CN109257834B - Networking method of mesh wireless sensor network based on Thread protocol - Google Patents

Networking method of mesh wireless sensor network based on Thread protocol Download PDF

Info

Publication number
CN109257834B
CN109257834B CN201811083250.0A CN201811083250A CN109257834B CN 109257834 B CN109257834 B CN 109257834B CN 201811083250 A CN201811083250 A CN 201811083250A CN 109257834 B CN109257834 B CN 109257834B
Authority
CN
China
Prior art keywords
node
routing
network
nodes
wireless sensor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811083250.0A
Other languages
Chinese (zh)
Other versions
CN109257834A (en
Inventor
何友全
单耀星
蔡朝曦
许焕彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Tewo Energy Management Co ltd
Original Assignee
Guangzhou Tewo Energy Management Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Tewo Energy Management Co ltd filed Critical Guangzhou Tewo Energy Management Co ltd
Priority to CN201811083250.0A priority Critical patent/CN109257834B/en
Publication of CN109257834A publication Critical patent/CN109257834A/en
Application granted granted Critical
Publication of CN109257834B publication Critical patent/CN109257834B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • H04W40/04Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a networking method of a mesh wireless sensor network based on a Thread protocol, which comprises the following steps: creating a mesh wireless sensor network, wherein the mesh wireless sensor network comprises routing nodes, border routers and terminal nodes; the boundary router sends an authentication request to the server, the authentication request requires the server to respond and return user information and verification information, and the boundary router sends the information to all the routing nodes in the network after receiving the return information; and when the network access request exists, the verification route is compared according to the verification information and the network access request information sent by the node to be accessed, and when the comparison is passed, the node to be accessed is allowed to be added into the mesh wireless sensor network. The invention enables the new network access node to be directly authenticated by the connected network routing node when the new network access node is connected with any network routing node by sending the verification information to each network routing node, thereby reducing the waiting time of network access authentication.

