CN108174403A - A kind of k- covering hole detection methods of wireless sensor network - Google Patents

A kind of k- covering hole detection methods of wireless sensor network Download PDF

Info

Publication number
CN108174403A
CN108174403A CN201810151725.9A CN201810151725A CN108174403A CN 108174403 A CN108174403 A CN 108174403A CN 201810151725 A CN201810151725 A CN 201810151725A CN 108174403 A CN108174403 A CN 108174403A
Authority
CN
China
Prior art keywords
boundary
node
message
sections
line segment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810151725.9A
Other languages
Chinese (zh)
Inventor
燕锋
马文钰
夏玮玮
沈连丰
胡静
宋铁成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southeast University
Original Assignee
Southeast University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southeast University filed Critical Southeast University
Priority to CN201810151725.9A priority Critical patent/CN108174403A/en
Publication of CN108174403A publication Critical patent/CN108174403A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/04Arrangements for maintaining operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Abstract

A kind of k the invention discloses wireless sensor network covers hole detection method.Wireless sensor network is modeled as a figure G=(V, E), V is the set of all nodes, and E is the set of all adjacent node lines;According to the range information between adjacent node, the boundary sections in all 1 covering cavities in current network are found, and calculate its weight;In the boundary sections of discovery, suitable beginning boundary line segment is found, and thus boundary initial segment starts to transmit message successively to other connected boundary sections, find the boundary circumference in all 1 covering cavities;In current network find a node set that target area can be completely covered, suspend mode this set in node the coverage of current network is made to subtract 1, again detect current network present in 1 covering cavity;It repeats k 1 time, finds the boundary sections and boundary circumference in all k coverings cavities.The present invention can accurately detect the coverings of k present in network cavity in the case where only knowing localization range information.

