期刊文献+
共找到521篇文章
< 1 2 27 >
每页显示 20 50 100
MANET Routing Protocol Comparison: Joint Node Density and Mobility
1
作者 Nurul I Sarkar 《通讯和计算机(中英文版)》 2011年第12期1033-1038,共6页
关键词 MANET 路由协议 节点密度 协议比较 流动 网络协议 移动AD 仿真模型
在线阅读 下载PDF
“Half of the Node Records Are Forged?”: The Problemof Node Records Forgery in Ethereum Network
2
作者 Yang Liu Zhiyuan Lin +2 位作者 Yuxi Zhang Lin Jiang Xuan Wang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1713-1729,共17页
Ethereum, currently the most widely utilized smart contracts platform, anchors the security of myriad smartcontracts upon its own robustness. Its foundational peer-to-peer network facilitates a dependable node connect... Ethereum, currently the most widely utilized smart contracts platform, anchors the security of myriad smartcontracts upon its own robustness. Its foundational peer-to-peer network facilitates a dependable node connectionmechanism, whereas an efficient data-sharing protocol constitutes as the bedrock of Blockchain network security.In this paper, we propose NodeHunter, an Ethereum network detector implemented through the application ofsimulation technology, which is capable of aggregating all node records within the network and the interconnectednessbetween them. Utilizing this connection information, NodeHunter can procure more comprehensive insightsfor network status analysis compared to preceding detection methodologies. Throughout a three-month period ofunbroken surveillance of the Ethereum network, we obtained an excess of two million node records along with overone hundred million node acquaintances. Analysis of the gathered data revealed that an alarming 49% or more ofthese node records were maliciously forged. 展开更多
关键词 Blockchain ethereum peer-to-peer networks node discovery protocol malicious behavior
在线阅读 下载PDF
Bidirectional Clone Node Model of Optimizing Performance of Structured P2P Overlay Network 被引量:1
3
作者 Zhang Yu Hao Ying +1 位作者 Ye Xinxin Li Yongzhen 《China Communications》 SCIE CSCD 2012年第4期123-129,共7页
In order to reduce the maintenance cost of structured Peer-to-Peer (P2P),Clone Node Protocol (CNP) based on user behavior is proposed.CNP considers the regularity of user behavior and uses the method of clone node.A B... In order to reduce the maintenance cost of structured Peer-to-Peer (P2P),Clone Node Protocol (CNP) based on user behavior is proposed.CNP considers the regularity of user behavior and uses the method of clone node.A Bidirectional Clone Node Chord model (BCNChord) based on CNP protocol is designed and realized.In BCNChord,Anticlockwise Searching Algorithm,Difference Push Synchronize Algorithm and Optimal Maintenance Algorithm are put forward to increase the performances.In experiments,according to the frequency of nodes,the maintenance cost of BCNChord can be 3.5%~32.5% lower than that of Chord.In the network of 212 nodes,the logic path hop is steady at 6,which is much more prior to 12 of Chord and 10 of CNChord.Theoretical analysis and experimental results show that BCNChord can effectively reduce the maintenance cost of its structure and simultaneously improve the query efficiency up to (1/4)O(logN).BCNChord is more suitable for highly dynamic environment and higher real-time system. 展开更多
关键词 structured P2P user behavior clone node protocol maintenance cost
在线阅读 下载PDF
Novel Sensing Hole Recovery with Expanded Relay Node Capability
4
作者 Moonseong Kim Woochan Lee 《Computer Systems Science & Engineering》 SCIE EI 2023年第1期663-675,共13页
