期刊文献+
共找到926篇文章
< 1 2 47 >
每页显示 20 50 100
Dynamical analysis for a malware propagation model in wireless sensor network 被引量:4
1
作者 宋礼鹏 张蓉萍 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2016年第2期136-144,共9页
The threat of malware in wireless sensor network has stimulated some activities to model and analyze the malware prevalence.To understand the dynamics of malware propagation in wireless sensor network,we propose a nov... The threat of malware in wireless sensor network has stimulated some activities to model and analyze the malware prevalence.To understand the dynamics of malware propagation in wireless sensor network,we propose a novel epidemic model named as e-SEIR(susceptible-exposed-infectious-recovered)model,which is a set of delayed differential equations,in this paper.The model has taken into account the following two factors:1 Multi-state antivirus measures;2 Temporary immune period.Then,the stability and Hopf bifurcation at the equilibria of linearized model are carefully analyzed by considering the distribution of eigenvalues of characteristic equations.Both mathematical analysis and numerical simulations show that the dynamical features of the proposed model rely on the basic reproduction number R0 and time delayτ.This novel model can help us to better understand and predict the propagation behaviors of malware in wireless sensor networks. 展开更多
关键词 wireless sensor network STABILITY Hopf bifurcation epidemic model time delay
下载PDF
Enhancing Wireless Sensor Network Efficiency through Al-Biruni Earth Radius Optimization
2
作者 Reem Ibrahim Alkanhel Doaa Sami Khafaga +4 位作者 Ahmed Mohamed Zaki Marwa M.Eid Abdyalaziz A.Al-Mooneam Abdelhameed Ibrahim S.K.Towfek 《Computers, Materials & Continua》 SCIE EI 2024年第6期3549-3568,共20页
The networks of wireless sensors provide the ground for a range of applications,including environmental moni-toring and industrial operations.Ensuring the networks can overcome obstacles like power and communication r... The networks of wireless sensors provide the ground for a range of applications,including environmental moni-toring and industrial operations.Ensuring the networks can overcome obstacles like power and communication reliability and sensor coverage is the crux of network optimization.Network infrastructure planning should be focused on increasing performance,and it should be affected by the detailed data about node distribution.This work recommends the creation of each sensor’s specs and radius of influence based on a particular geographical location,which will contribute to better network planning and design.By using the ARIMA model for time series forecasting and the Al-Biruni Earth Radius algorithm for optimization,our approach bridges the gap between successive terrains while seeking the equilibrium between exploration and exploitation.Through implementing adaptive protocols according to varying environments and sensor constraints,our study aspires to improve overall network operation.We compare the Al-Biruni Earth Radius algorithm along with Gray Wolf Optimization,Particle Swarm Optimization,Genetic Algorithms,and Whale Optimization about performance on real-world problems.Being the most efficient in the optimization process,Biruni displays the lowest error rate at 0.00032.The two other statistical techniques,like ANOVA,are also useful in discovering the factors influencing the nature of sensor data and network-specific problems.Due to the multi-faceted support the comprehensive approach promotes,there is a chance to understand the dynamics that affect the optimization outcomes better so decisions about network design can be made.Through delivering better performance and reliability for various in-situ applications,this research leads to a fusion of time series forecasters and a customized optimizer algorithm. 展开更多
关键词 wireless sensor networks OPTIMIZATION ARIMA model BER algorithm metaheuristic algorithms
下载PDF
Hybrid Power Bank Deployment Model for Energy Supply Coverage Optimization in Industrial Wireless Sensor Network
3
作者 Hang Yang Xunbo Li Witold Pedrycz 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期1531-1551,共21页
