期刊文献+
共找到2,866篇文章
< 1 2 144 >
每页显示 20 50 100
A blockchain-empowered authentication scheme for worm detection in wireless sensor network
1
作者 Yuling Chen Xiong Yang +2 位作者 Tao Li Yi Ren Yangyang Long 《Digital Communications and Networks》 SCIE CSCD 2024年第2期265-272,共8页
Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and self-management.The special structure of WSN brings both convenience and vulnerability.For... Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and self-management.The special structure of WSN brings both convenience and vulnerability.For example,a malicious participant can launch attacks by capturing a physical device.Therefore,node authentication that can resist malicious attacks is very important to network security.Recently,blockchain technology has shown the potential to enhance the security of the Internet of Things(IoT).In this paper,we propose a Blockchain-empowered Authentication Scheme(BAS)for WSN.In our scheme,all nodes are managed by utilizing the identity information stored on the blockchain.Besides,the simulation experiment about worm detection is executed on BAS,and the security is evaluated from detection and infection rate.The experiment results indicate that the proposed scheme can effectively inhibit the spread and infection of worms in the network. 展开更多
关键词 wireless sensor network(WSN) node authentication Blockchain TANGLE Worm detection
下载PDF
Physical layer design of wireless sensor network nodes 被引量:5
2
作者 钟子果 胡爱群 王丹 《Journal of Southeast University(English Edition)》 EI CAS 2006年第1期21-25,共5页
Major consideration dimensions for the physical layer design of wireless sensor network (WSN) nodes is analyzed by comparing different wireless communication approaches, diverse mature standards, important radio fre... Major consideration dimensions for the physical layer design of wireless sensor network (WSN) nodes is analyzed by comparing different wireless communication approaches, diverse mature standards, important radio frequency (RF) parameters and various microcontroller unit (MCU) solutions. An implementation of the WSN node is presented with experimental results and a novel "one processor working at two frequencies" energy saving strategy. The lifetime estimation issue is analyzed with consideration to the periodical listen required by common WSN media access control (MAC) algorithms. It can be concluded that the startup time of the RF which determines the best sleep time ratio and the shortest backoff slot time of MAC, the RF frequency and modulation methods which determinate the RX and TX current, and the overall energy consumption of the dual frequency MCU SOC ( system on chip) are the most essential factors for the WSN node physical layer design. 展开更多
关键词 wireless sensor network node physical layer radio frequency energy consumption node lifetime
下载PDF
RESEARCH ON KEY NODES OF WIRELESS SENSOR NETWORK BASED ON COMPLEX NETWORK THEORY
3
作者 Ma Chuang Liu Hongwei Zuo Decheng Wu Zhibo Yang Xiaozong 《Journal of Electronics(China)》 2011年第3期396-401,共6页
On the basis of complex network theory, the issues of key nodes in Wireless Sensor Networks (WSN) are discussed. A model expression of sub-network fault in WSN is given at first; subsequently, the concepts of average ... On the basis of complex network theory, the issues of key nodes in Wireless Sensor Networks (WSN) are discussed. A model expression of sub-network fault in WSN is given at first; subsequently, the concepts of average path length and clustering coefficient are introduced. Based on the two concepts, a novel attribute description of key nodes related to sub-networks is proposed. Moreover, in terms of node deployment density and transmission range, the concept of single-point key nodes and generalized key nodes of WSN are defined, and their decision theorems are investigated. 展开更多
关键词 wireless sensor network (WSN) Key nodes Fault model Complex network theory
下载PDF
Wireless sensor networks routing algorithm based on block clustering and springboard nodes
4
作者 LIU Yuhong FU Fuxiang LI Cuiran 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2022年第2期209-216,共8页
In the wireless sensor networks(WSN),the sensor nodes have limited battery life and are deployed in hostile environments.It is very difficult to recharging or replacement of the batteries after deployment for the sens... In the wireless sensor networks(WSN),the sensor nodes have limited battery life and are deployed in hostile environments.It is very difficult to recharging or replacement of the batteries after deployment for the sensor nodes in inaccessible areas.Therefore,how to increase the network lifetime of the WSN is deserved to be studied.In this study,a WSN routing algorithm was proposed based on block clustering and springboard nodes to increase the network lifetime of the WSN.Firstly,by analyzing the influence of communication transmission distance on network energy consumption,block clustering was introduced to control node transmission distance in order to reduce total network energy consumption.In addition,a network transmission model was proposed based on springboard nodes and the advantages of network energy consumption of this model against multi-hop between clusters were analyzed.The simulation results show that,compared with the LEACH algorithm,EECPK-means algorithm and energy centroid clustering algorithm,the proposed routing algorithm effectively prolongs the network lifetime of WSN. 展开更多
