无线传感器网络数据收集与生存算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
由大量廉价、低功率传感器节点组成的无线传感器网络具有快速部署、适用于各种恶劣环境、能够感知并获取网络覆盖区域中大量详实而可靠的数据等优点,在国防军事、环境监测、医疗卫生、交通运输、工业控制等领域有着广阔的应用前景。一方面,由于成本控制和体积限制等原因,无线传感器网中节点的能量、计算、存储、带宽等资源严重受限。为减少资源消耗,传感器节点通常采用周期性的工作/睡眠调度模式和短距离的通信方式,采集到的数据是通过节点间相互协作以多跳转发的方式传递到汇聚节点的,因而无线传感器网络具有间断连通和多跳转发的特性。特别是在移动传感器网络中,节点移动性导致的网络间断连通、拓扑变化更为频繁和明显。另一方面,无线传感器网络往往部署于恶劣甚至敌对的环境中,传感器节点会因环境中破坏性因素的作用而损毁和失效;而且传感器节点的能量有限且难于补充,一旦能量耗尽节点将死亡。因此,由网络间断连通和多跳转发产生的数据收集问题,以及由节点损毁和失效导致的数据生存问题成为了无线传感器网络大规模推广和应用必须解决的两个关键问题,是无线传感器网络研究中的重点和难点。
     本文对节点静态部署的无线传感器网络以及近年来提出的延迟容忍移动传感器网络(Delay Tolerant Mobile Sensor Networks, DTMSNs)进行了系统和全面的分析与总结,在此基础上,深入研究了无线传感器网络的数据收集和数据生存算法,取得了若干创新和研究成果。本文的主要贡献包括以下方面:
     1.提出了一种高效节能的延迟容忍移动传感器网络数据收集算法EDAG(an Energy-efficient Data Gathering algorithm)。EDAG一方面综合应用了基于相遇频率和运动趋势的方法来计算每个节点的递交概率;另一方面通过有效地发现和利用传感器节点在移动过程中动态形成的局部连通路径来扩展节点寻找下一跳转发节点的“视野”以改善数据传输性能。因此,EDAG算法能够以显著节约能量的单复本传输达到与现有多复本路由策略相近的高数据递交成功率;更为重要的是其良好的节能特性能够显著延长网络寿命,很好的适应了延迟容忍移动传感器网络能量受限的特点。仿真实验结果表明EDAG算法达到了预期的设计目标。
     2.提出了一种自适应复本数的延迟容忍移动传感器网络数据收集算法RADG(an Replicas Adaptive Data Gathering algorithm)。DTMSNs间断连通、拓扑变化频繁,各移动传感器节点与汇聚点之间通常以机会转发的方式进行数据传输。由于机会转发并不能保证数据传输性能,在DTMSNs中采用多复本传输策略以提高消息成功到达汇聚点的概率并减少传输延迟有其合理性。然而向网络中注入过多的复本消息将消耗大量的网络资源。因此需要在消息的复本数目和网络的数据收集性能之间进行平衡。本文提出的RADG数据收集算法,通过自适应策略有效减少数据消息的冗余复本数目,并且计算节点的递交概率作为路由度量来达到提高数据传输性能的目的。仿真实验表明,与现有的几种DTMSNs数据收集策略相比,RADG算法以较少的资源消耗达到了更好的数据收集性能。
     3.提出了一种快速有效的无线传感器网络数据生存算法FEDS(Fast and Efficient Data Survival scheme)。由于破坏性因素的影响通常具有较强的区域性特征,灾害发生后网络中不同区域的节点安全等级存在差异。而且从灾害发生到大部分传感器节点被破坏之间需要经过一定的时间。因此,一种提高网络数据生存能力的可行方法是:危险区域内的节点快速地将数据转移到安全区域的节点中进行保存。FEDS算法通过快速收集灾害环境下无线传感器网络中节点的安全状况信息,采用线性规划理论中的“运输问题”方法来寻求将危险区域节点中的数据向安全区域节点转移这一问题的最优解。仿真实验表明,FEDS能够达到保证高数据生存率条件下的快速数据转移的目标。
     4.提出了无持续可用汇聚节点条件下一种基于虚拟引力的无线传感器网络数据生存算法VGDS(Virtual Gravity based Data Survival scheme)。VGDS是一种完全分布式的、由各传感器节点平等地相互协作来实现的数据生存算法,能够应用于不存在持续可用的汇聚节点的环境中。VGDS算法采用基于虚拟引力的方法寻求将非安全区域节点中的数据向安全区域节点转移问题的近似最优解,以提高数据生存率并减少时间消耗。仿真实验表明,VGDS达到较高的数据转移成功率且时间代价可接受,能够有效地实现在严重灾害环境下保证无线传感器网络具有较高数据生存率的目标。
Wireless sensor networks (WSNs), which are composed of a large number of low-cost, low-power, multifunctional sensor nodes, possess advantages such as fast deployment, adaptation to various challenged environments, accurate and credible data sensing and collecting in covered network regions. So WSNs have wide prospects for military, environmental, health, transportation, and commercial applications. On one side, node resources in WSNs, such as processing ability, buffer size, bandwidth and energy, are strictly limited due to cost control, volume control, and other reasons. In order to reduce resource consumption, sense nodes often adopts special scheduling models of periodic working/sleeping and short radio range. Thus sensor nodes cooperate each another to forward collected data to sink nodes through multi-hop transmission. It generates the features of opportunistic connectivity and multi-hop transmission in WSNs. On the other hand, WSNs are often deployed in harsh, even extreme environments, which may make sensor nodes smashed or invalidated by the destructive factors of environment. Moreover, sensor nodes have limited energy, and are very hard to be recharged. A sensor node will die once its energy is exhausted. Thus, the data gathering problem caused by opportunistic connectivity and multi-hop transmission, and the data survival problem caused by node corruption and invalidation, are crucial in the large-scale implemention of WSNs, and also become the key points and the chief difficulties in the research of WSNs.