Energy supply is one of the most critical challenges of wireless sensor networks(WSNs)and industrial wireless sensor networks(IWSNs).While research on coverage optimization problem(COP)centers on the network’s monito... Energy supply is one of the most critical challenges of wireless sensor networks(WSNs)and industrial wireless sensor networks(IWSNs).While research on coverage optimization problem(COP)centers on the network’s monitoring coverage,this research focuses on the power banks’energy supply coverage.The study of 2-D and 3-D spaces is typical in IWSN,with the realistic environment being more complex with obstacles(i.e.,machines).A 3-D surface is the field of interest(FOI)in this work with the established hybrid power bank deployment model for the energy supply COP optimization of IWSN.The hybrid power bank deployment model is highly adaptive and flexible for new or existing plants already using the IWSN system.The model improves the power supply to a more considerable extent with the least number of power bank deployments.The main innovation in this work is the utilization of a more practical surface model with obstacles and training while improving the convergence speed and quality of the heuristic algorithm.An overall probabilistic coverage rate analysis of every point on the FOI is provided,not limiting the scope to target points or areas.Bresenham’s algorithm is extended from 2-D to 3-D surface to enhance the probabilistic covering model for coverage measurement.A dynamic search strategy(DSS)is proposed to modify the artificial bee colony(ABC)and balance the exploration and exploitation ability for better convergence toward eliminating NP-hard deployment problems.Further,the cellular automata(CA)is utilized to enhance the convergence speed.The case study based on two typical FOI in the IWSN shows that the CA scheme effectively speeds up the optimization process.Comparative experiments are conducted on four benchmark functions to validate the effectiveness of the proposed method.The experimental results show that the proposed algorithm outperforms the ABC and gbest-guided ABC(GABC)algorithms.The results show that the proposed energy coverage optimization method based on the hybrid power bank deployment model generates more accurate results than the results obtained by similar algorithms(i.e.,ABC,GABC).The proposed model is,therefore,effective and efficient for optimization in the IWSN. 展开更多
关键词 Industrial wireless sensor network hybrid power bank deployment model:energy supply coverage optimization artificial bee colony algorithm radio frequency numerical function optimization
下载PDF
Modeling of Node Energy Consumption for Wireless Sensor Networks 被引量:11
4
作者 Hai-Ying Zhou Dan-Yan Luo +1 位作者 Yan Gao De-Cheng Zuo 《Wireless Sensor Network》 2011年第1期18-23,共6页
Energy consumption is the core issue in wireless sensor networks (WSN). To generate a node energy model that can accurately reveal the energy consumption of sensor nodes is an extremely important part of protocol deve... Energy consumption is the core issue in wireless sensor networks (WSN). To generate a node energy model that can accurately reveal the energy consumption of sensor nodes is an extremely important part of protocol development, system design and performance evaluation in WSNs. In this paper, by studying component energy consumption in different node states and within state transitions, the authors present the energy models of the node core components, including processors, RF modules and sensors. Furthermore, this paper reveals the energy correlations between node components, and then establishes the node energy model based on the event-trigger mechanism. Finally, the authors simulate the energy models of node components and then evaluate the energy consumption of network protocols based on this node energy model. The proposed model can be used to analyze the WSNs energy consumption, to evaluate communication protocols, to deploy nodes and then to construct WSN applications. 展开更多
关键词 wireless sensor networkS ENERGY model Event-Trigger
下载PDF
Management of Intelligent Campus Wireless Sensor Networks Based on Runtime Model
5
作者 Ping Zhang Jianzhong Wang 《Journal of Computer and Communications》 2015年第7期22-31,共10页
To quick customize and develop intelligent campus internet of things (ICIOT) system more efficiently, in this paper an approach based on runtime model to managing intelligent campus wireless sensor networks is propose... To quick customize and develop intelligent campus internet of things (ICIOT) system more efficiently, in this paper an approach based on runtime model to managing intelligent campus wireless sensor networks is proposed. Firstly, manageability of intelligent campus wireless sensors is abstracted as runtime models which automatically and immediately propagate any observable runtime changes of target resources to corresponding architecture models. Then, a composite model of intelligent campus wireless sensors is constructed through merging their runtime models in order to manage different kinds of devices in a unified way. Finally, a customized model is constructed according to the personalized management requirement and the synchronization between the customized model and the composite model is ensured through model transformation. Thus, all the management tasks can be carried through executing operating programs on the customized model. In the part of the teaching area schools conducted experiments and compared with the traditional method, this method can be more effective management of campus facilities, more energy efficient and orderly, which can reach a 16.7% energy saving. 展开更多
