期刊文献+
共找到3,313篇文章
< 1 2 166 >
每页显示 20 50 100
Optimizing wireless sensor network topology with node load consideration
1
作者 Ruizhi CHEN 《虚拟现实与智能硬件(中英文)》 2025年第1期47-61,共15页
Background With the development of the Internet,the topology optimization of wireless sensor networks has received increasing attention.However,traditional optimization methods often overlook the energy imbalance caus... Background With the development of the Internet,the topology optimization of wireless sensor networks has received increasing attention.However,traditional optimization methods often overlook the energy imbalance caused by node loads,which affects network performance.Methods To improve the overall performance and efficiency of wireless sensor networks,a new method for optimizing the wireless sensor network topology based on K-means clustering and firefly algorithms is proposed.The K-means clustering algorithm partitions nodes by minimizing the within-cluster variance,while the firefly algorithm is an optimization algorithm based on swarm intelligence that simulates the flashing interaction between fireflies to guide the search process.The proposed method first introduces the K-means clustering algorithm to cluster nodes and then introduces a firefly algorithm to dynamically adjust the nodes.Results The results showed that the average clustering accuracies in the Wine and Iris data sets were 86.59%and 94.55%,respectively,demonstrating good clustering performance.When calculating the node mortality rate and network load balancing standard deviation,the proposed algorithm showed dead nodes at approximately 50 iterations,with an average load balancing standard deviation of 1.7×10^(4),proving its contribution to extending the network lifespan.Conclusions This demonstrates the superiority of the proposed algorithm in significantly improving the energy efficiency and load balancing of wireless sensor networks to extend the network lifespan.The research results indicate that wireless sensor networks have theoretical and practical significance in fields such as monitoring,healthcare,and agriculture. 展开更多
关键词 node load wireless sensor network K-means clustering Firefly algorithm Topology optimization
在线阅读 下载PDF
Enhanced Multi-Object Dwarf Mongoose Algorithm for Optimization Stochastic Data Fusion Wireless Sensor Network Deployment
2
作者 Shumin Li Qifang Luo Yongquan Zhou 《Computer Modeling in Engineering & Sciences》 2025年第2期1955-1994,共40页
Wireless sensor network deployment optimization is a classic NP-hard problem and a popular topic in academic research.However,the current research on wireless sensor network deployment problems uses overly simplistic ... Wireless sensor network deployment optimization is a classic NP-hard problem and a popular topic in academic research.However,the current research on wireless sensor network deployment problems uses overly simplistic models,and there is a significant gap between the research results and actual wireless sensor networks.Some scholars have now modeled data fusion networks to make them more suitable for practical applications.This paper will explore the deployment problem of a stochastic data fusion wireless sensor network(SDFWSN),a model that reflects the randomness of environmental monitoring and uses data fusion techniques widely used in actual sensor networks for information collection.The deployment problem of SDFWSN is modeled as a multi-objective optimization problem.The network life cycle,spatiotemporal coverage,detection rate,and false alarm rate of SDFWSN are used as optimization objectives to optimize the deployment of network nodes.This paper proposes an enhanced multi-objective mongoose optimization algorithm(EMODMOA)to solve the deployment problem of SDFWSN.First,to overcome the shortcomings of the DMOA algorithm,such as its low convergence and tendency to get stuck in a local optimum,an encircling and hunting strategy is introduced into the original algorithm to propose the EDMOA algorithm.The EDMOA algorithm is designed as the EMODMOA algorithm by selecting reference points using the K-Nearest Neighbor(KNN)algorithm.To verify the effectiveness of the proposed algorithm,the EMODMOA algorithm was tested at CEC 2020 and achieved good results.In the SDFWSN deployment problem,the algorithm was compared with the Non-dominated Sorting Genetic Algorithm II(NSGAII),Multiple Objective Particle Swarm Optimization(MOPSO),Multi-Objective Evolutionary Algorithm based on Decomposition(MOEA/D),and Multi-Objective Grey Wolf Optimizer(MOGWO).By comparing and analyzing the performance evaluation metrics and optimization results of the objective functions of the multi-objective algorithms,the algorithm outperforms the other algorithms in the SDFWSN deployment results.To better demonstrate the superiority of the algorithm,simulations of diverse test cases were also performed,and good results were obtained. 展开更多
