首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 406 毫秒
1.
In road network, vehicles' location may be identified, and their transmissions may even tracked by eavesdrops (eg, safety messages) that contain sensitive personal information such as identity and location of the vehicle. This type of communication leads to breaking the users' trajectory privacy. Frequently changing pseudonyms are widely accepted as a solution that protects the trajectory privacy of users in road networks. However, this solution may become invalid if a vehicle changes its pseudonym at an improper occasion. To cope with this issue, we presented an efficient pseudonym change strategy with multiple mix zones scheme to provide trajectory privacy for road network. In addition, we protected vehicles against linkability attack by cheating mechanism. Henceforth, we constructed a cheating detection mechanism which allows the vehicles to verify whether the pseudonym change process is successful or not and also detect to malicious vehicles. In this way, users' trajectory privacy can be improved. Finally, by taking the anonymity set size (ASS) as the trajectory privacy metric, we exhibit by means of simulations that the proposed scheme is effective in multiple networks scenarios.  相似文献   

2.
Mobile ad hoc network consists of a group of mobile nodes that can communicate with each other without any infrastructure. Clustering of the mobile nodes ensures efficient use of available bandwidth and high network throughput. Various clustering schemes are developed to improve the energy efficiency and lifetime of the network. However, there is an increase in the energy consumption with the increase in the number of clusters for forwarding data. This paper presents an energy‐efficient clustering approach for collaborative data forwarding in mobile ad hoc network. The cluster head (CH) is selected based on the processing capability of the nodes and link connection metrics. The CH receives the data from the server and forwards the data to the member nodes at a corresponding data rate of the nodes. Data offloading technique manages the data traffic in the network. The CH rejoining approach enables load balancing in the network. The proposed clustering approach achieves a significant reduction in the energy consumption and data traffic and improvement in the throughput rate through stable routing.  相似文献   

3.
The Mobile Adhoc Network (MANET) is a distributed network without any standard infrastructure. In MANETs, several nodes in the network are grouped by which they can communicate with each other. Clustering is a grouping of mobiles nodes performs the communication process by means of optimal usage of available bandwidth and high network throughput. Several clustering schemes exist, but they suffer from the consumption of energy because of the cluster head's workload and increase in the number of clusters. In this paper, we propose a cluster manager‐based cluster head selection (CMBCH) scheme to overcome the energy problems and leverage CH workload. CMBCH consists of two components, such as cluster manager (CM) and cluster head (CH). The CM takes the responsibility of controlling and monitoring of nodes activities. The CH leads and performing packet transfer among the nodes in the network. At this stage, when current CH energy level is drained, CM elects the corresponding node with high energy level and the new, as well as old CH activities, are simultaneously stored by CM. To prove the proposed scheme efficiency, a simulation experiment was conducted for 20 to 100 nodes under the AODV routing protocol. The network parameters packet delivery ratio and energy consumption are compared for the CMBCH,DLC and HCAL. The obtained results are compared to others; CMBCH conserves minimal energy and bandwidth and also achieves reliable throughput through stable routing.  相似文献   

4.
The improvement of sensor networks’ lifetime has been a major research challenge in recent years. This is because sensor nodes are battery powered and may be difficult to replace when deployed. Low energy adaptive clustering hierarchical (LEACH) routing protocol was proposed to prolong sensor nodes lifetime by dividing the network into clusters. In each cluster, a cluster head (CH) node receives and aggregates data from other nodes. However, CH nodes in LEACH are randomly elected which leads to a rapid loss of network energy. This energy loss occurs when the CH has a low energy level or when it is far from the BS. LEACH with two level cluster head (LEACH-TLCH) protocol deploys a secondary cluster head (2CH) to relieve the cluster head burden in these circumstances. However, in LEACH-TLCH the optimal distance of CH to base station (BS), and the choicest CH energy level for the 2CH to be deployed for achieving an optimal network lifetime was not considered. After a survey of related literature, we improved on LEACH-TLCH by investigating the conditions set to deploy the 2CH for an optimal network lifetime. Experiments were conducted to indicate how the 2CH impacts on the network at different CH energy levels and (or) CH distance to BS. This, is referred to as factor-based LEACH (FLEACH). Investigations in FLEACH show that as CHs gets farther from the BS, the use of a 2CH extends the network lifetime. Similarly, an increased lifetime also results as the CH energy decreases when the 2CH is deployed. We further propose FLEACH-E which uses a deterministic CH selection with the deployment of 2CH from the outset of network operation. Results show an improved performance over existing state-of-the-art homogeneous routing protocols.  相似文献   

5.
The advances in the size, cost of deployment, and user‐friendly interface of wireless sensor devices have given rise to many wireless sensor network (WSN) applications. WSNs need to use protocols for transmitting data samples from event regions to sink through minimum cost links. Clustering is a commonly used method of data aggregation in which nodes are organized into groups to reduce energy consumption. Nonetheless, cluster head (CH) has to bear an additional load in clustering protocols to organize different activities within the cluster. Proper CH selection and load balancing using efficient routing protocol is therefore a critical aspect for WSN's long‐term operation. In this paper, a threshold‐sensitive energy‐efficient cluster‐based routing protocol based on flower pollination algorithm (FPA) is proposed to extend the network's stability period. Using FPA, multihop communication between CHs and base station is used to achieve optimal link costs for load balancing distant CHs and energy minimization. Analysis and simulation results show that the proposed algorithm significantly outperforms competitive clustering algorithms in terms of energy consumption, stability period, and system lifetime.  相似文献   

6.
According to the recent studies, application related with safety associated with road networks must need verification of entities and messages. However, security of road network users like vehicles and drivers needs to be dealt with. Unique identity like pen names and certificates might get useful to ensure security. Pseudonym names and the special certificates are being considered as the basic building blocks to ensure security requirements for road networks. Nevertheless, apart from the seen advantages, road network communication might also generate certain privacy issues by giving opportunity to invader to track vehicles. One and for most basic technique is to solve this issue by means of using pen names by the vehicles and alter them time to time. Since executing the procedure of changing pen names has to increase overhead. By looking at such type of limitations, our given technique will produce top privacy level for the road network users by using dynamic pseudonyms based multiple mix zones scenario. This pseudonym based procedure will base upon vehicle’s acceleration, heading and displacement to execute dynamic pseudonym alteration. We have performed simulation by applying SUMO simulator. After having a detailed comparison with the current pseudonym change techniques, it has been verified that our given technique has shown enhanced performance in terms of acquiring top level privacy rate having few numbers of pseudonyms alteration; broad level of simulations and analysis has been elaborated the efficiency of the given technique.  相似文献   

7.
A wireless sensor network (WSN) is a prominent technology that could assist in the fourth industrial revolution. Sensor nodes present in the WSNs are functioned by a battery. It is impossible to recharge or replace the battery, hence energy is the most important resource of WSNs. Many techniques have been devised and used over the years to conserve this scarce resource of WSNs. Clustering has turned out to be one of the most efficient methods for this purpose. This paper intends to propose an efficient technique for election of cluster heads in WSNs to increase the network lifespan. For the achievement of this task, grey wolf optimizer (GWO) has been employed. In this paper, the general GWO has been modified to cater to the specific purpose of cluster head selection in WSNs. The objective function for the proposed formulation considers average intra‐cluster distance, sink distance, residual energy, and CH balancing factor. The simulations are carried out in diverse conditions. On comparison of the proposed protocol, ie, GWO‐C protocol with some well‐known clustering protocols, the obtained results prove that the proposed protocol outperforms with respect to the consumption of the energy, throughput, and the lifespan of the network. The proposed protocol forms energy‐efficient and scalable clusters.  相似文献   

8.
Most of the current generation sensor nodes of mobile wireless sensor network (MWSN) are designed to have heterogeneous mobility to adapt itself in the applied environment. Energy optimization in MWSN with heterogeneous mobility is very challenging task. In this paper, a heterogeneous game theoretical clustering algorithm called mobile clustering game theory–1 (MCGT‐1) is proposed for energy optimization in a heterogeneous mobile sensor environment. Energy optimization is achieved through energy‐efficient cluster head election and multipath routing in the network. A heterogeneous clustering game is modelled with varying attributes and located an asymmetric equilibrium condition for a symmetric game with mixed strategies. The real‐time parameters, namely, predicted remaining energy, distance between a base station and nodes, distance between nodes, and mobility speed, were used to calculate the probability to elect the cluster head (CH). The efficient multipath routing is achieved through prior energy prediction strategy. It has mitigated the generation of “hot spots,” reducing its delay and improving the overall residual energy of the network. Simulation results showed that the average lifetime of MCGT‐1 has increased by 6.33 %, 13.1% and 14.2% and the PDR has improved by 4.8%,11.8%, and 17.2% than MCGT, LEACH‐ME and LEACH‐M respectively. The hot spot delay is reduced to 0.063025 seconds, improving the efficiency of the network.  相似文献   

9.
Privacy in Vehicular Ad Hoc Networks (VANET) is fundamental because the user's safety may be threatened by the identity and the real‐time spatiotemporal data exchanged on the network. This issue is commonly addressed by the use of certified temporal pseudonyms and their updating strategies to ensure the user's unlinkability and anonymity. IEEE 1609.2 Standard specified the process of certifying pseudonym along with certificates structure. However, the communication procedure between the certifying authority and the requesting vehicle was not defined. In this paper, a new privacy‐preserving solution for pseudonym on‐road on‐demand refilling is proposed where the vehicle anonymously authenticates itself to the regional authority subsidiary of the central trusted authority to request a new pseudonyms pool. The authentication method has two phases, the first one uses anonymous tickets, and the second one is a challenge‐based authentication. The anonymous tickets are certificates that do not include the identity of the user. Instead, it contains a reference number and the certifying authority signature. The challenge authentication is identity‐less to preserve the privacy, yet it is used to prevent the misuse of tickets and the impersonation of its owner. Our proposed scheme is analyzed by the use of Burrows, Abadi and Needham (BAN) logic to demonstrate its correctness. It is also specified and checked by using the Security Protocol ANimator (SPAN) and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tools. The logical demonstration proved that this privacy‐preserving authentication is assured. The SPAN and AVISPA tools illustrated that it is resilient to security attacks.  相似文献   

10.
Designing energy efficient communication protocols for wireless sensor networks (WSNs) to conserve the sensors' energy is one of the prime concerns. Clustering in WSNs significantly reduces the energy consumption in which the nodes are organized in clusters, each having a cluster head (CH). The CHs collect data from their cluster members and transmit it to the base station via a single or multihop communication. The main issue in such mechanism is how to associate the nodes to CHs and how to route the data of CHs so that the overall load on CHs are balanced. Since the sensor nodes operate autonomously, the methods designed for WSNs should be of distributed nature, i.e., each node should run it using its local information only. Considering these issues, we propose a distributed multiobjective‐based clustering method to assign a sensor node to appropriate CH so that the load is balanced. We also propose an energy‐efficient routing algorithm to balance the relay load among the CHs. In case any CH dies, we propose a recovery strategy for its cluster members. All our proposed methods are completely distributed in nature. Simulation results demonstrate the efficiency of the proposed algorithm in terms of energy consumption and hence prolonging the network lifetime. We compare the performance of the proposed algorithm with some existing algorithms in terms of number of alive nodes, network lifetime, energy efficiency, and energy population.  相似文献   

11.
Aiming at the problem that the location distribution of cluster head nodes filtered by wireless sensor network clustering routing protocol was unbalanced and the data transmission path of forwarding nodes was unreasonable,which would increase the energy consumption of nodes and shorten the network life cycle,a clustering routing protocol based on improved particle swarm optimization algorithm was proposed.In the process of cluster head election,a new fitness function was established by defining the energy factor and position equalization factor of the node,the better candidate cluster head node was evaluated and selected,the position update speed of the candidate cluster head nodes was adjusted by the optimized update learning factor,the local search and speeded up the convergence of the global search was expanded.According to the distance between the forwarding node and the base station,the single-hop or multi-hop transmission mode was adopted,and a multi-hop method was designed based on the minimum spanning tree to select an optimal multi-hop path for the data transmission of the forwarding node.Simulation results show that the clustering routing protocol based on improved particle swarm optimization algorithm can elect cluster head nodes and forwarding nodes with more balanced energy and location,which shortened the communication distance of the network.The energy consumption of nodes is lower and more balanced,effectively extending the network life cycle.  相似文献   

12.
面向目标跟踪的无线传感器网络动态分簇   总被引:1,自引:1,他引:0  
在考虑节点剩余能量和节点探测信号强度的基础上,提出了一种面向目标跟踪的无线传感器网络动态分簇方法。由于在簇首选择时考虑了节点的剩余能量,因此可以有效地避免簇首节点能量不足导致的跟踪失败。方法既能保证各个节点均衡地担任簇首节点,又能避免簇首切换过于频繁,因此可以延长网络的使用寿命。计算机仿真结果表明,在满足簇首节点能量需求和簇内节点大部分能观测到目标的情况下,应该取尽量小的能量阈值和尽量大的距离阈值。  相似文献   

13.
In road network, the decision accuracy of event message under location privacy-enhanced scheme, fast forwarding falsification message, and collusion attacks are all knotty problems that arise in event trust management. In this paper, we proposed protocol verification to check vehicles activity in privacy manner. We proposed a new method to adjusted vehicles speed which reduces the vehicle delay suffers from network gap problem. We established privacy preserving authentication protocol to verify vehicle activities in the term of privacy preserving manner. Vehicles moving trend, velocity differences, and distance differences are taken into consideration so, to maintain as many common users as possible to reduce the cost. The cost analysis and performance evaluation indicate that our frame-work can reduced cost factor and achieve good performance. The proposed model achieved reliably and efficiently with packet rate information. The evaluation experiments based on NS-3 to our improve user’s authenticated key establishment protocol has comparatively shorter time response, reduce cost, less packet lost information and enhanced privacy preservation compared with existing methods.  相似文献   

14.
Innovative and emerging developments in sensor networks are proven to be the backbone for real‐time applications such as satellite communications, military and border area surveillance systems, health care systems, traffic monitoring systems, seismic and underwater monitoring systems, and agriculture and habitat environment systems. Coverage and clustering techniques enable the sensor network to operate in group‐based and region‐based communication and thus save the node energy. Energy‐efficient protocols save the node energy and increase the network life cycle in a resource‐constrained sensor network. Cluster head (CH) node manages and controls the operations such as network topology, coverage area, and routing paths (multi‐paths and fault‐tolerant paths) of the network. In this paper, we present deterministic K‐means secure coverage clustering (K‐SCC) with periodic authentication. The proposed protocol uses coverage clustering technique with periodic authentication between the CH node and sensor nodes to establish the secure channel in the network. Maximum cover of K nodes is maintained in the secure coverage cluster to achieve authenticated communication between the sensor nodes in the network. The proposed K‐SCC protocol is compared with the existing protocols such as deterministic‐SCC and random‐SCC protocols. Simulation results indicate that the proposed K‐SCC protocol achieves an average of 84% coverage ratio (cluster/sensor node ratio) as compared with 62% coverage ratio in the existing SCC protocols. Simulations also indicate that the proposed K‐SCC protocol consumes 20% less energy as compared with the existing SCC protocol. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

15.
Energy conservation and fault tolerance are two critical issues in the deployment of wireless sensor networks (WSNs). Many cluster‐based fault‐tolerant routing protocols have been proposed for energy conservation and network lifetime maximization in WSNs. However, these protocols suffer from high frequency of re‐clustering as well as extra energy consumption to tolerate failures and consider only some very normal parameters to form clusters without any verification of the energy sufficiency for data routing. Therefore, this paper proposes a cluster‐based fault‐tolerant routing protocol referred as CFTR. This protocol allows higher energy nodes to become Cluster Heads (CHs) and operate multiple rounds to diminish the frequency of re‐clustering. Additionally, for the sake to get better energy efficiency and balancing, we introduce a cost function that considers during cluster formation energy cost from sensor node to CH, energy cost from CH to sink, and another significant parameter, namely, number of cluster members in previous round. Further, the proposed CFTR takes care of nodes, which have no CH in their communication range. Also, it introduces a routing algorithm in which the decision of next hop CH selection is based on a cost function conceived to select routes with sufficient energy for data transfer and distribute uniformly the overall data‐relaying load among the CHs. As well, a low‐overhead algorithm to tolerate the sudden failure of CHs is proposed. We perform extensive simulations on CFTR and compare their results with those of two recent existing protocols to demonstrate its superiority in terms of different metrics.  相似文献   

16.
The arbitrary distribution of sensor nodes and irregularity of the routing path led to unordered data, which is complex to handle in a wireless sensor network (WSN). To increase WSN lifetime, data aggregation models are developed to minimize energy consumption or ease the computational burden of nodes. The compressive sensing (CS) provides a new technique for prolonging the WSN lifetime. A hybrid optimized model is devised for cluster head (CH) selection and CS-based data aggregation in WSN. The method aids to balance the energy amidst different nodes and elevated the lifetime of the network. The hybrid golden circle inspired optimization (HGCIO) is considered for cluster head (CH) selection, which aids in selecting the CH. The CH selection is done based on fitness functions like distance, energy, link quality, and delay. The routing is implemented with HGCIO to transmit the data projections using the CH to sink and evenly disperse the energy amidst various nodes. After that, compressive sensing is implemented with the Bayesian linear model. The convolutional neural network-long short term memory (CNN-LSTM) is employed for the data aggregation process. The proposed HGCIO-based CNN-LSTM provided the finest efficiency with a delay of 0.156 s, an energy of 0.353 J, a prediction error of 0.044, and a packet delivery ratio (PDR) of 76.309%.  相似文献   

17.
由于车载自组网具有节点高速运动、网络拓扑变化快、链路有效时间短等特点,使得传统移动自组网分簇路由协议在车载网中不再适用。基于此,提出了一种新的稳定的分簇路由策略,引入辅簇头的设计理念,并设计了一种高效的岔路口路由策略,通过岔路口二次选择,有效解决岔路口路由冗余问题。通过NS2模拟仿真表明,新的路由策略可有效避免簇结构变化导致的丢包率上升问题,能够以更少的跳数、更低的延时成功传递数据包,具有较好的性能。  相似文献   

18.

Wireless Sensor Network (WSN) has many sensor nodes that connect with sync nodes. The sensor node's power is a limitation. The expense and difficulty of battery charging and replacement affect sensor node life and network length. Clustering reduces the cost of internal cluster communication, thereby conserving energy. Generally, researchers seek for low energy usage via providing data to monitor the cluster's energy use. Many of them are tied to network length. The Ant Group (TAS) technique is the first notion for establishing a cluster using the OC algorithm that saves electricity. Next, we use improved myopia (IM) to find the cluster head (CH). This minimises the number of clusters and the expense of internal communications. The proposed OC-TAS-IM algorithm attempts to enhance energy efficiency. In the network. The route is also conducted using a special algorithm in the low energy adaptive cluster range (reach). It contains Network Simulator implementation and simulation experiments to test specific OC-TAS-IM algorithms (NS2). Because of optimum clustering, the OC-TAS-IM method is stable in terms of energy clustering and grid lifespan.

  相似文献   

19.
In an energy‐constrained wireless sensor networks (WSNs), clustering is found to be an effective strategy to minimize the energy depletion of sensor nodes. In clustered WSNs, network is partitioned into set of clusters, each having a coordinator called cluster head (CH), which collects data from its cluster members and forwards it to the base station (BS) via other CHs. Clustered WSNs often suffer from the hot spot problem where CHs closer to the BS die much early because of high energy consumption contributed by the data forwarding load. Such death of nodes results coverage holes in the network very early. In most applications of WSNs, coverage preservation of the target area is a primary measure of quality of service. Considering the energy limitation of sensors, most of the clustering algorithms designed for WSNs focus on energy efficiency while ignoring the coverage requirement. In this paper, we propose a distributed clustering algorithm that uses fuzzy logic to establish a trade‐off between the energy efficiency and coverage requirement. This algorithm considers both energy and coverage parameters during cluster formation to maximize the coverage preservation of target area. Further, to deal with hot spot problem, it forms unequal sized clusters such that more CHs are available closer to BS to share the high data forwarding load. The performance of the proposed clustering algorithm is compared with some of the well‐known existing algorithms under different network scenarios. The simulation results validate the superiority of our algorithm in network lifetime, coverage preservation, and energy efficiency.  相似文献   

20.
Reducing the energy consumption of sensor nodes and prolonging the life of the network is the central topic in the research of wireless sensor network (WSN) protocol. The low-energy adaptive clustering hierarchy (LEACH) is one of the hierarchical routing protocols designed for communication in WSNs. LEACH is clustering based protocol that utilizes randomized rotation of local cluster-heads to evenly distribute the energy load among the sensors in the network. But LEACH is based on the assumption that each sensor nodes contain equal amount of energy which is not valid in real scenarios. A developed routing protocol named as DL-LEACH is proposed. The DL-LEACH protocol cluster head election considers residual energy of nodes, distance from node to the base station and neighbor nodes, which makes cluster head election reasonable and node energy consumption balance. The simulation results of proposed protocols are compared for its network life time in MATLAB with LEACH protocol. The DL-LEACH is prolong the network life cycle by 75 % than LEACH.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号