多
Physical Unclonable Functions(PUFs)can be seen as kind of hardware one-way functions,who are easily fabricated but difficult to clone,duplicate or predict.Therefore,PUFs with unclonable and unpredictable properties ar...Physical Unclonable Functions(PUFs)can be seen as kind of hardware one-way functions,who are easily fabricated but difficult to clone,duplicate or predict.Therefore,PUFs with unclonable and unpredictable properties are welcome to be applied in designing lightweight cryptography protocols.In this paper,a Basic Key Distribution Scheme(Basic-KDS)based on PUFs is firstly proposed.Then,by employing different deployment modes,a Random Deployment Key Distribution Scheme(RD-KDS)and a Grouping Deployment Key Distribution Scheme(GD-KDS)are further proposed based on the Basic-KDS for large scale wireless sensor networks.In our proposals,a sensor is not pre-distributed with any keys but will generate one by the embedded PUF when receiving a challenge from the gateway,which provides perfect resilience against sensor capture attacks.Besides,the unclonable and unpredictable properties of PUF guarantee the key uniqueness and two-way authentication.Analysis and experiment results show that our proposals have better performances in improving the resilience,secure-connectivity,and efficiency as compared to other schemes.展开更多
A Monte Carlo Analysis of nodes deployment for large-scale and non-homogeneous wireless sensor networks, has been done. Through simulations of random deployments of nodes over a square area using different densities, ...A Monte Carlo Analysis of nodes deployment for large-scale and non-homogeneous wireless sensor networks, has been done. Through simulations of random deployments of nodes over a square area using different densities, assuming that our network is composed by Anchor nodes (special sensors with known position) and simple Sensor nodes, the latter are supposed to estimate their own position after being placed within the coverage area with the minimum Anchor nodes needed to 'feed' them with the necessary information. The goal is then to assist decision-makers in selecting among different alternatives to deploy the networks, according to resources features and availability, hence this method provides an estimate value of how many Anchor nodes should be deployed in a given area to trigger the location algorithm in the greatest possible number of Sensor nodes in the network.展开更多
The most important problem in the security of wireless sensor network (WSN) is to distribute keys for the sensor nodes and to establish a secure channel in an insecure environment. Since the sensor node has limited re...The most important problem in the security of wireless sensor network (WSN) is to distribute keys for the sensor nodes and to establish a secure channel in an insecure environment. Since the sensor node has limited resources, for instance, low battery life and low computational power, the key distribution scheme must be designed in an efficient manner. Recently many studies added a few high-level nodes into the network, called the heterogeneous sensor network (HSN). Most of these studies considered an application for two-level HSN instead of multi-level one. In this paper, we propose some definitions for multi-level HSN, and design a novel key management strategy based on the polynomial hash tree (PHT) method by using deployment knowledge. Our proposed strategy has lower computation and communication overheads but higher connectivity and resilience.展开更多
A heterogeneous wireless sensor network comprises a number of inexpensive energy constrained wireless sensor nodes which collect data from the sensing environment and transmit them toward the improved cluster head in ...A heterogeneous wireless sensor network comprises a number of inexpensive energy constrained wireless sensor nodes which collect data from the sensing environment and transmit them toward the improved cluster head in a coordinated way. Employing clustering techniques in such networks can achieve balanced energy consumption of member nodes and prolong the network lifetimes.In classical clustering techniques, clustering and in-cluster data routes are usually separated into independent operations. Although separate considerations of these two issues simplify the system design, it is often the non-optimal lifetime expectancy for wireless sensor networks. This paper proposes an integral framework that integrates these two correlated items in an interactive entirety. For that,we develop the clustering problems using nonlinear programming. Evolution process of clustering is provided in simulations. Results show that our joint-design proposal reaches the near optimal match between member nodes and cluster heads.展开更多