Description

A kind of k- covering hole detection methods of wireless sensor network
Technical field
The invention belongs to wireless sensor network field, a kind of more particularly to k- coverings cavity of wireless sensor network Detection method.
Background technology
Wireless sensor network is by largely having the microsensor node group of sensing capability, ability to communicate and computing capability Into being widely used in the fields such as environmental monitoring, intrusion detection.In order to improve Fault Tolerance or be wanted to coverage It asks in higher application such as military monitoring, triangulation location, often requires that each point in target area at least by k node Sensing range covering, wherein k is integer more than or equal to 1;And in practical application, random spreading, the energy of sensor node Amount exhausts and the factors such as node is destroyed can cause the empty generation of covering again, seriously affects wireless sensor network and can be provided Service quality.Therefore, the detection in k- coverings cavity is an important job.
At present, the scheme for having had some different for the empty test problems of the covering of wireless sensor network, mainly may be used To be divided into three classes:Based on coordinate, based on distance and based on homology theory;Wherein, the covering hole detection method based on coordinate can Accurately to find the boundary sections in all cavities and boundary circumference, but the method needs to obtain all the sensors node in network Coordinate information, and these information are difficult to obtain in practice;The existing k- coverings hole detection method based on distance is only capable of It was found that all boundary nodes, and the boundary sections and boundary circumference in all k- coverings cavities cannot be found simultaneously;Based on the people having the same aspiration and interest Theoretical covering hole detection method only finds the covering cavity in network by communication information, but the method cannot find own Covering cavity.
Invention content
In order to solve the technical issues of above-mentioned background technology proposes, the present invention is intended to provide a kind of wireless sensor network K- covers hole detection method, and in the case where only knowing localization range information, k- coverings present in accurate detection network are empty Hole, and determine the specific region in each k- coverings cavity.
In order to realize above-mentioned technical purpose, the technical scheme is that:
A kind of k- covering hole detection methods of wireless sensor network, include the following steps:
(1) wireless sensor network is modeled as a figure G=(V, E), wherein, V is the set of all nodes, and E is institute There is the set of adjacent node line;According to the range information between adjacent node, all 1- coverings cavities in current network are found Boundary sections, and calculate its weight;
(2) in the boundary sections found in step (1), suitable beginning boundary line segment, and thus boundary start line are found Section starts to transmit message successively to other connected boundary sections, finds the boundary circumference in all 1- coverings cavities;
(3) in current network find a node set that target area can be completely covered, suspend mode this set in Node makes the coverage of current network subtract 1, detects the coverings of 1- present in current network cavity again;
(4) step (1)-(3) k-1 times are repeated, find the boundary sections and boundary circumference in all k- coverings cavities.
Further, in step (1), the boundary sections in all 1- coverings cavities in current network is found and calculate its power The method of weight is as follows:
For, per a pair of of adjacent node, judging that whether it perceives the intersection point of disk by other public-neighbors in figure G It is covered, if two intersection points are covered by the perception disk of other public-neighbors, which is not The boundary sections in 1- coverings cavity, weight are set as 0;If it is only covered in two intersection points there are one intersection point by other public-neighbors Lid, then the line to adjacent node is the boundary sections that weight is 1;If two intersection points are not by other public-neighbor institutes Covering, then the line to adjacent node is the boundary sections that weight is 2.
Further, in step (2), the method for finding suitable beginning boundary line segment is as follows:
There are two cavities of public boundary line segment, select the public boundary line segment as beginning boundary line segment;
There are two cavities of public boundary node, select a line boundary line section being connected with the public boundary node as Beginning boundary line segment;
Two cavities being separated from each other respectively select beginning boundary line segment of any one boundary sections as them.
Further, in step (2), start to transmit successively to other connected boundary sections from boundary initial segment and disappear The method for ceasing and finding the boundary circumference in all covering cavities is as follows:
After selecting beginning boundary line segment uv, since node v, all boundaries being connected with node v except removing node u Line segment transmits message, and the content of message includes the ID serial numbers of node u and v;When a certain boundary node receives a piece of news, exist Following four situation:
Situation 1:Node had received the message from same beginning boundary line segment, then the judgement of this message was attached most importance to Redoubling is ignored;
