The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initiall...The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initially built a power IoT architecture comprising a perception,network,and platform application layer.However,owing to the structural complexity of the power system,the construction of the power IoT continues to face problems such as complex access management of massive heterogeneous equipment,diverse IoT protocol access methods,high concurrency of network communications,and weak data security protection.To address these issues,this study optimizes the existing architecture of the power IoT and designs an integrated management framework for the access of multi-source heterogeneous data in the power IoT,comprising cloud,pipe,edge,and terminal parts.It further reviews and analyzes the key technologies involved in the power IoT,such as the unified management of the physical model,high concurrent access,multi-protocol access,multi-source heterogeneous data storage management,and data security control,to provide a more flexible,efficient,secure,and easy-to-use solution for multi-source heterogeneous data access in the power IoT.展开更多
The vehicular sensor network (VSN) is an important part of intelligent transportation, which is used for real-timedetection and operation control of vehicles and real-time transmission of data and information. In the ...The vehicular sensor network (VSN) is an important part of intelligent transportation, which is used for real-timedetection and operation control of vehicles and real-time transmission of data and information. In the environmentofVSN, massive private data generated by vehicles are transmitted in open channels and used by other vehicle users,so it is crucial to maintain high transmission efficiency and high confidentiality of data. To deal with this problem, inthis paper, we propose a heterogeneous fault-tolerant aggregate signcryption scheme with an equality test (HFTASET).The scheme combines fault-tolerant and aggregate signcryption,whichnot onlymakes up for the deficiency oflow security of aggregate signature, but alsomakes up for the deficiency that aggregate signcryption cannot tolerateinvalid signature. The scheme supports one verification pass when all signcryptions are valid, and it supportsunbounded aggregation when the total number of signcryptions grows dynamically. In addition, this schemesupports heterogeneous equality test, and realizes the access control of private data in different cryptographicenvironments, so as to achieve flexibility in the application of our scheme and realize the function of quick searchof plaintext or ciphertext. Then, the security of HFTAS-ET is demonstrated by strict theoretical analysis. Finally, weconduct strict and standardized experimental operation and performance evaluation, which shows that the schemehas better performance.展开更多
Data fusion can effectively process multi-sensor information to obtain more accurate and reliable results than a single sensor.The data of water quality in the environment comes from different sensors,thus the data mu...Data fusion can effectively process multi-sensor information to obtain more accurate and reliable results than a single sensor.The data of water quality in the environment comes from different sensors,thus the data must be fused.In our research,self-adaptive weighted data fusion method is used to respectively integrate the data from the PH value,temperature,oxygen dissolved and NH3 concentration of water quality environment.Based on the fusion,the Grubbs method is used to detect the abnormal data so as to provide data support for estimation,prediction and early warning of the water quality.展开更多
In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or...In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or cluster member. This causes the cluster or the whole network to be controlled by the malicious nodes. To offer high level of security, the mobile sensor nodes need to be authenticated. Further, clustering of nodes improves scalability, energy efficient routing and data delivery. In this paper, we propose a cluster based secure dynamic keying technique to authenticate the nodes during mobility. The nodes with high configuration are chosen as cluster heads based on the weight value which is estimated using parameters such as the node degree, average distance, node's average speed, and virtual battery power. The keys are dynamically generated and used for providing security. Even the keys are compromised by the attackers, they are not able to use the previous keys to cheat or disuse the authenticated nodes. In addition, a bidirectional malicious node detection technique is employed which eliminates the malicious node from the network. By simulation, it is proved that the proposed technique provides efficient security with reduced energy consumption during node mobility.展开更多
Aimed at the problem of unbalanced energy existed in sensor networks, the clustered method is employed to enhance the efficient utilization of limited energy resources of the deployed sensor nodes. In this paper, we d...Aimed at the problem of unbalanced energy existed in sensor networks, the clustered method is employed to enhance the efficient utilization of limited energy resources of the deployed sensor nodes. In this paper, we describe the network lifetime as a function of the communication and data aggregation energy consumption and analyze the lifetime of different transmission schemes in the homogeneous and heterogeneous sensor networks. The analysis carried out in this paper can provide the guidelines for network deployment and protocol design in the future applications.展开更多
