首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Distributed fault-tolerant topology control in wireless multi-hop networks   总被引:1,自引:0,他引:1  
In wireless multi-hop and ad-hoc networks, minimizing power consumption and at the same time maintaining desired properties of the network topology is of prime importance. In this work, we present a distributed algorithm for assigning minimum possible power to all the nodes in a static wireless network such that the resultant network topology is k-connected. In this algorithm, a node collects the location and maximum power information from all nodes in its vicinity, and then adjusts the power of these nodes in such a way that it can reach all of them through k optimal vertex-disjoint paths. The algorithm ensures k-connectivity in the final topology provided the topology induced when all nodes transmit with their maximum power is k-connected. We extend our topology control algorithm from static networks to networks having mobile nodes. We present proof of correctness for our algorithm for both static and mobile scenarios, and through extensive simulation we present its behavior.  相似文献   

2.
Path length, path reliability, and sensor energy-consumption are three major constraints affecting routing in resource constrained, unreliable wireless sensor networks. By considering the implicit collaborative imperative for sensors to achieve overall network objectives subject to individual resource consumption, we develop a game-theoretic model of reliable, length and energy-constrained, sensor-centric information routing in sensor networks. We define two distinct payoff (benefit) functions and show that computing optimally reliable energy-constrained paths is NP-Hard under both models for arbitrary sensor networks. We then show that optimal length-constrained paths can be computed in polynomial time in a distributed manner (using O(E) messages) for popular sensor network implementations using geographic routing. We also develop sensor-centric metrics called path weakness to measure the qualitative performance of different routing schemes and provide theoretical limits on the inapproximability of computing paths with bounded weakness. Heuristics for computing optimal paths in arbitrary sensor networks are described along with simulation results comparing performance with other routing algorithms.  相似文献   

3.
Wireless sensor networks are prone to failure, so prolonging their lifetime and preventing loss of connectivity are significant. A simple but efficient strategy is to place redundant sensor nodes to establish multi‐connectivity. This paper explores how to add as few as possible nodes (called Steiner nodes) to a sensor network such that the resulting network is k‐connected or partially k‐connected. k‐connectivity means that each pair of the nodes, whether Steiner or original, is connected by at least k node‐disjoint paths, while partial k‐connectivity only requires such connectivity among original nodes. The contribution lies in two aspects. First, the approximation ratio of an existing k‐connectivity repair algorithm is decreased from O(k4α) to O(k3α), where α is the approximation ratio of any algorithm that finds a minimum‐weight k‐connected spanning subgraph of a weighted complete graph. This is the best result ever obtained. Second, the first generic partial k‐connectivity repair algorithm is proposed. It is proved that the approximation ratio of this algorithm is at most O(k3α). Copyright © 2008 John Wiley & Sons, Ltd.  相似文献   

4.
This study presents an approach to the problem of predicting k-connectivity in wireless multihop networks. Assuming the network consists of randomly placed nodes with a common transmission range, the threshold range for k-connectivity is a random variable. Knowing the distribution of this random variable under the circumstances of interest allows one to determine how the number of nodes, the transmission range, and the network area are related so that a random network realization is k-connected with a given probability.  相似文献   

5.
In this paper, we consider filtering false reports in braided multipath routing sensor networks. While multipath routing provides better resilience to various faults in sensor networks, it has two problems regarding the authentication design. One is that, due to the large number of partially overlapped routing paths between the source and sink nodes, the authentication overhead could be very high if these paths are authenticated individually; the other is that false reports may escape the authentication check through the newly identified node association attack. In this paper, we propose enhancements to solve both problems such that secure and efficient authentication can be achieved in multipath routing. The proposed scheme is (t + 1)-resilient, i.e. it is secure with up to t compromised nodes. The upper bound that a false report may be forwarded in the network is O(t 2).  相似文献   

6.
One of the most important issues for wireless sensor networks is to get a long network lifetime without affecting either communication connectivity or sensing coverage. Many sensors that are deployed randomly in a dense sensor network in a redundant way waste a lot of energy. One effective way to save energy is to let only a subset of sensors work at any given time. In this paper, we mainly consider such a problem. Selecting the minimum number of connected sensor nodes that can provide k-coverage (k ≥ 1), i.e., selecting a subset S of working sensors, such that almost every point in the sensing region can be covered by at least k sensors and the sensors in S can form a connected communication subgraph. We propose a connected k-coverage working sets construction algorithm (CWSC) based on Euclidean distance to k-cover the sensing region while minimizing the number of working sensors. CWSC can produce different coverage degrees according to different applications, which can enhance the flexibility of the sensor network. Simulation results show that the proposed algorithm, which can conserve energy and prolong the lifetime of the sensor network, is better than the previous algorithms.  相似文献   

