无线传感器网络中路由协议的跨层设计研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
无线传感器网络WSN (Wireless Sensor Network)集成了传感器、微机电、现代计算和无线通信网络等技术,由于其巨大的应用前景成为了学术界和工业界广泛关注的焦点。路由算法在面向应用的无线传感器网络中起着举足轻重的作用。而无线传感器网络在网络特点、通信模型和数据传输需求等方面的独有特性,制约了众多传统的路由算法在无线传感器网络中的应用。跨层设计以其简单灵活的设计理念、对不同网络结构和应用环境的普适性等优点,使得跨层设计理念和无线传感器网络中路由协议的设计形成了天然的结合,为无线传感器网络的研究注入了新鲜的血液。
     本文为设计出适用于无线传感器网络的路由协议,以跨层设计的理念为主线,主要的研究成果和创新点如下:
     1.以跨层设计理念为核心,提出了一种基于竞争模式的、对动态信道具有较好鲁棒性的路由协议—CACR (Channel Aware Contention based Routing scheme)
     针对已有路由算法在信道较差的情况下难以保证数据报文的正确、有效传输的缺陷,提出了一种具有良好性质的信道参数。在此基础上,从节点竞争信道的过程出发,针对多个节点同时接入信道可能产生的碰撞等问题,提出了一种优化的接入空间机制ASM (Access Space Mechanism),并设计了一种基于竞争模式的可感知信道的路由协议。协议综合考虑了物理层、MAC (Medium Access Control)层和路由层的性能,实现对竞争过程和下一跳节点的优化过程。本文利用了动态规划等数学理论,充分分析了接入空间的成功概率等性能。而在不同信道状况下的仿真结果表明,协议在报文递交比率等方面有了较大提高,并能够有效保证信道的竞争性能。
     2.基于跨层设计思想提出了一种面向分布式事件检测的特定应用的路由技术——ECCRD (Energy-efficient Contention-based Cooperative Routing for distributed event Detection)
     为实现无线传感器网络事件检测的应用,除了要考虑无线传感器网络自身的能量和资源受限的问题,还必须解决大量检测数据对网络造成负荷过高的问题。文章引入基于高斯-马尔科夫模型的链路参数,采用跨层思想设计了一种节能的可用于分布式事件检测的协作路由协议。协议将路由性能、单个链路对全网检测性能的贡献以及无线信道接入的动态特性相结合,将路由、检测和信道接入几个问题转化成一个跨层的接入空间的求解问题,在每次寻路过程中求解可优化网络性能的方案。仿真表明,协议在保证无线传感器网络中大范围事件的分布式检测性能同时,能够有效地减小网络的能量消耗。
     3.采用跨层理念,提出了一种可优化网络生命周期的路由算法MOFD (Multi-Optimized Function Directed diffusion protocol)
     从无线传感器网络路由协议的能耗问题出发,分析了目前无线传感器网络路由协议的研究特点,指出已有工作在协议能量消耗和网络能量均衡等方面的缺陷。进一步针对平衡网络中节点能量消耗、延长网络生命周期上的优化目标,提出了一种可优化网络生命周期的路由协议。仿真结果显示,与传统的推扩散协议相比,本协议实现了更低的能耗以及更高的传输可靠性,显著的延长了网络生命期。
     4.以跨层设计为主线,提出一种可抵抗干扰攻击的安全路由协议SRRJ (Secure Routing protocol Resilient to Jamming)
     从无线传感器网络路由协议的安全性出发,着重分析了干扰攻击及检测模型,并提出一种可抵抗干扰攻击的路由协议。协议首先引入干扰检测机制对网络安全状态进行跨层分析。在获得干扰攻击及网络安全性能等检测结果的基础上,协议采用跨层设计的思路,最大程度地避开恶意节点及其影响区域,并尽量减小干扰攻击对网络带来的负面影响,从而实现网络安全性能的提升。
Wireless sensor network integrates the sensor, micro-electromechanical system, modern computing and wireless communication networks. WSNs have attracted much focus from both academic and industrial fields due to their great application prospect. Routing algorithm plays an increasingly important role in the application-oriented WSN. However, the unique characteristics of WSN in network feature, communication model and data transmission, have hampered the application of most traditional routing protocols in WSN. Cross-layer design has formed a natural combination with routing protocols of WSN for its simple but flexible idea and its universality for different network structure and application. Thus, with cross-layer design, research of WSN has become less complicated and more practical.