Sensing coverage and energy consumption are two primary issues in wireless sensor networks. Sensing coverage is closely related to network energy consumption. The performance of a sensor network depends to a large ext...Sensing coverage and energy consumption are two primary issues in wireless sensor networks. Sensing coverage is closely related to network energy consumption. The performance of a sensor network depends to a large extent on the sensing coverage, and its lifetime is determined by its energy consumption. In this paper, an energy-efficient Area Coverage protocol for Heterogeneous Energy sensor networks (ACHE) is proposed. ACHE can achieve a good performance in terms of sensing area coverage, lifetime by minimizing energy consumption for control overhead, and balancing the energy load among all nodes. Adopting the hierarchical clustering idea, ACHE selects the active nodes based on the average residual energy of neighboring nodes and its own residual energy parameters. Our simulation demonstrates that ACHE not only provide the high quality of sensing coverage, but also has the good performance in the energy efficiency. In addition, ACHE can better adapt the applications with the great heterogeneous energy capacities in the sensor networks, as well as effectively reduce the control overhead.展开更多
An improved LEACH for heterogeneous wireless sensor networks is proposed. Nodes are distributed in a sensing area that is divided into a number of same equilateral hexagons. Heterogeneous nodes act as the cluster head...An improved LEACH for heterogeneous wireless sensor networks is proposed. Nodes are distributed in a sensing area that is divided into a number of same equilateral hexagons. Heterogeneous nodes act as the cluster heads and ordinary nodes act as those cluster sensors in all clusters. The structure of WSNs is a two-layer structure. The upper layer consists of all cluster heads and the lower layer consists of all ordinary sensors managed by their corresponding cluster heads. The cluster heads and the ordinary sensors establish their pairwise keys respectively through utilizing different methods. The arithmetic balances energy expense among all kinds of nodes, saves the node energy, and prolongs the life of wireless sensor networks. Additionally, Analysis demonstrates that the security of wireless sensor networks has been improved obviously even with some heterogeneous nodes.展开更多
Heterogeneous wireless sensor network( HWSN) is composed of different functional nodes and is widely applied. With the deployment in hostile environment,the secure problem of HWSN is of great importance; moreover,it b...Heterogeneous wireless sensor network( HWSN) is composed of different functional nodes and is widely applied. With the deployment in hostile environment,the secure problem of HWSN is of great importance; moreover,it becomes complex due to the mutual characteristics of sensor nodes in HWSN. In order to enhance the network security,an asymmetric key pre-distributed management scheme for HWSN is proposed combining with authentication process to further ensure the network security; meanwhile,an effective authentication method for newly added nodes is presented. Simulation result indicates that the proposed scheme can improve the network security while reducing the storage space requirement efficiently.展开更多
L-SYNC is a synchronization protocol for Wireless Sensor Networks which is based on larger degree clustering providing efficiency in homogeneous topologies. In L-SYNC, the effectiveness of the routing algorithm for th...L-SYNC is a synchronization protocol for Wireless Sensor Networks which is based on larger degree clustering providing efficiency in homogeneous topologies. In L-SYNC, the effectiveness of the routing algorithm for the synchronization precision of two remote nodes was considered. Clustering in L-SYNC is according to larger degree techniques. These techniques reduce cluster overlapping, resulting in the routing algorithm requiring fewer hops to move from one cluster to another remote cluster. Even though L-SYNC offers higher precision compared to other algorithms, it does not support heterogeneous topologies and its synchronization algorithm can be influenced by unreliable data. In this paper, we present the L-SYNCng (L-SYNC next generation) protocol, working in heterogeneous topologies. Our proposed protocol is scalable in unreliable and noisy environments. Simulation results illustrate that L-SYNCng has better precision in synchronization and scalability.展开更多
Heterogeneous wireless sensor networks(HWSNs)are vulnerable to malware propagation,because of their low configuration and weak defense mechanism.Therefore,an optimality system for HWSNs is developed to suppress malwar...Heterogeneous wireless sensor networks(HWSNs)are vulnerable to malware propagation,because of their low configuration and weak defense mechanism.Therefore,an optimality system for HWSNs is developed to suppress malware propagation in this paper.Firstly,a heterogeneous-susceptible-exposed-infectious-recovered-susceptible(HSEIRS)model is proposed to describe the state dynamics of heterogeneous sensor nodes(HSNs)in HWSNs.Secondly,the existence of an optimal control problem with installing antivirus on HSNs to minimize the sum of the cumulative infection probabilities of HWSNs at a low cost based on the HSEIRS model is proved,and then an optimal control strategy for the problem is derived by the optimal control theory.Thirdly,the optimal control strategy based on the HSEIRS model is transformed into corresponding Hamiltonian by the Pontryagin’s minimum principle,and the corresponding optimality system is derived.Finally,the effectiveness of the optimality system is validated by the experimental simulations,and the results show that the infectious HSNs will fall to an extremely low level at a low cost.展开更多
