首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Resource-constrained nodes in unattended wireless sensor network (UWSN) operate in a hostile environment with less human intervention. Achieving the optimal quality of service (QoS) in terms of packet delivery ratio, delay, energy, and throughput is crucial. In this paper, we propose a topology control and data dissemination protocol that uses multi-agent reinforcement learning (MRL) and energy-aware convex-hull algorithm, for effective self-configuration and self-optimization (SCSO) in UWSN, called MRL-SCSO. MRL-SCSO maintains a reliable topology in which the effective active neighbor nodes are selected using MRL. The network boundary is determined using convex-hull algorithm to maintain the connectivity and coverage of the network. The boundary nodes transmit data under high traffic load conditions. The performance of MRL-SCSO is evaluated for various nodes count and under different load conditions by using the Contiki’s Cooja simulator. The results showed that MRL-SCSO stabilizes the performance and improves QoS.  相似文献   

2.
3.
4.
针对无线传感网络(WSNs)的数据传输问题,提出基于转发区域调整的能效地理位置路由(FAEG)。FAEG限定了数据包的转发区域,构建候选转发节点集,并从节点集中选择权重大的节点传递数据包;通过节点剩余能量和离目的节点距离信息计算节点权重,使剩余能量大和离目的节点近的节点具有优先传递数据包的资格,提高了路由稳定性。节点遭遇路由空洞时,则调整转发区域,在更广范围内选择传输数据包的节点。仿真结果表明,提出的FAEG降低了能耗,并提高了数据包传递率。  相似文献   

5.
针对无线传感器网络节点资源受限及通信链路易出错的问题,给出一种安全高效的无线传感器网络远程身份验证协议.该协议采用集中式基于簇的分层无线传感器网络选出最优百分比的簇头,并对其与相邻节点的通信进行授权,再最小化节点能耗实现网络负载平衡,然后每个簇头作为服务器在每个传递消息的有效负载内保证数据认证与交换,对相邻节点进行身份...  相似文献   

6.
UWB Systems for Wireless Sensor Networks   总被引:1,自引:0,他引:1  
Wireless sensor networks are emerging as an important area for communications. They enable a wealth of new applications including surveillance, building control, factory automation, and in-vehicle sensing. The sensor nodes have to operate under severe constraints on energy consumption and form factor, and provide the ability for precise self-location of the nodes. These requirements can be fulfilled very well by various forms of ultra-wide-band (UWB) transmission technology. We discuss various techniques and tradeoffs in UWB systems and indicate that time-hopping and frequency-hopping impulse radio physical layers combined with simple multiple-access techniques like ALOHA are suitable designs. We also describe the IEEE 802.15.4a standard, an important system that adopts UWB impulse radio to ensure robust data communications and precision ranging. In order to accommodate heterogeneous networks, it uses specific modulation, coding, and ranging waveforms that can be detected well by both coherent and noncoherent receivers.   相似文献   

7.
无线传感器网络由大量具有传感、计算和通讯能力的节点组成。针对不同的应用目的、工作环境和要求,提出了进行传感器网络建模需要考虑的几个要素。通过对网络基本要素的描述,能够很方便地对传感器网络进行建模。利用这些要素的特征对网络性能进行深入细致地分析以便选择或设计合适的路由协议和数据融合的方法。研究的重点是网络路由协议及其数据融合技术,也适用于其他协议的设计和建模。  相似文献   

8.
Wireless Personal Communications - Wireless Sensor Network (WSN) and its security concern play a vital part in its effecting functioning. WSN routing layer attacks pose a great threat to...  相似文献   

9.
无线传感器网络由大量具有传感、计算和通讯能力的节点组成。针对不同的应用目的、工作环境和要求,提出了进行传感器网络建模需要考虑的几个要素。通过对网络基本要素的描述,能够很方便地对传感器网络进行建模。利用这些要素的特征对网络性能进行深入细致地分析以便选择或设计合适的路由协议和数据融合的方法。研究的重点是网络路由协议及其数据融合技术,也适用于其他协议的设计和建模。  相似文献   

10.
Wireless sensor network is more prone to adversary compare to common wireless network. This is due to the nature of wireless sensor network that involves many nodes, thus making the system more vulnerable. Another reason is the nature of wireless sensor network as an ad hoc network, making it having no hierarchal structure, complicating management tasks. Deploying new technology without security in mind has often proved to be unreasonably dangerous.One of the most fundamental rights in a 'healthy' society is the right of every citizen to be left alone. Article 12 of the U.N, Universal Declaration of Human Rights, states that “No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence.”, in reality, though this right is increasingly being trod upon, along with undreamed of comforts and conveniences for the population in general. The digital revolution has made it possible to gather as well as store information about human behaviour on a massive scale. We leave electronic footprints everywhere we go, footprints that are being watched, analyzed and sold without our knowledge or even control.With this Security and Privacy solutions are mandatory aspects when developing new pervasive technologies such as wireless sensor networks (WSN).This paper analyses the security issues, threats and attacks and requirements of wireless sensor networks. This paper further proposes security framework and security architecture to integrate existing technologies with WSN technology, to provide secure and private communications to its users. Neeli Rashmi Prasad, Associate Professor and Head of Wireless Security and Sensor Networks Lab., part of Wireless Network including Embedded systems Group (WING), Center for TeleInfrastruktur (CTIF), Aalborg University, Aalborg, Denmark. She received her Ph.D. from University of Rome “Tor Vergata”, Rome, Italy, in the field of “adaptive security for wireless heterogeneous networks” in 2004 and M.Sc. (Ir.) degree in Electrical Engineering from Delft University of Technology, The Netherlands, in the field of “Indoor Wireless Communications using Slotted ISMA Protocols” in 1997. She joined Libertel (now Vodafone NL), Maastricht, The Netherlands as a Radio Engineer in 1997. From November 1998 till May 2001, she worked as Systems Architect for Wireless LANs in Wireless Communications and Networking Division of Lucent Technologies (now Agere Systems), Nieuwegein, The Netherlands. From June 2001 to July 2003, she was with T-Mobile Netherlands, The Hague, The Netherlands as Senior Architect for Core Network Group. Subsequently, from July 2003 to April 2004, she was Senior Research Manager at PCOM:I3, Aalborg, Denmark.During her industrial career she coordinated several projects. Just to name few major ones: country wide GSM landmass coverage (Vodafone NL), the impact of IP based security on Lucent WLAN (Wavelan later known as Orinoco) Access Points (APs), implementation of Virtual LAN and IAPP on Orinoco APs, VoIP implementation on APs, design and implementation of real-time embedded software platform for APs, mobile core network evolution towards All-IP for T-Mobile International to technical project lead for Public WLAN deployment for T-Mobile NL.Her publications range from top journals, international conferences and chapters in books. She has also co-edited and co-authored two books titled “WLAN Systems and Wireless IP for Next Generation Communications” and “Wireless LANs and Wireless IP Security, Mobility, QoS and Mobile Network Integration”, published by Artech House, 2001 and 2005. She has supervised several Masters Students projects.In December 1997 she won Best Paper award for her work on ISMA Protocol (Inhibit Sense Multiple Access). Her current research interest lies in wireless security, mobility, mesh networks, WSN, WPAN and heterogeneous networks.She was the Technical Program Committee Co-Chair IWS2005/WPMC05 held on September 18–22, 2005 in Aalborg. She is the Project Coordinator of EC Network of Excellence Project CRUISE on Wireless Sensor Networks. She is also cluster leader of EC Cluster for Sensor Networks. Mahbubul Alam, Ph.D. student at Center for TeleInfrastruktur (CTIF), Aalborg University, Denmark. He is with Cisco Systems, Inc. Netherlands from 2001 and worked as Consulting Systems Engineer in the field of mobile and wireless technology and since September 2002 he works as Business Analyst in areas of mobile, wireless and security. He is now based in Cisco Systems, Inc. San Jose, CA, USA, with focus on home networking, wireless and security. Previously he was with Siemens Netherlands as Systems Engineer and as Technical Team Leader of UMTS group. He received M. Sc. degree in Electrical & Electronic Engineering from Delft University of Technology, The Netherlands in 1998. He has published several papers at international conferences, journals, IEEE communication magazine and chapters for books. His research interest is in the field of wireless sensor networks.  相似文献   

11.
Energy-Efficient Scheduling for Wireless Sensor Networks   总被引:3,自引:0,他引:3  
We consider the problem of minimizing the energy needed for data fusion in a sensor network by varying the transmission times assigned to different sensor nodes. The optimal scheduling protocol is derived, based on which we develop a low-complexity inverse-log scheduling (ILS) algorithm that achieves near-optimal energy efficiency. To eliminate the communication overhead required by centralized scheduling protocols, we further derive a distributed inverse-log protocol that is applicable to networks with a large number of nodes. Focusing on large-scale networks with high total data rates, we analyze the energy consumption of the ILS. Our analysis reveals how its energy gain over traditional time-division multiple access depends on the channel and the data-length variations among different nodes.  相似文献   

12.
江雪 《中兴通讯技术》2007,13(2):39-41,46
传感器节点能量受限,节能是传感器网络中媒体访问控制(MAC)协议设计的首要问题。采用周期性睡眠机制、自适应侦听机制、串音避免机制和消息传递机制可使得传感器媒体访问控制(S-MAC)协议在网络能耗和时延方面得到改进。对S-MAC协议的改进主要有两种方式:动态调整、区别控制包与数据包的发送条件进行发送。对无线传感器网络,要想设计出一种满足各方面要求的MAC协议是不现实的,可针对不同应用的要求,灵活采用不同的方式,设计出相应的协议。  相似文献   

13.
良好的模拟仿真技术对于无线传感器网络显得尤为重要。介绍了现有无线传感器网络的主要模拟仿真平台,并对其优缺点进行了分析比较;讨论了无线传感器网络模拟仿真平台的设计思想及今后的发展方向。  相似文献   

14.
利用无线传感器网络进行目标跟踪时,由于各传感器节点的能量有限,数据蕴含的有效信息又各不相同,因此有必要规划参与目标跟踪的节点集和参与方式,以降低系统开销。本文提出了一种新的基于领导节点的节点规划算法,综合考虑收集数据和领导节点迁移过程中的通信开销,以最大化目标跟踪的性能。求解中以跟踪过程中的误差矩阵作为目标度量,采用高斯-赛德尔(Gauss-Seidel)和凸松弛等方法,使得复杂的带约束优化问题能够在接近O(N3)的时间复杂度内得到求解。仿真结果表明,与对比算法相比,本算法在相同的通信能量约束下能够达到更好的跟踪性能。  相似文献   

15.
Wireless Sensor Networks (WSNs) have an ever increasing variety of multimedia based applications. Ιn these types of applications, network nodes should ideally maximize QoS and minimize energy expenditures in video communication. This article presents PEMuR, a novel dual scheme for efficient video communication, which aims at both energy saving and high QoS attainment. To achieve its objectives, PEMuR proposes the combined use of an energy aware hierarchical routing protocol with an intelligent video packet scheduling algorithm. The adopted routing protocol enables the selection of the most energy efficient routing paths, manages the network load according to the energy residues of the nodes and prevents useless data transmissions through the proposed use of an energy threshold. In this way, an outstanding level of energy efficiency is achieved. Additionally, the proposed packet scheduling algorithm enables the reduction of the video transmission rate with the minimum possible increase of distortion. In order to do so, it makes use of an analytical distortion prediction model that can accurately predict the resulted video distortion due to any error pattern. Thus, the algorithm may cope with limited available channel bandwidth by selectively dropping less significant packets prior to their transmission. Simulation results demonstrate the effectiveness of the proposed scheme.  相似文献   

16.
Wireless sensor networks and wireless mesh networks are popular research subjects. The interconnection of both network types enables next-generation applications and creates new optimization opportunities. However, current single-gateway solutions are suboptimal, as they do not allow advanced interactions between sensor networks (WSNs) and mesh networks (WMNs). Therefore, in this article, challenges and opportunities for optimizing the WSN-WMN interconnection are determined. In addition, several alternative existing and new interconnection approaches are presented and compared. Furthermore, the interconnection of WSNs and WMNs is used to study challenges and solutions for future heterogeneous network environments. Finally, it is argued that the use of convergence layers and the development of adaptive network protocols is a promising approach to enable low end devices to participate in heterogeneous network architectures.  相似文献   

17.
无线传感器网络的蚁群自组织算法   总被引:3,自引:0,他引:3       下载免费PDF全文
王睿  梁彦  潘泉 《电子学报》2007,35(9):1691-1695
探测效能与能量节省的综合性能优化是无线传感器网络研究的一个热点问题.提出了一种分布式、自适应的无线传感器网络蚁群自组织算法,将无线传感器网络节点映射为情绪蚂蚁,通过蚁群间的协同对节点的唤醒概率进行群体智能优化,从而实现无线传感器网络自组织,并以定理的形式给出了性能指标和相关参数的设计方法.仿真表明,算法实现在唤醒较少节点的前提下,对目标保持了较好的探测能力.  相似文献   

18.
无线传感器网络中簇首选择算法研究   总被引:2,自引:1,他引:1  
王刚  张红伟  李晓辉 《通信技术》2010,43(8):35-36,40
传统的低功耗自适应集簇分层型协议(LEACH)算法在选择簇首时未能考虑到节点剩余能量对网络寿命的影响,使得簇首分布不够合理。为了克服该问题,在完全分布式成簇算法(HEED)协议的基础上,设计了一种根据节点剩余能量选择簇首的算法。在该算法中,剩余能量越大的节点越有可能成为簇首,进而承担更多数据传输责任,能量消耗更加平均,增强了算法的健壮性。仿真结果证实,提出的算法可以有效提高网络能量的使用效率,减少功耗,延长网络生存时间。  相似文献   

19.
康莉  谢维信  黄建军  黄敬雄 《信号处理》2013,29(11):1560-1567
本文对无线传感器网络中分布式压缩感知的几个关键技术进行了详细阐述。首先,简要论述了压缩感知方法的基本原理;其次,分析了无线传感器网络中的分布式压缩感知技术与单个信号的压缩感知技术的区别,针对无线传感器网络中联合稀疏模型的建立、分布式信源编码以及联合稀疏信号的重构技术等问题进行了详细讨论;分析了在无线传感器网络的实际应用中,联合稀疏模型、分布式信源编码方式及联合稀疏信号重构方法的性能。最后,对无线传感器网络中分布式压缩感知技术的未来研究方向进行了展望。   相似文献   

20.
Designing energy-efficient Medium Access Control (MAC) protocols has a significant influence on the energy performance of wireless sensor network (WSN). In this paper we present a survey of the recent typical MAC protocols regarding energy effi ciency for WSN. According to channel access policies, we classify these protocols into four categories:contention-based, TDMA-based, hybrid, and cross layer protocols, in which the advantages and disadvantages in each class of MAC protocols are discussed. Finally, we point out open research issues that need to carry on to achieve high energy efficiency for the design of MAC protocols in WSN.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号