Description

Networking method of mesh wireless sensor network based on Thread protocol
Technical Field
The invention relates to the technical field of wireless networking, in particular to a networking method of a mesh wireless sensor network based on a Thread protocol.
Background
An existing wireless sensor network is generally networked through a Zigbee protocol, the Zigbee protocol is a short-distance and low-power consumption mesh network communication protocol taking IEEE802.15.4 as a standard, specifications of a network layer and an application layer are defined, and the wireless sensor network is widely applied to the fields of industry, commercial lighting and smart home. However, the Zigbee protocol does not define a network layer, and an application layer protocol thereof is confused, that is, protocol standards used by various manufacturers are not necessarily consistent, so that products cannot be used commonly before manufacturers, and thus the use of the Zigbee protocol is limited.
In the wireless mesh sensor network under the Zigbee technology, verification of a new access node in a networking process is quite complex, and it is necessary to send an access request sent by the new access node to a management node through a corresponding routing node, and then the management node performs unified verification, so that the verification mode is complex and the waiting time is long.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention aims to provide a networking method of a mesh wireless sensor network based on a Thread protocol, which directly verifies a new network access node and any network routing node connected by the new network access node when the new network access node is connected with the network routing node by sending verification information to each network routing node, thereby saving verification time and being fast and convenient.
In order to achieve the purpose, the invention provides the following technical scheme:
a networking method of a mesh wireless sensor network based on a Thread protocol comprises the following steps:
the method comprises the steps that a mesh wireless sensor network is established, the mesh wireless sensor network comprises routing nodes, boundary routers and terminal nodes, the routing nodes form a mesh structure, any one or more routing nodes are communicated with a server at the cloud end through the boundary routers, the terminal nodes are connected to the corresponding routing nodes, the terminal nodes, the routing nodes and the boundary routers are communicated through wireless links, and the routing nodes connected to the mesh wireless sensor network are called network routing nodes;
the boundary router sends an authentication request to the server, the authentication request requires the server to respond and return user information and verification information, and the boundary router directly or indirectly sends the information to all network routing nodes after receiving the return information;
when a network access request exists, the node sending the network access request is called a node to be accessed to the network, the node receiving the network access request in the network is called a verification route, the verification route is compared according to user information, verification information and network access request information sent by the node to be accessed to the network, and when the comparison is passed, the node to be accessed to the network is allowed to be accessed to the mesh wireless sensor network.
Preferably, the node to be networked is a routing node or a terminal node.
Preferably, when the node to be networked sends a network access request, detecting the signal strength, the routing depth and the number of connected nodes of each network routing node, and selecting one of the network routing nodes as a verification route according to one or more of the signal strength, the routing depth and the number of connected nodes, where the routing depth is the minimum number of hops when each network routing node is connected with a border router, and the number of connected nodes is the number of terminal nodes already connected to each routing node.
Preferably, the comparing the verification route according to the user information, the verification information and the network access request information sent by the node to be accessed to the network includes:
receiving network access request information sent by a network access node by a verification route, wherein the network access request information comprises a node name and an authentication code;
verifying routing traversal user information, searching user information corresponding to the node name, and if the user information is not searched, not allowing the network access node to join the mesh wireless sensor network;
if the node name is found, the found user information corresponding to the node name is called target user information, verification information corresponding to the target user information is obtained from verification information, and the verification information corresponding to the target user information is called target verification information;
and the verification route decodes the authentication code, compares the decoded authentication code with target verification information, allows the access node to join the mesh wireless sensor network if the authentication code and the target verification information are consistent, and does not allow the access node to join the mesh wireless sensor network if the authentication code and the target verification information are inconsistent.
Preferably, each of the network routing nodes creates and maintains (i.e., periodically updates) a neighbor table that records the neighbor of each of the network routing nodes at the network routing node (single-hop routing) or/and the border router.
Preferably, when the network routing node sends data to the server or other network routing nodes, the network routing node which sends the data is defined as an initial node, and the server or other network routing nodes which receive the data is defined as a termination node, then:
the starting node sends a routing path request to a network protocol stack, and the network protocol stack generates all feasible routing paths from the starting node to the terminating node according to a neighbor table;
acquiring the total number of each feasible routing path passing through the network routing node, and selecting the feasible routing path with the minimum total number of the feasible routing paths passing through the network routing node as a target routing path;