Recent development in sensor technologies makes wireless sensor networks (WSN) very popular in the last few years. A limitation of most popular sensors is that sensor nodes have a limited battery capacity that leads t...Recent development in sensor technologies makes wireless sensor networks (WSN) very popular in the last few years. A limitation of most popular sensors is that sensor nodes have a limited battery capacity that leads to lower the lifetime of WSN. For that, it raises the need to develop energy efficient solutions to keep WSN functioning for the longest period of time. Due to the fact that most of the nodes energy is spent on data transmission, many routing techniques in the literature have been proposed to expand the network lifetime such as the Online Maximum Lifetime heuristics (OML) and capacity maximization (CMAX). In this paper, we introduce an efficient priority based routing power management heuristic in order to increase both coverage and extend lifetime by managing the power at the sensor level. We accomplished that by setting priority metric in addition to dividing the node energy into two ratios;one for the sensor node originated data and the other part is for data relays from other sensors. This heuristic, which is called pERPMT (priority Efficient Routing Power Management Technique), has been applied to two well know routing techniques. Results from running extensive simulation runs revealed the superiority of the new methodology pERPMT over existing heuristics. The pEPRMT increases the lifetime up to 77% and 54% when compared to OML and CMAX respectively.展开更多
基金National Natural Science Foundation of China(No.61071087)Natural Science Foundation of Shandong Province(No.ZR2011FM018)
文摘Node deployment strategy plays an important role in wireless sensor networks(WSNs)application because it determines the coverage,connectivity and network lifetime of WSNs.This paper reports the current research on the optimization means for achieving the desirable design goals in various applications.We categorize the placements strategies into are the static and the dynamic according to whether the node position change after the network is operational.The coverage,connectivity and energy consumption of WSNs are analysed and discussed in detail.
文摘In hybrid wireless sensor networks composed of both static and mobile sensor nodes, the random deployment of stationary nodes may cause coverage holes in the sensing field. Hence, mobile sensor nodes are added after the initial deployment to overcome the coverage holes problem. To achieve optimal coverage, an efficient algorithm should be employed to find the best positions of the additional mobile nodes. This paper presents a genetic algorithm that searches for an optimal or near optimal solution to the coverage holes problem. The proposed algorithm determines the minimum number and the best locations of the mobile nodes that need to be added after the initial deployment of the stationary nodes. The performance of the genetic algorithm was evaluated using several metrics, and the simulation results demonstrated that the proposed algorithm can optimize the network coverage in terms of the overall coverage ratio and the number of additional mobile nodes.
文摘In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or cluster member. This causes the cluster or the whole network to be controlled by the malicious nodes. To offer high level of security, the mobile sensor nodes need to be authenticated. Further, clustering of nodes improves scalability, energy efficient routing and data delivery. In this paper, we propose a cluster based secure dynamic keying technique to authenticate the nodes during mobility. The nodes with high configuration are chosen as cluster heads based on the weight value which is estimated using parameters such as the node degree, average distance, node's average speed, and virtual battery power. The keys are dynamically generated and used for providing security. Even the keys are compromised by the attackers, they are not able to use the previous keys to cheat or disuse the authenticated nodes. In addition, a bidirectional malicious node detection technique is employed which eliminates the malicious node from the network. By simulation, it is proved that the proposed technique provides efficient security with reduced energy consumption during node mobility.
基金Supported by the National High Technology Research and Development Programme of China ( No. 2006AA01Z215)the National Natural Science Foundation of China (No. 60572060+2 种基金 60533110)the National Basic Research Program of China (973)( No. 2006CB303000)the CAS Innovation Proiect (No. KGCX2-YW-110-3)
文摘This paper describes the deployment optimization technology and the cross-layer design of a surveil-lance WSN system applied in relic protection.Facing the typical technical challenges in the applicationcontext of relic protection,we firstly propose a deployment technology based on ant colony optimization al-gorithm(DT-ACO)to overcome the difficulties in communication connectivity and sensing coverage.Meanwhile,DT-ACO minimizes the overall cost of the system as much as possible.Secondly we proposea novel power-aware cross-layer scheme(PACS)to facilitate adjustable system lifetime and surveillanceaccuracy.The performance analysis shows that we achieve lower device cost,significant extension of thesystem lifetime and improvement on the data delivery rate compared with the traditional methods.
