无线传感器网络拓扑控制与优化研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
无线传感器网络是当前信息技术领域的一个热点研究方向,可用于军事侦察、环境监测、城市交通管理、仓储管理等军事和民用领域。在影响无线传感器网络性能的众多因素之中,拓扑控制是核心问题之一,因此如何优化网络拓扑结构、增强网络拓扑的自适应性和鲁棒性,并为上层通信协议提供良好的底层拓扑支撑是拓扑控制与优化研究的重要问题。本文对无线传感器网络拓扑控制与优化进行了研究,所取得的主要研究成果为:
     1.合适的节点发射功率是保证网络连通性和覆盖度,延长网络生命周期的重要保证。为了寻求最优的发射功率,在保证网络通信连通的同时优化拓扑结构,本文提出了一种基于非合作博弈的无线传感器网络功率控制算法。该算法将节点的功率控制抽象为一个多人的非合作博弈过程,通过节点间的博弈进行功率控制。算法在设计功率控制的支付函数时充分考虑了节点剩余能量的因素,通过选择合适的效用因子及价格因子组合能有效地优化网络中各节点的发射功率,降低网络的总发射功率,从而节约节点能量。此外,本文还求出了功率控制博弈的纳什均衡点,并证明了纳什均衡的存在性和唯一性。仿真结果表明了算法具有很好的收敛性,通过功率控制能有效地优化网络拓扑结构,延长网络的生命周期。
     2.合理有效的分簇是节约能量,优化无线传感器网络拓扑的关键。针对该问题,本文提出了一种基于贝叶斯博弈的无线传感器网络分簇算法。算法将无线传感器网络节点的簇头选举抽象为一个多人的博弈过程,节点之间通过不完全信息的静态博弈进行簇头选举。算法在贝叶斯分簇的支付函数设计时充分考虑了节点能耗和路径损耗等因素,因此通过节点间的贝叶斯博弈能实现簇头的合理分布,在优化网络拓扑的同时可使网络能耗更加稳定、能量分布更加均匀,有效地延长网络生命周期。
     3.部署对网络拓扑构成和网络布局优化都有重要的影响,针对无线传感器网络中传统网络部署方法不能很好地适应动态网络环境,存在监测盲区的问题。本文提出了一种基于模糊控制的无线传感器网络部署优化算法。算法将模糊控制策略用于无线传感器网络的节点部署中,通过对移动节点的移动距离和移动方向进行模糊控制实现节点的合理部署,以提高网络的覆盖率。由于在模糊控制规则的设计中充分考虑了节点剩余能量、节点路径损耗、节点邻居数等因素,因此该算法能有效提高网络覆盖率,使网络拓扑结构更加健全完善,延长网络生命周期。
     4.构建高可靠性和高抗毁性的拓扑结构是无线传感器网络面临的新问题。针对该问题,本文分别提出了两种基于无标度网络的拓扑演化算法。在基于能量有效的无标度传感器网络拓扑演化算法中,算法首先通过分簇实现簇头的合理分布,然后按照无标度网络随机行走的方式进行簇头间的拓扑演化。由于在拓扑演化过程中充分考虑了节点剩余能量、节点度等因素。因此演化后的网络拓扑具有较好的负载均衡和能量均衡,适于无线传感器网络的实际应用;在具有重构机制的无标度传感器网络拓扑演化算法中,算法首先通过分簇实现簇头的合理分布,然后根据无线传感器网络实际应用中随机加点、随机去点、随机去边和重连的方式进行簇头间的拓扑演化。由于在拓扑演化时引入了重构机制,并且考虑了节点和链路变化的随机性问题,因此演化的网络拓扑具有很好的自愈性、重构性和可调性。仿真结果表明,利用上述两种算法演化的网络拓扑在随机和蓄意打击下都具有较高的鲁棒性,可满足恶劣环境对无线传感器网络鲁棒性的要求。
     5.针对无线传感器网络中如何判断节点重要性的问题,本文提出了一种基于拓扑贡献和能量有效的无线传感器网络节点重要性评价方法。该方法首先综合考虑网络拓扑结构和网络能耗之间的关系,设计了一种测度网络拓扑抗毁性和网络能耗的综合评价指标;其次在该评价指标的基础上设计了无线传感器网络节点重要性评价算法。仿真结果表明了该评价方法的合理性和有效性,利用该评价方法能有效地判断网络中重要节点的位置,通过对重要节点的保护能有效地优化网络拓扑结构,增强网络抗毁性。此外,本文还对在网络中加入超级节点实现重要节点的保护问题进行了研究。
The wireless senor networks (WSNs) have been hot research area over recent yearsdue to their promising applications in environment monitoring, battlefield surveillance,traffic and warehouse managements. Topology control is one of the core issues in WSNs.A well-designed network topology not only provides a good underlying topologysupport for upper layer protocols, but also helps improve the robustness and adaptivityof the network. Therefore how to optimize the network topology is of great significance.Topology control and optimization issues are studied in this dissertation, with specificstudies as follows:
     1. Suitable transmission power plays a crucial role in ensuring networkconnectivity, network coverage and prolonging network lifetime. In this dissertation, wepropose a non-cooperative game-based power control algorithm which determines theoptimal transmit power while ensuring network connectivity. The power controloptimization is cast as strategic non-cooperative games, where each sensor node is aplayer that competes against the others in resource allocation to maximize its ownpayoff function. Residual energy of each node is taken into account when designing thepayoff function. By selecting a proper utility factor and a price factor, the algorithm canconsiderably reduce the total transmit power, and thus save the network’s energy. Inaddition, the nash equilibrium is found, with its existence and uniqueness proved.Simulation results show that the proposed power control algorithm has a goodconvergence property, and can effectively prolong the network lifetime and provide awell-designed network topology.
