An algorithm based on market competition for wireless sensor network connectivity and coverage

Author(s):  
Li Peng ◽  
Desheng Wang ◽  
Long Zhao
2013 ◽  
Vol 818 ◽  
pp. 230-236
Author(s):  
Yu Quan Zhang

A secure scheme for wireless sensor network is presented through dividing sensing area into clusters and using the overlap key sharing (OKS) concept in this paper. The two-dimensional sensing square is divided into a number of small squares called cells, four of which consist of a cluster called logical group. The overlap key sharing protocol creates long bit clusters as the key cluster pools and distributes a sub-group to store every sensor as the key cluster. Analysis and comparison demonstrate this scheme enhances the WSN security, realizes the flexile secure grades for WSNs, and has good network connectivity.


2019 ◽  
Vol 2019 ◽  
pp. 1-11 ◽  
Author(s):  
Yongwen Du ◽  
Zhangmin Wang ◽  
Junhui Gong ◽  
Ning Xu ◽  
Xiaohui Hu

Because of the complexity of the environment and the limited resources of nodes, there will be an imbalanced energy consumption and a short life among nodes in the wireless sensor network. In this paper, by introducing the concept of game theory and supermodel game theory, we solve the challenge of a wireless sensor network topology control method based on cross-layer information design. The cross-layer information such as node degree, network connectivity, and MAC layer interference is integrated into the design of utility function to establish a new topological game model. Then, based on this topology control model, we propose a cross-layer optimized energy-balanced topology control algorithm (COETC). Compared with other algorithms, our COETC algorithm not only guarantees the network connectivity and robustness while reducing the required node transmitting power but also achieves good energy balance and high energy efficiency. Ultimately, our method effectively prolongs network lifetime and improves network performance.


Author(s):  
Andrey Makashov ◽  
Andrew Makhorin ◽  
Maxim Terentiev

A wireless sensor network (WSN) of a tree-like topology is considered, which performs measurements and transmits their results to the consumer. Under the interference influence, the WSN nodes transmitters low power makes the transmitted information vulnerable, which leads to significant data loss. To reduce the data loss during transmission, a noise-immune WSN model is proposed. Such a WSN, having detected a stable connection absence between a pair of nodes, transfers the interaction between these nodes to a radio channel free from interference influence. For this, the model, in addition to forming a network and transferring application data, provides for checking the communication availability based on the keep-alive mechanism and restoring the network with a possible channel change. A feature point of the proposed approach is the ability to restore network connectivity when exposed to interference of significant power and duration, which makes it impossible to exchange service messages on the channel selected for the interaction of nodes. To support the model, work algorithms and data structures have been developed, indicators have been formalized to assess an anti-jamming system work quality.


Author(s):  
Li Zhu ◽  
Jianwu Li

In accordance with the features of variety and disparity of traffic information, using wireless sensor network to monitor traffic environment, this paper proposes an optimization algorithm of applying wireless sensor to monitor traffic environment. In this paper, to optimize the coverage, we analyze the irregularity of network sensing areas based on environmental factors and propose a wireless sensor network optimization algorithm. According to the irregularity of network node sensing areas, we build an irregular network coverage model, divide the node monitoring area to improve the network coverage and make corrections to the coverage according to the network coverage connectivity and other features. The simulation test proves that the method proposed in this paper can avoid too many redundant nodes - it only requires a reasonable number of network nodes. This will reduce network energy costs and increase network connectivity without affecting the coverage, thus improving the network performance. the algorithm can satisfy the requirements of real-time acquisition, processing and remote supervision of traffic information.


Sign in / Sign up

Export Citation Format

Share Document