The threat of malware in wireless sensor network has stimulated some activities to model and analyze the malware prevalence.To understand the dynamics of malware propagation in wireless sensor network,we propose a nov...The threat of malware in wireless sensor network has stimulated some activities to model and analyze the malware prevalence.To understand the dynamics of malware propagation in wireless sensor network,we propose a novel epidemic model named as e-SEIR(susceptible-exposed-infectious-recovered)model,which is a set of delayed differential equations,in this paper.The model has taken into account the following two factors:1 Multi-state antivirus measures;2 Temporary immune period.Then,the stability and Hopf bifurcation at the equilibria of linearized model are carefully analyzed by considering the distribution of eigenvalues of characteristic equations.Both mathematical analysis and numerical simulations show that the dynamical features of the proposed model rely on the basic reproduction number R0 and time delayτ.This novel model can help us to better understand and predict the propagation behaviors of malware in wireless sensor networks.展开更多
The networks of wireless sensors provide the ground for a range of applications,including environmental moni-toring and industrial operations.Ensuring the networks can overcome obstacles like power and communication r...The networks of wireless sensors provide the ground for a range of applications,including environmental moni-toring and industrial operations.Ensuring the networks can overcome obstacles like power and communication reliability and sensor coverage is the crux of network optimization.Network infrastructure planning should be focused on increasing performance,and it should be affected by the detailed data about node distribution.This work recommends the creation of each sensor’s specs and radius of influence based on a particular geographical location,which will contribute to better network planning and design.By using the ARIMA model for time series forecasting and the Al-Biruni Earth Radius algorithm for optimization,our approach bridges the gap between successive terrains while seeking the equilibrium between exploration and exploitation.Through implementing adaptive protocols according to varying environments and sensor constraints,our study aspires to improve overall network operation.We compare the Al-Biruni Earth Radius algorithm along with Gray Wolf Optimization,Particle Swarm Optimization,Genetic Algorithms,and Whale Optimization about performance on real-world problems.Being the most efficient in the optimization process,Biruni displays the lowest error rate at 0.00032.The two other statistical techniques,like ANOVA,are also useful in discovering the factors influencing the nature of sensor data and network-specific problems.Due to the multi-faceted support the comprehensive approach promotes,there is a chance to understand the dynamics that affect the optimization outcomes better so decisions about network design can be made.Through delivering better performance and reliability for various in-situ applications,this research leads to a fusion of time series forecasters and a customized optimizer algorithm.展开更多
Energy supply is one of the most critical challenges of wireless sensor networks(WSNs)and industrial wireless sensor networks(IWSNs).While research on coverage optimization problem(COP)centers on the network’s monito...Energy supply is one of the most critical challenges of wireless sensor networks(WSNs)and industrial wireless sensor networks(IWSNs).While research on coverage optimization problem(COP)centers on the network’s monitoring coverage,this research focuses on the power banks’energy supply coverage.The study of 2-D and 3-D spaces is typical in IWSN,with the realistic environment being more complex with obstacles(i.e.,machines).A 3-D surface is the field of interest(FOI)in this work with the established hybrid power bank deployment model for the energy supply COP optimization of IWSN.The hybrid power bank deployment model is highly adaptive and flexible for new or existing plants already using the IWSN system.The model improves the power supply to a more considerable extent with the least number of power bank deployments.The main innovation in this work is the utilization of a more practical surface model with obstacles and training while improving the convergence speed and quality of the heuristic algorithm.An overall probabilistic coverage rate analysis of every point on the FOI is provided,not limiting the scope to target points or areas.Bresenham’s algorithm is extended from 2-D to 3-D surface to enhance the probabilistic covering model for coverage measurement.A dynamic search strategy(DSS)is proposed to modify the artificial bee colony(ABC)and balance the exploration and exploitation ability for better convergence toward eliminating NP-hard deployment problems.Further,the cellular automata(CA)is utilized to enhance the convergence speed.The case study based on two typical FOI in the IWSN shows that the CA scheme effectively speeds up the optimization process.Comparative experiments are conducted on four benchmark functions to validate the effectiveness of the proposed method.The experimental results show that the proposed algorithm outperforms the ABC and gbest-guided ABC(GABC)algorithms.The results show that the proposed energy coverage optimization method based on the hybrid power bank deployment model generates more accurate results than the results obtained by similar algorithms(i.e.,ABC,GABC).The proposed model is,therefore,effective and efficient for optimization in the IWSN.展开更多