Sensor nodes are mainly shielded in the field with limited power supply. In Wireless Sensor Networks, there must be a requirement of an efficient power management, because sensor nodes are deployed in unman attended a...Sensor nodes are mainly shielded in the field with limited power supply. In Wireless Sensor Networks, there must be a requirement of an efficient power management, because sensor nodes are deployed in unman attended area with non-rechargeable batteries. Power management can be done by different methods of routing protocols. The proposed Reliable Rim Routing (3R) technique is based on hybrid routing protocol for homogeneous and heterogeneous system for WSNs to ameliorate the performance of the overall system. In 3R, total node deployment area can be multipart in terms of rim and in each rim, and some of the sensor nodes transmit their sensed data directly to base station, and meanwhile remaining sensor nodes send the data through clustering technique to base station like SEP. Proposed 3R technique implementation proves its enhanced WSNs lifetime of 70% energy consumption and 40% throughput compared with existing protocols. Simulation and evaluation results outperformed in terms of energy consumption with increased throughput and network lifetime.展开更多
Heterogeneous traffic conditions prevail in developing countries. Vehicles maintain weak lane discipline which increases lateral interactions of vehicles significantly. It is necessary to study these interactions in t...Heterogeneous traffic conditions prevail in developing countries. Vehicles maintain weak lane discipline which increases lateral interactions of vehicles significantly. It is necessary to study these interactions in the form of maintained lateral gaps for modeling this traffic scenario. This paper aims at determining lateral clearances maintained by different vehicle types while moving in a heterogeneous traffic stream during overtaking. These data were collected using an instrumented vehicle which runs as a part of the stream. Variation of obtained clearance with average speed of interacting vehicles is studied and modeled. Different instrumented vehicles of various types are developed using (1) ultrasonic sensors fixed on both sides of vehicle, which provide inter-vehicular lateral distance and relative speed; and (2) GPS device with cameras, which provides vehicle type and speed of interacting vehicles. They are driven on different roads in six cities of India, to measure lateral gaps maintained with different interacting vehicles at different speeds. Relationships between lateral gaps and speed are modeled as regression lines with positive slopes and beta-distributed residuals. Nature of these graphs (i.e., slopes, intercepts, residuals) are also evaluated and compared for different interacting vehicle-type pairs. It is observed that similar vehicle pairs maintain less lateral clearance than dissimilar vehicle pairs. If a vehicle interacts with two vehicles (one on each side) simultaneously, lateral clearance is reduced and safety of the vehicles is compromised. The obtained relationships can be used for simulating lateral clearance maintaining behavior of vehicles in heterogeneous traffic.展开更多
A great number of sensor technologies are applied in the Intemet of Things (loT) currently and more are emerging, which rmkes the loT a heterogeneous network. This paper discusses the convergence and integration pro...A great number of sensor technologies are applied in the Intemet of Things (loT) currently and more are emerging, which rmkes the loT a heterogeneous network. This paper discusses the convergence and integration problem in IoT. A Service-Oriented Middleware for Heterogeneous Environment (SOMHE) in IoT is proposed. The purpose of the middleware is to shield the differ- ence between protocols in the sensor layers such as Radio Frequency Identification (RFID) and Zig-Bee by defining the data conversion and mapping model. A Web service interface is supplied by this middleware, thus the complexity of high level appli-cation development can be reduced greatly. The feasibility and reliability of this middleware is veri-fied by a demonstration systelTL展开更多
Wireless sensor networks(WSN)can be used in many fields.In wireless sensor networks,sensor nodes transmit data in multi hop mode.The large number of hops required by data transmission will lead to unbalanced energy co...Wireless sensor networks(WSN)can be used in many fields.In wireless sensor networks,sensor nodes transmit data in multi hop mode.The large number of hops required by data transmission will lead to unbalanced energy consumption and large data transmission delay of the whole network,which greatly affects the invulnerability of the network.Therefore,an optimal deployment of heterogeneous nodes(ODHN)algorithm is proposed to enhance the invulnerability of the wireless sensor networks.The algorithm combines the advantages of DEEC(design of distributed energy efficient clustering)clustering algorithm and BAS(beetle antenna search)optimization algorithm to find the globally optimal deployment locations of heterogeneous nodes.Then,establish a shortcut to communicate with sink nodes through heterogeneous nodes.Besides,considering the practical deployment operation,we set the threshold of the mobile location of heterogeneous nodes,which greatly simplifies the deployment difficulty.Simulation results show that compared with traditional routing protocols,the proposed algorithm can make the network load more evenly,and effectively improve energy-utilization and the fault tolerance of the whole network,which can greatly improve the invulnerability of the wireless sensor networks.展开更多
