首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
刘开南  韩旭 《电信科学》2016,32(9):61-67
无线传感器网络(WSN)环境下,中继节点位置布局性能优劣是影响网络寿命的关键因素之一。目前,针对三维空间高密度WSN,缺少能够在硬件成本和连通性双重约束条件下提高网络寿命的中继节点位置布局方案。基于网格布局方式,提出了一种基于人工蜂群优化算法的中继节点布局方案(ABC-RNDS)。ABC-RNDS方案采用双层网络拓扑结构,首先使用最小生成树法构建骨干网络,再使用人工蜂群优化算法通过网络参数寻优和限制中继节点总数的方法实现网络寿命的延长。实验验证分析表明,在成本和连通性受约束的条件下,ABC-RNDS算法与传统方案相比能够显著提高网络寿命。  相似文献   

2.
In the wireless sensor networks, sensor deployment and coverage are the vital parameter that impacts the network lifetime. Network lifetime can be increased by optimal placement of sensor nodes and optimizing the coverage with the scheduling approach. For sensor deployment, heuristic algorithm is proposed which automatically adjusts the sensing range with overlapping sensing area without affecting the high degree of coverage. In order to demonstrate the network lifetime, we propose a new heuristic algorithm for scheduling which increases the network lifetime in the wireless sensor network. Further, the proposed heuristic algorithm is compared with the existing algorithms such as ant colony optimization, artificial bee colony algorithm and particle swarm optimization. The result reveals that the proposed heuristic algorithm with adjustable sensing range for sensor deployment and scheduling algorithm significantly increases the network lifetime.  相似文献   

3.
In energy‐constrained military wireless sensor networks, minimizing the bit error rate (BER) with little compromise on network lifetime is one of the most challenging issues. This paper presents a new relay selection based on fuzzy logic (RSFL) scheme which provides balance between these parameters. The proposed scheme considers node's residual energy and path loss of the relay‐destination link as the input parameters for the selection of the relay node. The relay node selection by fuzzy logic is based on prioritizing higher residual energy and minimum path loss. To evaluate the performance on wireless sensor network, we compare the proposed scheme with the three existing relay selection strategies, ie, random, maximum residual energy based relay selection (MaxRes), and minimum energy consumption based relay selection (MinEnCon). The simulation results of the proposed scheme in terms of network lifetime, BER, Network Survivability Index (NSI), and average energy of network nodes have been presented and compared with different relay selection schemes. The simulation results show that the proposed RSFL scheme has the lowest BER, moderate network lifetime, average energy, and NSI.  相似文献   

4.
A sensor node in the wireless sensor network has limited energy and it normally cannot be replaced due to the random deployment, so how to prolong the network life time with limited energy while satisfying the coverage quality simultaneously becomes a crucial problem to solve for wireless sensor networks (WSN). In this work, we propose an energy efficient algorithm based on the sentinel scheme to reduce the sleeping node detection density by defining a new deep sleeping state for each sensor node. The average energy consumed by probing neighboring nodes is introduced as a factor to calculate the detection rate. In addition, after some theoretical analysis of the existence of coverage holes in WSN, a triangle coverage repair procedure is defined to repair coverage holes. Simulation results show that our proposed algorithm obtained better performance in terms of the coverage quality and network life time compared with some existing algorithms in the literature.  相似文献   

5.
With the fast development of the micro-electro-mechanical systems(MEMS),wireless sensor networks(WSNs)have been extensively studied.Most of the studies focus on saving energy consumption because of restricted energy supply in WSNs.Cluster-based node scheduling scheme is commonly considered as one of the most energy-efficient approaches.However,it is not always so efficient especially when there exist hot spot and network attacks in WSNs.In this article,a secure coverage-preserved node scheduling scheme for WSNs based on energy prediction is proposed in an uneven deployment environment.The scheme is comprised of an uneven clustering algorithm based on arithmetic progression,a cover set partition algorithm based on trust and a node scheduling algorithm based on energy prediction.Simulation results show that network lifetime of the scheme is 350 rounds longer than that of other scheduling algorithms.Furthermore,the scheme can keep a high network coverage ratio during the network lifetime and achieve the designed objective which makes energy dissipation of most nodes in WSNs balanced.  相似文献   

