A novel immune-swarm intelligence (ISI) based algorithm for solving the deterministic coverage problems of wireless sensor networks was presented.It makes full use of information sharing and retains diversity from the...A novel immune-swarm intelligence (ISI) based algorithm for solving the deterministic coverage problems of wireless sensor networks was presented.It makes full use of information sharing and retains diversity from the principle of particle swarm optimization (PSO) and artificial immune system (AIS).The algorithm was analyzed in detail and proper swarm size,evolving generations,gene-exchange individual order,and gene-exchange proportion in molecule were obtained for better algorithm performances.According to the test results,the appropriate parameters are about 50 swarm individuals,over 3 000 evolving generations,20%-25% gene-exchange proportion in molecule with gene-exchange taking place between better fitness affinity individuals.The algorithm is practical and effective in maximizing the coverage probability with given number of sensors and minimizing sensor numbers with required coverage probability in sensor placement.It can reach a better result quickly,especially with the proper calculation parameters.展开更多
A novel backoff algorithm in CSMA/CA-based medium access control (MAC) protocols for clustered sensor networks was proposed. The algorithm requires that all sensor nodes have the same value of contention window (CW) i...A novel backoff algorithm in CSMA/CA-based medium access control (MAC) protocols for clustered sensor networks was proposed. The algorithm requires that all sensor nodes have the same value of contention window (CW) in a cluster, which is revealed by formulating resource allocation as a network utility maximization problem. Then, by maximizing the total network utility with constrains of minimizing collision probability, the optimal value of CW (Wopt) can be computed according to the number of sensor nodes. The new backoff algorithm uses the common optimal value Wopt and leads to fewer collisions than binary exponential backoff algorithm. The simulation results show that the proposed algorithm outperforms standard 802.11 DCF and S-MAC in average collision times, packet delay, total energy consumption, and system throughput.展开更多
Pure inertial navigation system(INS) has divergent localization errors after a long time. In order to compensate the disadvantage, wireless sensor network(WSN) associated with the INS was applied to estimate the mobil...Pure inertial navigation system(INS) has divergent localization errors after a long time. In order to compensate the disadvantage, wireless sensor network(WSN) associated with the INS was applied to estimate the mobile target positioning. Taking traditional Kalman filter(KF) as the framework, the system equation of KF was established by the INS and the observation equation of position errors was built by the WSN. Meanwhile, the observation equation of velocity errors was established by the velocity difference between the INS and WSN, then the covariance matrix of Kalman filter measurement noise was adjusted with fuzzy inference system(FIS), and the fuzzy adaptive Kalman filter(FAKF) based on the INS/WSN was proposed. The simulation results show that the FAKF method has better accuracy and robustness than KF and EKF methods and shows good adaptive capacity with time-varying system noise. Finally, experimental results further prove that FAKF has the fast convergence error, in comparison with KF and EKF methods.展开更多
Remote tracking for mobile targets is one of the most important applications in wireless sensor networks (WSNs). A target tracking protoco–exponential distributed predictive tracking (EDPT) is proposed. To reduce...Remote tracking for mobile targets is one of the most important applications in wireless sensor networks (WSNs). A target tracking protoco–exponential distributed predictive tracking (EDPT) is proposed. To reduce energy waste and response time, an improved predictive algorithm–exponential smoothing predictive algorithm (ESPA) is presented. With the aid of an additive proportion and differential (PD) controller, ESPA decreases the system predictive delay effectively. As a recovery mechanism, an optimal searching radius (OSR) algorithm is applied to calculate the optimal radius of the recovery zone. The simulation results validate that the proposed EDPT protocol performes better in terms of track failed ratio, energy waste ratio and enlarged sensing nodes ratio, respectively.展开更多
Broadcasting is an important operation and been widely used in wireless sensor networks (WSNs). These networks are power constrained as nodes operate with limited battery power. Wireless sensor networks are spatial ...Broadcasting is an important operation and been widely used in wireless sensor networks (WSNs). These networks are power constrained as nodes operate with limited battery power. Wireless sensor networks are spatial graphs that have much more clustered and much high path-length characteristics. After considering energy- efficient broadcasting in such networks, by combining the small-world characteristic of WSNs and the properties of ant algorithm to quickly identify an optimal path, small-world power-aware broadcast algorithm is introduced and evaluated. Given different densities of network, simulation results show that our algorithm significantly improves life of networks and also reduces communication distances and power consumption.展开更多
The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key managemen...The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes.展开更多
