首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 153 毫秒
1.
蔡绍滨  韩启龙  高振国  杨德森  赵靖 《电子学报》2012,40(11):2232-2238
 无线传感器网络(Wireless Sensor Network,简称WSN)是一种没有基础设施的自组织无线网络.和其它网络一样,WSN需要安全措施来保证网络通信的安全.但是,在无线传感器网络中,基于密码的安全体系不能有效处理来自网络内部的攻击,识别出恶意节点.因此,信任模型被用于无线传感器网络恶意节点识别.在信任模型和云理论的研究基础上,本文构建了一个基于云理论的无线传感器网络信任模型——云信任模型(CTM,Cloud-based Trust Model).实验结果表明,云信任模型能够有效识别恶意节点.  相似文献   

2.
无线传感器网络节点密度对网络寿命的影响研究   总被引:2,自引:0,他引:2  
如何延长网络寿命是无线传感器网络(WSN)的重要课题之一。本文以事件-驱动(Event-Driven)型无线传感器应用模型为基础建立系统模型,研究了节点密度对网络寿命的影响,在理想模型下导出了节点密度对网络寿命影响的算法公式。算法仿真结果表明,网络寿命随着节点密度的增加而增加,并且网络寿命增加的速度比节点密度增加的速度要快。  相似文献   

3.
雷洁 《中国新通信》2009,11(21):79-81
无线传感器网络(WSN)是由大量靠无线多跳方式通信的智能传感器节点构成的网络,围绕WSN出现了许多新的研究内容,节点定位是其中一个很重要的方面。本文综述了无线传感网络近年来的自定位算法,分别分析了各种算法的优缺点。最后还讨论了节点自定位算法所采取的一些安全措施。  相似文献   

4.
在无线传感器网络中,由于传感器节点的能源十分有限,节能是设计的首要因素。然而,无线传感器网络的多业务在现实生活应用中对QoS(服务质量)都有不同的需求,这就使得WSN网络的QoS研究成为了专家学者们的主要研究方向。在WSN网络拓扑结构和业务类型的研究基础上,使用网络模拟器(Network Simulator Version 2,NS2)来搭建基于多业务共存的星型以及对等结构两种WSN网络仿真平台,建立多种业务流量模型,实现以无线传感器网络协议、流量模型、拓扑为基础的功能模块化设计;并对无线传感器网络关键性能进行了仿真模拟,实现延时、吞吐量、能耗等关键性能的分析。  相似文献   

5.
张丽 《电子产品世界》2023,(4):35-38+61
在无线传感器网络(WSN)中,传感器节点及其中心节点相距一定距离,以确保在相关区域上的完全覆盖。然而,传感器节点之间的通信距离与能源消耗成正比,最终的传输距离受到限制。为了克服这个问题,在每个集群的头节点之间建立基于集群的布局和消息路由算法,以确保WSN实现良好的覆盖,平衡各节点工作负载和流量负载,并延长整个网络寿命。在本文中,我们使用遗传算法(NEA)来解决复杂的多目标WSN布局和信号路由问题。实验结果表明,NEA是解决问题的有效途径。  相似文献   

6.
无线传感器网络被广泛应(wireless sensor network,WSN)用于军事战场、环境监测等外部环境比较恶劣领域。又因为无线传感器网络依赖于无线通信,WSN节点资源受限,所以WSN安全问题相当突出。本文关注的是WSN中位置隐私保护问题,其中对源位置隐私保护进行了重点研究。文章首先对WSN的隐私保护问题进行了简单分类介绍,接着总结介绍了几种典型的源节点隐私保护方案,最后对评价源节点位置隐私保护协议有效性的协议度量标准进行了归纳总结。  相似文献   

7.
无线传感网络(Wireless Sensor Networks,WSN)作为新兴的测控网络技术,是能够自主实现数据采集、融合和传输应用的智能网络应用系统。WSN因其巨大优势和广阔的应用前景引起各界的关注。开放的分布式架构给无线传感器网络的安全带来了很大的挑战。而安全是无线传感器网络可用的前提,针对这一问题,迫切需要设计出能有效检测出网络入侵攻击的入侵检测系统。文章对无线传感网络安全特性进行了深入分析和研究,提出一种基于流量的ARMA预测模型的入侵检测技术。该模型利用传感器节点信息的关系和特点,增加了网络的安全性,使得网络能灵活的适应无线传感器网络拓扑结构的变化。  相似文献   

8.
基于k-检测的异构传感器网络节点密度研究   总被引:1,自引:0,他引:1  
康春 《通信技术》2009,42(5):180-182
入侵检测是无线传感器网络的重要应用之一。采用Exposure积分模型估算传感器探测半径,利用此模型分析了基于卜检测的异构WSN中,目标发现概率和被发现前的平均入侵距离与节点密度以及K值的关系。同时研究了不同类型的传感器的密度变化对发现概率的影响。仿真表明,在一定服务质量和K值条件下,可以确定所需节点的,临界密度,可以为确定大型传感器网络的设计参数提供参考。  相似文献   