Energy consumption is the core issue in wireless sensor networks (WSN). To generate a node energy model that can accurately reveal the energy consumption of sensor nodes is an extremely important part of protocol deve...Energy consumption is the core issue in wireless sensor networks (WSN). To generate a node energy model that can accurately reveal the energy consumption of sensor nodes is an extremely important part of protocol development, system design and performance evaluation in WSNs. In this paper, by studying component energy consumption in different node states and within state transitions, the authors present the energy models of the node core components, including processors, RF modules and sensors. Furthermore, this paper reveals the energy correlations between node components, and then establishes the node energy model based on the event-trigger mechanism. Finally, the authors simulate the energy models of node components and then evaluate the energy consumption of network protocols based on this node energy model. The proposed model can be used to analyze the WSNs energy consumption, to evaluate communication protocols, to deploy nodes and then to construct WSN applications.展开更多
To quick customize and develop intelligent campus internet of things (ICIOT) system more efficiently, in this paper an approach based on runtime model to managing intelligent campus wireless sensor networks is propose...To quick customize and develop intelligent campus internet of things (ICIOT) system more efficiently, in this paper an approach based on runtime model to managing intelligent campus wireless sensor networks is proposed. Firstly, manageability of intelligent campus wireless sensors is abstracted as runtime models which automatically and immediately propagate any observable runtime changes of target resources to corresponding architecture models. Then, a composite model of intelligent campus wireless sensors is constructed through merging their runtime models in order to manage different kinds of devices in a unified way. Finally, a customized model is constructed according to the personalized management requirement and the synchronization between the customized model and the composite model is ensured through model transformation. Thus, all the management tasks can be carried through executing operating programs on the customized model. In the part of the teaching area schools conducted experiments and compared with the traditional method, this method can be more effective management of campus facilities, more energy efficient and orderly, which can reach a 16.7% energy saving.展开更多
Wireless sensor networks (WSNs) are energy-constrained networks. The residual energy real-time monitoring (RERM) is very important for WSNs. Moreover, network model is an important foundation of RERM research at perso...Wireless sensor networks (WSNs) are energy-constrained networks. The residual energy real-time monitoring (RERM) is very important for WSNs. Moreover, network model is an important foundation of RERM research at personal area network (PAN) level. Because RERM is inherently application-oriented, the network model adopted should also be application-oriented. However, many factors of WSNs applications such as link selected probability and ACK mechanism etc. were neglected by current network models. These factors can introduce obvious influence on throughput of WSNs. Then the energy consumption of nodes will be influenced greatly. So these models cannot characterize many real properties of WSNs, and the result of RERM is not consistent with the real-world situation. In this study, these factors neglected by other researchers are taken into account. Furthermore, an application-oriented general network model (AGNM) for RERM is proposed. Based on the AGNM, the dynamic characteristics of WSNs are simulated. The experimental results show that AGNM can approximately characterize the real situation of WSNs. Therefore, the AGNM provides a good foundation for RERM research.展开更多
This paper proposed beta trust model based on energy load balancing combines the recent achievements of the trust models in distributed networks, together with the characteristics of wireless sensor networks. The inte...This paper proposed beta trust model based on energy load balancing combines the recent achievements of the trust models in distributed networks, together with the characteristics of wireless sensor networks. The inter-node trust relation is established after an overall evaluation of node trust value based on the monitor results of the node packets forwarding behavior conducted by inter-node collaboration. Due to the node energy limitation in wireless sensor networks, energy load balancing mechanism is applied to prolong the node survival time. And the redundant routing protocol involves the presented trust model to develop the novel trust routing protocol of beta trust model based on energy load balancing. Simulation performance demonstrates that the beta trust model based on energy load balancing outperforms current schemes in energy consumption.展开更多
We propose an energy-based stochastic model of wireless sensor networks (WSNs) where each sensor node is randomly and alternatively in an active and a sleep mode. We first investigate the sensor model and derive the f...We propose an energy-based stochastic model of wireless sensor networks (WSNs) where each sensor node is randomly and alternatively in an active and a sleep mode. We first investigate the sensor model and derive the formula of the steady-state probability when there are a number of data packets in different sensor modes. We then determine important sensor’s performance measures in terms of energy consumptions, average data delay and throughput. The novelty of this paper is in its development of a stochastic model in WSN with active/sleep feature and the explicit results obtained for above mentioned energy consumption and performance characteristics. These results are expected to be useful as the fundamental results in the theoretical analysis and design of various hybrid WSNs with power mode consideration.展开更多
In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical a...In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks, which has been ignored in previous studies. It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes. The theoretical results are confirmed by numerical simulations.展开更多