关键词 wireless sensor networks(WSN) network lifetime springboard node block clustering
下载PDF
Employing Orphan Nodes to Avoid Energy Holes in Wireless Sensor Networks
5
作者 Sepideh Zareei Elham Babaee +1 位作者 Rosli Salleh Saeed Moghadam 《Communications and Network》 2013年第3期625-630,共6页
When energy consumption by wireless sensor nodes gets off balance, partitions in the network appear because several of the nodes stop functioning. The respective network’s lifetime also diminishes. This problem is co... When energy consumption by wireless sensor nodes gets off balance, partitions in the network appear because several of the nodes stop functioning. The respective network’s lifetime also diminishes. This problem is commonly known as the “hot spot” or “energy hole” phenomenon. To resolve this issue, a Multi-Hop Decentralized Cluster-Based Routing (MDCR) protocol is proposed. This algorithm uses orphan nodes as intermediate nodes to form inter-cluster multi-hop routing and balance the energy consumption among sensor nodes. Simulation experiments have shown that MDCR is significantly better at prolonging network lifetime compared to the Adaptive Decentralized Re-Clustering Protocol. 展开更多
关键词 wireless sensor networks CLUSTERING Energy EFFICIENCY ORPHAN nodes
下载PDF
Lossy nodes inference based on end-to-end passive monitoring in wireless sensor networks
6
作者 Yang Yu Xu Yongjun Li Xiaowei 《High Technology Letters》 EI CAS 2011年第4期388-394,共7页
This paper presents a passive monitoring mechanism, loss), nodes inference (LoNI), to identify loss), nodes in wireless sensor network using end-to-end application traffic. Given topology dynamics and bandwidth co... This paper presents a passive monitoring mechanism, loss), nodes inference (LoNI), to identify loss), nodes in wireless sensor network using end-to-end application traffic. Given topology dynamics and bandwidth constraints, a space-efficient packet marking scheme is first introduced. The scheme uses a Bloom filter as a compression tool so that path information can bc piggybacked by data packets. Based on the path information, LoNI then adopts a fast algorithm to detect lossy nodes. The algorithm formulates the inference problem as a weighted set-cover problem and solves it using a greedy approach with low complexity. Simulations show that LoNI can locate about 80% of lossy nodes when lossy nodes are rare in the network. Furthermore, LoNI performs better for the lossy nodes near the sink or with higher loss rates. 展开更多
关键词 wireless sensor networks(WSNs) performance monitoring lossy nodes Bloom filter weighted set-cover
下载PDF
An Efficient Billing Scheme for Trusted Nodes Using Fuzzy Logic in Wireless Sensor Networks
7
作者 Mohammad M. Shurman Zaid A. Alomari Khaldoon M. Mhaidat 《Wireless Engineering and Technology》 2014年第3期62-73,共12页
Extending the lifetime of the wireless sensor networks (WSNs), where recharging sensors is not always possible, has been a major concern for researchers for the past decade. In this paper, we study the cooperation bet... Extending the lifetime of the wireless sensor networks (WSNs), where recharging sensors is not always possible, has been a major concern for researchers for the past decade. In this paper, we study the cooperation between nodes in wireless sensor networks in forwarding packets to others, and we propose a new collaboration technique which stimulates intermediate nodes to forward packets toward their destination. Some nodes show selfish behavior by denying the forwarding packets to other nodes in commercial networks in an effort to preserve their own energy. This paper applies a technique which is used to prolong the network lifetime, based on a node’s energy and trust value, and additionally incorporates fuzzy logic, which stimulates nodes to forward packets by rewarding cooperation. According to simulation results, the proposed approach surpasses the Nuglets (virtual currency) approach and the Reputation approach in network energy and thus prolongs the network lifetime. Additionally, our proposed approach demonstrates better results in the number of dropped packets, PDR and forwarded packets to neighboring nodes. 展开更多
关键词 wireless sensor network (WSN) CHARGING TRUSTED node Rewarding BILLING Cluster Area PACKET FORWARDING
下载PDF
An Algorithm for Hybrid Nodes Barrier Coverage Based on Voronoi in Wireless Sensor Networks
8
作者 Xiaochao Dang Rucang Ma +1 位作者 Zhanjun Hao Meixiu Ma 《国际计算机前沿大会会议论文集》 2017年第2期49-51,共3页
