基于网络编码的无线传感器网络数据收集模型与协议研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
近年来,无线传感器网络(Wireless Sensor Networks, WSNs)的研究受到了越来越多的关注,作为其主要应用之一的数据收集,也得到了越来越广泛和深入的研究。在数据收集的过程中,传感器节点部署在一定的区域内,采集该区域的环境信息。然后,节点之间通过多跳中继的方式,协作地将这些信息传输到汇聚节点(又称基站节点)。由于传感器节点的能量和计算资源有限,因此,如何安全、准确、迅速地传输数据,同时尽可能节约能量消耗,成为了数据收集模型与协议研究的主要目标。最近,一种新型的通信技术——网络编码被提出来,并开始用于WSNs。与基于传统存储转发路由的数据收集协议相比,基于网络编码的数据收集协议能够获得多种性能增益,包括吞吐量的提高、鲁棒性的增强、能耗与时延的减少等。然而,物联网兴起以后,作为其关键技术之一的WSNs具有了一些新的特点,因此也对数据收集协议提出了新的要求。具体来说,第一,用于物联网的WSNs都是大规模的网络,更需要节约能量消耗和缩短时延。第二,数据收集的需求更丰富。有时需要定期收集所有节点的数据;有时只需要某个节点采集的数据。第三,待收集数据的类型也更多样化。有时需要节点采集的原始数据;有时只需要所有数据的聚合结果。第四,传感器节点不再属于同一个机构或同一个实体。因此,它们具有自私性和独立性。这要求在数据收集的过程中,不仅要为传输提供安全性,还应维持节点参与合作的兴趣。综上所述,本论文建立了一个用于具有上述新特点的WSNs的数据收集模型,并基于网络编码来研究用于该模型的数据收集协议,使之适用于具有节点自私性和独立性的应用环境。本论文的主要工作与创新如下
     (1)建立了一个符合上述新特点的无线传感器网络综合型数据收集模型,称为CM-DG-WSN(Comprehensive Model of Data Gathering in Wireless Sensor Networks)模型。首先,一般情况下,该模型采用时间驱动型数据收集的模式,所有节点周期性地将数据传输到汇聚节点。当节点监测到某字段超过阈值时,则采用事件驱动型数据收集模式。这时,仅仅该节点传输其数据到汇聚节点。其次,它考虑了待收集数据的类型分别是原始数据和聚合数据这两种情况。再次,它还考虑了节点的自私性和独立性。因此,不仅应在数据收集的过程中提供安全性,而且还应在该过程中维持中间节点参与合作的兴趣。
     (2)提出了一个时间驱动型数据收集协议,称为FNCDG (Flat-based Network Coding Data Gathering)协议。该协议将流间网络编码与机会路由作为主要技术。而且,本论文从理论和仿真的角度,将FNCDG协议与传统存储转发的路由协议进行了比较。它们的结果是一致的,都说明了FNCDG协议在节约能耗和缩短时延上具有明显的优势。
     (3)研究了如何在聚合数据收集的过程中,进一步节约能耗的问题。在这种情况下,汇聚节点只需要所有数据的一个聚合结果,而非节点的原始数据。由于基于平面路由的网络编码协议很难在传输过程中完成数据聚合,因此,为了译码,它们可能需要浪费大量能量来传输编码包。于是,本论文提出基于分簇路由的网络编码协议,称为CNCDG (Cluster-based Network Coding Data Gathering)协议,它通过让簇头在传输数据的过程中完成一部分聚合数据的操作,来减少待传输的编码包数目,从而进一步节约能耗。
     (4)在基于网络编码的事件驱动型数据收集中,研究了如何保护源节点隐私数据的问题,从而防止中间节点利用流经它们的编码包推导出源节点的隐私数据。与其他研究不同的是,本论文不仅考虑了如何防止任何单个节点的攻击,也考虑了如何防止多个节点的合谋攻击。利用“网络编码对污染的脆弱性”和数据混淆技术,本论文提出了一个数据隐私保护的网络编码协议,称为DPPNC (Data-Privacy-Preserving Network Coding)协议。该协议具有较低的计算和通信开销。为了进一步提高协议的安全性,本论文还提出了两个扩展协议,分别称为HDPPNC-1协议和HDPPNC-2协议。
     (5)提出了一个既能保护源节点隐私数据,又能防止外部污染攻击的安全网络编码数据收集模型,作为CM-DG-WSN模型在安全性上的子模型,称为SNCDG (Secure Network Coding-based Data Gathering)模型。而且,本论文通过数据混淆技术,设计了一个用于该模型的协议,称为DPP&PP (Data-Privacy Preserving and Pollution Preventing)协议。该协议不仅能同时防止网内和网外攻击。而且,它具有较低的计算和通信开销。
In recent years, research on wireless sensor networks (WSNs) has attracted more and more considerable attention. Besides, data gathering, as one of the main applications of WSNs, has also been studied more and more extensively and deeply. In the process of data gathering, sensor nodes are deployed in some area, sense their environment, produce information and transmit them collaboratively to the sink (also called base station) by multi-hop transmit manner. Since sensor nodes are energy constrained and computing resource constrained, how to transmit data securely, accurately and quickly, while saving energy as much as possible became the main objective of research on the data gathering model and protocols. Recently, a new communication technology, i.e. network coding, has been proposed and starts to be used in WSNs. Comparing with the data gathering protocols based on traditional store-and-forward routings, those protocols based on network coding obtain a variety of performance gains, including the improvement of throughput, the enhancement of robustness and the reduction of energy consumption and time delay, etc. However, after the rise of the Internet of Things, as one of the key technologies, WSNs obtain several new features, which put forward several new requirements on data gathering protocols. Specifically, first of all, WSNs used in the Internet of Things are usually large-scale networks, so they have to save more energy consumption and reduce more time delay. Secondly, needs on data gathering are richer. Sometimes, the sink needs to gather data of all the nodes periodically, and sometimes it only needs to gather the data of a certain node. Thirdly, types of data to be gathered are diversified. Sometimes it needs all the raw data, and sometimes it only needs an aggregated result of all the raw data. Finally, sensor nodes no longer belong to the same administration authority. Therefore, they are selfish and independent. Thus, in the process of data gathering, it not only requires providing security, but also requires maintaining the interest of sensor nodes in cooperation. In summary, this paper established a data gathering model used in WSNs with the above new features. In addition, it studied the data gathering protocols used in this model based on network coding, and made them suitable for being used in the environment with selfish and independent nodes. The main work and innovation of this paper are as follows:
     (1) It established a comprehensive model of data gathering in WSNs (CM-DG-WSN) which owns the above new features. First of all, generally, it works under the time-driven data gathering mode, i.e., all the sensor nodes transmit their data periodically to the sink. Once a node detects that a data exceeds its threshold, it will work under the event-driven mode. In this situation, only this node will transmit its data to the sink. Secondly, this model considers two types of data to be gathered, which are raw data and aggregated data. Thirdly, this model considered the selfishness and independence of sensor nodes. As a result, it not only requires providing security in the process of data gathering, but also requires maintaining the interest of nodes in cooperation.
     (2) It proposed a time-driven data gathering protocol, called flat-based network coding data gathering (FNCDG) protocol, which takes the intra-session network coding and opportunistic routing as its main technologies. This paper compared FNCDG with a traditional store-and-forward routing both by theoretical methods and by simulations. Their results are consistent with each other, which both demonstrate the fact that FNCDG could offer significant benefits in terms of both energy consumption and time delay in time-driven data gathering.
     (3) It studied how to further save energy in the process of aggregated-data gathering, where the sink only wants an aggregated result of all the data rather than the raw data themselves sensed from an area. The aggregation is hard to be performed on encoded data when using a flat-based network coding protocol. Thus, flat-based ones may waste much energy on transmitting a great deal of encoded data for decoding at the sink on the contrary. As a result, this paper proposed a cluster-based network coding data gathering (CNCDG) protocol. It reduces the encoded data to be transmitted than the flat-based network coding protocol (FNCDG) by permitting cluster heads to perform some aggregation in the transmission process, so as to saves more energy.
     (4) It studied the data-privacy-preserving problem in an event-driven data gathering scenario, i.e., preventing private source data from being acquired by non-intended internal nodes which use the encoded data that flowed by them to perform derivation. Unlike those existing research results, this paper considered not only attacks from any single internal node, but also those from multiple nodes that are in cahoots with each other. This paper proposed a data-privacy-preserving network coding (DPPNC) protocol by making use of the vulnerability of network coding to pollution and data obfuscation. This protocol requires low overhead on computation and communication. Then, to further improve the security of this protocol, this paper proposed two extended protocols, called HDPPNC-1and HDPPNC-2respectively.
     (5) It proposed a formalized model, called secure network coding-based data gathering (SNCDG) model. This model can not only preserve private source data, but also prevent external pollution attacks. In addition, this paper designed a data-privacy preserving and pollution preventing (DPP&PP) protocol, used in this model by using data obfuscation. This protocol not only can prevent both internal attacks and external attacks, but also requires low overhead on computation and communication.
引文
[1]Yick J, Mukherjee B, Ghosal D. Wireless sensor network survey. Computer Networks.2008,52(12):2292-2330.
    [2]Akyildiz I F, Su W, Sankarasubramaniam Y, et al. Wireless sensor networks:a survey. Computer Networks.2002,38(4):393-422.
    [3]Ashton K. That 'Internet of Things'thing. RFID Journal.2009. http://www.rfidjournal.com/article/print/4986.
    [4]Al-Karaki J N, Kamal A E. Routing techniques in wireless sensor networks:a survey. IEEE Wireless Communications.2004,11(6):6-27.
    [5]Heinzelman W B, Chandrakasan A P, Balakrishnan H. An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications.2002,1(4):660-670.
    [6]Lindsey S, Raghavendra C, Sivalingam K M. Data gathering algorithms in sensor networks using energy metrics. IEEE Transactions on Parallel and Distributed Systems.2002,13(9):924-935.
    [7]Intanagonwiwat C, Govindan R, Estrin D, et al. Directed diffusion for wireless sensor networking. IEEE/ACM Transactions on Networking.2003,11(1):2-16.
    [8]Tan H O, Korpeoglu I. Power efficient data gathering and aggregation in wireless sensor network. ACM SIGMOD Record.2003,32(4):66-71.