if the total number of the feasible routing paths passing through the network routing nodes is the minimum, defining the feasible routing paths as initial target routing paths, calculating the sum of the signal intensity of each initial target routing path, and taking the initial target routing path with the maximum sum of the signal intensity as a target routing path;
and transmitting the data sent by the starting node to the terminating node through the target routing path.
Preferably, when the end node sends data to the server or other nodes in the network, the routing node connected to the end node sending the data is defined as the starting node, and the server or other nodes in the network receiving the data is defined as the terminating node, then:
the starting node sends a routing path request to a network protocol stack, and the network protocol stack generates all feasible routing paths from the starting node to the terminating node according to a neighbor table;
acquiring the total number of each feasible routing path passing through the network routing node, and selecting the feasible routing path with the minimum total number of the feasible routing paths passing through the network routing node as a target routing path;
if the total number of the feasible routing paths passing through the network routing nodes is the minimum, defining the feasible routing paths as initial target routing paths, calculating the sum of the signal intensity of each initial target routing path, and taking the initial target routing path with the maximum sum of the signal intensity as a target routing path;
and transmitting the data sent by the terminal node to the terminating node through the target routing path via the starting node.
Preferably, before the calculating the sum of the signal strengths of each initial target routing path, the method further includes:
and when the signal intensity between any two adjacent network routing nodes in the initial target routing path is smaller than a set threshold value, filtering the initial target routing path.
Compared with the prior art, the networking method of the mesh wireless sensor network based on the Thread protocol has the advantages that:
1. the invention enables the new network access node to be directly verified by the connected network routing node when the new network access node is connected with any network routing node by sending the verification information to each network routing node, thereby saving the verification time and being fast and convenient.
2. Each network routing node only stores and maintains a neighbor table which is in link connection with other network routing nodes and the boundary router, and the resource waste of maintaining the dynamic routing table of the whole mesh wireless sensor network is saved.
Drawings
FIG. 1 is a flow chart of the networking method of the mesh wireless sensor network based on Thread protocol according to the present invention;
FIG. 2 is a block diagram of the networking of the mesh wireless sensor network based on the Thread protocol according to the present invention;
fig. 3 is a diagram of the data transmission architecture of the mesh wireless sensor network based on the Thread protocol according to the present invention.
Detailed Description
The present invention will be further described with reference to the accompanying drawings and the detailed description, and it should be noted that any combination of the embodiments or technical features described below can be used to form a new embodiment without conflict.
Referring to fig. 1, a networking method of a mesh wireless sensor network based on Thread protocol includes the following steps:
110. the method includes the steps of creating a mesh wireless sensor network, wherein a structural diagram of the created mesh wireless sensor network is shown in fig. 2, and the created mesh wireless sensor network includes routing nodes, boundary routers and terminal nodes, the routing nodes form a mesh structure, any one or more routing nodes communicate with a server in a cloud through the boundary routers, the terminal nodes are connected to the corresponding routing nodes, the terminal nodes, the routing nodes and the boundary routers communicate with one another through wireless links of a Thread protocol, and the boundary routers are used for forwarding data of the Thread wireless network constructed by the routing nodes, the boundary routers and the terminal nodes to the server or forwarding ethernet data packets transmitted by the server to the Thread wireless network. A Thread wireless network in which a terminal node has no relaying and networking functions and can only be connected to one of the routing nodes for receiving and transmitting data belongs to a mesh network. For ease of description, a routing node that has been connected to the mesh wireless sensor network is referred to herein as a network routing node.
120. The boundary router sends an authentication request to the server, the authentication request requires the server to respond and return user information and verification information, and the boundary router directly or indirectly sends the information to all the routing nodes in the network after receiving the return information.
The authentication information is stored in a server (generally, a cloud server) by a manager in advance, all nodes (routing nodes or terminal nodes) associated with a target mesh wireless sensor network (i.e., a mesh wireless sensor network that needs to authenticate a new access node) are stored, and if there is a newly purchased node to be accessed or an unused node is eliminated, the manager needs to log in the server to perform setting (to add the authentication information or delete the authentication information). The user information is the user information of each node associated with the target mesh wireless sensor network, each user information corresponds to one piece of verification information, and certainly, verification in other aspects can be set according to needs.
Because the content of the verification information has certain variability, the boundary router is required to send a verification information request to the server at regular time, then the boundary router directly or indirectly sends the received verification information to all the routing nodes in the network, the direct sending indicates that the boundary router is in wireless link connection with the routing nodes in the network, and the indirect sending is carried out by forwarding through other routing nodes in the network. Authentication information received later at a network routing node need only be updated (added or subtracted) based on previously received authentication information.