关键词 wireless sensor networks INTELLIGENT CAMPUS RUNTIME model INTELLIGENT CAMPUS Internet of THINGS Software Architecture
下载PDF
An Application-Oriented Network Model for Wireless Sensor Networks
6
作者 Xiaoliang Cheng Zhidong Deng Zhen Huang 《Wireless Sensor Network》 2010年第10期746-754,共9页
Wireless sensor networks (WSNs) are energy-constrained networks. The residual energy real-time monitoring (RERM) is very important for WSNs. Moreover, network model is an important foundation of RERM research at perso... Wireless sensor networks (WSNs) are energy-constrained networks. The residual energy real-time monitoring (RERM) is very important for WSNs. Moreover, network model is an important foundation of RERM research at personal area network (PAN) level. Because RERM is inherently application-oriented, the network model adopted should also be application-oriented. However, many factors of WSNs applications such as link selected probability and ACK mechanism etc. were neglected by current network models. These factors can introduce obvious influence on throughput of WSNs. Then the energy consumption of nodes will be influenced greatly. So these models cannot characterize many real properties of WSNs, and the result of RERM is not consistent with the real-world situation. In this study, these factors neglected by other researchers are taken into account. Furthermore, an application-oriented general network model (AGNM) for RERM is proposed. Based on the AGNM, the dynamic characteristics of WSNs are simulated. The experimental results show that AGNM can approximately characterize the real situation of WSNs. Therefore, the AGNM provides a good foundation for RERM research. 展开更多
关键词 wireless sensor networks PERSONAL Area network (PAN) network model THROUGHPUT Analysis
下载PDF
Research on Beta Trust Model of Wireless Sensor Networks Based on Energy Load Balancing
7
作者 Danwei Chen Xizhou Yu Xianghui Dong 《Wireless Sensor Network》 2010年第5期373-380,共8页
This paper proposed beta trust model based on energy load balancing combines the recent achievements of the trust models in distributed networks, together with the characteristics of wireless sensor networks. The inte... This paper proposed beta trust model based on energy load balancing combines the recent achievements of the trust models in distributed networks, together with the characteristics of wireless sensor networks. The inter-node trust relation is established after an overall evaluation of node trust value based on the monitor results of the node packets forwarding behavior conducted by inter-node collaboration. Due to the node energy limitation in wireless sensor networks, energy load balancing mechanism is applied to prolong the node survival time. And the redundant routing protocol involves the presented trust model to develop the novel trust routing protocol of beta trust model based on energy load balancing. Simulation performance demonstrates that the beta trust model based on energy load balancing outperforms current schemes in energy consumption. 展开更多
关键词 wireless sensor networks BETA TRUST model TRUST ROUTING PROTOCOL network Security TRUST Evaluation
下载PDF
An Energy-Based Stochastic Model for Wireless Sensor Networks
8
作者 Yuhong Zhang Wei Li 《Wireless Sensor Network》 2011年第9期322-328,共7页
We propose an energy-based stochastic model of wireless sensor networks (WSNs) where each sensor node is randomly and alternatively in an active and a sleep mode. We first investigate the sensor model and derive the f... We propose an energy-based stochastic model of wireless sensor networks (WSNs) where each sensor node is randomly and alternatively in an active and a sleep mode. We first investigate the sensor model and derive the formula of the steady-state probability when there are a number of data packets in different sensor modes. We then determine important sensor’s performance measures in terms of energy consumptions, average data delay and throughput. The novelty of this paper is in its development of a stochastic model in WSN with active/sleep feature and the explicit results obtained for above mentioned energy consumption and performance characteristics. These results are expected to be useful as the fundamental results in the theoretical analysis and design of various hybrid WSNs with power mode consideration. 展开更多