     2. Effective clustering is important to the optimization of the network topologyand to the energy saving. In this dissertation, we propose a bayesian game-basedclustering algorithm. In the algorithm, the election of the cluster head is modeled as amulti-player game, in which the cluster head is elected through static games withincomplete information. The node energy consumption and the path loss are fully takeninto our consideration when designing the payoff function. Hence the algorithm canprovide a more reasonable distribution of the cluster heads, a more stable energyconsumption and a more uniform energy distribution with the optimization of networktopology. As a consequence, the network lifetime can be prolonged considerably.
     3. Node deployment strategy is one of the key issues in network topology control.Traditional node deployment strategies cannot well adapt to the dynamic networkenvironment and suffer from blind spot area. To overcome these difficulties, weintroduce a fuzzy control strategy for node deployment. Through fuzzy control of themovement distance and direction, the proposed node deployment strategy provides areasonable deployment of the nodes and improves the network coverage. Since theresidual energy, path loss and the number of neighbors are considered in the design offuzzy control rules, the algorithm can effectively improve network coverage, makenetwork topology more perfect and prolong network lifetime.
     4. Constructing a topological structure that has a high reliability and highsurvivability is a challenging and new problem in WSNs. Two topology evolutionalgorithms are proposed based on scale-free network topologies.1) A energy-efficienttopology evolution algorithm based on scale-free network topologies is introduced. Thealgorithm first achieves a reasonable distribution of the cluster heads, and then thetopology evolves via scale-free network random walks. Since residual energy, nodedegree and other factors are sufficiently considered during the topology evolution, thefinally obtained topology has an acceptable load and a good energy balance, thus issuitable for the practical application of WSNs;2) Topology evolution algorithm withreconstruction mechanism based on scale-free network topology is proposed. Thealgorithm first achieve a reasonable distribution of cluster heads, then the topologyevolves considering those factors arising from practical requirements, such as randomnode addition or deletion, and edge deletion or reconstruction. During the evolution ofthe topology, the random failures of nodes or links are fully considered, and thereconstruction mechanism is introduced. Therefore the network topologies haveattractive quality such as self-healing ability, reconstruction ability and adjustability.Simulation results demonstrate that network topologies generated by the above twoalgorithms both have high robustness under random, deliberate attacks and can meet therequirements under harsh environmental conditions in WSNs.
     5. We considered the problem of evaluating node importance in WSNs. Anevaluation method is proposed in this dissertation based on topology contributions andenergy effectiveness. Firstly, by examining the relationship between topology structureand energy consumptions, we design a comprehensive evaluation index that is able tomeasure the topology invulnerability and energy consumptions. Secondly, a nodeimportance evaluation algorithm is designed based on the evaluation index. Simulation results show that the index is rational and effective, important nodes are effectivelylocated, network topology is optimized and network survivability is enhanced withimportant nodes being protected. Furthermore, we also discuss how to protect importantnodes through adding super nodes to the network.
引文
[1] Akyildiz IF, Su W, Sankarasubramaniam Y, and Cayirci E. Wireless sensornetworks: A survey. Computer Networks.2002,38(4):393-422.
    [2] Elson J, Estrin D. Sensor Networks: A Bridge to the Physical World. Norwell:Kluwer Academic Publishers.2004:1-10.
