期刊文献+
共找到5,258篇文章
< 1 2 250 >
每页显示 20 50 100
Data Gathering Based on Hybrid Energy Efficient Clustering Algorithm and DCRNN Model in Wireless Sensor Network
1
作者 Li Cuiran Liu Shuqi +1 位作者 Xie Jianli Liu Li 《China Communications》 2025年第3期115-131,共17页
In order to solve the problems of short network lifetime and high data transmission delay in data gathering for wireless sensor network(WSN)caused by uneven energy consumption among nodes,a hybrid energy efficient clu... In order to solve the problems of short network lifetime and high data transmission delay in data gathering for wireless sensor network(WSN)caused by uneven energy consumption among nodes,a hybrid energy efficient clustering routing base on firefly and pigeon-inspired algorithm(FF-PIA)is proposed to optimise the data transmission path.After having obtained the optimal number of cluster head node(CH),its result might be taken as the basis of producing the initial population of FF-PIA algorithm.The L′evy flight mechanism and adaptive inertia weighting are employed in the algorithm iteration to balance the contradiction between the global search and the local search.Moreover,a Gaussian perturbation strategy is applied to update the optimal solution,ensuring the algorithm can jump out of the local optimal solution.And,in the WSN data gathering,a onedimensional signal reconstruction algorithm model is developed by dilated convolution and residual neural networks(DCRNN).We conducted experiments on the National Oceanic and Atmospheric Administration(NOAA)dataset.It shows that the DCRNN modeldriven data reconstruction algorithm improves the reconstruction accuracy as well as the reconstruction time performance.FF-PIA and DCRNN clustering routing co-simulation reveals that the proposed algorithm can effectively improve the performance in extending the network lifetime and reducing data transmission delay. 展开更多
关键词 CLUSTERING data gathering DCRNN model network lifetime wireless sensor network
在线阅读 下载PDF
A Fuzzy Trust Management Mechanism with Dynamic Behavior Monitoring for Wireless Sensor Networks
2
作者 Fu Shiming Zhang Ping Shi Xuehong 《China Communications》 SCIE CSCD 2024年第5期177-189,共13页
Traditional wireless sensor networks(WSNs)are typically deployed in remote and hostile environments for information collection.The wireless communication methods adopted by sensor nodes may make the network highly vul... Traditional wireless sensor networks(WSNs)are typically deployed in remote and hostile environments for information collection.The wireless communication methods adopted by sensor nodes may make the network highly vulnerable to various attacks.Traditional encryption and authentication mechanisms cannot prevent attacks launched by internal malicious nodes.The trust-based security mechanism is usually adopted to solve this problem in WSNs.However,the behavioral evidence used for trust estimation presents some uncertainties due to the open wireless medium and the inexpensive sensor nodes.Moreover,how to efficiently collect behavioral evidences are rarely discussed.To address these issues,in this paper,we present a trust management mechanism based on fuzzy logic and a cloud model.First,a type-II fuzzy logic system is used to preprocess the behavioral evidences and alleviate uncertainty.Then,the cloud model is introduced to estimate the trust values for sensor nodes.Finally,a dynamic behavior monitoring protocol is proposed to provide a balance between energy conservation and safety assurance.Simulation results demonstrate that our trust management mechanism can effectively protect the network from internal malicious attacks while enhancing the energy efficiency of behavior monitoring. 展开更多
关键词 behavior monitoring CLOUD FUZZY TRUST wireless sensor networks
在线阅读 下载PDF
Mechanism analysis of regulating Turing instability and Hopf bifurcation of malware propagation in mobile wireless sensor networks
3
作者 黄习习 肖敏 +3 位作者 Leszek Rutkowski 包海波 黄霞 曹进德 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期125-140,共16页