     This dissertation involves regular and comprehensive study and analysis on wireless sensor networks consist of static nodes and delay tolerant mobile sensor networks (DTMSNs) proposed in recent years, and, on this basis, carries out in-depth research in data gathering and data survival problems in WSNs. The original achievements and contributions of the dissertation are highlighted as follows:
     1. To save node energy and prolong network life while gathering data from nodes to sink nodes, an Energy-efficient DAta Gathering (EDAG) algorithm for DTMSN is proposed. Based on community mobility models, EDAG takes two techniques as follows. First, the proposed protocol calculates the delivery probability of each node based on both the frequency, which the node meets with sinks, and its mobility trend. Second, EDAG extends the eyeshot of each node when it looks for next hop through finding and using the connected paths formed dynamically by mobile sensor nodes. So EDAG achieves high data delivery ratio closed to current multiple copy protocols but by single copy transmission which has notable energy saving advantages. Simulation results have shown that the proposed EDAG achieves the comparable message delivery ratio with the much lower transmission overhead than several main data delivering approaches for DTMSNs. What’s more, EDAG can efficiently save node energy and remarkably prolong network life, which make it well fit for the energy-limited characteristic of DTMSNs well.
     2. A new data gathering scheme RADG (an Replicas Adaptive Data Gathering Scheme) for DTMSNs is proposed. Due to the inherent feature of intermitted connectivity and varying topology, DTMSNs usually gather data by the way of probabilistic forwarding. It is reasonable that DTMSNs routing employs multi-copy schemes to improve the message delivery ratio and reduce the delay, considering that probabilistic forwarding can not ensure good performance. However, the approach of injecting a large amount of message copies into the network will drain the limited network resource of DTMSNs including bandwidth, battery supply and storage space. So a proper routing method need to trade off between the number of copies of messages and the network performance. The proposed RADG economizes network resource using a self-adapting algorithm to cut down redundant copies of messages, and achieves a good network performance by leveraging the delivery probabilities of the mobile sensors as main routing metric. Simulation results have shown that RADG achieves the higher message delivery ratio with the lower transmission overhead and data delivery delay than other DTMSNs data delivering schemes.
     3. A fast and efficient data survival algorithm called FEDS for WSNs is proposed. For devastating events usually only affects a limited area, there exists a big difference in the security status of sensor nodes. Moreover, there is a gap from the time when the disaster hits and the time when the time a significant portion of nodes are physically destroyed. Thus, for achieving high data survival ratio, a feasible scheme is to transfer as much data as possible from nodes in dangerous status to those in security status, preferably within as a short period as possible. According to the information collected of sensor nodes in security status, FEDS can calculate the optimal solution of data transfer according to the“Transportation Problem”in integral linear programming theory. Simulation shows that FEDS achieves high data survival ratio through fast and efficient data transfer.