关键词 ENERGY Efficiency wireless sensor networks Energy-Based STOCHASTIC model
下载PDF
Virus spreading in wireless sensor networks with a medium access control mechanism 被引量:4
9
作者 王亚奇 杨晓元 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第4期70-74,共5页
In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical a... In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks, which has been ignored in previous studies. It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes. The theoretical results are confirmed by numerical simulations. 展开更多
关键词 wireless sensor networks medium access control virus spreading susceptible-infected model
下载PDF
A novel slot scheduling technique for duty-cycle based data transmission for wireless sensor network 被引量:1
10
作者 Yogesh Tripathi Arun Prakash Rajeev Tripathi 《Digital Communications and Networks》 SCIE CSCD 2022年第3期351-358,共8页
The duty cycling process involves turning a radio into an active and dormant state for conserving energy. It is a promising approach for designing routing protocols for a resource-constrained Wireless Sensor Networks ... The duty cycling process involves turning a radio into an active and dormant state for conserving energy. It is a promising approach for designing routing protocols for a resource-constrained Wireless Sensor Networks (WSNs). In the duty cycle-based WSNs, the network lifetime is improved and the network transmission is increased as compared to conventional routing protocols. In this study, the active period of the duty cycle is divided into slots that can minimize the idle listening problem. The slot scheduling technique helps determine the most efficient node that uses the active period. The proposed routing protocol uses the opportunistic concept to minimize the sender waiting problem. Therefore, the forwarder set will be selected according to the node's residual active time and energy. Further, the optimum routing path is selected to achieve the minimum forwarding delay from the source to the destination. Simulation analysis reveals that the proposed routing scheme outperforms existing schemes in terms of the average transmission delay, energy consumption, and network throughput. 展开更多
关键词 Duty cycle Energy model wireless sensor network Slot scheduling technique
下载PDF
An Iterative Clustering-Based Localization Algorithm for Wireless Sensor Networks 被引量:1
11
作者 罗海勇 李慧 +1 位作者 赵方 彭金华 《China Communications》 SCIE CSCD 2011年第1期58-64,共7页
In wireless sensor networks,node localization is a fundamental middleware service.In this paper,a robust and accurate localization algorithm is proposed,which uses a novel iterative clustering model to obtain the most... In wireless sensor networks,node localization is a fundamental middleware service.In this paper,a robust and accurate localization algorithm is proposed,which uses a novel iterative clustering model to obtain the most representative intersection points between every two circles and use them to estimate the position of unknown nodes.Simulation results demonstrate that the proposed algorithm outperforms other localization schemes (such as Min-Max,etc.) in accuracy,scalability and gross error tolerance. 展开更多
关键词 wireless sensor network node localization iterative clustering model
下载PDF
Effect of interference on transmission for newly deployed wireless sensor networks
12
作者 李津 黄载禄 《Journal of Pharmaceutical Analysis》 SCIE CAS 2007年第1期42-45,共4页
The co-channel interference(collisions) seriously affect the transmission for the newly deployed wireless sensor networks since there is no structure at that phase.In this paper,the interference of the whole network i... The co-channel interference(collisions) seriously affect the transmission for the newly deployed wireless sensor networks since there is no structure at that phase.In this paper,the interference of the whole network is analyzed based on the SNIR model.The new concept of critical transmitting range is proposed,based on which the transmission theorem is obtained and proved.The results provide the theoretical ground to set up the primary structure of newly deployed networks. 展开更多
关键词 wireless sensor network INTERFERENCE SNIR model critical transmitting range
下载PDF
RESEARCH ON KEY NODES OF WIRELESS SENSOR NETWORK BASED ON COMPLEX NETWORK THEORY
13
作者 Ma Chuang Liu Hongwei Zuo Decheng Wu Zhibo Yang Xiaozong 《Journal of Electronics(China)》 2011年第3期396-401,共6页