6.
针对无线传感网预覆盖过程中存在覆盖盲区以及数据频繁重传而导致的节点覆盖抑制现象,提出了一种基于拨备满足模型的无线传感网网络覆盖算法。设计一种新的无线传感网节点覆盖模型,并构建覆盖指数、覆盖强度、覆盖均衡评估系数等评估维度,快速评估节点覆盖质量。再计算覆盖均衡评估系数,并采用拨备模型优化覆盖质量,确定覆盖性能优越的备用工作节点。随后,基于覆盖相似性原则评估工作节点覆盖性能,设计了节点首次覆盖评估方法,按节点移动路径依次评估覆盖指数统计均值,并根据目标节点进入覆盖区域的先后,逐次激活性能最佳的工作节点进行监测。仿真实验表明:与当前无线传感网常数节点覆盖方案相比,所提方案具有更高的网络覆盖率、更短的覆盖启动时间和更少的工作节点数目。  相似文献   

7.
如何有效地部署节点是传感器网络系统设计中首要考虑的问题,它直接影响网络的性能和寿命.目前节点部署环境考虑无限空间或规则区域,但是实际部署环境如战场、森林检测等是有边界且边界形状不一的环境.文中提出了一种低能耗的无线传感器边界节点部署方案,并命名为V-HART方案.一方面方案基于六边形网格的配置策略,减少中心节点数量;另一方面方案将边界节点放置在六边形中垂线处的二维监测区域,节点数量减少,能耗降低.仿真结果显示,相比于凸边形区域节点部署,V-HART使用的节点少,具有能耗小、可靠性高和使用节点少等优点.  相似文献   

8.
在无线传感器网络中,传感节点由于采用电池供电,因此寿命有限。如何有效节省传感器节点的能量,延长网络的使用寿命,一直是广泛研究的焦点。文章提出一种适用于高冗余度布置的无线传感器网络结构中,节省传感器节点能量消耗的方法-接续调度法。该方法通过协调点对小区域内节点的调度,使区域内节点依次分时段工作。通过这种接续调度,避免了节点间的冲突和串扰,达到延长整体网络寿命的效果。  相似文献   

9.
Recent advancement in wireless sensor network has contributed greatly to the emerging of low‐cost, low‐powered sensor nodes. Even though deployment of large‐scale wireless sensor network became easier, as the power consumption rate of individual sensor nodes is restricted to prolong the battery lifetime of sensor nodes, hence the heavy computation capability is also restricted. Localization of an individual sensor node in a large‐scale geographic area is an integral part of collecting information captured by the sensor network. The Global Positioning System (GPS) is one of the most popular methods of localization of mobile terminals; however, the use of this technology in wireless sensor node greatly depletes battery life. Therefore, a novel idea is coined to use few GPS‐enabled sensor nodes, also known as anchor nodes, in the wireless sensor network in a well‐distributed manner. Distances between anchor nodes are measured, and various localization techniques utilize this information. A novel localization scheme Intersecting Chord‐Based Geometric Localization Scheme (ICBGLS) is proposed here, which loosely follows geometric constraint‐based algorithm. Simulation of the proposed scheme is carried out for various communication ranges, beacon broadcasting interval, and anchor node traversal techniques using Omnet++ framework along with INET framework. The performance of the proposed algorithm (ICBGLS), Ssu scheme, Xiao scheme, and Geometric Constraint‐Based (GCB) scheme is evaluated, and the result shows the fact that the proposed algorithm outperforms the existing localization algorithms in terms of average localization error. The proposed algorithm is executed in a real‐time indoor environment using Arduino Uno R3 and shows a significant reduction in average localization time than GCB scheme and similar to that of the SSU scheme and Xiao scheme.  相似文献   

10.
张凯 《无线电工程》2012,42(11):7-9,61
节点部署是无线传感器网络的基本问题之一,关系到网络的感知范围和信息传输服务质量。现有的部署算法需要额外探测和修复边界上的覆盖空洞,从而增加了网络部署的成本而且使得节点分布不均匀。针对这一问题,提出了一种改进的节点部署方案,首先进行边界部署,以保证边界上的完全覆盖和连通;然后在感应区域内生成一个新的凸多边形区域,在此新区域上再递归调用边界部署算法,直到整个感应区域被完全覆盖。理论分析和仿真实验表明,在部署节点个数和可扩展性方面均优于已有的部署方案。  相似文献   