     4. A Virtual Gravity based Data Survival (VGDS) algorithm is proposed for unattended wireless sensor networks, in which there are not continuously available sink nodes. VGDS is a distributed algorithm, i.e., data transfer is carried out by sensor nodes in a peer-to-peer cooperative way. To improve data survival ratio and reduce evacuation time, VGDS adopts virtual gravity method to calculate the near optimum solution of data transfer. The simulation results shows that VGDS achieves high data survival ratio at acceptable time price, and effectively guarantees high data survival ratio in the networks in serious environments.
引文
[1]李晓维.无线传感器网络.北京:北京理工大学出版社,2007:1-2
    [2]孙利民,李建中,陈渝,朱红松.无线传感器网络.北京:清华大学出版社,2005,3
    [3] I. F. Akyildiz, W. Su, et al. Wireless sensor networks: A survey. Computer Networks. 2002, 38(4): 393-422
    [4]崔莉,鞠海玲,苗勇,等.无线传感器网络研究进展.计算机研究与发展, 2005, 42(1): 163-174
    [5] MIT technology review, 10 emergering new technologies that will be change the world. February 2002, http://www.technologyreview.com/
    [6] Business week magazine, Future of Tech, August 2003, http://www.businessweek.com/
    [7] J. L. Paul. Smart sensor web: Tactical battlefield visualization using sensor fusion. IEEE Aerospace and Electronic Systems Magazine. 2006, 21(1):13-20
    [8] The cooperative engagement capability, http://techdigest.jhuapl.edu/td1604/APLteam.pdf
    [9] Wireless embedded sensor network technologies, http://www.cs.virginia.edu/wsn/nest.html
    [10]任丰原,黄海宁,林闯.无线传感器网络.软件学报,2003,14(7):1282-1291
    [11] J. Kahn, R. Katz, K. Pister. Next century challenges: Mobile networking for smart dust. Mobicom’99 Seattle Washington, USA, 1999
    [12] J. Rabaey, J. Ammer, et al. PicoRadio: ad-hoc wireless networking of ubiquitous low energy sensor/monitor nodes. Proceeding of the IEEE CSAW on VLSI(WVLSI’00), Washington, USA. IEEE Computer Society, 2000, 9-12
    [13] Wireless Integrated Sensor Networks: http://www.janet.ucla.edu/WINS/, February, 2002
    [14]μ-Adaptive Multi-domain Power aware Sensors: http://www-ntl.mit.edu/research/icsystems/, February, 2002
    [15] S Kumar. DARPA SensIT program. DARPA Information Technology Office, 2002
    [16]李建中,高宏.无线传感器网络的研究进展.计算机研究与发展,2008,45(1):1-15
    [17]李建中,李金宝,石胜飞.传感器网络及其数据管理的概念、问题与进展.软件学报, 2003,14(10):1717-1727
    [18] J. Yick, B. Mukherjee, D. Ghosal. Wireless sensor network survey. Computer Networks: The International Journal of Computer and Telecommunications Networking, August 2008, 52(12):2292-2230
    [19]马祖长,孙怡宁,梅涛.无线传感器网络综述.通信学报,2004,25(4):114-124
    [20]P. Juang, H. Oki, Y. Wang. Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with ZebraNet. ACM Operating System Review, 2002, 36(5):96-107
    [21] A. Mainwaring, D. Culler, J. Polastre, et al. Wireless sensor networks for habitat monitoring. In Proceeding of the 1st ACM International Workshop on Wireless Sensor Networks and Applications, Atlanta, Georgia, USA, 2002, 88-97
    [22] N. Noury, T. Herve, V. Rialle, et al. Monitoring behavior in home using a smart fall sensor. In Proceedings of the EEE-EMBS Special Topic Conference on Micro technologies in Medicine and Biology. IEEE Computer Society, 2000, 607-610
    [23] CodeBlue: Wireless Sensors for Medical Care. http://fiji.eecs.harvard.edu/CodeBlue
    [24] C. Herring, S. Kaplan. Component-based software systems for smart environments. IEEE Personal Communications, 2000, 10: 60-61
    [25] I. A. Essa. Ubiquitous sensing for smart and aware environments. IEEE Personal Communications, 2000, 10: 47-49
    [26] S. M. George, W. Zhou, H. Chenji, et al. DistressNet: A wireless ad hoc and sensor network architecture for situation management in disaster response. IEEE Communications Magazine, March 2010, 128-136
    [27] G. Ranjan, A. Kumar, G. Rammurthy, et al. A natural disasters management system based on location aware distributed sensor networks. IEEE International Conference on Mobile Ad Hoc and Sensor Systems Conference, November 2005, 180-182
    [28] T. Melly, A. Porrer, et al. A 1.2V, 430MHz, 4dBm power amplifier and a 250μW front-end, using a standard digital CMOS process. IEEE International Symposium on Low Power Electronics and Design Conference, San Diego, 1999, 233-237
