scholarly journals Wireless Sensor Network Multi-Hop Positioning Algorithm Based on Continuous Regression

2016 ◽  
Vol 12 (10) ◽  
pp. 11
Author(s):  
Weimin Han ◽  
Shijun Li ◽  
Weidong Li

<p style="margin: 0in 0in 10pt;"><span style="-ms-layout-grid-mode: line;"><span style="font-family: Times New Roman; font-size: small;">The traditional multi-hop positioning algorithm is easily affected by the network anisotropy, thus resulting in unstable positioning performance. The wireless sensor network multi-hop positioning algorithm based on continuous regression is put forwarded in the paper to address this problem. By utilizing the continuous regression model, the mapping relationship between the hop count and Euclidean distance is constructed so as to transform the positioning process model into regression prediction. Theoretical analysis and simulation results show that the improved algorithm improves the positioning accuracy, and avoids the influence of the network topology anisotropy on the performance of the algorithm. The algorithm requires little expenditure and few parameters so it can be adapted to wireless sensor networks with irregular nodes distribution, and can be of great engineering application value.</span></span></p>

2016 ◽  
Vol 12 (10) ◽  
pp. 86 ◽  
Author(s):  
Jingyi Bo ◽  
Yubin Wang ◽  
Na Xu

<span style="font-family: 'Times New Roman',serif; font-size: 10pt; -ms-layout-grid-mode: line; mso-fareast-font-family: SimSun; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;">Combining the characteristics of wireless sensor network, the ant colony algorithm is applied to a wireless sensor network, and a wireless sensor network route algorithm based on energy equilibrium is proposed in this paper. This algorithm takes the energy factor into the consideration of selection of route based on probability and enhanced calculation of information so as to find out the optimal route from the source node to the target node with low cost and balanced energy, and it prolongs the life cycle of the whole network</span><span style="font-family: 'Times New Roman',serif; font-size: 10pt; mso-fareast-font-family: SimSun; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;">.</span>


2019 ◽  
Vol 8 (1) ◽  
pp. 57 ◽  
Author(s):  
Shaymaa Al Hayali ◽  
Osman Ucan ◽  
Javad Rahebi ◽  
Oguz Bayat

In this paper an individual - suitable function calculating design for WSNs is conferred. A multi-agent- located construction for WSNs is planned and an analytical type of the active combination is built for the function appropriation difficulty. The purpose of this study is to identify the threats identified by clustering genetic algorithms in clustering networks, which will prolong network lifetime. In addition, optimal routing is done using the fuzzy function. Simulation results show that the simulated genetic algorithm improves diagnostic speed and improves energy consumption.©2019. CBIORE-IJRED. All rights reservedArticle History: Received May 16th 2018; Received in revised form Octiber 6th 2018; Accepted Jnauary 6th 2019; Available onlineHow to Cite This Article: Al-Hayali, S., Ucan, O., Rahebi, J. and Bayat, O. (2019) Detection of Attacks on Wireless Sensor Network Using Genetic Algorithms Based on Fuzzy. International Journal of Renewable Energy Development, 8(1), 57-64.https://doi.org/10.14710/ijred.8.1.57-64


2017 ◽  
Vol 13 (03) ◽  
pp. 174
Author(s):  
Haishan Zhang ◽  
Xinchun Wang ◽  
Chenghui Jia

<span style="font-family: 'Times New Roman',serif; font-size: 12pt; mso-fareast-font-family: SimSun; mso-fareast-theme-font: minor-fareast; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;">The injection attack of false data is a common attack form in wireless sensor network. This attack form achieves the purpose of consuming limited network resources and severely threatens the safety of wireless sensor network through consistent sending false data. This paper proposes a type of false data filtering strategy based on neighbor node monitoring. The idea of this strategy is to enable each node to store the neighbor node's information within the two-hop range. In the meantime, the data package determines whether the upstream node is original node or data forwarding intermediate node through whether ACK package is remitted by the upstream node to avoid the impersonation of wireless sensor network node by malicious node. The false data package of malicious node will be filtered within one hop. The simulation experiment verifies the filtering performance and anti-capture performance of this strategy, thus guaranteeing the safety of wireless sensor network.</span>


2014 ◽  
Vol 2014 ◽  
pp. 1-8 ◽  
Author(s):  
Qingsong Hu ◽  
Lixin Wu ◽  
Fei Geng ◽  
Can Cao

WSN (wireless sensor network) is a perfect tool of temperature monitoring in coal goaf. Based on the three-zone theory of goaf, the GtmWSN model is proposed, and its dynamic features are analyzed. Accordingly, a data transmission scheme, named DTDGD, is worked out. Firstly, sink nodes conduct dynamic grid division on the GtmWSN according to virtual semicircle. Secondly, each node will confirm to which grid it belongs based on grid number. Finally, data will be delivered to sink nodes with greedy forward and hole avoidance. Simulation results and field data showed that the GtmWSN and DTDGD satisfied the lifetime need of goaf temperature monitoring.


2017 ◽  
Vol 13 (03) ◽  
pp. 113
Author(s):  
Wenjin Yu ◽  
Yong Li ◽  
Yuangeng Xu

<span style="font-family: 'Times New Roman',serif; font-size: 12pt; mso-fareast-font-family: SimSun; mso-fareast-theme-font: minor-fareast; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;">With the wide application of the wireless sensor network, the security of the sensor network is becoming increasingly important. In this paper, based on node ranging, a new intrusion node detection algorithm has been proposed for external pseudo-node detection in wireless sensor networks. The presence of the nodes under copying-attack and the pseudo-nodes in the network can be detected through inter-node ranging with appropriate use of various sensors of nodes themselves and comprehensive analysis of ranging results. Operating in a stand-alone or embedded manner, this method has remedied the defects in the traditional principle of attack detection. The simulation results show that the proposed method has excellent applicability in wireless sensor security detection.</span>


2012 ◽  
Vol 157-158 ◽  
pp. 503-506 ◽  
Author(s):  
Tao Yang ◽  
Pan Guo Fan ◽  
De Jun Mu

Wireless sensor network is always deployed in specific area for intrusion detection and environmental monitoring. The sensor nodes suffer mostly from their limited battery capacity.Maximizing the lifetime of the entire networks is mainly necessary considered in the design. Sliding the sensors in different barriers under the optimal barrier construction is a good solution for both maximizing network lifetime and providing predetermined coverage ratio. The simulation results demonstrate that the scheme can effectively reduce the energy consumption of the wireless sensor network and increase the network lifetime.


2011 ◽  
Vol 20 (06) ◽  
pp. 1051-1066 ◽  
Author(s):  
LINFENG LIU

Underwater sensor networks will find many oceanic applications in near future, and the deployment problem in 3D sensor networks has not been paid enough attention at present. In order to maximize the network lifetime, a deployment algorithm (UDA) for underwater sensor networks in ocean environment is proposed. UDA can determine and select the best cluster shape, then partition the space into layers and clusters while maintaining full coverage and full connectivity. In addition, nodes closer to sinks are possible to bear a heavier data-relaying mission. UDA sets different node deployment densities at different layers in response to the potential relay discrepancy. The simulation results suggest UDA can choose the proper cluster shape to get the maximum underwater wireless sensor network lifetime approximately.


Sign in / Sign up

Export Citation Format

Share Document