    [3]任丰原,黄海宁,林闯.无线传感器网络.软件学报.2003,14(7):1282-1291.
    [4]崔莉,鞠海玲,苗勇等.无线传感器网络研究进展.计算机研究与发展.2005,42(1):163-174.
    [5] Byrne J A.21ideas for21stCentury. Business Week.1999,8:78-167.
    [6] Wade R, Mitehel W M, and Ptter F. Ten Emerging Technologies that will Changethe World.Technologies.2003,106(1):33-49.
    [7] Jennifer Yick, Biswanath Mukherjee, and Dipak Ghosal. Wireless sensor networksurvey.Computer Networks.2008,52(12):2292-2330.
    [8] Paolo Costa and Matteo Cesana. A cooperative approach for topology control inWireless Sensor Networks. Pervasive and Mobile Computing.2009, l5(5):526-541.
    [9] Hongli Xu and Liusheng Huang. Topology control for delay-constraint data,collection in wireless sensor networks.Computer Communications.2009,32(17):1820-1828.
    [10] Halit üster and Hui Lin. Integrated topology control and routing in wireless sensornetworks for prolonged network lifetime.Ad Hoc Networks.2011,9(5):835-851.
    [11]张学,陆桑璐,陈贵海等.无线传感器网络的拓扑控制.软件学报.2007,18(4):943-954.
    [12] Giuseppe Anastasi, Marco Conti, and Mario Di Francesco. Energy conservation inwireless sensor networks: A survey.Ad Hoc Networks.2009,7(3):537-568.
    [13] E. Ilker Oyman and Cem Ersoy. Overhead energy considerations for efficient routingin wireless sensor networks. Computer Networks.2004,46(4):465-478.
    [14] Geoff V. Merrett and Nick R. Harris. Energy managed reporting for wireless sensornetworks.Sensors and Actuators A: Physical.2008,142(1):379-389.
    [15] Jain-Shing Liu and Chun-Hung Richard Lin. Energy-efficiency clustering protocolin wireless sensor networks.Ad Hoc Networks.2005,3(3):371-388.
    [16] Li Qing, Qingxin Zhu, and Mingwen Wang. Design of a distributed energy-efficientclustering algorithm for heterogeneous wireless sensor networks. ComputerCommunications.2006,29(12):2230-2237.
    [17] Habib M. Ammari and Sajal K. Das.Scheduling protocols for homogeneous andheterogeneous k-covered wireless sensor networks. Pervasive and Mobile Computing.2011, l7(1):79-97.
    [18] Jelena Mi i and Vojislav Mi i. Wireless sensor networks: Performance, reliability,security, and beyond. Computer Communications.2006,29(13-14):2447-2449.
    [19] Saamaja Vupputuri, Kiran K. Rachuri, and C. Siva Ram Murthy. Using mobile datacollectors to improve network lifetime of wireless sensor networks with reliabilityconstraints. Journal of Parallel and Distributed Computing.2010,70(7):767-778.
    [20] Yufeng XIAO, Shanzhi CHEN, and Xin LI. Reliability evaluation of wirelesssensor networks using an enhanced OBDD algorithm. The Journal of ChinaUniversities of Posts and Telecommunications.2009,16(5):62-70.
    [21] Yi Cheng and Dharma P. Agrawal. An improved key distribution mechanism forlarge-scale hierarchical wireless sensor networks.Ad Hoc Networks.2007,5(1):35-48.
    [22] Jian Tang, Bin Hao,and Arunabha Sen.Relay node placement in large scale wirelesssensor networks.Computer Communications.2006,29(4).490-501.
    [23] Yunxia Chen and Qing Zhao. On the Lifetime of Wireless Sensor Networks. IEEECommunications Letters.2005,9(11):976-978.
    [24] Jae-Hwan Chang and Leandros assiulas. Maximum Lifetime Routing in WirelessSensor Networks. IEEE/ACM Transactions on Networking.2004,12(4):609-619.
    [25] Manish Kumar Jha and Atul Kumar Pandey. An energy-efficient multi-layer MAC(ML-MAC) protocol for wireless sensor networks.AEU International Journal ofElectronics and Communications.2011,65(3):209-216.
    [26] Chih-Yung Chang and Hsu-Ruey Chang. Energy-aware node placement, topologycontrol and MAC scheduling for wireless sensor networks. Computer Networks.2008,52(11):2189-2204.