文摘Sensing coverage and energy consumption are two primary issues in wireless sensor networks. Sensing coverage is closely related to network energy consumption. The performance of a sensor network depends to a large extent on the sensing coverage, and its lifetime is determined by its energy consumption. In this paper, an energy-efficient Area Coverage protocol for Heterogeneous Energy sensor networks (ACHE) is proposed. ACHE can achieve a good performance in terms of sensing area coverage, lifetime by minimizing energy consumption for control overhead, and balancing the energy load among all nodes. Adopting the hierarchical clustering idea, ACHE selects the active nodes based on the average residual energy of neighboring nodes and its own residual energy parameters. Our simulation demonstrates that ACHE not only provide the high quality of sensing coverage, but also has the good performance in the energy efficiency. In addition, ACHE can better adapt the applications with the great heterogeneous energy capacities in the sensor networks, as well as effectively reduce the control overhead.
文摘An improved LEACH for heterogeneous wireless sensor networks is proposed. Nodes are distributed in a sensing area that is divided into a number of same equilateral hexagons. Heterogeneous nodes act as the cluster heads and ordinary nodes act as those cluster sensors in all clusters. The structure of WSNs is a two-layer structure. The upper layer consists of all cluster heads and the lower layer consists of all ordinary sensors managed by their corresponding cluster heads. The cluster heads and the ordinary sensors establish their pairwise keys respectively through utilizing different methods. The arithmetic balances energy expense among all kinds of nodes, saves the node energy, and prolongs the life of wireless sensor networks. Additionally, Analysis demonstrates that the security of wireless sensor networks has been improved obviously even with some heterogeneous nodes.
基金Support by the National High Technology Research and Development Program of China(No.2012AA120802)National Natural Science Foundation of China(No.61771186)+2 种基金Postdoctoral Research Project of Heilongjiang Province(No.LBH-Q15121)University Nursing Program for Young Scholars with Creative Talents in Heilongjiang Province(No.UNPYSCT-2017125)Postgraduate Innovation Research Project of Heilongjiang University(No.YJSCX2018-051HLJU)
文摘Heterogeneous wireless sensor network( HWSN) is composed of different functional nodes and is widely applied. With the deployment in hostile environment,the secure problem of HWSN is of great importance; moreover,it becomes complex due to the mutual characteristics of sensor nodes in HWSN. In order to enhance the network security,an asymmetric key pre-distributed management scheme for HWSN is proposed combining with authentication process to further ensure the network security; meanwhile,an effective authentication method for newly added nodes is presented. Simulation result indicates that the proposed scheme can improve the network security while reducing the storage space requirement efficiently.
基金National Natural Science Foundation of China(No.61772018)Zhejiang Provincial Natural Science Foundation of China(No.LZ22F020002)。
文摘Heterogeneous wireless sensor networks(HWSNs)are vulnerable to malware propagation,because of their low configuration and weak defense mechanism.Therefore,an optimality system for HWSNs is developed to suppress malware propagation in this paper.Firstly,a heterogeneous-susceptible-exposed-infectious-recovered-susceptible(HSEIRS)model is proposed to describe the state dynamics of heterogeneous sensor nodes(HSNs)in HWSNs.Secondly,the existence of an optimal control problem with installing antivirus on HSNs to minimize the sum of the cumulative infection probabilities of HWSNs at a low cost based on the HSEIRS model is proved,and then an optimal control strategy for the problem is derived by the optimal control theory.Thirdly,the optimal control strategy based on the HSEIRS model is transformed into corresponding Hamiltonian by the Pontryagin’s minimum principle,and the corresponding optimality system is derived.Finally,the effectiveness of the optimality system is validated by the experimental simulations,and the results show that the infectious HSNs will fall to an extremely low level at a low cost.