On the basis of complex network theory, the issues of key nodes in Wireless Sensor Networks (WSN) are discussed. A model expression of sub-network fault in WSN is given at first; subsequently, the concepts of average ... On the basis of complex network theory, the issues of key nodes in Wireless Sensor Networks (WSN) are discussed. A model expression of sub-network fault in WSN is given at first; subsequently, the concepts of average path length and clustering coefficient are introduced. Based on the two concepts, a novel attribute description of key nodes related to sub-networks is proposed. Moreover, in terms of node deployment density and transmission range, the concept of single-point key nodes and generalized key nodes of WSN are defined, and their decision theorems are investigated. 展开更多
关键词 wireless sensor network (WSN) Key nodes Fault model Complex network theory
下载PDF
Automated Irrigation System Using Improved Fuzzy Neural Network in Wireless Sensor Networks
14
作者 S.Sakthivel V.Vivekanandhan M.Manikandan 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期853-866,共14页
Irrigation plays a significant role in various agricultural cropping methods deployed in semiarid and arid regions where valuable water applications and managing are considered crucial concerns.Multiple factors such a... Irrigation plays a significant role in various agricultural cropping methods deployed in semiarid and arid regions where valuable water applications and managing are considered crucial concerns.Multiple factors such as weather,soil,water,and crop data need to be considered for irrigation maintenance in an efficient besides uniform manner from multifaceted and different information-based systems.A Multi-Agent System(MAS)has been proposed recently based on diverse agent subsystems with definite objectives for attaining global MAS objective and is deployed on Cloud Computing paradigm capable of gathering information from Wireless Sensor Networks(WSNs)positioned in rice,cotton,cassava crops for knowledge discovery and decision making.The radial basis function network has been used for irrigation prediction.However,in recent work,the security of data has not focused on where intruder involvement might corrupt the data at the time of data transferring to the cloud,which would affect the accuracy of decision making.To handle the above mentioned issues,an efficient method for irrigation prediction is used in this work.The factors considered for decision making are soil moisture,temperature,plant height,root depth.The above-mentioned data will be gathered from the sensors that are attached to the cropfield.Sensed data will be forwarded to the local server,where data encryption will be performed using Adaptive Elliptic Curve Cryptography(AECC).After the encryption process,the data will be forwarded to the cloud.Then the data stored in the cloud will be decrypted key before being given to the deci-sion-making module.Finally,the uniform distribution-based fuzzy neural network is formulated based on the received data information in the decisionmaking module.Thefinal decision regarding the level of water required for cropfields would be taken.Based on this outcome,the water volve opening duration and the level of fertilizers required will be considered.Experimental results demonstrate the effectiveness of the proposed model for the United States Geological Survey(USGS)database in terms of precision,accuracy,recall,and packet delivery ratio. 展开更多
关键词 IRRIGATION multi-agent system precision irrigation ACCURACY elliptic curve cryptography ENCRYPTION wireless sensor networks fertilizers
下载PDF
A Rule-Based Approach for Grey Hole Attack Prediction in Wireless Sensor Networks
15
作者 C.Gowdham S.Nithyanandam 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期3815-3827,共13页
The Wireless Sensor Networks(WSN)are vulnerable to assaults due to the fact that the devices connected to them have a reliable connection to the inter-net.A malicious node acts as the controller and uses a grey hole a... The Wireless Sensor Networks(WSN)are vulnerable to assaults due to the fact that the devices connected to them have a reliable connection to the inter-net.A malicious node acts as the controller and uses a grey hole attack to get the data from all of the other nodes in the network.Additionally,the nodes are dis-carding and modifying the data packets according to the requirements of the sys-tem.The assault modifies the fundamental concept of the WSNs,which is that different devices should communicate with one another.In the proposed system,there