9.
无线传感网络(Wireless Sensor Networks,WSN)作为新兴的测控网络技术,是能够自主实现数据采集、融合和传输应用的智能网络应用系统.WSN因其巨大优势和广阔的应用前景引起各界的关注.开放的分布式架构给无线传感器网络的安全带来了很大的挑战.而安全是无线传感器网络可用的前提,针对这一问题,迫切需要设计出能有效检测出网络入侵攻击的入侵检测系统.文章对无线传感网络安全特性进行了深八分析和研究,提出一种基于流量的ARMA预测模型的入侵检测技术.该模型利用传感器节点信息的关系和特点,增加了网络的安全性,使得网络能灵活的适应无线传感器网络拓扑结构的变化.  相似文献   

10.
无线传感器网络WSN探究   总被引:6,自引:4,他引:2  
夏少波  许娥 《通信技术》2010,43(8):18-20,23
集传感器技术、无线传输技术、网络通信技术、分布式信息处理技术与编程技术于一体而形成的无线传感器网络(WSN),是一种全新的信息获取和处理系统,具有十分广阔的应用前景。介绍了无线传感器网络WSN的发展历程和现状,论述了无线传感器网络WSN系统的构成,阐述了WSN系统的主要技术指标和设计特点。同时,结合实际应用,对无线传感器网络系统的架构、网络通信模型结构以及当前的主要应用领域作了深入地探讨和研究,最后指出了当前WSN关键技术亟需解决的问题。  相似文献   

11.
Group key management scheme for large-scale sensor networks   总被引:1,自引:0,他引:1  
Wireless sensor networks are inherently collaborative environments in which sensor nodes self-organize and operate in groups that typically are dynamic and mission-driven. Secure communications in wireless sensor networks under this collaborative model calls for efficient group key management. However, providing key management services in wireless sensor networks is complicated by their ad-hoc nature, intermittent connectivity, large scale, and resource limitations. To address these issues, this paper proposes a new energy-efficient key management scheme for networks consisting of a large number of commodity sensor nodes that are randomly deployed. All sensor nodes in the network are anonymous and are preloaded with identical state information. The proposed scheme leverages a location-based virtual network infrastructure and is built upon a combinatorial formulation of the group key management problem. Secure and efficient group key initialization is achieved in the proposed scheme by nodes autonomously computing, without any communications, their respective initial group keys. The key server, in turn, uses a simple location-based hash function to autonomously deduce the mapping of the nodes to their group keys. The scheme enables dynamic setup and management of arbitrary secure group structures with dynamic group membership.  相似文献   

12.
基于等概率路由模型的传感器网络负载均衡研究   总被引:1,自引:0,他引:1  
无线传感器网络的能耗效率与流量负载分布密切相关。论文从微观角度研究了无线传感器网络的负载均衡问题。基于等概率路由模型,分析了拓扑传输结构对于感知数据流量的分流作用。根据分析结果,提出了多对一传输模式下任意节点负载密度的定义和算法。分析了节点的负载密度与传感器网络生命期的关系,进一步论证了在多对一的多跳传感器网络中不能实现完全的负载均衡,但是通过设计合理的拓扑结构可以实现准负载均衡。仿真结果说明,从微观角度得到的节点负载密度可以准确描述无线传感器网络的流量负载分布,由此得到的准负载均衡条件也能实现绝大多数节点的负载均衡。  相似文献   

13.
1 Introduction With the development of the sensor, wireless communication, and computer science, many researches have been focused on the development of a novel wireless network named wireless Ad-hoc sensor networks. This network can be defined as a network that can be self-organized in Ad-hoc fashion. This includes many sensor nodes and its objective is to sense, collect, and process the information collected by the individual sensor nodes via their cooperation [2]. Because of its high pract…  相似文献   

14.
Bo  Guanhua  Yang  T.   《Ad hoc Networks》2009,7(8):1489
Self-propagating mal-packets have become an emergent threat against information confidentiality, integrity, and service availability in wireless sensor networks. While playing an important role for people to interact with surrounding environment, wireless sensor networks suffer from growing security concerns posed by mal-packets because of sensor networks’ low physical security, lack of resilience and robustness of underlying operating systems, and the ever-increasing complexity of deployed applications.In this paper, we study the propagation of mal-packets in 802.15.4 based wireless sensor networks. Based on our proposed mal-packet self-propagation models, we use TOSSIM, a simulator for wireless sensor networks, to study their propagation dynamics. We also present a study of the feasibility of mal-packet defense in sensor networks. Specifically, we apply random graph theory and percolation theory to investigate the immunization of highly-connected nodes, i.e., nodes with high degrees of connectivity. Our goal is to partition the network into as many separate pieces as possible, thus preventing or slowing down the mal-packet propagation. We study the percolation thresholds of different network densities and the effectiveness of immunization in terms of connection ratio, remaining link ratio, and distribution of component sizes. We also present an analysis of the distribution of component sizes.  相似文献   