The occurrence of‘sensing holes’not only hinders seamless data col-lection but also leads to misinterpretation of information in certain areas under extensive data analysis.In order to overcome this,various sensor r... The occurrence of‘sensing holes’not only hinders seamless data col-lection but also leads to misinterpretation of information in certain areas under extensive data analysis.In order to overcome this,various sensor relocation stra-tegies have been proposed,but the existing relocation strategies revealed pro-blems such as the ping-pong,shaded area,network disconnection,etc.This paper conducted research on relocation protocols in a distributed environment that is very suitable for real-world situations and efficiently recovering the problem of sensing holes.First,a simulation was performed on the distribution of the shaded area for data collection,which is a problem with the existing representative relo-cation protocol.After that,a data collection capability was newly added to the relay node,which had been in charge of only communication between cluster zones so far,and with this additional functionality,the performance of the revised sensor relocation algorithm was dramatically improved to overcome the existing problems.In addition,the performance and validity of the proposed algorithm were verified through various simulations. 展开更多
关键词 Hopping sensor mobile internet of things relocation protocol relay node simulation
在线阅读 下载PDF
Detection of Insider Selective Forwarding Attack Based on Monitor Node and Trust Mechanism in WSN 被引量:3
5
作者 Yu Hu Yuanming Wu Hongshuai Wang 《Wireless Sensor Network》 2014年第11期237-248,共12页
The security problems of wireless sensor networks (WSN) have attracted people’s wide attention. In this paper, after we have summarized the existing security problems and solutions in WSN, we find that the insider at... The security problems of wireless sensor networks (WSN) have attracted people’s wide attention. In this paper, after we have summarized the existing security problems and solutions in WSN, we find that the insider attack to WSN is hard to solve. Insider attack is different from outsider attack, because it can’t be solved by the traditional encryption and message authentication. Therefore, a reliable secure routing protocol should be proposed in order to defense the insider attack. In this paper, we focus on insider selective forwarding attack. The existing detection mechanisms, such as watchdog, multipath retreat, neighbor-based monitoring and so on, have both advantages and disadvantages. According to their characteristics, we proposed a secure routing protocol based on monitor node and trust mechanism. The reputation value is made up with packet forwarding rate and node’s residual energy. So this detection and routing mechanism is universal because it can take account of both the safety and lifetime of network. Finally, we use OPNET simulation to verify the performance of our algorithm. 展开更多
关键词 INSIDER ATTACK Selective FORWARDING TRUST Mechanism MONITOR node Secure Routing protocol
暂未订购
Deep Auto-Encoder Based Intelligent and Secure Time Synchronization Protocol(iSTSP)for Security-Critical Time-Sensitive WSNs
6
作者 Ramadan Abdul-Rashid Mohd Amiruddin Abd Rahman Abdulaziz Yagoub Barnawi 《Computer Modeling in Engineering & Sciences》 2025年第9期3213-3250,共38页
Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade... Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade substantially under malicious interference.We introduce iSTSP,an Intelligent and Secure Time Synchronization Protocol that implements a four-stage defense pipeline to ensure robust,precise synchronization even in hostile environments:(1)trust preprocessing that filters node participation using behavioral trust scoring;(2)anomaly isolation employing a lightweight autoencoder to detect and excise malicious nodes in real time;(3)reliability-weighted consensus that prioritizes high-trust nodes during time aggregation;and(4)convergence-optimized synchronization that dynamically adjusts parameters using theoretical stability bounds.We provide rigorous convergence analysis including a closed-form expression for convergence time,and validate the protocol through both simulations and realworld experiments on a controlled 16-node testbed.Under Sybil attacks with five malicious nodes within this testbed,iSTSP maintains synchronization error increases under 12%and achieves a rapid convergence.Compared to state-ofthe-art protocols like TPSN,SE-FTSP,and MMAR-CTS,iSTSP offers 60%faster detection,broader threat coverage,and more than 7 times lower synchronization error,with a modest 9.3%energy overhead over 8 h.We argue this is an acceptable trade-off for mission-critical deployments requiring guaranteed security.These findings demonstrate iSTSP’s potential as a reliable solution for secure WSN synchronization and motivate future work on large-scale IoT deployments and integration with energy-efficient communication protocols. 展开更多
关键词 Time-sensitive wireless sensor networks(TS-WSNs) secure time synchronization protocol trust-based authentication autoencoder model deep learning malicious node detection Internet of Things energyefficient communication protocols
在线阅读 下载PDF
A Sequence-Scheduled and Query-Based MAC Protocol for Underwater Acoustic Networks with a Mobile Node
7
作者 Jing Huang Cheng Chi +1 位作者 Wei Wang Haining Huang 《Journal of Communications and Information Networks》 CSCD 2020年第2期150-159,共10页
Since mobile nodes such as autonomous underwater vehicles can effectively expand network coverage,underwater acoustic networks with mobile nodes have attracted more and more attention in recent years.To ensure the tim... Since mobile nodes such as autonomous underwater vehicles can effectively expand network coverage,underwater acoustic networks with mobile nodes have attracted more and more attention in recent years.To ensure the timely access of a mobile node without disturbing the normal transmission of data packets from static nodes,a sequence-scheduled and query-based medium access control protocol is proposed in this paper.The underwater nodes with data packets to be transmitted reply with a control packet for channel reservation after receiving the broadcast control packet of the buoy,then the reserved nodes transmit their data packets as the order calculated by the buoy.We develop a mechanism to adjust the transmission order of the control packets sent by the underwater nodes in the handshake phase to reduce the collision and guarantee the success rate of reservation,and a query is initiated when the reserved control packet of the mobile node is not received by the buoy in the handshake to respond to the data transmission request of the mobile node in time.Simulations show that the maximum nodal throughput of the proposed MAC protocol increases by at least 20%and the access delay of the mobile node decreases by about 90%,compared to the two reference protocols.Besides,the average access probability of the mobile node in the proposed protocol is more than 90%. 展开更多
关键词 sequence-scheduled QUERY underwater acoustic networks mobile nodes MAC protocol
原文传递
New spray and wait protocol with node activity in heterogeneous delay tolerant networks
8
作者 Wu Jiagao Ye Ke +1 位作者 Zhu Yiji Liu Linfeng 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2015年第2期60-68,共9页
