期刊文献+

无线传感器网络中基于线性聚合的启发式穿越算法 被引量:1

Heuristic Traversal Path Algorithm Based on Linear Aggregation in Wireless Sensor Networks
在线阅读 下载PDF
导出
摘要 当智能目标穿越敌方无线传感器网络的穿行时间受限时,现有基于广度优先搜索的穿越算法不能保证路径满足约束条件.为此,建立了一种穿越模型,并提出一种启发式的近似数值优化算法:k-shortest path-线性聚合启发式穿越路径算法(kSP-LAHTP).算法利用Voronoi图将连续路径问题域离散化,以曝露度和穿行时间为衡量指标,结合线性聚合的启发式路由机制,使目标实现满足时间约束值的最佳穿越.分析和实验结果表明:算法很好地解决了目标穿越时间受限情况下的穿越问题;且随系数k的增加,算法搜索路径更接近实际最佳. Most wireless sensor networks(WSN) are deployed to monitor a region of interest for any intruding target.On the contrary,the intelligent target looks for the optimal path to traverse the enemy sensor networks for avoiding being detected.However,the target may be subject to traversal time constraint.It is difficult for most existing traversal algorithms based on breadth-first-search to satisfy a pre-determined time constraint value.Motivated by this reason,a traversal model is constructed and an approximately optimization algorithm is proposed in this paper.The algorithm makes the continuous path problem domain a discrete one by Voronoi diagram.Using exposure and traversal time as the path performance metric,the algorithm combines the linear aggregated routing mechanism to find the optimal path.It enables the intelligent target to traverse the enemy sensor networks field.And the traversal time from the source to the destination is less than a given threshold.Theoretically and experimentally,it is concluded that the proposed algorithm is able to solve the traversal path problem with time constraint.The k shortest path heuristic traversal path algorithm based on linear aggregation(kSP-LAHTP) is able to find a traversal path closer to the optimum with parameter k increasing.
作者 罗卿 林亚平
出处 《计算机研究与发展》 EI CSCD 北大核心 2010年第11期1919-1927,共9页 Journal of Computer Research and Development
基金 湖南省科技计划基金项目(2009FJ3083)~~
关键词 感知模型 曝露度 穿越时间 时间约束最小曝露路径 启发式穿越路径算法 sensing model exposure traversal time minimal exposure path with time constraint heuristic traversal path algorithm
  • 相关文献

参考文献21

  • 1Akyildiz I F, Su W, Sankarasubraraaniam Y, et al. Wireless sensor networks: A survcy[J]. Computer Networks, 2002, 38(4) : 393-422.
  • 2李平,林亚平,曾玮妮.传感器网络安全研究(英文)[J].软件学报,2006,17(12):2577-2588. 被引量:30
  • 3任彦,张思东,张宏科.无线传感器网络中覆盖控制理论与算法[J].软件学报,2006,17(3):422-433. 被引量:156
  • 4毛莺池,刘明,陈力军,陈道蓄,谢立.DELIC:一种高效节能的与节点位置无关的传感器网络覆盖协议[J].计算机研究与发展,2006,43(2):187-195. 被引量:33
  • 5Meguerdichian S, Koushanfar F, Potkonjak M, et al. Coverage problems in wireless ad-hoc sensor networks [C]// Proc of the Int Conf on Mobile Computing and Networking. Piseataway, NJ: 1EEE, 2001:1380-1387.
  • 6Li X Y, Wan P, Frieder O. Coverage in wireless ad-hoc sensor networks[J]. IEEE Trans on Computers. 2003, 52 (6) : 753-763.
  • 7Meguerdichian S, Koushanfar F, Qu Gang, et al. Exposure in wireless ad hoc Sensor Networks [C] //Proc of the Int Conf on Mobile Computing and Networking. New York: ACM, 2001: 139-150.
  • 8Vehri G, Huang Qingfeng, Qu Gang, et al. Minimal and maximal exposure path algorithms for wireless embedded sensor networks [C] //Proc of the Int Conf on Embedded Networked Sensor System. New York: ACM, 2003:40-50.
  • 9Liu B, Towsley D, On the coverage and detectability of large-scale wireless sensor networks [C/OL]//Proc of WiOpt'03; Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks. New York: ACM, 2003 [2009-03- 01]. http://citescerx, ist. psu. edu/viewdoc/summary? doi= 10. 1. 1.59. 575.
  • 10Veradej P, Ramanathan P. Vulnerability of sensor networks to unauthorized traversal and monitoring [J].IEEE Trans on Computers, 2004, 53(3): 364-369.

