CN110113807B - Node dormancy scheduling method based on data similarity in wireless sensor network - Google Patents

Node dormancy scheduling method based on data similarity in wireless sensor network Download PDF

Info

Publication number
CN110113807B
CN110113807B CN201910366343.2A CN201910366343A CN110113807B CN 110113807 B CN110113807 B CN 110113807B CN 201910366343 A CN201910366343 A CN 201910366343A CN 110113807 B CN110113807 B CN 110113807B
Authority
CN
China
Prior art keywords
node
nodes
redundant
dormant
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910366343.2A
Other languages
Chinese (zh)
Other versions
CN110113807A (en
Inventor
任秀丽
李伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Benxi Steel Group Information Automation Co ltd
Dragon Totem Technology Hefei Co ltd
Original Assignee
Liaoning University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Liaoning University filed Critical Liaoning University
Priority to CN201910366343.2A priority Critical patent/CN110113807B/en
Publication of CN110113807A publication Critical patent/CN110113807A/en
Application granted granted Critical
Publication of CN110113807B publication Critical patent/CN110113807B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • H04W40/04Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • H04W40/04Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources
    • H04W40/10Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources based on available power or energy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0203Power saving arrangements in the radio access network or backbone network of wireless communication networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention relates to a data similarity-based dormant node scheduling method for a wireless sensor network, which is used for solving the problems of high redundancy of sensing data and unbalanced network energy in the wireless sensor network and adopts a proposed fuzzy clustering-based dormant node screening method. Firstly, a base station constructs a fuzzy equivalent matrix according to sensing data acquired by member nodes in a cluster in different sub-periods; then, carrying out clustering analysis on the node neighbor table and a similarity threshold value to obtain redundant nodes; and finally, screening out the dormant nodes under the condition of avoiding a perception blind area by adopting the proposed dormant node selection method aiming at the clustering condition of the redundant nodes. Compared with the prior art, the simulation is carried out under the OMNeT + + platform, the service life of the network is prolonged, and the data accuracy is improved. Simulation results show that the method can effectively balance network energy consumption and greatly prolong the life cycle of the network.

