期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
基于时空相关性的传感器网络数据压缩算法 被引量:10
1
作者 王林景 高志宇 姚鹏帅 《吉林大学学报(理学版)》 CAS 北大核心 2020年第2期337-342,共6页
针对当前传感器网络数据压缩算法存在压缩比率低、数据变形严重等缺陷,为提高传感器网络数据传输的实时性,提出一种基于时空相关性的传感器网络数据压缩算法。首先采集传感器网络原始数据,采用空间变换技术从空间上分析传感器网络数据... 针对当前传感器网络数据压缩算法存在压缩比率低、数据变形严重等缺陷,为提高传感器网络数据传输的实时性,提出一种基于时空相关性的传感器网络数据压缩算法。首先采集传感器网络原始数据,采用空间变换技术从空间上分析传感器网络数据之间的相关性,进行去噪处理,减少噪声所占的空间资源;然后根据传感器网络数据的时间相关性,引入压缩感知算法对空间系数进行压缩处理,减少传感器网络数据冗余;最后通过仿真实验分析传感器网络数据压缩算法的性能。仿真实验结果表明,相对于其他传感器网络数据压缩算法,该算法可在不损失传感器网络数据信息的条件下,提高传感器网络数据压缩比率,同时获得更快的传感器网络数据压缩速度,减少传感器网络通信压力。 展开更多
关键词 传感器网络数据 时间相关性 空间相关性 空间变换技术
在线阅读 下载PDF
传感器网络及其数据管理的概念、问题与进展 被引量:622
2
作者 李建中 李金宝 石胜飞 《软件学报》 EI CSCD 北大核心 2003年第10期1717-1727,共11页
传感器网络综合了传感器技术、嵌入式计算技术、分布式信息处理技术和无线通信技术,能够协作地实时监测、感知和采集各种环境或监测对象的信息,并对其进行处理,传送到这些信息的用户.传感器网络是计算机科学技术的一个新的研究领域,具... 传感器网络综合了传感器技术、嵌入式计算技术、分布式信息处理技术和无线通信技术,能够协作地实时监测、感知和采集各种环境或监测对象的信息,并对其进行处理,传送到这些信息的用户.传感器网络是计算机科学技术的一个新的研究领域,具有十分广阔的应用前景,引起了学术界和工业界的高度重视.介绍了传感器网络及其数据管理的概念和特点,探讨了传感器网络及其数据管理的研究问题,并综述了传感器网络及其数据管理的研究现状. 展开更多
关键词 传感器 传感器网络 传感器网络数据 传感器网络数据管理
在线阅读 下载PDF
无线传感器网络基于数据汇聚的路由 被引量:8
3
作者 彭刚 曹元大 +1 位作者 钟伟军 孙利民 《计算机工程与应用》 CSCD 北大核心 2005年第12期12-14,43,共4页
提出了一种针对无线传感器网络的路由协议,该路由采用最小传输成本生成树的数据汇聚机制。具体方法是首先将传感区域内的传感器节点采集的数据传送给传感区域内离汇聚点最近的节点,将这些数据进行汇聚操作后,将汇聚的结果通过最短路径... 提出了一种针对无线传感器网络的路由协议,该路由采用最小传输成本生成树的数据汇聚机制。具体方法是首先将传感区域内的传感器节点采集的数据传送给传感区域内离汇聚点最近的节点,将这些数据进行汇聚操作后,将汇聚的结果通过最短路径传递给网络汇聚点。仿真结果显示,采用最小传输代价生成树的路由协议能减少数据传输量50%-80%,并具有较小的传输时延。 展开更多
关键词 传感器网络数据汇聚 数据为中心路由 最小传输代价生成树
在线阅读 下载PDF
数据收集传感器网络的多模层次网络构建 被引量:19
4
作者 朱永利 于永华 李丽芬 《计算机工程》 CAS CSCD 北大核心 2011年第2期111-113,116,共4页
数据收集传感器网络的漏斗效应是制约网络性能的瓶颈。针对静态数据收集传感器网络,依据空间复用技术和减少跳步数原则,构建多模层次网络,实现不同层次数据包分流,解决sink及其邻近几跳节点的瓶颈问题,达到缓解拥塞、降低传输时延的目... 数据收集传感器网络的漏斗效应是制约网络性能的瓶颈。针对静态数据收集传感器网络,依据空间复用技术和减少跳步数原则,构建多模层次网络,实现不同层次数据包分流,解决sink及其邻近几跳节点的瓶颈问题,达到缓解拥塞、降低传输时延的目的。实验结果表明,该方法在降低节点间通信干扰的同时,能有效减轻传感器节点的数据转发负担,提升网络性能。 展开更多
关键词 数据收集传感器网络 漏斗效应 多模层次网络 空间复用
在线阅读 下载PDF
长链型数据收集传感器网络的负载平衡研究 被引量:3
5
作者 于永华 李丽芬 朱永利 《计算机应用研究》 CSCD 北大核心 2010年第7期2724-2726,共3页
为解决传感器网络的漏斗效应,依据减少跳步数原则,提出了一种新的拓扑控制算法,算法对网络中的局部区域突发的大量事件包进行数据分流,实现了网络的区域负载平衡,很好地解决了网络的漏斗效应。实验结果证明了该方法的有效性。
关键词 数据收集传感器网络 服务质量 漏斗效应 负载平衡
在线阅读 下载PDF
数据储存式无线传感器网络下一个具有高效能的密钥管理方案
6
作者 潘中强 常新峰 《计算机科学》 CSCD 北大核心 2014年第B11期277-281,共5页
针对无线传感器网络能量、存储空间、通信开销等局限性问题,基于pDCS(Security and Privacy Support for Data-Centric Sensor Networks),在保证不失其安全性的前提下,以互斥基底系统(Exclusion Basis System,EBS)建构一个具有更高效率... 针对无线传感器网络能量、存储空间、通信开销等局限性问题,基于pDCS(Security and Privacy Support for Data-Centric Sensor Networks),在保证不失其安全性的前提下,以互斥基底系统(Exclusion Basis System,EBS)建构一个具有更高效率的分布式密钥管理方案,将其命名为ERP-DCS。该方案将网络密钥的管理工作(包括密钥分配、重置及撤销)分散至各个簇集中,藉以降低密钥重置阶段所需的通信量,节省能源,进而延长网络寿命。论证分析表明,与pDCS相比,ERP-DCS仅增加了些微的储存成本,却能大幅地降低密钥重置时的更新通信量。 展开更多
关键词 密钥管理 数据储存式无线传感器网络 信息安全 互斥基底系统 分散式系统架构
在线阅读 下载PDF
语义物联网中链接传感器数据发布系统 被引量:4
7
作者 爨林娜 史一民 +1 位作者 李冠宇 吴学华 《计算机应用》 CSCD 北大核心 2015年第9期2440-2446,共7页
针对传感器网络数据的表示和传输标准不统一以及单一数据资源无法满足应用程序的需求问题,提出将传感器网络数据发布为链接传感器数据的方法。在分析已有链接传感器数据发布方法的基础上,首先利用本体标注技术为传感器网络数据添加语义... 针对传感器网络数据的表示和传输标准不统一以及单一数据资源无法满足应用程序的需求问题,提出将传感器网络数据发布为链接传感器数据的方法。在分析已有链接传感器数据发布方法的基础上,首先利用本体标注技术为传感器网络数据添加语义信息,然后提出基于继承关系概念组集的关联数据查询处理方法以找到相关Web数据集(RWD)和基于启发式属性的图相似性比较方法实现传感器网络数据与相关Web数据的链接,最后构建了一种链接传感器数据发布系统(LSDPS)。通过与其他经典链接传感器数据发布系统比较,表明本系统将建立与相关数据的链接的准确率提高了9%。将传感器网络数据发布为链接传感器数据,使得应用程序不仅可以理解和利用传感器网络数据,而且可以根据链接传感器数据集间的资源描述框架(RDF)链接获得更多相关资源。 展开更多
关键词 语义物联网 关联数据 传感器网络数据 资源描述框架链接 链接传感器数据
在线阅读 下载PDF
A neighbor information based false data filtering scheme in wireless sensor networks 被引量:1
8
作者 刘志雄 王建新 张士庚 《Journal of Central South University》 SCIE EI CAS 2012年第11期3147-3153,共7页