基金the Key Project of the National Natural Science Foundation of China(No.61134009)National Natural Science Foundations of China(Nos.61473077,61473078)+4 种基金Program for Changjiang Scholars from the Ministry of Education,ChinaSpecialized Research Fund for Shanghai Leading Talents,ChinaProject of the Shanghai Committee of Science and Technology,China(No.13JC1407500)Innovation Program of Shanghai Municipal Education Commission,China(No.14ZZ067)the Fundamental Research Funds for the Central Universities,China(No.15D110423)
文摘In wireless sensor networks(WSNs) with single sink,the nodes close to the sink consume their energy too fast due to transferring a large number of data packages,resulting in the "energy hole" problem.Deploying multiple sink nodes in WSNs is an effective strategy to solve this problem.A multi-sink deployment strategy based on improved particle swarm clustering optimization(IPSCO) algorithm for WSNs is proposed in this paper.The IPSCO algorithm is a combination of the improved particle swarm optimization(PSO) algorithm and K-means clustering algorithm.According to the sink nodes number K,the IPSCO algorithm divides the sensor nodes in the whole network area into K clusters based on the distance between them,making the total within-class scatter to minimum,and outputs the center of each cluster.Then,multiple sink nodes in the center of each cluster can be deployed,to achieve the effects of partition network reasonably and deploy multi-sink nodes optimally.The simulation results show that the deployment strategy can prolong the network lifetime.
基金supported by National Natural Science Foundation of China(61304256)Zhejiang Provincial Natural Science Foundation of China(LQ13F030013)+4 种基金Project of the Education Department of Zhejiang Province(Y201327006)Young Researchers Foundation of Zhejiang Provincial Top Key Academic Discipline of Mechanical Engineering and Zhejiang Sci-Tech University Key Laboratory(ZSTUME01B15)New Century 151 Talent Project of Zhejiang Province521 Talent Project of Zhejiang Sci-Tech UniversityYoung and Middle-aged Talents Foundation of Zhejiang Provincial Top Key Academic Discipline of Mechanical Engineering
基金partially supported by the Shandong Provincial Natural Science Foundation(No.ZR2017QF005)the National Natural Science Foundation of China(Nos.61702304,61971269,61832012,61602195,61672321,61771289,and 61602269)the China Postdoctoral Science Foundation(No.2017M622136)。
文摘In the era of big data,sensor networks have been pervasively deployed,producing a large amount of data for various applications.However,because sensor networks are usually placed in hostile environments,managing the huge volume of data is a very challenging issue.In this study,we mainly focus on the data storage reliability problem in heterogeneous wireless sensor networks where robust storage nodes are deployed in sensor networks and data redundancy is utilized through coding techniques.To minimize data delivery and data storage costs,we design an algorithm to jointly optimize data routing and storage node deployment.The problem can be formulated as a binary nonlinear combinatorial optimization problem,and due to its NP-hardness,designing approximation algorithms is highly nontrivial.By leveraging the Markov approximation framework,we elaborately design an efficient algorithm driven by a continuous-time Markov chain to schedule the deployment of the storage node and corresponding routing strategy.We also perform extensive simulations to verify the efficacy of our algorithm.
基金This research was funded by the National Natural Science Foundation of China,No.61802010Hundred-Thousand-Ten Thousand Talents Project of Beijing No.2020A28+1 种基金National Social Science Fund of China,No.19BGL184Beijing Excellent Talent Training Support Project for Young Top-Notch Team No.2018000026833TD01.
文摘Wireless sensor networks(WSN)can be used in many fields.In wireless sensor networks,sensor nodes transmit data in multi hop mode.The large number of hops required by data transmission will lead to unbalanced energy consumption and large data transmission delay of the whole network,which greatly affects the invulnerability of the network.Therefore,an optimal deployment of heterogeneous nodes(ODHN)algorithm is proposed to enhance the invulnerability of the wireless sensor networks.The algorithm combines the advantages of DEEC(design of distributed energy efficient clustering)clustering algorithm and BAS(beetle antenna search)optimization algorithm to find the globally optimal deployment locations of heterogeneous nodes.Then,establish a shortcut to communicate with sink nodes through heterogeneous nodes.Besides,considering the practical deployment operation,we set the threshold of the mobile location of heterogeneous nodes,which greatly simplifies the deployment difficulty.Simulation results show that compared with traditional routing protocols,the proposed algorithm can make the network load more evenly,and effectively improve energy-utilization and the fault tolerance of the whole network,which can greatly improve the invulnerability of the wireless sensor networks.
