Considering wireless sensor network characteristics,this paper uses network simulator,version2(NS-2)algorithm to improve Ad hoc on-demand distance vector(AODV)routing algorithm,so that it can be applied to wireless se...Considering wireless sensor network characteristics,this paper uses network simulator,version2(NS-2)algorithm to improve Ad hoc on-demand distance vector(AODV)routing algorithm,so that it can be applied to wireless sensor networks.After studying AODV routing protocol,a new algorithm called Must is brought up.This paper introduces the background and algorithm theory of Must,and discusses the details about how to implement Must algorithm.At last,using network simulator(NS-2),the performance of Must is evaluated and compared with that of AODV.Simulation results show that the network using Must algorithm has perfect performance.展开更多
The topology control is one of the research focuses in wireless sensor networks. Different network topologies will have different effects on the properties of the network, such as the reliability, energy consumption a...The topology control is one of the research focuses in wireless sensor networks. Different network topologies will have different effects on the properties of the network, such as the reliability, energy consumption and latency. In order to study the relationship between the topology and the network performance, in this paper we have designed three kinds of topology models which are regular hexagon topology model, plane grid topology model and equilateral triangle topology model. Then the simulation experiments about these models have been implemented in NS2 and the simulation results show that the plane grid topology has the best reliability.展开更多
The use of FPGAs in the design of wireless sensor networks can improve the processing system performance so as to develop sensor nodes with powerful embedded processor. In fact, FPGA has a super-parallel processing ca...The use of FPGAs in the design of wireless sensor networks can improve the processing system performance so as to develop sensor nodes with powerful embedded processor. In fact, FPGA has a super-parallel processing capacity in data processing and its use and configuration is flexible. This allows intensive digital signal processing tasks like Fast Fourier Transforms to be implemented on the sensor node and this can even support intelligent applications and new security algorithms. This paper presents a wireless sensor network system that monitors and visualizes periodically the environment temperature. The proposed system consists of a base station node based on an FPGA DE2-70 and five sensor nodes having the architecture of the System-on-Chip CC2430.展开更多
针对低功耗自适应集簇分层型协议(Low Energy Adaptive Clustering Hierarchy,LEACH)能量消耗不均和节点过早死亡的问题,提出了LEACH协议的改进方案.该方案考虑了聚簇内节点的能耗、定位和网络服务质量,从簇头的选举算法和数据融合着手...针对低功耗自适应集簇分层型协议(Low Energy Adaptive Clustering Hierarchy,LEACH)能量消耗不均和节点过早死亡的问题,提出了LEACH协议的改进方案.该方案考虑了聚簇内节点的能耗、定位和网络服务质量,从簇头的选举算法和数据融合着手,在生存时间、能量消耗、基站数据接收三方面对簇头选举算法进行了分析改进.对改进后的LEACH协议和原LEACH协议进行仿真,仿真结果表明改进后的协议在生存时间上提高了33%,并减少了节点能量消耗和降低了基站接收数据的量.展开更多
This paper proposes a trust ant colony routing algorithm by introducing a node trust evaluation model based on the D-S evidence theory into the ant colony routing protocol to improve the security of wireless sensor ne...This paper proposes a trust ant colony routing algorithm by introducing a node trust evaluation model based on the D-S evidence theory into the ant colony routing protocol to improve the security of wireless sensor networks. To reduce the influence of conflict evidences caused by malicious nods, the consistent intensity is introduced to preprocess conflict evidences before using the D-S combination rule to improve the reliability of the D-S based trust evaluation. The nodes with high trust values will be selected as the routing nodes to insure the routing security, and the trust values are used as heuristic functions of the ant colony routing algorithm. The simulation tests are conducted by using the network simulator NS2 to observe the outcomes of performance metrics of packets loss rate and average end-to-end delay etc. to indirectly evaluate the security issue under the attack of inside malicious nodes. The simulation results show that the proposed trust routing algorithm can efficiently resist malicious attacks in terms of keeping performances of the average end-to-end delay, the throughtput and the routing packet overhead under attacking from malicious nodes.展开更多
针对低功耗自适应集簇分层型协议LEACH(low energy adaptive clustering hierarchy)的节点生命周期短和能量消耗不平衡的问题,提出了一种LEACH协议的改进算法.算法的主要思想是考虑了节点的当前位置以及当前能量,从而可以使簇头的分布...针对低功耗自适应集簇分层型协议LEACH(low energy adaptive clustering hierarchy)的节点生命周期短和能量消耗不平衡的问题,提出了一种LEACH协议的改进算法.算法的主要思想是考虑了节点的当前位置以及当前能量,从而可以使簇头的分布更加均匀,延长节点的生命周期.对改进后的LEACH协议和原LEACH协议进行仿真,结果表明改进后的协议在生存时间上提高了40.7%,并增加了数据的发送量,减少了节点的能量消耗.展开更多
文摘Considering wireless sensor network characteristics,this paper uses network simulator,version2(NS-2)algorithm to improve Ad hoc on-demand distance vector(AODV)routing algorithm,so that it can be applied to wireless sensor networks.After studying AODV routing protocol,a new algorithm called Must is brought up.This paper introduces the background and algorithm theory of Must,and discusses the details about how to implement Must algorithm.At last,using network simulator(NS-2),the performance of Must is evaluated and compared with that of AODV.Simulation results show that the network using Must algorithm has perfect performance.