The duty cycling process involves turning a radio into an active and dormant state for conserving energy. It is a promising approach for designing routing protocols for a resource-constrained Wireless Sensor Networks ...The duty cycling process involves turning a radio into an active and dormant state for conserving energy. It is a promising approach for designing routing protocols for a resource-constrained Wireless Sensor Networks (WSNs). In the duty cycle-based WSNs, the network lifetime is improved and the network transmission is increased as compared to conventional routing protocols. In this study, the active period of the duty cycle is divided into slots that can minimize the idle listening problem. The slot scheduling technique helps determine the most efficient node that uses the active period. The proposed routing protocol uses the opportunistic concept to minimize the sender waiting problem. Therefore, the forwarder set will be selected according to the node's residual active time and energy. Further, the optimum routing path is selected to achieve the minimum forwarding delay from the source to the destination. Simulation analysis reveals that the proposed routing scheme outperforms existing schemes in terms of the average transmission delay, energy consumption, and network throughput.展开更多
In wireless sensor networks,node localization is a fundamental middleware service.In this paper,a robust and accurate localization algorithm is proposed,which uses a novel iterative clustering model to obtain the most...In wireless sensor networks,node localization is a fundamental middleware service.In this paper,a robust and accurate localization algorithm is proposed,which uses a novel iterative clustering model to obtain the most representative intersection points between every two circles and use them to estimate the position of unknown nodes.Simulation results demonstrate that the proposed algorithm outperforms other localization schemes (such as Min-Max,etc.) in accuracy,scalability and gross error tolerance.展开更多
The co-channel interference(collisions) seriously affect the transmission for the newly deployed wireless sensor networks since there is no structure at that phase.In this paper,the interference of the whole network i...The co-channel interference(collisions) seriously affect the transmission for the newly deployed wireless sensor networks since there is no structure at that phase.In this paper,the interference of the whole network is analyzed based on the SNIR model.The new concept of critical transmitting range is proposed,based on which the transmission theorem is obtained and proved.The results provide the theoretical ground to set up the primary structure of newly deployed networks.展开更多
On the basis of complex network theory, the issues of key nodes in Wireless Sensor Networks (WSN) are discussed. A model expression of sub-network fault in WSN is given at first; subsequently, the concepts of average ...On the basis of complex network theory, the issues of key nodes in Wireless Sensor Networks (WSN) are discussed. A model expression of sub-network fault in WSN is given at first; subsequently, the concepts of average path length and clustering coefficient are introduced. Based on the two concepts, a novel attribute description of key nodes related to sub-networks is proposed. Moreover, in terms of node deployment density and transmission range, the concept of single-point key nodes and generalized key nodes of WSN are defined, and their decision theorems are investigated.展开更多
Irrigation plays a significant role in various agricultural cropping methods deployed in semiarid and arid regions where valuable water applications and managing are considered crucial concerns.Multiple factors such a...Irrigation plays a significant role in various agricultural cropping methods deployed in semiarid and arid regions where valuable water applications and managing are considered crucial concerns.Multiple factors such as weather,soil,water,and crop data need to be considered for irrigation maintenance in an efficient besides uniform manner from multifaceted and different information-based systems.A Multi-Agent System(MAS)has been proposed recently based on diverse agent subsystems with definite objectives for attaining global MAS objective and is deployed on Cloud Computing paradigm capable of gathering information from Wireless Sensor Networks(WSNs)positioned in rice,cotton,cassava crops for knowledge discovery and decision making.The radial basis function network has been used for irrigation prediction.However,in recent work,the security of data has not focused on where intruder involvement might corrupt the data at the time of data transferring to the cloud,which would affect the accuracy of decision making.To handle the above mentioned issues,an efficient method for irrigation prediction is used in this work.The factors considered for decision making are soil moisture,temperature,plant height,root depth.The above-mentioned data will be gathered from the sensors that are attached to the cropfield.Sensed data will be forwarded to the local server,where data encryption will be performed using Adaptive Elliptic Curve Cryptography(AECC).After the encryption process,the data will be forwarded to the cloud.Then the data stored in the cloud will be decrypted key before being given to the deci-sion-making module.Finally,the uniform distribution-based fuzzy neural network is formulated based on the received data information in the decisionmaking module.Thefinal decision regarding the level of water required for cropfields would be taken.Based on this outcome,the water volve opening duration and the level of fertilizers required will be considered.Experimental results demonstrate the effectiveness of the proposed model for the United States Geological Survey(USGS)database in terms of precision,accuracy,recall,and packet delivery ratio.展开更多