    [27] Chong Liu, Kui Wu, Yang Xiao, et.al. Random Coverage with GuaranteedConnectivity: Joint Scheduling for Wireless Sensor Networks.IEEE Transactions onParallel and Distributed Systems.2006,17(6).562-575.
    [28] Amitabha Ghosh and Sajal K. Das.Coverage and connectivity issues in wirelesssensor networks: A survey.Pervasive and Mobile Computing.2008,4(3).303-334.
    [29] Di Tian and Nicolas D. Georganas.Connectivity maintenance and coveragepreservation in wireless sensor networks.Ad Hoc Networks.2005,3(6).744-761.
    [30] Sudip Misra, Manikonda Pavan Kumar, and Mohammad S. Obaidat. Connectivitypreserving localized coverage algorithm for area monitoring using wireless sensornetworks.Computer Communications.2011,34(12):1484-1496.
    [31] Bang Wang, Hock Beng Lim, and Di Ma.A survey of movement strategies forimproving network coverage in wireless sensor networks. Computer Communications.2009,32(13-14):1427-1436.
    [32] Dimitrios Zorbas, Dimitris Glynos, Panayiotis Kotzanikolaou, et.al. Solvingcoverage problems in wireless sensor networks using cover sets.Ad Hoc Networks.2010,8(4):400-415.
    [33] Jin Zhu, Symeon Papavassiliou, and Jie Yang. Adaptive Localized QoS-ConstrainedData Aggregation and Processing in Distributed Sensor Networks. IEEE Transactionson Parallel and Distributed Systems.2006,17(9):923-933.
    [34] Jamal N. Al-Karaki, Raza Ul-Mustafa, and Ahmed E. Kamal. Data aggregation androuting in Wireless Sensor Networks: Optimal and heuristic algorithms. ComputerNetworks.2009,53(7):945-960.
    [35] Wen-Hwa Liao, Yucheng Kao, and Chien-Ming Fan. Data aggregation in wirelesssensor networks using ant colony algorithm.Journal of Network and ComputerApplications.2008,31(4):387-401.
    [36] Shensheng Tang and Wei Li. QoS supporting and optimal energy allocation for acluster based wireless sensor network. Computer Communications.2006,29(13-14):2569-2577.
    [37] Sylvia Tai, Robert R. Benkoczi, Hossam Hassanein, et.al.QoS and data relaying forwireless sensor networks.Journal of Parallel and Distributed Computing.2007,67(6):715-726.
    [38] M. Aykut Yigitel, Ozlem Durmaz Incel, and Cem Ersoy. QoS-aware MAC protocolsfor wireless sensor networks: A survey.Computer Networks.2011,55(8):1982-2004.
    [39] Linging HOU JC. Topology control in heterogeneous wireless networks problemsand solution. In: Proc. of IEEE Conference on Computer Communication.2004,232-243.
    [40] KARP B and KUNG H T. GPSR: greedy perimeter stateless routing for wirelessnetworks. In: Proc.of the6th Internation Conference on Mobile Computing andNetworking.2000,243-254.
    [41] Chamam A and Pierre S. On the Planning of Wireless Sensor Networks:Energy-Efficient Clustering under the Joint Routing and Coverage Constraint. IEEEtransactions on mobile computing.2009,8(8):1077-1086.
    [42] Kubisch M, Karl H, Wolisz A, et al. Distributed algorithm for transmission powercontrol in wireless sensor networks. In: Proc. of IEEE WCNC.2003,558-563.
    [43] Li N, Hou J C, and Sha L. Design and analysis of an MST-based topology controlalgorithm. In: Proc. of INFOCOM.2003,1702-1712.
    [44] Heinzelman W, Chandrakasan A, and Balakrishnan H. An application-specificprotocol architecture for wireless microsensor networks. IEEE Transaction onWireless Communications.2002,1(4):660-670.
    [45] Xu Y, Heidemann J, and Estrin D. Geography-informed energy conservation for adhoc routing. In: Proc. of ACM/IEEE conference on mobile computing andnetworking.2001,70-84.
    [46] Deb B, Bhatangar S, and Nath B. A topology discovery algorithm for sensornetworks with applications to network management. DCS Technical reportDCS-TR-441, Rutgers University.2001:1-4.
    [47] Younis O and fahmy S. HEED: A hybrid, energy-efficient, distributed clusteringapproach for ad hoc networks. IEEE Transaction on mobile computing.2005,2(1):129-153.
