期刊文献+
共找到2,898篇文章
< 1 2 145 >
每页显示 20 50 100
Optimizing wireless sensor network topology with node load consideration
1
作者 Ruizhi CHEN 《虚拟现实与智能硬件(中英文)》 2025年第1期47-61,共15页
Background With the development of the Internet,the topology optimization of wireless sensor networks has received increasing attention.However,traditional optimization methods often overlook the energy imbalance caus... Background With the development of the Internet,the topology optimization of wireless sensor networks has received increasing attention.However,traditional optimization methods often overlook the energy imbalance caused by node loads,which affects network performance.Methods To improve the overall performance and efficiency of wireless sensor networks,a new method for optimizing the wireless sensor network topology based on K-means clustering and firefly algorithms is proposed.The K-means clustering algorithm partitions nodes by minimizing the within-cluster variance,while the firefly algorithm is an optimization algorithm based on swarm intelligence that simulates the flashing interaction between fireflies to guide the search process.The proposed method first introduces the K-means clustering algorithm to cluster nodes and then introduces a firefly algorithm to dynamically adjust the nodes.Results The results showed that the average clustering accuracies in the Wine and Iris data sets were 86.59%and 94.55%,respectively,demonstrating good clustering performance.When calculating the node mortality rate and network load balancing standard deviation,the proposed algorithm showed dead nodes at approximately 50 iterations,with an average load balancing standard deviation of 1.7×10^(4),proving its contribution to extending the network lifespan.Conclusions This demonstrates the superiority of the proposed algorithm in significantly improving the energy efficiency and load balancing of wireless sensor networks to extend the network lifespan.The research results indicate that wireless sensor networks have theoretical and practical significance in fields such as monitoring,healthcare,and agriculture. 展开更多
关键词 node load wireless sensor network K-means clustering Firefly algorithm Topology optimization
在线阅读 下载PDF
Physical layer design of wireless sensor network nodes 被引量:5
2
作者 钟子果 胡爱群 王丹 《Journal of Southeast University(English Edition)》 EI CAS 2006年第1期21-25,共5页
Major consideration dimensions for the physical layer design of wireless sensor network (WSN) nodes is analyzed by comparing different wireless communication approaches, diverse mature standards, important radio fre... Major consideration dimensions for the physical layer design of wireless sensor network (WSN) nodes is analyzed by comparing different wireless communication approaches, diverse mature standards, important radio frequency (RF) parameters and various microcontroller unit (MCU) solutions. An implementation of the WSN node is presented with experimental results and a novel "one processor working at two frequencies" energy saving strategy. The lifetime estimation issue is analyzed with consideration to the periodical listen required by common WSN media access control (MAC) algorithms. It can be concluded that the startup time of the RF which determines the best sleep time ratio and the shortest backoff slot time of MAC, the RF frequency and modulation methods which determinate the RX and TX current, and the overall energy consumption of the dual frequency MCU SOC ( system on chip) are the most essential factors for the WSN node physical layer design. 展开更多
关键词 wireless sensor network node physical layer radio frequency energy consumption node lifetime
在线阅读 下载PDF
Chain-type wireless sensor network node scheduling strategy 被引量:9
3
作者 Guangzhu Chen Qingchun Meng Lei Zhang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2014年第2期203-210,共8页
In order to reduce power consumption of sensor nodes and extend network survival time in the wireless sensor network (WSN), sensor nodes are scheduled in an active or dormant mode. A chain-type WSN is fundamental y ... In order to reduce power consumption of sensor nodes and extend network survival time in the wireless sensor network (WSN), sensor nodes are scheduled in an active or dormant mode. A chain-type WSN is fundamental y different from other types of WSNs, in which the sensor nodes are deployed along elongated geographic areas and form a chain-type network topo-logy structure. This paper investigates the node scheduling prob-lem in the chain-type WSN. Firstly, a node dormant scheduling mode is analyzed theoretical y from geographic coverage, and then three neighboring nodes scheduling criteria are proposed. Sec-ondly, a hybrid coverage scheduling algorithm and dead areas are presented. Final y, node scheduling in mine tunnel WSN with uniform deployment (UD), non-uniform deployment (NUD) and op-timal distribution point spacing (ODS) is simulated. The results show that the node scheduling with UD and NUD, especial y NUD, can effectively extend the network survival time. Therefore, a strat-egy of adding a few mobile nodes which activate the network in dead areas is proposed, which can further extend the network survival time by balancing the energy consumption of nodes. 展开更多
关键词 wireless sensor network (WSN) chain-type nodescheduling network survival time mobile nodes.