is a fuzzy idea offered for the purpose of preventing the grey hole attack from making effective communication among the WSN devices.The currently available model is unable to recognise the myriad of different kinds of attacks.The fuzzy engine identified suspicious actions by utilising the rules that were gen-erated to make a prediction about the malicious node that would halt the process.Experiments conducted using simulation are used to determine delay,accuracy,energy consumption,throughput,and the ratio of packets successfully delivered.It stands in contrast to the model that was suggested,as well as the methodologies that are currently being used,and analogue behavioural modelling.In comparison to the existing method,the proposed model achieves an accuracy rate of 45 per-cent,a packet delivery ratio of 79 percent,and a reduction in energy usage of around 35.6 percent.These results from the simulation demonstrate that the fuzzy grey detection technique that was presented has the potential to increase the net-work’s capability of detecting grey hole assaults. 展开更多
关键词 Attack prediction grey hole wireless sensor networks rule-based model grey attack
下载PDF
Enhanced Security with Improved Defensive Routing Mechanism in Wireless Sensor Networks
16
作者 R.Sabitha C.Gokul Prasad S.Karthik 《Computer Systems Science & Engineering》 SCIE EI 2023年第6期2795-2810,共16页
In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of W... In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of WSNs are distributed in an intimidating region,which is non-rigid to attacks.The recent research domains of WSN deal with models to handle the WSN communications against malicious attacks and threats.In traditional models,the solution has been made for defending the networks,only to specific attacks.However,in real-time applications,the kind of attack that is launched by the adversary is not known.Additionally,on developing a security mechanism for WSN,the resource constraints of sensor nodes are also to be considered.With that note,this paper presents an Enhanced Security Model with Improved Defensive Routing Mechanism(IDRM)for defending the sensor network from various attacks.Moreover,for efficient model design,the work includes the part of feature evaluation of some general attacks of WSNs.The IDRM also includes determination of optimal secure paths and Node security for secure routing operations.The performance of the proposed model is evaluated with respect to several factors;it is found that the model has achieved better security levels and is efficient than other existing models in WSN communications.It is proven that the proposed IDRM produces 74%of PDR in average and a minimized packet drop of 38%when comparing with the existing works. 展开更多
关键词 Enhanced security model wireless sensor networks improved defensive routing mechanism secure paths node security
下载PDF
An analysis of large-scale wireless sensor networks with energy-saving problem
17
作者 Lina Yuan Jing Gong 《International Journal of Technology Management》 2014年第8期109-111,共3页
Energy saving is the nature of the optimal balance between the optimization of performance and energy consumption.Due to the node' s mobility of large-scale wireless sensor networks and the depletion of electrical en... Energy saving is the nature of the optimal balance between the optimization of performance and energy consumption.Due to the node' s mobility of large-scale wireless sensor networks and the depletion of electrical energy causing the failure of communication path and network segmentation mong nodes,and because energy consumption of nodes is mainly its communication, to design the routing with energy saving, low latency, extensibility and improving the fault-tolerance is particularly important.Based on the large-scale wireless sensor networks,mainly through introducing the methods of nonlinear modeling,this paper analyzes the fine-grained mapping between the system of energy consumption and software, builds and optimizes the software model of energy consumption and energy consumption-balance model of service quality, and commits to form an effective energy saving to lay a foundation for construction of low energy consumption of wireless sensor network. Research achievement has significant theoretical and application value in public safety, disaster prevention, ecological and environmental protection, urban management, smart home, intelligent transportation, medical and health care, industrial monitoring, green agriculture and other fields. 展开更多
关键词 wireless sensor networks(WSNs) energy saving balance model of service quality.