130. When a network access request exists, the node sending the network access request is called a node to be accessed to the network, the node receiving the network access request in the network is called a verification route, the verification route is compared according to user information, verification information and network access request information sent by the node to be accessed to the network, and when the comparison is passed, the node to be accessed to the network is allowed to be accessed to the mesh wireless sensor network.
The nodes to be accessed to the network are routing nodes or terminal nodes, when the nodes to be accessed to the network send out a network access request, the signal intensity, the routing depth and the number of connected nodes of each routing node in the network are detected, one of the routing nodes in the network is selected as a verification route according to one or more of the signal intensity, the routing depth and the number of the connected nodes, the routing depth is the minimum number of hops (once per routing node in the network), when each routing node is connected with a boundary router, the number of the connected nodes is the number of terminal nodes which are already connected to each routing node.
If the signal strength (marked as X) is selected, detecting the signal strength between each network routing node and the node to be accessed to the network, and selecting the network routing node with the maximum signal strength as a verification route; if the routing depth is selected (noted as Y), the routing depth of each routing node in the network is detected, and the smallest routing depth is selected as the verification route, if the number of the connected nodes is selected, the number of the terminal nodes connected with each routing node in the network is detected (noted as Z), and the smallest number of the connected terminal nodes is selected as the verification route.
Since there is no connection signal between the verification route selected by the route depth and the number of connected nodes and the node to be accessed, in a preferred embodiment of the present invention, the signal strength is selected to be combined with one or two of the other two to preferentially select the verification route, taking the case that the three select the verification route together, a weight is set for each parameter, and the weight is set according to the specific selection requirement, generally, the weight of the signal strength is larger, that is, a relational expression T ═ max (aXi + bYi + cZi), Xi, Yi, Zi are respectively the signal strength (signal strength between the signal strength and the node to be accessed) corresponding to the ith network routing node, the route depth and the number of connected nodes, a, b, c are respectively the weights of the signal strength, the route depth and the number of connected nodes, and T is the verification route.
The verification route compares the user information with the verification information and the network access request information sent by the node to be accessed, and the verification route specifically comprises the following steps:
A. receiving network access request information sent by a network access node by a verification route, wherein the network access request information comprises a node name and an authentication code;
B. verifying routing traversal user information, searching user information corresponding to the node name, if not, not allowing the network access node to join the mesh wireless sensor network, and finishing verification;
C. if the node name is found, the found user information corresponding to the node name is called target user information, verification information corresponding to the target user information is obtained from verification information, and the verification information corresponding to the target user information is called target verification information;
D. and the verification route decodes the authentication code, compares the decoded authentication code with target verification information, allows the access node to join the mesh wireless sensor network if the authentication code and the target verification information are consistent, and does not allow the access node to join the mesh wireless sensor network if the authentication code and the target verification information are inconsistent.
The node name is defined by user information of the node, and can be a MAC address of the corresponding node or unique identification information of other corresponding nodes, which is used to distinguish the node from other nodes, and the node name is used to perform early-stage screening, and then verified by an authentication code. The authentication code of the network access request information is sent to the verification route after being encrypted, so that the encryption mode is set to prevent other nodes from achieving the network access purpose through a tampering mode, and certainly, the verification route needs to be decrypted by a key of the encryption mode.
The networking of the mesh wireless sensor network is completed through the process.
For data transmission in the mesh wireless sensor network, it can be realized by dynamic routing tables, i.e. each routing node in the network maintains a complete dynamic routing table, such as the one described in fig. 3, which refers to A, B, C, D, E five routing nodes in the network, if the a node needs to maintain its routing path with the D node, it needs to maintain a-C-D, A-C-B-D, A-C-B-E-D, A-B-D, A-B-E-D and a-E-D, etc., if the routing path maintenance is performed in this way, it needs to consume a large amount of storage space to store this routing table, if the a node maintains the routing path of the a-D only, and also maintains the routing tables with other nodes, if the mesh wireless sensor network reaches a certain size, with more nodes routed in the network, this approach may lead to the breakdown of the mesh wireless sensor network.
Therefore, in the preferred embodiment of the present invention, data transmission in the mesh wireless sensor network is also optimized, specifically: each network routing node creates and maintains (i.e., periodically updates) a neighbor table, which records the relationships between the neighbor routing node (single-hop routing) and/or the border router of the network routing node and other network routing nodes or/and border routers, i.e., each neighbor table records the relationships between each network routing node and other network routing nodes or/and border routers, which form a direct wireless link with the network routing node, taking node a of fig. 3 as an example, it only needs to maintain three relationship tables, namely a-B, A-C and a-E, to form the neighbor table.