15.
蒋鹏  陈峰 《电子与信息学报》2009,31(12):2807-2812
该文针对无线传感器网络中节点能量有限且密集布点时存在大量冗余节点的情况,提出了基于冗余节点休眠和分阶段唤醒策略的无线传感器网络3维覆盖控制方法。在3维待监测区域中随机配置大量传感器节点,达到高密度分布,使冗余节点处于休眠状态,等待活跃节点能量耗尽之后,分阶段唤醒休眠节点,直至整个传感器网络中所有节点的能量都耗尽为止。仿真结果表明,该方法提高了传感器网络的网络性能,且对相同的传感器节点数,分阶段唤醒策略优于不分阶段的唤醒策略,先使冗余节点休眠之后再唤醒方法的网络性能高于直接唤醒方法的网络性能。  相似文献   

16.
 覆盖作为无线传感器网络中的基础问题直接反映了网络感知服务质量.本文在分析现有无线多媒体传感器网络覆盖增强算法的基础上,构建节点三维感知模型,提出面向三维感知的多媒体传感器网络覆盖增强算法(Three-Dimensional Perception Based Coverage-Enhancing Algorithm,TDPCA).该算法将节点主感知方向划分为仰俯角和偏向角,并根据节点自身位置及监测区域计算并调整各节点最佳仰俯角,在此基础上基于粒子群优化调整节点偏向角,从而有效减少节点感知重叠区及感知盲区,最终实现监测场景的区域覆盖增强.仿真实验表明:对比已有的覆盖增强算法,TDPCA可有效降低除节点感知重叠区和盲区,最终实现网络的高效覆盖.  相似文献   

17.
链路可靠的无线传感器网络组播路由协议   总被引:2,自引:0,他引:2       下载免费PDF全文
宋震  周贤伟  林亮 《电子学报》2008,36(1):64-69
在无线传感器网络实际应用中,组播正在发挥着越来越重要的作用.但由于能量等多方面的因素,使得为无线传感器网络设计一个有效的组播路由是非常困难的.针对无线传感器网络中节点的能量限制,通过寻求节点间最短路径,提出一种能量有效的链路可靠组播路由协议(RLMR).该协议充分考虑到网络中节点的能耗因素和两节点间的链路可靠性等,通过对这两个因素的综合考虑,让能量较多并且以发送节点更靠近的节点承担更多传输任务的方式,为数据流优化路由选择,均衡无线传感器网络节点的能量消耗,以延长网络的生存时间.仿真结果证明了RLMR的有效性和可靠性.  相似文献   

18.
Gang  Bhaskar   《Ad hoc Networks》2007,5(6):832-843
Wireless sensor networks are expected to be used in a wide range of applications from environment monitoring to event detection. The key challenge is to provide energy efficient communication; however, latency remains an important concern for many applications that require fast response. In this paper, we address the important problem of minimizing average communication latency for the active flows while providing energy-efficiency in wireless sensor networks. As the flows in some wireless sensor network can be long-lived and predictable, it is possible to design schedules for sensor nodes so that nodes can wake up only when it is necessary and asleep during other times. Clearly, the routing layer decision is closely coupled to the wakeup/sleep schedule of the sensor nodes. We formulate a joint scheduling and routing problem with the objective of finding the schedules and routes for current active flows with minimum average latency. By constructing a novel delay graph, the problem can be solved optimally by employing the M node-disjoint paths algorithm under FDMA channel model. We further present extensions of the algorithm to handle dynamic traffic changes and topology changes in wireless sensor networks.  相似文献   

19.
With sensor networks on the verge of deployment, security issues pertaining to the sensor networks are in the limelight. Though the security in sensor networks share many characteristics with wireless ad hoc networks, the two fields are rapidly diverging due to the fundamental differences between the make‐up and goals of the two types of networks. Perhaps the greatest dividing difference is the energy and computational abilities. Sensor nodes are typically smaller, less powerful, and more prone to failure than nodes in an ad hoc network. These differences indicate that protocols that are valid in the context of ad‐hoc networks may not be directly applicable for sensor networks. In this paper, we survey the state of art in securing wireless sensor networks. We review several protocols that provide security in sensor networks, with an emphasis on authentication, key management and distribution, secure routing, and methods for intrusion detection. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

20.
无线传感器网络可靠性建模方法   总被引:1,自引:0,他引:1  
吴巍 《电子测试》2012,(5):46-49,54
无线传感器网络部署设计的基础就是可靠性,因此,对无线传感器网络可靠性研究已经成为全世界在这个领域中研究的一个重点内容。无线传感器网络可靠性研究的一个有效方法就是建立数学模型。为了能够更好地进行无线传感器网络可靠性的建模,本文先介绍了无线传感器网络结构和节点模型,然后主要对无线传感器网络可靠性建模方法进行分析,提出了K-可靠性模型,并对无线传感器网络系统设计时参考依据进行简单说明。经过实践证明,无线传感器网络的可靠性完全能够通过K-可靠性模型进行测量。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号