    [29] E. Shih, S. Cho, N. Ickes, et al. Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks. ACM MOBICOM, Rome, Italy, 2001
    [30] A. Woo, D. Culler. A transmission control scheme for media access in sensor networks. ACM MOBICOM, Rome, Italy, 2001
    [31] C. Chien, I. Elgorriaga, C. McConaghy. Low-power direct sequence spread-spectrum modem architecture for distributed wireless sensor networks. International Symposium on Low Power Electronics and Design, California, USA, 2001
    [32] W. Ye, J. Heidemann, D. Estrin. An energy-efficient MAC protocol for wireless sensor network.IEEE INFOCOM, New York, USA, 2002
    [33] W. Ye, J. Heidemann, D. Estrin. Medium access control with coordinated adaptive sleeping for wireless sensor networks. ACM Transaction on Networking, 2004, 12(3):493-506
    [34] T. V. Dam, K. Langendoen. An adaptive energy-efficient MAC protocol for wireless sensor networks. The 1st International Conference on Embedded Networked Sensor Systems, California, USA, 2003
    [35] L. Bao, J. J. Garcia-Luna-Aceves. A new approach to channel access scheduling for ad hoc networks. The 7th Annual International Conference on Mobile Computing and Networking (MOBICOM), Rome, Italy, 2001
    [36] G. Lu, B. Krishnamachari, C. Raghavendra. An adaptive energy-efficient and low-latency MAC for data gathering in wireless sensor networks. The 18th International Parallel and Distributed Processing Symposium (IPDPS), Santa Fe, New Mexico, 2004
    [37] J. Degesys, I. Rose, A. B. Patel, et al. DESYNC: Self-organizing desynchronization and TDMA on wireless sensor networks. International Conference on Information Processing in Sensor Networks (IPSN), Massachusetts, USA, 2007
    [38]唐勇,周明天,张欣.无线传感器网络路由协议研究进展.软件学报, 2006, 17(3): 410-421
    [39] S. Hedetniemi, A. Liestman. A survey of gossiping and broadcasting in communication networks. Networks, 1988,18(4): 319-249
    [40] Z. J. Haas, J. Y. Halpern, L. Li. Gossip-based ad hoc routing. In Proceedings of the IEEE INFOCOM, New York, USA, 2002
    [41] C. Intanagonwiwat, R. Govindan, D. Estrin. Directed Diffusion: A scalable and robust communication paradigm for sensor networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM), August 2000, 56-67
    [42] K. Sohrabi, J. Gao, V. Ailawadhi, et al. Protocols for self-organization of a wireless sensor network. IEEE Personal Communications, 2000, 7(5): 16-27
    [43] J. Kulik, W. Heinzelman, H. Balakrishnan. Negotiation based protocols for disseminating information in wireless sensor networks. Wireless Networks, 2002, 8(2-3): 169-185
    [44] D. Braginsky, E. Dstrin. Rumor routing algorithm for sensor networks. In Proceedings of the 1st Workshop on Sensor Networks and Applications. Atlanta, USA. ACM Press, 2002, 22-31
    [45] B. Karp, H. T. Kung, GPSR: Greedy perimeter stateless routing for wireless networks. In Proceedings of ACM MOBICOM, August 2000
    [46] D. Niculescu, B. Nath. Trajectory based forwarding and its applications. In Proceedings of the 9th Annual International Conference on Mobile Computing and Networking (MOBICOM), San Diego, ACM Press, 2003, 260-272
    [47] A. Vahdat, D. Becker. Epidemic routing for partially connected ad hoc networks. Technical Report CS-200006, Duke University, April 2000
    [48] T. Spyropoulos, K. Psounis, C. Raghavendra. Spray and wait: An efficient routing scheme for intermittently connected mobile networks. In Proc. ACM SIGCOMM workshop on Delay-tolerant networking, 2005
    [49] Y. Wang, H. Y. Wu, H. Dang. Analytic study of Delay/Fault-Tolerant mobile sensor networks (DFT-MSN’s). Tech Report, Lafayette: CACS, University of Louisiana at Lafayette, 2006
    [50] W. Heinzelman, A. Chandrakasan, H. Balakrishnan. Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences. Maui, IEEE Computer Society, 2000, 3005-3014
    [51] A. Manjeshwar, D. P. Agrawal. TEEN: A protocol for enhanced efficiency in wireless sensor networks. In Proceeding of the 15th Parallel and Distributed Processing Symposium. San Francisco, USA, IEEE Computer Society, 2001, 2009-2015