This paper mainly studied the problem of energy conserving in wireless sensor networks for target tracking in defensing combats. Firstly, the structures of wireless sensor nodes and networks were illustrated;Secondly,...This paper mainly studied the problem of energy conserving in wireless sensor networks for target tracking in defensing combats. Firstly, the structures of wireless sensor nodes and networks were illustrated;Secondly, the analysis of existing energy consuming in the sensing layer and its calculation method were provided to build the energy conserving objective function;What’s more, the other two indicators in target tracking, including target detection probability and tracking accuracy, were combined to be regarded as the constraints of the energy conserving objective function. Fourthly, the three energy conserving approaches, containing optimizing the management scheme, prolonging the time interval between two adjacent observations, and transmitting the observations selectively, were introduced;In addition, the improved lion algorithm combined with the Logistic chaos sequence was proposed to obtain sensor management schemes. Finally, simulations had been made to prove the effectiveness of the proposed methods and algorithm.展开更多
Time synchronization is one of the base techniques in wireless sensor networks(WSNs).This paper proposes a novel time synchronization protocol which is a robust consensusbased algorithm in the existence of transmissio...Time synchronization is one of the base techniques in wireless sensor networks(WSNs).This paper proposes a novel time synchronization protocol which is a robust consensusbased algorithm in the existence of transmission delay and packet loss.It compensates for transmission delay and packet loss firstly,and then,estimates clock skew and clock offset in two steps.Simulation and experiment results show that the proposed protocol can keep synchronization error below 2μs in the grid network of 10 nodes or the random network of 90 nodes.Moreover,the synchronization accuracy in the proposed protocol can keep constant when the WSN works up to a month.展开更多
We analyze and summarize the literatures on secure routing protocols published since 2003.Firstly,threats and attacks on sensor network routing are sorted and summarized.Then the current secure routing protocols are a...We analyze and summarize the literatures on secure routing protocols published since 2003.Firstly,threats and attacks on sensor network routing are sorted and summarized.Then the current secure routing protocols are also classified.According to the taxonomy,some typical secure routing protocols are clarified particularly.Besides,the advantage and disadvantage of these secure routing protocols are compared and analyzed.Finally,we conclude this paper and prospect the future work.展开更多
Geographic location of nodes is very useful in a sensor network. Previous localization algorithms assume that there exist some anchor nodes in this kind of network, and then other nodes are estimated to create their c...Geographic location of nodes is very useful in a sensor network. Previous localization algorithms assume that there exist some anchor nodes in this kind of network, and then other nodes are estimated to create their coordinates. Once there are not anchors to be deployed, those localization algorithms will be invalidated. Many papers in this field focus on anchor-based solutions. The use of anchors introduces many limitations, since anchors require external equipments such as global position system, cause additional power consumption. A novel positioning algorithm is proposed to use a virtual coordinate system based on a new concept--virtual anchor. It is executed in a distributed fashion according to the connectivity of a node and the measured distances to its neighbors. Both the adjacent member information and the ranging distance result are combined to generate the estimated position of a network, one of which is independently adopted for localization previously. At the position refinement stage the intermediate estimation of a node begins to be evaluated on its reliability for position mutation; thus the positioning optimization process of the whole network is avoided falling into a local optimal solution. Simulation results prove that the algorithm can resolve the distributed localization problem for anchor-free sensor networks, and is superior to previous methods in terms of its positioning capability under a variety of circumstances.展开更多
基金Project(2008BA00400)supported by the Foundation of Department of Science and Technology of Jiangxi Province,China
文摘A novel immune-swarm intelligence (ISI) based algorithm for solving the deterministic coverage problems of wireless sensor networks was presented.It makes full use of information sharing and retains diversity from the principle of particle swarm optimization (PSO) and artificial immune system (AIS).The algorithm was analyzed in detail and proper swarm size,evolving generations,gene-exchange individual order,and gene-exchange proportion in molecule were obtained for better algorithm performances.According to the test results,the appropriate parameters are about 50 swarm individuals,over 3 000 evolving generations,20%-25% gene-exchange proportion in molecule with gene-exchange taking place between better fitness affinity individuals.The algorithm is practical and effective in maximizing the coverage probability with given number of sensors and minimizing sensor numbers with required coverage probability in sensor placement.It can reach a better result quickly,especially with the proper calculation parameters.