    [48] Xing GL, Wang XR, Zhang YF, et.al. Integrated coverage and connectivityconfiguration for energy conservation in sensor networks. ACM Transaction onSensor Networks.2005,1(1):36-72.
    [49] Chen B, Jamieson K, Balakrishnan H, et.al. SPAN: An energy efficient coordinationalgorithm for topology maintenance in ad hoc wireless networks. ACM WirelessNetworks.2002,8(5):481-494.
    [50] Younis O, Fahmy S, and Santi P. Robust communications for sensor networks inhostile environments. In: Proc. of the12th IEEE International Workshop on Qualityof Service.2004,10-19.
    [51] Kashyap A, Khuller S, and Shayman M. Relay placement for higher orderconnectivity in wireless sensor networks. In: Proc. of the25th IEEE InternationalConference on Computer Communications.2006,1-12.
    [52] Han XiaoFeng, Cao Xiang, Lloyd Errol, et.al. Fault-tolerant relay node placement inheterogeneous wireless sensor networks. In: Proc. of the26th IEEE InternationalConference on Computer Communications.2007,1667-1675.
    [53]王良民,马建峰.基于再生技术的无线传感器网络容侵拓扑控制方法.计算机研究与发展.2009,46(10):1678-1685.
    [54]李长庚,宁新鲜.一种传感器网络容错拓扑控制算法.传感器与微系统.2009,28(4):23-25.
    [55] Luigi Atzori. The Internet of Things: A survey. Computer Networks.2010,54(15):2787-2805.
    [56]王殊,阎毓,胡富平等.无线传感器网络的理论及应用.北京:北京航空航天大学出版社,2007:6-10.
    [57] Jiakai Li, and Gursel Serpen.nesc-TinyOS model for parallel and distributedcomputation of max independent set by Hopfield network on wireless sensor network.Science of Computer Programming.2011,6:396-401.
    [58] Chen Xijun.The study of software and hardware platform for the node of WSN. In:Proc. of the IEEE International Conference on Automation and Logistics.2008,3028-3032.
    [59]王雪.无线传感网络测量系统.北京:机械工业出版社,2007:7-9.
    [60]于海斌,曾鹏等.智能无线传感器网络系统.北京:科学出版社,2006:5-20.
    [61]孙利民,李建中,陈渝等.无线传感器网络.北京:清华大学出版社,2005:11-16.
    [62] Deng J, Han YS, Heinzelman WB, et.al. Scheduling sleeping nodes in high densitycluster-based sensor networks. ACM/Kluwer Mobile Networks and Applications.2005,10(6):825-835.
    [63] Wu K, Gao Y, and Li F. Light weight deployment-aware scheduling forwireless sensor networks. ACM/Kluwer Mobile Networks and Applications.2005,10(6):837-852.
    [64] Meguerdichian S, Koushanfar F, Potkonjak M, et.al. Coverage problems in wirelessad-hoc sensor networks. In: Proc. of the IEEE Conference on ComputerCommunications.2001,1380-1387.
    [65] Thai MT, Wang F, and Du DZ. Coverage problems in wireless sensor networks:designs and analysis. International Journal of Sensor Networks (Special Issue onCoverage Problems in Sensor Networks).2008,3(3):191-200.
    [66] Narayanaswamy S, Kawadia V, Sreenivas RS, et.al. Power control in ad-hocnetworks: Theory, architecture, algorithm and implementation of the COMPOWprotocol. In: Proc.of the European Wireless Conference.2002,156-162.
    [67] Gupta P and Kumar PR. The capacity of wireless networks. IEEE Transaction onInformation Theory.2000,46(2):388-404.
    [68] Kawadia V. Protocols and architecture for wireless ad hoc networks.[Ph.D. Thesis].University of Illinois at Urbana-Champaign.2004:1-44.
    [69] Zhang X, Lu SL, Chen DX, et.al. PREG: A practical power control algorithm basedon a novel proximity graph for heterogeneous wireless sensor networks. In: Proc. ofthe1st International Conference on Wireless Algorithms, Systems and Applications.2006,620-631.
    [70] Kirousis LM, Kranakis E, Krizanc D, et.al. Power consumption in packet radionetworks. Theoretical Computer Science.2000,243(1-2):289-305.
    [71] Clementi A, Penna P, and Silvestri R. On the power assignment problem in radionetworks. ACM/Kluwer Mobile Networks and Applications.2004,9(2):125-140.
    [72] Kawadia V and Kumar PR.Power control and clustering in ad-hoc networks. In: Proc.of the IEEE Conference on Computer Communications.2003,459-469.
