CN106507374A - The WSN fence intensifying methods of secondary deployment - Google Patents

The WSN fence intensifying methods of secondary deployment Download PDF

Info

Publication number
CN106507374A
CN106507374A CN201610917720.3A CN201610917720A CN106507374A CN 106507374 A CN106507374 A CN 106507374A CN 201610917720 A CN201610917720 A CN 201610917720A CN 106507374 A CN106507374 A CN 106507374A
Authority
CN
China
Prior art keywords
node
fence
weak spot
deployment
energy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610917720.3A
Other languages
Chinese (zh)
Other versions
CN106507374B (en
Inventor
毛科技
方飞
孙俊生
方凯
施伟元
李鹏欢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University of Technology ZJUT
Original Assignee
Zhejiang University of Technology ZJUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University of Technology ZJUT filed Critical Zhejiang University of Technology ZJUT
Priority to CN201610917720.3A priority Critical patent/CN106507374B/en
Publication of CN106507374A publication Critical patent/CN106507374A/en
Application granted granted Critical
Publication of CN106507374B publication Critical patent/CN106507374B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/18Network planning tools
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Alarm Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The WSN fence intensifying methods of secondary deployment, including:Step 1, initial fence point:(1) Robustness Analysis are carried out to the fence after initial fence and reinforcing according to node energy consumption sensor model, (2) cause the perception radius to reduce according to energy consumption consumption carries out weak spot lookup;Step 2, secondary deployment:The method that the present invention proposes secondary deployment, deployment static node, builds fence using static node, disposes mobile node again along the fence having been built up for the second time for the first time, is repaired using mobile node or reinforcing fence;Step 3, strengthens fence:The displacement summation of research and utilization mobile node reinforcing fence weak spot reaches minimum.

