CN103338477B - A kind of intrusion target detection method based on road and system - Google Patents

A kind of intrusion target detection method based on road and system Download PDF

Info

Publication number
CN103338477B
CN103338477B CN201310200502.4A CN201310200502A CN103338477B CN 103338477 B CN103338477 B CN 103338477B CN 201310200502 A CN201310200502 A CN 201310200502A CN 103338477 B CN103338477 B CN 103338477B
Authority
CN
China
Prior art keywords
node
road
cycle
network
intrusion target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310200502.4A
Other languages
Chinese (zh)
Other versions
CN103338477A (en
Inventor
卢翔
陈良银
王朝龙
颜秉姝
孙利民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Information Engineering of CAS
Original Assignee
Institute of Information Engineering of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Information Engineering of CAS filed Critical Institute of Information Engineering of CAS
Priority to CN201310200502.4A priority Critical patent/CN103338477B/en
Publication of CN103338477A publication Critical patent/CN103338477A/en
Application granted granted Critical
Publication of CN103338477B publication Critical patent/CN103338477B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to a kind of intrusion target detection method based on road and system.Method includes: step one, within a network work cycle, according to by protecting point to the direction of entrance, wakes up the node on road successively up;Step 2, after node is waken up, work within a network work cycle node cycle, within a node cycle, node is alternately revived and sleeps k time respectively, in period of reviving, node has detected whether intrusion target in its detection region, and report testing result, during sleeping, node does not perform detection;Step 3, node, when the node end cycle of self, enters sleep state;Step 4, it is judged that whether node is last node on road, if all nodes then in network fully enter resting state, until the next network work cycle, otherwise, sequentially wakes up the next node of this node on road up, performs step 2.The present invention is effectively improved Network morals.

Description

A kind of intrusion target detection method based on road and system
Technical field
The present invention relates to wireless sensor network, particularly relate to a kind of intrusion target detection side based on road Method and system.
Background technology
Conventional algorithm of target detection is the target of random movement, Ye Jikai in being the most only absorbed in detection region Put the detection covering problem of two-dimensional space.Intrusion target test problems based on road is different from general mesh Mark test problems has 2 points: (1) target is always along road, advance at limited speeds;(2) specific inspection Road distribution situation etc. in the range of survey is typically readily available.When formulating algorithm, these premise information In accordance with convention, human observer can be easy to grasp;And do not utilize the algorithm of target detection of these information front State in road target detection scene and seem and inapplicable or inefficiency.And for high maneuverability or can The consideration of transplantability, it is impossible to sensor node is positioned over simply entrance or mobile target destination, and It it is the deployment way needing a system-wide net scope.J.Jeong et al. is studying low duty based on road Ratio, on the basis of Sensor Network location algorithm, proposes one for this type of scene first and moves on restriction path Algorithm of target detection VISA(Virtual Scanning Algorithm, virtual scan algorithm). VISA takes full advantage of the information that human observer can be grasped, it is achieved thereby that WSN(Wireless Sensor Network, wireless sensor network) being greatly improved of network lifetime.VISA algorithm) at a length of l Detection section on, dispose n wireless sensor node.Intrusion target is from entrance (hereinafter referred to as E point) To protection point (hereinafter referred to as P point) motion, (its maximal rate is vmax);And sensor node is just like void Intend that scanning ripple is the same is reversely revived one by one to entrance E by protection point P and be monitored, in void along disposing road Intend the whole network dormancy l/v after scanning completesmaxTime.VISA ensure target must be detected in the case of, (Duty-Cycle) mode of reviving simultaneously than the whole network-sleep significantly reduces node dutycycle, improves Network lifetime.If but VISA wants to continue to improve network lifetime, and it is only capable of relying on and continues to increase deployment Interstitial content so that it is range of application is limited.And in the case of finite energy, improve nothing to greatest extent The vital stage of line sensor network is a hot issue of great interest.
Summary of the invention
The technical problem to be solved is to provide a kind of intrusion target detection method based on road And system, it is possible in the case of finite energy, improve the vital stage of wireless sensor network.
For solving above-mentioned technical problem, the present invention proposes a kind of intrusion target detection side based on road Method, including:
Step one, within a network work cycle, according to by protecting point to the direction of entrance, calls out successively Node on awake road;
Step 2, after described node is waken up, worked within a described network work cycle node In the cycle, within a described node cycle, described node is alternately revived and sleeps k time respectively, k For natural number, k value presets, and revives period described, and described node detects in its detection region Whether having intrusion target, and report testing result, during described sleep, described node does not perform detection;
Step 3, described node, when the node end cycle of self, enters sleep state;
Step 4, it is judged that whether described node is last node on described road, if then network Interior all nodes fully enter resting state, until the next network work cycle, otherwise, suitable Secondary wake up the next node of described node on described road up, perform step 2.
Further, above-mentioned intrusion target detection method based on road also can have the characteristics that, road The detection region of upper adjacent two nodes partly overlaps, and the sequence of reviving-sleep at two adjacent nodes is cut Change the middle increase T length of one's sleepoverlap, ToverlapMaximum be Oi,i+1/vmax, wherein, Oi,i+1Represent The overlapping detection regions length of field of adjacent two nodes, vmaxMaximum movement speed for intrusion target.
Further, above-mentioned intrusion target detection method based on road also can have the characteristics that, described Node is alternately revived and sleeps respectively during k time, the length of one's sleep between reviving for adjacent twice TintervalMaximum be 2r/vmax, wherein, r is the detection radius of node, vmaxFor intrusion target Big movement velocity.
Further, above-mentioned intrusion target detection method based on road also can have the characteristics that, described The mode that node is waken up is: is waken up up instruction triggers by receive and is revived, or, by presetting Timer clock trigger and revive.
Further, above-mentioned intrusion target detection method based on road also can have the characteristics that, described Node is when the node end cycle of self, before entering a sleep state, to next of its Way in Individual node sends and wakes up instruction up, subsequently into sleep state.
Further, above-mentioned intrusion target detection method based on road also can have the characteristics that, described The lasting maximum duration of resting state is l/vmax, vmaxMaximum movement speed for intrusion target.
Further, above-mentioned intrusion target detection method based on road also can have the characteristics that, in inspection Initializing before survey, described initialization includes arranging detection parameter, and described detection parameter includes described Network work cycle, described node cycle and node a network work cycle revive and sleep each From number of times k.
For solving above-mentioned technical problem, the invention allows for the detection of a kind of intrusion target based on road is System, including:
Wake module, within a network work cycle, puts to the direction of entrance according to by protection, Wake up the node on road successively up;
The detection module setting number being arranged on network node, for being called out by described at its place node Wake up after data bits, work within a described network work cycle node cycle, described in one In the node cycle, alternately reviving and sleep k time respectively, k is natural number, and k value presets, Revive period described, in its detection region, detected whether intrusion target, and report testing result, During described sleep, do not perform detection;
Control module, for when the node end cycle of described node self, controls described node and enters Sleep state;
Judge module, for judging whether described node is last node on described road, if Then all nodes in network fully enter resting state, until the next network work cycle, no Then, notify that described wake module sequentially wakes up the next node of described node on described road up.
Further, above-mentioned intrusion target detecting system based on road also can have the characteristics that, road The detection region of upper adjacent two nodes partly overlaps, and described intrusion target detecting system based on road is also Including increasing module, described increase module is for reviving-sleeping in sequence switching at two adjacent nodes Between increase the length of one's sleep Toverlap, ToverlapMaximum be Oi,i+1/vmax, wherein, Oi,i+1Represent two phases Neighbors overlapping detection regions length of field, vmaxMaximum movement speed for intrusion target.
Further, above-mentioned intrusion target detecting system based on road also can have the characteristics that, also wraps Including initialization module, described initialization module is arranged on the concentrator of network, for entering before testing Row initializes, and described initialization includes arranging detection parameter, and described detection parameter includes described network work Cycle, described node cycle and node are at the respective number of times k reviving and sleeping in a network work cycle.
The intrusion target detection method based on road of the present invention and system, in the case of finite energy, By allowing a node alternately revive within a network work cycle and to sleep repeatedly, make node Dutycycle is reduced, thus is effectively improved Network morals.Further, the present invention also enters one Step utilizes the detection overlapping region between adjacent node to increase the length of one's sleep of node further, makes accounting for of node The reduction further of empty ratio, thus improve Network morals to greatest extent.
Accompanying drawing explanation
Fig. 1 is the work schedule schematic diagram of each node when being k=3;
Fig. 2 is territory, adjacent node overlapping detection regions schematic diagram;
Fig. 3 is the structural representation of intrusion target detecting system based on road in the embodiment of the present invention.
Detailed description of the invention
Being described principle and the feature of the present invention below in conjunction with accompanying drawing, example is served only for explaining this Invention, is not intended to limit the scope of the present invention.
The central scope of the present invention is: allow each node in network revive within a network work cycle Awake-sleep (the most alternately revive and sleep) k time, thus reduce the dutycycle of node, improve network Life cycle.Specifically, present invention intrusion target based on road detection method can include walking as follows Rapid:
Step one, within a network work cycle, according to by protecting point to the direction of entrance, calls out successively Node on awake road;
Step 2, after described node is waken up, worked within a described network work cycle node In the cycle, within a described node cycle, described node is alternately revived and sleeps k time respectively, k For natural number, k value presets, and revives period described, and described node detects in its detection region Whether having intrusion target, and report testing result, during described sleep, described node does not perform detection;
Step 3, described node, when the node end cycle of self, enters sleep state;
Step 4, it is judged that whether described node is last node on described road, if then network Interior all nodes fully enter resting state, until the next network work cycle, otherwise, suitable Secondary wake up the next node of described node on described road up, perform step 2.
Wherein, k value can improve ginseng according to the network lifetime that the energy content of battery of node and user to be reached Number determines.
Further, the present invention also utilizes the detection overlapping region between adjacent node to increase sensor further The length of one's sleep of node, reduce the dutycycle of node further, thus improve the Life Cycle of network further Phase.
The present invention is applicable to all networks being monitored based on road, including wireless sensor network.Under The principle of the present invention, as a example by wireless sensor network, is further illustrated most by face.Wireless sensor network In " node " be sensor node.
The definition of the relevant parameter arrived referred to herein is as shown in table 1.
Table 1 relevant parameter definition table
In table 1, ToverlapMaximum not can exceed that Oi,i+1/vmax, i.e. Toverlap0 to Oi,i+1/vmaxIt Between value can guarantee to detect target, and once ToverlapValue is more than Oi,i+1/vmaxThen it is likely to result in Target missing inspection.Oi,i+1/vmaxIt is ToverlapOptimum value.Equally, TintervalMaximum not can exceed that 2r/vmax, say, that Tinterval0 to 2r/vmaxBetween value be all able to ensure that and intrusion target detected, Exceed 2r/vmaxThen can cause missing inspection.2r/vmaxIt is TintervalOptimum value.
Below by embodiment, the principle of the present invention is described further.
Can first initialize before testing, initialize and include arranging detection parameter.Detection parameter Including the network work cycle, node cycle and k value (i.e. node a network work cycle revive and The respective number of times of sleep).Wherein, the network work cycle can open up according to the network of wireless sensor network Flutter the network life that figure (can obtain at map vendors), every node energy content of battery and user to be reached Parameter θ, every node minimum detection time that the life phase improves determine.
In embodiments of the present invention, if need not Reparametrization, then need not initialization procedure.
Assuming that node was revived k time in each network work cycle, each recovery time is w (Twork=w)。 When virtual scan ripple arrives node, node is made to revive and the T that worksworkTime, then dormancy TintervalTime Between, live again work TworkTime, then secondary dormancy Tinterval... when this node is revived in kth time TworkAfter, will scanning wave loops to next node, next node is revived T immediatelywork..., when Scanning ripple is after P point is delivered to E point, namely terminates apart from the sensor node detection that link entry is nearest After, the whole network dormancy Tsilent, then start next scan period (namely network work cycle).Wherein The T length of one's sleep between reviving for twiceinterval, TintervalMaximum be taken as 2r/vmax, wherein, r is joint The detection radius of point, vmaxMaximum movement speed for intrusion target.Even if this length of one's sleep is able to ensure that Intrusion target passes through the detection region at node place with maximal rate, and node is still able to detect that invasion mesh Mark.Fig. 1 illustrates the work schedule of each node.In Fig. 1, T is scanning resident at each node of ripple Time.When the territory, overlapping detection regions considered between two adjacent nodes, PiNode revive (w) for the last time And Pi+1First time revive T between (w), will be increasedoverlap, this will be further increased Network morals.
Except the scanning ripple triggering mode being mentioned above, in other embodiments of the present invention, wake up node up Mode it may also is that wake up node up by waking up instruction triggers up, or, during by default timing Clock triggers and wakes up node up.Sensor node, can be to its Way in when a node end cycle Next sensor node send wake up instruction up, subsequently into sleep state.
In a scan period, the total time that any node is revived is kw, and the total time of sleep is Tperiod-kw, then dutycycle DC of any node is expressed as formula (1):
DC = w nw + 2 nr v max + l - 2 nr kv max Formula (1)
In formula (1), w is the time span that node is revived every time, and n is node number total on road, L is the length of road, and in complicated road topology, l is the E point shortest path length to P point, and k is node At the wake up operations in each network work cycle, r is the detection radius of node, vmaxFor intrusion target Big movement velocity.
From formula (1), during given k, n is the biggest, and dutycycle is the least, thus network lifetime adds Long. and network lifetime and n value linearly proportional relationship.
When occurring without detection cavity, must have l≤2nr, a point situation is discussed below:
(2) when l=2 (n-1) r, dutycycle is unrelated with k value;
(3) at l, < during 2nr, the biggest then dutycycle of k value is the least, thus network lifetime is the longest.
Visible with k increase, the effect that dutycycle optimizes is the least.
In the present invention, calculate averagely with the pace of virtual scan ripple and the average speed of mobile target The detection time.
Virtual scan ripple is at the time of staying T of each nodeseq=kw+(k-1)Tinterval, and each node is put down All covering detection range is l/n, and the scanning pace of the most virtual ripple is l/(nTseq);Target is with arbitrarily speed Degree is pointed out by E at any time and is sent to the movement of P point, it is assumed that the average speed of target is that v. can obtain target phase Relative velocity for scanning ripple is l/ (nTseq)+v。
Assuming that the opportunity that mobile target enters network is random distribution, beg for the most respectively Opinion:
(1) network is entered when virtual scan ripple scans when target:
Assume target t after scanning ripple startsaTime enters network, and now scanning ripple has travelled lta/(nTseq) Time, then the time that target and scanning ripple meet is when target enters network when virtual ripple scans Target detection time Dscan, DscanRepresent with formula (2).
D scan = l - l t a / ( n T seq ) l / ( n T seq ) + v = n T seq l - lta n T seq v + l Formula (2)
Assume ta[0, nTseqIt is uniformly distributed in], then enters the mesh of network when virtual ripple scans when target Mark detection time DscanExpected value be represented by formula (3).
E [ D scan ] = 1 n T seq &Integral; 0 n T seq n T seq l - l t a n T seq v + l d t a = n T seq l 2 ( n T seq v + l ) Formula (3)
(2) network is entered when the whole network is slept when target
Assume target t after the whole network sleep startsaTime enters, then it was advanced before scanning ripple scanning L/vmax-taTime.After scanning starts, target with scanning ripple Encounter Time is
Thus can calculate when target enters the target detection time of network when the whole network is slept is formula (4) shown in:
D silent = l v max - t a + l - ( l / v max - t a ) v l / ( n T seq ) + v Formula (4)
Assume ta[0, l/vmaxBe uniformly distributed in], then the expected value of target detection time is formula (5) Shown in:
E [ D silent ] = v max l &Integral; 0 l v max ( l v max - t a + l - ( l / v max - t a ) v l / ( n T seq ) + v ) d t a
= 2 n T seq l + l 2 / v max 2 ( n T seq v + l ) Formula (5)
Aggregative formula (3) and formula (5), then the average criterion detection time is shown in formula (6):