In order to make up for the deficiencies and insufficiencies that In order to make up for the deficiencies and insufficiencies that wireless sensor network is constituted absolutely by static or dynamic sensor nodes. ... In order to make up for the deficiencies and insufficiencies that In order to make up for the deficiencies and insufficiencies that wireless sensor network is constituted absolutely by static or dynamic sensor nodes. So a deployment mechanism for hybrid nodes barrier coverage (HNBC)is proposed in wireless sensor network, which collaboratively consists of static and dynamic sensor nodes. We introduced the Voronoi diagram to divide the whole deployment area. According to the principle of least square method, and the static nodes are used to construct the reference barrier line (RBL). And we implemented effectively barrier coverage by monitoring whether there is a coverage hole in the deployment area, and then to determine whether dynamic nodes need limited mobility to redeploy the monitoring area. The simulation results show that the proposed algorithm improved the coverage quality, and completed the barrier coverage with less node moving distance and lower energy consumption, and achieved the expected coverage requirements 展开更多
关键词 wireless sensor network (WSN) VORONOI DIAGRAM HYBRID node BARRIER coverage Reference BARRIER Lines (RBL) The least square method
下载PDF
A Reputation-Based AODV Protocol for Blackhole and Malfunction Nodes Detection and Avoidance
9
作者 Qussai M.Yaseen Monther Aldwairi Ahmad Manasrah 《Computers, Materials & Continua》 SCIE EI 2024年第8期1867-1888,共22页
Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their applications.Therefore,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN applic... Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their applications.Therefore,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN applications.This paper proposes an enhanced version of the AODV(Ad Hoc On-Demand Distance Vector)protocol capable of detecting blackholes and malfunctioning benign nodes in WSNs,thereby avoiding them when delivering packets.The proposed version employs a network-based reputation system to select the best and most secure path to a destination.To achieve this goal,the proposed version utilizes the Watchdogs/Pathrater mechanisms in AODV to gather and broadcast reputations to all network nodes to build the network-based reputation system.To minimize the network overhead of the proposed approach,the paper uses reputation aggregator nodes only for forwarding reputation tables.Moreover,to reduce the overhead of updating reputation tables,the paper proposes three mechanisms,which are the prompt broadcast,the regular broadcast,and the light broadcast approaches.The proposed enhanced version has been designed to perform effectively in dynamic environments such as mobile WSNs where nodes,including blackholes,move continuously,which is considered a challenge for other protocols.Using the proposed enhanced protocol,a node evaluates the security of different routes to a destination and can select the most secure routing path.The paper provides an algorithm that explains the proposed protocol in detail and demonstrates a case study that shows the operations of calculating and updating reputation values when nodes move across different zones.Furthermore,the paper discusses the proposed approach’s overhead analysis to prove the proposed enhancement’s correctness and applicability. 展开更多
关键词 AODV blackhole malfunction nodes pathrater reputation system wireless sensor networks(WSNs) watchdogs
下载PDF
A Review and Analysis of Localization Techniques in Underwater Wireless Sensor Networks 被引量:1
10
作者 Seema Rani Anju +6 位作者 Anupma Sangwan Krishna Kumar Kashif Nisar Tariq Rahim Soomro Ag.Asri Ag.Ibrahim Manoj Gupta Laxmi Chandand Sadiq Ali Khan 《Computers, Materials & Continua》 SCIE EI 2023年第6期5697-5715,共19页
In recent years,there has been a rapid growth in Underwater Wireless Sensor Networks(UWSNs).The focus of research in this area is now on solving the problems associated with large-scale UWSN.One of the major issues in... In recent years,there has been a rapid growth in Underwater Wireless Sensor Networks(UWSNs).The focus of research in this area is now on solving the problems associated with large-scale UWSN.One of the major issues in such a network is the localization of underwater nodes.Localization is required for tracking objects and detecting the target.It is also considered tagging of data where sensed contents are not found of any use without localization.This is useless for application until the position of sensed content is confirmed.This article’s major goal is to review and analyze underwater node localization to solve the localization issues in UWSN.The present paper describes various existing localization schemes and broadly categorizes these schemes as Centralized and Distributed localization schemes underwater.Also,a detailed subdivision of these localization schemes is given.Further,these localization schemes are compared from different perspectives.The detailed analysis of these schemes in terms of certain performance metrics has been discussed in this paper.At the end,the paper addresses several future directions for potential research in improving localization problems of UWSN. 展开更多