A heterogeneous coverage method with multiple unmanned aerial vehicle assisted sink nodes(MUAVSs)for multi-objective optimization problem(MOP)is proposed,which is based on quantum wolf pack evolution algorithm(QWPEA)a...A heterogeneous coverage method with multiple unmanned aerial vehicle assisted sink nodes(MUAVSs)for multi-objective optimization problem(MOP)is proposed,which is based on quantum wolf pack evolution algorithm(QWPEA)and power law entropy(PLE)theory.The method is composed of preset move and autonomous coordination stages for satisfying non-repeated coverage,connectedness,and energy balance of sink layer critical requirements,which is actualized to cover sensors layer in large-scale outside wireless sensor networks(WSNs).Simulation results show that the performance of the proposed technique is better than the existing related coverage technique.展开更多
With the development of artificial intelligence,stiffness sensors are extensively utilized in various fields,and their integration with robots for automated palpation has gained significant attention.This study presen...With the development of artificial intelligence,stiffness sensors are extensively utilized in various fields,and their integration with robots for automated palpation has gained significant attention.This study presents a broad range self-powered stiffness sensor based on the triboelectric nanogenerator(Stiff-TENG)for variable inclusions in soft objects detection.The Stiff-TENG employs a stacked structure comprising an indium tin oxide film,an elastic sponge,a fluorinated ethylene propylene film with a conductive ink electrode,and two acrylic pieces with a shielding layer.Through the decoupling method,the Stiff-TENG achieves stiffness detection of objects within 1.0 s.The output performance and characteristics of the TENG for different stiffness objects under 4 mm displacement are analyzed.The Stiff-TENG is successfully used to detect the heterogeneous stiffness structures,enabling effective recognition of variable inclusions in soft object,reaching a recognition accuracy of 99.7%.Furthermore,its adaptability makes it well-suited for the detection of pathological conditions within the human body,as pathological tissues often exhibit changes in the stiffness of internal organs.This research highlights the innovative applications of TENG and thereby showcases its immense potential in healthcare applications such as palpation which assesses pathological conditions based on organ stiffness.展开更多
The Wireless Sensor Network(WSN)is a network of Sensor Nodes(SN)which adopt radio signals for communication amongst themselves.There is an increase in the prominence of WSN adaptability to emerging applications like t...The Wireless Sensor Network(WSN)is a network of Sensor Nodes(SN)which adopt radio signals for communication amongst themselves.There is an increase in the prominence of WSN adaptability to emerging applications like the Internet of Things(IoT)and Cyber-Physical Systems(CPS).Data secur-ity,detection of faults,management of energy,collection and distribution of data,network protocol,network coverage,mobility of nodes,and network heterogene-ity are some of the issues confronted by WSNs.There is not much published information on issues related to node mobility and management of energy at the time of aggregation of data.Towards the goal of boosting the mobility-based WSNs’network performance and energy,data aggregation protocols such as the presently-used Mobility Low-Energy Adaptive Clustering Hierarchy(LEACH-M)and Energy Efficient Heterogeneous Clustered(EEHC)scheme have been exam-ined in this work.A novel Artificial Bee Colony(ABC)algorithm is proposed in this work for effective election of CHs and multipath routing in WSNs so as to enable effective data transfer to the Base Station(BS)with least energy utilization.There is avoidance of the local optima problem at the time of solution space search in this proposed technique.Experimentations have been conducted on a large WSN network that has issues with mobility of nodes.展开更多
基金supported by the National Key Research and Development Program of China(grant number 2019YFE0123600)。
文摘The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initially built a power IoT architecture comprising a perception,network,and platform application layer.However,owing to the structural complexity of the power system,the construction of the power IoT continues to face problems such as complex access management of massive heterogeneous equipment,diverse IoT protocol access methods,high concurrency of network communications,and weak data security protection.To address these issues,this study optimizes the existing architecture of the power IoT and designs an integrated management framework for the access of multi-source heterogeneous data in the power IoT,comprising cloud,pipe,edge,and terminal parts.It further reviews and analyzes the key technologies involved in the power IoT,such as the unified management of the physical model,high concurrent access,multi-protocol access,multi-source heterogeneous data storage management,and data security control,to provide a more flexible,efficient,secure,and easy-to-use solution for multi-source heterogeneous data access in the power IoT.