     This theme takes cross-layer idea as the main line to design routing protocols suitable for WSN. The research briefs and innovation of this theme are mainly indicated on four aspects as follows:
     1. A cross-layer channel aware contention based routing scheme for wireless sensor network is proposed
     The existing routing protocol could hardly guarantee the correctness and effectiveness of packets'transmission, thus the theme proposes a well-defined channel characteristic. Then an optimized access space mechanism is proposed used as criterion of relay selection during the channel contention round. Based on ASM, a channel aware contention based routing scheme for wireless sensor network is presented. The scheme selects the appropriate relay node by the integrated consideration of access probability, routing cost metrics and wireless channel characteristics. Besides, we analyze the performance of ASM, such as successful probability, with the dynamic programming. The simulation results show that CACR achieves better network performance in terms of packet delivery ratio and improves the contention efficiency consequently.
     2. An energy-efficient contention-based cooperative routing for distributed event detection is proposed based on cross layer methodology
     Event detection is one of the significant applications in WSN. Besides energy and resource constraint of WSN, high network load due to plenty of detection data is one of the most important problems for the routing for event detection. This theme introduces a channel parameter based on Gauss-Markov model and designs an energy-efficient contention-based cooperative routing for event detection. ECCRD incorporates detection efficiency, access probability and energy consumption. Detection, channel access and routing are formed as a cross-layer access space problem, and network performance is optimized during the process of routing. Simulation results show that ECCRD achieves better detection efficiency for large scale detection and consumes less energy.
     3. A cross-layer multi-optimized function directed diffusion protocol called MOFD is proposed
     This theme analyzes energy consumption and balance of the existing routing protocol and points out the defectiveness of these works. Then for the purpose of network energy balance and lifetime improvement, a novel cross-layer multi-optimized function directed diffusion protocol called MOFD is proposed based on traditional push diffusion protocols. Simulations in ns-2 proved that the MOFD protocol could prolong the lifetime and enhance the robustness of the whole network, compared with the original push diffusion.
     4. A secure routing protocol resilient to jamming is proposed via functional interactions with physical and MAC layer.
     To improve the security of routing protocol in WSN, this them analyzes the jamming attack and detection model, and proposes a secure routing protocol resilient to jamming. SRRJ introduces a jamming detection mechanism for cross-layer network security analysis. Based on detection result of jamming attack and network security, SRRJ avoids the malicious node and the affected region by the greatest extent. SRRJ could reduce the negative impact of jamming attack and improve the network security performance.
引文
[1]Benjamin Fulford, "Sensors Gone Wild", Forbes,2002.10.28.
    [2]李建中,李金宝,石胜飞.传感器网络及其数据管理的概念、问题与进展[J].软件学报,2003,14(10):1717-1726.
    [3]Tilak S, Abu-Ghazaleh NB, Heinzelman W."A taxonomy of wireless micro-sensor network models". Mobile Computing and Communications Review,2002,6(2):28-36.
    [4]Heather Green, "The Future of Technolog-Tech Wave 2:The Sensor Revolution", Business Week 2003.8.25
    [5]IEEE Spectrum,2004.7
    [6]IEEE Computer,2004.8
    [7]Technology Review:"10 Emerging Technologies That Will Change the World", Technology Review,2003.2
    [8]Mark Weiser. Computer for the 21th Century[J], Scientific American. September,1991.
    [9]D. Estrin, L. Girod, G. Pottie, and M. Srivastava. Instrumenting the world with wireless sensor networks. In International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2001), Salt Lake City, UT, May 2001.
    [10]孙利民等,无线传感器网络,清华大学出版社,2005,ISBN:7-302-10963-2
    [11]马祖长,孙怡宁,无线传感器网络综述,通信学报,2004年4月
    [12]ESTRIN D, GOVINDAN R, HEIDEMANN J. Next century challenges:scalable coordination in sensor networks[A]. Proceedings of the Fifth Annual International Conference on Mobile Computing and Networks (MobiCOM'99)[C]. Washington, USA, 1999.263-270
    [13]崔逊学,左从菊等.无线传感器网络简明教程.北京:清华大学出版社,2009
    [14]林亚平,王雷,陈宇,张锦,陈治平,童调生,传感器网络中一种分布式数据汇聚层次路由算法,电子学报,2004,32(11)1801-1805
    [15]宋文,无线传感器网络技术与应用[M],北京:电子工业出版社,2007.