二级参考文献77

  • 1林亚平,王雷,陈宇,张锦,陈治平,童调生.传感器网络中一种分布式数据汇聚层次路由算法[J].电子学报,2004,32(11):1801-1805. 被引量:46
  • 2张文哲,李明禄,伍民友.一种基于局部Voronoi图的目标穿越算法[J].软件学报,2007,18(5):1246-1253. 被引量:12
  • 3姚焯善,王雷,汤念,张大方.基于正三角形剖分的传感器网络覆盖判定算法[J].系统仿真学报,2007,19(10):2366-2369. 被引量:3
  • 4D. Estrin, R. Govindan, J. Heidemann, et al. Next century challenges: Scalable coordination in sensor networks. ACM MobiCom'99, Washington, 1999.
  • 5J. Kahn, R. Katz, K. Pister. Next century challenges: Mobile networking for smart dust. ACM MobiCom' 99, Washington,1999.
  • 6A. Cerpa, J. Elson, D. Estrin, et al. Habitat monitoring:Application driver for wireless communication technology. ACM SIGOCOMM'01 workshop on Data Communications, San Jose,Costa Rica, 2001.
  • 7D. Estrin, L. Girod, G. Pottle, et al. Instrumenting the world with wireless sensor networks. International Conf. Acoustics,Speech, and Signal Processing (ICASSP2001), Salt Lake City,Utah, 2001.
  • 8E. Shih, S. Cho, N. Ickes, et al. Physical layer driven protocol and algorithm design for enery-efficiem wireless sensor networks.ACM SIGMOBILE Conf. Mobile Computing and Networking,Rome, Italy, 2001.
  • 9S. Slijepcevic, M. Potkonjak. Power efficient organization of wireless sensor networks. IEEE Conf. Communications,Helslnki, Finland, 2001.
  • 10M. Cardei, D. MarCallum, X. Cheng, et al. Wireless sensor networks with energy efficient organization. Journal of Interconnection Networks, 2002, 3(3-4): 213-229.

共引文献221

同被引文献8

  • 1张文哲,李明禄,伍民友.一种基于局部Voronoi图的目标穿越算法[J].软件学报,2007,18(5):1246-1253. 被引量:12
  • 2Phipatanasuphom V, Ramanathan P. Vulnerability of sensor net- works to unauthorized traversal and monitoring [J]. IEEE Trans on Computers, 2004,53 (3): 364-369.
  • 3Veltri G, Huang Qingfeng, Qu Gang, et al.. Minimal and maximal exposure path algorithms for wireless embedded sensor networks [C]//Proc of the Int Confon Embedded Networked Sensor System, New York: ACM, 2003: 40-50.
  • 4Meguerdichian S, Koushanfar F, Potkonjak M, et al.. Coverage problems in wireless ad-hoe sensor networks [C] //Proc of the Int Conf on Mobile Computing and Networking, Piseataway, N J, 2001: 1380-1387.
  • 5Meguerdichian S, Koushanfar F, Qu Gang, et al.. Exposure in wireless ad-hoc sensor networks [C] //ProcoftheIntConfonMo- bile Computing and Networking, New York: ACM, 2001: 139-150.
  • 6Nilsson N J. Problem solving methods in artificial intelligence, artificial intelligence: a new synthesis [M]. San Francisco, CA, USA: Morgan Kaufmann Publishers Inc, 2000.
  • 7周培德.计算几何:算法分析与设计[M].3版.北京:清华大学出版社,2008:125-229.
  • 8任丰原,黄海宁,林闯.无线传感器网络[J].软件学报,2003,14(7):1282-1291. 被引量:1711

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部