7.
Nodes deployment is a fundamental factor in determining the connectivity, coverage, lifetime and cost of wireless sensor networks. In this paper, a two-tiered wireless sensor networks consisting of sensor clusters and a base station is considered. Within a sensor cluster, there are many sensor nodes and a relay node. We focus on the deployment strategy for sensor nodes and relay nodes to minimize cost under some constraints. Several means are used. The regular hexagonal cell architecture is employed to build networks. Based on the analysis of energy consumption of sensors and cost of network, an integer programming model is presented to minimize the cost. By the model, number of layers of sensor cluster is determined. In order to balance the energy consumption of sensors on the identical layer, a uniform load routing algorithm is used. The numerical analysis and simulation results show that the waste of energy and cost of wireless sensor networks can be effectively reduced by using the strategy.  相似文献   

8.
Given a wireless network, we want to assign each node a transmission power, which will enable transmission between any two nodes (via other nodes). Moreover, due to possible faults, we want to have at least k vertex-disjoint paths from any node to any other, where k is some fixed integer, depending on the reliability of the nodes. The goal is to achieve this directed k-strong connectivity with a minimal overall power assignment. The problem is NP-Hard for any k ≥ 1 already for planar networks. Here we first present an optimal power assignment for uniformly spaced nodes on a line for any k ≥ 1. We also prove a number of useful properties of power assignment which are also of independent interest. Based on it, we design an approximation algorithm for linear radio networks with factor min{2,(\frac \Updelta d)a },\hbox{min}\left\{2,\left(\frac {\Updelta} {\delta}\right)^\alpha \right\}, where Δ and δ are the maximal and minimal distances between adjacent nodes respectively and parameter α ≥ 1 being the distance-power gradient. We then extend it to the weighted version. Finally, we develop an approximation algorithm with factor O(k 2), for planar case, which is, to the best of our knowledge, the first non-trivial result for this problem.  相似文献   

9.
李发飞  彭刚  兰慎 《电子世界》2012,(7):156-158
提出了一种能量均衡的无线传感器网络协议。在此协议中,用以基站为圆心一定距离为半径的环状带将目标网络覆盖区域分为三部分,靠近圆心的节点和环状带内节点采用单跳方式直接跟基站通信,环状带以外的节点采用多跳方式跟环状带内节点通信;节点保存多条到基站的最短路由,采用轮循机制选择一条路由传输数据,从而将数据传输任务均衡的分配到多条线路上;当环状带内节点的能量值达到一个阀值时修改环状带的半径和宽度,重新组网,从而将即将形成的"热区"转移到其他区域,达到延长无线传感器网络的生命周期。  相似文献   

10.
We are concerned with wireless sensor networks where n sensors are independently and uniformly distributed at random in a finite plane. Events that are within a fixed distance from some sensor are assumed to be detectable and the sensor is said to cover that point. In this paper, we have formulated an exact mathematical expression for the expected area that can be covered by at least k out of n sensors. Our results are important in predicting the degree of coverage a sensor network may provide and in determining related parameters (sensory range, number of sensors, etc.) for a desired level of coverage. We demonstrate the utility of our results by presenting a node scheduling scheme that conserves energy while retaining network coverage. Additional simulation results have confirmed the accuracy of our analysis.  相似文献   

11.
Gang  Bhaskar   《Ad hoc Networks》2007,5(6):832-843
Wireless sensor networks are expected to be used in a wide range of applications from environment monitoring to event detection. The key challenge is to provide energy efficient communication; however, latency remains an important concern for many applications that require fast response. In this paper, we address the important problem of minimizing average communication latency for the active flows while providing energy-efficiency in wireless sensor networks. As the flows in some wireless sensor network can be long-lived and predictable, it is possible to design schedules for sensor nodes so that nodes can wake up only when it is necessary and asleep during other times. Clearly, the routing layer decision is closely coupled to the wakeup/sleep schedule of the sensor nodes. We formulate a joint scheduling and routing problem with the objective of finding the schedules and routes for current active flows with minimum average latency. By constructing a novel delay graph, the problem can be solved optimally by employing the M node-disjoint paths algorithm under FDMA channel model. We further present extensions of the algorithm to handle dynamic traffic changes and topology changes in wireless sensor networks.  相似文献   