11.
周凯 《电信科学》2018,34(11):48-58
针对水下无线传感器网络节点的部署问题,提出一种基于网格划分的多维优化部署策略。首先,将所需探测水下环境划分成相同规格的网格;然后,综合考虑网络节点数量、网络覆盖率、网络冗余度、网络生存率等指标,构建多目标优化数学模型;最后,采用遗传算法对多维优化部署策略加以实现并进行仿真分析。结果显示:所提策略能够有效地减少部署节点数量,提高网络覆盖率和生存效率,降低网络能耗。  相似文献   

12.
Intrusion detection is one of the most important applications of wireless sensor networks. When mobile objects are entering into the boundary of a sensor field or are moving cross the sensor field, they should be detected by the scattered sensor nodes before they pierce through the field of sensor (barrier coverage). In this paper, we propose an energy efficient scheduling method based on learning automata, in which each node is equipped with a learning automaton, which helps the node to select best node to guarantee barrier coverage, at any given time. To apply our method, we used coverage graph of deployed networks and learning automata of each node operates based on nodes that located in adjacency of current node. Our algorithm tries to select minimum number of required nodes to monitor barriers in deployed network. To investigate the efficiency of the proposed barrier coverage algorithm several computer simulation experiments are conducted. Numerical results show the superiority of the proposed method over the existing methods in term of the network lifetime and our proposed algorithm can operate very close to optimal method.  相似文献   

13.
Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary Denial-of-Service (DoS) attack becomes a serious security threat toward wireless sensor networks. Without adequate defense mechanism, the adversary can simply inundate the network by flooding the bogus data packets, and paralyze the partial or whole sensor network by depleting node battery power. Prior work on false packet filtering in sensor networks are mostly based on symmetric key schemes, with the concern that the public key operations are too expensive for the resource constrained sensors. Recent progress in public key implementations on sensors, however, has shown that public key is already feasible for sensors. In this paper, we present PDF, a Public-key based false Data Filtering scheme that leverages Shamir’s threshold cryptography and Elliptic Curve Cryptography (ECC), and effectively rejects 100% of false data packets. We evaluate PDF by real world implementation on MICAz motes. Our experiment results support the conclusion that PDF is practical for real world sensor deployment.  相似文献   

14.
为有效延长水下无线传感器网络的生命周期、保持网络覆盖率,该文提出一种基于节点休眠的覆盖保持分簇算法。首先计算网络节点的覆盖冗余度,并对覆盖冗余度高的节点执行休眠策略,然后以网络覆盖率及节点能耗均衡性为目标,采用多目标算法进行求解,再利用TOPSIS法从非支配解集中选出较优解,当有节点死亡时,通过唤醒策略保持网络覆盖率。仿真结果表明,与目前较好的网络规划算法相比,该文算法能够更好地降低网络能耗,延长网络生命周期并保持网络对环境的覆盖率。  相似文献   

15.
An optimum sensor node deployment in wireless sensor network can sense the event precisely in many real time scenarios for example forests, habitat, battlefields, and precision agriculture. Due to these applications, it is necessary to distribute the sensor node in an efficient way to monitor the event precisely and to utilize maximum energy during network lifetime. In this paper, we consider the energy hole formation due to the unbalanced energy consumption in many-to-one wireless sensor network. We propose a novel method using the optimum number of sensor node Distribution in Engineered Corona-based wireless sensor network, in which the interested area is divided into a number of coronas. A mathematical models is proposed to find out the energy consumption rate and to distribute the optimum number of sensor node in each corona according to energy consumption rate. An algorithm is proposed to distribute the optimum number of sensor nodes in corona-based networks. Simulation result shows that the proposed technique utilized 95 % of the total energy of the network during network lifetime. The proposed technique also maximizes the network lifetime, data delivery and reduce the residual energy ratio during network lifetime.  相似文献   

16.
Secure communication over wireless body area network (WBAN) is a key issue in the design and deployment of WBAN systems, in which the authentication of sensor node is a critical process. Conventional authentication schemes are not suitable to the sensor node because of the limitations of memory, computational power and energy in the node. In order to provide an efficient method to verify the identity of sender sensor nodes of WBAN, in this paper a lightweight authentication scheme, TinyZKP, based on zero-knowledge proof (ZKP) is proposed and implemented on TinyOS-based sensor nodes. Our experimental results show that, compared to two ECDSA-based authentication schemes in TinyECC and WM-ECC, the TinyZKP runs 1.9 and 1.4 times faster and the energy cost is reduced by 48 % and 28 %, respectively.  相似文献   