    [9]Kalpakis K, Dasgupta K, Namjosh P. Efficient algorithms for maximum lifetime data gathering and aggregation in wireless sensor networks. Computer Networks. 2003,42(6):697-716.
    [10]Gatani L, Lo Re G, Ortolani M. Robust and efficient data gathering for wireless sensor networks. In Proceedings of the Annual Hawaii International Conference on System Sciences, Kauai, HI, January 2006, pp.235a.
    [11]Mandala D, Dai F, Du X J, et al. Load balance and energy efficient data gathering in wireless sensor network. Wireless Communications and Mobile Computing. 2007,8(5):645-659.
    [12]刘明,曹建农,陈贵海,陈力军,王晓敏,龚海刚.EADEEG能量感知的无线传感器网络数据收集协议.软件学报.2007,18(5):1092-1109.
    [13]Zhu Y H, Wu W D, Pan J, et al. An energy-efficient data gathering algorithm to prolong lifetime of wireless sensor networks. Computer Communications.2009, 33(5):639-647.
    [14]刘琳,于海斌,曾鹏.节能有效的无线传感器网络状态信息收集算法.通信学报.2009,30(6):126-134+141.
    [15]Konstantinos K. Everywhere sparse approximately optimal minimum energy data gathering and aggregation in sensor networks. ACM Transactions on Sensor Networks.2010,7(1).
    [16]Wang J, Liu Y H, Das S K. Energy-efficient data gathering in wireless sensor networks with asynchronous sampling. ACM Transactions on Sensor Networks. 2010,6(3).
    [17]Zhao M, Ma M, Yang Y Y. Efficient data gathering with mobile collectors and space-division multiple access technique in wireless sensor networks. IEEE Transactions on Computers.2011,60(3):400-417.
    [18]Ahlswede R, Cai N, Li S-Y R, et al. Network information flow. IEEE Transactions on Information Theory.2000,46(4):1204-1216.
    [19]Wu Y, Chou P A, Kung S Y. Minimum-energy multicast in mobile ad hoc networks using network coding. IEEE Transactions on Communications.2005, 53(11):1906-1918.
    [20]Lun D S, Medard M, Koetter R. Network coding for efficient wireless unicast. In Proceedings of IEEE 2006 International Zurich Seminar on Digital Communications, Zurich, Febrary 2006, pp.74-77.
    [21]Jin J Q, Ho T, Viswanathan H. Comparison of network coding and non-network coding schemes for multi-hop wireless networks. In Proceedings of 2006 IEEE International Symposium on Information Theory, Seattle, WA, July 2006, pp. 197-201.
    [22]Eslami A, Khalaj B H. Capacity of network coding for wireless multicasting. In Proceedings of IEEE Wireless and Microwave Technology Conference, Clearwater Beach, FL, December 2006, pp.1-5.
    [23]Chachulski S, Jennings M, Katti S, et al. Trading structure for randomness in wireless opportunistic routing. In Proceedings of ACM SIGCOMM 2007: Conference on Computer Communications, Kyoto, August 2007, pp.169-180.
    [24]Zhang J Y, Cai K, Letaief K B, et al. A network coding unicast strategy for wireless multi-hop networks. In Proceedings of IEEE Wireless Communications and Networking Conference, Kowloon, March 2007, pp.4224-4229.
    [25]Katti S, Rahul H, Hu W Y, et al. Xors in the air:practical wireless network coding. IEEE/ACM Transactions on Networking.2008,16(3):497-510.
    [26]Katti S, Katabi D, Hu W J, et al. The importance of being opportunistic:practical network coding for wireless environments. In Proceedings of the 43rd Allerton Conference on Communication, Control, and Computing, Illinois,2005.
    [27]Nguyen D, Tran T, Nguyen T, et al. Wireless broadcast using network coding. IEEE Transactions on Vehicular Technology.2009,58(2):914-925.
    [28]Lu L, Xiao M, Skoglund M, et al. Efficient network coding for wireless broadcasting. In Proceedings of IEEE Wireless Communications and Networking Conference 2010, Sydney, NSW, April 2010, pp.1-6.
    [29]Fragouli C, Katabi D, Markopoulou A, et al. Wireless network coding: opportunities & challenges. In Proceedings of MILCOM 2007, Orlando, FL, October 2007, pp.1-8.
    [30]Petrovic D, Ramchandran K N, Rabaey J. Coding for sensor networks using untuned radios. In Proceedings of IEEE 6th Workshop on Signal Processing Advances in Wireless Communications, New York, NY, June 2005, pp.1093-1097.
    [31]Toledo A L, Wang X D. Efficient multipath in sensor networks using diffusion and network coding. In Proceedings of the 40th Annual Conference on Information Sciences and Systems, Princeton, NJ, March 2006, pp.87-92.
    [32]Tan C, Zou J N. A multicast algorithm based on network coding for wireless sensor network. In Proceedings of IET Conference on Wireless, Mobile and Sensor Networks 2007, Shanghai, December 2007, pp.1043-1046.
    [33]Tong J, Du Z J, Liu Y, et al. Intra-flow network coding based multipath routing protocol for event-driven wireless sensor networks. In Proceedings of the 5th International Conference on Mobile Ad-hoc and Sensor Networks, Fujian, December 2009, pp.62-69.
    [34]Hao K, Jin Z G, Wang Y. Partial network coding for wireless opportunistic routing. In Proceedings of IET International Communication Conference on Wireless Mobile and Computing, Shanghai, December 2009, pp.610-613.
    [35]Xu M S, Song W Z, Zhao Y C. Opportunistic network erasure coding in disruptive sensor networks. In Proceedings of the 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems, Valencia, October 2011, pp.685-690.
    [36]Xing F N, Cai S B, Gao Z G, et al. Extended abstract:a network coding based protocol for reliable data transfer in underwater acoustic sensor networks. In Proceedings of the 6th ACM International Workshop on Underwater Networks, Seattle, WA, December 2011.
    [37]Xiong Z Q, Liu W, Huang J Q, et al. Network coding approach for intra-cluster information exchange in sensor networks. In Proceedings of IEEE 66th Vehicular Technology Conference, Baltimore, MD, October 2007, pp.164-168.
    [38]Wang Y, Henning I D, Hunter D K. Efficient information exchange in wireless sensor networks using network coding. In Proceedings of the 4th Workshop on Network Coding, Theory, and Applications, Hong Kong, January 2008, pp.1-6.
    [39]Hou I-H, Tsai Y-E, Abdelzaher T F, et al. AdapCode:adaptive network coding for code updates in wireless sensor networks. In Proceedings of the 27th IEEE Communications Society Conference on Computer Communications, Phoenix, AZ, April 2008, pp.2189-2197.
    [40]Shwe H Y, Jiang X H, Horiguchi S. Efficient network coding for power saving in wireless sensor networks. In Proceedings of the 15th Asia-Pacific Conference on Communications, Shanghai, October 2009, pp.36-39.
    [41]Jiao W W, Chen C F, Xie D L, et al. Efficient data collection in wireless sensor networks by applying network coding. In Proceedings of the 2nd IEEE International Conference on Broadband Network and Multimedia Technology, Beijing, October 2009, pp.90-94.
    [42]Rout R R, Ghosh S K, Saswat C. A network coding based probabilistic routing scheme for wireless sensor network. In Proceedings of the 6th International Conference on Wireless Communication and Sensor Networks, Allahabad, December 2010, pp.1-6.
    [43]Apavatjrut A, Znaidi W, Fraboulet A, et al. Energy friendly integrity for network coding in wireless sensor networks. In Proceedings of the 4th International Conference on Network and System Security, Melbourne, VIC, September 2010, pp.223-230.
    [44]Wang X M, Wang J P, Xu Y L. Data dissemination in wireless sensor networks with network coding. Eurasip Journal on Wireless Communications and Networking.2010,2010.
    [45]Yang Y W, Zhong C S, Sun Y M, et al. Network coding based reliable disjoint and braided multipath routing for sensor networks. Journal of Network and Computer Applications.2010,33(4):422-432.
    [46]Glatz P M, Hrmann L B, Steger C, et al. Opportunistic network coding for energy conservation in wireless sensor networks. In Proceedings of the 9th Annual Communication Networks and Services Research Conference, Ottawa, ON, May 2011,pp.239-246.
    [47]Shang T, Fan Y. A network coding based data dissemination scheme for wireless sensor networks. In Proceedings of the 7th International Conference on Wireless Communications, Networking and Mobile Computing, Wuhan, September 2011, pp.1-4.
    [48]Petrovic D, Ramchandran K, Rabaey J. Overcoming untuned radios in wireless networks with network coding. IEEE Transactions on Information Theory.2006, 52(6):2649-2657.
    [49]Guo Z, Xie P, Cui J-H, et al. On applying network coding to underwater sensor networks. In Proceedings of the First ACM International Workshop on Underwater Networks, Los Angeles, CA, September 2006, pp.109-112.
    [50]Wang J Y, Yang G, Lin X H, et al. Continuous data collection in wireless sensor networks through PNC and distributed storage. In Proceedings of 2007 International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, September 2007, pp.2568-2571.
    [51]Lucani D E, Medard M, Stojanovic M. Network coding schemes for underwater networks:the benefits of implicit acknowledgement. In Proceedings of 2007 International Conference on Mobile Computing and Networking, MobiCom'07 Second Workshop on Underwater Networks, Montreal, QC, September 2007, pp.25-32.
    [52]Li H, Yu H Y, Li N, et al. On the cascading data collection mechanism in wireless sensor networks. In Proceedings of 2007 International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, September 2007, pp.2479-2482.
    [53]Marinkovic S, Popovici E. Network coding for efficient error recovery in wireless sensor networks for medical applications. In Proceedings of the 1st International Conference on Emerging Network Intelligence, EMERGING 2009, Includes 5th European Conference on Universal Multiservice Networks, Sliema, October 2009, pp.15-20.
    [54]Rout R R, Ghosh S K, Chakrabarti S. Network coding-aware data aggregation for a distributed wireless sensor network. In Proceedings of the 4th International Conference on Industrial and Information Systems 2009, Peradeniya, December 2009, pp.32-36.