基金Project(60772088) supported by the National Natural Science Foundation of China
文摘A novel backoff algorithm in CSMA/CA-based medium access control (MAC) protocols for clustered sensor networks was proposed. The algorithm requires that all sensor nodes have the same value of contention window (CW) in a cluster, which is revealed by formulating resource allocation as a network utility maximization problem. Then, by maximizing the total network utility with constrains of minimizing collision probability, the optimal value of CW (Wopt) can be computed according to the number of sensor nodes. The new backoff algorithm uses the common optimal value Wopt and leads to fewer collisions than binary exponential backoff algorithm. The simulation results show that the proposed algorithm outperforms standard 802.11 DCF and S-MAC in average collision times, packet delay, total energy consumption, and system throughput.
基金Project(2013AA06A411)supported by the National High Technology Research and Development Program of ChinaProject(CXZZ14_1374)supported by the Graduate Education Innovation Program of Jiangsu Province,ChinaProject supported by the Priority Academic Program Development of Jiangsu Higher Education Institutions,China
文摘Pure inertial navigation system(INS) has divergent localization errors after a long time. In order to compensate the disadvantage, wireless sensor network(WSN) associated with the INS was applied to estimate the mobile target positioning. Taking traditional Kalman filter(KF) as the framework, the system equation of KF was established by the INS and the observation equation of position errors was built by the WSN. Meanwhile, the observation equation of velocity errors was established by the velocity difference between the INS and WSN, then the covariance matrix of Kalman filter measurement noise was adjusted with fuzzy inference system(FIS), and the fuzzy adaptive Kalman filter(FAKF) based on the INS/WSN was proposed. The simulation results show that the FAKF method has better accuracy and robustness than KF and EKF methods and shows good adaptive capacity with time-varying system noise. Finally, experimental results further prove that FAKF has the fast convergence error, in comparison with KF and EKF methods.
基金supported by the National Basic Research Program of China (973 Program) (2010CB731800)the National Natural Science Foundation of China (60934003+2 种基金 60974123 60804010)the Hebei Provincial Educational Foundation of China (2008147)
文摘Remote tracking for mobile targets is one of the most important applications in wireless sensor networks (WSNs). A target tracking protoco–exponential distributed predictive tracking (EDPT) is proposed. To reduce energy waste and response time, an improved predictive algorithm–exponential smoothing predictive algorithm (ESPA) is presented. With the aid of an additive proportion and differential (PD) controller, ESPA decreases the system predictive delay effectively. As a recovery mechanism, an optimal searching radius (OSR) algorithm is applied to calculate the optimal radius of the recovery zone. The simulation results validate that the proposed EDPT protocol performes better in terms of track failed ratio, energy waste ratio and enlarged sensing nodes ratio, respectively.
文摘Broadcasting is an important operation and been widely used in wireless sensor networks (WSNs). These networks are power constrained as nodes operate with limited battery power. Wireless sensor networks are spatial graphs that have much more clustered and much high path-length characteristics. After considering energy- efficient broadcasting in such networks, by combining the small-world characteristic of WSNs and the properties of ant algorithm to quickly identify an optimal path, small-world power-aware broadcast algorithm is introduced and evaluated. Given different densities of network, simulation results show that our algorithm significantly improves life of networks and also reduces communication distances and power consumption.