下载PDF
Efficient Cover Set Selection in Wireless Sensor Networks 被引量:10
18
作者 JIA Jie CHEN Jian +1 位作者 CHANG Gui-Ran WEN Ying-You 《自动化学报》 EI CSCD 北大核心 2008年第9期1157-1162,共6页
到大程度,一个基于簇的分布式的传感器网络的有效性取决于传感器节点提供的范围。在任何特别时刻激活仅仅传感器节点的必要数字是节省全面精力的一个有效方法。然而,因为无线传感器网络的高密度的推广,这是一个 NP 完全的问题。在这... 到大程度,一个基于簇的分布式的传感器网络的有效性取决于传感器节点提供的范围。在任何特别时刻激活仅仅传感器节点的必要数字是节省全面精力的一个有效方法。然而,因为无线传感器网络的高密度的推广,这是一个 NP 完全的问题。在这份报纸,基于改进 NSGA-II (排序基因算法的优秀人材 nondominated ) 寻找算法的一篇小说被建议选择一个最佳的盖子集合。与在以前的工作使用的二进制察觉模型相对照,一个概率的察觉模特儿与察觉错误范围和范围阀值在联合被收养。与被保证的完整的网络范围,很多个节点被转变为休眠模式节省精力。传播联合并且删除操作员被建议提高搜索能力。广泛的模拟结果被介绍表明我们的途径的有效性。 展开更多
关键词 自动化系统 无线传感器 有效性 结点
下载PDF
A Chain Routing Algorithm Based on Traffic Prediction in Wireless Sensor Networks 被引量:1
19
作者 Yi Sun Lei Xu +1 位作者 Xin Wu Minxuan Shen 《Communications and Network》 2013年第3期504-507,共4页
As a representative of chain-based protocol in Wireless Sensor Networks (WSNs), EEPB is an elegant solution on energy efficiency. However, in the latter part of the operation of the network, there is still a big probl... As a representative of chain-based protocol in Wireless Sensor Networks (WSNs), EEPB is an elegant solution on energy efficiency. However, in the latter part of the operation of the network, there is still a big problem: reserving energy of the node frequently presents the incapacity of directly communicating with the base station, at the same time capacity of data acquisition and transmission as normal nodes. If these nodes were selected as LEADER nodes, that will accelerate the death process and unevenness of energy consumption distribution among nodes.This paper proposed a chain routing algorithm based ontraffic prediction model (CRTP).The novel algorithmdesigns a threshold judgment method through introducing the traffic prediction model in the process of election of LEADER node. The process can be dynamically adjusted according to the flow forecasting. Therefore, this algorithm lets the energy consumption tend-ing to keep at same level. Simulation results show that CRTP has superior performance over EEPB in terms of balanced network energy consumption and the prolonged network life. 展开更多
关键词 wireless sensor networks A CHAIN ROUTING Algorithm LEADER NODE TRAFFIC Prediction model
下载PDF
A Secure and Energy-Balanced Routing Scheme for Mobile Wireless Sensor Network
20
作者 Bei Liu Yuanming Wu 《Wireless Sensor Network》 2015年第11期137-148,共12页
Mobile wireless sensor network (MWSN) has the features of self-organization, multiple-hop and limited energy resources. It is vulnerable to a wide set of security attacks, including those targeting the routing protoco... Mobile wireless sensor network (MWSN) has the features of self-organization, multiple-hop and limited energy resources. It is vulnerable to a wide set of security attacks, including those targeting the routing protocol functionality. In this paper, the existing security problems and solutions in MWSN are summarized, and then a trust management system based on neighbor monitoring is proposed. In the trust management system, the trust value is calculated by the neighbor monitoring mechanism, and the direct trust value and the indirect trust value are combined to establish the distributed trust model to detect the malicious nodes. The consistency check algorithm is capable of defending against the attacks on the trust model. In addition, because of the limited energy of the sensor nodes, the energy-balanced algorithm is introduced to prolong the lifespan of MWSN. The residual energy and energy density are considered in the routing decision. Finally, the simulation experiments show that the proposed algorithm can detect the malicious nodes effectively and achieve the energy-balanced goal to prolong the lifespan of MWSN. 展开更多
关键词 MOBILE wireless sensor network network SECURITY TRUST model Energy-Balanced
下载PDF
上一页 1 2 47 下一页 到第
使用帮助 返回顶部