期刊文献+
共找到3,267篇文章
< 1 2 164 >
每页显示 20 50 100
Genetic Algorithm Based Node Deployment in Hybrid Wireless Sensor Networks 被引量:3
1
作者 Omar Banimelhem Moad Mowafi Walid Aljoby 《Communications and Network》 2013年第4期273-279,共7页
In hybrid wireless sensor networks composed of both static and mobile sensor nodes, the random deployment of stationary nodes may cause coverage holes in the sensing field. Hence, mobile sensor nodes are added after t... In hybrid wireless sensor networks composed of both static and mobile sensor nodes, the random deployment of stationary nodes may cause coverage holes in the sensing field. Hence, mobile sensor nodes are added after the initial deployment to overcome the coverage holes problem. To achieve optimal coverage, an efficient algorithm should be employed to find the best positions of the additional mobile nodes. This paper presents a genetic algorithm that searches for an optimal or near optimal solution to the coverage holes problem. The proposed algorithm determines the minimum number and the best locations of the mobile nodes that need to be added after the initial deployment of the stationary nodes. The performance of the genetic algorithm was evaluated using several metrics, and the simulation results demonstrated that the proposed algorithm can optimize the network coverage in terms of the overall coverage ratio and the number of additional mobile nodes. 展开更多
关键词 TARGET COVERAGE node deployment GENETIC Algorithm wireless sensor networks
下载PDF
Survey on node deployment in wireless sensor networks
2
作者 王正杰 钱旭 +2 位作者 张计芬 赵媛 郭银景 《Journal of Measurement Science and Instrumentation》 CAS 2012年第1期80-84,共5页
Node deployment strategy plays an important role in wireless sensor networks(WSNs)application because it determines the coverage,connectivity and network lifetime of WSNs.This paper reports the current research on the... Node deployment strategy plays an important role in wireless sensor networks(WSNs)application because it determines the coverage,connectivity and network lifetime of WSNs.This paper reports the current research on the optimization means for achieving the desirable design goals in various applications.We categorize the placements strategies into are the static and the dynamic according to whether the node position change after the network is operational.The coverage,connectivity and energy consumption of WSNs are analysed and discussed in detail. 展开更多
关键词 node deployment wireless sensor networks COVERAGE energy consumption
下载PDF
On Energy-Efficient Node Deployment in Wireless Sensor Networks
3
作者 Hui WANG KeZhong LU XiaoHui LIN 《International Journal of Communications, Network and System Sciences》 2008年第3期241-245,共5页
In wireless sensor networks, sensor nodes collect local data and transfer to the base station often relayed by other nodes. If deploying sensor nodes evenly, sensor nodes nearer to the base station will consume more e... In wireless sensor networks, sensor nodes collect local data and transfer to the base station often relayed by other nodes. If deploying sensor nodes evenly, sensor nodes nearer to the base station will consume more energy and use up their energy faster that reduces system lifetime. By analyzing energy consumption, a density formula of deploying nodes is proposed. The ratio of whole energy of sensor nodes to energy consumption speed of sensor nodes in every area can get consistent if deploying nodes by the density formula, therefore system lifetime is prolonged. Analysis and simulation results show that when communication dominates whole energy consumption and the monitored region is big compared with radio range of sensor node, system lifetime under this scheme can be 3R/(2t) times of that under deploying nodes evenly, where R is radius of the monitored region and t is radio range of sensor node. 展开更多
关键词 wireless sensor networks sensor node Deploying node
下载PDF
A blockchain-empowered authentication scheme for worm detection in wireless sensor network
4
作者 Yuling Chen Xiong Yang +2 位作者 Tao Li Yi Ren Yangyang Long 《Digital Communications and Networks》 SCIE CSCD 2024年第2期265-272,共8页
Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and self-management.The special structure of WSN brings both convenience and vulnerability.For... Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and self-management.The special structure of WSN brings both convenience and vulnerability.For example,a malicious participant can launch attacks by capturing a physical device.Therefore,node authentication that can resist malicious attacks is very important to network security.Recently,blockchain technology has shown the potential to enhance the security of the Internet of Things(IoT).In this paper,we propose a Blockchain-empowered Authentication Scheme(BAS)for WSN.In our scheme,all nodes are managed by utilizing the identity information stored on the blockchain.Besides,the simulation experiment about worm detection is executed on BAS,and the security is evaluated from detection and infection rate.The experiment results indicate that the proposed scheme can effectively inhibit the spread and infection of worms in the network. 展开更多