    [16]约翰.纳什,Non-Cooperative Games, The Annals of Mathematics,1951
    [17]W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks, " in MobiHoc'05:Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing,2005, pp.46-57
    [18]D. Chen, J. Deng, and P. K. Varshney, "Protecting Wireless Networks against a Denial of Service Attack Based on Virtual Jamming," in MOBICOM-Proceedings of the Ninth Annual International Conference on Mobile Computing and Networking. San Diego, CA, USA:ACM,2003
    [19]A.Wood, J. Stankovic, and G. Zhou, "DEEJAM:Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks," in Sensor, Mesh and Ad Hoc Communications and Networks,2007. SECON'07.4th Annual IEEE Communications Society Conference on, June 2007, pp.60-69
    [20]G. Bianchi, "Performance analysis of the IEEE 802.11 distributed coordination function," IEEE Journal on Selected Areas in Communications, vol.18, no.3, pp.535-547,2000
    [21]A. Elfes, "Occupancy Grids:A Stochastic Spatial Representation for Active Robot Perception," in Autonomous Mobile Robots:Perception, Mapping, and Navigation (Vol. 1), S. S. Iyengar and A. Elfes, Eds. IEEE Computer Society Press,1991, pp.60-70
    [22]H. Khalife and N. Malouch, "Interaction Between Hidden Node Collisions and Congestions in Multihop Wireless Ad-hoc Networks," in IEEE International Conference on Communications,2006. ICC'06., vol.9, June 2006, pp.3947-3952
    [23]P. Acharya, A. Sharma, E. Belding, K. Almeroth, and K. Papagiannaki, "Congestion-Aware Rate Adaptation in Wireless Networks:A Measurement-Driven Approach," in 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks,2008. SECON'08, June 2008, pp.1-9
    [24]A. P. Jardosh, K. N. Ramachandran, K. C. Almeroth, and E. M. Belding-Royer, "Understanding Congestion in IEEE 802.11b Wireless Networks," in Proceedings of the 2005 Internet Measurement Conference, Oct.2005, pp.279-292
    [25]B. Blum, T. He, S. Son, and J. Stankovic. IGF:A state-free robust communication protocol for wireless sensor networks. Technical Report CS-2003-11, Univ. of Virginia, Charlottesville, VA,2003
    [26]IEEE, "Medium access control (mac) and physical specifications," IEEE P802.11/D10, 1999
    [27]X Liu, G Noubir, R Sundaram, S Tan, Spread:Foiling smart jammers using multi-layer agility, Proc. of IEEE INFOCOM,2007
    [28]J. Bellardo and S. Savage, "802.11 denial-of-service attacks:Real vulnerabilities and practical solutions," in Proc.USENIX Security Symposium,2003.
    [29]Yang H, Wong S, Lu S W, et al.2006. Secure diffusion for wireless sensor nenvorks[C]//3rd Intenational Conference on Broadband Communications. Networks and Systems(BROADNETS 2006):1-10.
    [30]Oliveira LB, Wong HC, Bern M, et al.2006. SecLEACH—a random key distribution solution for securing cluStered sensor networks[C]//Fifth IEEE International Symposium on Network Computing and Applications(NCA2006)
    [31]Wood A D, Fang L, Stankovic J A, et al.2006. SIGF:a family of configurable, Secure routing protocols for wireless sensor networks [C]. Proceeings of the Fourth ACM Wbrkshop on Security of Ad Hoc and Sensor Networks:35—48.
    [32]Deng J, Han R, Mishra S.2002. INSENS:intrusion—tolerant routing in wireless sensor networks[R]. Department of Computer Science, University of Colrado, Technical Report CU-CS-939-02
    [33]Du X J, Lin F J.2005. Secure cell relay routing protocol for sensor networks[C]. Proceedings of the 24th IEEE International Performance, Computing, and Communications Conference (IPCCC2005):477-482.
    [34]Parno B, Luk M, Gaustad E, Secure sensor network routing:a clean-state approach[C]. Proceedings of the 2006 ACM CoNEXT Conference.
    [35]Wang X Y, Yang L Z, Chen K F.2004. SDD:secure directed diffusion protocol for sensor networks[C].//lst European Workshop on Security in Ad-Hoc and Sensor Networks(ESAS2004).
    [36]Wang XY Yang LZ, Chen K F.2005. SLEACH:secure low-energy adaptive clustering hierarchy protocol for wireless Sensor networks[J]. Wuhan Univercity Journal of Natural Sciences,10(1):127-131
    [37]曾迎之,苏金树,赵宝康,无线传感器网络安全认证技术综述,计算机应用与软件,Vol.26,No.3,Mar.2009.
    [38]Xu Y, Chen G Ford, et al. Detecting wormhole attacks in wireless sensor networks [C]. //International Federation For Information Processing, Great Britain:Springer,2008,253: 267-280.
    [39]郎为民,杨宗凯,吴世忠,谭运猛.无线传感器网络安全研究.计算机科学.2005Vol.32,No.5,PP.54-58.
    [40]C. Karlof and D. Wagner. Secure routing in wireless sensor networks:Attacks and countermeasures. Elsevier's Ad Hoc Networks Journal, Special Issue on Sensor Network Applications and Protocols 1(2-3):293-315, September 2003
    [41]Geethapriya Thamilarasu, Cross-Layer Designs for Security in Wireless Ad Hoc Networks, July 2009
    [42]Q. Fang, J. Gao, and L. J. Guibas, "Locating and bypassing routing holes in sensor networks," in Proc.IEEE Infocom, Hong Kong, Mar.2004, pp.2458-2468.
    [43]D. Chen, J. Deng, and P. K. Varshney, "Selection of a forwarding area for contention-based geographic forwarding in wireless multi-hop networks "IEEE Trans. Veh. Technol., vol.56, no.5, pt.2, pp.3111-3122, Sep.2007
    [44]M. Heissenbiittel, T. Braun, T. Bernoulli, and M.Walchli, "BLR:Beaconless routing algorithm for mobile ad-hoc networks," Comput.Commun. J., vol.27, no.11, pp. 1076-1086, Jul.2004.
    [45]A. Leon-Garcia, Probability and Random Processes for Electrical Engineering,2nd ed. Reading, MA:Addison-Wesley,1994
    [46]J. Nonnenmacher, E.W. Biersack, Scalable feedback for large groups, IEEE/ACM Trans. Networking 7 (3) (1999) 375-386.
    [47]T.T. Fuhrmann, J. Widmer, On the scaling of feedback algorithms for very large multicast groups, Computer Communications 24 (5-6) (2001) 539-547.
    [48]ANSI/IEEE, ANSI/IEEE Std 802.11,1999th Edition,1999.
    [49]T.S. Rappaport, Wireless communications principles and practice. Prentice Hall PTR, ISBN-10:0130422320, Dec.2001
    [50]P. Popovski, F. H. Fitzek, and R. Prasad, "Batch Conflict Resolution Algorithm with Progressively Accurate Multiplicity Estimation," in ACM DIAL M-POMC, Philadelphia, Pennsylvania, US, Oct.2004
    [51]H. Fuβler, J. Widmer, M. Kasemann, M. Mauve and H. Hartenstein, "Contention-based forwarding for mobile ad-hoc networks," Elsevier's Ad Hoc Networks, vol.1, no.4, pp. 351-569, Nov 2003
    [52]M. Rossi, N. Bui and M. Zorzi,"Cost and Collision Minimizing Forwarding Schemes for Wireless Sensor Networks," Proc.26th IEEE International Conference on Computer Communications (INFOCOM 2007), IEEE Press, May.2007, pp.276-284, doi: 10.1109/INFCOM.2007.40.
    [53]L. Zhang and B. Soong, "A New Energy-Efficient Local Metric for Channel-Aware Geographic-Informed Forwarding (CAGIF) in Wireless Sensor Networks," Proc. IEEE International Conference Communications 2007 (ICC'07), Jun.2007, pp.3184-3189, doi: 10.1109/ICC.2007.528.
    [54]M. Zorzi, R. Rao, Energy-efficient forwarding for ad hoc and sensor networks in the presence of fading, Proc. IEEE International Conference on Communications 2004 (ICC.2004), Jun.2004, pp.3784-3789 Vol.7, doi:10.1109/.1313261.
    [55]S. Lee, B. Bhattacharjee and S. Banerjee, Efficient geographic routing in multihop wireless networks, Proc. IEEE of MobiHoc, May,2005, pp.230-241.
    [56]D. Chen, J. Deng and P. K. Varshney, "On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks," Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks 2005 (IEEE SECON 2005), Sept.2005, pp.130-141.