Description

The WSN fence intensifying methods of secondary deployment
Technical field
The invention mainly relates to wireless sensor network fence Covering domain, is related to the WSN fence reinforcing side of secondary deployment Method.
Background technology
It is one of main overlay model of wireless sensor network field that fence is covered, and which is mainly studied and tries when monitoring objective Figure is detected problem when passing through wireless sensor network disposition region.Need to expend larger resource due to building a fence, Therefore the robustness for how improving fence is key issue.Wireless sensor network fence is covered extensive purposes, such as exists Fence is deployed in the invasion that enemy can be detected in position forward position by military aspect.In terms of environmental protection, fence is deployed in polluter Surrounding can detect the spread condition of pollutant.In terms of Market Economy, fence is deployed in forest fire scene and can detect fire Spread situation etc..
The field for covering in wireless sensor network fence both at home and abroad at present has been achieved for abundant achievement, document 《Command control for many-robot systems》With regard to robot coverage, propose what fence was covered earliest Concept.Kumar et al. proposes the concept of k- fence covering, and the problems such as condition of the survey region needed for the covering of K- fence, Optimal Sleep-Wakeup fence dispatching algorithms are proposed simultaneously in the literature, the algorithmic dispatching fence forms strong K- grid Hurdle so that the energy of fence is fully utilized, so that reach the maximization of fence life span.Anwar Saipulla et al. are carried Line-based dispositions methods are gone out, uniformly the mode such as deployment is higher for the likelihood ratio of the method formation fence, and proposes base Send mobile node to repair fence gap in the maximum-flow algorithm of weight directed graph, make total displacement optimum.Habib Mostafaei et al. proposes the K- Barrier Coverage Problems that a kind of distributed self-learning algorithm solves static node, and should The network lifetime and document of algorithm《Optimal Sleep-Wakeup Algorithms for Barriers of Wireless Sensors》In Optimal Sleep-Wakeup algorithms contrasted.Xu B et al. are have studied using invasion The priori conditions that the historical data of person is strengthened as follow-up fence, predict in subsequent time period fence most easily by intruder attack Node, and mobile node moved to the method at most vulnerable node, the method make the fence will not be by rapid damage.Li Et al. et al. have studied one kind and dispatch fence under conditions of intrusion detection rate is met so that the most long side of fence life span Method.Chen J et al. propose, using probability sensor model, to invade speed as restrictive condition, sensor network problem to be converted into Maximum flow problem, and according to euclidean distance between node pair and dump energy, propose a kind of bounded fence building method.Keung et al. etc. People have studied static sensor node and form the number of nodes that strong K- fence needs in deployment region.
Above-mentioned method is all that the fence for building is studied, but these fence are very fragile, with node energy Consumption, the perception radius can be gradually reduced, and fence interior joint sensing range overlaps few part and gap easily occurs.
Content of the invention
The invention solves the problems that the disadvantages mentioned above of prior art, it is proposed that a kind of fence intensifying method of secondary deployment, the party Weak spot in fence is strengthened by method by disposing less mobile node again so that fence is not easy gap occur, greatly The survival ability of fence is strengthened greatly.
The WSN fence intensifying methods of secondary deployment of the present invention, comprise the steps:
Step 1, initial fence analysis;
Step 11, energy consumption sensor model;
There is relation with the energy of node itself storage in step 111, the perception radius of sensor node, this method is proposed Shown in relational model such as formula (1):
E in formula (1)kFor the energy that node is consumed, c1 represents perception constant, rkRepresent the perception radius variable quantity;
Step 112, the gross energy of sensor node is E, the perception radius as shown in formula (2), when node consumed energy is e Shown in r such as formulas (3):
R in formula (2) and (3) is maximum the perception radius, and e is the energy for consuming, and E is the gross energy of sensor node;
Step 12, weak spot are searched;
Step 121, traversal fence in all of sensor node, calculate adjacent node apart from adjacent node in d, fence Between the collection of distance be combined into D={ d1,d2,d3...ds-1(s is sensor node quantity);
Step 122, the distance set D between the static sensor node of random placement meet Gauss distribution, such as formula (4) institute Show:
In formula (4) S represents that distance set size, this method will be gathered Element d in DiMidpoint w between ∈ [μ+σ, 2R] corresponding adjacent nodenAs weak spot, weak point set W={ w is set up1,w2, w3...wn(numbers of the n for weak spot);
Step 2, secondary deployment;
Step 21, the method that the present invention proposes secondary deployment, deployment static node, is built using static node for the first time Fence, disposes mobile node again along the fence having been built up for the second time, is repaired using mobile node or reinforcing fence, specifically Step is as follows:
Step 211, according to the environment and requirement deployment static sensor node of deployment region, is then built using fence and is calculated Method build fence, with the consumption of node energy, easily there is gap, so as to cause the monitoring function of fence to fail, therefore I Carry out step 212, deployment mobile node is used for strengthening fence;
Step 212, the removable node of the fence deployment built along in step 211 using line-based methods;
Step 3, strengthens fence;
Step 31, the weak spot quantity that can strengthen;