在线阅读 下载PDF
Node deployment strategy optimization for wireless sensor network with mobile base station 被引量:7
4
作者 龙军 桂卫华 《Journal of Central South University》 SCIE EI CAS 2012年第2期453-458,共6页
The optimization of network performance in a movement-assisted data gathering scheme was studied by analyzing the energy consumption of wireless sensor network with node uniform distribution. A theoretically analytica... The optimization of network performance in a movement-assisted data gathering scheme was studied by analyzing the energy consumption of wireless sensor network with node uniform distribution. A theoretically analytical method for avoiding energy hole was proposed. It is proved that if the densities of sensor nodes working at the same time are alternate between dormancy and work with non-uniform node distribution. The efficiency of network can increase by several times and the residual energy of network is nearly zero when the network lifetime ends. 展开更多
关键词 wireless sensor network mobile base station network optimization energy consumption balancing density ratio of sensor node network lifetime
在线阅读 下载PDF
Design and performance analysis of wireless sensor network location node system for underground mine 被引量:10
5
作者 CHEN Guang-zhu SHEN Chun-feng ZHOU Li-juan 《Mining Science and Technology》 EI CAS 2009年第6期813-818,共6页
Aiming at the application of a wireless sensor network to locating miners in underground mine,we design a wireless sensor network location node system,considering the communication performance and the intrinsic safety... Aiming at the application of a wireless sensor network to locating miners in underground mine,we design a wireless sensor network location node system,considering the communication performance and the intrinsic safety. The location node system consists of a mobile node,several fixed nodes,and a sink node,all of whose circuits were designed based on CC2430. A varistor and a RC circuit were used in the reset circuit of a sensor node to guarantee the intrinsic safety by reducing discharge energy,the theoretical analysis of the discharge energy shows that the reset circuit is an intrinsic safety one. The analysis and simulation about the performance of the location node system are discussed,such as network communication delay and packet loss rate,the results show that the highest network communication delay of the system is about 0.11 seconds,and the highest packet loss rate is about 0.13,which assures the location node system has a high reliability,and can locate miners in the underground mine. 展开更多
关键词 wireless sensor network location node network communication delay packet loss rate
在线阅读 下载PDF
ANN Based Novel Approach to Detect Node Failure in Wireless Sensor Network 被引量:3
6
作者 Sundresan Perumal Mujahid Tabassum +5 位作者 Ganthan Narayana Suresh Ponnan Chinmay Chakraborty Saju Mohanan Zeeshan Basit Mohammad Tabrez Quasim 《Computers, Materials & Continua》 SCIE EI 2021年第11期1447-1462,共16页
A wireless sensor network(WSN)consists of several tiny sensor nodes to monitor,collect,and transmit the physical information from an environment through the wireless channel.The node failure is considered as one of th... A wireless sensor network(WSN)consists of several tiny sensor nodes to monitor,collect,and transmit the physical information from an environment through the wireless channel.The node failure is considered as one of the main issues in the WSN which creates higher packet drop,delay,and energy consumption during the communication.Although the node failure occurred mostly due to persistent energy exhaustion during transmission of data packets.In this paper,Artificial Neural Network(ANN)based Node Failure Detection(NFD)is developed with cognitive radio for detecting the location of the node failure.The ad hoc on-demand distance vector(AODV)routing protocol is used for transmitting the data from the source node to the base station.Moreover,the Mahalanobis distance is used for detecting an adjacent node to the node failure which is used to create the routing path without any node failure.The performance of the proposed ANN-NFD method is analysed in terms of throughput,delivery rate,number of nodes alive,drop rate,end to end delay,energy consumption,and overhead ratio.Furthermore,the performance of the ANN-NFD method is evaluated with the header to base station and base station to header(H2B2H)protocol.The packet delivery rate of the ANN-NFD method is 0.92 for 150 nodes that are high when compared to the H2B2H protocol.Hence,the ANN-NFD method provides data consistency during data transmission under node and battery failure. 展开更多
关键词 AODV artificial neural network artificial intelligence Mahalanobis distance node failure THROUGHPUT wireless sensor network