基金supported in part by the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province under Grant SKLACSS-202102in part by the Intelligent Terminal Key Laboratory of Sichuan Province under Grant SCITLAB-1019.
文摘The vehicular sensor network (VSN) is an important part of intelligent transportation, which is used for real-timedetection and operation control of vehicles and real-time transmission of data and information. In the environmentofVSN, massive private data generated by vehicles are transmitted in open channels and used by other vehicle users,so it is crucial to maintain high transmission efficiency and high confidentiality of data. To deal with this problem, inthis paper, we propose a heterogeneous fault-tolerant aggregate signcryption scheme with an equality test (HFTASET).The scheme combines fault-tolerant and aggregate signcryption,whichnot onlymakes up for the deficiency oflow security of aggregate signature, but alsomakes up for the deficiency that aggregate signcryption cannot tolerateinvalid signature. The scheme supports one verification pass when all signcryptions are valid, and it supportsunbounded aggregation when the total number of signcryptions grows dynamically. In addition, this schemesupports heterogeneous equality test, and realizes the access control of private data in different cryptographicenvironments, so as to achieve flexibility in the application of our scheme and realize the function of quick searchof plaintext or ciphertext. Then, the security of HFTAS-ET is demonstrated by strict theoretical analysis. Finally, weconduct strict and standardized experimental operation and performance evaluation, which shows that the schemehas better performance.
基金This study was supported by National Key Research and Development Project(Project No.2017YFD0301506)National Social Science Foundation(Project No.71774052)+1 种基金Hunan Education Department Scientific Research Project(Project No.17K04417A092).
文摘Data fusion can effectively process multi-sensor information to obtain more accurate and reliable results than a single sensor.The data of water quality in the environment comes from different sensors,thus the data must be fused.In our research,self-adaptive weighted data fusion method is used to respectively integrate the data from the PH value,temperature,oxygen dissolved and NH3 concentration of water quality environment.Based on the fusion,the Grubbs method is used to detect the abnormal data so as to provide data support for estimation,prediction and early warning of the water quality.
文摘In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or cluster member. This causes the cluster or the whole network to be controlled by the malicious nodes. To offer high level of security, the mobile sensor nodes need to be authenticated. Further, clustering of nodes improves scalability, energy efficient routing and data delivery. In this paper, we propose a cluster based secure dynamic keying technique to authenticate the nodes during mobility. The nodes with high configuration are chosen as cluster heads based on the weight value which is estimated using parameters such as the node degree, average distance, node's average speed, and virtual battery power. The keys are dynamically generated and used for providing security. Even the keys are compromised by the attackers, they are not able to use the previous keys to cheat or disuse the authenticated nodes. In addition, a bidirectional malicious node detection technique is employed which eliminates the malicious node from the network. By simulation, it is proved that the proposed technique provides efficient security with reduced energy consumption during node mobility.
基金Sponsored by the Shanghai Leading Academic Discipline Project (Grant No.S30108 and 08DZ2231100)Shanghai Education Committee (Grant No.09YZ33)+1 种基金Shanghai Science Committee(Grant No.08220510900)Key Lab Fund of SIMIT
文摘Aimed at the problem of unbalanced energy existed in sensor networks, the clustered method is employed to enhance the efficient utilization of limited energy resources of the deployed sensor nodes. In this paper, we describe the network lifetime as a function of the communication and data aggregation energy consumption and analyze the lifetime of different transmission schemes in the homogeneous and heterogeneous sensor networks. The analysis carried out in this paper can provide the guidelines for network deployment and protocol design in the future applications.