12.
Mobile ad hoc networks (MANETs) are independent networks, where mobile nodes communicate with other nodes through wireless links by multihop transmission. Security is still an issue to be fixed in MANETs. Hence, a routing protocol named encrypted trust‐based dolphin glowworm optimization (DGO) (E‐TDGO) is designed using Advanced Encryption Standard‐128 (AES‐128) and trust‐based optimization model for secure routing in MANET. The proposed E‐TDGO protocol includes three phases, namely, k‐path discovery, optimal path selection, and communication. At first, k paths are discovered based on the distance and the trust level of the nodes. From the k paths discovered, the optimal path is selected using a novel algorithm, DGO, which is developed by combining glowworm swarm optimization (GSO) algorithm and dolphin echolocation algorithm (DEA). Once the optimal path is selected, communication begins in the network such that E‐TDGO protocol ensures security. The routing messages are encrypted using AES‐128 with shared code and key to offer security. The experimental results show that the proposed E‐TDGO could attain throughput of 0.11, delay of 0.01 second, packet drop of 0.44, and detection rate of 0.99, at the maximum number of rounds considered in the network of 75 nodes with attack consideration.  相似文献   

13.
A Routing Algorithm for Wireless Ad Hoc Networks with Unidirectional Links   总被引:6,自引:0,他引:6  
Prakash  Ravi 《Wireless Networks》2001,7(6):617-625
Most of the routing algorithms for ad hoc networks assume that all wireless links are bidirectional. In reality, some links may be unidirectional. In this paper we show that the presence of such links can jeopardize the performance of the existing distance vector routing algorithms. We also present modifications to distance vector based routing algorithms to make them work in ad hoc networks with unidirectional links. For a network of n nodes, neighbors exchange n×n matrices to propagate routing information. This results in loop-free routes.  相似文献   

14.
Topology control plays an important role in the design of wireless ad hoc and sensor networks and has demonstrated its high capability in constructing networks with desirable characteristics such as sparser connectivity, lower transmission power, and smaller node degree. However, the enforcement of a topology control algorithm in a network may degrade the energy‐draining balancing capability of the network and thus reduce the network operational lifetime. For this reason, it is important to take into account energy efficiency in the design of a topology control algorithm in order to achieve prolonged network lifetime. In this paper, we propose a localized energy‐efficient topology control algorithm for wireless ad hoc and sensor networks with power control capability in network nodes. To achieve prolonged network lifetime, we introduce a concept called energy criticality avoidance and propose an energy criticality avoidance strategy in topology control and energy‐efficient routing. Through theoretical analysis and simulation results, we prove that the proposed topology control algorithm can maintain the global network connectivity with low complexity and can significantly prolong the lifetime of a multi‐hop wireless network as compared with existing topology control algorithms with little additional protocol overhead. Copyright © 2008 John Wiley & Sons, Ltd.  相似文献   

15.
Greedy geographic routing is attractive in wireless sensor networks because of its efficiency and scalability. This paper presents an up-down links dualpath greedy routing (UDLDGR) protocol for wireless sensor networks. The routing protocol not only reserves the features of greedy forwarding algorithm, which is simple, efficient, but also uses different relay nodes to serve as routing nodes for up and down routing paths, makes the energy consumption more balanced. The greatest advantage of UDLDGR is it trades off only small cost for the source node to obtain two different transmission paths information. The multipath strengthens the network reliability, such as load balancing and robustness to failures. Our simulation results show that UDLDGR can improve system lifetime by 20–100% compared to single path approaches.  相似文献   

16.
The ultraviolet (UV) scattering communication can be applied in military networked on-the-move and unattended ground sensor networks. This paper focuses on the connectivity properties of unmanned aerial vehicles (UAVs) network based on UV communication that ensures the secret communications between UAVs. UAVs network is consisting of a group of UAVs, each of which moving according to a particular mobility model. We discuss random waypoint (RWP) mobility model and circle movement based model (CMBM), which can describe the actual movement of UAVs, respectively. In this paper, the approximations of the probability that the network is k-connected are provided with consideration of transmission using on–off keying and pulse position modulation. More precisely, we evaluate the effects of node density, transmission power, and data rate on k-connectivity. The numerical examples show that the mobility degrades the connectivity probability. When the numbers of nodes \(n=500\) and data rate \(R_b =10\,\hbox {kbps}\), the required transmission power for nodes moving according to RWP is lower than CMBM in order to achieve 2-connectivity of the UAVs network, but it is about twice that for uniformly distributed nodes.  相似文献   