关键词 Underwater wireless sensor networks localization schemes node localization ranging algorithms estimation based prediction based
下载PDF
无线传感器网络基于测距的节点定位算法综述OverviewoftheNodeLocalizationAlgorithmBasedonRangingofWirelessSensorNetworks 被引量:1
11
作者 罗兰花 梁海英 任子亭 《科技视界》 2016年第3期27-28,共2页
基于测距的定位方法对测量的距离信息运用几何知识求解未知节点的位置,常用在定位精度较高的领域,可在误差、能耗、受环境因素影响等方面进行优化。本文对基于测距的无线传感器网络节点定位算法进行详细地分析和比较。
关键词 无线传感器网络 节点定位 三边测量法 最大似然估计法
下载PDF
Genetic-Chicken Swarm Algorithm for Minimizing Energy in Wireless Sensor Network
12
作者 A.Jameer Basha S.Aswini +2 位作者 S.Aarthini Yunyoung Nam Mohamed Abouhawwash 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1451-1466,共16页
Wireless Sensor Network(WSN)technology is the real-time applica-tion that is growing rapidly as the result of smart environments.Battery power is one of the most significant resources in WSN.For enhancing a power facto... Wireless Sensor Network(WSN)technology is the real-time applica-tion that is growing rapidly as the result of smart environments.Battery power is one of the most significant resources in WSN.For enhancing a power factor,the clustering techniques are used.During the forward of data in WSN,more power is consumed.In the existing system,it works with Load Balanced Cluster-ing Method(LBCM)and provides the lifespan of the network with scalability and reliability.In the existing system,it does not deal with end-to-end delay and deliv-ery of packets.For overcoming these issues in WSN,the proposed Genetic Algo-rithm based on Chicken Swarm Optimization(GA-CSO)with Load Balanced Clustering Method(LBCM)is used.Genetic Algorithm generates chromosomes in an arbitrary method then the chromosomes values are calculated using Fitness Function.Chicken Swarm Optimization(CSO)helps to solve the complex opti-mization problems.Also,it consists of chickens,hens,and rooster.It divides the chicken into clusters.Load Balanced Clustering Method(LBCM)maintains the energy during communication among the sensor nodes and also it balances the load in the gateways.The proposed GA-CSO with LBCM improves the life-span of the network.Moreover,it minimizes the energy consumption and also bal-ances the load over the network.The proposed method outperforms by using the following metrics such as energy efficiency,ratio of packet delivery,throughput of the network,lifetime of the sensor nodes.Therefore,the evaluation result shows the energy efficiency that has achieved 83.56%and the delivery ratio of the packet has reached 99.12%.Also,it has attained linear standard deviation and reduced the end-to-end delay as 97.32 ms. 展开更多
关键词 Energy efficiency sensor nodes chicken swarm optimization load balanced clustering method wireless sensor network cluster heads LOAD-BALANCING fitness function
下载PDF
Enhanced Security with Improved Defensive Routing Mechanism in Wireless Sensor Networks
13
作者 R.Sabitha C.Gokul Prasad S.Karthik 《Computer Systems Science & Engineering》 SCIE EI 2023年第6期2795-2810,共16页
In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of W... In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of WSNs are distributed in an intimidating region,which is non-rigid to attacks.The recent research domains of WSN deal with models to handle the WSN communications against malicious attacks and threats.In traditional models,the solution has been made for defending the networks,only to specific attacks.However,in real-time applications,the kind of attack that is launched by the adversary is not known.Additionally,on developing a security mechanism for WSN,the resource constraints of sensor nodes are also to be considered.With that note,this paper presents an Enhanced Security Model with Improved Defensive Routing Mechanism(IDRM)for defending the sensor network from various attacks.Moreover,for efficient model design,the work includes the part of feature evaluation of some general attacks of WSNs.The IDRM also includes determination of optimal secure paths and Node security for secure routing operations.The performance of the proposed model is evaluated with respect to several factors;it is found that the model has achieved better security levels and is efficient than other existing models in WSN communications.It is proven that the proposed IDRM produces 74%of PDR in average and a minimized packet drop of 38%when comparing with the existing works. 展开更多
关键词 Enhanced security model wireless sensor networks improved defensive routing mechanism secure paths node security
下载PDF
A Systematic Overview of Underwater Wireless Sensor Networks:Applications,Challenge and Research Perspectives
14
作者 Fethi Demim Rekia Bouguessa +1 位作者 Abdenebi Rouigueb Abdelkrim Nemra 《Journal of Computer Science Research》 2023年第2期52-77,共26页