在线阅读 下载PDF
A Method for Node Fault Detection in Wireless Sensor Networks 被引量:3
7
作者 高志鹏 黄日茂 +1 位作者 陈颖慧 芮兰兰 《China Communications》 SCIE CSCD 2011年第1期28-34,共7页
To reduce excessive computing and communication loads of traditional fault detection methods,a neighbor-data analysis based node fault detection method is proposed.First,historical data is analyzed to confirm the conf... To reduce excessive computing and communication loads of traditional fault detection methods,a neighbor-data analysis based node fault detection method is proposed.First,historical data is analyzed to confirm the confidence level of sensor nodes.Then a node's reading data is compared with neighbor nodes' which are of good confidence level.Decision can be made whether this node is a failure or not.Simulation shows this method has good effect on fault detection accuracy and transient fault tolerance,and never transfers communication and computing overloading to sensor nodes. 展开更多
关键词 wireless sensor network fault detection neighbor nodes
在线阅读 下载PDF
Grid-Based Localization Mechanism with Mobile Reference Node in Wireless Sensor Networks 被引量:1
8
作者 Kuo-Feng Huang Po-Ju Chen Emery Jou 《Journal of Electronic Science and Technology》 CAS 2014年第3期283-287,共5页
Wireless sensor networks (WSNs) are based on monitoring or managing the sensing area by using the location information with sensor nodes. Most sensor nodes require hardware support or receive packets with location i... Wireless sensor networks (WSNs) are based on monitoring or managing the sensing area by using the location information with sensor nodes. Most sensor nodes require hardware support or receive packets with location information to estimate their locations, which needs lots of time or costs. In this paper we proposed a localization mechanism using a mobile reference node (MRN) and trilateration in WSNs to reduce the energy consumption and location error. The simulation results demonstrate that the proposed mechanism can obtain more unknown nodes locations by the mobile reference node moving scheme and will decreases the energy consumption and average ocation error. 展开更多
关键词 LOCALIZATION mobile sensor node received signal strength indicator wireless sensor networks
在线阅读 下载PDF
Node cooperation based location secure verification algorithm in wireless sensor networks localization 被引量:2
9
作者 唐弢 Guo Qing +1 位作者 Li Hanqing Peng Bao 《High Technology Letters》 EI CAS 2012年第4期376-381,共6页
For the application of wireless sensor networks in the military field, one of the main challenges is security. To solve the problem of verifying the location claim for a node, a new location verifica- tion algorithm c... For the application of wireless sensor networks in the military field, one of the main challenges is security. To solve the problem of verifying the location claim for a node, a new location verifica- tion algorithm called node cooperation based location secure verification (NCBLSV) algorithm is proposed. NCBLSV could verify malicious nodes by contrasting neighbor nodes and nodes under beam width angle using an adaptive array antenna at a base point. Simulation experiments are con- ducted to evaluate the performance of this algorithm by varying the communication range and the an- tenna beam width angle. Results show that NCBLSV algorithm has high probability of successful ma- licious nodes detection and low probability of false nodes detection. Thus, it is proved that the NCBLSV algorithm is useful and necessary in the wireless sensor networks security. 展开更多
关键词 wireless sensor networks WSNs) node localization SECURE position verifica-tion adaptive array antenna
在线阅读 下载PDF
Real-time localization estimator of mobile node in wireless sensor networks based on extended Kalman filter
10
作者 田金鹏 郑国莘 《Journal of Shanghai University(English Edition)》 CAS 2011年第2期128-131,共4页
Localization of the sensor nodes is a key supporting technology in wireless sensor networks (WSNs). In this paper, a real-time localization estimator of mobile node in WSNs based on extended Kalman filter (KF) is ... Localization of the sensor nodes is a key supporting technology in wireless sensor networks (WSNs). In this paper, a real-time localization estimator of mobile node in WSNs based on extended Kalman filter (KF) is proposed. Mobile node movement model is analyzed and online sequential iterative method is used to compute location result. The detailed steps of mobile sensor node self-localization adopting extended Kalman filter (EKF) is designed. The simulation results show that the accuracy of the localization estimator scheme designed is better than those of maximum likelihood estimation (MLE) and traditional KF algorithm. 展开更多
关键词 wireless sensor networks (WSNs) node location localization algorithm Kalman filter (KF)
在线阅读 下载PDF
RESEARCH ON KEY NODES OF WIRELESS SENSOR NETWORK BASED ON COMPLEX NETWORK THEORY
11
作者 Ma Chuang Liu Hongwei Zuo Decheng Wu Zhibo Yang Xiaozong 《Journal of Electronics(China)》 2011年第3期396-401,共6页
On the basis of complex network theory, the issues of key nodes in Wireless Sensor Networks (WSN) are discussed. A model expression of sub-network fault in WSN is given at first; subsequently, the concepts of average ... On the basis of complex network theory, the issues of key nodes in Wireless Sensor Networks (WSN) are discussed. A model expression of sub-network fault in WSN is given at first; subsequently, the concepts of average path length and clustering coefficient are introduced. Based on the two concepts, a novel attribute description of key nodes related to sub-networks is proposed. Moreover, in terms of node deployment density and transmission range, the concept of single-point key nodes and generalized key nodes of WSN are defined, and their decision theorems are investigated. 展开更多
关键词 wireless sensor network (WSN) Key nodes Fault model Complex network theory
在线阅读 下载PDF
Coordinated node scheduling for energy-conserving in large wireless sensor networks
12
作者 石高涛 廖明宏 徐文旭 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2008年第4期558-563,共6页
Aiming at developing a node scheduling protocol for sensor networks with fewer active nodes,we propose a coordinated node scheduling protocol based on the presentation of a solution and its optimization to determine w... Aiming at developing a node scheduling protocol for sensor networks with fewer active nodes,we propose a coordinated node scheduling protocol based on the presentation of a solution and its optimization to determine whether a node is redundant.The proposed protocol can reduce the number of working nodes by turning off as many redundant nodes as possible without degrading the coverage and connectivity.The simulation result shows that our protocol outperforms the peer with respect to the working node number and dynamic coverage percentage. 展开更多
关键词 CONNECTIVITY COVERAGE node scheduling energy efficiency wireless sensor networks
在线阅读 下载PDF
Wireless sensor networks routing algorithm based on block clustering and springboard nodes
13
作者 LIU Yuhong FU Fuxiang LI Cuiran 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2022年第2期209-216,共8页
In the wireless sensor networks(WSN),the sensor nodes have limited battery life and are deployed in hostile environments.It is very difficult to recharging or replacement of the batteries after deployment for the sens... In the wireless sensor networks(WSN),the sensor nodes have limited battery life and are deployed in hostile environments.It is very difficult to recharging or replacement of the batteries after deployment for the sensor nodes in inaccessible areas.Therefore,how to increase the network lifetime of the WSN is deserved to be studied.In this study,a WSN routing algorithm was proposed based on block clustering and springboard nodes to increase the network lifetime of the WSN.Firstly,by analyzing the influence of communication transmission distance on network energy consumption,block clustering was introduced to control node transmission distance in order to reduce total network energy consumption.In addition,a network transmission model was proposed based on springboard nodes and the advantages of network energy consumption of this model against multi-hop between clusters were analyzed.The simulation results show that,compared with the LEACH algorithm,EECPK-means algorithm and energy centroid clustering algorithm,the proposed routing algorithm effectively prolongs the network lifetime of WSN. 展开更多
关键词 wireless sensor networks(WSN) network lifetime springboard node block clustering
在线阅读 下载PDF
Survey on node deployment in wireless sensor networks
14
作者 王正杰 钱旭 +2 位作者 张计芬 赵媛 郭银景 《Journal of Measurement Science and Instrumentation》 CAS 2012年第1期80-84,共5页
Node deployment strategy plays an important role in wireless sensor networks(WSNs)application because it determines the coverage,connectivity and network lifetime of WSNs.This paper reports the current research on the... Node deployment strategy plays an important role in wireless sensor networks(WSNs)application because it determines the coverage,connectivity and network lifetime of WSNs.This paper reports the current research on the optimization means for achieving the desirable design goals in various applications.We categorize the placements strategies into are the static and the dynamic according to whether the node position change after the network is operational.The coverage,connectivity and energy consumption of WSNs are analysed and discussed in detail. 展开更多
关键词 node deployment wireless sensor networks COVERAGE energy consumption
在线阅读 下载PDF
A FUNCTION NODE-BASED MULTIPLE PAIRWISE KEYS MANAGEMENT PROTOCOL FOR WIRELESS SENSOR NETWORKS AND ENERGY CONSUMPTION ANALYSIS
15
作者 Bi Jiana Wang Hui Sun Yandong Liu Yanzhao Ji Zhenzhou 《Journal of Electronics(China)》 2009年第5期692-698,共7页
In this letter, a Function node-based Multiple Pairwise Keys Management (MPKMF) protocol for Wireless Sensor Networks (WSNs) is firstly designed, in which ordinary nodes and cluster head nodes are responsible for data... In this letter, a Function node-based Multiple Pairwise Keys Management (MPKMF) protocol for Wireless Sensor Networks (WSNs) is firstly designed, in which ordinary nodes and cluster head nodes are responsible for data collection and transmission, and function nodes are responsible for key management. There are more than one function nodes in the cluster consulting the key generation and other security decision-making. The function nodes are the second-class security center because of the characteristics of the distributed WSNs. Secondly, It is also described that the formation of function nodes and cluster heads under the control of the former, and five kinds of keys, i.e., individual key, pairwise keys, cluster key, management key, and group key. Finally, performance analysis and experiments show that, the protocol is superior in communication and energy consumption. The delay of establishing the cluster key meets the requirements, and a multiple pairwise key which adopts the coordinated security authentication scheme is provided. 展开更多
关键词 wireless sensor networks (WSNs) Function nodes Key management Energy consumption
在线阅读 下载PDF
Lossy nodes inference based on end-to-end passive monitoring in wireless sensor networks
16
作者 Yang Yu Xu Yongjun Li Xiaowei 《High Technology Letters》 EI CAS 2011年第4期388-394,共7页
This paper presents a passive monitoring mechanism, loss), nodes inference (LoNI), to identify loss), nodes in wireless sensor network using end-to-end application traffic. Given topology dynamics and bandwidth co... This paper presents a passive monitoring mechanism, loss), nodes inference (LoNI), to identify loss), nodes in wireless sensor network using end-to-end application traffic. Given topology dynamics and bandwidth constraints, a space-efficient packet marking scheme is first introduced. The scheme uses a Bloom filter as a compression tool so that path information can bc piggybacked by data packets. Based on the path information, LoNI then adopts a fast algorithm to detect lossy nodes. The algorithm formulates the inference problem as a weighted set-cover problem and solves it using a greedy approach with low complexity. Simulations show that LoNI can locate about 80% of lossy nodes when lossy nodes are rare in the network. Furthermore, LoNI performs better for the lossy nodes near the sink or with higher loss rates. 展开更多
关键词 wireless sensor networks(WSNs) performance monitoring lossy nodes Bloom filter weighted set-cover
在线阅读 下载PDF
A Coincered Node Based Localization of Jammers in Wireless Sensor Networks
17
作者 Balamurugan Perumal Sharmila Vadivel Mummoorthy Arulappan 《Circuits and Systems》 2016年第9期2613-2621,共9页
Jammers can awfully interfere with the wireless communications. The transmission and reception of wireless communication is blocked by the jammer. The intruder will place the jammer in a well topological network area ... Jammers can awfully interfere with the wireless communications. The transmission and reception of wireless communication is blocked by the jammer. The intruder will place the jammer in a well topological network area and they can easily track the information. It will help them to block the signal transmission and reception. Now, the intention is to track the position of the jammer where it is fixed. The existing methods rely on the indirect measurements and the boundary node to find the jammer’s position which degrades the accuracy of the localization. To improve the efficiency, this paper proposed an efficient method namely Coincered Node Based Localization of jammers to find the position of the jammer with high level of accuracy. The proposed system uses the direct measurements, which is the jammer signal strength. The effectiveness can also be increased by using the coincered node that will stumble across the true position of the jammer. The proposed work is compared with existing methods. Then the proposed mechanism proves better to find the jammer location. The simulation results estimate that the accuracy of the localization achieves better performance than the existing schemes. 展开更多
关键词 wireless sensor network Jamming Jammer Localization Jammer Signal Strength Coincered node
在线阅读 下载PDF
Genetic Algorithm Based Node Deployment in Hybrid Wireless Sensor Networks 被引量:3
18
作者 Omar Banimelhem Moad Mowafi Walid Aljoby 《Communications and Network》 2013年第4期273-279,共7页
In hybrid wireless sensor networks composed of both static and mobile sensor nodes, the random deployment of stationary nodes may cause coverage holes in the sensing field. Hence, mobile sensor nodes are added after t... In hybrid wireless sensor networks composed of both static and mobile sensor nodes, the random deployment of stationary nodes may cause coverage holes in the sensing field. Hence, mobile sensor nodes are added after the initial deployment to overcome the coverage holes problem. To achieve optimal coverage, an efficient algorithm should be employed to find the best positions of the additional mobile nodes. This paper presents a genetic algorithm that searches for an optimal or near optimal solution to the coverage holes problem. The proposed algorithm determines the minimum number and the best locations of the mobile nodes that need to be added after the initial deployment of the stationary nodes. The performance of the genetic algorithm was evaluated using several metrics, and the simulation results demonstrated that the proposed algorithm can optimize the network coverage in terms of the overall coverage ratio and the number of additional mobile nodes. 展开更多
关键词 TARGET COVERAGE node DEPLOYMENT GENETIC Algorithm wireless sensor networks
在线阅读 下载PDF
A Malicious and Malfunctioning Node Detection Scheme for Wireless Sensor Networks 被引量:3
19
作者 Seo Hyun Oh Chan O. Hong Yoon Hwa Choi 《Wireless Sensor Network》 2012年第3期84-90,共7页
Wireless sensor networks are often used to monitor physical and environmental conditions in various regions where human access is limited. Due to limited resources and deployment in hostile environment, they are vulne... Wireless sensor networks are often used to monitor physical and environmental conditions in various regions where human access is limited. Due to limited resources and deployment in hostile environment, they are vulnerable to faults and malicious attacks. The sensor nodes affected or compromised can send erroneous data or misleading reports to base station. Hence identifying malicious and faulty nodes in an accurate and timely manner is important to provide reliable functioning of the networks. In this paper, we present a malicious and malfunctioning node detection scheme using dual-weighted trust evaluation in a hierarchical sensor network. Malicious nodes are effectively detected in the presence of natural faults and noise without sacrificing fault-free nodes. Simulation results show that the proposed scheme outperforms some existing schemes in terms of mis-detection rate and event detection accuracy, while maintaining comparable performance in malicious node detection rate and false alarm rate. 展开更多
关键词 wireless sensor networks FAULT DETECTION MALICIOUS node DETECTION
暂未订购
Neighbor-Based Malicious Node Detection in Wireless Sensor Networks 被引量:2
20
作者 Sung-Jib Yim Yoon-Hwa Choi 《Wireless Sensor Network》 2012年第9期219-225,共7页
The primary function of wireless sensor networks is to gather sensor data from the monitored area. Due to faults or malicious nodes, however, the sensor data collected or reported might be wrong. Hence it is important... The primary function of wireless sensor networks is to gather sensor data from the monitored area. Due to faults or malicious nodes, however, the sensor data collected or reported might be wrong. Hence it is important to detect events in the presence of wrong sensor readings and misleading reports. In this paper, we present a neighbor-based malicious node detection scheme for wireless sensor networks. Malicious nodes are modeled as faulty nodes behaving intelligently to lead to an incorrect decision or energy depletion without being easily detected. Each sensor node makes a decision on the fault status of itself and its neighboring nodes based on the sensor readings. Most erroneous readings due to transient faults are corrected by filtering, while nodes with permanent faults are removed using confidence-level evaluation, to improve malicious node detection rate and event detection accuracy. Each node maintains confidence levels of itself and its neighbors, indicating the track records in reporting past events correctly. Computer simulation shows that most of the malicious nodes reporting against their own readings are correctly detected unless they behave similar to the normal nodes. As a result, high event detection accuracy is also maintained while achieving low false alarm rate. 展开更多
关键词 wireless sensor networks MALICIOUS nodeS Faults Neighbor-Based Detection
暂未订购
上一页 1 2 145 下一页 到第
使用帮助 返回顶部