    [52] S. Lindsey, C. S. Raghavendra. PEGASIS: Power-efficient gathering in sensor information systems. In Proceedings of the IEEE Aerospace Conference . Montana. IEEE Aerospace and Electronic System Society, 2002, 1125-1130
    [53] O. Younis, S. Fahmy. HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. IEEE Transactions on Mobile Computing, 2004, 3(4): 660-669
    [54] P. Tillapart, T. Thumthawatworn, P. Pakdeepinit, et al. Method for cluster heads selection in wireless sensor networks. In Proceedings of the IEEE Aerospace Conference. Chiang Mai, IEEE Press, 2004, 3615-3623
    [55]刘明,龚海刚,毛莺池,等.高效节能的传感器网络数据收集和聚合协议.软件学报, 2005, 16(12): 2106-2116
    [56]刘明,曹建农,陈贵海,等. EADEEG:能量感知的无线传感器网络数据收集协议.软件学报, 2007, 18(5): 1092-1109
    [57] H. Dang, Hongyi Wu. Clustering and cluster-based routing protocol for delay-tolerant mobile networks. IEEE Transactions on Wireless Communications, June 2010, 9(6): 1874-1881
    [58] Q. Zhao, M. Gurusamy. Lifetime maximization for connected target coverage in wireless sensor networks. IEEE/ACM Transactions on Networking, 2008,16(6):1378?1391
    [59] D. Wang, B. Xie, D. P. Agrawal. Coverage and lifetime optimization of wireless sensor networks with Gaussian distribution. IEEE Transactions on Mobile Computing, 2008, 7(12): 1444?1458
    [60] Y. C. Wang, Y. C. Tseng. Distributed deployment schemes for mobile wireless sensor networks to ensure multilevel coverage. IEEE Transactions on Parallel and Distributed Systems (TPDS), 2008, 19(9):1280?1294
    [61] H. Lou, H. X. Tao, H. D. Ma, et al. Data Fusion with desired reliability in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 2011, 22(3): 501-513
    [62] W. P. Tay, J. N. Tsitsiklis, M. Z. Win, Data Fusion Trees for Detection: Does Architecture Matter? IEEE Transactions on Information Theory, 2008, 54(9): 4155-4168
    [63] M. Guerriero, L. Svensson, P. Willett. Bayesian data fusion for distributed target detection in sensor networks. IEEE Transactions on Signal Processing, 2010, 58(6): 3417-2421
    [64] S. Jardosh, P. Ranjan. A survey: Topology control for wireless sensor networks. In Proceedings of International Conference on Signal Processing, Communications and Networking (ICSCN), 2008, 422-427
    [65] Y. H. Liu, Q. Zhang, L. M. Ni. Opportunity-based topology control in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 2010, 21(3): 405-416
    [66] H. L. Ren, M. Q. Meng. Game-theoretic modeling of joint topology control and power scheduling for wireless heterogeneous sensor networks. 2009, 6(4): 610-625
    [67] Y. Ding, C. Wang, L. Xiao. An adaptive partitioning scheme for sleep scheduling and topology control in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 2009, 20(9): 1352-1365
    [68] Y. Y. Mao, F. R. Kschischang, B. C. Li, et al. Factor graph approach to link loss monitoring in wireless sensor networks. IEEE Journal on Selected Area in Communications, Special Issue on Self-Organizing Distributed Collaborative Sensor Networks, 2005, 23: 820-829
    [69] Q. Wang, D. O. Wu, P. Y. Fan. Delay-constrained optimal link scheduling in wireless sensor networks. IEEE Transactions on Vehicular Technology, 2010, 59(9): 4564-4577
    [70] Z. Zhao, B. Zhang, J. Zheng, et al. Providing scalable location service in wireless sensor networks with mobile sinks. IET Communications, 2009, 3(10): 1628-1637
    [71] C. H. Chang, W. J. Liao. A probabilistic model for relative location estimation in wireless sensor networks. IEEE Communications Letters, 2009, 13(12): 893-895
    [72] C. Y. Chow, M. F. Mokbel, T. He. A privacy-preserving location monitoring system forwireless sensor networks. IEEE Transactions on Mobile Computing, 2011, 10(1): 94-107
    [73] K. Sun, P. Ning, C. Wang. Secure and resilient clock synchronization in wireless sensor networks. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 295-408
    [74] Q. Chaudhari, E. Serpedin, K. Qaraqe. Some improved and generalized estimation schees for clock synchronization of listening nodes in wireless sensor networks. IEEE Transactions on Communications, 2010, 58(1): 63-67.