Situation 2:Node did not received the message for coming from the beginning boundary line segment, and the ID serial numbers of oneself are added to message end Tail, and pass to other boundary sections being connected with this node;
Situation 3:It is same node, and received before and this that the node of message, which is received, with the start node of the message The similar message of message then is judged to this message to repeat and ignore;
Situation 4:It is same node, and do not received and this before that the node of message, which is received, with the start node of the message The similar message of message, judgement are found that a boundary circumference;
It often finds a boundary circumference, the weight for all boundary sections for forming the boundary circumference is subtracted 1, continues to find it The boundary circumference in his cavity, the boundary sections for being more than 0 until weight is not present.
Further, in step (3), to all non-boundary nodes in wake-up states, judge that it perceives disk area Whether domain is completely covered by other nodes, if so, the node is included into set S and suspend mode;If it is not, node stayed awake, continues Judge next node;After performing primary judgement to all non-boundary nodes in wake-up states, it is still within waking up shape The non-boundary node of state constitutes a node set that target area is completely covered, and by these node whole suspend mode, and wakes up S In whole nodes, the coverage of current wireless sensor network subtracts 1.
The advantageous effect brought using above-mentioned technical proposal:
The present invention can be calculated merely with the localization range information between adjacent node in network by simple geometry, It was found that the boundary sections and boundary circumference in all 1- coverings cavities, pass through network coverage and the iteration 1- coverings cavity detection of successively decreasing Mode, it has further been found that the boundary sections and boundary circumference in all k- covering cavity in network determine each k- coverings cavity Specific region, for it is subsequent cavity repair etc. work basis is provided.
Description of the drawings
Fig. 1 covers empty detection example figure for wireless sensor network 1-;
Fig. 2 subtracts the wireless sensor network exemplary plot after 1 for network coverage;
Fig. 3 is the empty exemplary plot of 2- coverings found after iteration 1- coverings cavity is detected;
Fig. 4 is flow chart of the method for the present invention.
Specific embodiment
Below with reference to attached drawing, technical scheme of the present invention is described in detail.
For the wireless sensor network being made of N number of sensor node being randomly dispersed in rectangular target areas, net Each node in network has unique and mutually different ID identification numbers, and all nodes have identical the perception radius RsAnd communication Radius Rc;To ensure that the network coverage connects, node needs to meet Rc≥2Rs, it is assumed here that Rc=2Rs, the present invention is to Rc>2Rs Situation it is equally applicable.Each sensor node using disk overlay model, i.e. the sensing range of node be using node as the center of circle, Radius is RsDisk.For any two node u and v, if the Euclidean distance d between themu,v≤Rc, claim them adjacent each other Node can communicate between adjacent node, obtain range information to each other.
The perception circumference of any two adjacent node u, v necessarily intersect at one section of circular arc Su,v, length μu,vIt can be by remaining String theorem calculates:
According to the property circumferentially covered, if the perception circumference of node is completely covered by other nodes, then this node is just not It is adjacent with covering cavity.For the line uv of node u, v, if circular arc Su,vBoth sides endpoint covered by other nodes, then line Section uv is not just adjacent with covering cavity, i.e. line segment uv is not a line boundary line section.Assuming that node w is the public neighbours of node u, v Node, then the perception circumference of node w and u necessarily intersect at one section of circular arc Su,w.It, equally can be in the hope of circle according to the cosine law Arc Su,wLength μu,wAnd the angle theta between line segment uv and line segment uwvuw
So circular arc Su,vWith Su,wBetween there are three kinds of useful position relationships:
Relationship (1-1):Su,vWith Su,wNon-intersect, i.e., node w does not cover circular arc Su,vAny one endpoint;
Relationship (1-2):That is node w covers S simultaneouslyu,vTwo endpoints, at this point, meeting formula between them:
μu,w≥μu,v+2θvuw (3)
Relationship (1-3):Su,vWith Su,wIntersect but there is no inclusion relation, i.e. node w only covers Su,vAn endpoint, this When, meet formula between them:
To any pair adjacent node u, v, judge their all public-neighbors to circular arc Su,vTwo endpoints cover Lid situation;If meet relationship (1-2), then line segment uv is not a line boundary line section, no longer judges remaining public-neighbor; If neighbor node meets relationship (1-3), which is added to set S1;If being unsatisfactory for relationship (1-2), (1-3), continue to sentence Break next public-neighbor.
After judgement, if meeting relationship (2) conditional without node, set S is judged1Whether it is empty set;If so, line segment Uv is the boundary sections that weight is 2;If S1It is not empty set, then continues to judge set S1In with the presence or absence of a pair of of node, be covered each by Su,vThe different endpoint in both sides two.If set S1In two node w, x meet any one in following conditions, illustrate to save Point w, x cover circular arc Su,vThe different endpoint in both sides two:
Condition (1-1):W and x is not neighbor node,
Condition (1-2):W and x is neighbor node, and is met
θwuxvuwvuxOr θwuxvuwvux=2 π (5)
If Su,vTwo endpoints covered by the perception disk of other nodes in addition to node u, v, line segment uv is not just The boundary sections in 1- coverings cavity, weight 0;If only there are one by other coverages in two endpoints, line segment uv is 1- The boundary sections in cavity are covered, weight 1 illustrates that uv is adjacent with a covering cavity;If two endpoints are not saved by other Point is covered, and line segment uv is the boundary sections in 1- coverings cavity, and weight 2 illustrates that uv is adjacent with two covering cavities.Successively Judge all line segments in network, obtain the boundary sections in all 1- coverings cavities, as shown in Figure 1.
It was found that after all boundary sections, continue to find the boundary circumference in cavity.It is empty for any two covering in network Hole, there are three kinds of position relationships, find the beginning boundary line segment of boundary circumferential process by following standard selections respectively:
(1) there are two cavities of public boundary line segment, public boundary line segment is selected as beginning boundary line segment;
(2) there are two cavities of public boundary node, select a line boundary line section being connected with the public boundary node As beginning boundary line segment;
(3) two cavities being separated from each other respectively select beginning boundary line segment of any one boundary sections as them.
It is all with saving except node u to removing since start node v after selecting suitable beginning boundary line segment uv The boundary sections that point v is connected transmit message, and the content of message includes the ID serial numbers of node u and v;When a certain boundary node receives A piece of news, it is understood that there may be following four situation:
Situation (1-1):Node had received the message from same beginning boundary line segment, then this message was judged Redoubling of attaching most importance to is ignored;
Situation (1-2):Node did not received the message for coming from the beginning boundary line segment, and the ID serial numbers of oneself are added to and are disappeared End is ceased, and passes to other boundary sections being connected with this node.
Situation (1-3):It is same node, but received before that the node of message, which is received, with the start node of the message The message similar to this message is judged to this message to repeat and ignore;
Situation (1-4):The start node for receiving node and the message of message is same node, and do not received before with The similar message of this message, judgement are found that a boundary circumference.
It often finds a boundary circumference, the weight for all boundary sections for forming the boundary circumference is subtracted 1, continues to find it The boundary circumference in his cavity, the boundary sections for being more than 0 until weight is not present.
It was found that after the boundary circumference in all 1- coverings cavities, one can be completely covered target area in searching current network Node set.To the nodes in wake-up states all in network, judge whether it perceives disc area complete by other nodes All standing.Adjacent node v, w for existing in disk and perceiving circumference intersection point are perceived in node u to all, if intersection point is also removed u Except other nodes covered, then node u perceive disc area be completely covered by other nodes.Exist between node u, v, w Three kinds of situations:
Situation (2-1):Node u does not cover Sv,wAny one endpoint, then continue to judge lower a pair of of neighbor node;
Situation (2-2):Node u only covers Sv,wAn endpoint, judge whether node x, covered together with node u 1. or 2. one endpoint of sample meets condition with the presence or absence of node x:
1. u and x is unsatisfactory for condition (1-2) for neighbor node and node x;
2. node x covers S simultaneouslyv,wTwo endpoints;
Situation (2-3):Node u covers S simultaneouslyv,wTwo endpoints, judge whether that node x covers S simultaneouslyv,w's Two endpoints or with the presence or absence of a pair of of node x, y, are covered each by Sv,wThe different endpoint in two, both ends.
If the node dormancy is included into set by all intersection points perceived in disc area of node by other coverages S2.After judging the non-boundary nodes in wake-up states all in network, it is still in the non-boundary of wake-up states Node forms a node set that target area is completely covered, and by these node whole suspend mode, and wakes up S2In whole sections Point, the coverage of current wireless sensor network subtract 1, as shown in Figure 2.
The empty detection of 1- coverings is repeated in existing network, the boundary sections and boundary circumference found are former wireless biography The boundary sections and boundary circumference in 2- coverings cavity in sensor network, as shown in Figure 3.Iteration above process k-1 times finds network In all k- covering cavity boundary sections and boundary circumference.The process of entire detection method is as shown in Figure 4.
Embodiment is merely illustrative of the invention's technical idea, it is impossible to protection scope of the present invention is limited with this, it is every according to Technological thought proposed by the present invention, any change done on the basis of technical solution, each falls within the scope of the present invention.