    [55]Hao J, Feng H L, Wu G X. Improving data transmission reliability with network coding in wireless sensor network. In Proceedings of International Conference on Multimedia Information Networking and Security, Nanjing, November 2010, pp.159-163.
    [56]Ayday E, Delgosha F, Fekri F. Location-aware security services for wireless sensor networks using network coding. In Proceedings of the 26th IEEE International Conference on Computer Communications, Anchorage, AK, May 2007,pp.1226-1234.
    [57]Lu F, Geng L J, Chia L-T, et al. Secure multi-path in sensor networks. In Proceedings of the 5th ACM International Conference on Embedded Networked Sensor Systems, Sydney, NSW, November 2007, pp.413-414.
    [58]Geng L J, Lu F, Liang Y-C, et al. Secure multi-path construction in wireless sensor networks using network coding. In Proceedings of IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, Poznan, September 2008, pp.1-5.
    [59]Wang D, Zhang Q, Liu J C. Partial network coding:theory and application for continuous sensor data collection. In Proceedings of the 14th IEEE International Workshop on Quality of Service, New Haven, CT, June 2006, pp.93-101.
    [60]Hong Y F, Xu J, Jiang C J. Lifetime maximization in wireless sensor networks with network coding. In Proceedings of 2007 International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, September 2007, pp.2527-2530.
    [61]Wang D, Zhang Q, Liu J C. Partial network coding:concept, performance, and application for continuous data collection in sensor networks. ACM Transactions on Sensor Networks.2008,4(3):1-22.
    [62]Lu W W, Pan J, Zhu Y H. A network coding and genetic algorithm based power efficient routing algorithm for wireless sensor networks. In Proceedings of the 3rd International Conference on Pattern Recognition and Machine Intelligence, New Delhi, December 2009, pp.573-578.
    [63]Tong J, Qian D P, Du Z G, et al. Energy-efficient coded routing with selective transmission power for wireless sensor networks. In Proceedings of IEEE 72nd Vehicular Technology Conference Fall, Ottawa, ON, September 2010.
    [64]Liu J, Du J Z, Zhang J, et al. RANC:opportunistic multi-path routing protocol in WSNs using reality-aware network coding. In Proceedings of Symposia and Workshops Held in Conjunction with the 7th International Conference on Ubiquitous Intelligence and Computing, UIC 2010 and the 7th International Conference on Autonomic and Trusted Computing, ATC 2010, Xi'an, October 2010, pp.185-190.
    [65]Li J, Ye X C, Ji Y S. A novel network coding scheme for data collection in WSNs with a mobile BS. In Proceedings of the 7th International Workshop on Databases in Networked Information Systems, Aizu-Wakamatsu, December 2011, pp.296-311.
    [66]Wang B, Li W X, Li L. A survey of energy conservation, routing and coverage in wireless sensor networks. In Proceedings of 7th International Conference on Active Media Technology, Lanzhou, September 2011, pp.59-70.
    [67]Vieira M A M, Coelho C N Jr, da Silva D C Jr, da Mata J M. Survey on wireless sensor network devices. In Proceedings of the Emerging Technologies and Factory Automation. Horizonte, September 2003, pp.537-544.
    [68]孙利民,李建中,陈渝,等.无线传感器网络.清华大学出版社.2005.
    [69]汪秀敏.无线传感器网络中低功耗的数据传输策略的研究[学位论文].中国科学技术大学.2011.
    [70]杨晓宗.无线传感器网络中基于地理信息的能量有效路由算法研究[学位论文].湖南大学.2006.
    [71]Tilak S, Abu-Ghazaleh N B, Heinzelman W. A taxonomy of wireless micro-sensor network models. ACM SIGMOBILE Mobile Computing and Communications Review.2002,6(2):28-36.
    [72]陆克中.无线传感器网络中的数据收集问题研究[学位论文].中国科学技术大学.2006.
    [73]周四望.无线传感器网络中的数据收集算法研究[学位论文].湖南大学.2007.
    [74]郑杰.无线传感器网络周期性数据收集研究[学位论文].中国科学技术大学.2010.
    [75]郑国强.无线传感器网络的能量高效数据收集技术研究[学位论文].西安电子科技大学.2011.
    [76]Shi H, Shang Y. A survey on network protocols for wireless sensor networks. In Proceedings of the Information Technology:Research and Education, Missouri, August 2003, pp.301-305.
    [77]Akkaya K, Younis M. A survey on routing protocols for wireless sensor networks. Ad Hoc Networks.2005,3(3):325-349.
    [78]Kunz T. Multicasting in mobile ad-hoc networks:achieving high packet delivery ratios. In Procedings of the Anual Conference of the Centre for Advanced Studies on Collaborative Reseach,2003, pp.1-15.
    [79]Heinzelman W R, Chandrakasan A, Balakrishnan H. Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of Hawaii International Conference on System Sciences, Maui, January 2000, pp.223-224.
    [80]Intanagonwiwat C, Govindan R, Estrin D, et al. Directed diffusion:A scalable and robust communication paradigm for sensor networks. In Proceedings of the Annual International Conference on Mobile Computing and Networking, Boston, August 2000, pp.56-67.