A dynamical model is constructed to depict the spatial-temporal evolution of malware in mobile wireless sensor networks(MWSNs). Based on such a model, we design a hybrid control scheme combining parameter perturbation... A dynamical model is constructed to depict the spatial-temporal evolution of malware in mobile wireless sensor networks(MWSNs). Based on such a model, we design a hybrid control scheme combining parameter perturbation and state feedback to effectively manipulate the spatiotemporal dynamics of malware propagation. The hybrid control can not only suppress the Turing instability caused by diffusion factor but can also adjust the occurrence of Hopf bifurcation induced by time delay. Numerical simulation results show that the hybrid control strategy can efficiently manipulate the transmission dynamics to achieve our expected desired properties, thus reducing the harm of malware propagation to MWSNs. 展开更多
关键词 mobile wireless sensor networks REACTION-DIFFUSION Hopf bifurcation hybrid control
在线阅读 下载PDF
Actor-Critic-Based UAV-Assisted Data Collection in the Wireless Sensor Network
4
作者 Huang Xiaoge Wang Lingzhi +1 位作者 He Yong Chen Qianbin 《China Communications》 SCIE CSCD 2024年第4期163-177,共15页
Wireless Sensor Network(WSN)is widely utilized in large-scale distributed unmanned detection scenarios due to its low cost and flexible installation.However,WSN data collection encounters challenges in scenarios lacki... Wireless Sensor Network(WSN)is widely utilized in large-scale distributed unmanned detection scenarios due to its low cost and flexible installation.However,WSN data collection encounters challenges in scenarios lacking communication infrastructure.Unmanned aerial vehicle(UAV)offers a novel solution for WSN data collection,leveraging their high mobility.In this paper,we present an efficient UAV-assisted data collection algorithm aimed at minimizing the overall power consumption of the WSN.Firstly,a two-layer UAV-assisted data collection model is introduced,including the ground and aerial layers.The ground layer senses the environmental data by the cluster members(CMs),and the CMs transmit the data to the cluster heads(CHs),which forward the collected data to the UAVs.The aerial network layer consists of multiple UAVs that collect,store,and forward data from the CHs to the data center for analysis.Secondly,an improved clustering algorithm based on K-Means++is proposed to optimize the number and locations of CHs.Moreover,an Actor-Critic based algorithm is introduced to optimize the UAV deployment and the association with CHs.Finally,simulation results verify the effectiveness of the proposed algorithms. 展开更多
关键词 actor critic data collection deep reinforcement learning unmanned aerial vehicle wireless sensor network
在线阅读 下载PDF
Hybrid Seagull and Whale Optimization Algorithm-Based Dynamic Clustering Protocol for Improving Network Longevity in Wireless Sensor Networks
5
作者 P.Vinoth Kumar K.Venkatesh 《China Communications》 SCIE CSCD 2024年第10期113-131,共19页
Energy efficiency is the prime concern in Wireless Sensor Networks(WSNs) as maximized energy consumption without essentially limits the energy stability and network lifetime. Clustering is the significant approach ess... Energy efficiency is the prime concern in Wireless Sensor Networks(WSNs) as maximized energy consumption without essentially limits the energy stability and network lifetime. Clustering is the significant approach essential for minimizing unnecessary transmission energy consumption with sustained network lifetime. This clustering process is identified as the Non-deterministic Polynomial(NP)-hard optimization problems which has the maximized probability of being solved through metaheuristic algorithms.This adoption of hybrid metaheuristic algorithm concentrates on the identification of the optimal or nearoptimal solutions which aids in better energy stability during Cluster Head(CH) selection. In this paper,Hybrid Seagull and Whale Optimization Algorithmbased Dynamic Clustering Protocol(HSWOA-DCP)is proposed with the exploitation benefits of WOA and exploration merits of SEOA to optimal CH selection for maintaining energy stability with prolonged network lifetime. This HSWOA-DCP adopted the modified version of SEagull Optimization Algorithm(SEOA) to handle the problem of premature convergence and computational accuracy which is maximally possible during CH selection. The inclusion of SEOA into WOA improved the global searching capability during the selection of CH and prevents worst fitness nodes from being selected as CH, since the spiral attacking behavior of SEOA is similar to the bubble-net characteristics of WOA. This CH selection integrates the spiral attacking principles of SEOA and contraction surrounding mechanism