The spray and wait protocol is a classic copy-limited spraying protocol in delay tolerant networks, in which, the binary spray mode can be improved for heterogeneous delay tolerant networks. In this article, a new con... The spray and wait protocol is a classic copy-limited spraying protocol in delay tolerant networks, in which, the binary spray mode can be improved for heterogeneous delay tolerant networks. In this article, a new conception of node activity was defined to weigh the importance of nodes in aspect of message dissemination in the whole network. A new spray and wait protocol with node activity was proposed to improve the performance in heterogeneous delay tolerant networks. A mathematical model used under varieties of the spraying protocols was also proposed to analyze the expected delay of the protocol. Simulations show that the spray token proportion with node activity is optimal and the new protocol is of better performance than other related protocols. Therefore, this protocol has high efficiency and good scalability. 展开更多
关键词 delay tolerant network (DTN) routing protocol spray and wait node activity mathematical model
原文传递
基于PLC和Node-RED的远程油箱液位监控与邮件报警控制系统设计 被引量:1
9
作者 徐光辉 樊晓宇 《佳木斯大学学报(自然科学版)》 CAS 2024年第8期80-82,共3页
主要介绍了如何使用Node-RED与西门子S7-1515 PLC通过S7通讯方式,实现油箱液位远程监控与邮件报警功能。首先介绍了Node-RED和西门子S7-1515 PLC的相关技术,然后详细阐述了系统的设计与实现过程,最后对系统进行了测试与应用。该系统的... 主要介绍了如何使用Node-RED与西门子S7-1515 PLC通过S7通讯方式,实现油箱液位远程监控与邮件报警功能。首先介绍了Node-RED和西门子S7-1515 PLC的相关技术,然后详细阐述了系统的设计与实现过程,最后对系统进行了测试与应用。该系统的成功应用为工业自动化领域提供了一个有效的解决方案,能够实时监控油箱液位,并在超出预设范围时及时发送报警邮件,提高了生产安全和效率。 展开更多
关键词 node-RED 西门子S7-1515 PLC 油箱液位 远程监控 邮件报警
在线阅读 下载PDF
基于节点不相交的无线传感器网络任播路由协议
10
作者 顾云丽 徐昕 《传感技术学报》 北大核心 2025年第11期2076-2081,共6页
以往无线传感器网络(WSN)任播路由协议往往忽略节点相交问题。在WSN中,若某个节点承担多条任播路径的传输任务,将导致该节点能量过快耗尽。针对上述问题,提出一种基于节点不相交的WSN任播路由协议。该协议采用节点不相交策略,提高网络... 以往无线传感器网络(WSN)任播路由协议往往忽略节点相交问题。在WSN中,若某个节点承担多条任播路径的传输任务,将导致该节点能量过快耗尽。针对上述问题,提出一种基于节点不相交的WSN任播路由协议。该协议采用节点不相交策略,提高网络生存期;采用分布式查询路由,路由查询开销较少;采用后向路径策略,路由查询得到的任播路径质量较优。实验结果表明,相较基于节点相交WSN任播路由协议,所提出的协议网络生存期较优;相较传统基于节点不相交的WSN任播路由协议,所提出的协议路由查询开销少,任播路径质量较优。 展开更多
关键词 无线传感器网络 节点不相交 后向路径 任播 路由协议
在线阅读 下载PDF
基于ZigBee的多节点环境监控网络设计与性能分析
11
作者 程刚 《信息与电脑》 2025年第15期67-69,共3页
针对传统环境监测手段布线复杂、部署困难、成本高等问题,文章设计并实现了一种基于ZigBee无线通信技术的多节点环境监控网络系统,重点优化了基于AODVjr的轻量化路由协议,提出了一种动态路由选择与链路质量评估机制。在实验室搭建仿真... 针对传统环境监测手段布线复杂、部署困难、成本高等问题,文章设计并实现了一种基于ZigBee无线通信技术的多节点环境监控网络系统,重点优化了基于AODVjr的轻量化路由协议,提出了一种动态路由选择与链路质量评估机制。在实验室搭建仿真测试平台,模拟多种环境与节点密度进行性能评估。结果表明,在节点间距小于30米、节点数量小于50个的场景下,网络平均端到端时延低于85 ms,数据包投递率(Packet Delivery Ratio,PDR)高于96%,网络平均功耗控制合理,理论节点寿命超过1年。该系统展现了ZigBee技术在低成本、低功耗、大规模环境监控应用中的良好工程价值。 展开更多
关键词 ZIGBEE 多节点网络 无线传感器网络 低功耗 路由协议
在线阅读 下载PDF
基于非均匀分簇的无线传感器网络负载均衡路由算法
12
作者 潘继强 丁涛 +2 位作者 郭冬 周广彬 雍龙泉 《吉林大学学报(理学版)》 北大核心 2025年第6期1744-1750,共7页
针对非均匀分簇的无线传感器网络中各节点剩余能量相差较大,导致无线传感器网络节点能量消耗不均,影响负载均衡性,限制了信息传输效率,使丢包率上升的问题,提出一种负载均衡的无线传感器网络非均匀分簇路由算法.首先,利用混合式能量高... 针对非均匀分簇的无线传感器网络中各节点剩余能量相差较大,导致无线传感器网络节点能量消耗不均,影响负载均衡性,限制了信息传输效率,使丢包率上升的问题,提出一种负载均衡的无线传感器网络非均匀分簇路由算法.首先,利用混合式能量高效分簇协议对无线传感器网络中的节点进行非均匀分簇,计算每个节点的成簇概率,选择成簇概率最高的节点作为候选簇首节点;其次,基于节点剩余能量和节点间的距离设计节点评价函数,计算每个节点的评价函数值,选择评价函数值最高的节点作为簇首构建代价函数,选取中继节点提高信息传输效率,形成簇间多跳路由算法;最后,将数据传输任务分散到网络中的多个节点,以减少单个节点的能量消耗,实现无线传感器网络非均匀分簇路由负载均衡.实验结果表明,该算法的各节点剩余能量仅在6 J上下波动,且曲线波动幅度较小,在2000 bit传输数据量时的网络丢包率较低,为0.22%,负载均衡性较高. 展开更多
关键词 负载均衡 HEED协议 非均匀分簇 节点评价函数 无线传感器网络
在线阅读 下载PDF
基于能量消耗MPR选举算法的网络定位OLSR评估
13
作者 杨玲玲 《科技创新与生产力》 2025年第7期82-84,共3页
无线传感器网络(WSNs)的运行效果对保证网络定位精度具有重要的意义。由于网络定位信息数据均可由自组网内节点随机获取,网络定位适用性在先验式路由协议链路状态路由协议(Optimized Link State Routing,OLSR)下表现更好。为了解决OLSR... 无线传感器网络(WSNs)的运行效果对保证网络定位精度具有重要的意义。由于网络定位信息数据均可由自组网内节点随机获取,网络定位适用性在先验式路由协议链路状态路由协议(Optimized Link State Routing,OLSR)下表现更好。为了解决OLSR的多点中继(Multpoint Relays,MPR)节点运动速度较快的问题,为此设计了一种基于能量消耗的网络定位OLSR路由协议MPR机制评估方法,并开展仿真分析。研究结果表明:与原协议相比,节点能量消耗MPR选举生成协议表现出的性能更佳,经能量消耗MPR后形成的协议的吞吐量更大,有利于促进网络运行稳定性的提高。 展开更多
关键词 网络定位 状态路由 MPR节点集 能量消耗 协议评估
在线阅读 下载PDF
区块链边缘节点安全架构P-Dledger
14
作者 王迪 《计算机应用》 北大核心 2025年第8期2630-2636,共7页