文摘Sensing coverage and energy consumption are two primary issues in wireless sensor networks. Sensing coverage is closely related to network energy consumption. The performance of a sensor network depends to a large extent on the sensing coverage, and its lifetime is determined by its energy consumption. In this paper, an energy-efficient Area Coverage protocol for Heterogeneous Energy sensor networks (ACHE) is proposed. ACHE can achieve a good performance in terms of sensing area coverage, lifetime by minimizing energy consumption for control overhead, and balancing the energy load among all nodes. Adopting the hierarchical clustering idea, ACHE selects the active nodes based on the average residual energy of neighboring nodes and its own residual energy parameters. Our simulation demonstrates that ACHE not only provide the high quality of sensing coverage, but also has the good performance in the energy efficiency. In addition, ACHE can better adapt the applications with the great heterogeneous energy capacities in the sensor networks, as well as effectively reduce the control overhead.
基金supported by National Natural Science Foundation of China(61304256)Zhejiang Provincial Natural Science Foundation of China(LQ13F030013)+4 种基金Project of the Education Department of Zhejiang Province(Y201327006)Young Researchers Foundation of Zhejiang Provincial Top Key Academic Discipline of Mechanical Engineering and Zhejiang Sci-Tech University Key Laboratory(ZSTUME01B15)New Century 151 Talent Project of Zhejiang Province521 Talent Project of Zhejiang Sci-Tech UniversityYoung and Middle-aged Talents Foundation of Zhejiang Provincial Top Key Academic Discipline of Mechanical Engineering
文摘An improved LEACH for heterogeneous wireless sensor networks is proposed. Nodes are distributed in a sensing area that is divided into a number of same equilateral hexagons. Heterogeneous nodes act as the cluster heads and ordinary nodes act as those cluster sensors in all clusters. The structure of WSNs is a two-layer structure. The upper layer consists of all cluster heads and the lower layer consists of all ordinary sensors managed by their corresponding cluster heads. The cluster heads and the ordinary sensors establish their pairwise keys respectively through utilizing different methods. The arithmetic balances energy expense among all kinds of nodes, saves the node energy, and prolongs the life of wireless sensor networks. Additionally, Analysis demonstrates that the security of wireless sensor networks has been improved obviously even with some heterogeneous nodes.
基金Support by the National High Technology Research and Development Program of China(No.2012AA120802)National Natural Science Foundation of China(No.61771186)+2 种基金Postdoctoral Research Project of Heilongjiang Province(No.LBH-Q15121)University Nursing Program for Young Scholars with Creative Talents in Heilongjiang Province(No.UNPYSCT-2017125)Postgraduate Innovation Research Project of Heilongjiang University(No.YJSCX2018-051HLJU)
文摘Heterogeneous wireless sensor network( HWSN) is composed of different functional nodes and is widely applied. With the deployment in hostile environment,the secure problem of HWSN is of great importance; moreover,it becomes complex due to the mutual characteristics of sensor nodes in HWSN. In order to enhance the network security,an asymmetric key pre-distributed management scheme for HWSN is proposed combining with authentication process to further ensure the network security; meanwhile,an effective authentication method for newly added nodes is presented. Simulation result indicates that the proposed scheme can improve the network security while reducing the storage space requirement efficiently.
文摘L-SYNC is a synchronization protocol for Wireless Sensor Networks which is based on larger degree clustering providing efficiency in homogeneous topologies. In L-SYNC, the effectiveness of the routing algorithm for the synchronization precision of two remote nodes was considered. Clustering in L-SYNC is according to larger degree techniques. These techniques reduce cluster overlapping, resulting in the routing algorithm requiring fewer hops to move from one cluster to another remote cluster. Even though L-SYNC offers higher precision compared to other algorithms, it does not support heterogeneous topologies and its synchronization algorithm can be influenced by unreliable data. In this paper, we present the L-SYNCng (L-SYNC next generation) protocol, working in heterogeneous topologies. Our proposed protocol is scalable in unreliable and noisy environments. Simulation results illustrate that L-SYNCng has better precision in synchronization and scalability.
基金National Natural Science Foundation of China(No.61772018)Zhejiang Provincial Natural Science Foundation of China(No.LZ22F020002)。
文摘Heterogeneous wireless sensor networks(HWSNs)are vulnerable to malware propagation,because of their low configuration and weak defense mechanism.Therefore,an optimality system for HWSNs is developed to suppress malware propagation in this paper.Firstly,a heterogeneous-susceptible-exposed-infectious-recovered-susceptible(HSEIRS)model is proposed to describe the state dynamics of heterogeneous sensor nodes(HSNs)in HWSNs.Secondly,the existence of an optimal control problem with installing antivirus on HSNs to minimize the sum of the cumulative infection probabilities of HWSNs at a low cost based on the HSEIRS model is proved,and then an optimal control strategy for the problem is derived by the optimal control theory.Thirdly,the optimal control strategy based on the HSEIRS model is transformed into corresponding Hamiltonian by the Pontryagin’s minimum principle,and the corresponding optimality system is derived.Finally,the effectiveness of the optimality system is validated by the experimental simulations,and the results show that the infectious HSNs will fall to an extremely low level at a low cost.
