首页 > 最新文献

Wirel. Sens. Netw.最新文献

英文 中文
Passive Loss Inference in Wireless Sensor Networks Using EM Algorithm 基于EM算法的无线传感器网络无源损耗推断
Pub Date : 2010-07-08 DOI: 10.4236/wsn.201027063
Yu Yang, Zhulin An, Yongjun Xu, Xiaowei Li, Canfeng Chen
Wireless Sensor Networks (WSNs) are mainly deployed for data acquisition, thus, the network performance can be passively measured by exploiting whether application data from various sensor nodes reach the sink. In this paper, therefore, we take into account the unique data aggregation communication paradigm of WSNs and model the problem of link loss rates inference as a Maximum-Likelihood Estimation problem. And we propose an inference algorithm based on the standard Expectation-Maximization (EM) techniques. Our algorithm is applicable not only to periodic data collection scenarios but to event detection scenarios. Finally, we validate the algorithm through simulations and it exhibits good performance and scalability.
无线传感器网络(WSNs)主要用于数据采集,因此可以通过利用来自各个传感器节点的应用数据是否到达接收器来被动地衡量网络性能。因此,在本文中,我们考虑到无线传感器网络独特的数据聚合通信模式,并将链路损失率推理问题建模为最大似然估计问题。提出了一种基于标准期望最大化(EM)技术的推理算法。该算法不仅适用于周期性数据采集场景,也适用于事件检测场景。最后,通过仿真对算法进行了验证,结果表明该算法具有良好的性能和可扩展性。
{"title":"Passive Loss Inference in Wireless Sensor Networks Using EM Algorithm","authors":"Yu Yang, Zhulin An, Yongjun Xu, Xiaowei Li, Canfeng Chen","doi":"10.4236/wsn.201027063","DOIUrl":"https://doi.org/10.4236/wsn.201027063","url":null,"abstract":"Wireless Sensor Networks (WSNs) are mainly deployed for data acquisition, thus, the network performance can be passively measured by exploiting whether application data from various sensor nodes reach the sink. In this paper, therefore, we take into account the unique data aggregation communication paradigm of WSNs and model the problem of link loss rates inference as a Maximum-Likelihood Estimation problem. And we propose an inference algorithm based on the standard Expectation-Maximization (EM) techniques. Our algorithm is applicable not only to periodic data collection scenarios but to event detection scenarios. Finally, we validate the algorithm through simulations and it exhibits good performance and scalability.","PeriodicalId":251051,"journal":{"name":"Wirel. Sens. Netw.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117327838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Contention-Based Beaconless Real-Time Routing Protocol for Wireless Sensor Networks 基于争用的无线传感器网络无信标实时路由协议
Pub Date : 2010-07-08 DOI: 10.4236/wsn.201027065
Chao-Ying Huang, Guoli Wang
This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for wireless sensor networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at each hop through integrating the contention and neighbor table mechanisms. More precisely, CBRR maintains a neighbor table via the contention mechanism being dependent on wireless broadcast instead of beacons. Comprehensive simulations show that CBRR can not only achieve higher performance in static networks, but also work well for dynamic networks.