文摘Sensor nodes are mainly shielded in the field with limited power supply. In Wireless Sensor Networks, there must be a requirement of an efficient power management, because sensor nodes are deployed in unman attended area with non-rechargeable batteries. Power management can be done by different methods of routing protocols. The proposed Reliable Rim Routing (3R) technique is based on hybrid routing protocol for homogeneous and heterogeneous system for WSNs to ameliorate the performance of the overall system. In 3R, total node deployment area can be multipart in terms of rim and in each rim, and some of the sensor nodes transmit their sensed data directly to base station, and meanwhile remaining sensor nodes send the data through clustering technique to base station like SEP. Proposed 3R technique implementation proves its enhanced WSNs lifetime of 70% energy consumption and 40% throughput compared with existing protocols. Simulation and evaluation results outperformed in terms of energy consumption with increased throughput and network lifetime.
基金Project 20070411065 supported by the China Postdoctoral Science Foundation
文摘Wireless sensor networks (WSNs) are very important for monitoring underground mine safety. Sensor node deployment affects the performances of WSNs. In our study, a chain-type wireless underground mine sensor network (CWUMSN) is first pre- sented. A CWUMSN can monitor the environment and locate miners in underground mines. The lowest density deployment strate- gies of cluster head nodes are discussed theoretically. We prove that the lifetime of CWUMSN with a non-uniform deployment strategy is longer than with a uniform deployment strategy. Secondly, we present the algorithm of non-uniform lowest density de- ployment of cluster head nodes. Next, we propose a dynamic choice algorithm of cluster head nodes for CWUMSN which can im- prove the adaptability of networks. Our experiments of CWUMSN with both non-uniform lowest density and uniform lowest den- sity deployments are simulated. The results show that the lifetime of CWUMSN with non-uniform lowest density deployment is almost 2.5 times as long as that of the uniform lowest density deployment. This work provides a new deployment strategy for wire- less underground mine sensor networks and then effectively promotes the application of wireless sensor networks to underground mines.
基金supported by National Natural Science Foundation of China under Grant No.60802016, 60972010by China Next Generation Internet (CNGI) project under Grant No.CNGI-09-03-05
文摘A complete study for the implementation of wireless sensor networks in the intelligent building is presented. We carry out some experiments to find out the factors affecting the network performance. Several vital parameters which are related to the link quality are measured before deploying the actual system. And then, we propose an optimized routing protocol based on the analysis of the test data. We evaluate the deployment strategies to ensure the excellent performance of the wireless sensor networks under the real working conditions. And the evaluation results show that the presented system could satisfy the requirements of the applications in the intelligent building.
基金This work is supported by the National Natural Science Foundation of China(under grant 61902163)the Natural Science Foundation of the Jiangsu Higher Education Institutions of China(under grant 17KJD520003,19KJB520033)the Research Startup Foundation of Jinling Institute of Technology(under grant JIT-B-201639,JIT-B-201726,JIT-B-202001).
文摘Physical Unclonable Functions(PUFs)can be seen as kind of hardware one-way functions,who are easily fabricated but difficult to clone,duplicate or predict.Therefore,PUFs with unclonable and unpredictable properties are welcome to be applied in designing lightweight cryptography protocols.In this paper,a Basic Key Distribution Scheme(Basic-KDS)based on PUFs is firstly proposed.Then,by employing different deployment modes,a Random Deployment Key Distribution Scheme(RD-KDS)and a Grouping Deployment Key Distribution Scheme(GD-KDS)are further proposed based on the Basic-KDS for large scale wireless sensor networks.In our proposals,a sensor is not pre-distributed with any keys but will generate one by the embedded PUF when receiving a challenge from the gateway,which provides perfect resilience against sensor capture attacks.Besides,the unclonable and unpredictable properties of PUF guarantee the key uniqueness and two-way authentication.Analysis and experiment results show that our proposals have better performances in improving the resilience,secure-connectivity,and efficiency as compared to other schemes.