文摘Sensor nodes are mainly shielded in the field with limited power supply. In Wireless Sensor Networks, there must be a requirement of an efficient power management, because sensor nodes are deployed in unman attended area with non-rechargeable batteries. Power management can be done by different methods of routing protocols. The proposed Reliable Rim Routing (3R) technique is based on hybrid routing protocol for homogeneous and heterogeneous system for WSNs to ameliorate the performance of the overall system. In 3R, total node deployment area can be multipart in terms of rim and in each rim, and some of the sensor nodes transmit their sensed data directly to base station, and meanwhile remaining sensor nodes send the data through clustering technique to base station like SEP. Proposed 3R technique implementation proves its enhanced WSNs lifetime of 70% energy consumption and 40% throughput compared with existing protocols. Simulation and evaluation results outperformed in terms of energy consumption with increased throughput and network lifetime.
文摘Heterogeneous traffic conditions prevail in developing countries. Vehicles maintain weak lane discipline which increases lateral interactions of vehicles significantly. It is necessary to study these interactions in the form of maintained lateral gaps for modeling this traffic scenario. This paper aims at determining lateral clearances maintained by different vehicle types while moving in a heterogeneous traffic stream during overtaking. These data were collected using an instrumented vehicle which runs as a part of the stream. Variation of obtained clearance with average speed of interacting vehicles is studied and modeled. Different instrumented vehicles of various types are developed using (1) ultrasonic sensors fixed on both sides of vehicle, which provide inter-vehicular lateral distance and relative speed; and (2) GPS device with cameras, which provides vehicle type and speed of interacting vehicles. They are driven on different roads in six cities of India, to measure lateral gaps maintained with different interacting vehicles at different speeds. Relationships between lateral gaps and speed are modeled as regression lines with positive slopes and beta-distributed residuals. Nature of these graphs (i.e., slopes, intercepts, residuals) are also evaluated and compared for different interacting vehicle-type pairs. It is observed that similar vehicle pairs maintain less lateral clearance than dissimilar vehicle pairs. If a vehicle interacts with two vehicles (one on each side) simultaneously, lateral clearance is reduced and safety of the vehicles is compromised. The obtained relationships can be used for simulating lateral clearance maintaining behavior of vehicles in heterogeneous traffic.
基金This paper was supported by the National Natural Science Foundation of China under Crant No. NSFC-61170176 the Na-tional Great Science Specific Project under Grants No. 2010ZX03005-001-03, No2011ZX03005-004-02 the Beijing Munici-pal Con-rnission of Education Build Together Project and Minis-try of Education Infrastructure Construction Project (2-5-2).
文摘A great number of sensor technologies are applied in the Intemet of Things (loT) currently and more are emerging, which rmkes the loT a heterogeneous network. This paper discusses the convergence and integration problem in IoT. A Service-Oriented Middleware for Heterogeneous Environment (SOMHE) in IoT is proposed. The purpose of the middleware is to shield the differ- ence between protocols in the sensor layers such as Radio Frequency Identification (RFID) and Zig-Bee by defining the data conversion and mapping model. A Web service interface is supplied by this middleware, thus the complexity of high level appli-cation development can be reduced greatly. The feasibility and reliability of this middleware is veri-fied by a demonstration systelTL
基金This research was funded by the National Natural Science Foundation of China,No.61802010Hundred-Thousand-Ten Thousand Talents Project of Beijing No.2020A28+1 种基金National Social Science Fund of China,No.19BGL184Beijing Excellent Talent Training Support Project for Young Top-Notch Team No.2018000026833TD01.