The Wireless Sensor Networks(WSN)are vulnerable to assaults due to the fact that the devices connected to them have a reliable connection to the inter-net.A malicious node acts as the controller and uses a grey hole a...The Wireless Sensor Networks(WSN)are vulnerable to assaults due to the fact that the devices connected to them have a reliable connection to the inter-net.A malicious node acts as the controller and uses a grey hole attack to get the data from all of the other nodes in the network.Additionally,the nodes are dis-carding and modifying the data packets according to the requirements of the sys-tem.The assault modifies the fundamental concept of the WSNs,which is that different devices should communicate with one another.In the proposed system,there is a fuzzy idea offered for the purpose of preventing the grey hole attack from making effective communication among the WSN devices.The currently available model is unable to recognise the myriad of different kinds of attacks.The fuzzy engine identified suspicious actions by utilising the rules that were gen-erated to make a prediction about the malicious node that would halt the process.Experiments conducted using simulation are used to determine delay,accuracy,energy consumption,throughput,and the ratio of packets successfully delivered.It stands in contrast to the model that was suggested,as well as the methodologies that are currently being used,and analogue behavioural modelling.In comparison to the existing method,the proposed model achieves an accuracy rate of 45 per-cent,a packet delivery ratio of 79 percent,and a reduction in energy usage of around 35.6 percent.These results from the simulation demonstrate that the fuzzy grey detection technique that was presented has the potential to increase the net-work’s capability of detecting grey hole assaults.展开更多
In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of W...In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of WSNs are distributed in an intimidating region,which is non-rigid to attacks.The recent research domains of WSN deal with models to handle the WSN communications against malicious attacks and threats.In traditional models,the solution has been made for defending the networks,only to specific attacks.However,in real-time applications,the kind of attack that is launched by the adversary is not known.Additionally,on developing a security mechanism for WSN,the resource constraints of sensor nodes are also to be considered.With that note,this paper presents an Enhanced Security Model with Improved Defensive Routing Mechanism(IDRM)for defending the sensor network from various attacks.Moreover,for efficient model design,the work includes the part of feature evaluation of some general attacks of WSNs.The IDRM also includes determination of optimal secure paths and Node security for secure routing operations.The performance of the proposed model is evaluated with respect to several factors;it is found that the model has achieved better security levels and is efficient than other existing models in WSN communications.It is proven that the proposed IDRM produces 74%of PDR in average and a minimized packet drop of 38%when comparing with the existing works.展开更多
Energy saving is the nature of the optimal balance between the optimization of performance and energy consumption.Due to the node' s mobility of large-scale wireless sensor networks and the depletion of electrical en...Energy saving is the nature of the optimal balance between the optimization of performance and energy consumption.Due to the node' s mobility of large-scale wireless sensor networks and the depletion of electrical energy causing the failure of communication path and network segmentation mong nodes,and because energy consumption of nodes is mainly its communication, to design the routing with energy saving, low latency, extensibility and improving the fault-tolerance is particularly important.Based on the large-scale wireless sensor networks,mainly through introducing the methods of nonlinear modeling,this paper analyzes the fine-grained mapping between the system of energy consumption and software, builds and optimizes the software model of energy consumption and energy consumption-balance model of service quality, and commits to form an effective energy saving to lay a foundation for construction of low energy consumption of wireless sensor network. Research achievement has significant theoretical and application value in public safety, disaster prevention, ecological and environmental protection, urban management, smart home, intelligent transportation, medical and health care, industrial monitoring, green agriculture and other fields.展开更多
As a representative of chain-based protocol in Wireless Sensor Networks (WSNs), EEPB is an elegant solution on energy efficiency. However, in the latter part of the operation of the network, there is still a big probl...As a representative of chain-based protocol in Wireless Sensor Networks (WSNs), EEPB is an elegant solution on energy efficiency. However, in the latter part of the operation of the network, there is still a big problem: reserving energy of the node frequently presents the incapacity of directly communicating with the base station, at the same time capacity of data acquisition and transmission as normal nodes. If these nodes were selected as LEADER nodes, that will accelerate the death process and unevenness of energy consumption distribution among nodes.This paper proposed a chain routing algorithm based ontraffic prediction model (CRTP).The novel algorithmdesigns a threshold judgment method through introducing the traffic prediction model in the process of election of LEADER node. The process can be dynamically adjusted according to the flow forecasting. Therefore, this algorithm lets the energy consumption tend-ing to keep at same level. Simulation results show that CRTP has superior performance over EEPB in terms of balanced network energy consumption and the prolonged network life.展开更多
