共查询到20条相似文献,搜索用时 31 毫秒
1.
无线传感器网络是复杂的无线网络。无线传感器网络拥有大量的网络节点。网络节点是无线传感器网络的基础。为了研究复杂的无线传感器网络,采用了神经元描述了WSN的网络节点,用神经元模型表示了无线传感器网络。给出了无线待感器网络节点的神经元模型和无线传感器网络的神经网络模型,并将神经网络应用于无线传感器网络的数据融合应用。结果表明,基于神经网络的无线传感器网络研究可以使得复杂研究变得简单,利于开展WSN的深入研究。 相似文献
2.
With the increasing need for intelligent environment monitoring applications and the decreasing cost of manufacturing sensor devices, it is likely that a wide variety of sensor networks will be deployed in the near future. In this environment, the way to access heterogeneous sensor networks and the way to integrate various sensor data are very important. This paper proposes the common system for middleware of sensor networks (COSMOS), which provides integrated data processing over multiple heterogeneous sensor networks based on sensor network abstraction called the sensor network common interface. Specifically, this paper introduces the sensor network common interface which defines a standardized communication protocol and message formats used between the COSMOS and sensor networks. 相似文献
3.
介绍了无线传感器网络中一种实用性很强的线性无线传感器网络,分析了线性无线传感器网络相比较一般无线传感器网络的优势以及研究中的一些难题,并从实际应用的角度分析了线性无线传感器网络的研究方向。 相似文献
4.
With rapid development of sensor networks technology, it becomes feasible to deploy multiple sensor networks in relevant area to collect interested information. Sensor nodes that are co-located but belong to different sensor networks may not be able to collaborate properly to gain the capacity or performance. In this paper we propose a semantic-based sensor networks architecture that enables inter-networking of sensor networks. In this Semantic Sensor Net (Ssn), a semantic tag is attached to the sensory data so that the sensor networks are able to exchange information and work collaboratively. The process of semantic creation and maintenance is described. We also introduce the concept of InterSensorNet. This infrastructure enables efficient information exchange and information extraction among multiple sensor networks. 相似文献
5.
无线传感器网络由于其自身的特性,如计算资源、能量、存储资源以及带宽的局限性从而面临巨大的安全问题,较普通网络更易受到外界的攻击。研究了一种在无线传感器网络中使用的完全层次树的节点密钥共享方案,该方案使任意两个节点之间共享若干密钥。理论和应用分析显示所提出的方案具有有效性和安全性的特点。同时,通过相关方案比较表明该方案较其它方案更适合无线传感器网络,可以有效的抵御一类Rushing引起的网络DoS攻击。 相似文献
6.
Time synchronization in sensor networks: a survey 总被引:2,自引:0,他引:2
Time synchronization is an important issue in multihop ad hoc wireless networks such as sensor networks. Many applications of sensor networks need local clocks of sensor nodes to be synchronized, requiring various degrees of precision. Some intrinsic properties of sensor networks, such as limited resources of energy, storage, computation, and bandwidth, combined with potentially high density of nodes make traditional synchronization methods unsuitable for these networks. Hence, there has been an increasing research focus on designing synchronization algorithms specifically for sensor networks. This article reviews the time synchronization problem and the need for synchronization in sensor networks, then presents in detail the basic synchronization methods explicitly designed and proposed for sensor networks. 相似文献
7.
8.
Artificial fish-swarm based coverage-enhancing algorithm for visible light sensor networks 总被引:1,自引:0,他引:1
An artificial fish-swarm based coverage-enhancing algorithm(AFCEA) for visible light sensor networks is proposed.In AFCEA,the improved optimization algorithm is used into the solution for coverage-enhancing in directional visible light sensor networks with the rotational direction model.Compared with other classic directional sensor networks coverageenhancing algorithms,AFCEA can achieve a higher directional sensor networks coverage with less iterative computing times. 相似文献
9.
Secure routing in wireless sensor networks: attacks and countermeasures 总被引:10,自引:0,他引:10
We consider routing security in wireless sensor networks. Many sensor network routing protocols have been proposed, but none of them have been designed with security as a goal. We propose security goals for routing in sensor networks, show how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensor networks, introduce two classes of novel attacks against sensor networks––sinkholes and HELLO floods, and analyze the security of all the major sensor network routing protocols. We describe crippling attacks against all of them and suggest countermeasures and design considerations. This is the first such analysis of secure routing in sensor networks. 相似文献
10.
One-dimensional sensor networks can be found in many fields and demand node location information for various applications. Developing localization algorithms in one-dimensional sensor networks is trivial, due to the fact that existing localization algorithms developed for two- and three-dimensional sensor networks are applicable; nevertheless, analyzing the corresponding localization errors is non-trivial at all, because it is helpful to improving localization accuracy and designing sensor network applications. This paper deals with localization errors in distance-based multi-hop localization procedures of one-dimensional sensor networks through the Cramér-Rao lower bound (CRLB). We analyze the fundamental behaviors of localization errors and show that the localization error for a sensor is locally determined by network elements within a certain range of this sensor. Moreover, we break down the analysis of localization errors in a large-scale sensor network into the analysis in small-scale sensor networks, termed unit networks, in which tight upper and lower bounds on the CRLB can be established. Finally, we investigate two practical issues: the applicability of the analysis based on the CRLB and the optimal anchor placement. 相似文献
11.
本文介绍了无线传感器网络发展现状及其应用情况,分析了无线传感网存在的安全问题及面临的安全威胁,并综合考虑无线传感网存在的自身限制,给出了保障无线传感器网络安全的综合解决方案,为无线传感器网络大范围推广应用提供了技术支撑。 相似文献
12.
Effective energy management in heterogeneous wireless sensor networks is more challenging issue compared to homogeneous wireless sensor networks. Much of the existing research focuses on homogeneous wireless sensor networks. The energy conservation schemes for the homogeneous wireless sensor networks do not perform efficiently when applied to heterogeneous wireless sensor networks. The proposed algorithm in this paper exploits the redundancy properties of the wireless sensor networks and also changes the inter cluster communication pattern depending on the energy condition of the high energy nodes during the life cycle of the heterogeneous wireless sensor networks. Performance studies indicate that the proposed algorithm effectively solves the problem of load balancing across the network and is more energy efficient compared to multi hop versions of the standard low energy adaptive clustering hierarchy protocol. 相似文献
13.
集中传感器、计算机以及通信技术的无线传感器网络技术由于其良好的性能以及广阔的运用空间,得到了广大学者的关注和研究。基于此介绍了无线传感器网络的基本概念、属性,讨论了无线传感器网络的关键技术,并就使用领域进行了阐述。 相似文献
14.
15.
16.
Mobile ad hoc networks and wireless sensor networks have promised a wide variety of applications. However, they are often deployed in potentially adverse or even hostile environments. Therefore, they cannot be readily deployed without first addressing security challenges. Intrusion detection systems provide a necessary layer of in-depth protection for wired networks. However, relatively little research has been performed about intrusion detection in the areas of mobile ad hoc networks and wireless sensor networks. In this article, first we briefly introduce mobile ad hoc networks and wireless sensor networks and their security concerns. Then, we focus on their intrusion detection capabilities. Specifically, we present the challenge of constructing intrusion detection systems for mobile ad hoc networks and wireless sensor networks, survey the existing intrusion detection techniques, and indicate important future research directions. 相似文献
17.
18.
19.