针对区块链边缘节点的部署环境开放、安全措施薄弱、易受到安全攻击,以及计算和网络资源不足等问题,提出一种基于可信执行环境(TEE)的区块链安全架构P-Dledger。该架构通过构建两阶段的信任链,在满足软件便捷迭代的基础上,确保加载部件... 针对区块链边缘节点的部署环境开放、安全措施薄弱、易受到安全攻击,以及计算和网络资源不足等问题,提出一种基于可信执行环境(TEE)的区块链安全架构P-Dledger。该架构通过构建两阶段的信任链,在满足软件便捷迭代的基础上,确保加载部件的可信;通过实现智能合约可信执行框架以及基于串行外设接口或非门存储器(SPI NOR Flash)的数据可信存储,保证智能合约的可信计算与数据的可信存储;同时,为共识提案赋予单调递增的唯一标识,限制拜占庭节点的行为。实验与分析结果表明:所提架构确保了加载主体、账本数据与执行过程的安全可信;当网络延时大于60 ms或节点数大于8时,P-Dledger比采用拜占庭容错(PBFT)算法的区块链系统的吞吐量更高,且随着网络延时与节点数的增加,P-Dledger性能表现更稳定。 展开更多
关键词 区块链 边缘节点 可信执行环境 共识协议 拜占庭故障
在线阅读 下载PDF
电动汽车无线充电系统在多对多场景下的解决方案
15
作者 李井贺 胡越 +2 位作者 王金明 姚辰 寇秋林 《汽车文摘》 2025年第2期32-39,共8页
将无线充电引入电动汽车领域,可以有效提高电动汽车充电的便利性和安全性,用户无需插拔充电枪即可完成充电,极大地降低了充电带给用户的额外使用负担。为应对多车对多桩的复杂应用场景,需要一种基于中心节点架构的多对多无线充电系统解... 将无线充电引入电动汽车领域,可以有效提高电动汽车充电的便利性和安全性,用户无需插拔充电枪即可完成充电,极大地降低了充电带给用户的额外使用负担。为应对多车对多桩的复杂应用场景,需要一种基于中心节点架构的多对多无线充电系统解决方案。首先,方案在地面端设备间引入了中心节点的概念,由中心节点负责管理多个地面端设备,中心节点与地面端设备通过CAN通信,组成一个局域网络。其次,方案提出了一套局域网络内的寻址和通信机制,实现对地面端设备的有效管理。最后,方案通过检测地面线圈电流频率来辨识地面端设备的方法,实现车载端设备可与任一地面端设备之间相互识别。 展开更多
关键词 电动汽车 无线充电 中心节点 通信流程 对位检测
在线阅读 下载PDF
Light-Weight Simple Network Management Protocol in Wireless Sensor Networks 被引量:2
16
作者 高德云 朱婉婷 方然 《China Communications》 SCIE CSCD 2011年第8期121-129,共9页
A Light-Weight Simple Network Management Protocol (LW-SNMP) for the wireless sensor network is proposed, which is a kind of hierarchical network management system including a sink manager, cluster proxies, and node ag... A Light-Weight Simple Network Management Protocol (LW-SNMP) for the wireless sensor network is proposed, which is a kind of hierarchical network management system including a sink manager, cluster proxies, and node agents. Considering the resource limitations on the sensor nodes, we design new management messages, new data types and new management information base completely. The management messages between the cluster proxy and node agents are delivered as normal data packets. The experiment results show that LW-SNMP can meet the management demands in the resource-limited wireless sensor networks and has a good performance in stability, effectiveness of memory, extensibility than the traditional Simple Network Management Protocol (SNMP). 展开更多
关键词 WSNS network management lightweight simple network management protocol sink manager cluster proxy node agent
在线阅读 下载PDF
An Improved AOMDV Routing Protocol for Airspace Communication Network
17
作者 Xi Zhang Tao Zhang 《International Journal of Communications, Network and System Sciences》 2017年第8期157-166,共10页
The airspace communication network based on spacecraft has a wide range of applications in regional information enhancement and emergency communication. In this paper, a routing algorithm for congestion degree detecti... The airspace communication network based on spacecraft has a wide range of applications in regional information enhancement and emergency communication. In this paper, a routing algorithm for congestion degree detection of multipath routing (CD_AOMDV) is proposed. The method of combining the whole congestion degree detection and local congestion degree detection before service initiation is adopted. Timely and accurate judgment of the congestion degree reduced the loss rate of the hot nodes, so the average packet loss rate reduced. Simulation results show that compared with the traditional AOMDV protocol, the CD_AOMDV proposed in this paper has reduced the packet loss and improved delay performance, which is more suitable for the airspace communication network. 展开更多
关键词 Airspace Communication Network AOMDV ROUTING protocol nodeS MOBILITY SNS Simulation Platform
在线阅读 下载PDF
Enhancing Delay in MANET Using OLSR Protocol
18
作者 N. ENNEYA K. OUDIDI M. ELKOUTBI 《International Journal of Communications, Network and System Sciences》 2009年第5期392-399,共8页
The performance of a Mobile Ad hoc Network (MANET) is closely related to the capability of the implemented routing protocol to adapt itself to unpredictable changes of topology network and link status. The Optimized L... The performance of a Mobile Ad hoc Network (MANET) is closely related to the capability of the implemented routing protocol to adapt itself to unpredictable changes of topology network and link status. The Optimized Link State Routing (OLSR) protocol is a one key of the proactive routing protocols for MANETs. It is based on the multi-point relays (MPRs) technique to reach all nodes in the network with a limited number of broadcasts. In this paper, we propose new versions of the original OLSR protocol based on a new mobility parameter, in the goal to enhance and adapt it in the presence of the mobility. For this objective we define new three criterions for MPRs selection. The first criteria take for selection, just the mobility of nodes at one-hop. The two others criterions are based on both mobility of nodes at one-hop and two-hops. 展开更多
关键词 Ad HOC Networks OLSR protocol Multipoint RELAYS node MOBILITY Degree MOBILITY Quantification
在线阅读 下载PDF
New Ad Hoc QoS Multicast Routing Protocol
19
作者 Zhao Li (Department of Information Engineering, Nanjing University of Posts and Telecommunications,Nanjing 210003,China) 《ZTE Communications》 2006年第1期39-42,共4页
The application environments of wireless Ad hoc networks require that it should support Quality of Service (QoS). However, that is very difficult because of the inherent characteristics of the wireless channel and the... The application environments of wireless Ad hoc networks require that it should support Quality of Service (QoS). However, that is very difficult because of the inherent characteristics of the wireless channel and the frequent changes of network topology caused by nodes movement. An Ad hoc QoS Multicasting (AQM) protocol can solve this problem by previously reserving the neighbor nodes for tracking resource availability. By considering QoS restrictions of transport delay, loss ratio, bandwidth requirement, delay jitter, and throughout, and by finding the adaptive routing, the AQM protocol can obviously improve the efficiency of multicastsession. The results of network simulation show that QoS is essentially applicable to Ad hoc networks. 展开更多
关键词 QoS IEEE USA MAODV HOC New Ad Hoc QoS Multicast Routing protocol node
在线阅读 下载PDF
S-MAC Protocol of Wireless Sensor Network
20
作者 Jiang Xue (Nanjing University of Posts and Telecommunications,Nanjing 210003,China) 《ZTE Communications》 2007年第3期44-47,共4页
Energy efficiency is the primary issue for the Medium Access Control (MAC) protocol in sensor networks. Adopting periodic sleep,adaptive listen,overhearing avoidance and message passing mechanisms,the Sensor Medium Ac... Energy efficiency is the primary issue for the Medium Access Control (MAC) protocol in sensor networks. Adopting periodic sleep,adaptive listen,overhearing avoidance and message passing mechanisms,the Sensor Medium Access Control (S-MAC) protocol improves energy efficiency and latency in the network. There are mainly two methods to enhance the S-MAC protocol: dynamic adjustment,and sending control and data packets under different transport conditions. For the wireless sensor network,it is not realistic to design one MAC protocol that meets all requirements of every aspect; however,it is possible to design corresponding protocols in accordance with different requirements by flexibly adopting different methods. 展开更多
关键词 MAC S-MAC protocol of Wireless Sensor Network node
在线阅读 下载PDF
上一页 1 2 27 下一页 到第
使用帮助 返回顶部