文摘A Monte Carlo Analysis of nodes deployment for large-scale and non-homogeneous wireless sensor networks, has been done. Through simulations of random deployments of nodes over a square area using different densities, assuming that our network is composed by Anchor nodes (special sensors with known position) and simple Sensor nodes, the latter are supposed to estimate their own position after being placed within the coverage area with the minimum Anchor nodes needed to 'feed' them with the necessary information. The goal is then to assist decision-makers in selecting among different alternatives to deploy the networks, according to resources features and availability, hence this method provides an estimate value of how many Anchor nodes should be deployed in a given area to trigger the location algorithm in the greatest possible number of Sensor nodes in the network.
文摘The most important problem in the security of wireless sensor network (WSN) is to distribute keys for the sensor nodes and to establish a secure channel in an insecure environment. Since the sensor node has limited resources, for instance, low battery life and low computational power, the key distribution scheme must be designed in an efficient manner. Recently many studies added a few high-level nodes into the network, called the heterogeneous sensor network (HSN). Most of these studies considered an application for two-level HSN instead of multi-level one. In this paper, we propose some definitions for multi-level HSN, and design a novel key management strategy based on the polynomial hash tree (PHT) method by using deployment knowledge. Our proposed strategy has lower computation and communication overheads but higher connectivity and resilience.
基金supported by National Natural Science Foundation of China(Nos.61304131 and 61402147)Grant of China Scholarship Council(No.201608130174)+2 种基金Natural Science Foundation of Hebei Province(Nos.F2016402054 and F2014402075)the Scientific Research Plan Projects of Hebei Education Department(Nos.BJ2014019,ZD2015087 and QN2015046)the Research Program of Talent Cultivation Project in Hebei Province(No.A2016002023)
文摘A heterogeneous wireless sensor network comprises a number of inexpensive energy constrained wireless sensor nodes which collect data from the sensing environment and transmit them toward the improved cluster head in a coordinated way. Employing clustering techniques in such networks can achieve balanced energy consumption of member nodes and prolong the network lifetimes.In classical clustering techniques, clustering and in-cluster data routes are usually separated into independent operations. Although separate considerations of these two issues simplify the system design, it is often the non-optimal lifetime expectancy for wireless sensor networks. This paper proposes an integral framework that integrates these two correlated items in an interactive entirety. For that,we develop the clustering problems using nonlinear programming. Evolution process of clustering is provided in simulations. Results show that our joint-design proposal reaches the near optimal match between member nodes and cluster heads.
文摘Recent development in sensor technologies makes wireless sensor networks (WSN) very popular in the last few years. A limitation of most popular sensors is that sensor nodes have a limited battery capacity that leads to lower the lifetime of WSN. For that, it raises the need to develop energy efficient solutions to keep WSN functioning for the longest period of time. Due to the fact that most of the nodes energy is spent on data transmission, many routing techniques in the literature have been proposed to expand the network lifetime such as the Online Maximum Lifetime heuristics (OML) and capacity maximization (CMAX). In this paper, we introduce an efficient priority based routing power management heuristic in order to increase both coverage and extend lifetime by managing the power at the sensor level. We accomplished that by setting priority metric in addition to dividing the node energy into two ratios;one for the sensor node originated data and the other part is for data relays from other sensors. This heuristic, which is called pERPMT (priority Efficient Routing Power Management Technique), has been applied to two well know routing techniques. Results from running extensive simulation runs revealed the superiority of the new methodology pERPMT over existing heuristics. The pEPRMT increases the lifetime up to 77% and 54% when compared to OML and CMAX respectively.