首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 9 毫秒
1.
从进攻方的角度出发,该文研究目标如何以尽可能低的发现概率,消耗尽可能少的时间穿越已被传感器节点监控的区域。基于此研究目标,提出一种兼顾安全和时效性能的SS(Security and Speed)启发式的移动轨迹策略和相应的评价指标综合增益Integrated Gain (IG)。此策略无需全网拓扑信息的支持,能动态地反映目标对安全和时效两种性能的不同需求。通过仿真试验证明,该策略对网络中节点密度和分布有更低的敏感性;和经典的Voronoi算法相比,该策略克服Voronoi中存在的工作盲区和轨迹蔓延的问题,平均综合增益更加接近理想算法的结果,而计算复杂度却远远低于理想算法。  相似文献   

2.
We propose a lightweight trust system for the clustered wireless sensor networks based on the mutual evaluation between the cluster heads and sensor nodes. We evaluate the trust level of a cluster head in two aspects, namely, trust level as a service provider and a supervisor. We consider multidimensional trust attributes to compute the global trust value of a node. By means of the Petri net (PN), we illustrate the performance of an entity in our trust model. Theoretical analyses as well as simulations are done and the results showed that our model with linear computational complexity had less memory and communi-cation overhead when compared with the current state-of-art trust management scheme. In addition, our model can detect malicious and selfish entities (especially the mali-cious cluster head) and resist various attacks efficiently.  相似文献   

3.
The objective of this paper is to develop a new adaptive iterative linear regression based clustering algorithm for wireless sensor network. According to this, the initial cluster is classified horizontally and vertically in parallel, each resulting in two sub-clusters. Of these two, the best is selected based on the proposed similarity index and with this selected cluster as reference, iteration continues until the convergence criterion ‘Delta’ is met. The similarity index is designed based on the intra cluster similarity and inter cluster dissimilarity. Delta is the difference between the similarity index of the current iteration and the previous iteration. The proposal is implemented in MATLAB and simulations are carried out under different network scenarios. The cluster quality is evaluated through external and internal indices using the Cluster Validity Analysis Platform tool. The cluster obtained by the proposal is studied and its quality is compared with the well-established k-means and hierarchical clustering. The performance indices confirm the supremacy of the proposal.  相似文献   

4.
Wireless sensor network (WSN) consists of wireless small sensor nodes deployed in the terrain for continuous observation of physical or environmental conditions. The data collected from the WSN is used for making decisions. The condition for making critical decision is to assure the trustworthiness of the data generated from sensor nodes. However, the approaches for scoring the sensed data alone is not enough in WSN since there is an interdependency between node and data item. If the overall trust score of the network is based on one trust component, then the network might be misguided. In this work, we propose the hybrid approach to address the issue by assigning the trust score to data items and sensor nodes based on data quality and communication trust respectively. The proposed hybrid trust management scheme (HTMS) detects the data fault with the help of temporal and spatial correlations. The correlation metric and provenance data are used to score the sensed data. The data trust score is utilized for making decision. The communication trust and provenance data are used to evaluate the trust score of intermediate nodes and source node. If the data item is reliable enough to make critical decisions, a reward is given by means of adding trust score to the intermediate nodes and source node. A punishment is given by reducing the trust score of the source and intermediate nodes, if the data item is not reliable enough to make critical decisions. Result shows that the proposed HTMS detects the malicious, faulty, selfish node and untrustworthy data.  相似文献   

5.
Wireless Personal Communications - In Wireless Sensor Network (WSN), the lifetime optimization based on minimal energy consumption and security are the crucial issues for the effective design of...  相似文献   

6.
Wireless Personal Communications - Wireless sensor network (WSN) is applicable in all IoT applications, thus it has many advancements. However, it has many drawbacks like localization, link...  相似文献   

7.
无线传感器网络的体系结构   总被引:9,自引:1,他引:9  
在对无线传感器应用特征进行分析的基础上,总结了无线传感器体系结构设计的要素,讨论了无线传感器网络的二维体系结构和组网方式.通过与传统Ad hoc网络的对比,归纳了无线传感器网络在各层各面设计的特点.文章认为虽然传统的传感器的应用方向主要在军事领域,但在民用领域也存在着广阔的前景.  相似文献   

8.
通过对MAC协议运行原理、具有的优缺点、目前所存在的问题以及网络中信道接入机制和能效问题进行分析的基础上,给出一种侦听/睡眠和CDMA相结合的混合MAC协议,此协议采用周期性侦听/睡眠机制和CDMA技术来保证数据的流畅传输,从而实现能量的有效利用。最后,利用仿真软件NS2证明新方法的优越性和高效性。  相似文献   

9.
基于Contact的资源查询机制是依据小世界理论提出来的,该机制要求网络中各个节点不仅维护R跳以内的“邻居”节点的资源状态,而且还选择维护少数较远节点(Contact)的状态。Contact大大降低了查询源与目标的“分离度”。论文提出的SMQM查询机制在CARD和TRANSFER的研究成果基础上,对于Contact的选择方法进行了重要的改进。SMQM性能的仿真试验结论说明,SMQM查询机制的性能优于CARD协议。SMQM查询机制着眼于寻找“可行”的路径,而不是最“优”路径,由此降低了路径建立开销、单次查询的总能耗,提高了网络的生命周期。  相似文献   

10.
Estimating the positions of sensor nodes is a fundamental and crucial problem in wireless sensor networks. In this paper, three novel subspace methods for node localization in a fully connected network are devised with the use of range measurements. Biases and mean square errors of the sensor node position estimates are also derived. Computer simulations are included to contrast the performance of the proposed algorithms with the conventional subspace positioning method, namely, classical multidimensional scaling, as well as Cramer-Rao lower bound.  相似文献   

11.