of WOA for improving computation accuracy to prevent frequent election process. It also included the strategy of levy flight strategy into SEOA for potentially avoiding premature convergence to attain better trade-off between the rate of exploration and exploitation in a more effective manner. The simulation results of the proposed HSWOADCP confirmed better network survivability rate, network residual energy and network overall throughput on par with the competitive CH selection schemes under different number of data transmission rounds.The statistical analysis of the proposed HSWOA-DCP scheme also confirmed its energy stability with respect to ANOVA test. 展开更多
关键词 CLUSTERING energy stability network lifetime seagull optimization algorithm(SEOA) whale optimization algorithm(WOA) wireless sensor networks(WSNs)
在线阅读 下载PDF
A Practical Approach for Missing Wireless Sensor Networks Data Recovery
6
作者 Song Xiaoxiang Guo Yan +1 位作者 Li Ning Ren Bing 《China Communications》 SCIE CSCD 2024年第5期202-217,共16页
In wireless sensor networks(WSNs),the performance of related applications is highly dependent on the quality of data collected.Unfortunately,missing data is almost inevitable in the process of data acquisition and tra... In wireless sensor networks(WSNs),the performance of related applications is highly dependent on the quality of data collected.Unfortunately,missing data is almost inevitable in the process of data acquisition and transmission.Existing methods often rely on prior information such as low-rank characteristics or spatiotemporal correlation when recovering missing WSNs data.However,in realistic application scenarios,it is very difficult to obtain these prior information from incomplete data sets.Therefore,we aim to recover the missing WSNs data effectively while getting rid of the perplexity of prior information.By designing the corresponding measurement matrix that can capture the position of missing data and sparse representation matrix,a compressive sensing(CS)based missing data recovery model is established.Then,we design a comparison standard to select the best sparse representation basis and introduce average cross-correlation to examine the rationality of the established model.Furthermore,an improved fast matching pursuit algorithm is proposed to solve the model.Simulation results show that the proposed method can effectively recover the missing WSNs data. 展开更多
关键词 average cross correlation matching pursuit missing data wireless sensor networks
在线阅读 下载PDF
Integrated Clustering and Routing Design and Triangle Path Optimization for UAV-Assisted Wireless Sensor Networks
7
作者 Shao Liwei Qian Liping +1 位作者 Wu Mengru Wu Yuan 《China Communications》 SCIE CSCD 2024年第4期178-192,共15页
With the development of the Internet of Things(IoT),it requires better performance from wireless sensor networks(WSNs),such as larger coverage,longer lifetime,and lower latency.However,a large amount of data generated... With the development of the Internet of Things(IoT),it requires better performance from wireless sensor networks(WSNs),such as larger coverage,longer lifetime,and lower latency.However,a large amount of data generated from monitoring and long-distance transmission places a heavy burden on sensor nodes with the limited battery power.For this,we investigate an unmanned aerial vehicles assisted mobile wireless sensor network(UAV-assisted WSN)to prolong the network lifetime in this paper.Specifically,we use UAVs to assist the WSN in collecting data.In the current UAV-assisted WSN,the clustering and routing schemes are determined sequentially.However,such a separate consideration might not maximize the lifetime of the whole WSN due to the mutual coupling of clustering and routing.To efficiently prolong the lifetime of the WSN,we propose an integrated clustering and routing scheme that jointly optimizes the clustering and routing together.In the whole network space,it is intractable to efficiently obtain the optimal integrated clustering and routing scheme.Therefore,we propose the Monte-Las search strategy based on Monte Carlo and Las Vegas ideas,which can generate the chain matrix to guide the algorithm to find the solution faster.Unnecessary point-to-point collection leads to long collection paths,so a triangle optimization strategy is then proposed that finds a compromise path to shorten the collection path based on the geometric distribution and energy of sensor nodes.To avoid the coverage hole caused by the death of sensor nodes,the deployment of mobile sensor nodes and the preventive mechanism design are indispensable.An emergency data transmission mechanism is further proposed to reduce the latency of collecting the latency-sensitive data due to the absence of UAVs.Compared with the existing schemes,the proposed scheme can prolong the lifetime of the UAVassisted WSN at least by 360%,and shorten the collection path of UAVs by 56.24%. 展开更多