Claims (5)

1. the k- covering hole detection methods of a kind of wireless sensor network, which is characterized in that include the following steps:
(1) wireless sensor network is modeled as a figure G=(V, E), wherein, V is the set of all nodes, and E is all phases The set of neighbors line;According to the range information between adjacent node, the boundary in all 1- coverings cavities in current network is found Line segment, and calculate its weight;
(2) in the boundary sections found in step (1), suitable beginning boundary line segment is found, and thus boundary initial segment is opened Begin to transmit message successively to other connected boundary sections, find the boundary circumference in all 1- coverings cavities;
(3) in current network find a node set that target area can be completely covered, suspend mode this set in node The coverage of current network is made to subtract 1, detects the coverings of 1- present in current network cavity again;
(4) step (1)-(3) k-1 times are repeated, find the boundary sections and boundary circumference in all k- coverings cavities.
2. the k- covering hole detection methods of wireless sensor network according to claim 1, which is characterized in that in step (1) in, find the boundary sections in all 1- covering cavity in current network and calculate its weight method it is as follows:
For, per a pair of of adjacent node, judging that it perceives whether the intersection point of disk is covered by other public-neighbors in figure G Lid, if two intersection points are covered by the perception disk of other public-neighbors, which is not that 1- covers The boundary sections in cavity are covered, weight is set as 0;If only being covered in two intersection points there are one intersection point by other public-neighbors, Then the line to adjacent node is the boundary sections that weight is 1;If two intersection points are not covered by other public-neighbors Lid, then the line to adjacent node is the boundary sections that weight is 2.
3. the k- covering hole detection methods of wireless sensor network according to claim 1, which is characterized in that in step (2) in, the method for finding suitable beginning boundary line segment is as follows:
There are two cavities of public boundary line segment, select the public boundary line segment as beginning boundary line segment;
There are two cavities of public boundary node, select a line boundary line section being connected with the public boundary node as starting Boundary sections;
Two cavities being separated from each other respectively select beginning boundary line segment of any one boundary sections as them.
4. the k- covering hole detection methods of wireless sensor network according to claim 1, which is characterized in that in step (2) in, start to transmit message successively to other connected boundary sections from boundary initial segment and find all covering cavities The method of boundary circumference is as follows:
After selecting beginning boundary line segment uv, since node v, all boundary sections being connected with node v except removing node u Message is transmitted, the content of message includes the ID serial numbers of node u and v;When a certain boundary node receives a piece of news, there are following Four kinds of situations:
Situation 1:Node had received the message from same beginning boundary line segment, then this message was judged to repeating simultaneously Ignore;
Situation 2:Node did not received the message for coming from the beginning boundary line segment, and the ID serial numbers of oneself are added to message end, And pass to other boundary sections being connected with this node;
Situation 3:It is same node, and received disappear with this before that the node of message, which is received, with the start node of the message Message as manner of breathing then is judged to this message to repeat and ignore;
Situation 4:It is same node, and do not received before and this message that the node of message, which is received, with the start node of the message Similar message, judgement are found that a boundary circumference;
It often finds a boundary circumference, the weight for all boundary sections for forming the boundary circumference is subtracted 1, continue to find other skies The boundary circumference in hole, the boundary sections for being more than 0 until weight is not present.
5. the k- covering hole detection methods of wireless sensor network according to claim 1, which is characterized in that in step (3) in, to all non-boundary nodes in wake-up states, judge that it perceives whether disc area is covered completely by other nodes Lid, if so, the node is included into set S and suspend mode;If it is not, node stayed awake, continues to judge next node;It is in all After the non-boundary node of wake-up states performed primary judgement, the non-boundary node for being still within wake-up states constitutes one The node set of target area is completely covered, by these node whole suspend mode, and wakes up whole nodes in S, current wireless biography The coverage of sensor network subtracts 1.
CN201810151725.9A 2018-02-14 2018-02-14 A kind of k- covering hole detection methods of wireless sensor network Pending CN108174403A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810151725.9A CN108174403A (en) 2018-02-14 2018-02-14 A kind of k- covering hole detection methods of wireless sensor network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810151725.9A CN108174403A (en) 2018-02-14 2018-02-14 A kind of k- covering hole detection methods of wireless sensor network

Publications (1)

Publication Number Publication Date
CN108174403A true CN108174403A (en) 2018-06-15

Family

ID=62510540

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810151725.9A Pending CN108174403A (en) 2018-02-14 2018-02-14 A kind of k- covering hole detection methods of wireless sensor network

Country Status (1)

Country Link
CN (1) CN108174403A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109451519A (en) * 2018-11-13 2019-03-08 井冈山大学 Based on WSN protocol network safety protecting method and system, computer program
CN110267323A (en) * 2019-05-21 2019-09-20 杭州电子科技大学 A kind of connection target K covering method based on adjustable the perception radius model
CN110806591A (en) * 2019-10-11 2020-02-18 广东工业大学 Unmanned aerial vehicle coverage search method and search device based on coherent theory
CN111065104A (en) * 2019-12-13 2020-04-24 中国电子科技集团公司第二十研究所 Self-adaptive network coverage method applied to distributed multi-hop network
CN111935732A (en) * 2020-09-09 2020-11-13 南京嘉环科技股份有限公司 Method, device, computer system and server for identifying network coverage structure holes
CN113746681A (en) * 2021-09-06 2021-12-03 中国联合网络通信集团有限公司 Detection method, device and equipment for perception hole and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100261495A1 (en) * 2009-04-13 2010-10-14 Xiaoyun Li Distributed hole recovery process using connectivity information
CN102843708A (en) * 2011-06-22 2012-12-26 中国科学院深圳先进技术研究院 Method for checking coverage quality of wireless sensor network
CN105898779A (en) * 2016-04-27 2016-08-24 南华大学 Method of detecting coverage holes of sensor network using trusted information coverage model
CN106358210A (en) * 2016-10-20 2017-01-25 重庆工商大学 Mixed strategy-based heterogeneous directional sensor network dynamic coverage method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100261495A1 (en) * 2009-04-13 2010-10-14 Xiaoyun Li Distributed hole recovery process using connectivity information
CN102843708A (en) * 2011-06-22 2012-12-26 中国科学院深圳先进技术研究院 Method for checking coverage quality of wireless sensor network
CN105898779A (en) * 2016-04-27 2016-08-24 南华大学 Method of detecting coverage holes of sensor network using trusted information coverage model
CN106358210A (en) * 2016-10-20 2017-01-25 重庆工商大学 Mixed strategy-based heterogeneous directional sensor network dynamic coverage method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
WENYU MA等: "Coverage Hole Detection Algorithm without Location Information in Wireless Sensor Networks", 《2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC)》 *
王自力等: "面向异构网络的基于k-覆盖的休眠调度算法", 《传感技术学报》 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109451519A (en) * 2018-11-13 2019-03-08 井冈山大学 Based on WSN protocol network safety protecting method and system, computer program
CN110267323A (en) * 2019-05-21 2019-09-20 杭州电子科技大学 A kind of connection target K covering method based on adjustable the perception radius model
CN110267323B (en) * 2019-05-21 2020-09-01 杭州电子科技大学 Connected target K covering method based on adjustable perception radius model
CN110806591A (en) * 2019-10-11 2020-02-18 广东工业大学 Unmanned aerial vehicle coverage search method and search device based on coherent theory
CN110806591B (en) * 2019-10-11 2022-02-11 广东工业大学 Unmanned aerial vehicle coverage search method and search device based on coherent theory
CN111065104A (en) * 2019-12-13 2020-04-24 中国电子科技集团公司第二十研究所 Self-adaptive network coverage method applied to distributed multi-hop network
CN111065104B (en) * 2019-12-13 2022-06-21 中国电子科技集团公司第二十研究所 Self-adaptive network coverage method applied to distributed multi-hop network
CN111935732A (en) * 2020-09-09 2020-11-13 南京嘉环科技股份有限公司 Method, device, computer system and server for identifying network coverage structure holes
CN111935732B (en) * 2020-09-09 2020-12-22 南京嘉环科技股份有限公司 Method, device, computer system and server for identifying network coverage structure holes
CN113746681A (en) * 2021-09-06 2021-12-03 中国联合网络通信集团有限公司 Detection method, device and equipment for perception hole and storage medium
CN113746681B (en) * 2021-09-06 2023-06-16 中国联合网络通信集团有限公司 Method, device, equipment and storage medium for detecting perception holes

Similar Documents

Publication Publication Date Title
CN108174403A (en) A kind of k- covering hole detection methods of wireless sensor network
Beghdad et al. Boundary and holes recognition in wireless sensor networks
Shang et al. Localization from mere connectivity
Kuo et al. An intelligent positioning approach: RSSI-based indoor and outdoor localization scheme in Zigbee networks
Chang et al. An obstacle-free and power-efficient deployment algorithm for wireless sensor networks
Chen et al. Securing DV-Hop localization against wormhole attacks in wireless sensor networks
JP5756529B2 (en) Method and apparatus for mobile device location determination
JP5973967B2 (en) User apparatus, base station, discovery signal reception method, and discovery signal transmission method
WO2004092925A3 (en) Method and system for detecting characteristics of a wireless network
EP1976227A3 (en) Method and system for monitoring a selected region of an airspace associated with local area networks of computing devices
CN103458478B (en) Based on source hiding method and the system in dynamic forgery source
Yao et al. Distributed wireless sensor network localization based on weighted search
CN103401922A (en) Distributed positioning device and method based on game method in wireless sensor network
CN103607770B (en) High precision distance estimation in a kind of wireless sensor network location
CN101483935B (en) Topology drawing algorithm for wireless Ad-Hoc network
KR20060092703A (en) Method for forming power efficient network
Sivakumar et al. Error minimization in localization of wireless sensor networks using fish swarm optimization algorithm
Sitanayah et al. Heuristic algorithm for finding boundary cycles in location-free low density wireless sensor networks
CN105162539A (en) Cognitive wireless sensor network spectrum detection method based on node information
Hsieh et al. Hole detection and boundary recognition in wireless sensor networks
CN105050099A (en) Method for identifying boundary nodes in distributed wireless sensor network
Patil et al. Localization in wireless sensor networks using three masters
AbdelSalam et al. A 3d-localization and terrain modeling technique for wireless sensor networks
CN103796237B (en) A kind of method for quick of sensor network uncovered area
CN105472630B (en) The wireless sensor network fringe node recognition methods differentiated based on triangle

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180615

RJ01 Rejection of invention patent application after publication