    [75] Y. C. Wu, Q. Chaudhari, E. Serpedin. Clock synchronization of wireless sensor networks. IEEE Signal Processing Magizine, 2011, 28(1): 124-138
    [76] X. J. Du, H. H. Chen. Security in Wireless sensor networks. IEEE Wireless Communications, 2008, 15(4): 60-66
    [77] H. Kumar, D. Sarma, A. Kar. Security theats in wireless sensor networks. IEEE Aerospace and Electronic Systems Magazine, 2008, 23(6): 39-45
    [78] S. A. Camtepe, B. Yener. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks, IEEE/ACM Transactions on Networking, 2007, 15(2): 346-358
    [79] X. Q. Chen, K. Makki, Y. Kang, N. Pissinou. Sensor network security: a survey. IEEE Communications Surveys & Tutorials, 2009, 11(2): 52-73
    [80] Y. Yu, R. Govindan, D. Estrin. Geographical and energy aware routing: A recursive data dissemination protocol for wireless sensor networks. UCLA Computer Science Department, Technology Report: UCLA/CSD-TR-01-0023, 2001
    [81] J. Newsome, D. Song. GEM: Graph Embedding for routing and data-centric storage in sensor networks without geographic information. The 1st ACM Conference Embedded Networked Sensor Systems (SENSYS), Los Angeles, USA, November 2003
    [82] J. Bruck, J. Gao, A. Jiang. MAP: Medial axis based geometric routing in sensor networks. Annual International Conference on Mobile Computing and Networking (MOBICOM), Cologne, Germany, 2005
    [83] F. Ye, H. Luo, J. Cheng, et al. A two-tie data dissemination model for large-scale wireless sensor networks. Annual International Conference on Mobile Computing and Networking (MOBICOM), Atlanta, USA, 2002
    [84] http://www.jpnsig.org
    [85] K. Fall. A delay-tolerant network architecture for challenged internets. In Proceedings of ACM SIGCOMM 2003 Conference on Computer Communications. Karlsruhe: ACM Press, 2003. 27-34
    [86] S. Burleigh, A. Hooke, L. Torgerson, et al. Weiss. Delay-Tolerant Networking– an approach to interplanetary internet. IEEE Communications Magazine, 2003, 41(6):128-136
    [87] M. J. Neely, E. Modiano. Capacity and delay tradeoffs for ad-hoc mobile networks. IEEE Transactions on Information Theory, 2005, 51(6): 1917–1937
    [88] J. Partan, J. Kurose and B. Levine. A survey of practical issues in underwater networks. Proceedings of the 1st ACM international workshop on underwater networks, 2006: 17-24
    [89] Y. Wang, H. Wu. Delay/Fault-Tolerant Mobile Sensor Network (DFT-MSN): a new paradigm for pervasive information gathering. IEEE Transactions on Mobile Computing, 2006, 6(8):1021-1034
    [90] J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine. MaxProp: Routing for vehicle-based disruption-tolerant networks. In Proceedings of IEEE INFOCOM, April 2006.
    [91] R. Ramanathan, R. Hansen, P. Basu, et al. Prioritized epidemic routing for opportunistic networks. In MobiOpp 07, 2007.
    [92] A. Balasubramanian, B. N. Levine, and A. Venkataramani. DTN routing as a resource allocation problem. In Proceedings of ACM SIGCOMM, August 2007.
