期刊文献+

无线传感器网络拓扑控制算法的改进 被引量:2

Improvement of Topology Control Algorithm for Wireless Sensor Networks
下载PDF
导出
摘要 由于传感器节点能量有限,需要设计一个高效的拓扑控制算法来节约能量,延长整个网络生命周期。LEACH算法是典型的层次型拓扑控制算法,在深入分析LEACH算法的基础上,基于其存在的缺点,提出一种改进算法,通过计算节点综合性能权值来选举簇头,性能越好的节点越容易成为簇头;同时,当簇头节点剩余能量小于规定阈值时,才进行簇头的更新;簇头更新采用簇内局部更新的策略,以减少簇头选举带来的头开销。通过仿真分析和比较,改进算法所构建的拓扑结构在总体性能上更优于LEACH算法。 Because the energy of the sensor wode is limited,it is necessary to design an efficient topology control algorithm to save energy and to prolong the lifecycle of whole network. LEACH algorithm is a typical topology control algorithm of hierarchical type. Based on deep analysis of LEACH algorithm and its existed disadvantages,an improved algorithm is put forward. The improved algorithm selects the cluster head by calculating the integrated performance weight of node,the node whose performance is better is easier to become the cluster head; meanwhile,only when the surplus energy of cluster node is less than the specified threshold can the cluster head be updated; the cluster head is updated by the strategy that partially update in the cluster,which can reduce the header expenditure bring from the selection of cluster head. Through the simulation analyze and comparison,it is known that the overall performance of topology structure built by improved algorithm is better than that of LEACH algorithm.
出处 《四川理工学院学报(自然科学版)》 CAS 2014年第3期65-69,共5页 Journal of Sichuan University of Science & Engineering(Natural Science Edition)
基金 人工智能四川省重点实验室开放基金(2012RZY21) 四川省科技厅创新团队项目(2012Z068) 四川理工学院研究生创新基金(y2012009)
关键词 无线传感器网络 LEACH算法 拓扑控制 生命周期 wireless sensor networks LEACH algorithm topology control lifecycle
  • 相关文献

参考文献8

二级参考文献37

共引文献63

同被引文献24

  • 1向新,王勇超,易克初,田红心.UWB-TR接收机性能分析[J].通信学报,2007,28(1):123-126. 被引量:10
  • 2杨凯,安建平,卜祥元.传输参考超宽带信号功率谱密度分析[J].北京理工大学学报,2007,27(5):441-445. 被引量:5
  • 3Liu P,Zang W,Yu M.Incentive-based modeling and infer- ence of attacker intent,objectives,and strategies[J].ACM Transactions on Information and System Security,2005,8(1):78-118.
  • 4Wang W,Daniels E.A graph based approach toward net- work forensics analysis[J].ACM Transactions on Informa- tion and System Security,2008,12(1):1-33.
  • 5Qiu X Q,Paterson R.An innovative network security vul- nerability modeling method and tool[J],IEEE Communica- tions Magazine,2010,48(1):104-108.
  • 6CLESSIENNE T,YANG Sheng.A generalization of the rake receiver performance[C]//Proceedings of 15 thIEEE International Symposium on Personal,Indoor and Mobile Radio Communications,PIMRC 2004,Barce- lona,Spain,September 5 -8 ,2004:2436-2440.
  • 7FORESTER J R. Channel modeling sub-committee final report[J].IEEE Working Group for Wireless Per- sonal Area Networks,2003,24(1 ):43 -54.
  • 8HE N,TEPEDELENLIOGLU C.Performance analysis of non-coherent UWB receivers at different synchro- nization levels[J].IEEE Transactions on Wireless Com- munications,2006,5 (6): 1266-1273.
  • 9杨峰,蒋祥顺,胡剑浩,李少谦.超宽带脉冲信号的一种频域采样和接收方法[J].电子测量与仪器学报,2009,23(7):63-67. 被引量:10
  • 10杨晓峰,孙明明,胡雪蕾,杨静宇.基于改进隐马尔可夫模型的网络攻击检测方法[J].通信学报,2010,31(3):95-101. 被引量:22

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部