    [57]M. Zorzi and R. R. Rao, "Geographic Random Forwarding (GeRaF) for Ad Hoc and Sensor Networks:Multihop Performance," IEEE Trans. Mobile Comput., vol.2 issue 4, Oct-Dec 2003, pp.337-348, doi:10.1109/TMC.2003.1255648.
    [58]D. Ferrara, L. Galluccio, A. Leonardi, G. Morabito, and S. Palazzo, "MACRO:An Integrated MAC/ROuting Protocol for Geographical Forwarding in Wireless Sensor Networks," Proc. IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2005), Mar.2005, vol.3 pp.1770-1781, doi: 10.1109/INFCOM.2005.1498457
    [59]T. Melodia, D. Pompili, and I. F. Akyildiz, "Optimal Location Topology Knowledge for Energy Efficient Geographical Routing in Sensor Networks,"in IEEE INFOCOM, Hong Kong, P.R. China, Mar 2004
    [60]Y. C. Tay, K. Jamieson, and H. Balakrishnan, "Collision-Minimizing CSMA and its Applications to Wireless Sensor Networks," IEEE J. Select. Areas Commun., vol.22, no. 6, pp.1048-1057, Aug 2004
    [61]Wireless LAN Medium Access Control and Physical Layer Specifications, Aug.1999. IEEE 802.11 Standard
    [62]R. Metcalfe and D. Boggs, "Ethernet:Distributed packet switching for local computer networks," in Commun. ACM, vol.19, July 1976, pp.395-404.
    [63]Eric V. Denardo, Dynamic Programming:Models and Applications,2nd ed. Mineola, New York, US:Dover Publications, Inc.,2003.
    [64]H. V. Poor, An Introduction to Signal Detection and Estimation. New York: Springer-Verlag,1994.
    [65]A. Dembo and O. Zeitouni, "Large Deviations Techniques and Applications," Springer, 1998
    [66]F. C. Schweppe, "Evaluation of likelihood functions for Gaussian signals," IEEE Trans. on Information Theory, vol. IT-1, pp.61-70,1965
    [67]A. Papoulis, Probability, Random Variables, and Stochastic Processes. McGraw-Hill, 1984
    [68]Rossi, M., Bui, N., Zorzi, M., Cost and Collision Minimizing Forwarding Schemes for Wireless Sensor Networks:Design, Analysis and Experimental Validation, IEEE Transactions on Mobile Computing, Volume:8, Issue: 3, Digital Object Identifier: 10.1109/TMC.2008.111, Publication Year:2009, Page(s):322-337
    [69]Y. Sung, S. Misra, L. Tong, and A. Ephremides, "Cooperative Routing for Distributed Detection in Large Sensor Networks," IEEE Journal on Selected Areas in Communications, vol.25, Issue 2, Feb.2007, pp.471-483
    [70]B. Chen, R. Jiang, T. Kasetkasem, and P. Varshney, "Channel aware decision fusion in wireless sensor networks," IEEE Trans. on Signal Processing, vol.52, pp.3454-3458, Dec.2004.
    [71]B. Chen and P. Willett, "On the Optimality of the Likelihood-Ratio Test for Local Sensor Decision Rules in the Presence of Nonideal Channels,"IEEE Trans. on Information Theory, vol.51, pp.693-700, Feb 2005.
    [72]G. Mergen and L. Tong, "Estimation Over deterministic multiaccess channels," in Proceedings of the 42nd Allerton Conf. on Communications, Control, and Computing, Monticello, IL, Sep.28-Oct.01 2003.
    [73]R.S. Blum and S.A. Kassam, "On the Asymptotic Relative Efficiency of Distributed Detection Schemes," IEEE Transactions on Information Theory, vol.41, pp.523-527, March 1995.
    [74]K. Liu and A. M. Sayed, "Optimal distributed detection strategies for wireless sensor networks," in 42nd Annual Allerton Conf. on Commun., Control and Comp., Oct.2004.
    [75]G. Mergen, V. Naware, and L. Tong, "Asymptotic detection performance of type-based multiple access in sensor networks," in Proc. of SPAWC'05, New York, June 2005.
    [76]G. Mergen, V. Naware, and L. Tong, "Asymptotic Detection Performance of Type-Based Multiple Access Over Multiaccess Fading Channels." submitted to IEEE Trans. on Signal Processing, May 2005.