Mobile wireless sensor network (MWSN) has the features of self-organization, multiple-hop and limited energy resources. It is vulnerable to a wide set of security attacks, including those targeting the routing protoco...Mobile wireless sensor network (MWSN) has the features of self-organization, multiple-hop and limited energy resources. It is vulnerable to a wide set of security attacks, including those targeting the routing protocol functionality. In this paper, the existing security problems and solutions in MWSN are summarized, and then a trust management system based on neighbor monitoring is proposed. In the trust management system, the trust value is calculated by the neighbor monitoring mechanism, and the direct trust value and the indirect trust value are combined to establish the distributed trust model to detect the malicious nodes. The consistency check algorithm is capable of defending against the attacks on the trust model. In addition, because of the limited energy of the sensor nodes, the energy-balanced algorithm is introduced to prolong the lifespan of MWSN. The residual energy and energy density are considered in the routing decision. Finally, the simulation experiments show that the proposed algorithm can detect the malicious nodes effectively and achieve the energy-balanced goal to prolong the lifespan of MWSN.展开更多
基金National Natural Science Foundation of China(No.61379125)
文摘The threat of malware in wireless sensor network has stimulated some activities to model and analyze the malware prevalence.To understand the dynamics of malware propagation in wireless sensor network,we propose a novel epidemic model named as e-SEIR(susceptible-exposed-infectious-recovered)model,which is a set of delayed differential equations,in this paper.The model has taken into account the following two factors:1 Multi-state antivirus measures;2 Temporary immune period.Then,the stability and Hopf bifurcation at the equilibria of linearized model are carefully analyzed by considering the distribution of eigenvalues of characteristic equations.Both mathematical analysis and numerical simulations show that the dynamical features of the proposed model rely on the basic reproduction number R0 and time delayτ.This novel model can help us to better understand and predict the propagation behaviors of malware in wireless sensor networks.
基金funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project.
文摘The networks of wireless sensors provide the ground for a range of applications,including environmental moni-toring and industrial operations.Ensuring the networks can overcome obstacles like power and communication reliability and sensor coverage is the crux of network optimization.Network infrastructure planning should be focused on increasing performance,and it should be affected by the detailed data about node distribution.This work recommends the creation of each sensor’s specs and radius of influence based on a particular geographical location,which will contribute to better network planning and design.By using the ARIMA model for time series forecasting and the Al-Biruni Earth Radius algorithm for optimization,our approach bridges the gap between successive terrains while seeking the equilibrium between exploration and exploitation.Through implementing adaptive protocols according to varying environments and sensor constraints,our study aspires to improve overall network operation.We compare the Al-Biruni Earth Radius algorithm along with Gray Wolf Optimization,Particle Swarm Optimization,Genetic Algorithms,and Whale Optimization about performance on real-world problems.Being the most efficient in the optimization process,Biruni displays the lowest error rate at 0.00032.The two other statistical techniques,like ANOVA,are also useful in discovering the factors influencing the nature of sensor data and network-specific problems.Due to the multi-faceted support the comprehensive approach promotes,there is a chance to understand the dynamics that affect the optimization outcomes better so decisions about network design can be made.Through delivering better performance and reliability for various in-situ applications,this research leads to a fusion of time series forecasters and a customized optimizer algorithm.
文摘Energy supply is one of the most critical challenges of wireless sensor networks(WSNs)and industrial wireless sensor networks(IWSNs).While research on coverage optimization problem(COP)centers on the network’s monitoring coverage,this research focuses on the power banks’energy supply coverage.The study of 2-D and 3-D spaces is typical in IWSN,with the realistic environment being more complex with obstacles(i.e.,machines).A 3-D surface is the field of interest(FOI)in this work with the established hybrid power bank deployment model for the energy supply COP optimization of IWSN.The hybrid power bank deployment model is highly adaptive and flexible for new or existing plants already using the IWSN system.The model improves the power supply to a more considerable extent with the least number of power bank deployments.The main innovation in this work is the utilization of a more practical surface model with obstacles and training while improving the convergence speed and quality of the heuristic algorithm.An overall probabilistic coverage rate analysis of every point on the FOI is provided,not limiting the scope to target points or areas.Bresenham’s algorithm is extended from 2-D to 3-D surface to enhance the probabilistic covering model for coverage measurement.A dynamic search strategy(DSS)is proposed to modify the artificial bee colony(ABC)and balance the exploration and exploitation ability for better convergence toward eliminating NP-hard deployment problems.Further,the cellular automata(CA)is utilized to enhance the convergence speed.The case study based on two typical FOI in the IWSN shows that the CA scheme effectively speeds up the optimization process.Comparative experiments are conducted on four benchmark functions to validate the effectiveness of the proposed method.The experimental results show that the proposed algorithm outperforms the ABC and gbest-guided ABC(GABC)algorithms.The results show that the proposed energy coverage optimization method based on the hybrid power bank deployment model generates more accurate results than the results obtained by similar algorithms(i.e.,ABC,GABC).The proposed model is,therefore,effective and efficient for optimization in the IWSN.
文摘Energy consumption is the core issue in wireless sensor networks (WSN). To generate a node energy model that can accurately reveal the energy consumption of sensor nodes is an extremely important part of protocol development, system design and performance evaluation in WSNs. In this paper, by studying component energy consumption in different node states and within state transitions, the authors present the energy models of the node core components, including processors, RF modules and sensors. Furthermore, this paper reveals the energy correlations between node components, and then establishes the node energy model based on the event-trigger mechanism. Finally, the authors simulate the energy models of node components and then evaluate the energy consumption of network protocols based on this node energy model. The proposed model can be used to analyze the WSNs energy consumption, to evaluate communication protocols, to deploy nodes and then to construct WSN applications.
文摘To quick customize and develop intelligent campus internet of things (ICIOT) system more efficiently, in this paper an approach based on runtime model to managing intelligent campus wireless sensor networks is proposed. Firstly, manageability of intelligent campus wireless sensors is abstracted as runtime models which automatically and immediately propagate any observable runtime changes of target resources to corresponding architecture models. Then, a composite model of intelligent campus wireless sensors is constructed through merging their runtime models in order to manage different kinds of devices in a unified way. Finally, a customized model is constructed according to the personalized management requirement and the synchronization between the customized model and the composite model is ensured through model transformation. Thus, all the management tasks can be carried through executing operating programs on the customized model. In the part of the teaching area schools conducted experiments and compared with the traditional method, this method can be more effective management of campus facilities, more energy efficient and orderly, which can reach a 16.7% energy saving.
文摘Wireless sensor networks (WSNs) are energy-constrained networks. The residual energy real-time monitoring (RERM) is very important for WSNs. Moreover, network model is an important foundation of RERM research at personal area network (PAN) level. Because RERM is inherently application-oriented, the network model adopted should also be application-oriented. However, many factors of WSNs applications such as link selected probability and ACK mechanism etc. were neglected by current network models. These factors can introduce obvious influence on throughput of WSNs. Then the energy consumption of nodes will be influenced greatly. So these models cannot characterize many real properties of WSNs, and the result of RERM is not consistent with the real-world situation. In this study, these factors neglected by other researchers are taken into account. Furthermore, an application-oriented general network model (AGNM) for RERM is proposed. Based on the AGNM, the dynamic characteristics of WSNs are simulated. The experimental results show that AGNM can approximately characterize the real situation of WSNs. Therefore, the AGNM provides a good foundation for RERM research.
文摘This paper proposed beta trust model based on energy load balancing combines the recent achievements of the trust models in distributed networks, together with the characteristics of wireless sensor networks. The inter-node trust relation is established after an overall evaluation of node trust value based on the monitor results of the node packets forwarding behavior conducted by inter-node collaboration. Due to the node energy limitation in wireless sensor networks, energy load balancing mechanism is applied to prolong the node survival time. And the redundant routing protocol involves the presented trust model to develop the novel trust routing protocol of beta trust model based on energy load balancing. Simulation performance demonstrates that the beta trust model based on energy load balancing outperforms current schemes in energy consumption.
文摘We propose an energy-based stochastic model of wireless sensor networks (WSNs) where each sensor node is randomly and alternatively in an active and a sleep mode. We first investigate the sensor model and derive the formula of the steady-state probability when there are a number of data packets in different sensor modes. We then determine important sensor’s performance measures in terms of energy consumptions, average data delay and throughput. The novelty of this paper is in its development of a stochastic model in WSN with active/sleep feature and the explicit results obtained for above mentioned energy consumption and performance characteristics. These results are expected to be useful as the fundamental results in the theoretical analysis and design of various hybrid WSNs with power mode consideration.
基金Project supported by the National Natural Science Foundation of China (Grant Nos. 61103231 and 61103230)the Natural Science Foundation of Jiangsu Province, China (Grant No. BK2012082)+2 种基金the Innovation Program of Graduate Scientific Research in Institution of Higher Education of Jiangsu Province,China (Grant No. CXZZ11 0401)the Natural Science Basic Research Plan in Shaanxi Province of China (Grant No. 2011JM8012)the Basic Research Foundation of Engineering University of the Chinese People’s Armed Police Force (Grant No. WJY201218)
文摘In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks, which has been ignored in previous studies. It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes. The theoretical results are confirmed by numerical simulations.