关键词 Monte-Las search strategy triangle path optimization unmanned aerial vehicles wireless sensor networks
在线阅读 下载PDF
LOCALIZATION ALGORITHM USING DISTANCE AND ANGLE INFORMATION IN WIRELESS SENSOR NETWORKS 被引量:3
8
作者 诸燕平 黄大庆 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2009年第1期58-64,共7页
A localization algorithm using distance and angle information is proposed in wireless sensor networks. Assuming that node axial orientations are unknown, all angles are measured to calculate the angle differences betw... A localization algorithm using distance and angle information is proposed in wireless sensor networks. Assuming that node axial orientations are unknown, all angles are measured to calculate the angle differences between two nodes viewed by the third one. Then, localization problems are formulated as convex optimization ones and all geometric relationships among different nodes in the communication range are transformed into linear or quadratic constraints. If all measurements are accurate, the localization problem can be formulated as linear programming (LP). Otherwise, by incorporating auxiliary variables, it can be regarded as quadratic programming (QP). Simulations show the effectiveness of the proposed algorithm. 展开更多
关键词 linear programming quadratic programming wireless sensor networks angle of arrival
在线阅读 下载PDF
Deployment Strategy of Wireless Sensor Networks for Internet of Things 被引量:29
9
作者 刘强 黄小红 +2 位作者 冷延鹏 李龙江 毛玉明 《China Communications》 SCIE CSCD 2011年第8期111-120,共10页
This paper proposes an open hierarchical network architecture for the Internet of Things (IoT), which can provide a unified network topology by using heterogeneous Wireless Sensor Networks (WSNs). With this proposed a... This paper proposes an open hierarchical network architecture for the Internet of Things (IoT), which can provide a unified network topology by using heterogeneous Wireless Sensor Networks (WSNs). With this proposed architecture, our research focuses on the optimal deployment strategy of the nodes on the convergence level. We aim at the maximization of the sub-network's lifetime while minimizing the deployment cost. Meanwhile, a novel metric named as the Ratio of Lifetime to Cost (RLC) is proposed to estimate the efficiency of convergence nodes deployment. Simulation results indicate that the proposed deployment algorithm can achieve the optimal number of convergence nodes. The proposed deployment strategy is able to achieve a balanced tradeoff between the network lifetime and the deployment cost. 展开更多
关键词 Internet of Things wireless sensor networks networking architecture LIFETIME COST
在线阅读 下载PDF
A Mobile Localization Strategy for Wireless Sensor Network in NLOS Conditions 被引量:7
10
作者 Long Cheng Yan Wang +2 位作者 Xingming Sun Nan Hu Jian Zhang 《China Communications》 SCIE CSCD 2016年第10期69-78,共10页
The problem of mobile localization for wireless sensor network has attracted considerable attention in recent years. The localization accuracy will drastically grade in non-line of sight(NLOS) conditions. In this pape... The problem of mobile localization for wireless sensor network has attracted considerable attention in recent years. The localization accuracy will drastically grade in non-line of sight(NLOS) conditions. In this paper, we propose a mobile localization strategy based on Kalman filter. The key technologies for the proposed method are the NLOS identification and mitigation. The proposed method does not need the prior knowledge of the NLOS error and it is independent of the physical measurement ways. Simulation results show that the proposed method owns the higher localization accuracy when compared with other methods. 展开更多
关键词 wireless sensor network LOCALIZATION non-line of sight identification MITIGATION
在线阅读 下载PDF
Design and performance analysis of wireless sensor network location node system for underground mine 被引量:10