In sensor networks,the adversaries can inject false data reports from compromised nodes.Previous approaches to filter false reports,e.g.,SEF,only verify the correctness of the message authentication code (MACs) carrie... In sensor networks,the adversaries can inject false data reports from compromised nodes.Previous approaches to filter false reports,e.g.,SEF,only verify the correctness of the message authentication code (MACs) carried in each data report on intermediate nodes,thus cannot filter out fake reports that are forged in a collaborative manner by a group of compromised nodes,even if these compromised nodes distribute in different geographical areas.Furthermore,if the adversary obtains keys from enough (e.g.,more than t in SEF) distinct key partitions,it then can successfully forge a data report without being detected en-route.A neighbor information based false report filtering scheme (NFFS) in wireless sensor networks was presented.In NFFS,each node distributes its neighbor information to some other nodes after deployment.When a report is generated for an observed event,it must carry the IDs and the MACs from t detecting nodes.Each forwarding node checks not only the correctness of the MACs carried in the report,but also the legitimacy of the relative position of these detecting nodes.Analysis and simulation results demonstrate that NFFS can resist collaborative false data injection attacks efficiently,and thus can tolerate much more compromised nodes than existing schemes. 展开更多
关键词 wireless sensor network false report filtering neighbor information collaborative attack compromise tolerance
在线阅读 下载PDF
Hash-area-based data dissemination protocol in wireless sensor networks 被引量:1
9
作者 王田 王国军 +1 位作者 过敏意 贾维嘉 《Journal of Central South University of Technology》 EI 2008年第3期392-398,共7页
HashQuery,a Hash-area-based data dissemination protocol,was designed in wireless sensor networks. Using a Hash function which uses time as the key,both mobile sinks and sensors can determine the same Hash area. The se... HashQuery,a Hash-area-based data dissemination protocol,was designed in wireless sensor networks. Using a Hash function which uses time as the key,both mobile sinks and sensors can determine the same Hash area. The sensors can send the information about the events that they monitor to the Hash area and the mobile sinks need only to query that area instead of flooding among the whole network,and thus much energy can be saved. In addition,the location of the Hash area changes over time so as to balance the energy consumption in the whole network. Theoretical analysis shows that the proposed protocol can be energy-efficient and simulation studies further show that when there are 5 sources and 5 sinks in the network,it can save at least 50% energy compared with the existing two-tier data dissemination(TTDD) protocol,especially in large-scale wireless sensor networks. 展开更多
关键词 wireless sensor networks Hash function data dissemination query processing mobile sinks
在线阅读 下载PDF
Multiple k-hop clusters based routing scheme to preserve source-location privacy in WSNs 被引量:3
10
作者 任炬 张尧学 刘康 《Journal of Central South University》 SCIE EI CAS 2014年第8期3155-3168,共14页
Privacy is becoming one of the most notable challenges threatening wireless sensor networks(WSNs).Adversaries may use RF(radio frequency) localization techniques to perform hop-by-hop trace back to the source sensor&#... Privacy is becoming one of the most notable challenges threatening wireless sensor networks(WSNs).Adversaries may use RF(radio frequency) localization techniques to perform hop-by-hop trace back to the source sensor's location.A multiple k-hop clusters based routing strategy(MHCR) is proposed to preserve source-location privacy as well as enhance energy efficiency for WSNs.Owing to the inherent characteristics of intra-cluster data aggregation,each sensor of the interference clusters is able to act as a fake source to