基金Project(61100201) supported by National Natural Science Foundation of ChinaProject(12ZZ019) supported by Technology Innovation Research Program,Shang Municipal Education Commission,China+1 种基金Project(LYM11053) supported by the Foundation for Distinguished Young Talents in Higher Education of Guangdong Province,ChinaProject(NCET-12-0358) supported by New Century Excellent Talentsin University,Ministry of Education,China
文摘The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes.
基金funded by (Defense Pre-Research Fund Project of China), grant number 012015012600A2203NSFC (Natural Science Foundation of China), grant number 61573374。
文摘This paper mainly studied the problem of energy conserving in wireless sensor networks for target tracking in defensing combats. Firstly, the structures of wireless sensor nodes and networks were illustrated;Secondly, the analysis of existing energy consuming in the sensing layer and its calculation method were provided to build the energy conserving objective function;What’s more, the other two indicators in target tracking, including target detection probability and tracking accuracy, were combined to be regarded as the constraints of the energy conserving objective function. Fourthly, the three energy conserving approaches, containing optimizing the management scheme, prolonging the time interval between two adjacent observations, and transmitting the observations selectively, were introduced;In addition, the improved lion algorithm combined with the Logistic chaos sequence was proposed to obtain sensor management schemes. Finally, simulations had been made to prove the effectiveness of the proposed methods and algorithm.
文摘Time synchronization is one of the base techniques in wireless sensor networks(WSNs).This paper proposes a novel time synchronization protocol which is a robust consensusbased algorithm in the existence of transmission delay and packet loss.It compensates for transmission delay and packet loss firstly,and then,estimates clock skew and clock offset in two steps.Simulation and experiment results show that the proposed protocol can keep synchronization error below 2μs in the grid network of 10 nodes or the random network of 90 nodes.Moreover,the synchronization accuracy in the proposed protocol can keep constant when the WSN works up to a month.
基金supported by the National Natural Science Foundation of China(No. 60573141, 60773041)National High Technology Research and Devel-opment Program of China(863 Program) (No. 2006AA01Z201, 2006AA01Z219, 2007AA01Z404, 2007AA01 Z478)the Provincial Jiangsu High Technology Research Program(No. BG2006001)
文摘We analyze and summarize the literatures on secure routing protocols published since 2003.Firstly,threats and attacks on sensor network routing are sorted and summarized.Then the current secure routing protocols are also classified.According to the taxonomy,some typical secure routing protocols are clarified particularly.Besides,the advantage and disadvantage of these secure routing protocols are compared and analyzed.Finally,we conclude this paper and prospect the future work.
基金the National Natural Science Foundation of China (60673054, 60773129)theExcellent Youth Science and Technology Foundation of Anhui Province of China.
文摘Geographic location of nodes is very useful in a sensor network. Previous localization algorithms assume that there exist some anchor nodes in this kind of network, and then other nodes are estimated to create their coordinates. Once there are not anchors to be deployed, those localization algorithms will be invalidated. Many papers in this field focus on anchor-based solutions. The use of anchors introduces many limitations, since anchors require external equipments such as global position system, cause additional power consumption. A novel positioning algorithm is proposed to use a virtual coordinate system based on a new concept--virtual anchor. It is executed in a distributed fashion according to the connectivity of a node and the measured distances to its neighbors. Both the adjacent member information and the ranging distance result are combined to generate the estimated position of a network, one of which is independently adopted for localization previously. At the position refinement stage the intermediate estimation of a node begins to be evaluated on its reliability for position mutation; thus the positioning optimization process of the whole network is avoided falling into a local optimal solution. Simulation results prove that the algorithm can resolve the distributed localization problem for anchor-free sensor networks, and is superior to previous methods in terms of its positioning capability under a variety of circumstances.