首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 468 毫秒
1.
一种基于势博弈的无线传感器网络拓扑控制算法   总被引:1,自引:0,他引:1       下载免费PDF全文
李小龙  冯东磊  彭鹏程 《物理学报》2016,65(2):28401-028401
在实际的应用中,无线传感器网络常常由大量电池资源有限的传感器节点组成.如何降低网络功耗,最大化网络生存时间,是传感器网络拓扑控制技术的重要研究目标.随着传感节点的运行,节点的能量分布可能越来越不均衡,需要在考虑该因素的情况下,动态地调整节点的网络负载以均衡节点的能耗,达到延长网络生存时间的目的.该文引入博弈理论和势博弈的概念,综合考虑节点的剩余能量和节点发射功率等因素,设计了一种基于势博弈的拓扑控制模型,并证明了该模型纳什均衡的存在性.通过构造兼顾节点连通性和能耗均衡性的收益函数,以确保降低节点功耗的同时维持网络的连通性.通过提高邻居节点的平均剩余能量值以实现将剩余能量多的节点选择作为自身的邻居节点,提高节点能耗的均衡性.在此基础上,提出了一种分布式的能耗均衡拓扑控制算法.理论分析证明了该算法能保持网络的连通性.与现有基于博弈理论的DIA算法和MLPT算法相比,本算法形成的拓扑负载较重、剩余能量较小的瓶颈节点数量较少,节点剩余能量的方差较小,网络生存时间更长.  相似文献   

2.
吴佳键  龚凯  王聪  王磊 《物理学报》2018,67(8):88901-088901
如何有效地应对和控制故障在相依网络上的级联扩散避免系统发生结构性破碎,对于相依网络抗毁性研究具有十分重要的理论价值和现实意义.最新的研究提出一种基于相依网络的恢复模型,该模型的基本思想是通过定义共同边界节点,在每轮恢复阶段找出符合条件的共同边界节点并以一定比例实施恢复.当前的做法是按照随机概率进行选择.这种方法虽然简单直观,却没有考虑现实世界中资源成本的有限性和择优恢复的必然性.为此,针对相依网络的恢复模型,本文利用共同边界节点在极大连通网络内外的连接边数计算边界节点的重要性,提出一种基于相连边的择优恢复算法(preferential recovery based on connectivity link,PRCL)算法.利用渗流理论的随机故障模型,通过ER随机网络和无标度网络构建的不同结构相依网络上的级联仿真结果表明,相比随机方法和度数优先以及局域影响力优先的恢复算法,PRCL算法具备恢复能力强、起效时间早且迭代步数少的优势,能够更有效、更及时地遏制故障在网络间的级联扩散,极大地提高了相依网络遭受随机故障时的恢复能力.  相似文献   

3.
We present a comparative network-theoretic analysis of the two largest global transportation networks: the worldwide air-transportation network (WAN) and the global cargo-ship network (GCSN). We show that both networks exhibit surprising statistical similarities despite significant differences in topology and connectivity. Both networks exhibit a discontinuity in node and link betweenness distributions which implies that these networks naturally segregate into two different classes of nodes and links. We introduce a technique based on effective distances, shortest paths and shortest path trees for strongly weighted symmetric networks and show that in a shortest path tree representation the most significant features of both networks can be readily seen. We show that effective shortest path distance, unlike conventional geographic distance measures, strongly correlates with node centrality measures. Using the new technique we show that network resilience can be investigated more precisely than with contemporary techniques that are based on percolation theory. We extract a functional relationship between node characteristics and resilience to network disruption. Finally we discuss the results, their implications and conclude that dynamic processes that evolve on both networks are expected to share universal dynamic characteristics.  相似文献   

4.
无线传感器网络中继节点布居算法的研究   总被引:1,自引:0,他引:1       下载免费PDF全文
王翥  王祁  魏德宝  王玲 《物理学报》2012,61(12):120505-120505
本文表述的是在该应用背景下引入多约束条件, 并采用枚举法与贪婪寻优算法相结合的方法, 解决了在可以作为中继节点设置位置的预设中继节点位置集合内, 合理选择中继节点设置位置以及既存网络因添加新传感器节点所引起的中继节点追加的问题. 仿真实验表明, 本文提出的中继节点布居与追加优化算法能够保证多约束条件下网络的容错性. 同时提出的基于最小网络距离因子评价标准, 有效提高了中继节点布居算法的能效性.  相似文献   

