期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
分布式信息融合的物联网事件检测方法 被引量:3
1
作者 楼晓俊 鲍必赛 刘海涛 《南京邮电大学学报(自然科学版)》 北大核心 2012年第1期12-16,共5页
事件检测是物联网感知技术的一项重要应用。由于感知节点资源受限,事件检测准确率与节点能量有效性较难平衡。提出了一种新的物联网事件检测方法,基于分布式无线传感器网络,采用特征选择与人工智能学习算法,对感知数据进行局部与全局的... 事件检测是物联网感知技术的一项重要应用。由于感知节点资源受限,事件检测准确率与节点能量有效性较难平衡。提出了一种新的物联网事件检测方法,基于分布式无线传感器网络,采用特征选择与人工智能学习算法,对感知数据进行局部与全局的二级信息融合,在降低节点功耗的同时提升了检测的准确率。进行要地周界入侵事件检测实验,结果表明,该方法相比传统的事件检测方法更加有效。 展开更多
关键词 物联 事件检测 分布式传感网 特征选择 数据融合
在线阅读 下载PDF
一种基于RFID和WSN的分布式节点定位方法 被引量:2
2
作者 吕小微 《电子技术应用》 2018年第10期106-108,113,共4页
射频识别(RFID)技术和无线传感网(WSN)技术在当今移动定位、目标识别与跟踪方面具有广泛的应用。针对这两种技术在定位领域的应用局限,如感应距离、识别效率、组网能力等方面限制,提出一种网络节点定位方法,将具有标识能力的射频识别(RF... 射频识别(RFID)技术和无线传感网(WSN)技术在当今移动定位、目标识别与跟踪方面具有广泛的应用。针对这两种技术在定位领域的应用局限,如感应距离、识别效率、组网能力等方面限制,提出一种网络节点定位方法,将具有标识能力的射频识别(RFID)技术与具有通信、传感能力的无线传感网(WSN)技术相结合。首先,利用射频标签的感应范围获取准确的参考区域;然后,采用基于指纹的非测距定位方法在选定参考区域估算移动节点实时位置。仿真结果表示,在分布式网络定位应用中,所提出的算法有效提升了移动节点的定位精度,同时节约了网络资源,提升了定位效率。 展开更多
关键词 射频识别 无线 移动定位 分布式传感网 指纹
在线阅读 下载PDF
Distributed Connectivity Restoration Strategy for Movable Sensor Networks 被引量:1
3
作者 MA Guizhen YANG Yang +3 位作者 QIU Xuesong GAO Zhipeng LI He XIAO Xiangyue 《China Communications》 SCIE CSCD 2014年第A01期156-163,共8页
Failure of one or multiple critical nodes may partition wireless sensor networks into disjoint segments, and thus brings negative effect on the applications. We propose DCRS, a Distributed Connectivity Restoration Str... Failure of one or multiple critical nodes may partition wireless sensor networks into disjoint segments, and thus brings negative effect on the applications. We propose DCRS, a Distributed Connectivity Restoration Strategy to tolerate the failure of one critical node. Because of the energy restriction of sensor nodes, the energy overhead of the recovery process should be minimized to extend the lifetime of the network. To achieve it, we first design a novel algorithm to identify 2-critical nodes only relying on the positional information of 1-hop neighbors and some 2-hop neighbors, and then we present the criteria to select an appropriate backup for each critical node. Finally, we improve the cascaded node movement algorithm by determining whether a node can move to another non-adjacent node directly or not to reduce the number of nodes moved. The effectiveness of DCRS is validated through extensive simulation experiments. 展开更多
关键词 movable sensor networks connectivity recovery critical node
在线阅读 下载PDF
Distributed Key Management Scheme against Sybil Attacks of Wireless Sensor Network
4
作者 Xu Junfeng Wang Yongjian 《China Communications》 SCIE CSCD 2012年第5期55-63,共9页
Wireless sensor network nodes (WSN nodes) have limited computing power, storage ca-pacity, conmmunication capabilities and energy and WSN nodes are easy to be paralyzed by Sybil at- tack. In order to prevent Sybil a... Wireless sensor network nodes (WSN nodes) have limited computing power, storage ca-pacity, conmmunication capabilities and energy and WSN nodes are easy to be paralyzed by Sybil at- tack. In order to prevent Sybil attacks, a new key distribution scheme for wireless sensor networks is presented. In this scheme, the key inforrmtion and node ID are associated, and then the attacker is dif-ficult to forge identity ID and the key inforrmtion corresponding to ID can not be forged. This scheme can use low-power to resist the Syhil attack and give full play to the resource advantages of the cluster head. The computing, storage and corrn^ni- cation is rminly undertaken by the cluster head o- verhead to achieve the lowest energy consumption and resist against nodes capture attack. Theoretical analysis and experimental results show that com- pared with the traditional scheme presented in Ref. [14], the capture rate of general nodes of cluster re-duces 40%, and the capture rate of cluster heads reduces 50%. So the scheme presented in this pa-per can improve resilience against nodes capture at- tack and reduce node power consumption. 展开更多
关键词 WSN sybil attack key distribution CLUSTER
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部