When the network routing node sends data to the server or other network routing nodes, the network routing node which sends the data is defined as an initial node, the server or other network routing nodes which receives the data is defined as a termination node, and then the process of sending the data is as follows:
1. the starting node sends a routing path request to a network protocol stack, and the network protocol stack generates all feasible routing paths from the starting node to the terminating node according to a neighbor table; because the network protocol stack is aware of the neighbor table of each routing node in the network, all feasible routing paths are easily available, including a-C-D, A-C-B-D, A-C-B-E-D, A-B-D, A-B-E-D and a-E-D, for example, the routing path of the node a with the node D is maintained.
2. Acquiring the total number of each feasible routing path passing through the network routing node, and selecting the feasible routing path with the minimum total number of the feasible routing paths passing through the network routing node as a target routing path;
3. if the feasible routing paths with the minimum total number of the routing nodes in the network are multiple (A-C-D, A-B-D and A-E-D), defining the feasible routing paths as initial target routing paths, calculating the sum of the signal strengths of each initial target routing path (the sum of the signal strengths of the three initial target routing paths of A-C-D, A-B-D and A-E-D is 34, 40 and 35 respectively), and taking the initial target routing path with the maximum sum of the signal strengths as a target routing path (namely A-B-D).
4. And transmitting the data sent by the starting node to the terminating node through the target routing path.
The feasible routing paths may be exhaustive, and the above process may obtain the final target routing path, but in order to further shorten the process of obtaining the target routing path, the following may be adopted:
firstly, a network protocol stack generates a feasible routing path from a starting node to a terminating node according to a neighbor table, then the number of network routing nodes passed by the feasible routing path is calculated, the feasible routing path generated later only needs to be compared with the number of network routing nodes passed by the previous feasible routing path, a feasible routing path with the minimum number is reserved after comparison (if the feasible routing paths are equal, the feasible routing paths are reserved), and then the feasible routing paths are compared with the feasible routing paths generated later to obtain an initial target routing path, and finally whether the signal intensity sum needs to be calculated is judged according to the initial target routing path to obtain the target routing path.
For the case that the end node sends data, when the end node sends data to the server or other nodes in the network, the routing node connected with the end node sending data is defined as the starting node, and the server or other nodes in the network receiving data is defined as the terminating node, then: the starting node sends a routing path request to a network protocol stack, and the network protocol stack generates all feasible routing paths from the starting node to the terminating node according to a neighbor table; acquiring the total number of each feasible routing path passing through the network routing node, and selecting the feasible routing path with the minimum total number of the feasible routing paths passing through the network routing node as a target routing path; if the total number of the feasible routing paths passing through the network routing nodes is the minimum, defining the feasible routing paths as initial target routing paths, calculating the sum of the signal intensity of each initial target routing path, and taking the initial target routing path with the maximum sum of the signal intensity as a target routing path; and transmitting the data sent by the terminal node to the terminating node through the target routing path via the starting node.
The method for sending data from the network routing node or the server to the terminal node is similar to the above, that is, the network routing node or the server for sending data is used as the starting node, the network routing node for receiving data is used as the terminating node for communication through the wireless link, the target routing path is obtained, and the data is sent.
With respect to the data transfer aspect, the following aspects need to be noted: 1. because the network routing node or the border router may continuously enter the network or leave the network, the neighbor table of each network routing node needs to traverse the mesh wireless sensor network for updating in a preset period (10min, 20min, 1h and the like); 2. if the signal strength between any two adjacent network routing nodes in the initial target routing path is less than the set threshold, the initial target routing path is filtered (for example, if the threshold of the signal strength between two adjacent network routing nodes is set to 15 in fig. 3, the initial target routing path a-C-D is filtered). The reason for this is to prevent interruption or loss of data transmission between nodes whose signal strength is too weak.
In order to prevent network storm, in the preferred embodiment of the present invention, in the process of determining the target routing path, the data sender carries the source address information (i.e. the sender's address) and the target address (i.e. the receiver's address), makes the routing path request, then every time the router passes through a routing node in the network or a boundary router, whether the router contains the address of the node is detected, if not, the corresponding address information is added, these address information together form a routing path request packet, if containing the self node address, the routing path request packet is not forwarded any more, the terminating node or the parent of the terminating node receives the routing path request packets of a plurality of different paths at the network routing node, and then, selecting a routing path request packet of a path preferentially according to the selection mode of the sum of the node number and the signal strength, wherein the address and the path in the routing path request packet are the final target routing path.
The above embodiments are only preferred embodiments of the present invention, and the protection scope of the present invention is not limited thereby, and any insubstantial changes and substitutions made by those skilled in the art based on the present invention are within the protection scope of the present invention.