文摘The duty cycling process involves turning a radio into an active and dormant state for conserving energy. It is a promising approach for designing routing protocols for a resource-constrained Wireless Sensor Networks (WSNs). In the duty cycle-based WSNs, the network lifetime is improved and the network transmission is increased as compared to conventional routing protocols. In this study, the active period of the duty cycle is divided into slots that can minimize the idle listening problem. The slot scheduling technique helps determine the most efficient node that uses the active period. The proposed routing protocol uses the opportunistic concept to minimize the sender waiting problem. Therefore, the forwarder set will be selected according to the node's residual active time and energy. Further, the optimum routing path is selected to achieve the minimum forwarding delay from the source to the destination. Simulation analysis reveals that the proposed routing scheme outperforms existing schemes in terms of the average transmission delay, energy consumption, and network throughput.
基金supported in part by the Key Program of National Natural Science Foundation of China(Grant No.60873244,60973110,61003307)the Beijing Municipal Natural Science Foundation(Grant No.4102059)
文摘In wireless sensor networks,node localization is a fundamental middleware service.In this paper,a robust and accurate localization algorithm is proposed,which uses a novel iterative clustering model to obtain the most representative intersection points between every two circles and use them to estimate the position of unknown nodes.Simulation results demonstrate that the proposed algorithm outperforms other localization schemes (such as Min-Max,etc.) in accuracy,scalability and gross error tolerance.
文摘The co-channel interference(collisions) seriously affect the transmission for the newly deployed wireless sensor networks since there is no structure at that phase.In this paper,the interference of the whole network is analyzed based on the SNIR model.The new concept of critical transmitting range is proposed,based on which the transmission theorem is obtained and proved.The results provide the theoretical ground to set up the primary structure of newly deployed networks.
基金Supported by the National High Technology Research and Development Program of China(No.2008AA01A201)the National Natural Science Foundation of China(No.60503015)
文摘On the basis of complex network theory, the issues of key nodes in Wireless Sensor Networks (WSN) are discussed. A model expression of sub-network fault in WSN is given at first; subsequently, the concepts of average path length and clustering coefficient are introduced. Based on the two concepts, a novel attribute description of key nodes related to sub-networks is proposed. Moreover, in terms of node deployment density and transmission range, the concept of single-point key nodes and generalized key nodes of WSN are defined, and their decision theorems are investigated.
文摘Irrigation plays a significant role in various agricultural cropping methods deployed in semiarid and arid regions where valuable water applications and managing are considered crucial concerns.Multiple factors such as weather,soil,water,and crop data need to be considered for irrigation maintenance in an efficient besides uniform manner from multifaceted and different information-based systems.A Multi-Agent System(MAS)has been proposed recently based on diverse agent subsystems with definite objectives for attaining global MAS objective and is deployed on Cloud Computing paradigm capable of gathering information from Wireless Sensor Networks(WSNs)positioned in rice,cotton,cassava crops for knowledge discovery and decision making.The radial basis function network has been used for irrigation prediction.However,in recent work,the security of data has not focused on where intruder involvement might corrupt the data at the time of data transferring to the cloud,which would affect the accuracy of decision making.To handle the above mentioned issues,an efficient method for irrigation prediction is used in this work.The factors considered for decision making are soil moisture,temperature,plant height,root depth.The above-mentioned data will be gathered from the sensors that are attached to the cropfield.Sensed data will be forwarded to the local server,where data encryption will be performed using Adaptive Elliptic Curve Cryptography(AECC).After the encryption process,the data will be forwarded to the cloud.Then the data stored in the cloud will be decrypted key before being given to the deci-sion-making module.Finally,the uniform distribution-based fuzzy neural network is formulated based on the received data information in the decisionmaking module.Thefinal decision regarding the level of water required for cropfields would be taken.Based on this outcome,the water volve opening duration and the level of fertilizers required will be considered.Experimental results demonstrate the effectiveness of the proposed model for the United States Geological Survey(USGS)database in terms of precision,accuracy,recall,and packet delivery ratio.