针对无线传感器网络,提出了一种新的低能耗实时路由协议CBRR。通过集成争用和邻居表机制,满足端到端的实时需求,并对每一跳的速度或延迟进行约束。更准确地说,CBRR通过依赖无线广播而不是信标的争用机制来维护邻居表。综合仿真结果表明,CBRR算法不仅在静态网络中具有较高的性能,而且在动态网络中也能很好地工作。
{"title":"Contention-Based Beaconless Real-Time Routing Protocol for Wireless Sensor Networks","authors":"Chao-Ying Huang, Guoli Wang","doi":"10.4236/wsn.201027065","DOIUrl":"https://doi.org/10.4236/wsn.201027065","url":null,"abstract":"This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for wireless sensor networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at each hop through integrating the contention and neighbor table mechanisms. More precisely, CBRR maintains a neighbor table via the contention mechanism being dependent on wireless broadcast instead of beacons. Comprehensive simulations show that CBRR can not only achieve higher performance in static networks, but also work well for dynamic networks.","PeriodicalId":251051,"journal":{"name":"Wirel. Sens. Netw.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130931638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Modelling and Analysis of TCP Performance in Wireless Multihop Networks 无线多跳网络中TCP性能建模与分析
Pub Date : 2010-07-08 DOI: 10.4236/wsn.201027061
Hannan Xiao, Ying Zhang, J. Malcolm, B. Christianson, K. Chua
Researchers have used extensive simulation and experimental studies to understand TCP performance in wireless multihop networks. In contrast, the objective of this paper is to theoretically analyze TCP performance in this environment. By examining the case of running one TCP session over a string topology, a system model for analyzing TCP performance in multihop wireless networks is proposed, which considers packet buffering, contention of nodes for access to the wireless channel, and spatial reuse of the wireless channel. Markov chain modelling is applied to analyze this system model. Analytical results show that when the number of hops that the TCP session crosses is ?xed, the TCP throughput is independent of the TCP congestion window size. When the number of hops increases from one, the TCP throughput decreases ?rst, and then stabilizes when the number of hops becomes large. The analysis is validated by comparing the numerical and simulation results.
研究人员已经使用了大量的模拟和实验研究来了解TCP在无线多跳网络中的性能。相比之下,本文的目的是从理论上分析TCP在这种环境下的性能。通过研究在字符串拓扑上运行一个TCP会话的情况,提出了一个用于分析多跳无线网络中TCP性能的系统模型,该模型考虑了数据包缓冲、访问无线信道的节点争用以及无线信道的空间重用。采用马尔可夫链模型对系统模型进行了分析。分析结果表明,当TCP会话跨越的跳数被限制时,TCP吞吐量与TCP拥塞窗口大小无关。当跳数从1开始增加时,TCP吞吐量首先下降,跳数增加后趋于稳定。通过数值与仿真结果的对比,验证了分析的正确性。
{"title":"Modelling and Analysis of TCP Performance in Wireless Multihop Networks","authors":"Hannan Xiao, Ying Zhang, J. Malcolm, B. Christianson, K. Chua","doi":"10.4236/wsn.201027061","DOIUrl":"https://doi.org/10.4236/wsn.201027061","url":null,"abstract":"Researchers have used extensive simulation and experimental studies to understand TCP performance in wireless multihop networks. In contrast, the objective of this paper is to theoretically analyze TCP performance in this environment. By examining the case of running one TCP session over a string topology, a system model for analyzing TCP performance in multihop wireless networks is proposed, which considers packet buffering, contention of nodes for access to the wireless channel, and spatial reuse of the wireless channel. Markov chain modelling is applied to analyze this system model. Analytical results show that when the number of hops that the TCP session crosses is ?xed, the TCP throughput is independent of the TCP congestion window size. When the number of hops increases from one, the TCP throughput decreases ?rst, and then stabilizes when the number of hops becomes large. The analysis is validated by comparing the numerical and simulation results.","PeriodicalId":251051,"journal":{"name":"Wirel. Sens. Netw.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129661251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Classification and Review of Security Schemes in Mobile Computing 移动计算安全方案的分类与综述
Pub Date : 2010-06-24 DOI: 10.4236/wsn.2010.26054
Sathish A. P. Kumar
In this paper, we present the classification and review of security schemes in mobile computing system. We classify these schemes based on types the infrastructure used in the mobile computing system-Mobile Ad Hoc Networks (MANET) and Mobile Agent model. Mobile Ad Hoc Networks are pervasive, ubiquitous and without any centralized authority. These unique characteristics, combined with ever-increasing security threats, demand solutions in securing ad hoc networks prior to their deployment in commercial and military applications. This paper reviews the prevailing mobile ad hoc network security threats, the existing solution schemes, their limitations and open research issues. We also explain the Intrusion detection and response technique as an alternate method to protect the MANET based mobile computing systems and their approaches. A literature review of important existing Intrusion Detection approaches and Intrusion Response Approaches for MANET is also presented. This paper also presents the limitations of existing Intrusion Detection and Response Approaches for MANET and open research issues in providing MANET security. With respect to Mobile Agent based mobile computing system, we have presented the classification of various types of security attacks in Mobile Agent based model and presented the security solutions for those type of attacks proposed by the various schemes and the open research issues in providing security for Mobile Agent based mobile computing system. Such classification enhances the understanding of the proposed security schemes in the mobile computing system, assists in the development and enhancement of schemes in the future and helps in choosing an appropriate scheme while implementing a mobile computing system.
本文对移动计算系统中的安全方案进行了分类和综述。我们根据移动计算系统——移动自组织网络(MANET)和移动代理模型中使用的基础设施类型对这些方案进行了分类。移动自组织网络无处不在,没有任何集中的权威。这些独特的特性,再加上不断增加的安全威胁,需要在部署到商业和军事应用之前,解决方案来保护自组织网络。本文综述了当前移动自组织网络的安全威胁、现有的解决方案、它们的局限性和有待研究的问题。我们还解释了入侵检测和响应技术作为保护基于MANET的移动计算系统及其方法的替代方法。对现有的入侵检测方法和入侵响应方法进行了综述。本文还介绍了现有的MANET入侵检测和响应方法的局限性,以及在提供MANET安全性方面的开放性研究问题。针对基于Mobile Agent的移动计算系统,给出了基于Mobile Agent模型的各种类型的安全攻击的分类,并给出了各种方案针对这些类型的攻击提出的安全解决方案,以及为基于Mobile Agent的移动计算系统提供安全方面的开放性研究问题。这样的分类有助加深对流动计算系统内建议的保安方案的了解,有助日后发展和加强保安方案,并有助在实施流动计算系统时选择适当的方案。
{"title":"Classification and Review of Security Schemes in Mobile Computing","authors":"Sathish A. P. Kumar","doi":"10.4236/wsn.2010.26054","DOIUrl":"https://doi.org/10.4236/wsn.2010.26054","url":null,"abstract":"In this paper, we present the classification and review of security schemes in mobile computing system. We classify these schemes based on types the infrastructure used in the mobile computing system-Mobile Ad Hoc Networks (MANET) and Mobile Agent model. Mobile Ad Hoc Networks are pervasive, ubiquitous and without any centralized authority. These unique characteristics, combined with ever-increasing security threats, demand solutions in securing ad hoc networks prior to their deployment in commercial and military applications. This paper reviews the prevailing mobile ad hoc network security threats, the existing solution schemes, their limitations and open research issues. We also explain the Intrusion detection and response technique as an alternate method to protect the MANET based mobile computing systems and their approaches. A literature review of important existing Intrusion Detection approaches and Intrusion Response Approaches for MANET is also presented. This paper also presents the limitations of existing Intrusion Detection and Response Approaches for MANET and open research issues in providing MANET security. With respect to Mobile Agent based mobile computing system, we have presented the classification of various types of security attacks in Mobile Agent based model and presented the security solutions for those type of attacks proposed by the various schemes and the open research issues in providing security for Mobile Agent based mobile computing system. Such classification enhances the understanding of the proposed security schemes in the mobile computing system, assists in the development and enhancement of schemes in the future and helps in choosing an appropriate scheme while implementing a mobile computing system.","PeriodicalId":251051,"journal":{"name":"Wirel. Sens. Netw.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115990559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Energy Conservation Challenges in Wireless Sensor Networks: A Comprehensive Study 无线传感器网络中的节能挑战:综合研究
Pub Date : 2010-06-24 DOI: 10.4236/wsn.2010.26060
S. Tarannum
A Wireless Sensor Network (WSN) consists of a large number of randomly deployed sensor nodes. These sensor nodes organize themselves into a cooperative network and perform the three basic functions of sensing, computations and communications. Research in WSNs has become an extensive explorative area during the last few years, especially due to the challenges offered, energy constraints of the sensors being one of them. In this paper, a thorough comprehensive study of the energy conservation challenges in wireless sensor networks is carried out. The need for effective utilization of limited power resources is also emphasized, which becomes pre-eminent to the Wireless Sensor Networks.
无线传感器网络(WSN)由大量随机部署的传感器节点组成。这些传感器节点组织成一个协作网络,并执行传感、计算和通信三个基本功能。近年来,无线传感器网络的研究已成为一个广泛的探索领域,特别是由于传感器的能量限制等挑战。本文对无线传感器网络中的节能挑战进行了全面深入的研究。有效利用有限的电力资源的必要性也被强调,这成为无线传感器网络的首要任务。
{"title":"Energy Conservation Challenges in Wireless Sensor Networks: A Comprehensive Study","authors":"S. Tarannum","doi":"10.4236/wsn.2010.26060","DOIUrl":"https://doi.org/10.4236/wsn.2010.26060","url":null,"abstract":"A Wireless Sensor Network (WSN) consists of a large number of randomly deployed sensor nodes. These sensor nodes organize themselves into a cooperative network and perform the three basic functions of sensing, computations and communications. Research in WSNs has become an extensive explorative area during the last few years, especially due to the challenges offered, energy constraints of the sensors being one of them. In this paper, a thorough comprehensive study of the energy conservation challenges in wireless sensor networks is carried out. The need for effective utilization of limited power resources is also emphasized, which becomes pre-eminent to the Wireless Sensor Networks.","PeriodicalId":251051,"journal":{"name":"Wirel. Sens. Netw.","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128726234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Reconstruction of Wireless UWB Pulses by Exponential Sampling Filter 用指数采样滤波器重构无线UWB脉冲
Pub Date : 2010-06-24 DOI: 10.4236/wsn.2010.26057
J. Olkkonen, H. Olkkonen
Measurement and reconstruction of wireless pulses is an important scheme in wireless ultra wide band (UWB) technology. In contrary to the band-limited analog signals, which can be recovered from evenly spaced samples, the reconstruction of the UWB pulses is a more demanding task. In this work we describe an exponential sampling filter (ESF) for measurement and reconstruction of UWB pulses. The ESF is constructed from parallel filters, which has exponentially descending impulse response. A pole cancellation filter was used to extract the amplitudes and time locations of the UWB pulses from sequentially measured samples of the ESF output. We show that the amplitudes and time locations of p sequential UWB pulses can be recovered from the measurement of at least 2p samples from the ESF output. For perfect reconstruction the number of parallel filters in ESP should be 2p. We study the robustness of the method against noise and discuss the applications of the method.
无线脉冲的测量与重构是无线超宽带(UWB)技术中的一个重要方案。与可以从均匀间隔的样本中恢复的带限模拟信号相反,UWB脉冲的重建是一项要求更高的任务。在这项工作中,我们描述了一个指数采样滤波器(ESF)用于测量和重建UWB脉冲。ESF由并联滤波器构成,其脉冲响应呈指数递减。采用极点抵消滤波器从连续测量的ESF输出样本中提取超宽带脉冲的幅度和时间位置。我们证明了p个连续UWB脉冲的幅度和时间位置可以从ESF输出的至少2p个样本的测量中恢复出来。为了实现完美的重构,ESP中平行滤波器的个数应该是2p。研究了该方法对噪声的鲁棒性,并讨论了该方法的应用。
{"title":"Reconstruction of Wireless UWB Pulses by Exponential Sampling Filter","authors":"J. Olkkonen, H. Olkkonen","doi":"10.4236/wsn.2010.26057","DOIUrl":"https://doi.org/10.4236/wsn.2010.26057","url":null,"abstract":"Measurement and reconstruction of wireless pulses is an important scheme in wireless ultra wide band (UWB) technology. In contrary to the band-limited analog signals, which can be recovered from evenly spaced samples, the reconstruction of the UWB pulses is a more demanding task. In this work we describe an exponential sampling filter (ESF) for measurement and reconstruction of UWB pulses. The ESF is constructed from parallel filters, which has exponentially descending impulse response. A pole cancellation filter was used to extract the amplitudes and time locations of the UWB pulses from sequentially measured samples of the ESF output. We show that the amplitudes and time locations of p sequential UWB pulses can be recovered from the measurement of at least 2p samples from the ESF output. For perfect reconstruction the number of parallel filters in ESP should be 2p. We study the robustness of the method against noise and discuss the applications of the method.","PeriodicalId":251051,"journal":{"name":"Wirel. Sens. Netw.","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134200278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Interference Management for DS-CDMA Systems through Closed-Loop Power Control, Base Station Assignment, and Beamforming 基于闭环功率控制、基站分配和波束形成的DS-CDMA系统干扰管理
Pub Date : 2010-06-24 DOI: 10.4236/wsn.2010.26059
M. D. Moghadam, H. Bakhshi, G. Dadashzadeh
In this paper, we propose a smart step closed-loop power control (SSPC) algorithm and a base station assignment method based on minimizing the transmitter power (BSA-MTP) technique in a direct sequence-code division multiple access (DS-CDMA) receiver with frequency-selective Rayleigh fading. This receiver consists of three stages. In the first stage, with constrained least mean squared (CLMS) algorithm, the desired users’ signal in an arbitrary path is passed and the inter-path interference (IPI) is reduced in other paths in each RAKE finger. Also in this stage, the multiple access interference (MAI) from other users is reduced. Thus, the matched filter (MF) can use for more reduction of the IPI and MAI in each RAKE finger in the second stage. Also in the third stage, the output signals from the matched filters are combined according to the conventional maximal ratio combining (MRC) principle and then are fed into the decision circuit of the desired user. The simulation results indicate that the SSPC algorithm and the BSA-MTP technique can significantly reduce the network bit error rate (BER) compared to the other methods. Also, we observe that significant savings in total transmit power (TTP) are possible with our methods.
在频率选择性瑞利衰落的直接顺序码分多址(DS-CDMA)接收机中,提出了一种智能阶跃闭环功率控制(SSPC)算法和一种基于最小发射机功率(BSA-MTP)技术的基站分配方法。这个接收器由三个阶段组成。在第一阶段,利用约束最小均方(CLMS)算法,在每个RAKE指中传递任意路径上的期望用户信号,并减少其他路径上的路径间干扰(IPI)。在此阶段,还可以减少来自其他用户的多址干扰。因此,匹配滤波器(MF)可以在第二阶段用于每个耙指的IPI和MAI的更多减少。在第三阶段,根据传统的最大比组合(MRC)原理将匹配滤波器的输出信号组合,然后送入目标用户的决策电路。仿真结果表明,与其他方法相比,SSPC算法和BSA-MTP技术可以显著降低网络误码率。此外,我们还观察到,使用我们的方法可以显著节省总发射功率(TTP)。
{"title":"Interference Management for DS-CDMA Systems through Closed-Loop Power Control, Base Station Assignment, and Beamforming","authors":"M. D. Moghadam, H. Bakhshi, G. Dadashzadeh","doi":"10.4236/wsn.2010.26059","DOIUrl":"https://doi.org/10.4236/wsn.2010.26059","url":null,"abstract":"In this paper, we propose a smart step closed-loop power control (SSPC) algorithm and a base station assignment method based on minimizing the transmitter power (BSA-MTP) technique in a direct sequence-code division multiple access (DS-CDMA) receiver with frequency-selective Rayleigh fading. This receiver consists of three stages. In the first stage, with constrained least mean squared (CLMS) algorithm, the desired users’ signal in an arbitrary path is passed and the inter-path interference (IPI) is reduced in other paths in each RAKE finger. Also in this stage, the multiple access interference (MAI) from other users is reduced. Thus, the matched filter (MF) can use for more reduction of the IPI and MAI in each RAKE finger in the second stage. Also in the third stage, the output signals from the matched filters are combined according to the conventional maximal ratio combining (MRC) principle and then are fed into the decision circuit of the desired user. The simulation results indicate that the SSPC algorithm and the BSA-MTP technique can significantly reduce the network bit error rate (BER) compared to the other methods. Also, we observe that significant savings in total transmit power (TTP) are possible with our methods.","PeriodicalId":251051,"journal":{"name":"Wirel. Sens. Netw.","volume":"297 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122156257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Research on Beta Trust Model of Wireless Sensor Networks Based on Energy Load Balancing 基于能量负载均衡的无线传感器网络Beta信任模型研究
Pub Date : 2010-05-27 DOI: 10.4236/wsn.2010.24049
Danwei Chen, X. Yu, Xianghui Dong
This paper proposed beta trust model based on energy load balancing combines the recent achievements of the trust models in distributed networks, together with the characteristics of wireless sensor networks. The inter-node trust relation is established after an overall evaluation of node trust value based on the monitor results of the node packets forwarding behavior conducted by inter-node collaboration. Due to the node energy limitation in wireless sensor networks, energy load balancing mechanism is applied to prolong the node survival time. And the redundant routing protocol involves the presented trust model to develop the novel trust routing protocol of beta trust model based on energy load balancing. Simulation performance demonstrates that the beta trust model based on energy load balancing outperforms current schemes in energy consumption.
本文结合分布式网络信任模型的最新研究成果,结合无线传感器网络的特点,提出了基于能量负载均衡的beta信任模型。节点间信任关系是基于节点间协作对节点报文转发行为的监控结果,对节点信任值进行总体评估后建立的。由于无线传感器网络中节点能量有限,采用能量负载均衡机制延长节点生存时间。在冗余路由协议中引入了所提出的信任模型,开发了基于能量负载均衡的beta信任模型的新型信任路由协议。仿真结果表明,基于能量负载均衡的beta信任模型在能量消耗方面优于现有方案。
{"title":"Research on Beta Trust Model of Wireless Sensor Networks Based on Energy Load Balancing","authors":"Danwei Chen, X. Yu, Xianghui Dong","doi":"10.4236/wsn.2010.24049","DOIUrl":"https://doi.org/10.4236/wsn.2010.24049","url":null,"abstract":"This paper proposed beta trust model based on energy load balancing combines the recent achievements of the trust models in distributed networks, together with the characteristics of wireless sensor networks. The inter-node trust relation is established after an overall evaluation of node trust value based on the monitor results of the node packets forwarding behavior conducted by inter-node collaboration. Due to the node energy limitation in wireless sensor networks, energy load balancing mechanism is applied to prolong the node survival time. And the redundant routing protocol involves the presented trust model to develop the novel trust routing protocol of beta trust model based on energy load balancing. Simulation performance demonstrates that the beta trust model based on energy load balancing outperforms current schemes in energy consumption.","PeriodicalId":251051,"journal":{"name":"Wirel. Sens. Netw.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130678638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A New Method to Improve Performance of Cooperative Underwater Acoustic Wireless Sensor Networks via Frequency Controlled Transmission Based on Length of Data Links 基于数据链路长度的频率控制传输提高协同水声无线传感器网络性能的新方法
Pub Date : 2010-05-27 DOI: 10.4236/wsn.2010.24050
V. Vakili, M. Jannati
In this paper a new method to improve performance of cooperative underwater acoustic (UWA) sensor networks will be introduced. The method is based on controlling and optimizing carrier frequencies which are used in data links between network nods. In UWA channels Pathloss and noise power spectrum density (psd) are related to carrier frequency. Therefore, unlike radio communications, in UWA Communications signal to noise ratio (SNR) is related to frequency besides propagation link length. In such channels an optimum frequency in whole frequency band and link lengths cannot be found. In Cooperative transmission, transmitter sends one copy of transmitted data packets to relay node. Then relay depending on cooperation scheme, amplifies or decodes each data packet and retransmit it to destination. Receiver uses and combines both received signals to estimate transmitted data. This paper wants to propose a new method to decrease network power consumptions by controlling and sub-optimizing transmission frequency based on link length. For this purpose, underwater channel parameters is simulated and analyzed in 1km to 10km lengths (midrange channel). Then link lengths sub categorized and in each category, optimum frequency is computed. With these sub optimum frequencies, sensors and base station can adaptively control their carrier frequencies based on link length and decrease network’s power consumptions. Finally Different Cooperative transmission schemes “Decode and Forward (DF)” and “Amplify and Forward (AF)”, are simulated in UWA wireless Sensor network with and without the new method. In receiver maximum ratio combiner (MRC) is used to combining received signals and making data estimations. Simulations show that the new method, called AFC cooperative UWA communication, can improve performance of underwater acoustic wireless sensor networks up to 40.14%.
本文介绍了一种提高协同水声传感器网络性能的新方法。该方法基于对网络节点间数据链路载波频率的控制和优化。在UWA信道中,路径损耗和噪声功率谱密度(psd)与载波频率有关。因此,与无线电通信不同,UWA通信的信噪比除了与传播链路长度有关外,还与频率有关。在这种信道中,无法找到整个频带的最佳频率和链路长度。在协同传输中,发送器将传输的数据包的一份副本发送给中继节点。然后中继根据协作方案,对每个数据包进行放大或解码,重传至目的地。接收机使用并结合接收到的两个信号来估计传输的数据。本文提出了一种基于链路长度控制和次优化传输频率以降低网络功耗的新方法。为此,对水下1km ~ 10km长度(中程航道)的航道参数进行了模拟和分析。然后对链路长度进行分类,并在每个分类中计算最优频率。利用这些次优频率,传感器和基站可以根据链路长度自适应控制载波频率,降低网络功耗。最后,在UWA无线传感器网络中对不同的协同传输方案“解码转发(DF)”和“放大转发(AF)”进行了仿真。在接收机中,采用最大比值组合器(MRC)对接收到的信号进行组合并进行数据估计。仿真结果表明,该方法可使水声无线传感器网络性能提高40.14%。
{"title":"A New Method to Improve Performance of Cooperative Underwater Acoustic Wireless Sensor Networks via Frequency Controlled Transmission Based on Length of Data Links","authors":"V. Vakili, M. Jannati","doi":"10.4236/wsn.2010.24050","DOIUrl":"https://doi.org/10.4236/wsn.2010.24050","url":null,"abstract":"In this paper a new method to improve performance of cooperative underwater acoustic (UWA) sensor networks will be introduced. The method is based on controlling and optimizing carrier frequencies which are used in data links between network nods. In UWA channels Pathloss and noise power spectrum density (psd) are related to carrier frequency. Therefore, unlike radio communications, in UWA Communications signal to noise ratio (SNR) is related to frequency besides propagation link length. In such channels an optimum frequency in whole frequency band and link lengths cannot be found. In Cooperative transmission, transmitter sends one copy of transmitted data packets to relay node. Then relay depending on cooperation scheme, amplifies or decodes each data packet and retransmit it to destination. Receiver uses and combines both received signals to estimate transmitted data. This paper wants to propose a new method to decrease network power consumptions by controlling and sub-optimizing transmission frequency based on link length. For this purpose, underwater channel parameters is simulated and analyzed in 1km to 10km lengths (midrange channel). Then link lengths sub categorized and in each category, optimum frequency is computed. With these sub optimum frequencies, sensors and base station can adaptively control their carrier frequencies based on link length and decrease network’s power consumptions. Finally Different Cooperative transmission schemes “Decode and Forward (DF)” and “Amplify and Forward (AF)”, are simulated in UWA wireless Sensor network with and without the new method. In receiver maximum ratio combiner (MRC) is used to combining received signals and making data estimations. Simulations show that the new method, called AFC cooperative UWA communication, can improve performance of underwater acoustic wireless sensor networks up to 40.14%.","PeriodicalId":251051,"journal":{"name":"Wirel. Sens. Netw.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123636078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Robust Techniques for Accurate Indoor Localization in Hazardous Environments 危险环境下室内精确定位的鲁棒技术
Pub Date : 2010-05-27 DOI: 10.4236/wsn.2010.24051
G. Godaliyadda, H. K. Garg
The challenging conditions prevalent in indoor environments have rendered many traditional positioning methods inept to yield satisfactory results. Our work tackles the challenging problem of accurate indoor positioning in hazardous multipath environments through three versatile super resolution techniques: time domain Multiple Signal Classification (TD-MUSIC), frequency domain MUSIC (FD-MUSIC) algorithms, and frequency domain Eigen value (FD-EV) method. The advantage of using these super resolution techniques is twofold. First for Line-of-Sight (LoS) conditions this provides the most accurate means of determining the time delay estimate from transmitter to receiver for any wireless sensor network. The high noise immunity and resolvability of these methods makes them ideal for cost-effective wireless sensor networks operating in indoor channels. Second for non-LoS conditions the resultant pseudo-spectrum generated by these methods provides the means to construct the ideal location based fingerprint. We provide an in depth analysis of limitation as well as advantages inherent in all of these methods through a detailed behavioral analysis under constrained environments. Hence, the bandwidth versatility, higher resolution capability and higher noise immunity of the TD-MUSIC algorithm and the FD-EV method’s ability to resurface submerged signal peaks when the signal subspace dimensions are underestimated are all presented in detail.
室内环境中普遍存在的具有挑战性的条件使得许多传统的定位方法无法产生令人满意的结果。我们的工作通过三种通用的超分辨率技术:时域多信号分类(TD-MUSIC)、频域MUSIC (FD-MUSIC)算法和频域特征值(FD-EV)方法,解决了在危险多路径环境中精确室内定位的挑战性问题。使用这些超分辨率技术的优势是双重的。首先,对于视距(LoS)条件,这提供了最准确的方法来确定任何无线传感器网络从发射器到接收器的时间延迟估计。这些方法的高抗噪性和高分辨率使它们成为在室内信道中运行的具有成本效益的无线传感器网络的理想选择。其次,在非los条件下,这些方法生成的伪谱为构建理想的基于位置的指纹提供了手段。我们通过在约束环境下详细的行为分析,对所有这些方法的局限性和固有优势进行了深入的分析。因此,详细介绍了TD-MUSIC算法的带宽通用性、更高的分辨率和更高的抗噪声能力,以及FD-EV方法在信号子空间维度被低估时对淹没信号峰值的再现能力。
{"title":"Robust Techniques for Accurate Indoor Localization in Hazardous Environments","authors":"G. Godaliyadda, H. K. Garg","doi":"10.4236/wsn.2010.24051","DOIUrl":"https://doi.org/10.4236/wsn.2010.24051","url":null,"abstract":"The challenging conditions prevalent in indoor environments have rendered many traditional positioning methods inept to yield satisfactory results. Our work tackles the challenging problem of accurate indoor positioning in hazardous multipath environments through three versatile super resolution techniques: time domain Multiple Signal Classification (TD-MUSIC), frequency domain MUSIC (FD-MUSIC) algorithms, and frequency domain Eigen value (FD-EV) method. The advantage of using these super resolution techniques is twofold. First for Line-of-Sight (LoS) conditions this provides the most accurate means of determining the time delay estimate from transmitter to receiver for any wireless sensor network. The high noise immunity and resolvability of these methods makes them ideal for cost-effective wireless sensor networks operating in indoor channels. Second for non-LoS conditions the resultant pseudo-spectrum generated by these methods provides the means to construct the ideal location based fingerprint. We provide an in depth analysis of limitation as well as advantages inherent in all of these methods through a detailed behavioral analysis under constrained environments. Hence, the bandwidth versatility, higher resolution capability and higher noise immunity of the TD-MUSIC algorithm and the FD-EV method’s ability to resurface submerged signal peaks when the signal subspace dimensions are underestimated are all presented in detail.","PeriodicalId":251051,"journal":{"name":"Wirel. Sens. Netw.","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123554579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Wirel. Sens. Netw.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1