文摘The topology control is one of the research focuses in wireless sensor networks. Different network topologies will have different effects on the properties of the network, such as the reliability, energy consumption and latency. In order to study the relationship between the topology and the network performance, in this paper we have designed three kinds of topology models which are regular hexagon topology model, plane grid topology model and equilateral triangle topology model. Then the simulation experiments about these models have been implemented in NS2 and the simulation results show that the plane grid topology has the best reliability.
文摘The use of FPGAs in the design of wireless sensor networks can improve the processing system performance so as to develop sensor nodes with powerful embedded processor. In fact, FPGA has a super-parallel processing capacity in data processing and its use and configuration is flexible. This allows intensive digital signal processing tasks like Fast Fourier Transforms to be implemented on the sensor node and this can even support intelligent applications and new security algorithms. This paper presents a wireless sensor network system that monitors and visualizes periodically the environment temperature. The proposed system consists of a base station node based on an FPGA DE2-70 and five sensor nodes having the architecture of the System-on-Chip CC2430.
基金国家自然科学基金( the National Natural Science Foundation of China under Grant No60472064) 河南省自然科学基金( the NaturalScience Foundation of Henan Province of China under Grant No0511010700)
文摘针对低功耗自适应集簇分层型协议(Low Energy Adaptive Clustering Hierarchy,LEACH)能量消耗不均和节点过早死亡的问题,提出了LEACH协议的改进方案.该方案考虑了聚簇内节点的能耗、定位和网络服务质量,从簇头的选举算法和数据融合着手,在生存时间、能量消耗、基站数据接收三方面对簇头选举算法进行了分析改进.对改进后的LEACH协议和原LEACH协议进行仿真,仿真结果表明改进后的协议在生存时间上提高了33%,并减少了节点能量消耗和降低了基站接收数据的量.
基金supported by the National Natural Science Foundation of China(NSFC)under Grant No.61373126the Natural Science Foundation of Jiangsu Province of China under Grant No.BK20131107the Fundamental Research Funds for the Central Universities under Grant No.JUSRP51510
文摘This paper proposes a trust ant colony routing algorithm by introducing a node trust evaluation model based on the D-S evidence theory into the ant colony routing protocol to improve the security of wireless sensor networks. To reduce the influence of conflict evidences caused by malicious nods, the consistent intensity is introduced to preprocess conflict evidences before using the D-S combination rule to improve the reliability of the D-S based trust evaluation. The nodes with high trust values will be selected as the routing nodes to insure the routing security, and the trust values are used as heuristic functions of the ant colony routing algorithm. The simulation tests are conducted by using the network simulator NS2 to observe the outcomes of performance metrics of packets loss rate and average end-to-end delay etc. to indirectly evaluate the security issue under the attack of inside malicious nodes. The simulation results show that the proposed trust routing algorithm can efficiently resist malicious attacks in terms of keeping performances of the average end-to-end delay, the throughtput and the routing packet overhead under attacking from malicious nodes.
文摘针对低功耗自适应集簇分层型协议LEACH(low energy adaptive clustering hierarchy)的节点生命周期短和能量消耗不平衡的问题,提出了一种LEACH协议的改进算法.算法的主要思想是考虑了节点的当前位置以及当前能量,从而可以使簇头的分布更加均匀,延长节点的生命周期.对改进后的LEACH协议和原LEACH协议进行仿真,结果表明改进后的协议在生存时间上提高了40.7%,并增加了数据的发送量,减少了节点的能量消耗.