文摘The Wireless Sensor Networks(WSN)are vulnerable to assaults due to the fact that the devices connected to them have a reliable connection to the inter-net.A malicious node acts as the controller and uses a grey hole attack to get the data from all of the other nodes in the network.Additionally,the nodes are dis-carding and modifying the data packets according to the requirements of the sys-tem.The assault modifies the fundamental concept of the WSNs,which is that different devices should communicate with one another.In the proposed system,there is a fuzzy idea offered for the purpose of preventing the grey hole attack from making effective communication among the WSN devices.The currently available model is unable to recognise the myriad of different kinds of attacks.The fuzzy engine identified suspicious actions by utilising the rules that were gen-erated to make a prediction about the malicious node that would halt the process.Experiments conducted using simulation are used to determine delay,accuracy,energy consumption,throughput,and the ratio of packets successfully delivered.It stands in contrast to the model that was suggested,as well as the methodologies that are currently being used,and analogue behavioural modelling.In comparison to the existing method,the proposed model achieves an accuracy rate of 45 per-cent,a packet delivery ratio of 79 percent,and a reduction in energy usage of around 35.6 percent.These results from the simulation demonstrate that the fuzzy grey detection technique that was presented has the potential to increase the net-work’s capability of detecting grey hole assaults.
文摘In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of WSNs are distributed in an intimidating region,which is non-rigid to attacks.The recent research domains of WSN deal with models to handle the WSN communications against malicious attacks and threats.In traditional models,the solution has been made for defending the networks,only to specific attacks.However,in real-time applications,the kind of attack that is launched by the adversary is not known.Additionally,on developing a security mechanism for WSN,the resource constraints of sensor nodes are also to be considered.With that note,this paper presents an Enhanced Security Model with Improved Defensive Routing Mechanism(IDRM)for defending the sensor network from various attacks.Moreover,for efficient model design,the work includes the part of feature evaluation of some general attacks of WSNs.The IDRM also includes determination of optimal secure paths and Node security for secure routing operations.The performance of the proposed model is evaluated with respect to several factors;it is found that the model has achieved better security levels and is efficient than other existing models in WSN communications.It is proven that the proposed IDRM produces 74%of PDR in average and a minimized packet drop of 38%when comparing with the existing works.
文摘Energy saving is the nature of the optimal balance between the optimization of performance and energy consumption.Due to the node' s mobility of large-scale wireless sensor networks and the depletion of electrical energy causing the failure of communication path and network segmentation mong nodes,and because energy consumption of nodes is mainly its communication, to design the routing with energy saving, low latency, extensibility and improving the fault-tolerance is particularly important.Based on the large-scale wireless sensor networks,mainly through introducing the methods of nonlinear modeling,this paper analyzes the fine-grained mapping between the system of energy consumption and software, builds and optimizes the software model of energy consumption and energy consumption-balance model of service quality, and commits to form an effective energy saving to lay a foundation for construction of low energy consumption of wireless sensor network. Research achievement has significant theoretical and application value in public safety, disaster prevention, ecological and environmental protection, urban management, smart home, intelligent transportation, medical and health care, industrial monitoring, green agriculture and other fields.
基金Supported by National Natural Science Foundation of China (60602061) and National High Technology Research and Development Program of China (863 Program) (2006AA01Z413)
文摘As a representative of chain-based protocol in Wireless Sensor Networks (WSNs), EEPB is an elegant solution on energy efficiency. However, in the latter part of the operation of the network, there is still a big problem: reserving energy of the node frequently presents the incapacity of directly communicating with the base station, at the same time capacity of data acquisition and transmission as normal nodes. If these nodes were selected as LEADER nodes, that will accelerate the death process and unevenness of energy consumption distribution among nodes.This paper proposed a chain routing algorithm based ontraffic prediction model (CRTP).The novel algorithmdesigns a threshold judgment method through introducing the traffic prediction model in the process of election of LEADER node. The process can be dynamically adjusted according to the flow forecasting. Therefore, this algorithm lets the energy consumption tend-ing to keep at same level. Simulation results show that CRTP has superior performance over EEPB in terms of balanced network energy consumption and the prolonged network life.
文摘Mobile wireless sensor network (MWSN) has the features of self-organization, multiple-hop and limited energy resources. It is vulnerable to a wide set of security attacks, including those targeting the routing protocol functionality. In this paper, the existing security problems and solutions in MWSN are summarized, and then a trust management system based on neighbor monitoring is proposed. In the trust management system, the trust value is calculated by the neighbor monitoring mechanism, and the direct trust value and the indirect trust value are combined to establish the distributed trust model to detect the malicious nodes. The consistency check algorithm is capable of defending against the attacks on the trust model. In addition, because of the limited energy of the sensor nodes, the energy-balanced algorithm is introduced to prolong the lifespan of MWSN. The residual energy and energy density are considered in the routing decision. Finally, the simulation experiments show that the proposed algorithm can detect the malicious nodes effectively and achieve the energy-balanced goal to prolong the lifespan of MWSN.