文摘Wireless sensor networks(WSN)can be used in many fields.In wireless sensor networks,sensor nodes transmit data in multi hop mode.The large number of hops required by data transmission will lead to unbalanced energy consumption and large data transmission delay of the whole network,which greatly affects the invulnerability of the network.Therefore,an optimal deployment of heterogeneous nodes(ODHN)algorithm is proposed to enhance the invulnerability of the wireless sensor networks.The algorithm combines the advantages of DEEC(design of distributed energy efficient clustering)clustering algorithm and BAS(beetle antenna search)optimization algorithm to find the globally optimal deployment locations of heterogeneous nodes.Then,establish a shortcut to communicate with sink nodes through heterogeneous nodes.Besides,considering the practical deployment operation,we set the threshold of the mobile location of heterogeneous nodes,which greatly simplifies the deployment difficulty.Simulation results show that compared with traditional routing protocols,the proposed algorithm can make the network load more evenly,and effectively improve energy-utilization and the fault tolerance of the whole network,which can greatly improve the invulnerability of the wireless sensor networks.
基金Supported by the National Natural Science Foundation of China(No.61571318)Key Research and Development Project of Hainan(No.ZDYF2018006)+1 种基金Independent Innovation Fund of Tianjin UniversityDoctoral Fund Funded Projects
文摘A heterogeneous coverage method with multiple unmanned aerial vehicle assisted sink nodes(MUAVSs)for multi-objective optimization problem(MOP)is proposed,which is based on quantum wolf pack evolution algorithm(QWPEA)and power law entropy(PLE)theory.The method is composed of preset move and autonomous coordination stages for satisfying non-repeated coverage,connectedness,and energy balance of sink layer critical requirements,which is actualized to cover sensors layer in large-scale outside wireless sensor networks(WSNs).Simulation results show that the performance of the proposed technique is better than the existing related coverage technique.
基金This work is supported by the grant from the National Natural Science Foundation of China under Grants 62104125 and 62311530102,Guangdong Innovative and Entrepreneurial Research Team Program(2021ZT09L197)Guangdong Basic and Applied Basic Research Foundation(2020A1515110887)+1 种基金Tsinghua Shenzhen International Graduate School-Shenzhen Pengrui Young Faculty Program of Shenzhen Pengrui Foundation(No.SZPR2023005)Shenzhen Science and Technology Program(JCYJ20220530143013030).
文摘With the development of artificial intelligence,stiffness sensors are extensively utilized in various fields,and their integration with robots for automated palpation has gained significant attention.This study presents a broad range self-powered stiffness sensor based on the triboelectric nanogenerator(Stiff-TENG)for variable inclusions in soft objects detection.The Stiff-TENG employs a stacked structure comprising an indium tin oxide film,an elastic sponge,a fluorinated ethylene propylene film with a conductive ink electrode,and two acrylic pieces with a shielding layer.Through the decoupling method,the Stiff-TENG achieves stiffness detection of objects within 1.0 s.The output performance and characteristics of the TENG for different stiffness objects under 4 mm displacement are analyzed.The Stiff-TENG is successfully used to detect the heterogeneous stiffness structures,enabling effective recognition of variable inclusions in soft object,reaching a recognition accuracy of 99.7%.Furthermore,its adaptability makes it well-suited for the detection of pathological conditions within the human body,as pathological tissues often exhibit changes in the stiffness of internal organs.This research highlights the innovative applications of TENG and thereby showcases its immense potential in healthcare applications such as palpation which assesses pathological conditions based on organ stiffness.
文摘The Wireless Sensor Network(WSN)is a network of Sensor Nodes(SN)which adopt radio signals for communication amongst themselves.There is an increase in the prominence of WSN adaptability to emerging applications like the Internet of Things(IoT)and Cyber-Physical Systems(CPS).Data secur-ity,detection of faults,management of energy,collection and distribution of data,network protocol,network coverage,mobility of nodes,and network heterogene-ity are some of the issues confronted by WSNs.There is not much published information on issues related to node mobility and management of energy at the time of aggregation of data.Towards the goal of boosting the mobility-based WSNs’network performance and energy,data aggregation protocols such as the presently-used Mobility Low-Energy Adaptive Clustering Hierarchy(LEACH-M)and Energy Efficient Heterogeneous Clustered(EEHC)scheme have been exam-ined in this work.A novel Artificial Bee Colony(ABC)algorithm is proposed in this work for effective election of CHs and multipath routing in WSNs so as to enable effective data transfer to the Base Station(BS)with least energy utilization.There is avoidance of the local optima problem at the time of solution space search in this proposed technique.Experimentations have been conducted on a large WSN network that has issues with mobility of nodes.