E [ D ] = n T seq n T seq + l / v max E [ D scan ] + l / v max n T seq + l / v max E [ D silent ]
= l 2 v max ( v max - v v + l / ( nkw + n ( k - 1 ) T interval ) + 1 ) Formula (6)
Fig. 2 is territory, adjacent node overlapping detection regions schematic diagram.As in figure 2 it is shown, in the present invention, can be in order to Use Oi,i+1Territory, overlapping detection regions, two adjacent nodes revive-sleep sequence switching in the middle of add sleep Time Toverlap(i.e. at the node end cycle of a node, and the next node adjacent with this node The node cycle, both switch in the middle of add the length of one's sleep), ToverlapMaximum be Oi,i+1/vmax, wherein, Oi,i+1Represent two adjacent node overlapping detection regions length of fields, vmaxFor invasion mesh Target maximum movement speed.Then the network work cycle is shown in formula (7):
T period = n ( kw + ( k - 1 ) 2 r v max ) + &Sigma; i = 1 n - 1 O i , i + 1 v max + l v max Formula (7)
Due to Oi,i+1=2r-di,i+1, substitute into abbreviation, then obtain node dutycycle as shown in Equation (8):
DC = w nw + 2 nr v max Formula (8)
From formula (8), dutycycle is unrelated with k value.Contrast unknown node position, does not i.e. consider overlap During detection region in the case of formula (1) indication, when k value infinity, the denominator of formula (1) becomes nw+2nr/vmax, this has reformed into formula (8).Formula (8) represents a kind of ideal situation, i.e. phase Overlapping region between neighbors is accurately known, and is maximized utilization, and its dutycycle is minimum, and network is raw The life cycle is the longest.In formula (7), though overlapping region Oi,i+1It is unable to reach maximization, making of it With length of one's sleep of sensor node still can be increased further, Network morals is made to extend.
The intrusion target detection method based on road of the present invention, in the case of finite energy, by allowing One node is alternately revived within a network work cycle and sleeps the most repeatedly, makes accounting for of node Empty ratio is reduced, thus is effectively improved Network morals.Further, the present invention is the most further Utilize the detection overlapping region between adjacent node to increase the length of one's sleep of node further, make the duty of node Than reducing further, thus improve Network morals to greatest extent.
The invention allows for a kind of intrusion target detecting system based on road, in order to perform above-mentioned base Intrusion target detection method in road.
Fig. 3 is the structural representation of intrusion target detecting system based on road in the embodiment of the present invention.As Shown in Fig. 3, present invention intrusion target based on road detecting system includes wake module 310, sets number Purpose detection module 320, control module 330 and judge module 340.Wake module 310 is for one In the individual network work cycle, according to by protecting point to the direction of entrance, wake up the node on road successively up. Detection module 320 is for being waken up after module 310 wakes up up at its place node, a network work week In one node cycle of work in phase, within a node cycle, alternately revive and sleep k time respectively, K is natural number, and k value presets, and in period of reviving, has detected whether invasion in its detection region Target, and report testing result, during sleeping, do not perform detection.Control module 330 is at joint When putting the node end cycle of self, control this node and enter sleep state.Judge module 340 is used for sentencing Whether this node disconnected is last node on road, if all nodes then in network fully enter Resting state, until the next network work cycle, otherwise, notice wake module 310 is sequentially called out The next node of this node on awake road.
Wherein, the wake-up mode that wake module 310 is taked may is that and calls out by waking up instruction triggers up Wake up, or, triggered by default timer clock and wake up up.
The quantity of detection module 320 is equal to the quantity of node, say, that arrange one on a node Detection module.
In embodiments of the present invention, on road, the detection region of adjacent two nodes can partly overlap, this In the case of Zhong, present invention intrusion target based on road detecting system can also include increasing module.This increasing Add module for increasing the T length of one's sleep in the middle of the sequence switching of reviving-sleep of two adjacent nodesoverlap, ToverlapMaximum be Oi,i+1/vmax, wherein, Oi,i+1Represent that the territory, overlapping detection regions of two adjacent nodes is long Degree, vmaxMaximum movement speed for intrusion target.
In embodiments of the present invention, at the beginning of intrusion target detecting system based on road can further include Beginningization module.Initialization module is arranged on the concentrator of network.Initialization module is at detection module Initializing before detecting, this initialization includes arranging detection parameter, wherein, detects parameter bag Purse rope network working cycle, node cycle and node a network work cycle revive and sleep respective Number of times k.
The intrusion target detecting system based on road of the present invention performs above-mentioned invasion mesh based on road Mark detection method, in the case of finite energy, by allowing a node within a network work cycle Revive-sleep repeatedly, make the dutycycle of node be reduced, thus be effectively improved the life of network Cycle.Further, the present invention also increases joint further further with the detection overlapping region between adjacent node The length of one's sleep of point, make the dutycycle of node reduce further, thus improve network to greatest extent Life cycle.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all in the present invention Spirit and principle within, any modification, equivalent substitution and improvement etc. made, should be included in this Within bright protection domain.