    [77]J.-F. Chamberland and V. V. Veeravalli, "Asymptotic results for decentralized detection in power constrained wireless sensor networks," IEEE JSAC Special Issue on Wireless Sensor Networks,2004.
    [78]J.-F. Chamberland and V. V. Veeravalli, "Decentralized Detection in Sensor Networks," IEEE Trans. Signal Processing, vol.51, pp.407-416, February 2003.
    [79]J.-F. Chamberland and V. V. Veeravalli, "Design of sensor networks for detection applications via large-deviation theory," in Proc. of 2004 IEEE Information Theory Workshop, (San Antonio, TX), Oct.2004.
    [80]C. Intanagonwiwat, R. Govindan, and D. Esterin, "Directed Diffusion:A Scalable and Robust Paradigm for Sensor Networks," in Proc.6th ACM/Mobicom Conference, (Boston,MA), pp.56-67,2000.
    [81]D. Ganesan, R. Govindan, S. Shenker, and D. Estrin, "Highly resilient, energy efficient multipath routing in wireless sensor networks," in Mobile Computing and Communications Review (MC2R), vol.1,2002.
    [82]N. Sadagopan and A. H. B. Krishnamachari, "The acquire mechanism for efficient querying in sensor networks," in International Workshop on Sensor Network Protocol and Applications, (Anchorage, AK), May 2003.
    [83]D. Braginsky and D. Estrin, "Rumor Routing Algorithm for Sensor Networks," in Proc. of the 1st Workshop on Sensor Networks and Applications, (Atlanta, GA), Sept.2002.
    [84]L. Yu and A. Ephremides, "Detection performance and energy-efficiency trade-off in a sensor network," in Proc. of 2003 Allerton Conference, (Allerton, IL), Oct.2003.
    [85]S. Pattern, B. Krishnamachari, and R. Govindan, "The impact of spatial correlation on routing with compression in wireless sensor networks," in Proc. ACM/IEEE International Symposium on Information Processing in Sensor Networks (IPSN), Berkeley, April 2004.
    [86]R. Shah and J. Rabaey, "Energy aware routing for low energy ad hoc sensor networks," in Proc. of the 1st Intl. Workshop on Sensor Network Protocol and Applications, May 2003.
    [87]W. Heinzelman, J. Kulik, and H. Balakrishnan, "Adaptive Protocols for Information Dissemination in Wireless Sensor Networks," in Proc.5th ACM/IEEE Mobicom Conference, (Seattle,WA), August 1999.
    [88]S. Madden, M. J. Franklin, J. M. Hellerstein, and W. Hong, "TAG:a Tiny AGgregation Service for Ad-Hoc Sensor Networks," in 5th Annual Symposium on Operating Systems Design and Implementation (OSDI), Dec.2002.
    [89]J. Zhao, R. Govindan, and D. Estrin, "Residual energy scans for monitoring wireless sensor networks," in Proc. of IEEE Wireless Communications and Networking Conference (WCNC'02), (Orlando, FL, USA), March 2002.
    [90]S.Lindsey and C.S. Raghavendra, "PEGASIS:Power Efficient GAthering in Sensor Information Systems," in Proceedings of the 2002 IEEE Aerospace Conference, Big Sky, MT, March 2002.
    [91]B. Krishanamachari, D. Estrin, and S. Wicker, "The impact of data aggregation in wireless sensor networks," in International Workshop on Distributed Event-Based Systems, (DEBS'02), (Vienna, Austria), July 2002.
    [92]I. Solis and K. Obraczka, "The Impact of Timing in Data Aggregation for Sensor Networks," in Proc. of ICC 2004, (Paris, France), July 2004.
    [93]M. Coates, "Distributed particle filtering for sensor networks," in Proc. of IPSN, (Berkeley, CA), April 2004.
    [94]D. Spanos, R. Olfati-Saber, and R. Murray, "Distributed Kalman Filtering in Sensor Networks with Quantifiable Performance," in Proc. of IPSN 2005, (Los Angeles, CA), April 2005.
    [95]Y. Sung, L. Tong, and H. Poor, "Neyman-Pearson Detection of Gauss-Markov Signals in Noise:Closed-Form Error Exponent and Properties,"IEEE Trans. Information Theory, April 2006.
    [96]Y. Sung, S. Misra, L. Tong, and A. Ephremides, "Signal Processing for Application-Specific Ad Hoc Networks," IEEE Signal Processing Magazine, vol.23, no. 5, pp.74-83, September 2006.