Claims (7)

1. A networking method of a mesh wireless sensor network based on a Thread protocol is characterized by comprising the following steps:
creating a mesh wireless sensor network, wherein the mesh wireless sensor network comprises routing nodes, boundary routers and terminal nodes, the routing nodes form a mesh structure, any one or more routing nodes are communicated with a server at the cloud end through the boundary routers, the terminal nodes are connected to the corresponding routing nodes, the terminal nodes, the routing nodes and the boundary routers are communicated through wireless links, and the routing nodes connected to the mesh wireless sensor network are called network routing nodes;
the boundary router sends an authentication request to the server, the authentication request requires the server to respond and return user information and verification information, and the boundary router directly or indirectly sends the information to all network routing nodes after receiving the return information;
when a network access request exists, a node sending the network access request is called a node to be accessed to the network, a network routing node receiving the network access request is called a verification route, the verification route is compared according to user information, verification information and network access request information sent by the node to be accessed to the network, and when the comparison is passed, the node to be accessed to the network is allowed to be accessed to the mesh wireless sensor network;
the verification route is compared according to the user information, the verification information and the network access request information sent by the node to be accessed, and the method comprises the following steps:
receiving network access request information sent by a network access node by a verification route, wherein the network access request information comprises a node name and an authentication code;
verifying routing traversal user information, searching user information corresponding to the node name, and if the user information is not searched, not allowing the network access node to join the mesh wireless sensor network;
if the node name is found, the found user information corresponding to the node name is called target user information, verification information corresponding to the target user information is obtained from verification information, and the verification information corresponding to the target user information is called target verification information;
and the verification route decodes the authentication code, compares the decoded authentication code with target verification information, allows the access node to join the mesh wireless sensor network if the authentication code and the target verification information are consistent, and does not allow the access node to join the mesh wireless sensor network if the authentication code and the target verification information are inconsistent.
2. The networking method of the mesh wireless sensor network based on the Thread protocol according to claim 1, wherein: and the node to be accessed to the network is a routing node or a terminal node.
3. The networking method of the mesh wireless sensor network based on the Thread protocol according to claim 1, wherein: when the node to be accessed to the network sends out a network access request, detecting the signal intensity, the routing depth and the number of connected nodes of each network routing node, and selecting one of the network routing nodes as a verification route according to one or more of the signal intensity, the routing depth and the number of the connected nodes, wherein the routing depth is the minimum number of times of jumping when each network routing node is connected with a boundary router, and the number of the connected nodes is the number of terminal nodes which are connected with each routing node.
4. The networking method of the mesh wireless sensor network based on the Thread protocol according to claim 1, wherein: each of the network routing nodes creates and maintains a neighbor table that records the neighbor of each of the network routing nodes at the network routing node and/or at the border router.
5. The networking method of the mesh wireless sensor network based on the Thread protocol according to claim 4, wherein: when the network routing node sends data to the server or other network routing nodes, the network routing node which sends the data is defined as an initial node, the server or other network routing nodes which receives the data is defined as a termination node, then:
the starting node sends a routing path request to a network protocol stack, and the network protocol stack generates all feasible routing paths from the starting node to the terminating node according to a neighbor table;
acquiring the total number of each feasible routing path passing through the network routing node, and selecting the feasible routing path with the minimum total number of the feasible routing paths passing through the network routing node as a target routing path;
if the total number of the feasible routing paths passing through the network routing nodes is the minimum, defining the feasible routing paths as initial target routing paths, calculating the sum of the signal intensity of each initial target routing path, and taking the initial target routing path with the maximum sum of the signal intensity as a target routing path;
and transmitting the data sent by the starting node to the terminating node through the target routing path.
6. The networking method of the mesh wireless sensor network based on the Thread protocol according to claim 4, wherein: when the terminal node sends data to the server or other nodes in the network, defining the routing node connected with the terminal node sending data as an initial node, and defining the server or other nodes in the network receiving data as a termination node, then:
the starting node sends a routing path request to a network protocol stack, and the network protocol stack generates all feasible routing paths from the starting node to the terminating node according to a neighbor table;
acquiring the total number of each feasible routing path passing through the network routing node, and selecting the feasible routing path with the minimum total number of the feasible routing paths passing through the network routing node as a target routing path;
if the total number of the feasible routing paths passing through the network routing nodes is the minimum, defining the feasible routing paths as initial target routing paths, calculating the sum of the signal intensity of each initial target routing path, and taking the initial target routing path with the maximum sum of the signal intensity as a target routing path;
and transmitting the data sent by the terminal node to the terminating node through the target routing path via the starting node.
7. The networking method of the mesh wireless sensor network based on the Thread protocol according to claim 5 or 6, wherein: before the calculating the sum of the signal strengths of each initial target routing path, the method further includes:
and when the signal intensity between any two adjacent network routing nodes in the initial target routing path is smaller than a set threshold value, filtering the initial target routing path.
CN201811083250.0A 2018-09-17 2018-09-17 Networking method of mesh wireless sensor network based on Thread protocol Active CN109257834B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811083250.0A CN109257834B (en) 2018-09-17 2018-09-17 Networking method of mesh wireless sensor network based on Thread protocol