    [73] Diamantopoulos F and Economides A. A performance study of DSDV-basedCLUSTERPOW and DSDV routing algorithms for sensor network applications. In:Proc. of the20061st International Symposium on Wireless Pervasive Computing.2006,16.
    [74]李方敏,徐文君,刘新华.无线传感器网络功率控制技术及研究进展.软件学报.2008,19(3):716-732.
    [75] Lin S, Zhang JB, Zhou G, et.al. ATPC: Adaptive transmission power control forwireless sensor networks. In: Proc. of the Fourth International Conference onEmbedded Networked Sensor Systems.2006,223236.
    [76] Wang Jui Teng. Power adjustment and allocation for multimedia CDMA wirelessnetworks. Electronics letters.2002,28(1):54-55.
    [77]张维迎.博弈论与信息经济学.上海:格致出版社,上海三联出版社,上海人民出版社,2004:1-10.
    [78]殷志明,谢剑英.无线数据网络中基于博弈论方法的功率控制.计算机研究与发展.2004,41(6):909-915.
    [79]孙强,李腊元.一种基于博弈论模型的Ad Hoc网络功率控制算法.计算机学报.2009,32(1):169-175.
    [80]曾加,慕春棣.传感器网络非合作博弈功率控制及其仿真.计算机工程.2008,34(10):1-3.
    [81] Sun Qiang, Zeng Xianwen. A Non-cooperative power control algorithm for wirelessAd Hoc&Sensor Networks. In: Proc. of second international conference on geneticand evolutionary computing.2008,181-184.
    [82] Zhang Xidong, Cai Yueming. A game-theoretic dynamic power management policyon wireless sensor network. In: Proc. of2006International Conference onCommunication Technology.2006,27-30.
    [83] Shamik Sengupta, Mainak Chatterjee, and Kevin Kwiat. A game theoreticframework for power control in wireless sensor networks. IEEE Transactions onComputers.2010,59(2):231-242.
    [84]董保民,王运通,郭桂霞.合作博弈论—解与成本分摊.北京:中国市场出版社,2008:1-10.
    [85]王琳,陈涤等.无线传感器网络中基于对策论的功率控制.计算机工程与应用.2007,43(19):145-147.
    [86]王伟东,朱清新.无线传感器网络中一种层次分簇算法及协作性分析.软件学报.2006,17(5):1157-1167.
    [87] G Koltsidas. Towards a game theoretic formulation of clustering routing in wirelesssensor networks. In: Proc. of International Conference On Performance EvaluationMethodologies And Tools&Workshops.2008,1-9.
    [88] Zheng Zengwei, Wu Zhaohui, and Lin Huaizhong. Clustering routing algorithmusing game theoretic techniques for WSNs. In: Proc. of2004IEEE InternationalSymposium on Circuits and Systems.2004,904-907.
    [89] Harsanyi,J.C.Games with incomplete information played by Bayesian players. I-IIIManagement Science.1967,14(3):1–25.
    [90] Harsanyi,J.C. A General Theory of Equilibrium Selection in Games. MIT Press,1988:12-36.
    [91] Takahashi J, Sekiyama K, and Fukuda T. Self-deployment algorithm of mobilesensor network based on connection priority criteria. In: Proc. of InternationalConference on Robotics and Biomimetics.2007,1434-1439.
    [92] WangY C, Hu C C, and TsengY C. Efficient placement and dispatch of sensors in awireless sensor network. Mobile Computing.2008,7(2):262-274.
    [93] Yu C W, Chen E, and Fang C C. Deploying mobile nodes to connect wireless sensornetworks using novel algorithms. In: Proc.of International Conference on WirelessAlgorithms Systems and Applications.2007,315-324.
    [94] Howard A, Mataric M J, and Sukhatme G S. Mobile sensor network deploymentusing potential Fields: a distributed, scalable solution to the area coverage problem. In:Proc. of the6th International Symposium Distributed Autonomous RoboticsSystems.2002,299-308.
    [95] Zou Y, Chakrabarty K. Sensor deployment and target Localization in distributedsensor networks. ACM Transaction on embedded Computing Systems.2004,3(1):61-91.
    [96]李石坚,徐从富,吴朝晖等.面向目标跟踪的传感器网络布局优化及保护策略.电子学报.2006,34(1):71-76.
    [97] Haining Shu, Qilian Liang. Fuzzy Optimization for Distributed Sensor DeploymentIn:Proc. of the Wireless Communications and Networking Conference.2005,1903-1907.
    [98]彭祖赠,孙韫玉.模糊数学及其应用.湖北:武汉大学出版社,2007:1-3.
    [99] J.M.Mendel. Fuzzy Logic Systems for Engeneering: A Tutorial. In: Proc. of theIEEE.1995,83(3):345-377.
    [100] E. H. Mamdani. Applications of fuzzy logic to approximate reasoning usinglinguistic systems. IEEE Transaction on Systems, Man, and Cybernetics.1977,26(12):1182-1191.
    [101] Newman E J. Scaling and percolation in the small-world network model. PhysicalReview E.1999,60(6):7332-7342.
    [102] Watts D J, Stogatz S H. Collective dynamics of “small-world” networks. Nature.1998,393(4):440-442.
    [103] Barabási A L, Albert R. Power-Law distribution of the world wide web. Science.2000,287(5461):2115.
    [104] Barabási A L, Albert R. Emergence of scaling in random networks. Science.1999,286(5439):509-512.
    [105]汪小帆,李翔.复杂网络理论及其应用.北京:清华大学出版社,2006:27-28.
    [106] Helmy A. Small worlds in wireless networks. IEEE Communications Letters.2003,7(10):490-492.
    [107] Helmy A. Contact based architecture for resource discovery in large scale MANets.In: Proc. of Parallel and Distributed Processing Symposium.2003,219-227.
    [108] Chang JieJiang, Chien Chen. Construct small worlds in wireless networks using datamules. In: Proc. of Sensor Networks, Ubiquitous and Trustworthy Computing.2008,28-35.
    [109] Hu Jianming, Song Jingyan. Topology optimization for urban traffic sensor network.Tsinghua Science andTechnology.2008,13(2):229-236.
    [110] Daniel L.Guidoni, Raquel A.F.Mini, and Antonio A.F.Loureiro. On the design ofresilient heterogeneous wireless sensor networks based on small world concepts.Computer Networks.2010(54):1266-1281.
    [111] Albert R, Jeong H, and Barabási A L. Attack and error tolerance in complexnetworks.Nature.2000,406(7):387-482.
    [112] Masoum Alireza, Jahangir Amirhossein.Survivability modeling of wireless sensornetworks. In: Proc. of IEEE International Symposium on Wireless CommunicationSystems.2008,593-597.
    [113] Misra Satyajayant, Hong Seung Don.Constrained relay node placement in wirelesssensor networks to meet connectivity and survivability requirements. In: Proc. ofIEEE Communications Society Conference on Computer Communications.2008,879-887.
    [114] Thallner Bernd, Moser Heinrich. Topology control for fault-tolerant communicationin highly dynamic wireless net-works. In: Proc. of the3rd International Workshop onIntelligent Solutions in Embedded Systems.2005,89-100.
    [115] Dong Seong Kim,Shazzad Khaja Mohammad. A framework of survivability modelfor wireless sensor network. In: Proc. of the International Conference on Availability,Reliability and Security.2006,515-522.
    [116] Saramaki Jari, Kaski Kimmo. Scale-free networks generated by random walkers.Physica A.2004(341):80-86.
    [117] Albert R, Barabasi A L. Mean-field theory for scale-free random networks. PhysicaA: Statistical Mechanics and its Applications.1999,272(1-2):173-187.
    [118]张明科,于长军,杨强等.基于网络动力学特征信息融合系统抗毁性研究.系统工程与电子技术.2008,30(12):2421-2424.
    [119]陈力军,刘明,陈道蓄等.基于随机行走的无线传感器网络簇间拓扑演化.计算机学报.2009,32(1):71-76.
    [120] R.E.Kahn, S.A.Gronemeyer and J.Burchfiel. Advances in packet ratio technology.In: Proc. of the IEEE.1978,66(11):1468-1496.
    [121] N.Shacham, J.Westcott. Future directions in packet radio architectures andprotocols. In: Proc. of the IEEE.1987,75(1):83-99.
    [122] Maher Matthew. Joint Tactical Radio System: Tactical Network Planning andManagement. In: Proc. of Military Communications Conference.2007,1-7.
    [123] Chiang ChoYu J, Levin Gary, and Gottlieb Yitzchak M. An Automated PolicyGeneration System for Mobile Ad Hoc Networks. In: Proc. of MilitaryCommunications Conference.2007,1-8.
    [124] Chiang ChoYu J, Chadha Ritu, and Newman Scott. Integrated Network Operationsfor Future Army Tactical Networks. In: Proc. of Military CommunicationsConference.2007,1-7.
    [125] Chiang ChoYu J, Demers S, and Gopalakrishnan P. Performance Analysis ofDrama: A Distributed Policy-Based System for MANET Management. In: Proc. ofMilitary Communications Conference.2006,1-8.
    [126] Ritu Chadha, YuuHeng Cheng, ChoYu Jason Chiang, et.al. DRAMA: A DistributedPolicy-based Management System. In: Proc. of International Conference on MobileSystems.2005,1-2.
    [127] QI Xiaogang, Ma Shiqiang, Zheng Gengzhong. Topology Evolution of WirelessSensor Networks Based on Adaptive Free-Scale Networks. Journal of Informationand Computational Science.2011,8(3):467-475.
    [128] Feng Hailing, Liu Sanyang. Reliability analysis of a wireless sensor network basedon a physical model. Journal of the Chinese Institute of Industrial Engineers.2010,27(1):22-27.
    [129]杨伟伟.基于可编程阵列的仿生自修复无线传感网络节点研制.南京航空航天大学硕士学位论文.2009(3):12-24.
    [130] Liangmin Wang, Jian-feng Ma. Intrusion Model for Intrusion Tolerance System byUsing Capabilities of Attackers. The Chinese Journal of Electronics.2006,10(4):613-618.
    [131] Chen Lijun, Pan Qingfeng, Chen Daoxu,et al. Modeling the Topology forCluster-Based Wireless Sensor Networks. In: Proc. of New Technologies, Mobilityand Security.2009,20-23.
    [132] Sarshar N, Roychowdhury V. Scale-free and stable structures in complex ad hocnetworks. Physical Review E.2004,69(2):026101.
    [133]陈勇,胡爱群,胡啸.通信网中节点重要性的评价方法.通信学报.2004,25(8):129-134.
    [134] WU Jun, TAN Yuejin. Finding the most vital node by node contraction inCommunication network.In:Proc.of IEEE International Conference onCommunications, Circuits and Systems.2005,1-6.
    [135] Zhao Yihuan, Wang Zulin, and Zheng Jing. Finding most vital node by nodeimportance contribution matrix in communication networks. Journal of BeijingUniversity of Aeronautics and Astronautics.2009,35(9):1076-1079.
    [136]吕琳媛.网络中节点重要性的排序方法.中华人民共和国国际知识产权局(CN101976245A).2010:1-10.
    [137] Brodka P, Musial K. A performance of centrality calculation in social networks. In:Proc. of International Conference on Computational Aspects of Social Networks.2009,24-31.
    [138] Manuel C, del Pozo M. Centrality in Directed Social Networks: A Game TheoreticApproach. Centrality in Directed Social Networks: A Game Theoretic Approach.In:Proc.of International Conference of Numerical Analysis and Applied Mathematics.2010:815-818.
    [139] Poulin R, Boily M C, and Masse B R. Dynamical Systems to Define Centrality inSocial Networks. Social Networks.2000,22(3):187-220.
    [140] Guimera R. Classes of Complex Networks Defined by Role-to-role ConnectivityProfiles. Nature Physics.2007,3(12):63-69.
    [141] Chen Y,Hu A Q, Hu J, et al. A method for finding the most vital node incommunication network.High Technology Letters.2004,14(1):573-575.
    [142] Page L, BrinS. The pagerank citation ranking: bringing order to the web. TechnicalReport in Stanford InfoLab.1998:1-17.
    [143] Kleinberg J. Authoritative sources in a hyperlinked environment. Journal of theACM.1999,46(5):604-632.
    [144] Carpenter T, Karakostas G, and Shallcross D.Practical issues and algorithms foranalyzing terrorist networks.In:Proc. of Western Multi Conference.2002,49.
    [145] McCreary J. Comparison of centrality estimators for several distributions. TennesseeTechnological University Technology Report.2001,3(1):1-24.
    [146] Wasserman S, Faust K. Social Network Analysis: Methods and Applications. NewYork: Cambridge University Press.1994:65-94.
    [147]王林,戴冠中.复杂网络的Scale-free性、Scale-free现象及其控制.北京:科学出版社,2009:104-144.
    [148]朱艺华,沈丹丹等.无线传感器网络优化生存时间的动态路由算法.电子学报.2009,37(5):1041-1045.
    [149] Peng Chen,Cheng Wang, and Lijun Li. Heterogeneous sensor networks with effect ofsmall world. In: Proc.of IET International Conference on Wireless Mobile andMultimedia Networks.2006,37.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700