期刊文献+

基于无线传感器网络拓扑的研究与设计 被引量:24

Research and Design of Network Topology Based on Wireless Sensor Networks
在线阅读 下载PDF
导出
摘要 网络拓扑的研究是未来WSN发展的方向和目标。本文通过对无线传感网zigbee协议、节点组网及网络拓扑等内容的研究,运用无线传感网协调器节点组网并且作为嵌入式网关与上位机PC进行串口通信,实现拓扑结构的GUI显示。本文设计实现了一种节点网络拓扑可视化的方法,用图形描述节点之间抽象的拓扑结构,对网络的稳定性和多跳性进行研究。同时,本文对节点设备的温度、节点电压、RSSI的采集,实现网络中节点状态实时监测以及网络寿命的评定,对于研究高效、稳定的网络拓扑结构有着重要的意义。 The research of network topology is the direction and goals of WSN development. In this paper, based on the study of the content on the protocol of zigbee, wireless sensor node network and network topology, wireless sensor network is set up by coordinator node, which is also built as a the embedded gateway communicating with host computer PC in the USART. Then, a topology GUI is displayed. The network topology visualization with the graphic description about abstract node topology is designed in this paper, the stability of the network and multi-hop is researched in intuition. Meanwhile, the node device temperature and battery voltage are collected to achieve a real-time monitoring of network node status as well as the assessment of the network life, and it plays an signiifcance role for the study of highly efifcient, stable network topology.
出处 《软件》 2013年第12期22-25,共4页 Software
基金 国家物联网发展专项资金项目(财企[2011]64号) 电子信息产业发展基金(财政部财建[2011]879号 工业和信息化部工信部财函[2011]506号) 电子信息产业发展基金(财政部财建[2012]380号 工业和信息化部工信部财[2012]407号)
关键词 网络拓扑 无线传感网 嵌入式网关 zigbee network topology WSN zigbee embedded gateway
  • 相关文献

参考文献2

二级参考文献12

  • 1LEE J K,RYU S R,YOO K Y. Fingerprint-based remote user authentication scheme using smart cards[J].Electronics Letters,2002,(12):554-555.
  • 2SHIMIZU A,HORIOKA T,INAGAKI H. A password authentication method for contents communication on the[J].IEICE Transactions on Communications,1998,(02):1666-1673.
  • 3HSIEH B T,YEH H T,SUN H M. Cryptanalysis of a fingerprint-based remote user authentication scheme using smart cards[A].2003.349-350.
  • 4CHANG C C,LIN I C. Remarks on Fingerprint-Based Remote User Authentication Scheme Using Smart Cards[J].ACM Operating Systems Review,2004,(03):91-100.
  • 5LIN C H,LAI Y Y. A flexible biometrics remote user authentication scheme[J].Computer Standards and Interfaces,2004,(01):19-23.doi:10.1016/j.csi.2004.03.003.
  • 6KU W C,CHANG S T,CHING M H. Further cryptanalysis of fingerprint-based remote user authentication scheme using smartcards[J].Electronics Letters,2005,(05):240-241.doi:10.1049/el:20047658.
  • 7KHAN M K,ZHANG J S. An efficient and practical fingerprint-based remote user authentication scheme with smart cards[J].Information Security Practice and Experience Lecture Notes in Computer Science,2006,(03):260-268.
  • 8KHAN M K,ZHANG J S. Improving the security of 'a flexible biometrics remote user authentication scheme'[J].Computer Standards and Interfaces,2007,(01):82-85.doi:10.1016/j.csi.2006.01.002.
  • 9YOON E J,YOO K Y. Secure fingerprint-based remote user authentication scheme using smartcards[J].Internet and Nerwoek Economics Lecture Notes in Computer Science,2005,(28):405-413.
  • 10YOON E J,YOO K Y. A secure chaotic hash-based biometric remote user authentication scheme using mobile devices[A].incl.Internet/Web,and HCI,2007.612-623.

共引文献3

同被引文献199

引证文献24

二级引证文献119

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部