5.
佟晓筠  王翥  左科 《中国物理 B》2012,21(2):20506-020506
The wireless sensor network (WSN) has been widely used in various fields, but it still remains in the preliminary discovery and research phase with a lack of various related mature technologies. Traditional encryption schemes are not suitable for wireless sensor networks due to intrinsic features of the nodes such as low energy, limited computation capability, and lack of storage resources. In this paper, we present a novel block encryption scheme based on the integer discretization of a chaotic map, the Feistel network structure, and an S-box. The novel scheme is fast, secure, has low resource consumption and is suitable for wireless sensor network node encryption schemes. The experimental tests are carried out with detailed analysis, showing that the novel block algorithm has a large key space, very good diffusion and disruptive performances, a strict avalanche effect, excellent statistical balance, and fast encryption speed. These features enable the encryption scheme to pass the SP800-22 test. Meanwhile, the analysis and the testing of speed, time, and storage space on the simulator platform show that this new encryption scheme is well able to hide data information in wireless sensor networks.  相似文献   

6.
郝晓辰  刘伟静  辛敏洁  姚宁  汝小月 《物理学报》2015,64(8):80101-080101
无线传感器网络中, 应用环境的干扰导致节点间距不能被准确度量. 所以利用以节点间距作为权重的闭包图(EG)模型构建的拓扑没有考虑环境的干扰, 忽略了这部分干扰带来的能耗, 缩短了网络生存时间. 针对无线传感器网络拓扑能量不均的特点和EG模型的缺陷, 首先引入节点度调节因子, 建立通信度量模型和节点实际生存时间模型; 其次量化网络节点度, 从而获取满足能量均衡和网络生命期最大化需求的节点度的取值规律; 然后利用该取值规律和函数极值充分条件解析推导出网络最大能量消耗值和最长生存时间, 并获得最优节点度; 最后基于以上模型提出一种健壮性可调的能量均衡拓扑控制算法. 理论证明该拓扑连通且为双向连通. 仿真结果说明网络能利用最优节点度达到较高的健壮性, 保证信息可靠传输, 且算法能有效平衡节点能耗, 提高网络健壮性, 延长网络生命周期.  相似文献   

7.
《Comptes Rendus Physique》2018,19(4):187-204
Many networks have nodes located in physical space, with links more common between closely spaced pairs of nodes. For example, the nodes could be wireless devices and links communication channels in a wireless mesh network. We describe recent work involving such networks, considering effects due to the geometry (convex, non-convex, and fractal), node distribution, distance-dependent link probability, mobility, directivity, and interference.  相似文献   

8.
刘洲洲  王福豹 《物理学报》2014,63(19):190504-190504
针对无线传感器网络节点能耗不均衡问题,通过对节点生命期建模,得出节点生命期受节点剩余能量和通信距离的影响,进而将两端节点生命期作为构建拓扑时边权重的影响因子,通过边权重控制节点权重,最终得出了一种能耗均衡的无线传感器网络加权无标度拓扑模型,并理论证明了该模型的点权、边权和节点度均服从幂律分布.实验结果表明,该模型具有无标度拓扑的强容错性,并有效的均衡了网络中的节点能耗,延长了网络的生命期.  相似文献   

9.
Along with the fast development of the marine economy and ever-increasing human activities, handy and reliable marine networking services are increasingly required in recent years. The ocean faces challenges to support cost-effective communication due to its special environments. Opportunistic networks with easy deployment and self-curing capability are expected to play an important role to adapt to such dynamic networking environments. In the literature, routing schemes for opportunistic networks mainly exploit node mobility and local relaying technologies. They did not take into account the impact of node behaviors on encountering opportunities and in case of no further relaying, network performance would be greatly degraded. To solve the problem, we propose an efficient routing scheme based on node attributes for opportunistic networks. We first construct delivery competency to predict the further relay nodes. Then a forwarding willingness mechanism is introduced to evaluate the relaying probability combining device capacity and movement behaviors of nodes. Finally, the utility metric is used to make decisions on message forwarding. The results show that the proposed scheme improves network performance in terms of delivery ratio, average latency, and overhead ratio as compared to other schemes.  相似文献   

10.
Blind spots in sensor networks, i.e., individual nodes or small groups of nodes isolated from the rest of the network, are of great concern as they may significantly degrade the network's ability to collect and process information. As the operations of many types of sensors in realistic applications rely on short-lifetime power supplies (e.g., batteries), once they are used up ("off"), replacements become necessary ("on"). This off-and-on process can lead to blind spots. An issue of both theoretical and practical interest concerns the dynamical process and the critical behavior associated with the occurrence of blind spots. In particular, there can be various network topologies, and the off-and-on process can be characterized by the probability that a node functions normally, or the occupying probability of a node in the network. The question to be addressed in this paper concerns how the dynamics of blind spots depend on the network topology and on the occupying probability. For regular, random, and mixed networks, we provide theoretical formulas relating the probability of blind spots to the occupying probability, from which the critical point for the occurrence of blind spots can be determined. For scale-free networks, we present a procedure to estimate the critical point. While our theoretical and numerical analyses are presented in the framework of sensor networks, we expect our results to be generally applicable to network partitioning issues in other networks, such as the wireless cellular network, the Internet, or transportation networks, where the issue of blind spots may be of concern.  相似文献   

11.
Massive MIMO is an essential technology in developing 5G networks and a concept that may be applied to other wireless systems. However, the advantages of adopting massive MIMO for broadband communication are well-established. Recently researcher has been devoted to building communication systems sustaining high communication rates with security. While massive MIMO for Internet-of-Things (IoT) connectivity is still a developing issue, IoT connectivity has requirements and limitations that differ significantly from broadband connections. Although IoT makes people’s lives easier by allowing physical devices to flow through, the interaction of open wireless channels such as Bluetooth, ZigBee, LoRa, Narrowband-Internet of Things (NBIoT), and WiFi, has produced various security and privacy difficulties. Identity authentication is one of the effective solutions for addressing the Internet of Things security and privacy concerns. The typical point-to-point authentication technique ignores the internet of things’ massive number of nodes and limited node resources. Group authentication is an authentication method that simultaneously confirms the identity of a group of members, offering a novel approach to identity identification for the internet of things nodes. However, existing group authentication systems appropriate for the internet of things scenarios pose security issues. They cannot withstand malicious attacks such as forging and replay and cannot prevent group managers from fooling group members. Most existing group authentication schemes are computationally expensive and cannot be applied to resource-constrained IoT scenarios. At the same time, existing systems based on secret-sharing technology cannot resist forgery attacks and replay attacks. The attacker can forge a legal token by modifying the Lagrangian coefficient in the authentication token to pass the group authentication. This work employs verifiable secret sharing technology to create a lightweight verifiable group authentication method (L-IoT-GS) suitable for Internet of Things situations to resist group managers’ deceptive group behavior. Nodes in the Internet of Things scenario can frequently join and leave the network. Because of this, this article proposes a critical update link based on a verified group authentication system for updating group Member rights. According to security analysis, the suggested L-IoT-GS scheme meets accuracy and confidentiality requirements and can withstand malicious attacks such as replay, forgery, and impersonation. Furthermore, performance study and experimental simulation reveal that the L-IoT-GS technique minimizes group members’ computing costs compared to existing standard IoT group authentication schemes.  相似文献   

12.
The interplay between topology changes and the redistribution of traffic plays a significant role in many real-world networks. In this paper we study how the load of the remaining network changes when nodes are removed. This removal operation can model attacks and errors in networks, or the planned control of network topology. We consider a scenario similar to the data communication networks, and measure the load of a node by its betweenness centrality. By analysis and simulations, we show that when a single node is removed, the change of the remaining network’s load is positively correlated with the degree of the removed node. In multiple-node removal, by comparing several node removal schemes, we show in detail how significantly different the change of the remaining network’s load will be between starting the removal from small degree/betweenness nodes and from large degree/betweenness nodes. Moreover, when starting the removal from small degree/betweenness nodes, we not only observe that the remaining network’s load decreases, which is consistent with previous studies, but also find that the load of hubs keeps decreasing. These results help us to make a deeper understanding about the dynamics after topology changes, and are useful in planned control of network topology.  相似文献   

13.
Shudong Li  Lixiang Li  Yixian Yang 《Physica A》2011,390(6):1182-1191
In this paper, we present a novel local-world model of wireless sensor networks (WSN) with two kinds of nodes: sensor nodes and sink nodes, which is different from other models with identical nodes and links. The model balances energy consumption by limiting the connectivity of sink nodes to prolong the life of the network. How the proportion of sink nodes, different energy distribution and the local-world scale would affect the topological structure and network performance are investigated. We find that, using mean-field theory, the degree distribution is obtained as an integral with respect to the proportion of sink nodes and energy distribution. We also show that, the model exhibits a mixed connectivity correlation which is greatly distinct from general networks. Moreover, from the perspective of the efficiency and the average hops for data processing, we find some suitable range of the proportion p of sink nodes would make the network model have optimal performance for data processing.  相似文献   

14.
In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks, which has been ignored in previous studies. It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes. The theoretical results are confirmed by numerical simulations.  相似文献   

15.
刘春 《应用声学》2015,23(5):1602-1605
为了提高无线传感器分析网络可靠性,提出一种基于二元决策图和故障树相融合的无线传感器网络可靠分析方法;首先根据无线传感器网络拓扑结构建立了故障树模型,然后将无线传感器网络故障树转化为二元决策图结构,最后采用仿真实验分析了不同节点冗余度、不同跳数条件下无线传感器网络的可靠性;仿真结果表明,文章方法的分析结果可以帮助无线传感器网络性能的优化,可以提高无线传感器网络的可靠性。  相似文献   

16.
Li Ding 《Physica A》2008,387(12):3008-3016
A critical issue in wireless sensor networks (WSNs) is represented by limited availability of energy within network nodes. Therefore, making good use of energy is necessary in modeling sensor networks. In this paper we proposed a new model of WSNs on a two-dimensional plane using site percolation model, a kind of random graph in which edges are formed only between neighbouring nodes. Then we investigated WSNs connectivity and energy consumption at percolation threshold when a so-called phase transition phenomena happen. Furthermore, we proposed an algorithm to improve the model; as a result the lifetime of networks is prolonged. We analyzed the energy consumption with Markov process and applied these results to simulation.  相似文献   

17.
In this paper, we propose a single hop architecture for a cooperative wireless sensor network and analyze the attained distributed beamforming gain performance using the theory of random arrays. All nodes in the system transmit a single carrier such that the signals add up constructively towards the direction of the fusion center. The potential directive beamforming gains are investigated for different sensor network densities which are expressed as the number of nodes per carrier wavelength squared. The multiple access capability of the sensor network is achieved by employing an on-off keying orthogonal signaling technique, which is usually employed in atmospheric optical systems. Finally, we investigate the average loss in directivity gain when the received signal from each sensor node follows a Ricean distribution. The results show that high directive gains can be achieved in practical wireless sensor networks using simple sensor nodes.  相似文献   

18.
作为下一代通信网络,无线认知网络已成为当前的研究热点。由于节点的移动性,无线网络拓扑结构动态变化,拓扑控制一直是无线网络的难点问题。通过借鉴移动自组织网络(MANETS)中的拓扑控制方法,提出了无线认知网络中基于博弈论和认知功能相结合的拓扑控制方法。无线认知节点能够通过主动决策调节自身节点位置,在保证网络连通性的基础上实现网络覆盖面积最大。仿真实验结果验证了方法的有效性和收敛性。  相似文献   

19.
《Physics letters. A》2014,378(18-19):1239-1248
Synchronization is one of the most important features observed in large-scale complex networks of interacting dynamical systems. As is well known, there is a close relation between the network topology and the network synchronizability. Using the coupled Hindmarsh–Rose neurons with community structure as a model network, in this paper we explore how failures of the nodes due to random errors or intentional attacks affect the synchronizability of community networks. The intentional attacks are realized by removing a fraction of the nodes with high values in some centrality measure such as the centralities of degree, eigenvector, betweenness and closeness. According to the master stability function method, we employ the algebraic connectivity of the considered community network as an indicator to examine the network synchronizability. Numerical evidences show that the node failure strategy based on the betweenness centrality has the most influence on the synchronizability of community networks. With this node failure strategy for a given network with a fixed number of communities, we find that the larger the degree of communities, the worse the network synchronizability; however, for a given network with a fixed degree of communities, we observe that the more the number of communities, the better the network synchronizability.  相似文献   

20.
Wireless Sensor Networks (WSN) are widely used in recent years due to the advancements in wireless and sensor technologies. Many of these applications require to know the location information of nodes. This information is useful to understand the collected data and to act on them. Existing localization algorithms make use of a few reference nodes for estimating the locations of sensor nodes. But, the positioning and utilization of reference nodes increase the cost and complexity of the network. To reduce the dependency on reference nodes, in this paper, we have developed a novel optimization based localization method using only two reference nodes for the localization of the entire network. This is achieved by reference nodes identifying a few more nodes as reference nodes by the analysis of the connectivity information. The sensor nodes then use the reference nodes to identify their locations in a distributive manner using Artificial Hummingbird Algorithm (AHA). We have observed that the localization performance of the reported algorithm at a lower reference node ratio is comparable with other algorithms at higher reference node ratios.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号