    [97]Yu Gu, Hengchang Liu, Baohua Zhao, "Joint Scheduling and Routing for Lifetime Elongation in Surveillance Sensor Networks", IEEE APSCC 07, Tsukuba, Japan,2007
    [98]Chalermek Intanagonwiwat, Ramesh Govindan, Deborah Estrin, John Heidemann, "Directed Diffusion for Wireless Sensor Networking", IEEE/ACM TRANSACTIONS ON NETWORKING, VOL.11, NO.1, FEBRUARY 2003
    [99]John Heidemann, Fabio Silva, Deborah Estrin, "Matching Data Dissemination Algorithms to Application Requirements", ACM,2003.
    [100]Min Chen, Taekyoung Kwon, Yanghee Choi, "Energy-efficient differentiated directed diffusion in wireless sensor networks", Computer Communications 29 (2006) 231-245
    [101]Zeng Yuan-yuan, Xi Bo, Zeng Zi-ming, "Adaptive Directed Diffusion Routing In Wireless Sensor Networks Based On Application", IEEE CCECE/CCGEI, Saskatoon, May 2005
    [102]Alessia Marcucc, Michele Nati, Chiara Petrioli, Andrea Vitaletti, "Directed Diffusion Light:Low Overhead Data Dissemination in Wireless Sensor Networks", IEEE 2005
    [103]Fan Ye, Gary Zhong, Songwu Lu, Lixia Zhang, "GRAdient Broadcast:A Robust Data Delivery Protocol for Large Scale Sensor Networks", Springer Science+Business Media, Inc. Manufactured in The Netherlands,2005
    [104]Yu Y. Govindan R, and Estrin D. Geographical and Energy Aware Routing:A Recursive Data Dissemination Protocol for Wireless Sensor Networks. UCLA Computer Science Dept., Technical Report UCLA/CSD-TR.010-023, May 2001
    [105]Cerpa A, Estrin D. ASCENT:Adaptive self-configuring sensor networks topologies. In:Proc. of the IEEE INFOCOM,2002,23-27
    [106]Chen Y F and Nasser N. Energy-Balancing Multipath Routing Protocol for Wireless Sensor Networks. The Third International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, August 7-9,2006.
    [107]Frey H, Stojmenovic I. On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoe and Sensor Networks. MobiCom2006, Los Angeles, California,USA. September 23-26,2006,390-401.
    [108]Singh M, Prasanna V. Energy-Optimal and Energy-Balanced Sorting in a Single-Hop Wireless Sensor Network. In:Proceedings of the First IEEE International Conference on Pervasive Computing and Communications,2003.
    [109]Choi J. Y, Kiml H S, Back I, Kwon W H. Cell based Energy Density Aware Routing:a New Protocol for Improving the Lifetime of Wireless Sensor Networks. Computer Communications,2005,28:1293-1302.
    [110]Howitt I, Wang J. Energy Balanced Chain in Distributed Sensor Networks. Proceeding of the IEEE WCNC,2004,3:1721-1726.
    [111]Olariu S, Stojmenovic I. Design guidelines for maximizing lifetime and avoiding energy holes in sensor networks with uniform distribution and uniform reporting. In 25th Conference on Computer Communications(INFOCOM), IEEE Communications Society, IEEE Computer Society Press, Silver Spring, MD, April 2006.
    [112]Wu X B, Chert G H, Das S K. On the Energy Hole Problem of Nonuniform Node Distribution in Wireless Sensor Networks. Mobile Adhoc and Sensor Systems(MASS), IEEE International Conference,2006,180-187.
    [113]Powell O, Leone P, Rolim J. Energy optimal data propagation in wireless sensor networks. Journal of Parallel and Distributed Computing,2007,7(3):302-317.
    [114]Luo J, Hubaux J P. Joint mobility and routing for lifetime elongation in wireless sensor networks. INFOCOM,2005,1735-1746.
    [115]Wang W, Srinivasan V, and Chaing C K. Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks. In Proc of MobiCom,2005,270-283.
    [116]Efthymiou C, Nikoletseas S, Rolim J. Energy Balanced Data Propagation in Wireless Sensor Networks. Wireless Networks(C), Special Issue:Selected Papers from WMAN '04,2006,12(6):691-707.
    [117]Xue Q, Ganz A. On the lifetime of large scale sensor networks. Computer Communications,2006,29:502-510.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700