Underwater Wireless Sensor Networks(UWSNs)are becoming increasingly popular in marine applications due to advances in wireless and microelectronics technology.However,UWSNs present challenges in processing,energy,and ... Underwater Wireless Sensor Networks(UWSNs)are becoming increasingly popular in marine applications due to advances in wireless and microelectronics technology.However,UWSNs present challenges in processing,energy,and memory storage due to the use of acoustic waves for communication,which results in long delays,significant power consumption,limited bandwidth,and packet loss.This paper provides a comprehensive review of the latest advancements in UWSNs,including essential services,common platforms,critical elements,and components such as localization algorithms,communication,synchronization,security,mobility,and applications.Despite significant progress,reliable and flexible solutions are needed to meet the evolving requirements of UWSNs.The purpose of this paper is to provide a framework for future research in the field of UWSNs by examining recent advancements,establishing a standard platform and service criteria,using a taxonomy to determine critical elements,and emphasizing important unresolved issues. 展开更多
关键词 wireless sensor networks Ad-hoc networks Internet of Things Localization algorithms node mobility Security mechanisms Energy-efficient communication
下载PDF
Chain-type wireless sensor network node scheduling strategy 被引量:9
15
作者 Guangzhu Chen Qingchun Meng Lei Zhang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2014年第2期203-210,共8页
In order to reduce power consumption of sensor nodes and extend network survival time in the wireless sensor network (WSN), sensor nodes are scheduled in an active or dormant mode. A chain-type WSN is fundamental y ... In order to reduce power consumption of sensor nodes and extend network survival time in the wireless sensor network (WSN), sensor nodes are scheduled in an active or dormant mode. A chain-type WSN is fundamental y different from other types of WSNs, in which the sensor nodes are deployed along elongated geographic areas and form a chain-type network topo-logy structure. This paper investigates the node scheduling prob-lem in the chain-type WSN. Firstly, a node dormant scheduling mode is analyzed theoretical y from geographic coverage, and then three neighboring nodes scheduling criteria are proposed. Sec-ondly, a hybrid coverage scheduling algorithm and dead areas are presented. Final y, node scheduling in mine tunnel WSN with uniform deployment (UD), non-uniform deployment (NUD) and op-timal distribution point spacing (ODS) is simulated. The results show that the node scheduling with UD and NUD, especial y NUD, can effectively extend the network survival time. Therefore, a strat-egy of adding a few mobile nodes which activate the network in dead areas is proposed, which can further extend the network survival time by balancing the energy consumption of nodes. 展开更多
关键词 wireless sensor network (WSN) chain-type nodescheduling network survival time mobile nodes.
下载PDF
Node deployment strategy optimization for wireless sensor network with mobile base station 被引量:7
16
作者 龙军 桂卫华 《Journal of Central South University》 SCIE EI CAS 2012年第2期453-458,共6页
The optimization of network performance in a movement-assisted data gathering scheme was studied by analyzing the energy consumption of wireless sensor network with node uniform distribution. A theoretically analytica... The optimization of network performance in a movement-assisted data gathering scheme was studied by analyzing the energy consumption of wireless sensor network with node uniform distribution. A theoretically analytical method for avoiding energy hole was proposed. It is proved that if the densities of sensor nodes working at the same time are alternate between dormancy and work with non-uniform node distribution. The efficiency of network can increase by several times and the residual energy of network is nearly zero when the network lifetime ends. 展开更多
关键词 wireless sensor network mobile base station network optimization energy consumption balancing density ratio of sensor node network lifetime
下载PDF
Design and performance analysis of wireless sensor network location node system for underground mine 被引量:10
17
作者 CHEN Guang-zhu SHEN Chun-feng ZHOU Li-juan 《Mining Science and Technology》 EI CAS 2009年第6期813-818,共6页
Aiming at the application of a wireless sensor network to locating miners in underground mine,we design a wireless sensor network location node system,considering the communication performance and the intrinsic safety... Aiming at the application of a wireless sensor network to locating miners in underground mine,we design a wireless sensor network location node system,considering the communication performance and the intrinsic safety. The location node system consists of a mobile node,several fixed nodes,and a sink node,all of whose circuits were designed based on CC2430. A varistor and a RC circuit were used in the reset circuit of a sensor node to guarantee the intrinsic safety by reducing discharge energy,the theoretical analysis of the discharge energy shows that the reset circuit is an intrinsic safety one. The analysis and simulation about the performance of the location node system are discussed,such as network communication delay and packet loss rate,the results show that the highest network communication delay of the system is about 0.11 seconds,and the highest packet loss rate is about 0.13,which assures the location node system has a high reliability,and can locate miners in the underground mine. 展开更多