    [81]Karp B. GPSR:greedy perimeter stateless routing for wireless networks. In Proceedings of the Annual International Conference on Mobile Computing and Networking, Boston, August 2000, pp.243-254.
    [82]Biswas S, Morris R. Opportunistic routing in multi-hop wireless networks. Computer Communication Review.2004,34(1):69-74.
    [83]Biswas S, Morris R. ExOR:opportunistic routing in multi-hop wireless networks. Computer Communication Review.2005,35(4):133-144.
    [84]田克,张宝贤,马建,姚郑.无线多跳网络中的机会路由.软件学报.2010,21(10):2542-2553.
    [85]Elias P, Feinstein A, Shannon C. A note on the maximum flow through a network, IRE Trans. Inf. Theory.1956,2(4):117-119.
    [86]黄辰.基于网络编码的无线网络通信机制研究[学位论文].华中科技大学.2010.
    [87]Jaggi S, Sanders P, Chou P, et al. Polynomial time algorithms for multicast network code construction. IEEE Transactions on Information Theory.2005, 51(6):1973-1982.
    [88]Li S-Y R, Yeung R W, Cai N. Linear network coding. IEEE Transactions on Information Theory.2003,49(2):371-381.
    [89]Koetter R, Medard M. An algebraic approach to network coding. IEEE/ACM Transactions on Networking.2003,11(5):782-795.
    [90]Sanders P, Egner S, Tolhuizen L. Polynomial time algorithms for network information flow. In Proceedings of the Annual ACM Symposium on Parallel Algorithms and Architectures, San Diego, June 2003, pp.286-294.
    [91]Fragouli C, Soljanin E. Decentralized network coding. In Proceedings of 2004 IEEE Information Theory Workshop, San Antonio, October 2004, pp.310-314.
    [92]Ho T, Medard M, Koetter R, et al. A random linear network coding approach to multicast. IEEE Transactions on Information Theory.2006,52(10):4413-4430.
    [93]Ho T, Koetter R, Medard M, et al. The benefits of coding over routing in a randomized setting. In Proceedings of IEEE International Symposium on Information Theory, Yokohama, July 2003, pp.442-444.
    [94]Wu Y, Chou P, Kung S Y. Information exchange in wireless networks with network coding and physical-layer broadcast. Microsoft Research.2005.
    [95]Ni B, Santhapuri N, Zhong Z F, et al. Routing with opportunistically coded exchanges in wireless mesh networks. In Proceedings of the 2nd IEEE Workshop on Wireless Mesh Networks, Reston, September 2006, pp.157-159.
    [96]Zhang X, Wicker S. Robustness vs. efficiency in sensor networks. In Proceedings of the 4th International Symposium on Information Processing in Sensor Networks, Los Angeles, April 2005, pp.225-230.
    [97]Chou P A, Wu Y N, Jain K. Practical network coding. In Proceedings of the 41st Allerton Annu. Conf. Commun.,2003.
    [98]杨林.无线网络下的网络编码技术研究[学位论文].国防科学技术大学.国防科学技术大学.2009.
    [99]马冠骏,许胤龙,林明宏,宣颖.基于网络编码的P2P内容分发性能分析.中国科学技术大学学报.2006,36(11):1237-1240.
    [100]Kim M, Ahn C W, Medard M, et al. On minimizing network coding resources: an evolutionary approach. In Proceedings of NetCod,2006.
    [101]Minkyu K, Medard M, Aggarwal V, et al. Evolutionary approaches to minimizing network coding resources. In Proceedings of the 26th IEEE International Conference on Computer Communications, Anchorage, AK, May 2007, pp.1991-1999.
    [102]Wang M, Li B. Lava:a reality check of network coding in peer-to-peer live streaming. In Proceedings of IEEE INFOCOM 2007, Anchorage, AK, May 2007, pp.1082-1090.
    [103]Mohsenian-Rad A H, Huang J W, Wong V W S, et al. A game-theoretic analysis of inter-session network coding. In Proceedings of the IEEE International Conference on Communications, Dresden, June 2009, pp.1-6.
    [104]Dougherty R, Freiling C, Zeger K. Insufficiency of linear coding in network information flow. IEEE Transactions on Information Theory.2005,51(8): 2745-2759.
    [105]Sengupta S, Rayanchu S, Banerjee S. An analysis of wireless network coding for unicast sessions:the case for coding-aware routing. In Proceedings of IEEE INFOCOM 2007:26th IEEE International Conference on Computer Communications, Anchorage, AK, May 2007, pp.1028-1036.
    [106]Sagduyu Y E, Guo D N, Berry R. Throughput optimal control for relay-assisted wireless broadcast with network coding. In Proceedings of the 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks Workshops, San Francisco, CA, June 2008, pp.1-6.
    [107]Kamra A, Misra V, Feldman J, et al. Growth codes:maximizing sensor network data persistence. Computer Communication Review.2006,36(4):255-266.
    [108]Guo Z, Wang B, Cui J-H. Efficient error recovery using network coding in underwater sensor networks. In Proceedings of the 6th International IFIP-TC6 Networking Conference-NETWORKING 2007 Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, Atlanta, GA, May 2007, pp.227-238.