11
作者 CHEN Guang-zhu SHEN Chun-feng ZHOU Li-juan 《Mining Science and Technology》 EI CAS 2009年第6期813-818,共6页
Aiming at the application of a wireless sensor network to locating miners in underground mine,we design a wireless sensor network location node system,considering the communication performance and the intrinsic safety... Aiming at the application of a wireless sensor network to locating miners in underground mine,we design a wireless sensor network location node system,considering the communication performance and the intrinsic safety. The location node system consists of a mobile node,several fixed nodes,and a sink node,all of whose circuits were designed based on CC2430. A varistor and a RC circuit were used in the reset circuit of a sensor node to guarantee the intrinsic safety by reducing discharge energy,the theoretical analysis of the discharge energy shows that the reset circuit is an intrinsic safety one. The analysis and simulation about the performance of the location node system are discussed,such as network communication delay and packet loss rate,the results show that the highest network communication delay of the system is about 0.11 seconds,and the highest packet loss rate is about 0.13,which assures the location node system has a high reliability,and can locate miners in the underground mine. 展开更多
关键词 wireless sensor network location node network communication delay packet loss rate
在线阅读 下载PDF
Virus spreading in wireless sensor networks with a medium access control mechanism 被引量:4
12
作者 王亚奇 杨晓元 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第4期70-74,共5页
In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical a... In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks, which has been ignored in previous studies. It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes. The theoretical results are confirmed by numerical simulations. 展开更多
关键词 wireless sensor networks medium access control virus spreading susceptible-infected model
在线阅读 下载PDF
A multipath routing protocol for wireless sensor network for mine security monitoring 被引量:7
13
作者 XIAO Shuo WEI Xueye WANG Yu 《Mining Science and Technology》 EI CAS 2010年第1期148-151,共4页
Underground mining is a hazardous industrial activity. In order to provide a safe working environment for miners, a Wireless Sensor Network (WSN) technology has been used for security monitoring. It can provide a wide... Underground mining is a hazardous industrial activity. In order to provide a safe working environment for miners, a Wireless Sensor Network (WSN) technology has been used for security monitoring. It can provide a wide range of surveillance with a relatively low cost. In this study, an Energy-Based Multipath Routing (EBMR) protocol is proposed, which considers residual energy capacity and link quality in choosing hops and routing paths. Hops and paths with a high residual energy capacity and link quality will have the best chance to be selected to transmit data packages. Since the EBMR stores several routes in the routing table, when the current path fails, another path will be chosen to fulfill the task immediately. In this way, EBMR improves reliability and decrease time latency. Compared to AOMDV and REAR, EBMR decreases time latency by 51% and 12%. 展开更多
关键词 coal mine security monitoring multipath routing wireless sensor network
在线阅读 下载PDF
An Energy-Efficient Network Coded Cooperation Scheme in Wireless Sensor Networks 被引量:4
14
作者 覃团发 罗建中 +1 位作者 唐振华 刘家锋 《China Communications》 SCIE CSCD 2011年第2期166-172,共7页
Energy-efficient communications is crucial for wireless sensor networks(WSN) where energy consumption is constrained. The transmission and reception energy can be saved by applying network coding to many wireless comm... Energy-efficient communications is crucial for wireless sensor networks(WSN) where energy consumption is constrained. The transmission and reception energy can be saved by applying network coding to many wireless communications systems. In this paper,we present a coded cooperation scheme which employs network coding to WSN. In the scheme,the partner node forwards the combination of the source data and its own data instead of sending the source data alone. Afterward,both of the system block error rates(BLERs) and energy performance are evaluated. Experiment results show that the proposed scheme has higher energy efficiency. When Noise power spectral density is-171dBm/Hz,the energy consumption of the coded cooperation scheme is 81.1% lower than that of the single-path scheme,43.9% lower than that of the cooperation scheme to reach the target average BLER of 10-2. When the channel condition is getting worse,the energy saving effect is more obvious. 展开更多
关键词 wireless sensor network energy efficiency cooperation diversity network coding
在线阅读 下载PDF
Channel Assignment Method Using Parallel Tabu Search Based on Graph Theory in Wireless Sensor Networks 被引量:3
15
作者 郑涛 秦雅娟 +1 位作者 高德云 张宏科 《China Communications》 SCIE CSCD 2011年第3期73-82,共10页
Wireless sensor networks are suffering from serious frequency interference.In this paper,we propose a channel assignment algorithm based on graph theory in wireless sensor networks.We first model the conflict infectio... Wireless sensor networks are suffering from serious frequency interference.In this paper,we propose a channel assignment algorithm based on graph theory in wireless sensor networks.We first model the conflict infection graph for channel assignment with the goal of global optimization minimizing the total interferences in wireless sensor networks.The channel assignment problem is equivalent to the generalized graph-coloring problem which is a NP-complete problem.We further present a meta-heuristic Wireless Sensor Network Parallel Tabu Search(WSN-PTS) algorithm,which can optimize global networks with small numbers of iterations.The results from a simulation experiment reveal that the novel algorithm can effectively solve the channel assignment problem. 展开更多
关键词 wireless sensor networks channel assignment graph theory Tabu search INTERFERENCE
在线阅读 下载PDF
Improved Implementation and Evaluation of Wireless Sensor Networks in Intelligent Building 被引量:3
16
作者 段俊奇 张思东 郑涛 《China Communications》 SCIE CSCD 2011年第8期64-71,共8页
A complete study for the implementation of wireless sensor networks in the intelligent building is presented. We carry out some experiments to find out the factors affecting the network performance. Several vital para... A complete study for the implementation of wireless sensor networks in the intelligent building is presented. We carry out some experiments to find out the factors affecting the network performance. Several vital parameters which are related to the link quality are measured before deploying the actual system. And then, we propose an optimized routing protocol based on the analysis of the test data. We evaluate the deployment strategies to ensure the excellent performance of the wireless sensor networks under the real working conditions. And the evaluation results show that the presented system could satisfy the requirements of the applications in the intelligent building. 展开更多
关键词 wireless sensor networks deployment strategy network parameters routing protocol intelligent building
在线阅读 下载PDF
A random walk evolution model of wireless sensor networks and virus spreading 被引量:3
17
作者 王亚奇 杨晓元 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第1期154-160,共7页
In this paper, considering both cluster heads and sensor nodes, we propose a novel evolving a network model based on a random walk to study the fault tolerance decrease of wireless sensor networks (WSNs) due to node... In this paper, considering both cluster heads and sensor nodes, we propose a novel evolving a network model based on a random walk to study the fault tolerance decrease of wireless sensor networks (WSNs) due to node failure, and discuss the spreading dynamic behavior of viruses in the evolution model. A theoretical analysis shows that the WSN generated by such an evolution model not only has a strong fault tolerance, but also can dynamically balance the energy loss of the entire network. It is also found that although the increase of the density of cluster heads in the network reduces the network efficiency, it can effectively inhibit the spread of viruses. In addition, the heterogeneity of the network improves the network efficiency and enhances the virus prevalence. We confirm all the theoretical results with sufficient numerical simulations. 展开更多
关键词 wireless sensor network random walk network efficiency virus spreading
在线阅读 下载PDF
A Cooperative MIMO Transmission Scheme for Cluster-based Wireless Sensor Networks 被引量:3
18
作者 Ding Jie Liu Danpu Wu Huari 《China Communications》 SCIE CSCD 2010年第5期14-22,共9页