17.
STDMA emerges as a promising channel access technique for providing Quality of Service (QoS) guarantees in multi-hop ad hoc networks such as community mesh and sensor networks. The contention-free channel access combined with spatial reuse of the channel provide significant benefits in the energy/throughput trade-off. On the other hand, the time-multiplexed communication introduces extra delay on the packets when relayed by intermediate nodes. Hence in large wireless sensor networks or mesh networks, where data is routed over several hops before reaching the data sink, STDMA protocols may introduce high end-to-end latency due to the reservation-based access policy. We argue that a suitable routing protocol specifically designed for reservation-based Medium Access Control (MAC) protocols can alleviate their high-latency drawback. Following this argument, we propose first such routing algorithms working on top of a generic STDMA MAC protocol. First, we consider routing with data fusion and present our GreenWave routing idea. We show that our algorithm significantly reduces the end-to-end delay when compared to routing over the shortest-hop paths. Second, we consider routing without data fusion, by taking into account the effect of congestion along the paths on the end-to-end delays. We provide a QIP formulation of the problem, and present a lower bound and a heuristic algorithm to bound the optimal solution. Based on the centralized heuristic algorithm, we propose a distributed, dynamic routing protocol GreenWave routing with Congestion and Flow control (GWCF), which uses a novel congestion and flow control technique utilizing the underlying contention-free protocol. We show by simulations that GWCF routing significantly improves the end-to-end delay while increasing the network throughput when compared to routing over shortest paths.
Bülent YenerEmail:
  相似文献   

18.
An efficient distributed fault‐tolerant routing algorithm for the hypercube is proposed based on the existence of a complete set of node‐disjoint paths between any two nodes. Node failure and repairs may occur dynamically provided that the total number of faulty nodes at any time is less than the node‐connectivity n of the n‐cube. Each node maintains for each possible destination which of the associated node‐disjoint paths to use. When a message is blocked by a node failure, the source node is warned and requested to switch to a different node‐disjoint path. The methods used to identify the paths, to propagate node failure information to source nodes, and to switch from one routing path to another incur little communication and computation overhead. We show that if the faults occur reasonably apart in time, then all messages will be routed on optimal or near optimal paths. In the unlikely case where many faults occur in a short period, the algorithm still delivers all messages but via possibly longer paths. An extension of the obtained algorithm to handle link failures in addition to node failures is discussed. We also show how to adapt the algorithm to n‐ary n‐cube networks. The algorithm can be similarly adapted to any interconnection network for which there exists a simple characterization of node‐disjoint paths between its nodes. This revised version was published online in June 2006 with corrections to the Cover Date.  相似文献   

19.
The energy consumption is a key design criterion for the routing protocols in wireless sensor networks (WSN). Some of the conventional single path routing schemes may not be optimal to maximize the network lifetime and connectivity. Thus, multipath routing schemes is an optimal alternative to extend the lifetime of WSN. Multipath routing schemes distribute the traffic across multiple paths instead of routing all the traffic along a single path. In this paper, we propose a multipath Energy-Efficient data Routing Protocol for wireless sensor networks (EERP). The latter keeps a set of good paths and chooses one based on the node state and the cost function of this path. In EERP, each node has a number of neighbours through which it can route packets to the base station. A node bases its routing decision on two metrics: state and cost function. It searches its Neighbours Information Table for all its neighbours concerned with minimum cost function. Simulation results show that our EERP protocol minimizes and balances the energy consumption well among all sensor nodes and achieves an obvious improvement on the network lifetime.  相似文献   

20.
This paper presents a fundamentally new approach to integrating local decisions from various nodes and efficiently routing data in sensor networks. By classifying the nodes in the sensor field as “hot” or “cold” in accordance with whether or not they sense the target, we are able to concentrate on a smaller set of nodes and gear the routing of data to and from the sink to a fraction of the nodes that exist in the network. The introduction of this intermediary step is fundamentally new and allows for efficient and meaningful fusion and routing. This is made possible through the use of a novel Markov Random Field (MRF) approach, which, to the best of our knowledge, has never been applied to sensor networks, in combination with Maximum A Posteriori Probability (MAP) stochastic relaxation tools to flag out the “hot” nodes in the network, and to optimally combine their data and decisions towards an integrated and collaborative global decision fusion. This global decision supersedes all local decisions, and provides the basis for efficient use of the sensed data. Because of the MRF local nature, nodes need not see or interact with other nodes in the sensor network beyond their immediate neighborhood, which can either be defined in terms of distance between nodes or communication connectivity, hence adding to the flexibility of dealing with irregular and varying sensor topologies, and also minimizing node power usage and providing for easy scalability. The routing of the “hot” nodes’ data is confined to a cone of nodes and power constraints are taken into account. We also use the found location of the centroid of the hot nodes over time to track the movement of the target(s). This is achieved by using the segmentation at time t as an initial state in the stochastic MAP relaxation at time t + Δt.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号