Step 311, the present invention propose a kind of maximum-flow algorithm based on set and improve under conditions of accuracy rate is ensured The efficiency of algorithm, it is known that weak point set is W, the collection of removable node is combined into M={ m1,m2,m3...mn, mobile node can Displacement is md, works as wi(wi∈ W) and mi(mi∈ M) distance be less than md, then miThe neighbor node of referred to as weak spot, concrete walks Suddenly it is:
Step 3111, calculates the set of the neighboring mobile node of weak spot, and obtains after public-neighbor is distinguished The new neighbor node subclass n of weak spot;
Step 3112, closes number of elements in n with the new neighbor Node subsets of each weak spot and, as weighted value, sets up directed graph G;
Step 3113, using maximum-flow algorithm calculate figure G max-flow, when max-flow be equal to weak spot quantity, then this When weak spot all can be strengthened, otherwise there is the weak spot that can not be reinforced, because it may move neighbor node;
Step 32, reinforcing strategy;
Step 321, it is whole neighbors set N to merge multiple subclass n, and the removable node in set N is to its neighbour The distance set for occupying weak spot is MD={ md1,md2,md3,...mdnum|mdi≤ md } (num is the individual of all mobile nodes Number), set MD' is obtained to set MD ascending sorts, the present invention searches for md using binary chopoptimum, mdmin< mdoptimum < mdmax(mdminAnd mdmaxThe minima obtained for ascending order and maximum) so that meet set ED={ MD'| mdi≤ mdoptimumMobile node can strengthen all of weak spot just, then now mobile node movement is minimum apart from summation, two Point-score algorithm is concretely comprised the following steps:
Step 3211, initialization
Step 3212, updates the neighbours subclass n of weak spot, will be more than md apart from weak spotoptimumNode from neighbours Set is removed, and updates the weight and topology of directed graph G;
Step 3213, calculates the max-flow of directed graph G after updating, when max-flow is less than weak spot quantity, thenWhen max-flow is equal to weak spot quantity, And | L-optimum | < ε, export mdoptimum, algorithm terminates, otherwise execution step 3214;
Step 3124, rebound step 3212.
It is an advantage of the invention that:
(1) weak spot in fence is strengthened by the present invention by disposing less mobile node again so that fence is not Easily there is gap, greatly reinforced the survival ability of fence;
(2) present invention proposes the deployment way of secondary deployment, can greatly improve the utilization rate of mobile node, while utilizing Maximum-flow algorithm based on set calculates the quantity that can strengthen node, is then ensureing to maximize reinforcing using binary search method Cause the displacement summation of mobile node minimum on the premise of weak spot quantity.
Description of the drawings
The weak point diagram of Fig. 1 present invention
The secondary deployment diagram of Fig. 2 present invention
The weight directed graph of Fig. 3 present invention
Specific embodiment
The present invention is further illustrated below in conjunction with the accompanying drawings.
The WSN fence intensifying methods of secondary deployment of the present invention, comprise the steps:Step 1, initial fence point Analysis;
After certain sensor node is disposed in deployment region, be built into initial fence, but adjacent segments in fence The sensing range lap of point is not of uniform size, and with the consumption of node energy, sensing range is gradually decreased, therefore sensing range Easily there is fence gap where lap is few, monitoring objective just can pass through fence by gap and not be monitored to. Deployment WSN fence needs to expend substantial amounts of resource, causes fence dead too early if as the presence of some weak spots in fence Die be a kind of greatly waste, therefore find out the weak spot in fence and then carry out strengthening meaning using mobile node very big.
Step 11, energy consumption sensor model;
Step 111, the perception radius of sensor node have relation with the energy of node itself storage, when node energy abundance When, the perception radius are maximum, and with energy expenditure, the perception radius are gradually reduced.The perception radius and energy consumption relation generally adopt document 《Energy-efficient connected coverage of discrete targets in wireless sensor networks》In perception energy consumption model calculate, according to the model, the present invention proposes the relation that the perception radius change with energy consumption Model.
E in formula (1)kFor the energy that node is consumed, c1 represents perception constant, rkRepresent the perception radius variable quantity.The present invention is adopted Follow-up study is carried out with relational model (a).
Step 112, it is assumed that the gross energy of sensor node is E, as shown in formula (2), when node perceived radius is 0, section The energy of point just runs out of.When node consumed energy is e, shown in the perception radius r such as formula (3) of node.
In formula (2,3), R is node maximum the perception radius.Assume that the energy of node is mainly consumed by node perceived, pass through Node energy consumption sensor model can carry out Robustness Analysis to the fence after initial fence and reinforcing.
Step 12, weak spot are searched;
Step 121, the sensor node in the present invention obtain coordinate by location technology.The fence section of initial construction Point energy is sufficient, and the perception radius are R, and as the consumption of energy, the perception radius reduce, in fence, between adjacent node, distance is close to 2R Part easily there is gap.Using the foundation that euclidean distance between node pair d is searched as weak spot, d is bigger, and the fence at this more easily goes out Existing gap, fence weak spot is as shown in figure 1, the coordinate of weak spot is the midpoint of node n1 and n2.
Traversal fence in all of sensor node, calculate adjacent node apart from d, it is assumed that fence is by s sensor section Point is constituted, and in fence, between adjacent node, the collection of distance is combined into D={ d1,d2,d3...ds-1, diLess, fence is more firm, otherwise Fence is more fragile.