Wireless sensor network is becoming more and more popular in recent years, but energy- constrained characteristic of sensor nodes is one of the critical issues that we must consider in system design. In this paper, a ... Wireless sensor network is becoming more and more popular in recent years, but energy- constrained characteristic of sensor nodes is one of the critical issues that we must consider in system design. In this paper, a cluster-based virtual VBLAST transmission scheme is proposed to achieve energy savings for energy-constrained wireless sensor networks. In the proposed scheme, instead of using cluster member as cooperative nodes, multiple cluster heads cooperate to form virtual antenna array so that V-BLAST based virtual MIMO transmission can be implemented. Based on the communication energy consumption model, a way to optimize the parameters for the scheme is given. In addition, detailed simulation is performed to evaluate the performance of the proposed scheme for both densely and sparsely deployed sensor networks. Theoretical analysis and simulation results verify the energy efficiency of the proposed scheme. 展开更多
关键词 energy efficiency virtual MIMO VBLAST CLUSTER wireless sensor networks
在线阅读 下载PDF
A Survey on the Privacy-Preserving Data Aggregation in Wireless Sensor Networks 被引量:4
19
作者 XU Jian YANG Geng +1 位作者 CHEN Zhengyu WANG Qianqian 《China Communications》 SCIE CSCD 2015年第5期162-180,共19页
Wireless sensor networks(WSNs)consist of a great deal of sensor nodes with limited power,computation,storage,sensing and communication capabilities.Data aggregation is a very important technique,which is designed to s... Wireless sensor networks(WSNs)consist of a great deal of sensor nodes with limited power,computation,storage,sensing and communication capabilities.Data aggregation is a very important technique,which is designed to substantially reduce the communication overhead and energy expenditure of sensor node during the process of data collection in a WSNs.However,privacy-preservation is more challenging especially in data aggregation,where the aggregators need to perform some aggregation operations on sensing data it received.We present a state-of-the art survey of privacy-preserving data aggregation in WSNs.At first,we classify the existing privacy-preserving data aggregation schemes into different categories by the core privacy-preserving techniques used in each scheme.And then compare and contrast different algorithms on the basis of performance measures such as the privacy protection ability,communication consumption,power consumption and data accuracy etc.Furthermore,based on the existing work,we also discuss a number of open issues which may intrigue the interest of researchers for future work. 展开更多
关键词 wireless sensor networks data aggregation PRIVACY-PRESERVING
在线阅读 下载PDF
Confidential Communication Through Chaos Encryption in Wireless Sensor Network 被引量:4
20
作者 CHEN Shuai ZHONG Xian-xin 《Journal of China University of Mining and Technology》 EI 2007年第2期258-261,共4页
A new byte block cipher algorithm with discrete chaos and Feistel structure has been studied for confidential communication in wireless sensor network to improve security. After permutation,the byte block was encrypte... A new byte block cipher algorithm with discrete chaos and Feistel structure has been studied for confidential communication in wireless sensor network to improve security. After permutation,the byte block was encrypted through a Feistel structure in multiple turns and afterwards replaced again. The child keys are the composite sequence of discrete chaos and linear congruence sequences. Both the plain text and cipher text are of 8 bits. The number of keys is alterable. A nonlinear encryption function in the Feistel structure with chaos was constructed. The cipher algorithm was realized in the Micaz node,and the confidential communication experiment in wireless sensor network was completed success-fully. Additional ROM memory required for the cipher algorithm is 4144 bytes and an additional RAM memory 61 bytes. The cipher algorithm is nonlinear chaos and the Feistel structure holds the best of the RC6,DES and SKIPJACK cipher algorithms.The result shows that the algorithm needs a little memory and is safe at a high level. 展开更多
关键词 ALGORITHM ENCRYPTION CHAOS wireless sensor network Feistel structure
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部