confuse the adversary.Moreover,dummy traffic could be filtered efficiently by the cluster heads during the data aggregation,ensuring no energy consumption be burdened in the hotspot of the network.Through careful analysis and calculation on the distribution and the number of interference clusters,energy efficiency is significantly enhanced without reducing the network lifetime.Finally,the security and delay performance of MHCR scheme are theoretically analyzed.Extensive analysis and simulation results demonstrate that MHCR scheme can improve both the location privacy security and energy efficiency markedly,especially in large-scale WSNs. 展开更多
关键词 wireless sensor networks source-location privacy energy efficiency k-hop cluster circular routing
在线阅读 下载PDF
Energy-balanced clustering protocol for data gathering in wireless sensor networks with unbalanced traffic load 被引量:1
11
作者 奎晓燕 王建新 张士庚 《Journal of Central South University》 SCIE EI CAS 2012年第11期3180-3187,共8页
Energy-efficient data gathering in multi-hop wireless sensor networks was studied,considering that different node produces different amounts of data in realistic environments.A novel dominating set based clustering pr... Energy-efficient data gathering in multi-hop wireless sensor networks was studied,considering that different node produces different amounts of data in realistic environments.A novel dominating set based clustering protocol (DSCP) was proposed to solve the data gathering problem in this scenario.In DSCP,a node evaluates the potential lifetime of the network (from its local point of view) assuming that it acts as the cluster head,and claims to be a tentative cluster head if it maximizes the potential lifetime.When evaluating the potential lifetime of the network,a node considers not only its remaining energy,but also other factors including its traffic load,the number of its neighbors,and the traffic loads of its neighbors.A tentative cluster head becomes a final cluster head with a probability inversely proportional to the number of tentative cluster heads that cover its neighbors.The protocol can terminate in O(n/lg n) steps,and its total message complexity is O(n2/lg n).Simulation results show that DSCP can effectively prolong the lifetime of the network in multi-hop networks with unbalanced traffic load.Compared with EECT,the network lifetime is prolonged by 56.6% in average. 展开更多
关键词 ENERGY-BALANCE CLUSTERING data gathering wireless sensor networks unbalanced traffic load
在线阅读 下载PDF
PIR-based data integrity verification method in sensor network
12
作者 Yong-Ki Kim Kwangnam Choi +1 位作者 Jaesoo Kim JungHo Seok 《Journal of Central South University》 SCIE EI CAS 2014年第10期3883-3888,共6页
Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, ... Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, it is necessary to verify data integrity to properly respond to an adversary's ill-intentioned data modification. In sensor network environment, the data integrity verification method verifies the final data only, requesting multiple communications. An energy-efficient private information retrieval(PIR)-based data integrity verification method is proposed. Because the proposed method verifies the integrity of data between parent and child nodes, it is more efficient than the existing method which verifies data integrity after receiving data from the entire network or in a cluster. Since the number of messages for verification is reduced, in addition, energy could be used more efficiently. Lastly, the excellence of the proposed method is verified through performance evaluation. 展开更多
关键词 data integrity VERIFICATION private information retrieval sensor network
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部