Claims (10)

1. an intrusion target detection method based on road, it is characterised in that including:
Step one, within a network work cycle, puts to the direction of entrance according to by protection, Wake up the node on road successively up;
Step 2, after described node is waken up, works one within a described network work cycle In the individual node cycle, within a described node cycle, described node is alternately revived and sleeps K time respectively, k is natural number, and k value presets, and revives period described, described node In its detection region, detect whether intrusion target, and report testing result, in described sleep Period, described node does not perform detection;K value is intended to reach according to the energy content of battery and the user of node Network lifetime improve parameter determine;
Step 3, described node, when the node end cycle of self, enters sleep state;
Step 4, it is judged that whether described node is last node on described road, if Then all nodes in network fully enter resting state, until the next network work cycle opens Begin, otherwise, sequentially wake up the next node of described node on described road up, perform step 2.
Intrusion target detection method based on road the most according to claim 1, it is special Levying and be, on road, the detection region of adjacent two nodes partly overlaps, at two adjacent nodes Revive-sleep sequence switching in the middle of increase the length of one's sleep Toverlap, ToverlapMaximum be Oi,i+1/vmax, wherein, Oi,i+1Represent the overlapping detection regions length of field of adjacent two nodes, vmax Maximum movement speed for intrusion target.
Intrusion target detection method based on road the most according to claim 1, it is special Levying and be, described node is alternately revived and sleeps respectively during k time, adjacent twice Soviet Union The T length of one's sleep between XingingintervalMaximum be 2r/vmax, wherein, r is the detection of node Radius, vmaxMaximum movement speed for intrusion target.
Intrusion target detection method based on road the most according to claim 1, it is special Levy and be, described in the mode that wakes up up be: wake up up by waking up instruction triggers up, or, pass through The timer clock preset triggers and wakes up up.
Intrusion target detection method based on road the most according to claim 1, it is special Levying and be, described node is when the node end cycle of self, before entering a sleep state, Send to the next node of its Way in and wake up instruction up, subsequently into sleep state.
Intrusion target detection method based on road the most according to claim 1, it is special Levying and be, the lasting maximum duration of described resting state is l/vmax, vmaxFor intrusion target Big movement velocity.
Intrusion target detection method based on road the most according to claim 1, it is special Levying and be, initialize before testing, described initialization includes arranging detection parameter, institute State detection parameter and include that described network work cycle, described node cycle and node are at a network The respective number of times k reviving and sleeping of working cycle.
8. an intrusion target detecting system based on road, it is characterised in that including:
Wake module, within a network work cycle, according to by protecting point to entrance Direction, wakes up the node on road successively up;
The detection module setting number being arranged on network node, at its place node quilt After described wake module wakes up up, work within a described network work cycle node cycle, Within a described node cycle, alternately reviving and sleep k time respectively, k is natural number, K value presets, and revives period described, has detected whether invasion mesh in its detection region Mark, and report testing result, during described sleep, do not perform detection;K value is according to node The energy content of battery and the network lifetime to be reached of user improve parameter and determine;
Control module, for when the node end cycle of described node self, controls described joint Click on into sleep state;
Judge module, for judging whether described node is last node on described road, If all nodes then in network fully enter resting state, until next network work week Phase, otherwise, notify that described wake module sequentially wakes up up on described road under described node One node.
Intrusion target detecting system based on road the most according to claim 8, it is special Levying and be, on road, the detection region of adjacent two nodes partly overlaps, described based on road Intrusion target detecting system also includes increasing module, and described increase module is for two adjacent segments The T length of one's sleep is increased in the middle of the sequence switching of reviving-sleep of pointoverlap, ToverlapMaximum be Oi,i+1/vmax, wherein, Oi,i+1Represent two adjacent node overlapping detection regions length of fields, vmaxFor The maximum movement speed of intrusion target.
Intrusion target detecting system based on road the most according to claim 8, it is special Levy and be, also include that initialization module, described initialization module are arranged on the concentrator of network, For initializing before testing, described initialization includes arranging detection parameter, described inspection Survey parameter and include that described network work cycle, described node cycle and node are at a network work The respective number of times k reviving and sleeping in cycle.
CN201310200502.4A 2013-05-27 2013-05-27 A kind of intrusion target detection method based on road and system Expired - Fee Related CN103338477B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310200502.4A CN103338477B (en) 2013-05-27 2013-05-27 A kind of intrusion target detection method based on road and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310200502.4A CN103338477B (en) 2013-05-27 2013-05-27 A kind of intrusion target detection method based on road and system

Publications (2)

Publication Number Publication Date
CN103338477A CN103338477A (en) 2013-10-02
CN103338477B true CN103338477B (en) 2016-09-28

Family

ID=49246558

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310200502.4A Expired - Fee Related CN103338477B (en) 2013-05-27 2013-05-27 A kind of intrusion target detection method based on road and system

Country Status (1)

Country Link
CN (1) CN103338477B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3292717A4 (en) * 2015-05-04 2018-04-18 Telefonaktiebolaget LM Ericsson (publ) Coordinated duty cycle assignment in mesh networks
CN107240300A (en) * 2017-07-27 2017-10-10 深圳暚光科技有限公司 A kind of engineering truck collision-proof alarm method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101742544A (en) * 2009-11-26 2010-06-16 上海大学 Energy-saving MAC and routing cross-layer method for linear monitoring network
CN101835178A (en) * 2010-03-30 2010-09-15 北京必创科技有限公司 Method for realizing remote wireless monitoring and wireless monitoring device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120242792A1 (en) * 2009-12-09 2012-09-27 Tao Zhang Method and apparatus for distinguishing a 3d image from a 2d image and for identifying the presence of a 3d image format by image difference determination

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101742544A (en) * 2009-11-26 2010-06-16 上海大学 Energy-saving MAC and routing cross-layer method for linear monitoring network
CN101835178A (en) * 2010-03-30 2010-09-15 北京必创科技有限公司 Method for realizing remote wireless monitoring and wireless monitoring device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Virtual Scanning Algorithm for Road Network Surveillance;Jaehoon Jeong,et.al.;《IEEE Transactions on Parallel and Distributed Systems》;20101231;第21卷(第12期);1734-1737,1742 *
一种平衡无线传感器网络节点能耗的策略;卢丽鹏,等;《南方电网技术》;20120531;第6卷(第5期);57-61 *

Also Published As

Publication number Publication date
CN103338477A (en) 2013-10-02

Similar Documents

Publication Publication Date Title
Gui et al. Virtual patrol: a new power conservation design for surveillance using sensor networks
Kim et al. Energy adaptive MAC protocol for wireless sensor networks with RF energy transfer
CN104426213B (en) Monitoring system and method for storage battery
KR102455630B1 (en) Communication system for sensor networks
Galzarano et al. QL-MAC: A Q-learning based MAC for wireless sensor networks
CN103338477B (en) A kind of intrusion target detection method based on road and system
CN106230645B (en) Low-power-consumption wireless communication method used between monitoring node and convergence gateway
Yu et al. Minimum-time aggregation scheduling in duty-cycled wireless sensor networks
CA3060659A1 (en) Hail and acceptance for battery-powered devices
CN102083183A (en) Low-energy consumption sleeping monitoring method synchronous relative to time of wireless sensor network
Rashid et al. Improving energy conservation in wireless sensor networks using energy harvesting system
Galzarano et al. A learning-based mac for energy efficient wireless sensor networks
CN109152100A (en) Vehicle-mounted passive wireless sensor network ad hoc network method and device
CN202385302U (en) Seat counting system based on ZigBee wireless technology
Chen et al. An efficient power saving polling scheme in the internet of energy
Liendo et al. Efficient bluetooth low energy operation for low duty cycle applications
CN105722180B (en) Low duty ratio Sensor Network neighbor discovering method based on Length discrepancy revival time slot
Adamo et al. Comparison of current sensors for power consumption assessment of wireless sensors network nodes
Park et al. RIX-MAC: an energy-efficient receiver-initiated wakeup MAC protocol for WSNs
Kuo et al. Design of long range low power sensor node for the last mile of IoT
CN103607732A (en) Active diagnosis method based on information hiding technology in wireless sensor network
CN107809764B (en) Markov chain-based multi-event detection method
CN102917467B (en) Asynchronous reservation channel access method of wireless sensor network
CN107094286A (en) A kind of super low-power consumption implementation method towards sparse flow wireless self-organization network
Qiu et al. Dynamic duty cycle-based Wireless Sensor Network for underground pipeline monitoring

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160928

Termination date: 20200527