Step 122, deployment static sensor node is random placement, it is assumed that the element in set D meets Gauss distribution, As shown in formula (4).
In formula (4)
The present invention is by element d in set DiThe midpoint w of the corresponding adjacent node n1 and n2 of ∈ [μ+σ, 2R]iAs weak spot, Set up weak point set W={ w1,w2,w3...wn}.
Step 2, secondary deployment;
Step 21, has a lot of researchs all to repair fence, such as document using mobile node at present《Barrier coverage with line-based deployed mobile sensors》.These mobile nodes and static node are mixed in together once Property is deployed in monitored area, and this deployment way causes the probability that mobile node is utilized very low, causes a large amount of mobile nodes Can not be utilized, and mobile node is expensive, this deployment way undoubtedly considerably increases the cost of deployment fence.For The utilization rate of mobile node is improved, increases the robustness of fence, it is proposed that the method for secondary deployment, dispose static section for the first time Point, builds fence using static node, disposes mobile node again along the fence having been built up for the second time, using mobile node Repair or reinforcing fence, as shown in Figure 2.
Step 211, according to environment and the requirement of deployment region, can adopt Poisson deployment, random uniform deployment, Line- The deployment way such as based dispose static sensor node, then can adopt document《Based on the wireless senser for improving ant group algorithm Network fence coverage optimization is studied》Fence is built Deng fence developing algorithm.The fence poor robustness for now building, fence operation one Section the time after, with the consumption of node energy, easily there is gap, so as to cause the monitoring function of fence to fail, therefore we Step 2 is carried out, deployment mobile node is used for strengthening fence.
Step 212, disposes mode and the document of mobile node《Barrier Coverage of Line-Based Deployed Wireless Sensor Networks》Using Line-based methods similar, be specifically along in step one The fence deployment for having built may move sensor node.Secondary dispositions method causes mobile node to be targetedly deployed in fence Side, therefore can more fully be used for repairing and the forced working of fence.
Step 3, strengthens fence;
This part mainly calculates the weak spot quantity that can strengthen by the maximum-flow algorithm based on set, then will be removable Weak spot reinforcing fence of the dynamic node motion in fence.It is more sane that fence after reinforcing is compared with initial fence, with section Point energy expenditure, the fence after reinforcing are not easy gap occur.
Step 31, the weak spot quantity that can strengthen;
Step 311, at present a lot of researchs all solve to repair fence number of gaps this problem using maximum-flow algorithm, such as Document《Strengthening barrier-coverage of static sensor network with mobile sensor nodes》.Maximum can accurately be calculated by the method and can repair the quantity in fence gap, but the number of mobile node Amount is more, and the efficiency of algorithm is not high.Present invention reinforcing fence weak spot is similar to fence gap reparation problem, it is proposed that a kind of Maximum-flow algorithm based on set improves the efficiency of algorithm under conditions of accuracy rate is ensured.
Assume that the weak spot of fence has wi、wi+1、wi+2...wk, the collection of removable node is combined into M={ m1,m2,m3...mn, The movable distance of mobile node is md.Work as wiWith miDistance be less than md, then miThe neighbor node of referred to as weak spot.Algorithm has Body step is as follows:
Step 3111, with weak spot wi、wi+1、wi+2As a example by, calculate their neighboring mobile node, respectively set A, B, C, may include the public-neighbor of weak spot, then distinguish these public-neighbors in these set, to gather As a example by A, B, as shown in formula (5,6,7).
A=A-A ∩ B (5)
B=A ∩ B (6)
C=B-A ∩ B (7)
Wherein a is wiNeighbor node set, b be wi、wi+1Public-neighbor set, c is wi+1For wi+1Neighbours Node set.
Step 3112, with number of elements Na, Nb of set a, b, c, Nc as weighted value, sets up directed graph G, as shown in figure 3, Add start node u and end node v, quantity of the weighted value being connected with u for set element, the weighted value being connected with v in figure All it is 1, set d is wi+2Neighbor node set.
Step 3113, using maximum-flow algorithm calculate figure G max-flow, when max-flow be equal to weak spot quantity, then this When weak spot all can be strengthened, otherwise there is the weak spot that can not be reinforced, because it may move neighbor node.
Step 32, reinforcing strategy;
Step 321, the displacement summation of the main research and utilization mobile node reinforcing fence weak spot of this trifle are minimum.Logical The neighbor node set (a, b, c, d etc.) that 3.1 trifles have obtained all weak spots is crossed, merges neighbor node set N=a ∪ b ∪ c ∪ d ∪ ..., it is assumed that the distance set of the removable node in set N to its neighbours' weak spot is MD={ md1,md2, md3,...mdnum|mdi≤ md }, there is num element in set MD, set MD' is obtained to set MD ascending sorts, set MD''s First element is mdmin, last element is mdmax.Assume to exist one apart from mdoptimum, mdmin< mdoptimum< mdmaxSo that meet set ED={ MD'| mdi≤mdoptimumMobile node can strengthen all of weak spot just, then now It is minimum apart from summation that mobile node is moved.
The present invention searches for md using binary chopoptimum, ε is a threshold value, approaches for algorithm, algorithm concrete operations Shown in following steps:
Step 3211, initializationL=0,
Step 3212, updates neighborhood a, b, c, d of weak spot etc., will be more than md apart from weak spotoptimumNode Remove from neighborhood, and update the weight and topology of directed graph G.
Step 3213, calculates the max-flow of directed graph G after updating, if max-flow is less than weak spot quantity,L=optimum,Max-flow can not possibly be more than the number of weak spot Amount.If max-flow is equal to weak spot quantity, and L-optimum | < ε, export mdoptimum, algorithm terminates, otherwise execution step 4.
Step 3214, rebound step 2.