    [109]Dimakis A G, Prabhakaran V, Ramchandran K. Ubiquitous access to distributed data in large-scale sensor networks through decentralized erasure codes. In Proceedings of the 4th International Symposium on Information Processing in Sensor Networks, Los Angeles, CA, April 2005, pp.111-117.
    [110]Wang N, Lin J R. Network coding for distributed data storage and continuous collection in wireless sensor networks. In Proceedings of 2008 International Conference on Wireless Communications, Networking and Mobile Computing, Dalian, October 2008, pp.1-4.
    [111]Buttyan L, Czap L, Vajda I. Securing coding based distributed storage in wireless sensor networks. In Proceedings of the 5th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, Atlanta, GA, September 2008, pp.821-827.
    [112]Lima L, Medard M, Barros J. Random linear network coding:a free cipher? In Proceedings of 2007 IEEE International Symposium on Information Theory, Nice, June 2007, pp.546-550.
    [113]Cascella R G, Cao Z, Gerla M, et al. Weak data secrecy via obfuscation in network coding based content distribution. In Proceedings of the 1st IFIP Wireless Days, Dubai, November 2008, pp.1-5.
    [114]Gerlay M, Cascella R G, Cao Z, et al. An efficient weak secrecy scheme for network coding data dissemination in VANET. In Proceedings of IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, Poznan, September 2008, pp.1-5.
    [115]Cai N, Yeung R W. Secure network coding. In Proceedings of 2002 IEEE International Symposium on Information Theory, June 2002.
    [116]Cai N, Yeung R W. Network coding and error correction. In Proceedings of the 2002 IEEE Information Theory Workshop, October 2002, pp.119-122.
    [117]Feldman J, Malkin T, Servedio R A, et al. On the capacity of secure network coding. In Proceedings of the 42nd Annual Allerton Conference on Communication, Control and Computing,2004.
    [118]Bhattad K, Narayanan K R. Weakly secure network coding. In Proceedings of the 1st Workshop on Network Coding, Theory, and Applications,2005.
    [119]Gkantsidis C, Rodriguez P. Cooperative security for network coding file distribution. In Proceedings of the 25th IEEE International Conference on Computer Communications, Barcelona, April 2006.
    [120]Ho T, Leong B, Koetter R, et al. Byzantine modification detection in multicast networks with random network coding. IEEE Transactions on Information Theory. 2008,54(6):2798-2803.
    [121]Koetter R, Kschischang F R. Coding for errors and erasures in random network coding. IEEE Transactions on Information Theory.2008,54(8):3579-3591.
    [122]Yu Z, Wei Y W, Ramkumar B, et al. An efficient signature-based scheme for securing network coding against pollution attacks. In Proceedings of the 27th IEEE Communications Society Conference on Computer Communications, Phoenix, AZ, April 2008, pp.2083-2091.
    [123]Zhang Z. Linear network error correction coding in packet networks. IEEE Transactions on Information Theory.2008,54(1):209-218.
    [124]Vyetrenko S, Khosla A, Ho T. On combining information-theoretic and cryptographic approaches to network coding security against the pollution attack. In Proceedings of the 43rd Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, November 2009, pp.788-792.
    [125]Yu Z, Wei Y W, Ramkumar B, et al. An efficient scheme for securing XOR network coding against pollution attacks. In Proceedings of the 28th Conference on Computer Communications, Rio de Janeiro, April 2009, pp.406-414.
    [126]Guo Q, Luo M X, Li L X, et al. Secure network coding against wiretapping and byzantine attacks. Eurasip Journal on Wireless Communications and Networking. 2010.
    [127]Luo M X, Yang Y X, Wang L C, et al. Secure network coding in the presence of eavesdroppers. Science China Information Sciences.2010,53(3):648-658.
    [128]Wei Y W, Yu Z, Guan Y. Efficient weakly-secure network coding schemes against wiretapping attacks. In Proceedings of 2010 IEEE International Symposium on Network Coding, Toronto, ON, June 2010, pp.25-30.
    [129]Li X P, Li D M, Liu L Y, et al. An opportunistic routing protocol based on random linear network coding in wireless sensor networks. In Proceedings of the 2nd International Workshop on Education Technology and Computer Science, Wuhan, March 2010, pp.98-101.
    [130]Widmer J, Fragouli C, Le Boudec J-Y. Low-complexity energy-efficient broadcasting in wireless ad-hoc networks using network coding. In Proceedings of Workshop on Network Coding, Theory, and Applications, Riva del Garda, April 2005.
    [131]Platz D, Woldegebreal D H, Karl H. Random network coding in wireless sensor networks:energy efficiency via cross-layer approach. In Proceedings of the IEEE 10th International Symposium on Spread Spectrum Techniques and Applications, Bologna, August 2008, pp.654-660.
    [132]Wang S Y, Gao X J, Zhuo L. Survey of network coding and its benefits in energy saving over wireless sensor networks. In Proceedings of the 7th International Conference on Information, Communications and Signal Processing, Macau, December 2009, pp.1-5.
    [133]Cui T, Chen L J, Ho T, et al. Opportunistic source coding for data gathering in wireless sensor networks. In Proceedings of the IEEE International Conference on Mobile Adhoc and Sensor Systems, Pisa, October 2007, pp.1-11.
    [134]Yan Y, Zhang B X, Zheng J, et al. CORE:a coding-aware opportunistic routing mechanism for wireless mesh networks. IEEE Wireless Communications.2010, 17(3):96-103.
    [135]Zorzi M, Rao R R. Geographic random forwarding (GeRaF) for ad hoc and sensor networks:multihop performance. IEEE Transactions on Mobile Computing.2003,2(4):337-348.
    [136]Nassr M S, Jangeun J, Eidenbenz S J, et al. Scalable and reliable sensor network routing:performance study from field deployment. In Proceedings of the IEEE INFOCOM 2007, Washington, May 2007, pp.670-678.
    [137]Yuan Y, Yang H, Wong S, et al. ROMER:resilient opportunistic mesh routing for wireless mesh networks. In Proceedings of the IEEE WiMesh 2005, Washington,2005.
    [138]Zhao B, Seshadri R I, Valenti M C. Geographic random forwarding with hybrid-ARQ for ad hoc networks with rapid sleep cycles. In Proceedings of the IEEE GLOBECOM 2004, Dallas, TX, November 2004, pp.3047-3052.
    [139]Marina M K, Das S R. On-demand multipath distance vector routing in ad hoc networks. In Proceedings of the International Conference for Network Protocols, Riverside, CA, November 2001, pp.14-23.
    [140]Perkins C E, Royer E M. Ad-hoc on-demand distance vector routing. In proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, February 1999, pp.90-100.
    [141]Deb B, Bhatnagar S, Nath B. ReInForM:reliable information forwarding using multiple paths in sensor networks. In Proceedings of the 28th Annual IEEE International Conference on Local Computer Networks, Washington, DC, October 2003, pp.406-415.
    [142]Kim M, Jeong E, Bang Y-C, et al. An energy-aware multipath routing algorithm in wireless sensor networks. IEICE Transactions on Information and Systems. 2008, E91-D(10):2419-2427.
    [143]Servetto S D, Barrenechea G. Constrained random walks on random graphs: routing algorithms for large scale wireless sensor networks. In Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications, Atlanta, GA, September 2002, pp.12-21.
    [144]Huang X, Fang Y. Multiconstrained QoS multipath routing in wireless sensor networks. Wireless Networks.2008,14(4):465-478.
    [145]Yan Y, Zhang B X, Zhao Z, et al. Mechanism for maximizing area-centric coding gains in wireless multihop networks. In Proceedings of the IEEE International Conference on Communications, Dresden, June 2009, pp.1-5.
    [146]Mehmood T, Libman L. Towards optimal forwarding in wireless networks: opportunistic routing meets network coding. In Proceedings of IEEE 34th Conference on Local Computer Networks, Zurich, October 2009, pp.538-545.
    [147]Tobagi F A, Hunt V B. Performance analysis of carrier sense multiple access with collision detection. Computer Networks.1979,4(5):245-259.
    [148]Chen X F, Zhao Z F, Zhang H G, et al. Inter-cluster connection in cognitive wireless mesh networks based on intelligent network coding. In Proceedings of the IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications, Tokyo, September 2009, pp.1251-1256.
    [149]Duarte-Melo E J, Liu M Y. Analysis of energy consumption and lifetime of heterogeneous wireless sensor networks. In Proceedings of the IEEE Global Telecommunications Conference, Taipei, November 2002, pp.21-25.
    [150]Militano L, Fitzek F H P, Iera A, et al. A genetic algorithm for source election in cooperative clusters implementing network coding. In Proceedings of the IEEE International Conference on Communications Workshops, Capetown, May 2010, pp.1-5.
    [151]Salhi I, Ghamri-Doudane Y, Lohier S, Roussel G. When network coding improves the performances of clustered wireless networks.2011 IFIP Wireless Days, Niagara Falls, October 2011, pp.1-6.
    [152]Xiong Z Q, Chen W, Cao W H. An energy-efficient cluster-based cooperative mimo scheme using network coding. In Proceedings of the 7th International Conference on Wireless Communications, Networking and Mobile Computing, Wuhan, September 2011, pp.1-5.
    [153]Sangenya Y, Umehara D, Morikura M, et al. Novel length aware packet aggregation and coding scheme for multi-hop wireless LANs. In Proceedings of 5th International Conference on Signal Processing and Telecommunication Systems, Honolulu, HI, December 2011, pp.1-5.
    [154]Rappaport T S. Wireless Communications:Principles and Practice.2nd ed., Prentice Hall,2002, pp.1-20.
    [155]Hessler A, Kakumaru T, Perrey H, et al. Data obfuscation with network coding. Computer Communications.2012,35(1):pp.48-61.
    [156]Yao A C. Protocols for secure computations. In Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, Chicago,1982, pp.160-164.
    [157]Goldreich O. Secure Multi-Party Computation. Foundations of Cryptography. Cambridge University Press,2002, pp.70-85.
    [158]Rivest R L. All-or-nothing encryption and the package transform. Fast Software Encryption Lecture Notes in Computer Science.1997,1267(1997):210-218.
    [159]Stinson D R. Something about all or nothing (transforms). Designs, Codes and Cryptography.2001,22(2):133-138.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700