    [93] S. C. Nelson, M. Bakht, R. Kravets. Encounter-based routing in DTNs. In Proceedings of IEEE INFOCOM, 2009, 846-854
    [94] T. Spyropoulos, K. Psounis, and C. S. Raghavendra. Spray and focus: Efficient mobility -assisted routing for heterogeneous and correlated mobility. In Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, 2007
    [95] T. Small, Z. J. Haas. The shared wireless infostation model– a new Ad Hoc networking paradigm (or where there is a whale, there is a Way).In Proceedings of ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC’03). Annapolis: ACM Press, 2003.233-244
    [96] Y. Wang, H. Y. Wu. Replication-Based efficient data delivery scheme (RED) for Delay/Fault-Tolerant mobile sensor network (DFT-MSN).In Proceedings of Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops. Pisa: IEEE Press, 2006. 485-489
    [97] Y. Wang, H. Y. Wu. Delay/Fault-Tolerant Mobile Sensor Network (DFT-MSN): a new paradigm for pervasive information gathering. IEEE Transactions on Mobile Computing, 2006, 6(8):1021-1034
    [98] L. Cong, J. Wu. Routing in a Cyclic MobiSpace. ACM MobiHoc, Hong, Kong SAR, China,May 2008
    [99] L. Cong, J. Wu. An optimal probabilistic forwarding protocol in delay tolerant networks. ACM MobiHoc, New Orleans, Louisiana, USA, May 2009
    [100] M. Suzuki, S. Saruwatari, N. Kurata, H. Morikawa. A high-density earthquake monitoring system using wireless sensor networks. Proc. of SenSys’07, November 6–9, 2007, Sydney, Australia
    [101] H. Miura, Y. Shimazaki, N. Matusa, F. Uchio, K. Tsukada, H. Taki. Ubiquitous Earthquake Observation System Using Wireless Sensor Devices. Lecture Notes in Computer Science, Vol. 5179, 2008
    [102] K. Lorincz, M. Welsh, O. Marcillo, J. Johnson, M. Ruiz, J. Lees. Deploying a wireless sensor network on an active volcano. IEEE Internet Computing, March, 2006
    [103] E. Cayirci and T. Coplu. SENDROM: sensor networks for disaster relief operations management. Wireless Networks, Volume 13, issue 3, June, 2007, pp: 409-423
    [104] W. Yang, Y. Huang. Wireless Sensor Network Based Coal Mine Wireless and Integrated Security Monitoring Information System. Proc. of ICN'07, 2007
    [105] Y. Yamao, T. Otsu, A. Fujiwara, H. Murata, S. Yoshida. Multi-hop radio access cellular concept for fourth-generation mobile communications system. Proc. of IEEE PIMRC2002, Lisbon, Sep. 2002
    [106] H. Wu, C. Quiao, S. De, O. Tonguz. Integrated cellular and ad hoc relaying system: iCAR. IEEE J-SAC, vol.19, No.10, pp.2105-2115, Oct. 2001
    [107] T. Fujiwara, S. Nakayama, N. Iida, T. Watanabe. A wireless network scheme enhanced with ad-hoc networking for emergency communications. Proc. of IASTED WOC2003, pp.604-609, Banff, July 2003
    [108] T. Fujiwara, H. Makie, T. Watanabe. A framework for data collection system with sensor networks in disaster circumstances. Proc. of International workshop on wireless Ad-hoc networking (IWWAN), 2004
    [109] M. Li and Y. H. Liu. Underground coal mine monitoring with wireless sensor networks. ACM Transactions on Sensor Networks, Vol. 5, No. 2, March 2009
    [110] A. Kamra, V. Misra, J. Feldman, and D. Rubenstein. Growth Codes: Maximizing sensor network data persistence. ACM SIGCOMM, Pisa, Italy, September 2006
    [111] R. D. Pietro, L. V. Mancini, C. Soriente, et al. Catch me (if you can): Data survival in unattended sensor networks. IEEE PerCom 2008
    [112] W. Ren. J. G. Zhao, Y. Ren. Network coding based dependable and efficient data survival in unattended wireless sensor networks. Journal of Communications, 2009, 4(11): 894-901
    [113] W. Ren, J. G. Zhao, Y. Ren. MSS: A multi-level data placement scheme for data survival in wireless sensor networks. IEEE 5th International Conference on Wireless Communications, Networking and Mobile Computing (WiCom’09). September 2009
    [114] R. D. Pietro, L. V. Mancini, C. Soriente, et al. Data security in unattended wireless sensor networks. IEEE Transactions on Computers, November 2009, 50(11): 1500-1511
    [115] T. M. Vo, J. Talim. Random distribution for data survival in unattended wireless sensor networks. Fourth International Conference on Sensor Technologies and Applications, Venice, Italy, July 2010
    [116] D. P. Bertsekas, D. A. Castanon. The auctiion algorithm for transportation problem. Annals of Operations Research, February, 1989: 67-96
    [117] P. Kleinschmidt, H. Schannath. A strongly polynomial algorithm for the transportation problem. Mathematical Programming, 1995, vol. 68: 1-13
    [118] L. S. Li, K. K. Lai. A fuzzy approach to the multiobjective transportation problem. Computer & Operation Research, 2000, 27: 43-57
    [119] J. Spanier, R. Kong, M. Ambrose. Adaptive Monte Carlo algorithms for general transport problems. Mathematics and Statistics, 2008, Part 3, 467-483
    [120] Y. Wang, F. Lin, H. Wu. Poster: efficient data transmission in delay fault tolerant mobile sensor networks (DFT-MSN). In Proceedings of IEEE International Conference on Network Protocols (ICNP’05).Boston, USA, 2005
    [121] J. Leguay, T. Friedman, V. Conan. DTN Routing in a Mobility Pattern Space. In Proceedings of ACM SIGCOMM’05 workshop on Delay Tolerant Networking and Related Topics . Philadelphia: ACM Press, 2005.276-283
    [122] A. Lindgren, A. Doria and O. Schelen, Probabilistic routing in intermittently connected networks, Lecture Notes in Computer Science, 2004, vol. 3126, 239-254
    [123] X. Cheng, D.Z. Du, L. Wang, TPS: A time-based positioning scheme for outdoor sensor networks, IEEE INFOCOM, Hong Kong China, March 2004
    [124] W. Ruml, Y. Shang and Y. Zhang. Location from mere connectivity. In Proc. ACM MobiHoc, 2003, 201-212
    [125] http://www.gps.gov/applicatiions/timing/index.html/
    [126] C. Song, Z.H. Qu, N. Blumm, A. L. Barabasi. Limits of predictability in human mobility.SCIENCE 2010,vol. 327, 1018-1021
    [127] W. Heinzelman. A. Chandrakasan. H. Balakrishnan. An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wirel. Commun. 2002, 1, 660-670
    [128] A. Howard, M. J. Matari?, G. S. Sukhatme. Mobile sensor network deployment using potential field: A distributed scalable solution to the area coverage problem. In Proc. of the 6th International Symp. on Distributed Autonomous Robotics Systems (DARS), Fukuoka, Japan, June 2002. 299?308
    [129]陶丹,马华东,刘亮.基于虚拟势场的有向传感器网络覆盖增强算法.软件学报, 2007,18(5):1152-1163
    [130] H. D. Ma, X. Zhang, A L. Ming. A Coverage-enhancing method for 3D directional sensor networks. IEEE INFOCOM, April 2009
    [131] N. Aitsaadi, N. Achir, K. Boussetta, G. Pujolle. Potential field approach to ensure connectivity and differentiated detection in WSN deployment. IEEE International Conference on Communications (ICC), June 2009
    [132] J. Scott, B. R. Kazman. Realizing and refining architectural tactics: Availability. Technical Report, CMU/SEI-2009-TR-006, August 2009
    [133] A. Mainwaring, J. Polastre, R. Szewczyk, D. Culler, J. Anderson. Wireless sensor networks for habitat monitoring. In Proc. of ACM International Workshop on Wireless Sensor Networks and Applications(WSNA).Atlanta: ACM Press,2002.88-97
    [134] G. Dermot, C. Vinny, F. Stephen. Sensor networking with delay tolerance (SeNDT). 2006. http://down.dsg.cs.tcd.ie/sendt/
    [135] R. C. Shah, S. Roy, S. Jain, W. Brunette. Data MULEs: modeling a three-tier architecture for sparse sensor networks. In Proc. of the First International Workshop on Sensor Network Protocols and Applications. Anchorage: IEEE Computer Society Press, 2003.30-41

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700