Wireless sensor networks (WSNs) are susceptible to many security threats and are specifically prone to physical node capture in which the adversary can easily launch the so-called insider attacks such as node compromise, bypassing the traditional security mechanisms based on cryptography primitives. So, the compromised nodes can be modified to misbehave and disrupt the entire network and can successfully perform the authentication process with their neighbors, which have no way to distinguish fraudulent nodes from trustworthy ones. Trust and reputation systems have been recently suggested as a powerful tools and an attractive complement to cryptography-based schemes in securing WSNs. They provide ability to detect and isolate both faulty and malicious nodes. Considerable research has been done on modeling and managing trust and reputation. However, trust topic issue in WSNs remains an open and challenging field. In this paper, we propose a Risk-aware Reputation-based Trust (RaRTrust) model for WSNs. Our novel framework uses both reputation and risk to evaluate trustworthiness of a sensor node. Risk evaluation is used to deal with the dramatic spoiling of nodes, which makes RaRTrust robust to on–off attack and differ from other trust models based only on reputation. This paper contributes to model the risk as opinion of short-term trustworthiness combining with traditional reputation evaluation to derive trustworthiness in WSNs.

  相似文献   

12.
Wireless sensor networks (WSNs) need simple and effective approaches to reduce energy consumption because of limited energy. Clustering nodes is an effective approach to make WSNs energy-efficient. In this paper we propose a distributed multi-competitive clustering approach (DMCC) for WSNs. First, the nodes with high residual energy are selected to act as cluster head candidates (CHCs). Second, cluster heads (CHs) are selected from the CHCs based on a hybrid of competition. If the distances to the selected CHs are suitable, a CHC with more neighbor nodes and smaller average distance to its neighbor nodes is more likely to become a CH. If the number of CHs selected from the CHCs is insufficient, more CHs are selected from non-CHCs continually according to residual energy until the CHs number is suitable. DMCC makes the CHs number stable and distribute the CHs evenly. Simulation experiments were performed on to compare DMCC with some related clustering approaches. The experimental results suggest that DMCC balances the load among different clusters and reduces the energy consumption, which improves the network lifetime.  相似文献   

13.
基于P2P的无线传感器网络应用架构研究   总被引:3,自引:0,他引:3  
通过基础网络互联多个传感器网络,为用户提供大规模、大范围、多样化的信息服务成为未来无线传感器网络的应用模式之一。据此,提出了一种基于P2P(Peer-to—Peer)技术的无线传感器网络应用架构。采用P2P技术,解决了大数据量的通信瓶颈,传感器网络亦可自由加入、变更或退出,方便部署,网络可扩展性好.同时屏蔽底层网络差异及多种接入方式.为用户提供多个访问入口。  相似文献   

14.
A Cross-Layer Architecture of Wireless Sensor Networks for Target Tracking   总被引:1,自引:0,他引:1  
We propose the Low Energy Self-Organizing Protocol (LESOP) for target tracking in dense wireless sensor networks. A cross-layer design perspective is adopted in LESOP for high protocol efficiency, where direct interactions between the Application layer and the Medium Access Control (MAC) layer are exploited. Unlike the classical Open Systems Interconnect (OSI) paradigm of communication networks, the Transport and Network layers are excluded in LESOP to simplify the protocol stack. A lightweight yet efficient target localization algorithm is proposed and implemented, and a Quality of Service (QoS) knob is found to control the tradeoff between the tracking error and the network energy consumption. Furthermore, LESOP serves as the first example in demonstrating the migration from the OSI paradigm to the Embedded Wireless Interconnect (EWI) architecture platform, a two-layer efficient architecture proposed here for wireless sensor networks  相似文献   

15.
定向扩散算法周期性地扩散探测分组时,会给网络带来很大负载,严重影响了数据分组的传输性能。该文提出了一种基于梯度的受限扩散算法。通过分析邻居梯度,计算扩散的广度和深度,进而选取最优的转发节点集进行扩散。仿真结果表明受限扩散算法在保证较低能量消耗的前提下,大大缩短了扩散持续的时间和数据分组端到端时延。  相似文献   

16.
结合无线传感器网络自身特点,提出一种三层可计算QoS指标体系;在此基础上,根据各种应用不同QoS需求将应用分为四类,设计出一种基于区分服务的无线传感器网络跨层QoS体系结构(CQAW),并给出了参考实现框架.  相似文献   

17.
Wireless Personal Communications - Grid based sensor networks are significant for applications such as monitoring goods in a warehouse, studying traffic level of city streets, monitoring energy...  相似文献   

18.
Anand  C.  Vasuki  N. 《Wireless Personal Communications》2021,121(4):2911-2926
Wireless Personal Communications - Wireless sensor network occupies an inevitable role in various applications that requires data collection and transmission. The tiny wireless sensor nodes are...  相似文献   

19.
Mobile Networks and Applications - In Wireless Sensor Networks (WSNs), energy-efficient routing is required to conserve the scarce resources of these networks. Various energy-efficient routing...  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号