17.
Sleep scheduling with expected common coverage in wireless sensor networks   总被引:1,自引:0,他引:1  
Sleep scheduling, which is putting some sensor nodes into sleep mode without harming network functionality, is a common method to reduce energy consumption in dense wireless sensor networks. This paper proposes a distributed and energy efficient sleep scheduling and routing scheme that can be used to extend the lifetime of a sensor network while maintaining a user defined coverage and connectivity. The scheme can activate and deactivate the three basic units of a sensor node (sensing, processing, and communication units) independently. The paper also provides a probabilistic method to estimate how much the sensing area of a node is covered by other active nodes in its neighborhood. The method is utilized by the proposed scheduling and routing scheme to reduce the control message overhead while deciding the next modes (full-active, semi-active, inactive/sleeping) of sensor nodes. We evaluated our estimation method and scheduling scheme via simulation experiments and compared our scheme also with another scheme. The results validate our probabilistic method for coverage estimation and show that our sleep scheduling and routing scheme can significantly increase the network lifetime while keeping the message complexity low and preserving both connectivity and coverage.  相似文献   

18.
基于进化优化的移动感知节点部署算法   总被引:1,自引:0,他引:1       下载免费PDF全文
南国芳  陈忠楠 《电子学报》2012,40(5):1017-1022
 移动传感器网络中节点部署优化直接影响到网络的能量消耗、对目标区域监控的性能及整个网络的生命周期.本文从网络覆盖和能量消耗两个方面,采用多目标优化对节点部署问题建模,并从集中式角度给出了节点部署问题的遗传算法求解过程.针对一类初始中心部署模型进行实验验证,并和基于向量的算法(VEC)、基于维诺图的算法(VOR)及基于边界扩张虚拟力算法(BEVF)进行性能对比,证明了该算法在大多数情况下可使传感器网络对目标区域的覆盖率最大化,同时保证了网络的连通和网络能耗最小,进而延长了网络的生命周期.  相似文献   

19.
In this paper we investigate the expected lifetime and information capacity, defined as the maximum amount of data (bits) transferred before the first sensor node death due to energy depletion, of a data-gathering wireless sensor network. We develop a fluid-flow based computational framework that extends the existing approach, which requires precise knowledge of the layout/deployment of the network, i.e., exact sensor positions. Our method, on the other hand, views a specific network deployment as a particular instance (sample path) from an underlying distribution of sensor node layouts and sensor data rates. To compute the expected information capacity under this distribution-based viewpoint, we model parameters such as the node density, the energy density and the sensed data rate as continuous spatial functions. This continuous-space flow model is then discretized into grids and solved using a linear programming approach. Numerical studies show that this model produces very accurate results, compared to averaging over results from random instances of deployment, with significantly less computation. Moreover, we develop a robust version of the linear program, which generates robust solutions that apply not just to a specific deployment, but also to topologies that are appropriately perturbed versions. This is especially important for a network designer studying the fundamental lifetime limit of a family of network layouts, since the lifetime of specific network deployment instances may differ appreciably. As an example of this model's use, we determine the optimal node distribution for a linear network and study the properties of optimal routing that maximizes the lifetime of the network.  相似文献   

20.
The intrusion detection in a Wireless Sensor Network is defined as a mechanism to monitor and detect any intruder in a sensing area. The sensor deployment quality is a critical issue since it reflects the cost and detection capability of a wireless sensor network. The quality of deterministic deployment can be determined sufficiently by a rigorous analysis before the deployment. However, when random deployment is required, determining the deployment quality becomes challenging. In the intrusion detection application, it is necessary to define more precise measures of sensing range, transmission range, and node density that impact overall system performance. The major question is centred around the quality of intrusion detection in WSN, how we can guarantee that each point of the sensing area is covered by at least one sensor node, and what a sufficient condition to guarantee the network connectivity? In this paper, we propose an appropriate probabilistic model which provides the coverage and connectivity in k-sensing detection of a wireless sensor network. We have proved the capability of our approach using a geometric analysis and a probabilistic model.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号