期刊文献+

WSNs中基于模糊逻辑覆盖空洞修复算法

Recovering coverage hole algorithm based on fuzzy logic in WSNs
下载PDF
导出
摘要 针对无线传感网络中覆盖空洞问题,提出一种基于模糊逻辑覆盖空洞修复(recovering coverage hole based on fuzzy logic,RCH-FL)算法。以最小化能量消耗为约束条件,以最大化网络覆盖为目的,利用模糊逻辑系统,结合传感节点能量、离空洞的距离以及覆盖冗余率信息,选择最佳的移动节点;移动节点依据节点密度以及欧式距离,计算最佳的移动位置。仿真结果表明,RCH-FL算法的覆盖率高达99.8%,能量消耗量低于其它同类算法。 For coverage holes of WSNs (wireless sensor networks), recovering coverage hole algorithm based on fuzzy logic (RCH-FL) was proposed. Minimizing energy consumption was considered as constraint conditions and maximizing the network converge was considered as the purpose. The optimal mobile node was chosen using fuzzy logic system combining with informa- tion of nodes energy, distance between coverage holes and coverage redundancy ratio. The optimal position was computed on the basis of knowledge about node density and Euclidean distance. Simulation results show that the coverage ratio of RCH-FL algo- rithm is up to 99.8%, and the energy consumption of it is less than other similar algorithms.
出处 《计算机工程与设计》 北大核心 2016年第5期1151-1155,共5页 Computer Engineering and Design
基金 山西省自然科学基金项目(2012011013-2) 山西省高校科技开发基金项目(2012081)
关键词 无线传感网络 覆盖空洞 移动节点 模糊逻辑 能量 wireless sensor networks coverage holes mobile nodes fuzzy logic energy
  • 相关文献

参考文献3

二级参考文献14

  • 1王兵,严斌宇,袁道华.Ad Hoc节点移动性模型特点初探[J].四川大学学报(自然科学版),2005,42(1):68-72. 被引量:3
  • 2Westhoff D,Girao J,Acharya M.Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks:Encryption,Key Distribution,and Routing Adaptation[J].IEEE Transactions on Mobile Computing,2006,5(10):1417-1431.
  • 3Karlof C,Sastry N,Wagner D.Tinysec:A Link Layer Security Architecture for Wireless Sensor Networks[C]//Proc.of the 2nd ACM Conference on Embedded Networked Sensor Systems.Baltimore,USA:ACM Press,2004.
  • 4Menezes A J.Elliptic Curve Public Key Cryptosystems[M].Norwell,USA:Kluwer Academic Publishers,1994.
  • 5Mykletun E,Girao J,Westhoff D.Public Key-based Crypto schemes for Data Concealment in Wireless Sensor Networks[C]// Proc.of IEEE International Conference on Communications.Istanbul,Turkey:[s.n.],2006.
  • 6Liu An,Peng Ning.Tinyecc:A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks[C]//Proc.of the 7th International Conference on Information Processing in Sensor Networks.St.Louis,USA:[s.n.],2008:245-256.
  • 7Ikegami Tetsushi. An overview of the sensor networks [ J]. IEEJTransactions on Electronics,Information and Systems,2008,128(10) :1498-1503.
  • 8Ssu K F,Ou C H, Jiau H C. Localization with mobile anchorpoints in wireless sensor networks [ J]. IEEE Trans on Veh Tech-nol,2005,54(3) :1187 -1197.
  • 9Liao W H,Lee Y C,Kedia S P. Mobile anchor assisted node lo-calization for wireless sensor networks [ J]. IET Commun,2011,5(7).-914 -921.
  • 10陈娟,李长庚,宁新鲜.基于移动信标的无线传感器网络节点定位[J].传感技术学报,2009,22(1):121-125. 被引量:32

共引文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部