关键词 wireless sensor Network(WSN) node authentication Blockchain TANGLE Worm detection
下载PDF
A Review and Analysis of Localization Techniques in Underwater Wireless Sensor Networks 被引量:1
5
作者 Seema Rani Anju +6 位作者 Anupma Sangwan Krishna Kumar Kashif Nisar Tariq Rahim Soomro Ag.Asri Ag.Ibrahim Manoj Gupta Laxmi Chandand Sadiq Ali Khan 《Computers, Materials & Continua》 SCIE EI 2023年第6期5697-5715,共19页
In recent years,there has been a rapid growth in Underwater Wireless Sensor Networks(UWSNs).The focus of research in this area is now on solving the problems associated with large-scale UWSN.One of the major issues in... In recent years,there has been a rapid growth in Underwater Wireless Sensor Networks(UWSNs).The focus of research in this area is now on solving the problems associated with large-scale UWSN.One of the major issues in such a network is the localization of underwater nodes.Localization is required for tracking objects and detecting the target.It is also considered tagging of data where sensed contents are not found of any use without localization.This is useless for application until the position of sensed content is confirmed.This article’s major goal is to review and analyze underwater node localization to solve the localization issues in UWSN.The present paper describes various existing localization schemes and broadly categorizes these schemes as Centralized and Distributed localization schemes underwater.Also,a detailed subdivision of these localization schemes is given.Further,these localization schemes are compared from different perspectives.The detailed analysis of these schemes in terms of certain performance metrics has been discussed in this paper.At the end,the paper addresses several future directions for potential research in improving localization problems of UWSN. 展开更多
关键词 Underwater wireless sensor networks localization schemes node localization ranging algorithms estimation based prediction based
下载PDF
无线传感器网络基于测距的节点定位算法综述OverviewoftheNodeLocalizationAlgorithmBasedonRangingofWirelessSensorNetworks 被引量:1
6
作者 罗兰花 梁海英 任子亭 《科技视界》 2016年第3期27-28,共2页
基于测距的定位方法对测量的距离信息运用几何知识求解未知节点的位置,常用在定位精度较高的领域,可在误差、能耗、受环境因素影响等方面进行优化。本文对基于测距的无线传感器网络节点定位算法进行详细地分析和比较。
关键词 无线传感器网络 节点定位 三边测量法 最大似然估计法
下载PDF
Enhanced Security with Improved Defensive Routing Mechanism in Wireless Sensor Networks
7
作者 R.Sabitha C.Gokul Prasad S.Karthik 《Computer Systems Science & Engineering》 SCIE EI 2023年第6期2795-2810,共16页
In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of W... In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of WSNs are distributed in an intimidating region,which is non-rigid to attacks.The recent research domains of WSN deal with models to handle the WSN communications against malicious attacks and threats.In traditional models,the solution has been made for defending the networks,only to specific attacks.However,in real-time applications,the kind of attack that is launched by the adversary is not known.Additionally,on developing a security mechanism for WSN,the resource constraints of sensor nodes are also to be considered.With that note,this paper presents an Enhanced Security Model with Improved Defensive Routing Mechanism(IDRM)for defending the sensor network from various attacks.Moreover,for efficient model design,the work includes the part of feature evaluation of some general attacks of WSNs.The IDRM also includes determination of optimal secure paths and Node security for secure routing operations.The performance of the proposed model is evaluated with respect to several factors;it is found that the model has achieved better security levels and is efficient than other existing models in WSN communications.It is proven that the proposed IDRM produces 74%of PDR in average and a minimized packet drop of 38%when comparing with the existing works. 展开更多
关键词 Enhanced security model wireless sensor networks improved defensive routing mechanism secure paths node security
下载PDF
Hybrid Power Bank Deployment Model for Energy Supply Coverage Optimization in Industrial Wireless Sensor Network
8
作者 Hang Yang Xunbo Li Witold Pedrycz 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期1531-1551,共21页