Claims (1)

1. the WSN fence intensifying methods of two deployment, comprise the steps:
Step 1, initial fence analysis;
Step 11, energy consumption sensor model;
Step 111, the perception radius of sensor node are shown with the relational model such as formula (1) of the energy of node itself storage:
r k = e k c 1 ( a ) e k c 1 ( b ) - - - ( 1 )
E in formula (1)kFor the energy that node is consumed, c1 represents perception constant, rkRepresent the perception radius variable quantity;
Step 112, the gross energy of sensor node is E, and as shown in formula (2), the perception radius r when node consumed energy is e are such as Shown in formula (3):
E = c 1 * R 2 2 - - - ( 2 )
r = R - 4 R 2 - 8 e c 1 2 - - - ( 3 )
R in formula (2) and (3) is maximum the perception radius, and e is the energy for consuming, and E is the gross energy of sensor node;
Step 12, weak spot are searched;
Step 121, traversal fence in all of sensor node, calculate adjacent node apart from adjacent node spacing in d, fence From collection be combined into D={ d1,d2,d3...ds-1(s is sensor node quantity);
Step 122, the distance set D between the static sensor node of random placement meet Gauss distribution, as shown in formula (4):
f ( d i ) = 1 2 π σ exp ( - ( d i - μ ) 2 2 σ 2 ) - - - ( 4 )
In formula (4)S represents distance set size, by element d in set Di Midpoint w between ∈ [μ+σ, 2R] corresponding adjacent nodenAs weak spot, weak point set W={ w is set up1,w2,w3...wn}(n Number for weak spot);
Step 2, secondary deployment;
Step 21, deployment static node, builds fence using static node, along the fence having been built up again for the second time for the first time Secondary deployment mobile node, is repaired using mobile node or reinforcing fence, is comprised the following steps that:
Step 211, according to the environment and requirement deployment static sensor node of deployment region, then adopts fence developing algorithm structure Fence is built, with the consumption of node energy, gap easily occurs, so as to cause the monitoring function of fence to fail, therefore walked Rapid 212, deployment mobile node is used for strengthening fence;
Step 212, the removable node of the fence deployment built along in step 211 using line-based methods;
Step 3, strengthens fence;
Step 31, the weak spot quantity that can strengthen;
Step 311, a kind of maximum-flow algorithm based on set, it is known that weak point set is W, the collection of removable node is combined into M= {m1,m2,m3...mn, the movable distance of mobile node is md, works as wi(wi∈ W) and mi(mi∈ M) distance be less than md, then mi The neighbor node of referred to as weak spot, concretely comprises the following steps:
Step 3111, calculates the set of the neighboring mobile node of weak spot, and obtains weakness after public-neighbor is distinguished The new neighbor node subclass n of point;
Step 3112, closes number of elements in n with the new neighbor Node subsets of each weak spot and, as weighted value, sets up directed graph G;
Step 3113, the max-flow for calculating figure G using maximum-flow algorithm are when max-flow is equal to the quantity of weak spot, then now thin Weakness all can be strengthened, and otherwise there is the weak spot that can not be reinforced, because it not may move neighbor node;
Step 32, reinforcing strategy;
Step 321, merges multiple subclass n for whole neighbors set N, and the removable node in set N is thin to its neighbours The distance set of weakness is MD={ md1,md2,md3,...mdnum|mdi≤ md } (num is the number of all mobile nodes), right Set MD ascending sorts obtain set MD', search for md using binary chopoptimum, mdmin< mdoptimum< mdmax, mdminWith mdmaxThe minima obtained for ascending order and maximum so that meet set ED={ MD'| mdi≤mdoptimumMobile node proper All of weak spot can be strengthened well, then now mobile node movement is minimum apart from summation, and two way classification algorithm is concretely comprised the following steps:
Step 3211, initializationL=0,
Step 3212, updates the neighbours subclass n of weak spot, will be more than md apart from weak spotoptimumNode from neighborhood move Remove, and update the weight and topology of directed graph G;
Step 3213, calculates the max-flow of directed graph G after updating, when max-flow is less than weak spot quantity, thenL=optimum,When max-flow is equal to weak spot quantity, and | L-optimum | < ε, export mdoptimum, algorithm terminates, otherwise execution step 3214;
Step 3124, rebound step 3212.
CN201610917720.3A 2016-10-21 2016-10-21 The WSN fence intensifying method of secondary deployment Active CN106507374B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610917720.3A CN106507374B (en) 2016-10-21 2016-10-21 The WSN fence intensifying method of secondary deployment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610917720.3A CN106507374B (en) 2016-10-21 2016-10-21 The WSN fence intensifying method of secondary deployment