关键词 Stochastic data fusion wireless sensor networks network deployment spatiotemporal coverage dwarf mongoose optimization algorithm multi-objective optimization
在线阅读 下载PDF
A Hybrid Framework Integrating Deterministic Clustering,Neural Networks,and Energy-Aware Routing for Enhanced Efficiency and Longevity in Wireless Sensor Network
3
作者 Muhammad Salman Qamar Muhammad Fahad Munir 《Computers, Materials & Continua》 2025年第9期5463-5485,共23页
Wireless Sensor Networks(WSNs)have emerged as crucial tools for real-time environmental monitoring through distributed sensor nodes(SNs).However,the operational lifespan of WSNs is significantly constrained by the lim... Wireless Sensor Networks(WSNs)have emerged as crucial tools for real-time environmental monitoring through distributed sensor nodes(SNs).However,the operational lifespan of WSNs is significantly constrained by the limited energy resources of SNs.Current energy efficiency strategies,such as clustering,multi-hop routing,and data aggregation,face challenges,including uneven energy depletion,high computational demands,and suboptimal cluster head(CH)selection.To address these limitations,this paper proposes a hybrid methodology that optimizes energy consumption(EC)while maintaining network performance.The proposed approach integrates the Low Energy Adaptive Clustering Hierarchy with Deterministic(LEACH-D)protocol using an Artificial Neural Network(ANN)and Bayesian Regularization Algorithm(BRA).LEACH-D improves upon conventional LEACH by ensuring more uniform energy usage across SNs,mitigating inefficiencies from random CH selection.The ANN further enhances CH selection and routing processes,effectively reducing data transmission overhead and idle listening.Simulation results reveal that the LEACH-D-ANN model significantly reduces EC and extends the network’s lifespan compared to existing protocols.This framework offers a promising solution to the energy efficiency challenges in WSNs,paving the way for more sustainable and reliable network deployments. 展开更多
关键词 wireless sensor networks(WSNs) machine learning based artificial neural networks(ANNs) energy consumption(EC) LEACH-D sensor nodes(SNs) Bayesian Regularization Algorithm(BRA)
在线阅读 下载PDF
Genetic Algorithm Based Node Deployment in Hybrid Wireless Sensor Networks 被引量:3
4
作者 Omar Banimelhem Moad Mowafi Walid Aljoby 《Communications and Network》 2013年第4期273-279,共7页
In hybrid wireless sensor networks composed of both static and mobile sensor nodes, the random deployment of stationary nodes may cause coverage holes in the sensing field. Hence, mobile sensor nodes are added after t... In hybrid wireless sensor networks composed of both static and mobile sensor nodes, the random deployment of stationary nodes may cause coverage holes in the sensing field. Hence, mobile sensor nodes are added after the initial deployment to overcome the coverage holes problem. To achieve optimal coverage, an efficient algorithm should be employed to find the best positions of the additional mobile nodes. This paper presents a genetic algorithm that searches for an optimal or near optimal solution to the coverage holes problem. The proposed algorithm determines the minimum number and the best locations of the mobile nodes that need to be added after the initial deployment of the stationary nodes. The performance of the genetic algorithm was evaluated using several metrics, and the simulation results demonstrated that the proposed algorithm can optimize the network coverage in terms of the overall coverage ratio and the number of additional mobile nodes. 展开更多
关键词 TARGET COVERAGE node deployment GENETIC Algorithm wireless sensor networks
在线阅读 下载PDF
Survey on node deployment in wireless sensor networks
5
作者 王正杰 钱旭 +2 位作者 张计芬 赵媛 郭银景 《Journal of Measurement Science and Instrumentation》 CAS 2012年第1期80-84,共5页
Node deployment strategy plays an important role in wireless sensor networks(WSNs)application because it determines the coverage,connectivity and network lifetime of WSNs.This paper reports the current research on the... Node deployment strategy plays an important role in wireless sensor networks(WSNs)application because it determines the coverage,connectivity and network lifetime of WSNs.This paper reports the current research on the optimization means for achieving the desirable design goals in various applications.We categorize the placements strategies into are the static and the dynamic according to whether the node position change after the network is operational.The coverage,connectivity and energy consumption of WSNs are analysed and discussed in detail. 展开更多
关键词 node deployment wireless sensor networks COVERAGE energy consumption
在线阅读 下载PDF
On Energy-Efficient Node Deployment in Wireless Sensor Networks
6
作者 Hui WANG KeZhong LU XiaoHui LIN 《International Journal of Communications, Network and System Sciences》 2008年第3期241-245,共5页
In wireless sensor networks, sensor nodes collect local data and transfer to the base station often relayed by other nodes. If deploying sensor nodes evenly, sensor nodes nearer to the base station will consume more e... In wireless sensor networks, sensor nodes collect local data and transfer to the base station often relayed by other nodes. If deploying sensor nodes evenly, sensor nodes nearer to the base station will consume more energy and use up their energy faster that reduces system lifetime. By analyzing energy consumption, a density formula of deploying nodes is proposed. The ratio of whole energy of sensor nodes to energy consumption speed of sensor nodes in every area can get consistent if deploying nodes by the density formula, therefore system lifetime is prolonged. Analysis and simulation results show that when communication dominates whole energy consumption and the monitored region is big compared with radio range of sensor node, system lifetime under this scheme can be 3R/(2t) times of that under deploying nodes evenly, where R is radius of the monitored region and t is radio range of sensor node. 展开更多
关键词 wireless sensor networks sensor node Deploying node
在线阅读 下载PDF
无线传感器网络基于测距的节点定位算法综述OverviewoftheNodeLocalizationAlgorithmBasedonRangingofWirelessSensorNetworks 被引量:1
7
作者 罗兰花 梁海英 任子亭 《科技视界》 2016年第3期27-28,共2页
基于测距的定位方法对测量的距离信息运用几何知识求解未知节点的位置,常用在定位精度较高的领域,可在误差、能耗、受环境因素影响等方面进行优化。本文对基于测距的无线传感器网络节点定位算法进行详细地分析和比较。
关键词 无线传感器网络 节点定位 三边测量法 最大似然估计法
在线阅读 下载PDF
Deep Q-Learning Driven Protocol for Enhanced Border Surveillance with Extended Wireless Sensor Network Lifespan
8
作者 Nimisha Rajput Amit Kumar +3 位作者 Raghavendra Pal Nishu Gupta Mikko Uitto Jukka Mäkelä 《Computer Modeling in Engineering & Sciences》 2025年第6期3839-3859,共21页
Wireless Sensor Networks(WSNs)play a critical role in automated border surveillance systems,where continuous monitoring is essential.However,limited energy resources in sensor nodes lead to frequent network failures a... Wireless Sensor Networks(WSNs)play a critical role in automated border surveillance systems,where continuous monitoring is essential.However,limited energy resources in sensor nodes lead to frequent network failures and reduced coverage over time.To address this issue,this paper presents an innovative energy-efficient protocol based on deep Q-learning(DQN),specifically developed to prolong the operational lifespan of WSNs used in border surveillance.By harnessing the adaptive power of DQN,the proposed protocol dynamically adjusts node activity and communication patterns.This approach ensures optimal energy usage while maintaining high coverage,connectivity,and data accuracy.The proposed system is modeled with 100 sensor nodes deployed over a 1000 m×1000 m area,featuring a strategically positioned sink node.Our method outperforms traditional approaches,achieving significant enhancements in network lifetime and energy utilization.Through extensive simulations,it is observed that the network lifetime increases by 9.75%,throughput increases by 8.85%and average delay decreases by 9.45%in comparison to the similar recent protocols.It demonstrates the robustness and efficiency of our protocol in real-world scenarios,highlighting its potential to revolutionize border surveillance operations. 展开更多
关键词 wireless sensor networks(WSNs) energy efficiency reinforcement learning network lifetime dynamic node management autonomous surveillance
在线阅读 下载PDF
RSSI-Based 3D Wireless Sensor Node Localization Using Hybrid T Cell Immune and Lotus Optimization
9
作者 Weiwei Hu Kiran Sree Pokkuluri +3 位作者 Rajesh Arunachalam Bander A.Jabr Yasser A.Ali Preethi Palanisamy 《Computers, Materials & Continua》 SCIE EI 2024年第12期4833-4851,共19页
