首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Sensing coverage is one of fundamental problems in wireless sensor networks. In this paper, we investigate the polytype target coverage problem in heterogeneous wireless sensor networks where each sensor is equipped with multiple sensing units and each type of sensing unit can sense an attribute of multiple targets. How to schedule multiple sensing units of a sensor to cover multiple targets becomes a new challenging problem. This problem is formulated as an integer linear programming problem for maximizing the network lifetime. We propose a novel energy‐efficient target coverage algorithm to solve this problem based on clustering architecture. Being aware of the coverage capability and residual energy of sensor nodes, the clusterhead node in each cluster schedules the appropriate sensing units of sensor nodes that are in the active status to cover multiple targets in an optimal way. Extensive simulations have been carried out to validate the effectiveness of the proposed scheme. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

2.
This paper presents a new channel assignment scheme that efficiently improves the spatial frequency–spectrum reuse in a wireless network with heterogeneous demands, in which the cells are partitioned into a lot of clusters. Since the channel demands of each cell are different, this scheme adopts two stages to effectively assign channels. In the first stage, the cluster‐based scheme allocates a number of channels to the cells of each cluster for satisfying the requirement of co‐channel reuse. The channel demand of majority cells will be satisfied in this stage. In the second stage, when the channel requirement of most cells has been fulfilled, the tree‐based assignment scheme allocates channels for the minority cells, which are still lacking of channels. Simulation results showed that the proposed scheme is superior to the previous schemes. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   

3.
Trust models that rely on recommendation trusts are vulnerable to badmouthing and ballot‐stuffing attacks. To cope with these attacks, existing trust models use different trust aggregation techniques to process the recommendation trusts and combine them with the direct trust values to form a combined trust value. However, these trust models are biased as recommendation trusts that deviate too much from one's own opinion are discarded. In this paper, we propose a non‐biased trust model that considers every recommendation trusts available regardless they are good or bad. Our trust model is based on a combination of 2 techniques: the dissimilarity test and the Dempster‐Shafer Theory. The dissimilarity test determines the amount of conflict between 2 trust records, whereas the Dempster‐Shafer Theory assigns belief functions based on the results of the dissimilarity test. Numerical results show that our trust model is robust against reputation‐based attacks when compared to trust aggregation techniques such as the linear opinion pooling, subjective logic model, entropy‐based probability model, and regression analysis. In addition, our model has been extensively tested using network simulator NS‐3 in an Infrastructure‐based wireless mesh networks and a Hybrid‐based wireless mesh networks to demonstrate that it can mitigate blackhole and grayhole attacks.  相似文献   

4.
Link quality is one of the most important factors that affect the performance of wireless networks. In a densely deployed wireless network, continuous link quality monitoring consumes significant amount of energy and bandwidth at each node. In this paper, we propose a sensitivity model and a spatial correlation model that can be used to derive a set of deputy links to monitor, instead of monitoring all of the links in the network. The proposed scheme can improve energy efficiency of the link quality monitoring process. A greedy algorithm is presented to derive the deputy links set based on three different optimization objective functions. Performance of the proposed method is studied extensively and it is shown that the proposed method can save almost 90% energy in typical simulation scenarios than the method of monitoring all links. We also demonstrate that the energy consumption of the greedy deputy set‐based method is upper‐bounded. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

5.
Wireless sensor networks have emerged recently as an effective way of monitoring remote or inhospitable physical targets, which usually have different quality of service (QoS) constraints, i.e., different targets may need different sensing quality in terms of the number of transducers, sampling rate, etc. In this paper, we address the problem of optimizing network lifetime while capturing those diversified QoS coverage constraints in such surveillance sensor networks. We show that this problem belongs to NP‐complete class. We define a subset of sensors meeting QoS requirements as a coverage pattern, and if the full set of coverage patterns is given, we can mathematically formulate the problem. Directly solving this formulation however is difficult since number of coverage patterns may be exponential to number of sensors and targets. Hence, a column generation (CG)‐based approach is proposed to decompose the original formulation into two subproblems and solve them iteratively. Here a column corresponds to a feasible coverage pattern, and the idea is to find a column with steepest ascent in lifetime, based on which we iteratively search for the maximum lifetime solution. An initial feasible set of patterns is generated through a novel random selection algorithm (RSA), in order to launch our approach. Experimental data demonstrate that the proposed CG‐based approach is an efficient solution, even in a harsh environment. Simulation results also reveal the impact of different network parameters on network lifetime, giving certain guidance on designing and maintaining such surveillance sensor networks. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   

6.
As sensor nodes have limited sensing and transmission capability, their efficient deployment takes an important role in proper monitoring of the critical targets in various applications of wireless sensor networks (WSNs). The key issues that need to be taken care during deployment are the lesser number of deployed sensors, coverage of the targets, and connectivity between the sensor nodes. In this paper, we have proposed NSGA‐II with modified dominance to solve the node deployment problem with the aforementioned three conflicting objectives. The conventional domination method is modified for better performance of the NSGA‐II. An intelligent representation of chromosome is provided. Three conflicting objectives are derived to evaluate the chromosomes. Extensive simulation on the proposed algorithm and the statistical test, and analysis of variance (ANOVA) followed by post hoc analysis are performed.  相似文献   

7.
The seamless internetworking among heterogeneous networks is in great demand to provide ‘always‐on’ connectivity services with quality of service (QoS) provision, anywhere at anytime. The integration of wireless‐fidelity (Wi‐Fi) and wireless metropolitan area networks (WiMAX) networks can combine their best features to provide ubiquitous access, while mediating the weakness of both networks. While it is challenging to obtain optimized handover decision‐based dynamic QoS information, users can improve their perceived QoS by using the terminal‐controlled handover decision in a single device equipped with multiple radio interfaces. The IEEE 802.21 aims at providing a framework that defines media‐independent handover (MIH) mechanism that supports seamless handover across heterogeneous networks. In this paper, an multiple attributes decision making‐based terminal‐controlled vertical handover decision scheme using MIH services is proposed in the integrated Wi‐Fi and WiMAX networks to provide ‘always‐on’ connectivity QoS services. The simulation results show that the proposed scheme provides smaller handover times and lower dropping rate than the RSS‐based and cost function‐based vertical handover schemes. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   

8.
In this paper, we study k‐road‐coverage problems in wireless sensor networks (WSNs). Assume there is a 2‐dimensional area Ω with a given road map = (V,E) where E contains all road segments and V consists of all intersection points on Ω. The first question we study is about ‘sensor deployment’, i.e., how to deploy a minimum number of sensor nodes on Ω such that each path (each road segment) on is k‐covered when all sensor nodes have the same sensing range. When sensors can only be deployed in a set of discrete locations, we propose an efficient method with the approximation ratio 6 + ϵ for the special case where k = 1 and O(k) generally. If sensors can be deployed in arbitrary locations, we propose an efficient method with the approximation ratio 24 + ϵ when k = 1 and O(k) generally. The second question we study is about ‘path query’, i.e., how to find the k‐covered path or k‐support path connecting any given source/destination pair of points on the road map . Basically, given any source/destination pair of points S and D, we present two algorithms which can efficiently find a k‐covered path connecting S and D and a k‐supported path connecting S and D, respectively. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

9.
In this paper, we proposed a novel distributed power management and clustering scheme for a large scale of ad hoc networks. An inappropriate transmission power leads to high power consumption and interference, thus we introduce a power management and clustering scheme to maintain coverage and to minimize interference using the small world model that provides a good starting point to sustain connectivity. This scheme reduces number of relay nodes and relay packets by constructing the virtual backbone with clusters. Our proposed scheme divided a large contention domain into small ones. Owing to power management for each node, space reuse is effective. Furthermore, the power consumption is obviously reduced by our proposed scheme. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   

10.
In recent years, Internet of Things (IoT) devices are used for remote health monitoring. For remotely monitoring a patient, only the health information at different time points are not sufficient; predicted values of biomarkers (for some future time points) are also important. In this article, we propose a powerful statistical model for an efficient dynamic patient monitoring using wireless sensor nodes through Bayesian Learning (BL). We consider the setting where a set of correlated biomarkers are measured from a patient through wireless sensors, but the sensors only report the ordinal outcomes (say, good, fair, high, or very high) to the sink based on some prefixed thresholds. The challenge is to use the ordinal outcomes for monitoring and predicting the health status of the patient under consideration. We propose a linear mixed model where interbiomarker correlations and intrabiomarker dependence are modeled simultaneously. The estimated and the predicted values of the biomarkers are transferred over the internet so that health care providers and the family members of the patient can remotely monitor the patient. Extensive simulation studies are performed to assess practical usefulness of our proposed joint model, and the performance of the proposed joint model is compared to that of some other traditional models used in the literature.  相似文献   

11.
We propose a novel mobility model, named Semi-Markov Smooth (SMS) model, to characterize the smooth movement of mobile users in accordance with the physical law of motion in order to eliminate sharp turns, abrupt speed change and sudden stops exhibited by existing models. We formulate the smooth mobility model by a semi-Markov process to analyze the steady state properties of this model because the transition time between consecutive phases (states) has a discrete uniform distribution, instead of an exponential distribution. Through stochastic analysis, we prove that this model unifies many good features for analysis and simulations of mobile networks. First, it is smooth and steady because there is no speed decay problem for arbitrary starting speed, while maintaining uniform spatial node distribution regardless of node placement. Second, it can be easily and flexibly applied for simulating node mobility in wireless networks. It can also adapt to different network environments such as group mobility and geographic constraints. To demonstrate the impact of this model, we evaluate the effect of this model on distribution of relative speed, link lifetime between neighboring nodes, and average node degree by ns-2 simulations.
Wenye WangEmail:
  相似文献   

12.
Inter‐cell interference (ICI) is a major problem in heterogeneous networks, such as two‐tier femtocell (FC) networks, because it leads to poor cell‐edge throughput and system capacity. Dynamic ICI coordination (ICIC) schemes, which do not require prior frequency planning, must be employed for interference avoidance in such networks. In contrast to existing dynamic ICIC schemes that focus on homogeneous network scenarios, we propose a novel semi‐distributed dynamic ICIC scheme to mitigate interference in heterogeneous network scenarios. With the goal of maximizing the utility of individual users, two separate algorithms, namely the FC base station (FBS)‐level algorithm and FC management system (FMS)‐level algorithm, are employed to restrict resource usage by dominant interference‐creating cells. The distributed functionality of the FBS‐level algorithm and low computational complexity of the FMS‐level algorithm are the main advantages of the proposed scheme. Simulation results demonstrate improvement in cell‐edge performance with no impact on system capacity or user fairness, which confirms the effectiveness of the proposed scheme compared to static and semi‐static ICIC schemes.  相似文献   

13.
Intrusion detection is prominently important for civil and military applications in wireless sensor networks (WSNs). To date, related works address the problem by assuming a straight‐line intrusion path and a Boolean sensing model. However, a straight‐line intrusion path is often not the case in reality, and the Boolean sensing model cannot resemble a real‐world sensor precisely. Results based on these assumptions are therefore not applicable with desirable accuracy in practice. In view of this, we propose a novel sine‐curve mobility model that can simulate different intrusion paths by adjusting its features (amplitude, frequency, and phase) and can be integrated into the random WSN model for intrusion detection analysis. It can also be applied to different sensor models and makes influencing factors tractable. With the model, we examine the effects of different intrusion paths on the intrusion detection probability in a random WSN, considering both Boolean and realistic Elfes sensing models. Further, we investigate the interplays between network settings and intruder's mobility patterns and identify the benefits and side effects of the model theoretically and experimentally. Simulation outcomes are shown to match well with the theoretical results, validating the modeling, analysis, and conclusions. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

14.
Energy‐efficient routing becomes one of the most critical technologies for sustaining the overall network lifetime of wireless sensor networks. In this paper, we propose a novel data transmission scheme between a number of specified source nodes and the single sink, which can efficiently restrict the usage frequency of each relay node, measured by the number of source nodes using it for data transmission. On the basis of the importance of source nodes that is closely related to deployed location, they form a descending sequence such that each node finds the minimum energy path earlier than the succeeding one. Then, the energy‐efficient multiple path algorithm with the computational complexity of O(n3) is developed for deriving the minimum energy paths, where n is the number of nodes in the network. Also, a polynomial algorithm is presented for deriving the range of the feasible values of N0 serving as the threshold of the usage frequency of relay nodes, in which each can guarantee the existence of the solution. Further, we theoretically investigate the existence of the solution and the tree‐structured solution using m‐ary tree. Extensive simulation results show that our proposed scheme can achieve significant performance enhancement. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

15.
Constrained by the physical environments, the long‐thin topology has recently been promoted for many practical deployments of wireless sensor networks (WSNs). In general, a long‐thin topology is composed of a number of long branches of sensor nodes, where along a branch each sensor node has only one potential parent node toward the sink node. Although data aggregation may alleviate excessive packet contention, the maximum payload size of a packet and the dynamically changing traffic loads may severely affect the amount of sensor readings that may be collected along a long branch of sensor nodes. In addition, many practical applications of long‐thin WSNs demand the exact sensor readings at each location along the deployment areas for monitoring and analysis purposes, so sensor readings may not be aggregated when they are collected. This paper proposes a lightweight, self‐adaptive scheme that designates multiple collection nodes, termed lock gates, along a long‐thin network to collect sensor readings sent from their respective upstream sensor nodes. The self‐adaptive lock gate designation scheme balances between the responsiveness and the congestion of data collection while mitigating the funneling effect. The scheme also dynamically adapts the designation of lock gates to accommodate the time‐varying sensor reading generation rates of different sensor nodes. A testbed of 100 Jennic sensor nodes is developed to demonstrate the effectiveness of the proposed lock gate designation scheme. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

16.
Wireless sensor network (WSN) should be designed such that it is able to identify the faulty nodes, rectify the faults, identify compromised nodes from various security threats, and transmit the sensed data securely to the sink node under faulty conditions. In this paper, we propose an idea of integrating fault tolerance and secured routing mechanism in WSN named as fault tolerant secured routing: an integrated approach (FASRI) that establishes secured routes from source to sink node even under faulty node conditions. Faulty nodes are identified using battery power and interference models. Trustworthy nodes (non‐compromised) among fault‐free nodes are identified by using agent‐based trust model. Finally, the data are securely routed through fault‐free non‐compromised nodes to sink. Performance evaluation through simulation is carried out for packet delivery ratio, hit rate, computation overhead, communication overhead, compromised node detection ratio, end‐to‐end delay, memory overhead, and agent overhead. We compared simulation results of FASRI with three schemes, namely multi‐version multi‐path (MVMP), intrusion/fault tolerant routing protocol (IFRP) in WSN, and active node‐based fault tolerance using battery power and interference model (AFTBI) for various measures and found that there is a performance improvement in FASRI compared with MVMP, IFRP, and AFTBI. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

17.
The problem of target location estimation in a wireless sensor network is considered, where due to the bandwidth and power constraints, each sensor only transmits one‐bit information to its fusion center. To improve the performance of estimation, a position‐based adaptive quantization scheme for target location estimation in wireless sensor networks is proposed to make a good choice of quantizer' thresholds. By the proposed scheme, each sensor node dynamically adjusts its quantization threshold according to a kind of position‐based information sequences and then sends its one‐bit quantized version of the original observation to a fusion center. The signal intensity received at local sensors is modeled as an isotropic signal intensity attenuation model. The position‐based maximum likelihood estimator as well as its corresponding position‐based Cramér–Rao lower bound are derived. Numerical results show that the position‐based maximum likelihood estimator is more accurate than the classical fixed‐quantization maximum likelihood estimator and the position‐based Cramér–Rao lower bound is less than its fixed‐quantization Cramér‐Rao lower bound. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

18.
In wireless sensor networks (WSNs), there are many critical applications (for example, healthcare, vehicle tracking, and battlefield), where the online streaming data generated from different sensor nodes need to be analyzed with respect to quick control decisions. However, as the data generated by these sensor nodes usually flow through open channel, so there are higher chances of various types of attacks either on the nodes or on to the data captured by these nodes. In this paper, we aim to design a new elliptic curve cryptography–based user authenticated key agreement protocol in a hierarchical WSN so that a legal user can only access the streaming data from generated from different sensor nodes. The proposed scheme is based upon 3‐factor authentication, as it applies smart card, password, and personal biometrics of a user (for ticket generation). The proposed scheme maintains low computation cost for resource‐constrained sensor nodes, as it uses efficient 1‐way cryptographic hash function and bitwise exclusive‐OR operations for secure key establishment between different sensor nodes. The security analysis using the broadly accepted Burrows‐Abadi‐Needham logic, formal security verification using the popular simulation tool (automated validation of Internet security protocols and applications), and informal security show that the proposed scheme is resilient against several well‐known attacks needed for a user authentication scheme in WSNs. The comparison of security and functionality requirements, communication and computation costs of the proposed scheme, and other related existing user authentication schemes shows the superior performance of the proposed scheme.  相似文献   

19.
Given a video/audio streaming system installed on a multichannel multiradio wireless mesh network, we are interested in a problem concerning about how to construct a delay‐constrained multicast tree to support concurrent interference‐free transmissions so that the number of serviced mesh clients is maximized. In this paper, we propose a heuristic approach called cross‐layer and load‐oriented (CLLO) algorithm for the problem. On the basis of the cross‐layer design paradigm, our CLLO algorithm can consider application demands, multicast routing, and channel assignment jointly during the formation of a channel‐allocated multicast tree. The experimental results show that the proposed CLLO outperforms the layered approaches in terms of the number of serviced mesh clients and throughputs. This superiority is due to information from higher layers can be used to guide routing selection and channel allocation at the same time. As a result, the CLLO algorithm can explore more solution spaces than the traditional layered approaches. In addition to that, we also propose a channel adjusting procedure to enhance the quality of channel‐allocated multicast trees. According to our simulations, it is proved to be an effective method for improving the performance of the proposed CLLO algorithm. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

20.
Smart antenna technology is introduced to wireless mesh networks. Smart antennas based wider-range access medium access control (MAC) protocol (SWAMP) is used as MAC protocol for IEEE 802.11 mesh networks in this study. The calculation method of node throughput in chain and arbitrary topology is proposed under nodes fairness guarantee. Network scale and interference among nodes are key factors that influence node throughput. Node distribution pattern near the gateway also affects the node throughput. Experiment based on network simulator-2 (NS-2) simulation platform compares node throughput between smart antenna scenario and omni-antenna scenario. As smart antenna technology reduces the bottle collision domain, node throughput increases observably.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号