关键词 wireless sensor network location node network communication delay packet loss rate
下载PDF
ANN Based Novel Approach to Detect Node Failure in Wireless Sensor Network 被引量:3
18
作者 Sundresan Perumal Mujahid Tabassum +5 位作者 Ganthan Narayana Suresh Ponnan Chinmay Chakraborty Saju Mohanan Zeeshan Basit Mohammad Tabrez Quasim 《Computers, Materials & Continua》 SCIE EI 2021年第11期1447-1462,共16页
A wireless sensor network(WSN)consists of several tiny sensor nodes to monitor,collect,and transmit the physical information from an environment through the wireless channel.The node failure is considered as one of th... A wireless sensor network(WSN)consists of several tiny sensor nodes to monitor,collect,and transmit the physical information from an environment through the wireless channel.The node failure is considered as one of the main issues in the WSN which creates higher packet drop,delay,and energy consumption during the communication.Although the node failure occurred mostly due to persistent energy exhaustion during transmission of data packets.In this paper,Artificial Neural Network(ANN)based Node Failure Detection(NFD)is developed with cognitive radio for detecting the location of the node failure.The ad hoc on-demand distance vector(AODV)routing protocol is used for transmitting the data from the source node to the base station.Moreover,the Mahalanobis distance is used for detecting an adjacent node to the node failure which is used to create the routing path without any node failure.The performance of the proposed ANN-NFD method is analysed in terms of throughput,delivery rate,number of nodes alive,drop rate,end to end delay,energy consumption,and overhead ratio.Furthermore,the performance of the ANN-NFD method is evaluated with the header to base station and base station to header(H2B2H)protocol.The packet delivery rate of the ANN-NFD method is 0.92 for 150 nodes that are high when compared to the H2B2H protocol.Hence,the ANN-NFD method provides data consistency during data transmission under node and battery failure. 展开更多
关键词 AODV artificial neural network artificial intelligence Mahalanobis distance node failure THROUGHPUT wireless sensor network
下载PDF
A Method for Node Fault Detection in Wireless Sensor Networks 被引量:3
19
作者 高志鹏 黄日茂 +1 位作者 陈颖慧 芮兰兰 《China Communications》 SCIE CSCD 2011年第1期28-34,共7页
To reduce excessive computing and communication loads of traditional fault detection methods,a neighbor-data analysis based node fault detection method is proposed.First,historical data is analyzed to confirm the conf... To reduce excessive computing and communication loads of traditional fault detection methods,a neighbor-data analysis based node fault detection method is proposed.First,historical data is analyzed to confirm the confidence level of sensor nodes.Then a node's reading data is compared with neighbor nodes' which are of good confidence level.Decision can be made whether this node is a failure or not.Simulation shows this method has good effect on fault detection accuracy and transient fault tolerance,and never transfers communication and computing overloading to sensor nodes. 展开更多
关键词 wireless sensor network fault detection neighbor nodes
下载PDF
Genetic Algorithm Based Node Deployment in Hybrid Wireless Sensor Networks 被引量:3
20
作者 Omar Banimelhem Moad Mowafi Walid Aljoby 《Communications and Network》 2013年第4期273-279,共7页
In hybrid wireless sensor networks composed of both static and mobile sensor nodes, the random deployment of stationary nodes may cause coverage holes in the sensing field. Hence, mobile sensor nodes are added after t... In hybrid wireless sensor networks composed of both static and mobile sensor nodes, the random deployment of stationary nodes may cause coverage holes in the sensing field. Hence, mobile sensor nodes are added after the initial deployment to overcome the coverage holes problem. To achieve optimal coverage, an efficient algorithm should be employed to find the best positions of the additional mobile nodes. This paper presents a genetic algorithm that searches for an optimal or near optimal solution to the coverage holes problem. The proposed algorithm determines the minimum number and the best locations of the mobile nodes that need to be added after the initial deployment of the stationary nodes. The performance of the genetic algorithm was evaluated using several metrics, and the simulation results demonstrated that the proposed algorithm can optimize the network coverage in terms of the overall coverage ratio and the number of additional mobile nodes. 展开更多
关键词 TARGET COVERAGE node DEPLOYMENT GENETIC Algorithm wireless sensor networks
下载PDF
上一页 1 2 144 下一页 到第
使用帮助 返回顶部