Wireless Sensor Network(WSNs)consists of a group of nodes that analyze the information from surrounding regions.The sensor nodes are responsible for accumulating and exchanging information.Generally,node local-ization... Wireless Sensor Network(WSNs)consists of a group of nodes that analyze the information from surrounding regions.The sensor nodes are responsible for accumulating and exchanging information.Generally,node local-ization is the process of identifying the target node’s location.In this research work,a Received Signal Strength Indicator(RSSI)-based optimal node localization approach is proposed to solve the complexities in the conventional node localization models.Initially,the RSSI value is identified using the Deep Neural Network(DNN).The RSSI is conceded as the range-based method and it does not require special hardware for the node localization process,also it consumes a very minimal amount of cost for localizing the nodes in 3D WSN.The position of the anchor nodes is fixed for detecting the location of the target.Further,the optimal position of the target node is identified using Hybrid T cell Immune with Lotus Effect Optimization algorithm(HTCI-LEO).During the node localization process,the average localization error is minimized,which is the objective of the optimal node localization.In the regular and irregular surfaces,this hybrid algorithm effectively performs the localization process.The suggested hybrid algorithm converges very fast in the three-dimensional(3D)environment.The accuracy of the proposed node localization process is 94.25%. 展开更多
关键词 sensor node localization received signal strength indicator 3D wireless sensor network deep neural network average localization error and hybrid T cell immune with lotus effect optimization algorithm
在线阅读 下载PDF
Energy-Efficient and Reliable Deployment Models for Hybrid Underwater Acoustic Sensor Networks with a Mobile Gateway
10
作者 Tatiana A.Fedorova Vladimir A.Ryzhov +2 位作者 Kirill S.Safronov Nikolay N.Semenov Shaharin A.Sulaiman 《哈尔滨工程大学学报(英文版)》 CSCD 2024年第4期960-983,共24页
This work proposes an innovative approach to evaluate the functional characteristics of a heterogeneous underwater wireless acoustic sensor network(UWASN)using a stochastic model and the network connectivity criterion... This work proposes an innovative approach to evaluate the functional characteristics of a heterogeneous underwater wireless acoustic sensor network(UWASN)using a stochastic model and the network connectivity criterion.The connectivity criterion is probabilistic and considers inherently distinct groups of parameters:technical parameters that determine the network function at specific levels of the communication stack and physical parameters that describe the environment in the water area.The proposed approach enables researchers to evaluate the network characteristics in terms of energy efficiency and reliability while considering specific network and environmental parameters.Moreover,this approach is a simple and convenient tool for analyzing the effectiveness of protocols in various open systems interconnection model levels.It is possible to assess the potential capabilities of any protocol and include it in the proposed model.This work presents the results of modeling the critical characteristics of heterogeneous three-dimensional UWASNs of different scales consisting of stationary sensors and a wave glider as a mobile gateway,using specific protocols as examples.Several alternative routes for the wave glider are considered to optimize the network’s functional capabilities.Optimal trajectories of the wave glider’s movement have been determined in terms of ensuring the efficiency and reliability of the hybrid UWASN at various scales.In the context of the problem,an evaluation of different reference node placement was to ensure message transmission to a mobile gateway.The best location of reference nodes has been found. 展开更多
关键词 heterogeneous underwater wireless acoustic sensor network Mobile gateway Wave glider Stochastic connectivity model Probabilistic optimality criteria Network reliability Network energy consumption
在线阅读 下载PDF
Node deployment strategy optimization for wireless sensor network with mobile base station 被引量:7
11
作者 龙军 桂卫华 《Journal of Central South University》 SCIE EI CAS 2012年第2期453-458,共6页
The optimization of network performance in a movement-assisted data gathering scheme was studied by analyzing the energy consumption of wireless sensor network with node uniform distribution. A theoretically analytica... The optimization of network performance in a movement-assisted data gathering scheme was studied by analyzing the energy consumption of wireless sensor network with node uniform distribution. A theoretically analytical method for avoiding energy hole was proposed. It is proved that if the densities of sensor nodes working at the same time are alternate between dormancy and work with non-uniform node distribution. The efficiency of network can increase by several times and the residual energy of network is nearly zero when the network lifetime ends. 展开更多
关键词 wireless sensor network mobile base station network optimization energy consumption balancing density ratio of sensor node network lifetime
在线阅读 下载PDF
A Method for Node Fault Detection in Wireless Sensor Networks 被引量:3
12
作者 高志鹏 黄日茂 +1 位作者 陈颖慧 芮兰兰 《China Communications》 SCIE CSCD 2011年第1期28-34,共7页
To reduce excessive computing and communication loads of traditional fault detection methods,a neighbor-data analysis based node fault detection method is proposed.First,historical data is analyzed to confirm the conf... To reduce excessive computing and communication loads of traditional fault detection methods,a neighbor-data analysis based node fault detection method is proposed.First,historical data is analyzed to confirm the confidence level of sensor nodes.Then a node's reading data is compared with neighbor nodes' which are of good confidence level.Decision can be made whether this node is a failure or not.Simulation shows this method has good effect on fault detection accuracy and transient fault tolerance,and never transfers communication and computing overloading to sensor nodes. 展开更多
关键词 wireless sensor network fault detection neighbor nodes
在线阅读 下载PDF
Highly Resilient Key Distribution Strategy for Multi-level Heterogeneous Sensor Networks by Using Deployment Knowledge 被引量:2
13
作者 王智弘 魏仕益 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第5期593-599,共7页
The most important problem in the security of wireless sensor network (WSN) is to distribute keys for the sensor nodes and to establish a secure channel in an insecure environment. Since the sensor node has limited re... The most important problem in the security of wireless sensor network (WSN) is to distribute keys for the sensor nodes and to establish a secure channel in an insecure environment. Since the sensor node has limited resources, for instance, low battery life and low computational power, the key distribution scheme must be designed in an efficient manner. Recently many studies added a few high-level nodes into the network, called the heterogeneous sensor network (HSN). Most of these studies considered an application for two-level HSN instead of multi-level one. In this paper, we propose some definitions for multi-level HSN, and design a novel key management strategy based on the polynomial hash tree (PHT) method by using deployment knowledge. Our proposed strategy has lower computation and communication overheads but higher connectivity and resilience. 展开更多
关键词 heterogeneous sensor network (HSN) key distribution mechanism deployment knowledge polynomial hash tree (PHT)
原文传递
A Clustering-tree Topology Control Based on the Energy Forecast for Heterogeneous Wireless Sensor Networks 被引量:7
14
作者 Zhen Hong Rui Wang Xile Li 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI 2016年第1期68-77,共10页
How to design an energy-efficient algorithm to maximize the network lifetime in complicated scenarios is a critical problem for heterogeneous wireless sensor networks (HWSN). In this paper, a clustering-tree topology ... How to design an energy-efficient algorithm to maximize the network lifetime in complicated scenarios is a critical problem for heterogeneous wireless sensor networks (HWSN). In this paper, a clustering-tree topology control algorithm based on the energy forecast (CTEF) is proposed for saving energy and ensuring network load balancing, while considering the link quality, packet loss rate, etc. In CTEF, the average energy of the network is accurately predicted per round (the lifetime of the network is denoted by rounds) in terms of the difference between the ideal and actual average residual energy using central limit theorem and normal distribution mechanism, simultaneously. On this basis, cluster heads are selected by cost function (including the energy, link quality and packet loss rate) and their distance. The non-cluster heads are determined to join the cluster through the energy, distance and link quality. Furthermore, several non-cluster heads in each cluster are chosen as the relay nodes for transmitting data through multi-hop communication to decrease the load of each cluster-head and prolong the lifetime of the network. The simulation results show the efficiency of CTEF. Compared with low-energy adaptive clustering hierarchy (LEACH), energy dissipation forecast and clustering management (EDFCM) and efficient and dynamic clustering scheme (EDCS) protocols, CTEF has longer network lifetime and receives more data packets at base station. © 2014 Chinese Association of Automation. 展开更多
关键词 ALGORITHMS Clustering algorithms Cost functions Energy dissipation Energy efficiency Forecasting Information management Low power electronics Network management Normal distribution Packet loss Quality control Telecommunication networks TOPOLOGY Trees (mathematics)
在线阅读 下载PDF
Grid-Based Localization Mechanism with Mobile Reference Node in Wireless Sensor Networks 被引量:1
15
作者 Kuo-Feng Huang Po-Ju Chen Emery Jou 《Journal of Electronic Science and Technology》 CAS 2014年第3期283-287,共5页
Wireless sensor networks (WSNs) are based on monitoring or managing the sensing area by using the location information with sensor nodes. Most sensor nodes require hardware support or receive packets with location i... Wireless sensor networks (WSNs) are based on monitoring or managing the sensing area by using the location information with sensor nodes. Most sensor nodes require hardware support or receive packets with location information to estimate their locations, which needs lots of time or costs. In this paper we proposed a localization mechanism using a mobile reference node (MRN) and trilateration in WSNs to reduce the energy consumption and location error. The simulation results demonstrate that the proposed mechanism can obtain more unknown nodes locations by the mobile reference node moving scheme and will decreases the energy consumption and average ocation error. 展开更多
关键词 LOCALIZATION mobile sensor node received signal strength indicator wireless sensor networks
在线阅读 下载PDF
Node cooperation based location secure verification algorithm in wireless sensor networks localization 被引量:2
16
作者 唐弢 Guo Qing +1 位作者 Li Hanqing Peng Bao 《High Technology Letters》 EI CAS 2012年第4期376-381,共6页
For the application of wireless sensor networks in the military field, one of the main challenges is security. To solve the problem of verifying the location claim for a node, a new location verifica- tion algorithm c... For the application of wireless sensor networks in the military field, one of the main challenges is security. To solve the problem of verifying the location claim for a node, a new location verifica- tion algorithm called node cooperation based location secure verification (NCBLSV) algorithm is proposed. NCBLSV could verify malicious nodes by contrasting neighbor nodes and nodes under beam width angle using an adaptive array antenna at a base point. Simulation experiments are con- ducted to evaluate the performance of this algorithm by varying the communication range and the an- tenna beam width angle. Results show that NCBLSV algorithm has high probability of successful ma- licious nodes detection and low probability of false nodes detection. Thus, it is proved that the NCBLSV algorithm is useful and necessary in the wireless sensor networks security. 展开更多
关键词 wireless sensor networks WSNs) node localization SECURE position verifica-tion adaptive array antenna
在线阅读 下载PDF
Cluster Based Secure Dynamic Keying Technique for Heterogeneous Mobile Wireless Sensor Networks 被引量:1
17
作者 Thiruppathy Kesavan.V Radhakrishnan.S 《China Communications》 SCIE CSCD 2016年第6期178-194,共17页
In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or... In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or cluster member. This causes the cluster or the whole network to be controlled by the malicious nodes. To offer high level of security, the mobile sensor nodes need to be authenticated. Further, clustering of nodes improves scalability, energy efficient routing and data delivery. In this paper, we propose a cluster based secure dynamic keying technique to authenticate the nodes during mobility. The nodes with high configuration are chosen as cluster heads based on the weight value which is estimated using parameters such as the node degree, average distance, node's average speed, and virtual battery power. The keys are dynamically generated and used for providing security. Even the keys are compromised by the attackers, they are not able to use the previous keys to cheat or disuse the authenticated nodes. In addition, a bidirectional malicious node detection technique is employed which eliminates the malicious node from the network. By simulation, it is proved that the proposed technique provides efficient security with reduced energy consumption during node mobility. 展开更多
关键词 CLUSTER dynamic key heterogeneous MOBILITY wireless sensor network WEIGHT
在线阅读 下载PDF
A Malicious and Malfunctioning Node Detection Scheme for Wireless Sensor Networks 被引量:3
18
作者 Seo Hyun Oh Chan O. Hong Yoon Hwa Choi 《Wireless Sensor Network》 2012年第3期84-90,共7页
Wireless sensor networks are often used to monitor physical and environmental conditions in various regions where human access is limited. Due to limited resources and deployment in hostile environment, they are vulne... Wireless sensor networks are often used to monitor physical and environmental conditions in various regions where human access is limited. Due to limited resources and deployment in hostile environment, they are vulnerable to faults and malicious attacks. The sensor nodes affected or compromised can send erroneous data or misleading reports to base station. Hence identifying malicious and faulty nodes in an accurate and timely manner is important to provide reliable functioning of the networks. In this paper, we present a malicious and malfunctioning node detection scheme using dual-weighted trust evaluation in a hierarchical sensor network. Malicious nodes are effectively detected in the presence of natural faults and noise without sacrificing fault-free nodes. Simulation results show that the proposed scheme outperforms some existing schemes in terms of mis-detection rate and event detection accuracy, while maintaining comparable performance in malicious node detection rate and false alarm rate. 展开更多
关键词 wireless sensor networks FAULT DETECTION MALICIOUS node DETECTION
暂未订购
Neighbor-Based Malicious Node Detection in Wireless Sensor Networks 被引量:2
19
作者 Sung-Jib Yim Yoon-Hwa Choi 《Wireless Sensor Network》 2012年第9期219-225,共7页
The primary function of wireless sensor networks is to gather sensor data from the monitored area. Due to faults or malicious nodes, however, the sensor data collected or reported might be wrong. Hence it is important... The primary function of wireless sensor networks is to gather sensor data from the monitored area. Due to faults or malicious nodes, however, the sensor data collected or reported might be wrong. Hence it is important to detect events in the presence of wrong sensor readings and misleading reports. In this paper, we present a neighbor-based malicious node detection scheme for wireless sensor networks. Malicious nodes are modeled as faulty nodes behaving intelligently to lead to an incorrect decision or energy depletion without being easily detected. Each sensor node makes a decision on the fault status of itself and its neighboring nodes based on the sensor readings. Most erroneous readings due to transient faults are corrected by filtering, while nodes with permanent faults are removed using confidence-level evaluation, to improve malicious node detection rate and event detection accuracy. Each node maintains confidence levels of itself and its neighbors, indicating the track records in reporting past events correctly. Computer simulation shows that most of the malicious nodes reporting against their own readings are correctly detected unless they behave similar to the normal nodes. As a result, high event detection accuracy is also maintained while achieving low false alarm rate. 展开更多
关键词 wireless sensor networks MALICIOUS nodeS Faults Neighbor-Based Detection
暂未订购
Wireless sensor networks in relic protection:deployment methodology and cross-layer design 被引量:1
20
作者 李栋 《High Technology Letters》 EI CAS 2009年第1期59-64,共6页
This paper describes the deployment optimization technology and the cross-layer design of a surveil-lance WSN system applied in relic protection.Facing the typical technical challenges in the applicationcontext of rel... This paper describes the deployment optimization technology and the cross-layer design of a surveil-lance WSN system applied in relic protection.Facing the typical technical challenges in the applicationcontext of relic protection,we firstly propose a deployment technology based on ant colony optimization al-gorithm(DT-ACO)to overcome the difficulties in communication connectivity and sensing coverage.Meanwhile,DT-ACO minimizes the overall cost of the system as much as possible.Secondly we proposea novel power-aware cross-layer scheme(PACS)to facilitate adjustable system lifetime and surveillanceaccuracy.The performance analysis shows that we achieve lower device cost,significant extension of thesystem lifetime and improvement on the data delivery rate compared with the traditional methods. 展开更多
关键词 wireless sensor network deployment algorithm cross-layer design
在线阅读 下载PDF
上一页 1 2 166 下一页 到第
使用帮助 返回顶部