Mehdi Nazari Cheraghlou, A. K. Zadeh, M. Haghparast
{"title":"一种新的无线传感器网络容错聚类协议","authors":"Mehdi Nazari Cheraghlou, A. K. Zadeh, M. Haghparast","doi":"10.14257/IJSIA.2018.12.4.03","DOIUrl":null,"url":null,"abstract":"The major restriction of wireless sensor networks is represented by the energy requirements of the nodes. Also, the main challenge of these networks is their faulttolerance feature since the nodes are scattered in remote, inaccessible areas. Therefore, these issues must be the main concern of the management of the network nodes and all the proposed protocols must be evaluated based on a fault-tolerance capacity and handling basic network restrictions. In this article, we introduce a new fault-tolerant clustering network consisting of two sections: in the first phase, the clustering configuration takes place, and in the second phase, we create a fault-tolerant management architecture that employs fault detection and recovery mechanisms. In the proposed protocol, besides improving the network faulttolerance capacity, the impossibility of recharging nodes was a design factor. Thus, energy conservation and an increased network lifetime are two consequences related to the implementation of our proposed algorithm. The evaluations and comparisons prove that the proposed model in addition to increasing the network nodes' fault-tolerance capacity reduces the overall network energy consumption and lays the foundation for extending the network lifetime.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2018-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/IJSIA.2018.12.4.03","citationCount":"1","resultStr":"{\"title\":\"A New Fault-Tolerant Clustering Protocol for Wireless Sensor Networks\",\"authors\":\"Mehdi Nazari Cheraghlou, A. K. Zadeh, M. Haghparast\",\"doi\":\"10.14257/IJSIA.2018.12.4.03\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The major restriction of wireless sensor networks is represented by the energy requirements of the nodes. Also, the main challenge of these networks is their faulttolerance feature since the nodes are scattered in remote, inaccessible areas. Therefore, these issues must be the main concern of the management of the network nodes and all the proposed protocols must be evaluated based on a fault-tolerance capacity and handling basic network restrictions. In this article, we introduce a new fault-tolerant clustering network consisting of two sections: in the first phase, the clustering configuration takes place, and in the second phase, we create a fault-tolerant management architecture that employs fault detection and recovery mechanisms. In the proposed protocol, besides improving the network faulttolerance capacity, the impossibility of recharging nodes was a design factor. Thus, energy conservation and an increased network lifetime are two consequences related to the implementation of our proposed algorithm. The evaluations and comparisons prove that the proposed model in addition to increasing the network nodes' fault-tolerance capacity reduces the overall network energy consumption and lays the foundation for extending the network lifetime.\",\"PeriodicalId\":46187,\"journal\":{\"name\":\"International Journal of Security and Its Applications\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-07-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.14257/IJSIA.2018.12.4.03\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Security and Its Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14257/IJSIA.2018.12.4.03\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Security and Its Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14257/IJSIA.2018.12.4.03","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A New Fault-Tolerant Clustering Protocol for Wireless Sensor Networks
The major restriction of wireless sensor networks is represented by the energy requirements of the nodes. Also, the main challenge of these networks is their faulttolerance feature since the nodes are scattered in remote, inaccessible areas. Therefore, these issues must be the main concern of the management of the network nodes and all the proposed protocols must be evaluated based on a fault-tolerance capacity and handling basic network restrictions. In this article, we introduce a new fault-tolerant clustering network consisting of two sections: in the first phase, the clustering configuration takes place, and in the second phase, we create a fault-tolerant management architecture that employs fault detection and recovery mechanisms. In the proposed protocol, besides improving the network faulttolerance capacity, the impossibility of recharging nodes was a design factor. Thus, energy conservation and an increased network lifetime are two consequences related to the implementation of our proposed algorithm. The evaluations and comparisons prove that the proposed model in addition to increasing the network nodes' fault-tolerance capacity reduces the overall network energy consumption and lays the foundation for extending the network lifetime.
期刊介绍:
IJSIA aims to facilitate and support research related to security technology and its applications. Our Journal provides a chance for academic and industry professionals to discuss recent progress in the area of security technology and its applications. Journal Topics: -Access Control -Ad Hoc & Sensor Network Security -Applied Cryptography -Authentication and Non-repudiation -Cryptographic Protocols -Denial of Service -E-Commerce Security -Identity and Trust Management -Information Hiding -Insider Threats and Countermeasures -Intrusion Detection & Prevention -Network & Wireless Security -Peer-to-Peer Security -Privacy and Anonymity -Secure installation, generation and operation -Security Analysis Methodologies -Security assurance -Security in Software Outsourcing -Security products or systems -Security technology -Systems and Data Security