Energy supply is one of the most critical challenges of wireless sensor networks(WSNs)and industrial wireless sensor networks(IWSNs).While research on coverage optimization problem(COP)centers on the network’s monito... Energy supply is one of the most critical challenges of wireless sensor networks(WSNs)and industrial wireless sensor networks(IWSNs).While research on coverage optimization problem(COP)centers on the network’s monitoring coverage,this research focuses on the power banks’energy supply coverage.The study of 2-D and 3-D spaces is typical in IWSN,with the realistic environment being more complex with obstacles(i.e.,machines).A 3-D surface is the field of interest(FOI)in this work with the established hybrid power bank deployment model for the energy supply COP optimization of IWSN.The hybrid power bank deployment model is highly adaptive and flexible for new or existing plants already using the IWSN system.The model improves the power supply to a more considerable extent with the least number of power bank deployments.The main innovation in this work is the utilization of a more practical surface model with obstacles and training while improving the convergence speed and quality of the heuristic algorithm.An overall probabilistic coverage rate analysis of every point on the FOI is provided,not limiting the scope to target points or areas.Bresenham’s algorithm is extended from 2-D to 3-D surface to enhance the probabilistic covering model for coverage measurement.A dynamic search strategy(DSS)is proposed to modify the artificial bee colony(ABC)and balance the exploration and exploitation ability for better convergence toward eliminating NP-hard deployment problems.Further,the cellular automata(CA)is utilized to enhance the convergence speed.The case study based on two typical FOI in the IWSN shows that the CA scheme effectively speeds up the optimization process.Comparative experiments are conducted on four benchmark functions to validate the effectiveness of the proposed method.The experimental results show that the proposed algorithm outperforms the ABC and gbest-guided ABC(GABC)algorithms.The results show that the proposed energy coverage optimization method based on the hybrid power bank deployment model generates more accurate results than the results obtained by similar algorithms(i.e.,ABC,GABC).The proposed model is,therefore,effective and efficient for optimization in the IWSN. 展开更多
关键词 Industrial wireless sensor network hybrid power bank deployment model:energy supply coverage optimization artificial bee colony algorithm radio frequency numerical function optimization
下载PDF
A Systematic Overview of Underwater Wireless Sensor Networks:Applications,Challenge and Research Perspectives
9
作者 Fethi Demim Rekia Bouguessa +1 位作者 Abdenebi Rouigueb Abdelkrim Nemra 《Journal of Computer Science Research》 2023年第2期52-77,共26页
Underwater Wireless Sensor Networks(UWSNs)are becoming increasingly popular in marine applications due to advances in wireless and microelectronics technology.However,UWSNs present challenges in processing,energy,and ... Underwater Wireless Sensor Networks(UWSNs)are becoming increasingly popular in marine applications due to advances in wireless and microelectronics technology.However,UWSNs present challenges in processing,energy,and memory storage due to the use of acoustic waves for communication,which results in long delays,significant power consumption,limited bandwidth,and packet loss.This paper provides a comprehensive review of the latest advancements in UWSNs,including essential services,common platforms,critical elements,and components such as localization algorithms,communication,synchronization,security,mobility,and applications.Despite significant progress,reliable and flexible solutions are needed to meet the evolving requirements of UWSNs.The purpose of this paper is to provide a framework for future research in the field of UWSNs by examining recent advancements,establishing a standard platform and service criteria,using a taxonomy to determine critical elements,and emphasizing important unresolved issues. 展开更多
关键词 wireless sensor networks Ad-hoc networks Internet of Things Localization algorithms node mobility Security mechanisms Energy-efficient communication
下载PDF
Node deployment strategy optimization for wireless sensor network with mobile base station 被引量:7
10
作者 龙军 桂卫华 《Journal of Central South University》 SCIE EI CAS 2012年第2期453-458,共6页
The optimization of network performance in a movement-assisted data gathering scheme was studied by analyzing the energy consumption of wireless sensor network with node uniform distribution. A theoretically analytica... The optimization of network performance in a movement-assisted data gathering scheme was studied by analyzing the energy consumption of wireless sensor network with node uniform distribution. A theoretically analytical method for avoiding energy hole was proposed. It is proved that if the densities of sensor nodes working at the same time are alternate between dormancy and work with non-uniform node distribution. The efficiency of network can increase by several times and the residual energy of network is nearly zero when the network lifetime ends. 展开更多
关键词 wireless sensor network mobile base station network optimization energy consumption balancing density ratio of sensor node network lifetime
下载PDF
A Method for Node Fault Detection in Wireless Sensor Networks 被引量:3
11
作者 高志鹏 黄日茂 +1 位作者 陈颖慧 芮兰兰 《China Communications》 SCIE CSCD 2011年第1期28-34,共7页
To reduce excessive computing and communication loads of traditional fault detection methods,a neighbor-data analysis based node fault detection method is proposed.First,historical data is analyzed to confirm the conf... To reduce excessive computing and communication loads of traditional fault detection methods,a neighbor-data analysis based node fault detection method is proposed.First,historical data is analyzed to confirm the confidence level of sensor nodes.Then a node's reading data is compared with neighbor nodes' which are of good confidence level.Decision can be made whether this node is a failure or not.Simulation shows this method has good effect on fault detection accuracy and transient fault tolerance,and never transfers communication and computing overloading to sensor nodes. 展开更多
关键词 wireless sensor network fault detection neighbor nodes
下载PDF
A Clustering-tree Topology Control Based on the Energy Forecast for Heterogeneous Wireless Sensor Networks 被引量:7
12
作者 Zhen Hong Rui Wang Xile Li 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI 2016年第1期68-77,共10页
How to design an energy-efficient algorithm to maximize the network lifetime in complicated scenarios is a critical problem for heterogeneous wireless sensor networks (HWSN). In this paper, a clustering-tree topology ... How to design an energy-efficient algorithm to maximize the network lifetime in complicated scenarios is a critical problem for heterogeneous wireless sensor networks (HWSN). In this paper, a clustering-tree topology control algorithm based on the energy forecast (CTEF) is proposed for saving energy and ensuring network load balancing, while considering the link quality, packet loss rate, etc. In CTEF, the average energy of the network is accurately predicted per round (the lifetime of the network is denoted by rounds) in terms of the difference between the ideal and actual average residual energy using central limit theorem and normal distribution mechanism, simultaneously. On this basis, cluster heads are selected by cost function (including the energy, link quality and packet loss rate) and their distance. The non-cluster heads are determined to join the cluster through the energy, distance and link quality. Furthermore, several non-cluster heads in each cluster are chosen as the relay nodes for transmitting data through multi-hop communication to decrease the load of each cluster-head and prolong the lifetime of the network. The simulation results show the efficiency of CTEF. Compared with low-energy adaptive clustering hierarchy (LEACH), energy dissipation forecast and clustering management (EDFCM) and efficient and dynamic clustering scheme (EDCS) protocols, CTEF has longer network lifetime and receives more data packets at base station. © 2014 Chinese Association of Automation. 展开更多
关键词 ALGORITHMS Clustering algorithms Cost functions Energy dissipation Energy efficiency Forecasting Information management Low power electronics Network management Normal distribution Packet loss Quality control Telecommunication networks TOPOLOGY Trees (mathematics)
下载PDF
Grid-Based Localization Mechanism with Mobile Reference Node in Wireless Sensor Networks 被引量:1
13
作者 Kuo-Feng Huang Po-Ju Chen Emery Jou 《Journal of Electronic Science and Technology》 CAS 2014年第3期283-287,共5页
Wireless sensor networks (WSNs) are based on monitoring or managing the sensing area by using the location information with sensor nodes. Most sensor nodes require hardware support or receive packets with location i... Wireless sensor networks (WSNs) are based on monitoring or managing the sensing area by using the location information with sensor nodes. Most sensor nodes require hardware support or receive packets with location information to estimate their locations, which needs lots of time or costs. In this paper we proposed a localization mechanism using a mobile reference node (MRN) and trilateration in WSNs to reduce the energy consumption and location error. The simulation results demonstrate that the proposed mechanism can obtain more unknown nodes locations by the mobile reference node moving scheme and will decreases the energy consumption and average ocation error. 展开更多
关键词 LOCALIZATION mobile sensor node received signal strength indicator wireless sensor networks
下载PDF
Node cooperation based location secure verification algorithm in wireless sensor networks localization 被引量:2
14
作者 唐弢 Guo Qing +1 位作者 Li Hanqing Peng Bao 《High Technology Letters》 EI CAS 2012年第4期376-381,共6页
For the application of wireless sensor networks in the military field, one of the main challenges is security. To solve the problem of verifying the location claim for a node, a new location verifica- tion algorithm c... For the application of wireless sensor networks in the military field, one of the main challenges is security. To solve the problem of verifying the location claim for a node, a new location verifica- tion algorithm called node cooperation based location secure verification (NCBLSV) algorithm is proposed. NCBLSV could verify malicious nodes by contrasting neighbor nodes and nodes under beam width angle using an adaptive array antenna at a base point. Simulation experiments are con- ducted to evaluate the performance of this algorithm by varying the communication range and the an- tenna beam width angle. Results show that NCBLSV algorithm has high probability of successful ma- licious nodes detection and low probability of false nodes detection. Thus, it is proved that the NCBLSV algorithm is useful and necessary in the wireless sensor networks security. 展开更多
关键词 wireless sensor networks WSNs) node localization SECURE position verifica-tion adaptive array antenna
下载PDF
Cluster Based Secure Dynamic Keying Technique for Heterogeneous Mobile Wireless Sensor Networks 被引量:1
15
作者 Thiruppathy Kesavan.V Radhakrishnan.S 《China Communications》 SCIE CSCD 2016年第6期178-194,共17页
In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or... In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or cluster member. This causes the cluster or the whole network to be controlled by the malicious nodes. To offer high level of security, the mobile sensor nodes need to be authenticated. Further, clustering of nodes improves scalability, energy efficient routing and data delivery. In this paper, we propose a cluster based secure dynamic keying technique to authenticate the nodes during mobility. The nodes with high configuration are chosen as cluster heads based on the weight value which is estimated using parameters such as the node degree, average distance, node's average speed, and virtual battery power. The keys are dynamically generated and used for providing security. Even the keys are compromised by the attackers, they are not able to use the previous keys to cheat or disuse the authenticated nodes. In addition, a bidirectional malicious node detection technique is employed which eliminates the malicious node from the network. By simulation, it is proved that the proposed technique provides efficient security with reduced energy consumption during node mobility. 展开更多
关键词 CLUSTER dynamic key heterogeneous MOBILITY wireless sensor network WEIGHT
下载PDF
A Malicious and Malfunctioning Node Detection Scheme for Wireless Sensor Networks 被引量:3
16
作者 Seo Hyun Oh Chan O. Hong Yoon Hwa Choi 《Wireless Sensor Network》 2012年第3期84-90,共7页
Wireless sensor networks are often used to monitor physical and environmental conditions in various regions where human access is limited. Due to limited resources and deployment in hostile environment, they are vulne... Wireless sensor networks are often used to monitor physical and environmental conditions in various regions where human access is limited. Due to limited resources and deployment in hostile environment, they are vulnerable to faults and malicious attacks. The sensor nodes affected or compromised can send erroneous data or misleading reports to base station. Hence identifying malicious and faulty nodes in an accurate and timely manner is important to provide reliable functioning of the networks. In this paper, we present a malicious and malfunctioning node detection scheme using dual-weighted trust evaluation in a hierarchical sensor network. Malicious nodes are effectively detected in the presence of natural faults and noise without sacrificing fault-free nodes. Simulation results show that the proposed scheme outperforms some existing schemes in terms of mis-detection rate and event detection accuracy, while maintaining comparable performance in malicious node detection rate and false alarm rate. 展开更多
关键词 wireless sensor networks FAULT DETECTION MALICIOUS node DETECTION
下载PDF
Neighbor-Based Malicious Node Detection in Wireless Sensor Networks 被引量:2
17
作者 Sung-Jib Yim Yoon-Hwa Choi 《Wireless Sensor Network》 2012年第9期219-225,共7页
The primary function of wireless sensor networks is to gather sensor data from the monitored area. Due to faults or malicious nodes, however, the sensor data collected or reported might be wrong. Hence it is important... The primary function of wireless sensor networks is to gather sensor data from the monitored area. Due to faults or malicious nodes, however, the sensor data collected or reported might be wrong. Hence it is important to detect events in the presence of wrong sensor readings and misleading reports. In this paper, we present a neighbor-based malicious node detection scheme for wireless sensor networks. Malicious nodes are modeled as faulty nodes behaving intelligently to lead to an incorrect decision or energy depletion without being easily detected. Each sensor node makes a decision on the fault status of itself and its neighboring nodes based on the sensor readings. Most erroneous readings due to transient faults are corrected by filtering, while nodes with permanent faults are removed using confidence-level evaluation, to improve malicious node detection rate and event detection accuracy. Each node maintains confidence levels of itself and its neighbors, indicating the track records in reporting past events correctly. Computer simulation shows that most of the malicious nodes reporting against their own readings are correctly detected unless they behave similar to the normal nodes. As a result, high event detection accuracy is also maintained while achieving low false alarm rate. 展开更多
关键词 wireless sensor networks MALICIOUS nodeS Faults Neighbor-Based Detection
下载PDF
Wireless sensor networks in relic protection:deployment methodology and cross-layer design 被引量:1
18
作者 李栋 《High Technology Letters》 EI CAS 2009年第1期59-64,共6页
This paper describes the deployment optimization technology and the cross-layer design of a surveil-lance WSN system applied in relic protection.Facing the typical technical challenges in the applicationcontext of rel... This paper describes the deployment optimization technology and the cross-layer design of a surveil-lance WSN system applied in relic protection.Facing the typical technical challenges in the applicationcontext of relic protection,we firstly propose a deployment technology based on ant colony optimization al-gorithm(DT-ACO)to overcome the difficulties in communication connectivity and sensing coverage.Meanwhile,DT-ACO minimizes the overall cost of the system as much as possible.Secondly we proposea novel power-aware cross-layer scheme(PACS)to facilitate adjustable system lifetime and surveillanceaccuracy.The performance analysis shows that we achieve lower device cost,significant extension of thesystem lifetime and improvement on the data delivery rate compared with the traditional methods. 展开更多
关键词 wireless sensor network deployment algorithm cross-layer design
下载PDF
Energy-Efficient Area Coverage in Heterogeneous Energy Wireless Sensor Networks 被引量:1
19
作者 Yingchi Mao Xiaofang Li Feng Xu 《Wireless Sensor Network》 2010年第10期768-776,共9页
Sensing coverage and energy consumption are two primary issues in wireless sensor networks. Sensing coverage is closely related to network energy consumption. The performance of a sensor network depends to a large ext... Sensing coverage and energy consumption are two primary issues in wireless sensor networks. Sensing coverage is closely related to network energy consumption. The performance of a sensor network depends to a large extent on the sensing coverage, and its lifetime is determined by its energy consumption. In this paper, an energy-efficient Area Coverage protocol for Heterogeneous Energy sensor networks (ACHE) is proposed. ACHE can achieve a good performance in terms of sensing area coverage, lifetime by minimizing energy consumption for control overhead, and balancing the energy load among all nodes. Adopting the hierarchical clustering idea, ACHE selects the active nodes based on the average residual energy of neighboring nodes and its own residual energy parameters. Our simulation demonstrates that ACHE not only provide the high quality of sensing coverage, but also has the good performance in the energy efficiency. In addition, ACHE can better adapt the applications with the great heterogeneous energy capacities in the sensor networks, as well as effectively reduce the control overhead. 展开更多
关键词 wireless sensor networks Area COVERAGE heterogeneous Energy Location-Independent
下载PDF
Novel routing protocol for heterogeneous wireless sensor networks
20
作者 李晓阳 Henry ShiLi 宋玮 《Journal of Beijing Institute of Technology》 EI CAS 2011年第3期403-409,共7页
An improved LEACH for heterogeneous wireless sensor networks is proposed. Nodes are distributed in a sensing area that is divided into a number of same equilateral hexagons. Heterogeneous nodes act as the cluster head... An improved LEACH for heterogeneous wireless sensor networks is proposed. Nodes are distributed in a sensing area that is divided into a number of same equilateral hexagons. Heterogeneous nodes act as the cluster heads and ordinary nodes act as those cluster sensors in all clusters. The structure of WSNs is a two-layer structure. The upper layer consists of all cluster heads and the lower layer consists of all ordinary sensors managed by their corresponding cluster heads. The cluster heads and the ordinary sensors establish their pairwise keys respectively through utilizing different methods. The arithmetic balances energy expense among all kinds of nodes, saves the node energy, and prolongs the life of wireless sensor networks. Additionally, Analysis demonstrates that the security of wireless sensor networks has been improved obviously even with some heterogeneous nodes. 展开更多
关键词 heterogeneous wireless sensor network ROUTING pairwise key ENERGY SECURITY
下载PDF
上一页 1 2 164 下一页 到第
使用帮助 返回顶部