Publications (2)

Publication Number Publication Date
CN106507374A true CN106507374A (en) 2017-03-15
CN106507374B CN106507374B (en) 2019-10-29

Family

ID=58319315

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610917720.3A Active CN106507374B (en) 2016-10-21 2016-10-21 The WSN fence intensifying method of secondary deployment

Country Status (1)

Country Link
CN (1) CN106507374B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833152A (en) * 2018-06-05 2018-11-16 国网江苏省电力有限公司电力科学研究院 Electric power wireless private network end-to-end performance monitoring node deployment method and device
CN110418352A (en) * 2019-07-17 2019-11-05 浙江工业大学 A kind of weak fence gap restorative procedure being deployed in aquatic environment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102843708A (en) * 2011-06-22 2012-12-26 中国科学院深圳先进技术研究院 Method for checking coverage quality of wireless sensor network
US20130335219A1 (en) * 2012-05-07 2013-12-19 Integrated Security Corporation Intelligent sensor network
CN103856951A (en) * 2014-01-15 2014-06-11 浙江工业大学 Coverage hole eliminating method based on multi-sensor probability perceptual model
CN104796916A (en) * 2015-05-11 2015-07-22 苏州惠通天地信息科技有限公司 Establishment method of wireless sensor network high barrier coverage for target detection
CN105228160A (en) * 2014-06-23 2016-01-06 北京邮电大学 A kind of fence method for repairing and mending mixed based on minimum empty number fence in Sensor Network
CN105554775A (en) * 2015-12-15 2016-05-04 南京邮电大学 Directional sensor network fence fixing method based on mobile node

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102843708A (en) * 2011-06-22 2012-12-26 中国科学院深圳先进技术研究院 Method for checking coverage quality of wireless sensor network
US20130335219A1 (en) * 2012-05-07 2013-12-19 Integrated Security Corporation Intelligent sensor network
CN103856951A (en) * 2014-01-15 2014-06-11 浙江工业大学 Coverage hole eliminating method based on multi-sensor probability perceptual model
CN105228160A (en) * 2014-06-23 2016-01-06 北京邮电大学 A kind of fence method for repairing and mending mixed based on minimum empty number fence in Sensor Network
CN104796916A (en) * 2015-05-11 2015-07-22 苏州惠通天地信息科技有限公司 Establishment method of wireless sensor network high barrier coverage for target detection
CN105554775A (en) * 2015-12-15 2016-05-04 南京邮电大学 Directional sensor network fence fixing method based on mobile node

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
戴光麟等: "入侵轨迹建模与WSN栅栏覆盖分段调度算法研究", 《传感技术学报》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833152A (en) * 2018-06-05 2018-11-16 国网江苏省电力有限公司电力科学研究院 Electric power wireless private network end-to-end performance monitoring node deployment method and device
CN110418352A (en) * 2019-07-17 2019-11-05 浙江工业大学 A kind of weak fence gap restorative procedure being deployed in aquatic environment

Also Published As

Publication number Publication date
CN106507374B (en) 2019-10-29

Similar Documents

Publication Publication Date Title
US8710983B2 (en) Intelligent sensor network
Liu Sensor deployment of wireless sensor networks based on ant colony optimization with three classes of ant transitions
Tian et al. Deployment and reallocation in mobile survivability-heterogeneous wireless sensor networks for barrier coverage
CN106507374A (en) The WSN fence intensifying methods of secondary deployment
CN104080154B (en) Industrial wireless sensor network node dormancy method based on cellular automaton
Zhang et al. HDRE: Coverage hole detection with residual energy in wireless sensor networks
CN104796916A (en) Establishment method of wireless sensor network high barrier coverage for target detection
CN104125572B (en) The Sybil attack detection methods cooperated based on node
CN103491542B (en) The sewage pool attack intrusion detection method of Multi-path route in underwater sensor network
CN102143495B (en) Method for detecting node attack in wireless sensor network
CN105898700A (en) Energy-saving barrier coverage method for mobile sensing nodes on two-dimensional plane
CN103167519A (en) High-efficiency and energy-saving visual sensor network target covering algorithm
Jeong et al. Energy-aware scheduling with quality of surveillance guarantee in wireless sensor networks
CN101977129B (en) Artificial immunization-based MANET network attack detection method
CN104254079A (en) Control method of three-dimensional coverage of wireless sensor networks oriented to near-surface underground space
CN103945401A (en) Wireless sensor network automatic deploying method facing non-uniform perception areas
CN106792742A (en) A kind of WSN fence restorative procedures based on set maximum-flow algorithm
Balarengadurai et al. Detection of exhaustion attacks over IEEE 802.15. 4 MAC layer using fuzzy logic system
Wang et al. Mobility-assisted sensor networking for field coverage
Verma et al. Grid and fuzzy based stable energy-efficient clustering algorithm for heterogeneous wireless sensor networks
Laturkar et al. Coverage optimization techniques in WSN using PSO: a survey
CN110049463B (en) Method for realizing flow type fence scheduling algorithm in WSN (Wireless sensor network)
CN103024850A (en) Method for traversing wireless sensor network
Kuang et al. A clustering approach based on convergence degree chain for wireless sensor networks
Jin et al. An incomplete coverage control based on target tracking wireless sensor network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant