一种可靠优化的WSN立体化覆盖算法A Reliable and Optimized WSN Three-dimensioned Coverage Algorithm
赵明英
摘要(Abstract):
为了有效解决无线传感器网络中各个节点安全性低、能耗高、覆盖率低等多种问题.以网格计算、虚拟力及节点信任度为理论基础,通过增加引力源机制,设计出一种基于联合信任度的立体化覆盖算法(JTCov-3D).首先,该算法将无线传感器网络中待监测区域进行网格化分割,且将引力源部署于各个网格中心;其次,依据网格中活动频繁节点,引力源可计算出网格的联合信任度,从而进行节点调度并使其完成;最后,网格节点依据外在受力大小与方向进行二次改进部署.通过理论分析与实验表明,JTCov-3D算法相比于同类型的其他算法,在综合性能上更具优势.
关键词(KeyWords): 无线传感器网络;虚拟力;引力源;联合信任度;立体化覆盖算法
基金项目(Foundation):
作者(Author): 赵明英
DOI: 10.16393/j.cnki.37-1436/z.2018.02.003
参考文献(References):
- [1]ZHANG Ting,HE Jingsha,LI Xiaohui,et al.A signcryption-based secure localization scheme in wireless sensor networks[J].Physics Procedia,2012,33:58-264.
- [2]Kui X Y,Du H K,Ling J B.An energy-balanced connected dominating sets for data gathering in wireless sensor networks[J].Acta Electronica Sinica,2013,41(8):1521-1528.
- [3]SUN Ze-yu,WU Wei-guo,WANG Qi-zhi.Technology of wireless sensor networks based on parameter adjustable enhanced coverage control algorithm[J].Journal of Electronics,2015,43(3):466-474.
- [4]Tan Haisheng,Hao Xiaohong,Wang Yuexuan.An approxim approach for area coverage in wireless sensor networks[J].Proceda Computer Science,2013:240-247.
- [5]LUO Hanjiang,WU Kaishun,GUO Zhongwen,et al.Ship detection with wireless sensor networks[J].IEEE Transactions on Parallel and Distributed Systems,2012,23(7):1336-1343.
- [6]DONG Shu-hao,LI Xiao-long.Study on Reliable Covering Algorithm Based on Grid Trust in Wireless Sensor Networks[J].Application Research of Computers,2014,31(1):253-257.
- [7]Yourim Y,Yong H K.An efficient genetic algorithm for maximum coverage deployment in wireless sensor network[J].IEEE Transactions on Cybernetics,2013,45(5):1473-1483.
- [8]LIU Tao,XIAO Yan,HUANG Wen-chao.A WSN node trust degree calculation model based on Bayesian estimation[J].Computer Science,2013,40(10):61-64.
- [9]Chen H,Qian D P,Wu W G,et al.Neighbors quantification based energy balance routing in wireless sensor network[J].Journal of Xi’an Jiaotong University,2012,46(4):1-6,23.
- [10]Hossain A,Chakrabarti S,Biswas P K.Impact of sensing model on wireless sensor network coverage[J].IET Wireless Sensor Systems,2012,2(3):272-281.
- [11]Zhang G H,Poon C C,Zhang Y T.Analysis of using Interpulse intervals to generate 128-Bit biometric random binary sequences for securing wireless body sensor networks[J].IEEE Transactions on Information Technology in Biomedicine,2012,16(1):176-182.
- [12]CAI Shao-bin,HAN Qi-long,GAO Zhen-guo.Study on Malicious Node Recognition Technology in Wireless Sensor Networks Based on Cloud Model[J].Journal of Electronics,2012,40(11):2232-2238.
- [13]Liu Y L,Pu J H,Fang W W,et al.A MAC layer optimization algorithm in wireless sensor networks[J].Chinese Journal of Computers,2012,35(3):529-539.
- [14]Jiang Bingfang,Han Guangjie,Wang Feng.An efficient distributed trust model for wireless sensor networks[J].IEEE Trans on Parallel and Distributed Systems,2014.
- [15]Li Xiang.A study of deployment based on virtual forces in tree-dimensional[J].Science Technology and Engineering,2013,13(9):2412-2425.