期刊文献+

基于再生技术的无线传感器网络容侵拓扑控制方法 被引量:3

Self-Regeneration Based Method for Topology Control with Intrusion Tolerance in Wireless Sensor Networks
下载PDF
导出
摘要 面对入侵时如何生成一个具有较高容侵能力的拓扑,在节点能源都会耗尽时如何维持一个可用的网络拓扑是布置在不可照料环境下的无线传感器网络拓扑面临着的两个关键问题.针对这两个问题,提出了一种基于再生技术的容侵拓扑控制方法,该方法被证明为可生成具有较强容侵能力的拓扑结构,同时将不断播撒进入部署区域的新增节点视为网络的可更新资源,以一代代再生网络的方式补充网络的可用能量以延长网络的生存期.仿真实验分析了拓扑控制方法中的一些参数特征及其在延长网络的生存期方面的性能,并与相关工作进行了比较. Two key problems of topology controlling are pointed out for unattended wireless sensor networks which are deployed in hostile region. Firstly, how to get an intrusion-tolerant architecture with intrusion in existence; Secondly, how to sustain a connected network when all deployed nodes will be exhausted ultimately. To solve these two problems, A novel approach for topology control is presented, which disassembles into three phases, such as topology discovery, topology update and topology regeneration. In topology discovery phase, a tricolor based method is proposed to build ~lrchitecture with high tolerance ability, in which black nodes are selected as cluster and grey nodes are in dormancy, so the networks are sparse and tolerant. In update and regeneration phases, the newly deployed nodes are regarded as renewable resource to replace the failure nodes, fill in the consumed energy, enhance the debased tolerance, and prolong network life. The topology constructed by this approach is proved to be intrusion tolerant. Some attributes of the integrated method are shown by simulations, such as the parameter of distribution of cluster head, the relation between the density of nodes and the number of clusters, and the advantage of replenishing residual energy. Finally, the differences of that from related work are given by comparison.
出处 《计算机研究与发展》 EI CSCD 北大核心 2009年第10期1678-1685,共8页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60703115 60633020) 中国博士后科学基金特别资助项目(200801357) 中国博士后科学基金面上项目(20070420955) 江苏省青蓝工程优秀青年骨干教师项目 江苏省自然科学基金项目(BK2007560 BK2007708) 江苏省博士后科研资助计划基金项目(0702003B) 江苏大学高级人才科研启动基金项目(07JDG080)~~
关键词 容忍入侵 自再生技术 拓扑控制 无线传感器网络 容错 intrusion tolerance self-regeneration technology topology control wireless sensor network fault tolerance
  • 相关文献

参考文献21

  • 1崔莉,鞠海玲,苗勇,李天璞,刘巍,赵泽.无线传感器网络研究进展[J].计算机研究与发展,2005,42(1):163-174. 被引量:730
  • 2Santi P. Topology control in wireless ad hoc and sensor networks[J]. ACM Comp Surveys, 2005, 37(2) :164-194.
  • 3Kubisch M, Karl H, Wolisz A. Distributed algorithms for transmission power control in wireless sensor networks [C]// Proc of IEEE Wireless Communications and Networking Conf (WCNC'03). Piscataway, NJ: IEEE, 2003: 558-563.
  • 4Li N, Hou J, Sha L. Design and analysis of an MST-based topology control algorithm [C] //Proc of IEEE INFOCOM2003. Piscataway, NJ: IEEE, 2003:1702-1712.
  • 5Heinzelman W, Chandrakasan A, Balakrishnan H. An application-specific protocol architecture for wireless microsensor network [J]. IEEE Trans on Wireless Communication, 2002, 1(4): 660-670.
  • 6Younis O, Fahmy S. HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks[J]. IEEE Trans on Mobile Computing, 2004, 3(4): 366-379.
  • 7Cerpa A, Estrin D. ASCENT: Adaptive self-configuring sensor networks topologies [J]. IEEE Trans on Mobile Computing, 2004, 3(3): 272-285.
  • 8Chen Y, Sang H Son. A fault tolerant topology control in wireless sensor networks [C]//Proc of ACS/IEEE Int Conf on Computer Systems and Applications. Piscataway, NJ: IEEE, 2005:57-69.
  • 9Jia X, Kim D, et al. Power assignment for k-connectivity in wireless ad hoc networks [C]//Proc of INFOCOM2005. Piscataway, NJ: IEEE, 2005:2206-2211.
  • 10Lee H. SEEMLESS: Distributed algorithm for topology control of survivable energy efficient multihop wireless sensor networks using adjustable transmission power [C]//Proc of the 6th Int Conf on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2005). Piscataway, NJ: IEEE, 2005:268-273.

二级参考文献167

共引文献858

同被引文献36

  • 1殷丽华,方滨兴.入侵容忍系统安全属性分析[J].计算机学报,2006,29(8):1505-1512. 被引量:27
  • 2王良民,马建峰,王超.无线传感器网络拓扑的容错度与容侵度[J].电子学报,2006,34(8):1446-1451. 被引量:22
  • 3肖德琴,冯健昭,杨波,张焕国.基于无线传感器网络的信誉形式化模型[J].计算机科学,2007,34(6):84-87. 被引量:11
  • 4MOHSEN R,MOHAMMADTAGHI H,VAHAB S M.Fault-tolerant and 3-dimensional distributed topology control algorithms in wireless multi-hop networks[J].Wireless Networks,2006,12:179-188.
  • 5JORGIC M,GOEL N,KALAICHEVAN K,et al.Localized detection of k-connectivity in wireless ad hoc actuator and sensor networks[A].Proc of the 16th IEEE International Conference on Computer Communications and Networks (ICCCN07)[C].Hawaii,2007.33-38.
  • 6MA R,XING L,MICHEL H E.Fault-intrusion tolerant techniques in wireless sensor networks[A].Proceedings of the 2nd IEEE International Symposium on Dependable,Autonomic and Secure Computing (DASC'06)[C].Indianapolis,2006.85-94.
  • 7ALBERT R,JEONG H,BARABASI A L.Error and attack tolerance of complex networks[J].Nature,2000,406(27):378-382.
  • 8MADANA B B,POPSTOJANOVA K G,VAIDYANATHAN K,et al.A method for modeling and quantifying the security attributes of intrusion tolerant systems[J].Performance Evaluation,2004,56(1~4):167-186.
  • 9TRIVEDI K S.Probability and Statistics with Reliability,Queuing,and Computer Science Applications[M].New York:Wiley Press,2001.
  • 10HEINZELMAN W,CHANDRAKASAN A,BALAKRISHNAN H.Energy-efficient communication protocol for wireless microsensor networks[A].Proc of the 33rd Annual Hawaii Int'l Conf on System Sciences[C].Hawaii,USA,2000.3005-3014.

引证文献3

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部