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811083250.0A CN109257834B (en) 2018-09-17 2018-09-17 Networking method of mesh wireless sensor network based on Thread protocol

Publications (2)

Publication Number Publication Date
CN109257834A CN109257834A (en) 2019-01-22
CN109257834B true CN109257834B (en) 2021-08-20

Family

ID=65047695

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811083250.0A Active CN109257834B (en) 2018-09-17 2018-09-17 Networking method of mesh wireless sensor network based on Thread protocol

Country Status (1)

Country Link
CN (1) CN109257834B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112312425B (en) * 2019-07-31 2022-11-08 杭州九阳小家电有限公司 Internet access method and device for household electrical appliance
CN112738215B (en) * 2020-12-28 2023-03-24 杭州趣链科技有限公司 Block chain node authorization method, block chain node authorization device, terminal equipment and medium
CN112954716B (en) * 2021-02-26 2024-05-17 上海汉枫电子科技有限公司 Network access method, device, computer equipment and storage medium of mesh network
CN113315698B (en) * 2021-05-25 2022-07-05 中国电子科技集团公司第二十九研究所 Task-based sensor networking message routing method
CN116156501B (en) * 2023-04-19 2023-06-27 深圳市华曦达科技股份有限公司 Wireless grid network networking method, device and system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102045833B (en) * 2011-01-07 2013-05-15 桂林电子科技大学 Communication synchronization method among wireless transceivers in wireless sensor network (WSN)
CN107426728B (en) * 2013-12-31 2020-05-12 安科讯(福建)科技有限公司 High-performance access authentication processing method, system, controller equipment and networking device
US10958531B2 (en) * 2015-12-16 2021-03-23 International Business Machines Corporation On-demand remote predictive monitoring for industrial equipment analysis and cost forecast
CN107885593B (en) * 2016-09-30 2021-07-06 中国电信股份有限公司 User authentication method and device
CN107632594B (en) * 2017-11-06 2024-02-06 苏州科技大学 Electrical appliance centralized control system and control method based on wireless network

Also Published As

Publication number Publication date
CN109257834A (en) 2019-01-22

Similar Documents

Publication Publication Date Title
CN109257834B (en) Networking method of mesh wireless sensor network based on Thread protocol
Soua et al. Wave: a distributed scheduling algorithm for convergecast in IEEE 802.15. 4e TSCH networks
CN110830575B (en) Data transmission method and control system of intelligent household equipment and intelligent gateway equipment
US7978698B2 (en) Terminal for performing multiple access transmission suitable to a transmission path having varied characteristics
WO2022037322A1 (en) Network topology management system and method for home networking
KR101828412B1 (en) Communication method, communication apparatus and communication system
US10057130B2 (en) D2HCP protocol in ad hoc networks: merging of sub-networks and address conflict resolution
CN100514958C (en) Control method for service sensing and its system
CN103713608A (en) Hierarchical network architecture of wireless Internet-of-Things home system and networking communication method thereof
JP2005528852A (en) Message routing within a wireless network
US8937879B2 (en) System and method for changing network topology based on energy consumption
US20070066308A1 (en) Method and apparatus for removing phantom children in an ad-hoc communication system
US8340116B2 (en) Node scheduling and address assignment within an ad-hoc communication system
CN111711941B (en) Data transmission method, related equipment and device
US8526430B2 (en) Multi-hop communication method based on distributed medium access control
CN109474970A (en) A kind of method for routing suitable for cordless communication network
JP5720617B2 (en) Management apparatus and communication system
CN105744593A (en) Node networking method and device
CN102143164A (en) Message relaying method, message relaying device and base station
US10447497B2 (en) Lighting network
CN108810881B (en) Network distribution method, equipment and system
WO2018045949A1 (en) Message transmission method, device and network system
CN108989173B (en) Message transmission method and device
US20090157878A1 (en) Method and system for connecting lower nodes to one another to increase scalability in zigbee network
Zibakalam A New TDMA Scheduling Algorithm for Data Collection over Tree‐Based Routing in Wireless Sensor Networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant