首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 140 毫秒
1.
李尧  滑楠  田罗庚  王荃 《电讯技术》2014,54(5):682-688
介绍了典型分簇无线传感器网络路由协议的分类,总结了分簇路由协议的研究进展。针对无线传感器网络从同构型网络向异构型网络发展的趋势和特点,指出了路由协议向节点间相互协作的发展方向,并且在设计路由协作算法时可采用与无线传感器网络极为相似的多Agent系统模型。  相似文献   

2.
《现代电子技术》2019,(12):156-160
采用判决反馈方法评估无线传感器网络时,仅从网络链路稳定性因素方面考虑,未考虑影响网络可靠性的多种因素,自适应能力和可靠性评估效果差。设计基于多因子分析的无线传感器网络可靠性评估模型,利用多因子分析过程将无线传感器网络复杂的变量关系简单化。由5个主指标与20个有相互关联的子指标建立无线传感器网络可靠性评估指标体系,通过主成分分析方法分析指标体系获取11个无线传感器网络可靠性指标主因子。将这些因子输入神经网络模型中,构建无线传感器神经网络可靠性评估模型,完成无线传感器网络可靠性评估。实验结果表明,该模型的可靠性评估精度均值为98%,该模型下的无线传感网络可靠性最高达到98%,极大提高了无线传感器的安全性能。  相似文献   

3.
基于移动Agent和WSN的突发事件场景数据收集算法研究   总被引:1,自引:0,他引:1  
该文针对无线传感器网络应用于突发事件监测场景的能量消耗和网络延迟问题,提出了基于移动Agent的无线传感器网络簇式数据收集算法.动态成簇过程基于事件严重程度,并由其决定簇的生命周期和覆盖范围.Sink和簇头之间形成以Sink节点为簇头的虚拟簇.移动Agent迁移路径规划过程中下一跳节点的选取基于节点剩余能量、路径损耗及受刺激强度.移动Agent通过节点遍历的方式完成对所有簇内成员节点信息的收集.仿真结果表明,相对于C/S数据收集模型,基于移动Agent的模型具有更好的节能效果,并能一定程度地减少网络延迟,尤其适用于大规模无线传感器网络应用.  相似文献   

4.
文章论述了多年来Agent理论模型的研究成果。用形式化语言详细地描述了Agent理论模型,给出了模型中各个认知成分的语意定义,为系统地建立Agent计算形式理论打下了基础。  相似文献   

5.
WCSN(无线认知传感器网络)可以定义为无线认知传感器节点的分布式网络,它能够感知事件信号,机会地使用频谱空洞,并采用多跳方式,完成信息的动态协同通信,最终满足各种应用需求.文章分析了WCSN的基本概念和优势,给出了无线认知传感器网络节点硬件结构.研究了WCSN频谱感知、频谱分析决策和频谱切换技术的构成,列举了无线认知...  相似文献   

6.
无线认知传感器网络(WCSN)可以定义为无线认知传感器节点的分布式网络,它感知事件信号,机会地使用频谱空洞,并采用多跳方式,完成信息的动态协同通信,最终满足各种应用需求。文章分析了无线认知传感器网络(WCSN)的基本概念和优势,给出了无线认知传感器网络节点硬件结构,研究了Ad Hoc式、分簇式、异构分级式和移动式四种无线认知传感器网络拓扑结构,列举了无线认知传感器网络的应用领域。  相似文献   

7.
基于移动Agent的无线传感器网络数据管理框架   总被引:3,自引:0,他引:3  
无线传感器网络是一种全新的技术,能够广泛应用于恶劣环境和军事领域。传感器网络在数据获取过程中,为了减少数据的处理耗能、降低延迟,需要采用数据管理技术。分析和介绍了传感器网络集中式与分布式处理两种数据管理模型结构,提出了一种基于移动Agent的无线传感器网络数据管理框架。  相似文献   

8.
在大规模无线认知传感器网络中,存在着大量高度相关的数据,导致无线认知传感器网络的数据传输和数据处理开销增加。对高维数据进行降维处理,能够提高无线认知传感器网络的性能。文章介绍核主成分分析、多维标度、等距映射、局部线性嵌入、拉普拉斯特征映射、最大方差展开或半定嵌入等方法的原理,并简要分析这些算法的实现步骤。  相似文献   

9.
该文针对无线传感器网络节点处理能力、存储能力和能量供应均有限的特点,提出一种基于移动Agent的JPEG2000分布式编码算法。采用多个节点对图像进行分布式编码,通过引入移动Agent机制来实现网络节点间的信息交互,在保证图像编码性能不变的情况下,降低单个节点能耗,使系统不因单个节点能量耗尽而瘫痪,以延长系统的生命周期。仿真实验结果表明,该文所提出的基于移动Agent的分布式编码算法在无线传感器网络环境中可以保证编码后的图像质量没有下降,并能有效均衡系统能耗、延长网络工作寿命达3倍左右。  相似文献   

10.
基于Agent的协同式网络管理模型研究与实现   总被引:1,自引:0,他引:1  
移动Agent技术为智能网络管理的研究开辟了新的思路,但由于每个Agent是一个自治的主体,因此如何实现多个Agent协调合作来高效地管理网络成为多Agent系统(MAS)的核心问题.在对移动Agent和其体系结构进行研究的基础上,提出了一种基于多移动Agent网络管理模型,将移动Agent分成四类,并将黑板系统方法的应用在多Agent之间通信和协调中,使Agent问的协调变得相对容易,通过黑板将单个Agent联系成一个整体,结果表明,该模型加强了对各Agent的控制,提高了网络管理效率.  相似文献   

11.
A failed sensor node partitions a wireless sensor network (WSN) into 2 or more disjoint components, which is called as a cut in the network. The cut detection has been considered as a very challenging problem in the WSN research. In this paper, we propose a graph‐theoretic distributed protocol to detect simultaneously the faults and cuts in the WSN. The proposed approach could be accomplished mainly in 3 phases, such that initialization phase, fault detection phase, and a cut detection phase. The protocol is an iterative method where at every time iteration, the node updates its state to calculate the potential factor. We introduced 2 terminologies such as a safe zone or cut zone of the network. The proposed method has been evaluated regarding various performance evaluation measures by implementing the same in the network simulator NS–2.35. The obtained results show that the proposed graph‐theoretic approach is simple yet very powerful for the intended tasks.  相似文献   

12.
大规模网络管理中的任务分解与调度   总被引:2,自引:1,他引:2  
刘波  罗军舟  李伟 《通信学报》2006,27(3):64-72
集中式的管理模式和简单的基于移动agent的网络管理方法都已不能满足大型网络管理的需要,为此,在给出基于多agent的网络管理框架的基础上,提出了一种基于任务依赖关系的任务分解算法,把网络管理任务分解为具有不同优先级的子任务,处于同一优先层次的子任务可以并行执行,根据子任务的优先级产生结合网络管理特点的调度策略,理论分析和实验表明:在大规模网络管理中采用任务分解技术能够提高时间效率和减轻网络负载。  相似文献   

13.
从平面无线传感器网络的拓扑结构、无线共享通信及安全机制等固有特征出发,对无线传感器网络上的恶意软件传播动力学进行研究。首先,使用随机几何图建立平面无线传感器网络模型;然后,基于元胞自动机理论建立恶意软件SI(Susceptible—Infected)传播模型,该模型充分考虑无线传感器网络固有特征和传播特征,模型建立引入MAC机制和随机密钥预分布方案。分析和仿真表明,无线传感器网络的空间局域化结构特征、无线信道共享机制和安全管理应用主导了传播增长效果,限制了恶意软件传播速度,降低了在无线传感器网络中大规模流行恶意软件的风险。文中提出的模型能够描述无线传感器网络中恶意软件传播行为,为建立无线传感器网络安全防御机制提供了基础。  相似文献   

14.
With the wide applications of wireless sensor network (WSN), its reliability evaluation has been attracted more attention. The reliability of a WSN is affected mainly by internal and external factors, which include internal faults and external attacks. In this paper, a reliability evaluation method based on a hierarchical belief rule base (BRB) method is proposed for the reliability evaluation of the WSN. First, the factors affecting the reliability of a WSN are analysed, and the reliability evaluation process that considers the WSN fault evaluation and WSN security evaluation is described. Second, the reliability evaluation model is constructed based on the hierarchical BRB model. The qualitative knowledge is used by the BRB model to build initial belief rules, and the quantitative data are used to optimize the initial parameters of the BRB model, which can utilize various types of uncertainty information effectively. Therefore, the proposed method can be applied to the WSN reliability evaluation, which is a complex and uncertain problem. Finally, a simulation case study and an actual case study of wellhead blowout monitoring are conducted to verify the effectiveness of the proposed method. The reliability results of actual WSN are obtained by the standard testing method, where the loss and accuracy rates of the collected data are treated as the observation factors for obtaining the actual reliability values. The estimated results of hierarchical BRB model are very close to the actual reliability values, which shows that the proposed method can be used for evaluating the reliability of the actual WSN accurately.  相似文献   

15.
提出了一种基于SOA的MAS设计方法.该方法使用Object-Z语言构建形式化建模框架,结合I*框架的元模型,阐述了基于SOA的MAS设计中三种核心模型(Agent组织模型、Agent类模型、Agent服务模型)的形式化描述规则,讨论了基于SOA的MAS的分析与设计过程,并给出了具体应用示例.  相似文献   

16.
为有效地应用入侵检测系统检测WSN(wireless sensor network,无线传感网络)恶意程序从而抑制WSN恶意程序传播,在考虑WSN节点资源有限和云计算平台资源几乎无限的现状基础上,借助云计算平台提出WSN入侵检测网络结构。依据传感节点和WSN入侵检测代理之间博弈过程的分析,使用动态贝叶斯博弈建立了考虑WSN入侵检测代理监控数据发送能耗和传感节点隐私保护需求的WSN恶意程序传播抑制博弈模型。依据建立的博弈类型,并基于精炼贝叶斯均衡提出抑制WSN恶意程序传播的优化策略,并给出具体的算法。实验分析了影响WSN入侵检测代理选择优化策略的因素,为具体应用提供了实验依据。  相似文献   

17.
随着信息技术的飞速发展,应用软件变得越来越复杂,其智能化程度也越来越高。面向Agent软件开发技术就是在此背景下应运而生的,并迅速成为软件工程领域的一个研究热点JACK平台是以BDI模型为基础,基于JAVA语言的多Agent系统开发环境。此外,它还支持Prometheus等主流面向Agent软件开发方法。通过一个具体项目案例“图书智能推荐系统”给出TJACK平台下多Agent系统的设计与实现方法。  相似文献   

18.
Node self-localization has become an essential requirement for realistic applications over wireless sensor networks (WSNs). Although many distributed localization algorithms have been proposed, fundamental theoretic analysis of unique localization is still in its early stage of development. This paper aims at a synthetic and homogeneous survey of the theoretical basis on WSN localization problem carried out thus far. Specifically, subsequent to establishing a technological context of relevant terms, we construct a graph and then a formation for each WSN to present current state-of-the-art by analyzing possible conditions for unique localization, as well as corresponding verification algorithms, by drawing on the powerful results from rigidity theory, distance geometry, geometric constraints in CAD, and combinatorial theory. We show that the unique localization problem is well understood in two-dimension, however, only partial analogous results are available in three-dimension.  相似文献   

19.
王伟  曾国荪  刘涛 《通信学报》2006,27(11):31-35
通过借鉴人际关系信任模型,利用Bayesian方法对agent的可信度进行评估,提出了一种基于信任机制的多agent协作系统的形成方案。通过agent间基于信任关系的链接更新形成稳定的多agent协作系统,并通过随机图模型分析了提出的协作系统的演化特征。仿真结果证实,提出的协作方案不仅能有效地促进agent间的协作效率,提高共同完成任务的成功率,还能提高整个网络系统的交互性能,使agent聚集在服务能力较强的可信agent周围,保证协作对象选取的可靠性。  相似文献   

20.
Privacy is a necessary component of any security discussion. Privacy and security must be considered separately as well as together. Threads of privacy are visible throughout the procedure of building security solutions for any system. The notions for privacy also play an important role in the technical implications of privacy preservation within any network or its subsystems. Analyzing the mitigations and protections for privacy are considered in privacy notions. The privacy notions being theoretical systems and identified vulnerabilities in the sensor networks not being mapped to such privacy preservation notions necessities the analytical review of privacy provisioning in wireless sensor network (WSN) being formalized within a framework consisting or the vulnerabilities associated with each component of the network and mechanisms of privacy preservation along with the privacy notions. The current research paper provides an analytical review of the privacy provisioning in WSNs with the perspective of development of a proposed framework for privacy notions and quantitative as well as qualitative measures associated with the privacy preservation in sensor network mapped with the various techniques implemented for privacy preservation of different components of the network and the network as a whole. This analytical review has been done on the basis of set of beliefs that an adversary has while launching an attack on the network. Further the existing techniques for privacy preservation of receiver and source node location, location of sink node, traffic analysis prevention and preserving temporal privacy in WSN have been analyses on the basis of adversary’s set of beliefs’ mitigated by them and the notion of privacy implemented by these techniques like k-anonymity, l-diversity or t-closeness. The present effort aims to provide the researchers with an insight of the new concept of belief mitigation for privacy provisioning in WSN.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号