Description

Node dormancy scheduling method based on data similarity in wireless sensor network
Technical Field
The invention relates to a node dormancy scheduling method (N3SDS) based on data similarity in a wireless sensor network, belonging to the technical field of wireless sensor networks.
Background
Wireless Sensor Networks (WSNs) consist of a large number of low-cost miniature sensors and are used to monitor environmental factors such as temperature, sound, pressure, etc. in an area of interest. The sensors utilize limited battery power for context sensing, data processing, and wireless communication. They collect the sensing data, process it locally and transmit it to the Base Station (BS). The intelligent household intelligent monitoring system has the characteristics of miniaturization, low cost and low energy consumption, and is widely applied to the fields of medical monitoring, battlefield monitoring, target tracking, intelligent home furnishing and the like.
And the GSSC enables only one node which senses the same information in a small range to be in an active state and other nodes to be in a sleep state according to the geographical position information of the nodes. However, GPS for providing location information is difficult to deploy on sensor nodes due to limitations in processing power and RAM.
The SSTBC divides a monitoring area into grids, maintains the energy of the whole network by sleeping unnecessary nodes, and establishes a minimum spanning tree with a cluster head as a root so as to reduce the energy consumption of long-distance transmission. However, the protocol does not consider the problem of network coverage, and only takes the node residual energy as a basis for screening the sleeping nodes, which may cause the generation of a perception blind area.
The ESSM divides a plurality of clusters according to the optimal competition radius, and then constructs a fuzzy matrix according to the data collected by the member nodes to measure the similarity, so that the redundant nodes are selected for sleep scheduling. From the perspective of data, a deviation may exist in a judgment standard which only uses one-time measurement data as a redundant node, and meanwhile, the similarity between non-neighbor nodes has no practical significance, so that a large number of nodes can enter a sleep state at the same time, and a perception blind area is caused.
Disclosure of Invention
In order to solve the technical problem, the invention provides a node dormancy scheduling method based on data similarity in a wireless sensor network. The method utilizes a similarity function to obtain the similarity of the perception data of all the active nodes in the cluster, and carries out cluster analysis on neighbor nodes with high similarity to obtain redundant nodes. And then, screening out the dormant nodes under the condition of avoiding the perception blind area. Meanwhile, a node dormancy scheduling method is provided, so that the collection of redundant data is greatly reduced, and the network energy consumption is balanced.
In order to achieve the purpose, the invention adopts the technical method that: a node dormancy scheduling method based on data similarity in a wireless sensor network is characterized in that: the method comprises the following steps:
step 1: after network clustering is completed, sensor nodes periodically acquire sensing data; one cycle of collection is a cycle, and each cycle is divided into two task stages: a collection phase and a scheduling phase;
step 2: a collection stage: the active sensor nodes in the cluster periodically collect sensing data, after each period is finished, the nodes transmit sensing data information and a neighbor table to a cluster head together, and the cluster head transmits the data to the BS after aggregating the data;
and step 3: scheduling stageSection (2): the BS constructs a fuzzy matrix according to the perception data in different sub-periods, then carries out cluster analysis by utilizing a similarity threshold and a node neighbor table to obtain a redundant node set of each sub-period and records the redundant node set as each sub-period
Figure DEST_PATH_IMAGE001
And 4, step 4: obtaining a final redundant node set according to the redundant node set combination set obtained in the step 3 and recording the final redundant node set as a final redundant node set
Figure 566832DEST_PATH_IMAGE002
Figure 482835DEST_PATH_IMAGE001
Taking the neighbor condition of the node as a merging standard during merging;
and 5: to is directed at
Figure DEST_PATH_IMAGE003
Screening out the dormant nodes by adopting a corresponding dormant node selection method under the clustering condition;
step 6: and after the sleeping node is selected, the BS broadcasts the relevant information to carry out sleeping scheduling.
The specific method of the collection stage in the step 2 is as follows:
a collection stage: dividing each period into 3 sub-periods, wherein each sub-period comprises data collection and data transmission, and the stage is carried out in clusters and among clusters; after the active sensor nodes in each sub-period cluster acquire sensing data, a data matrix is formed, and the sensing data and the node neighbor table are sent to the cluster head together; and after all the sub-periods are finished, the cluster head aggregates the information and sends the information to the BS in a single-hop or multi-hop mode.
The specific process of the scheduling stage and the cluster analysis in the step 3 is as follows:
3.1) scheduling phase: the method comprises the steps of node clustering analysis, dormant node selection and dormant node scheduling, wherein the step is carried out at a BS; the BS constructs a corresponding fuzzy equivalent matrix according to the perception matrix of each sub-period to perform cluster analysis, and each sub-period obtains a group of redundant node sets; then, determining a final redundant node through the 3 groups of redundant nodes, and finally screening out dormant nodes according to a dormant node selection method to perform dormant scheduling;
3.2) sensor nodeiIn the first placepThe perception data matrix formed after the end of the sub-period is recorded as
Figure 360924DEST_PATH_IMAGE004
Then it is firstpThe matrix formed by the perception data collected by the active nodes in the cluster in the sub-period is recorded as
Figure DEST_PATH_IMAGE005
Expressed as follows:
Figure DEST_PATH_IMAGE007
wherein:mfor the number of active sensors in a cluster,krepresenting a sub-periodkThe number of sensory data collected by the sensors within a time slot;
3.3) according to the fuzzy clustering analysis theory, the sensor node can be knowniAnd sensor nodejThe similarity between the perception data is calculated by formula (1):
Figure DEST_PATH_IMAGE009
(1)
wherein:x ih representing sensor nodesiIn the first placehThe data collected for each of the time slots is,
Figure DEST_PATH_IMAGE011
representing nodesiMean of data of
Figure DEST_PATH_IMAGE013
;
Fuzzy similarity matrix
Figure DEST_PATH_IMAGE015
Expressed as follows:
Figure DEST_PATH_IMAGE017
3.4) further extending the fuzzy similar matrix into a fuzzy equivalent matrix: from fuzzy similarity matricesRStarting, sequentially squaring:
Figure DEST_PATH_IMAGE019
when equation (2) occurs for the first time:
Figure DEST_PATH_IMAGE021
(2)
thenR k The solved fuzzy equivalent matrix; fuzzy similarity matrixSCalculating to obtain fuzzy equivalent matrix according to the formulaE(S) Expressed as follows:
Figure DEST_PATH_IMAGE023
clustering principle: given a similarity threshold by a particular network environment
Figure DEST_PATH_IMAGE025
If the similarity between the sensing data of any two adjacent nodes is greater than
Figure 70866DEST_PATH_IMAGE025
Then a set of redundant nodes is obtained
Figure DEST_PATH_IMAGE027
And the redundant nodes are grouped into one type;
according to the clustering principle, the node clustering can be divided into two types: a base class and an extension class; the extension class may extend to different representations having the same clustering characteristics.
3.4) the basic classes and diffusion classes are specifically:
3.4.1) base classes: redundant node
Figure 325392DEST_PATH_IMAGE028
The redundant nodes are grouped into one type, namely all the redundant nodes are neighbors;
3.4.2) extension class:
3.4.2.1) order
Figure DEST_PATH_IMAGE029
AAll the nodes in the network are adjacent to each other,Ball nodes in the network are adjacent nodes;Anode in andBthe node in (1) is not a neighbor node but has a common node; clustering the nodes respectively to obtain a redundant node set
Figure 768006DEST_PATH_IMAGE030
Such clustering can be extended to a variety of situations, and the common features of such clustering are: the common redundant nodes are contained by different sets;
3.4.2.2) order
Figure DEST_PATH_IMAGE031
Respectively clustering the nodes to obtain a redundant node set
Figure DEST_PATH_IMAGE032
Such clustering can be extended to a variety of situations, and the common features of such clustering are: all nodes in the common class are respectively contained by different sets;
3.4.2.3) order
Figure 49952DEST_PATH_IMAGE033
Respectively clustering the nodes to obtain a redundant node set
Figure 905912DEST_PATH_IMAGE032
Such clustering can be extended to a variety of situations, and the common features of such clustering are: some of the nodes in the common class are each contained by a different set.
The method for selecting the dormant node in the step 5 specifically comprises the following steps:
5.1) base class 3.4.1) sleep node selection method
Suppose that each sub-period sensor node sends to the cluster head in each roundlBit data, known from an energy decay model, of the sensor nodeiNumber of wheels capable of workingR i Comprises the following steps:
Figure 515795DEST_PATH_IMAGE035
wherein:
Figure DEST_PATH_IMAGE036
is the initial energy of the node and is,
Figure 547337DEST_PATH_IMAGE037
in order to obtain the radio frequency energy consumption coefficient,
Figure DEST_PATH_IMAGE038
is the energy consumption coefficient of the amplifier under the free space model,
Figure 531342DEST_PATH_IMAGE039
the distance from the node to the cluster head; then it is firstrTime of the turn, nodeiIn the first placepRemaining energy required to maintain an active state for a sub-period
Figure DEST_PATH_IMAGE040
Comprises the following steps:
Figure DEST_PATH_IMAGE042
wherein:ris the current number of working rounds of the active node,
Figure 766276DEST_PATH_IMAGE043
the current number of working rounds of the dormant node,pis the first in the wheelpA sub-period; first, thepAverage residual energy of sub-periodic redundant nodes
Figure 408610DEST_PATH_IMAGE045
Comprises the following steps:
Figure 888133DEST_PATH_IMAGE047
wherein:kthe number of redundant nodes in the current cluster is obtained; when the current residual energy of the redundant node is lower than the average residual energy, namely:
Figure 839778DEST_PATH_IMAGE049
selecting the redundant node as a dormant node; wherein:
Figure 404751DEST_PATH_IMAGE051
residual energy for redundant nodes;
5.2) selection method of dormant node in extension type 3.4.2.1)
Separately computing collectionsA, BAverage residual energy of medium redundant node
Figure 585197DEST_PATH_IMAGE053
(ii) a For redundant nodeiAnd if and only if
Figure 919226DEST_PATH_IMAGE055
Time, nodeiAs a sleeping node, in addition to the above, the nodeiNot as a sleeping node; respectively take
Figure 477990DEST_PATH_IMAGE057
The corresponding redundant node in the node is taken as a dormant node;
Figure DEST_PATH_IMAGE058
representation collectionAOther nodes than the common node; when more than one public redundant node is needed, judging whether each node is taken as a dormant node or not;
5.3) selection method of dormant node in extension type 3.4.2.2)
Respectively calculate
Figure 999101DEST_PATH_IMAGE059
(ii) a Respectively take
Figure 232505DEST_PATH_IMAGE061
The corresponding redundant node in the node is taken as a dormant node;
5.4) selection method of dormant node in extension type 3.4.2.3)
Respectively calculate
Figure 686620DEST_PATH_IMAGE063
(ii) a For redundant nodeiAnd if and only if
Figure 465221DEST_PATH_IMAGE065
Time, nodeiMust be taken as a sleeping node, except for the above cases
Figure DEST_PATH_IMAGE066
Not as a sleeping node; judging redundant nodes by adopting the methodjWhether to act as a sleeping node; respectively take
Figure DEST_PATH_IMAGE068
Figure DEST_PATH_IMAGE070
The corresponding redundant node in (b) acts as a sleeping node.
The sleep scheduling described in step 6 is specifically implemented as follows:
6.1): when the network is initialized, each sensor node maintains a round counter Count, and the initial value is 0; adding 1 to the Count value every time data collection is carried out;
6.2): the sensor node collects sensing data through the collection method in the step 2, and finally sends the sensing information and neighbor table information to the cluster head together;
6.3): the cluster head selects a dormant node through the clustering analysis and the dormant node screening method provided in the step 3-5, and finally, the BS broadcasts the ID number of the dormant node;
6.4): after receiving the message, the node performs the following two checks:
6.4.1) judging whether the node is a dormant node, if so, entering a dormant state. The node in the dormancy is awakened after the preset dormancy time and enters the active state again;
6.4.2) judging whether the dormant node is a neighbor node thereof, if so, modifying the node Mode value in the neighbor table to S;
6.5) after one round, the cluster head checks whether the current residual energy is lower than a threshold value, if so, the clustering algorithm is executed again; otherwise, continuing the next round of data collection. Repeat execution 6.2) until the network lifecycle is over.
The beneficial effects created by the invention are as follows: aiming at the problems of high redundancy of sensing data and unbalanced network energy in a wireless sensor network, the invention provides a node dormancy scheduling method based on data similarity. The method utilizes a similarity function to obtain the similarity of the perception data of all the active nodes in the cluster, and carries out cluster analysis on neighbor nodes with high similarity to obtain redundant nodes. And then, screening out the dormant nodes under the condition of avoiding the perception blind area. By scheduling the sleeping nodes, the collection of redundant data is greatly reduced. Simulation results show that the method can effectively balance network energy consumption and greatly prolong the life cycle of the network.
Drawings
Fig. 1 is a schematic diagram of network task allocation.
FIGS. 2a-2i are node cluster diagrams.
Fig. 3 is a comparison graph of the survival rate of nodes in the dormancy method.
Fig. 4 is a comparison of the network power consumption of the sleep method.
FIG. 5 is a comparison of data accuracy for the sleep method.
FIG. 6 is a flow chart of the method of the present invention.
Detailed Description
Step 1: after network clustering is completed, sensor nodes periodically acquire sensing data; one cycle of collection is a cycle, and each cycle is divided into two task stages: a collection phase and a scheduling phase.
Step 2: a collection stage: the active sensor nodes in the cluster periodically collect sensing data, after each period is finished, the nodes send sensing data information and the neighbor table to the cluster head together, and the cluster head aggregates the data and sends the aggregated data to the BS.
The specific method comprises the following steps: dividing each period into 3 sub-periods, wherein each sub-period comprises data collection and data transmission, and the stage is carried out in clusters and among clusters; after the active sensor nodes in each sub-period cluster acquire sensing data, a data matrix is formed, and the sensing data and the node neighbor table are sent to the cluster head together; and after all the sub-periods are finished, the cluster head aggregates the information and sends the information to the BS in a single-hop or multi-hop mode.
And step 3: and a scheduling stage: the BS constructs a fuzzy matrix according to the perception data in different sub-periods, then carries out cluster analysis by utilizing a similarity threshold and a node neighbor table to obtain a redundant node set of each sub-period and records the redundant node set as each sub-period
Figure 365306DEST_PATH_IMAGE071
The scheduling stage and the cluster analysis specifically comprise the following processes:
3.1) scheduling phase: the method comprises the steps of node clustering analysis, dormant node selection and dormant node scheduling, wherein the step is carried out at a BS; the BS constructs a corresponding fuzzy equivalent matrix according to the perception matrix of each sub-period to perform cluster analysis, and each sub-period obtains a group of redundant node sets; and then determining a final redundant node through the 3 groups of redundant nodes, and finally screening out the dormant nodes according to a dormant node selection method to perform dormant scheduling.
3.2) sensor nodeiIn the first placepThe perception data matrix formed after the end of the sub-period is recorded as
Figure DEST_PATH_IMAGE072
Then it is firstpThe matrix formed by the perception data collected by the active nodes in the cluster in the sub-period is recorded as
Figure 871242DEST_PATH_IMAGE073
Expressed as follows:
Figure 179864DEST_PATH_IMAGE007
wherein:mfor the number of active sensors in a cluster,krepresenting a sub-periodkThe number of sensory data collected by the sensors within a time slot;
3.3) according to the fuzzy clustering analysis theory, the sensor node can be knowniAnd sensor nodejThe similarity between the perception data is calculated by formula (1):
Figure 80430DEST_PATH_IMAGE009
(1)
wherein:x ih representing sensor nodesiIn the first placehThe data collected for each of the time slots is,
Figure 841713DEST_PATH_IMAGE011
representing nodesiMean of data of
Figure 433231DEST_PATH_IMAGE013
Fuzzy similarity matrix
Figure 596359DEST_PATH_IMAGE015
Expressed as follows:
Figure 966030DEST_PATH_IMAGE017
3.4) further extending the fuzzy similar matrix into a fuzzy equivalent matrix: from fuzzy similarity matricesRStarting, sequentially squaring:
Figure 480188DEST_PATH_IMAGE019
when equation (2) occurs for the first time:
Figure 547501DEST_PATH_IMAGE075
(2)
thenR k The solved fuzzy equivalent matrix; fuzzy similarity matrixSCalculating to obtain fuzzy equivalent matrix according to the formulaE(S) Expressed as follows:
Figure 315868DEST_PATH_IMAGE023
clustering principle: given a similarity threshold by a particular network environment
Figure 138330DEST_PATH_IMAGE025
If the similarity between the sensing data of any two adjacent nodes is greater than
Figure 874205DEST_PATH_IMAGE025
Then a set of redundant nodes is obtained
Figure 541947DEST_PATH_IMAGE027
And the redundant nodes are grouped into one type;
according to the clustering principle, the node clustering can be divided into two types: a base class and an extension class; the extension class may extend to different representations having the same clustering characteristics.
The basic class and the diffusion class are specifically as follows:
3.4.1) base classes: redundant node
Figure 866618DEST_PATH_IMAGE028
The redundant nodes are grouped into one type, namely all the redundant nodes are neighbors;
3.4.2) extension class:
3.4.2.1) order
Figure 594402DEST_PATH_IMAGE029
AAll the nodes in the network are adjacent to each other,Ball nodes in the network are adjacent nodes;Anode in andBthe node in (B) is not a neighbor node butThere is a common node; clustering the nodes respectively to obtain a redundant node set
Figure 817573DEST_PATH_IMAGE030
Such clustering can be extended to a variety of situations, and the common features of such clustering are: the common redundant nodes are contained by different sets;
3.4.2.2) order
Figure 771230DEST_PATH_IMAGE031
Respectively clustering the nodes to obtain a redundant node set
Figure 29036DEST_PATH_IMAGE032
Such clustering can be extended to a variety of situations, and the common features of such clustering are: all nodes in the common class are respectively contained by different sets;
3.4.2.3) order
Figure 927721DEST_PATH_IMAGE033
Respectively clustering the nodes to obtain a redundant node set
Figure 372609DEST_PATH_IMAGE032
Such clustering can be extended to a variety of situations, and the common features of such clustering are: some of the nodes in the common class are each contained by a different set.
And 4, step 4: obtaining a final redundant node set according to the redundant node set combination set obtained in the step 3 and recording the final redundant node set as a final redundant node set
Figure DEST_PATH_IMAGE076
Figure 303525DEST_PATH_IMAGE071
And taking the neighbor condition of the node as a merging standard during merging.
And 5: to is directed at
Figure 681417DEST_PATH_IMAGE077
And (4) screening out the dormant nodes by adopting a corresponding dormant node selection method under the clustering condition.
The method for selecting the dormant node specifically comprises the following processes:
5.1) base class 3.4.1) sleep node selection method
Suppose that each sub-period sensor node sends to the cluster head in each roundlBit data, known from an energy decay model, of the sensor nodeiNumber of wheels capable of workingR i Comprises the following steps:
Figure 236157DEST_PATH_IMAGE035
wherein:
Figure 433920DEST_PATH_IMAGE036
is the initial energy of the node and is,
Figure 184839DEST_PATH_IMAGE037
in order to obtain the radio frequency energy consumption coefficient,
Figure 400925DEST_PATH_IMAGE038
is the energy consumption coefficient of the amplifier under the free space model,
Figure 375834DEST_PATH_IMAGE039
the distance from the node to the cluster head; then it is firstrTime of the turn, nodeiIn the first placepRemaining energy required to maintain an active state for a sub-period
Figure 326473DEST_PATH_IMAGE040
Comprises the following steps:
Figure 677820DEST_PATH_IMAGE042
wherein:ris the current number of working rounds of the active node,
Figure 450210DEST_PATH_IMAGE043
the current number of working rounds of the dormant node,pis the first in the wheelpA sub-period; first, thepAverage residual energy of sub-periodic redundant nodes
Figure 861600DEST_PATH_IMAGE045
Comprises the following steps:
Figure 768376DEST_PATH_IMAGE047
wherein:kthe number of redundant nodes in the current cluster is obtained; when the current residual energy of the redundant node is lower than the average residual energy, namely:
Figure 172682DEST_PATH_IMAGE049
selecting the redundant node as a dormant node; wherein:
Figure 114093DEST_PATH_IMAGE051
residual energy for redundant nodes;
5.2) selection method of dormant node in extension type 3.4.2.1)
Separately computing collectionsA, BAverage residual energy of medium redundant node
Figure 634067DEST_PATH_IMAGE059
(ii) a For redundant nodeiAnd if and only if
Figure DEST_PATH_IMAGE078
Time, nodeiAs a sleeping node, in addition to the above, the nodeiNot as a sleeping node; respectively take
Figure DEST_PATH_IMAGE079
The corresponding redundant node in the node is taken as a dormant node;
Figure 982134DEST_PATH_IMAGE058
representation collectionAMiddle-removing public sectionOther nodes outside the point; when more than one public redundant node is needed, judging whether each node is taken as a dormant node or not;
5.3) selection method of dormant node in extension type 3.4.2.2)
Respectively calculate
Figure 675283DEST_PATH_IMAGE059
(ii) a Respectively take
Figure 923731DEST_PATH_IMAGE061
The corresponding redundant node in the node is taken as a dormant node;
5.4) selection method of dormant node in extension type 3.4.2.3)
Respectively calculate
Figure 676923DEST_PATH_IMAGE063
(ii) a For redundant nodeiAnd if and only if
Figure 509357DEST_PATH_IMAGE080
Time, nodeiMust be taken as a sleeping node, except for the above cases
Figure 943880DEST_PATH_IMAGE066
Not as a sleeping node; judging redundant nodes by adopting the methodjWhether to act as a sleeping node; respectively take
Figure DEST_PATH_IMAGE081
Figure 46834DEST_PATH_IMAGE082
The corresponding redundant node in (b) acts as a sleeping node.
Step 6: and after the sleeping node is selected, the BS broadcasts the relevant information to carry out sleeping scheduling.
The sleep scheduling is specifically implemented as follows:
6.1): when the network is initialized, each sensor node maintains a round counter Count, and the initial value is 0; adding 1 to the Count value every time data collection is carried out;
6.2): the sensor node collects sensing data through the collection method in the step 2, and finally sends the sensing information and neighbor table information to the cluster head together;
6.3): and (5) selecting the dormant nodes by the cluster heads through the cluster analysis and the dormant node screening method provided in the step 3-5. Finally, the BS broadcasts the ID number of the sleeping node;
6.4): after receiving the message, the node performs the following two checks:
6.4.1) judging whether the node is a dormant node, if so, entering a dormant state. The node in the dormancy is awakened after the preset dormancy time and enters the active state again;
6.4.2) judging whether the dormant node is a neighbor node thereof, if so, modifying the node Mode value in the neighbor table to S;
6.5) after one round, the cluster head checks whether the current residual energy is lower than a threshold value, if so, the clustering algorithm is executed again; otherwise, continuing the next round of data collection; repeat execution 6.2) until the network lifecycle is over.
Example 1:
the detailed description of the system model, the clustering protocol, the dormancy scheduling, the specific application process and the verification process based on the protocol is as follows:
network model
The method is suitable for wireless sensor network application of periodically collecting data. The sensor nodes in the network model are randomly deployed in a monitoring area, and the density of the network nodes is large enough to cover the whole area. The sensor node properties are as follows:
1) the sensor nodes are static nodes, and the positions of the sensor nodes cannot be changed once the sensor nodes are deployed. But its topology may change due to node energy exhaustion or node failure, among other reasons.
2) All sensor nodes are of the same type, namely, the sensor nodes have the same initial energy and communication radiusRAnd radius of perceptionr s And has certain computing power. Each node has a unique ID.
3) A node may perceive all nodes within its communication radius that are in an active state.
4) The communication power of the node is adjustable, and the transmitting power can be adjusted according to the distance.
5) The sensor node calculates the distance from the sensor node to the adjacent node by an RSSI ranging method.
6) The collision problem is not considered in the data transmission process among the nodes.
Energy consumption model
The same wireless communication energy consumption model as the LEACH protocol is employed herein. Sensor node transmissionlThe distance between two nodes is d, and the transmission energy consumption formula is as follows:
Figure 49557DEST_PATH_IMAGE084
whereinE elec In order to obtain the radio frequency energy consumption coefficient,
Figure DEST_PATH_IMAGE085
and
Figure 621483DEST_PATH_IMAGE086
the amplifier energy consumption coefficients under a free space model and a multipath fading model respectively,
Figure DEST_PATH_IMAGE087
depending on the particular network environment and the amplifier power consumption coefficient,
Figure DEST_PATH_IMAGE089
. ReceivinglThe energy consumption formula of the bit data is as follows:
Figure 545184DEST_PATH_IMAGE091
in addition to transmitting and receiving data, the cluster head also aggregates data from active sensor nodes in the cluster. The formula for calculating the energy consumption is as follows:
Figure 564961DEST_PATH_IMAGE093
EDA is a data fusion coefficient, and n is the number of active nodes in the cluster.
Clustering protocol
The network is clustered using Distributed heterogeneous Clustering-routing protocol (DEBUC). DEBUC adopts a cluster head competition algorithm based on time, and the broadcasting time depends on the residual energy of a candidate cluster head and the residual energy of a neighbor node. Meanwhile, the cluster size close to the base station is smaller by controlling the competition range of the candidate cluster heads at different positions. In this way, the energy consumption of intra-cluster and inter-cluster communication between nodes at different positions in the network can be mutually compensated.
Cluster analysis and redundant node selection
Sensor nodeiIn the first placepThe perception data matrix formed after the end of the sub-period is recorded as
Figure 863218DEST_PATH_IMAGE072
Then it is firstpThe matrix formed by the perception data collected by the active nodes in the cluster in the sub-period is recorded as
Figure 984758DEST_PATH_IMAGE073
Expressed as follows:
Figure 308554DEST_PATH_IMAGE007
whereinmFor the number of active sensors in a cluster,krepresenting a sub-periodkThe amount of sensory data collected by the sensor during a time slot.
Definition 1 similarity: and measuring the similarity degree between the sensor nodes sensing data. The values are between [0,1], 0 represents that the perception data are completely different, and 1 represents that the perception data are completely the same. The closer the value is to 1, the higher the degree of similarity and vice versa.
According to the fuzzy clustering analysis theory, the sensor nodeiAnd sensor nodejThe similarity between the perception data is calculated by formula (1):
Figure DEST_PATH_IMAGE095
whereinx ih Representing sensor nodesiIn the first placehThe data collected for each of the time slots is,
Figure 605675DEST_PATH_IMAGE011
representing nodesiThe mean value of the data of (a),
Figure 120839DEST_PATH_IMAGE013
fuzzy similarity matrix
Figure 667358DEST_PATH_IMAGE015
Expressed as follows:
Figure DEST_PATH_IMAGE097
to facilitate cluster analysis, the fuzzy similarity matrix is further extended to a fuzzy equivalence matrix. From fuzzy similarity matricesRStarting, sequentially squaring:
Figure DEST_PATH_IMAGE099
when equation (2) occurs for the first time:
Figure DEST_PATH_IMAGE101
thenR k Is the fuzzy equivalence matrix that is being sought. Calculating the fuzzy equivalent matrix by the formula (2) and the formula (3)E(S) Expressed as follows:
Figure DEST_PATH_IMAGE103
define 2 neighbor table: storingA data structure in a sensor node, the structure of which is shown in table 1. Wherein each row records information of one neighbor node of the node. The ID in each row represents the unique identification of the neighbor node;
Figure DEST_PATH_IMAGE105
representing the remaining energy of the node; distance represents the Distance of a node to its neighbor; mode represents the node state: w denotes an active state and S denotes a sleep state. The node neighbor table is shown in table 1.
Table 1 node neighbor table
Figure DEST_PATH_IMAGE107A
Defining 3 redundant nodes: and the data similarity is larger than a given similarity threshold and the nodes are adjacent to each other.
Clustering principle: given a similarity threshold by a particular network environment
Figure 745910DEST_PATH_IMAGE108
If the similarity between the sensing data of any two adjacent nodes is greater than
Figure 225433DEST_PATH_IMAGE108
Then a set of redundant nodes is obtained
Figure DEST_PATH_IMAGE109
And the redundant nodes are grouped into one type.
According to the clustering principle, the node clustering can be divided into two types: a base class and an extension class. The extension class may extend to different representations having the same clustering characteristics. Node clustering is shown in FIGS. 2a-2i
(1) Basic classes
Redundant node
Figure 380339DEST_PATH_IMAGE028
The clustering is a kind, i.e. all redundant nodes are neighbors of each other, as shown in fig. 2 a.
(2) Extension class
1) Order to
Figure 210892DEST_PATH_IMAGE029
AAll the nodes in the network are adjacent to each other,Ball nodes in the network are adjacent nodes.ANode in andBthe node in (1) is not a neighbor node but there is a common node. Clustering the nodes respectively to obtain a redundant node set
Figure 329021DEST_PATH_IMAGE030
As shown in fig. 2 b.
Such clustering can be extended to a variety of cases, as shown in fig. 2c and 2 d. Common features of such clustering are: the common redundant nodes are contained by different sets.
2) Order to
Figure 699870DEST_PATH_IMAGE031
Respectively clustering the nodes to obtain a redundant node set
Figure 307568DEST_PATH_IMAGE032
As shown in fig. 2 e.
Such clustering can be extended to a variety of cases, as shown in fig. 2f and 2 g. Common features of such clustering are: all nodes in a common class are each contained by a different set.
3) Order to
Figure 625417DEST_PATH_IMAGE033
Respectively clustering the nodes to obtain a redundant node set
Figure 343975DEST_PATH_IMAGE032
As shown in fig. 2 h.
Such clustering can be extended to a variety of cases, as shown in FIG. 2 i. Common features of such clustering are: some of the nodes in the common class are each contained by a different set.
Dormant node selection
(1) Method for selecting dormant nodes in basic class
Assuming that each sub-period sensor section of each roundPoint to cluster head transmissionlBit data, known from an energy decay model, of the sensor nodeiNumber of wheels capable of workingR i Comprises the following steps:
Figure DEST_PATH_IMAGE111
wherein:
Figure 516199DEST_PATH_IMAGE036
is the initial energy of the node and is,
Figure 498061DEST_PATH_IMAGE037
in order to obtain the radio frequency energy consumption coefficient,
Figure 788359DEST_PATH_IMAGE038
is the energy consumption coefficient of the amplifier under the free space model,
Figure 310608DEST_PATH_IMAGE039
is the distance of the node to the cluster head. Then it is firstrTime of the turn, nodeiIn the first placepRemaining energy required to maintain an active state for a sub-period
Figure 884808DEST_PATH_IMAGE040
Comprises the following steps:
Figure DEST_PATH_IMAGE112
whereinrIs the current number of working rounds of the active node,
Figure 552419DEST_PATH_IMAGE043
the current number of working rounds of the dormant nodes.pIs the first in the wheelpAnd (4) a sub-period. First, thepAverage residual energy of sub-periodic redundant nodes
Figure DEST_PATH_IMAGE113
Comprises the following steps:
Figure DEST_PATH_IMAGE114
whereinkIs the number of redundant nodes in the current cluster. When the current residual energy of the redundant node is lower than the average residual energy, namely:
Figure DEST_PATH_IMAGE115
the redundant node is selected as the sleeping node. Wherein
Figure DEST_PATH_IMAGE116
The remaining energy of the redundant node.
(2) Selection method of dormant node in extension class 1)
In FIG. 2b, the sets are computed separatelyA, BAverage residual energy of medium redundant node
Figure DEST_PATH_IMAGE118
. For redundant nodeiAnd if and only if
Figure DEST_PATH_IMAGE120
Time, nodeiMust be taken as a sleeping node, except for the above casesiNot necessarily as a sleeping node. Respectively take
Figure DEST_PATH_IMAGE121
The corresponding redundant node in (2) is taken as a dormant node.
Figure 264767DEST_PATH_IMAGE058
Representation collectionAOther than the common node. When there is more than one common redundant node, each node needs to be judged whether to be used as a dormant node. It is noted that the independent consideration of whether the common node is a sleeping node is to prevent the occurrence of a blind sensing zone.
(3) Selection method of dormant node in extension class 2)
In FIG. 2e, calculate separately
Figure 590706DEST_PATH_IMAGE118
. Respectively take
Figure DEST_PATH_IMAGE123
The corresponding redundant node in (2) is taken as a dormant node.
(4) Selection method of dormant node in extension class 3)
In FIG. 2h, calculate separately
Figure 973408DEST_PATH_IMAGE125
. For redundant nodeiAnd if and only if
Figure 359390DEST_PATH_IMAGE127
Time, nodeiMust be taken as a sleeping node, except for the above cases
Figure 873548DEST_PATH_IMAGE066
The node does not need to be used as a dormant node, and redundant nodes can be judged in the same wayjWhether to act as a sleeping node. Respectively take
Figure 986866DEST_PATH_IMAGE129
Figure DEST_PATH_IMAGE130
The corresponding redundant node in (b) acts as a sleeping node.
Dormancy scheduling method
In the method, node scheduling is performed according to a round, and only node scheduling in one round is described here. It is assumed that all nodes are active when the network is initially running. The specific process is as follows:
step 1: when the network is initialized, each sensor node maintains a round counter Count, and the initial value is 0. Each time data collection is performed, the Count value is increased by 1.
Step 2: after the member nodes in each sub-period cluster of each round acquire the sensing data, the sensing information and the neighbor table information are sent to the cluster head together.
And step 3: and after receiving the data of all the sub-periods, the cluster head aggregates the data and sends the data to the BS. And the BS constructs a fuzzy matrix according to the sensing data of each sub-period, and selects the sleep nodes according to the clustering analysis and sleep node screening methods provided in sections 4 and 5. Finally, the BS broadcasts the sleeping node ID number.
And 4, step 4: after receiving the message, the node performs the following two checks:
1) and judging whether the node is a dormant node or not, and if so, entering a dormant state. And awakening the node in the sleep state after the preset sleep time, and re-entering the active state.
2) And judging whether the dormant node is a neighbor node of the dormant node, and if so, modifying the Mode value of the node in the neighbor table to S.
And 5: after one round, the cluster head checks whether the current residual energy is lower than a threshold value, and if so, the clustering algorithm is executed again. Otherwise, continuing the next round of data collection. Repeat execution 6.2) until the network lifecycle is over.
Simulation experiment
To evaluate the performance of the dormancy method proposed herein, simulation experiments were performed in an OMNET environment, comparing the N3SDS method with SSTBC, ESSM. The parameter settings of the simulation environment are shown in table 2. Comparisons are made primarily from three aspects: 1) The survival rate of the nodes; 2) Network energy consumption; 3) The accuracy of the data.
Table 2 parameter settings for simulation environment
Parameter name Parameter value Parameter name Parameter value
Simulation area 200m×200m
Figure DEST_PATH_IMAGE132
0.013pJ/bit/m4
Number of nodes 400 are E DA 5nJ/bit
E init 0.5J Period of time 10 s
E elec 50nJ/bit Data packet 4000 bits
Figure DEST_PATH_IMAGE134
100pJ/bit/m2 Radius of communicationR 50m
(1) Node survival rate
The survival rate of the nodes in the network reflects the consumption condition of the energy of the nodes in the network, and is one of the standards for evaluating the energy efficiency of the network.
Fig. 3 is a graph showing the comparison of the survival rates of the nodes in the three dormancy methods, wherein the number of failed nodes in the network is gradually increased and the number of available nodes is gradually decreased as the number of running rounds is increased. As can be seen from fig. 3, the network lifetime of N3SDS is extended by 28.2% and 72.4% compared to ESSM and SSTBC, respectively. At round 450, the first node begins to fail. This is because the N3SDS performs fuzzy clustering analysis on the sensing data of each sub-period, respectively, thereby selecting three sets of redundant node sets. When the final redundant node is determined, a merging standard is adopted, more redundant nodes can be selected as dormant nodes, the candidate number of the dormant nodes is increased, the network energy can be balanced more effectively, and the survival time of the corresponding nodes is longer.
Network energy consumption
(2) Network energy consumption
Network energy consumption refers to the energy consumed by all nodes in the network in each round.
Fig. 4 shows a comparison of network power consumption for three sleep methods. As can be seen from fig. 4, compared with ESSM and SSTBC, the energy consumption of the N3SDS network changes more slowly, and the total energy consumption of nodes is lower under the same round number. This is because the N3SDS calculates theoretical residual energy values for an active node and a dormant node among the redundant nodes, respectively, when selecting the dormant node, and then compares with the redundant node by using their average residual energy as a threshold, and all nodes below the threshold are dormant. Therefore, the selection of the dormant nodes is more reasonable, and more nodes enter the dormant state under the condition of ensuring the data accuracy. Therefore, the N3SDS can balance the network energy more effectively and reduce the network energy consumption.
(3) Data accuracy
The data accuracy refers to the proximity between the fused data received by the BS and the data actually acquired by the sensor node.
FIG. 5 is a graph showing a comparison of data accuracy for three sleep methods. It can be seen from fig. 5 that as the number of sensors increases, the data accuracy continues to improve. And exhibit a tendency to fluctuate as the data accuracy rises to a certain value. Data accuracy of N3SDS was improved by 5.4% and 18.1% compared to ESSM and SSTBC, respectively. And the total variation trend of the data accuracy of the N3SDS is more stable when the number of the nodes is between 200 and 350. This is because as the number of sensor nodes increases, the monitoring area is fully covered by the nodes. The N3SDS starts from data, selects redundant nodes based on the similarity of the data, and screens dormant nodes under the condition of avoiding a perception blind area, so that the residual active nodes can sufficiently realize the data collection of the same level, the reliability of the data is ensured, and the corresponding data is higher in accuracy and more stable.
Aiming at the problems of high redundancy of sensing data and unbalanced network energy in a wireless sensor network, a node dormancy scheduling method (N3SDS) based on data similarity is provided. The method utilizes a similarity function to obtain the similarity of the perception data of all the active nodes in the cluster, and carries out cluster analysis on neighbor nodes with high similarity to obtain redundant nodes. And then, screening out the dormant nodes under the condition of avoiding the perception blind area. By scheduling the sleeping nodes, the collection of redundant data is greatly reduced. Simulation results show that the N3SDS can effectively balance network energy consumption and greatly prolong the life cycle of the network.

Claims (6)

1. A node dormancy scheduling method based on data similarity in a wireless sensor network is characterized in that: the method comprises the following steps:
step 1: after network clustering is completed, sensor nodes periodically acquire sensing data; one cycle of collection is a cycle, and each cycle is divided into two task stages: a collection phase and a scheduling phase;
step 2: a collection stage: the active sensor nodes in the cluster periodically collect sensing data, after each period is finished, the nodes transmit sensing data information and a neighbor table to a cluster head together, and the cluster head transmits the data to the BS after aggregating the data;
and step 3: and a scheduling stage: the BS constructs a fuzzy matrix according to the perception data in different sub-periods, then carries out cluster analysis by utilizing a similarity threshold and a node neighbor table to obtain a redundant node set of each sub-period and records the redundant node set as each sub-period
Figure 60693DEST_PATH_IMAGE001
And 4, step 4: obtaining a final redundant node set according to the redundant node set combination set obtained in the step 3 and recording the final redundant node set as a final redundant node set
Figure 711992DEST_PATH_IMAGE002
Figure 535591DEST_PATH_IMAGE001
Taking the neighbor condition of the node as a merging standard during merging;
and 5: to is directed at
Figure 799213DEST_PATH_IMAGE003
Screening out the dormant nodes by adopting a corresponding dormant node selection method under the clustering condition;
step 6: and after the sleeping node is selected, the BS broadcasts the relevant information to carry out sleeping scheduling.
2. The method for scheduling node dormancy based on data similarity in a wireless sensor network according to claim 1, characterized in that: the specific method of the collection stage in the step 2 is as follows:
a collection stage: dividing each period into 3 sub-periods, wherein each sub-period comprises data collection and data transmission, and the stage is carried out in clusters and among clusters; after the active sensor nodes in each sub-period cluster acquire sensing data, a data matrix is formed, and the sensing data and the node neighbor table are sent to the cluster head together; and after all the sub-periods are finished, the cluster head aggregates the information and sends the information to the BS in a single-hop or multi-hop mode.
3. The method for scheduling node dormancy based on data similarity in a wireless sensor network according to claim 1, characterized in that: the specific method for the scheduling stage and the cluster analysis in the step 3 comprises the following steps:
3.1) scheduling phase: the method comprises the steps of node clustering analysis, dormant node selection and dormant node scheduling, wherein the step is carried out at a BS; the BS constructs a corresponding fuzzy equivalent matrix according to the perception matrix of each sub-period to perform cluster analysis, and each sub-period obtains a group of redundant node sets; then, determining a final redundant node through the 3 groups of redundant nodes, and finally screening out dormant nodes according to a dormant node selection method to perform dormant scheduling;
3.2) sensor nodeiIn the first placepThe perception data matrix formed after the end of the sub-period is recorded as
Figure 24658DEST_PATH_IMAGE004
Then it is firstpThe matrix formed by the perception data collected by the active nodes in the cluster in the sub-period is recorded as
Figure 82744DEST_PATH_IMAGE005
Expressed as follows:
Figure 659219DEST_PATH_IMAGE006
wherein:mfor the number of active sensors in a cluster,krepresenting a sub-periodkThe number of sensory data collected by the sensors within a time slot;
3.3) according to the fuzzy clustering analysis theory, the sensor node can be knowniAnd sensor nodejThe similarity between the perception data is calculated by formula (1):
Figure 460953DEST_PATH_IMAGE007
(1)
wherein:x ih representing sensor nodesiIn the first placehThe data collected for each of the time slots is,
Figure 540904DEST_PATH_IMAGE008
representing nodesiThe mean value of the data of (a),
Figure 534006DEST_PATH_IMAGE009
fuzzy similarity matrix
Figure 332198DEST_PATH_IMAGE010
Expressed as follows:
Figure 937623DEST_PATH_IMAGE011
3.4) further extending the fuzzy similar matrix into a fuzzy equivalent matrix: from fuzzy similarity matricesRStarting, sequentially squaring:
Figure 872081DEST_PATH_IMAGE012
when equation (2) occurs for the first time:
Figure 537548DEST_PATH_IMAGE013
(2)
thenR k The solved fuzzy equivalent matrix; fuzzy similarity matrixSCalculating to obtain fuzzy equivalent matrix according to the formulaE(S) Expressed as follows:
Figure 823036DEST_PATH_IMAGE014
clustering principle: given a similarity threshold by a particular network environment
Figure 966573DEST_PATH_IMAGE015
If the similarity between the sensing data of any two adjacent nodes is greater than
Figure 286695DEST_PATH_IMAGE015
Then a set of redundant nodes is obtained
Figure 887179DEST_PATH_IMAGE016
And the redundant nodes are grouped into one type;
according to the clustering principle, the node clustering can be divided into two types: a base class and an extension class; the extension class may extend to different representations having the same clustering characteristics.
4. The method for scheduling node dormancy based on data similarity in a wireless sensor network according to claim 3, characterized in that: 3.4) the basic classes and diffusion classes are specifically:
3.4.1) base classes: redundant node
Figure 269750DEST_PATH_IMAGE017
The redundant nodes are grouped into one type, namely all the redundant nodes are neighbors;
3.4.2) extension class:
3.4.2.1) order
Figure 607190DEST_PATH_IMAGE018
AAll the nodes in the network are adjacent to each other,Ball nodes in the network are adjacent nodes;Anode in andBthe node in (1) is not a neighbor node but has a common node; clustering the nodes respectively to obtain a redundant node set
Figure 657186DEST_PATH_IMAGE019
Such clustering can be extended to a variety of situations, and the common features of such clustering are: the common redundant nodes are contained by different sets;
3.4.2.2) order
Figure 523511DEST_PATH_IMAGE020
Respectively clustering the nodes to obtain a redundant node set
Figure 658957DEST_PATH_IMAGE021
Such clustering can be extended to a variety of situations, and the common features of such clustering are: all nodes in the common class are respectively contained by different sets;
3.4.2.3) order
Figure 268930DEST_PATH_IMAGE022
Respectively clustering the nodes to obtain a redundant node set
Figure 937546DEST_PATH_IMAGE021
Such clustering can be extended to a variety of situations, and the common features of such clustering are: some of the nodes in the common class are each contained by a different set.
5. The method for scheduling node dormancy based on data similarity in a wireless sensor network according to claim 4, characterized in that: the method for selecting the dormant node in the step 5 specifically comprises the following steps:
5.1) base class 3.4.1) sleep node selection method
Suppose that each sub-period sensor node sends to the cluster head in each roundlBit data, known from an energy decay model, of the sensor nodeiNumber of wheels capable of workingR i Comprises the following steps:
Figure 850139DEST_PATH_IMAGE023
wherein:
Figure 597515DEST_PATH_IMAGE024
is the initial energy of the node and is,
Figure 886545DEST_PATH_IMAGE025
in order to obtain the radio frequency energy consumption coefficient,
Figure 770187DEST_PATH_IMAGE026
is the energy consumption coefficient of the amplifier under the free space model,
Figure 384839DEST_PATH_IMAGE027
the distance from the node to the cluster head; then it is firstrTime of the turn, nodeiIn the first placepRemaining energy required to maintain an active state for a sub-period
Figure 353932DEST_PATH_IMAGE028
Comprises the following steps:
Figure 679609DEST_PATH_IMAGE029
wherein:ris the current number of working rounds of the active node,
Figure 683337DEST_PATH_IMAGE030
the current number of working rounds of the dormant node,pis the first in the wheelpA sub-period; first, thepAverage residual energy of sub-periodic redundant nodes
Figure 937732DEST_PATH_IMAGE031
Comprises the following steps:
Figure 394121DEST_PATH_IMAGE032
wherein:kthe number of redundant nodes in the current cluster is obtained; when the current residual energy of the redundant node is lower than the average residual energy, namely:
Figure 24954DEST_PATH_IMAGE033
selecting the redundant node as a dormant node; wherein:
Figure DEST_PATH_IMAGE034
residual energy for redundant nodes;
5.2) selection method of dormant node in extension type 3.4.2.1)
Separately computing collectionsA, BAverage residual energy of medium redundant node
Figure 289713DEST_PATH_IMAGE035
(ii) a For redundant nodeiAnd if and only if
Figure 105222DEST_PATH_IMAGE036
Time, nodeiAs a sleeping node, in addition to the above, the nodeiNot as a sleeping node; respectively take
Figure 422809DEST_PATH_IMAGE037
The corresponding redundant node in the node is taken as a dormant node;
Figure 857332DEST_PATH_IMAGE038
representation collectionAOther nodes than the common node; when more than one public redundant node is needed, judging whether each node is taken as a dormant node or not;
5.3) selection method of dormant node in extension type 3.4.2.2)
Respectively calculate
Figure 570074DEST_PATH_IMAGE035
(ii) a Respectively take
Figure 431850DEST_PATH_IMAGE039
The corresponding redundant node in the node is taken as a dormant node;
5.4) selection method of dormant node in extension type 3.4.2.3)
Respectively calculate
Figure 862832DEST_PATH_IMAGE040
(ii) a For redundant nodeiAnd if and only if
Figure 835467DEST_PATH_IMAGE041
Time, nodeiMust be taken as a sleeping node, except for the above cases
Figure 402714DEST_PATH_IMAGE042
Not as a sleeping node; judging redundant nodes by adopting the methodjWhether to act as a sleeping node; respectively take
Figure 933928DEST_PATH_IMAGE043
Figure DEST_PATH_IMAGE044
The corresponding redundant node in (b) acts as a sleeping node.
6. The method for scheduling node dormancy based on data similarity in a wireless sensor network according to claim 1, characterized in that: the sleep scheduling described in step 6 is specifically implemented as follows:
6.1): when the network is initialized, each sensor node maintains a round counter Count, and the initial value is 0; adding 1 to the Count value every time data collection is carried out;
6.2): the sensor node collects sensing data through the collection method in the step 2, and finally sends the sensing information and neighbor table information to the cluster head together;
6.3): the cluster head selects a dormant node through the clustering analysis and the dormant node screening method provided in the step 3-5, and finally, the BS broadcasts the ID number of the dormant node;
6.4): after receiving the message, the node performs the following two checks:
6.4.1) judging whether the node is a dormant node, if so, entering a dormant state, awakening the node in the dormant state after the preset dormant time, and entering an active state again;
6.4.2) judging whether the dormant node is a neighbor node thereof, if so, modifying the node Mode value in the neighbor table to S;
6.5) after one round, the cluster head checks whether the current residual energy is lower than a threshold value, if so, the clustering algorithm is executed again; otherwise, continuing the next round of data collection; repeat execution 6.2) until the network lifecycle is over.
CN201910366343.2A 2019-05-05 2019-05-05 Node dormancy scheduling method based on data similarity in wireless sensor network Active CN110113807B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910366343.2A CN110113807B (en) 2019-05-05 2019-05-05 Node dormancy scheduling method based on data similarity in wireless sensor network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910366343.2A CN110113807B (en) 2019-05-05 2019-05-05 Node dormancy scheduling method based on data similarity in wireless sensor network

Publications (2)

Publication Number Publication Date
CN110113807A CN110113807A (en) 2019-08-09
CN110113807B true CN110113807B (en) 2021-10-01

Family

ID=67488187

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910366343.2A Active CN110113807B (en) 2019-05-05 2019-05-05 Node dormancy scheduling method based on data similarity in wireless sensor network

Country Status (1)

Country Link
CN (1) CN110113807B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111024239B (en) * 2019-11-28 2020-12-11 深圳供电局有限公司 Infrared detection data automatic acquisition tool based on image recognition technology
CN111757443A (en) * 2020-06-29 2020-10-09 中国联合网络通信集团有限公司 Node dormancy method, system, terminal device and computer readable storage medium
CN112994991B (en) * 2021-05-20 2021-07-16 中南大学 Redundant node discrimination method, device and equipment and readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103002537A (en) * 2012-12-14 2013-03-27 南京邮电大学 Wireless multimedia sensor network node clustering method based on related coefficients
CN104301965A (en) * 2014-10-16 2015-01-21 西安理工大学 Wireless sensor network inhomogeneous cluster node scheduling method
CN105939524A (en) * 2016-06-21 2016-09-14 南京大学 Wireless sensor network node event real-time prediction method
CN108235347A (en) * 2017-12-21 2018-06-29 北京科技大学 A kind of wireless sensor network consumption control method
CN109525956A (en) * 2019-01-02 2019-03-26 吉林大学 The energy-efficient method of data capture of sub-clustering in wireless sense network based on data-driven

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160077501A1 (en) * 2014-09-15 2016-03-17 KCF Technologies Incorporated Wireless sensor network
US10028220B2 (en) * 2015-01-27 2018-07-17 Locix, Inc. Systems and methods for providing wireless asymmetric network architectures of wireless devices with power management features

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103002537A (en) * 2012-12-14 2013-03-27 南京邮电大学 Wireless multimedia sensor network node clustering method based on related coefficients
CN104301965A (en) * 2014-10-16 2015-01-21 西安理工大学 Wireless sensor network inhomogeneous cluster node scheduling method
CN105939524A (en) * 2016-06-21 2016-09-14 南京大学 Wireless sensor network node event real-time prediction method
CN108235347A (en) * 2017-12-21 2018-06-29 北京科技大学 A kind of wireless sensor network consumption control method
CN109525956A (en) * 2019-01-02 2019-03-26 吉林大学 The energy-efficient method of data capture of sub-clustering in wireless sense network based on data-driven

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
无线传感器网络冗佘节点休眠调度算法;温涛,张冬青,郭权,宋晓莹;《通信学报》;20141031;第35卷(第10期);全文 *

Also Published As

Publication number Publication date
CN110113807A (en) 2019-08-09

Similar Documents

Publication Publication Date Title
CN110113807B (en) Node dormancy scheduling method based on data similarity in wireless sensor network
Jin et al. EEMC: An energy-efficient multi-level clustering algorithm for large-scale wireless sensor networks
Bandyopadhyay et al. An energy efficient hierarchical clustering algorithm for wireless sensor networks
Manjeshwar et al. APTEEN: A hybrid protocol for efficient routing and comprehensive information retrieval in wireless sensor networks
CN109673034A (en) A kind of wireless sensor network cluster routing method that must be searched for based on longicorn
CN103052147A (en) Energy effectiveness multistage ring-type networking method based on wireless sensor network
Hassan Oudani et al. Energy efficient in wireless sensor networks using cluster-based approach routing
Nedham et al. An improved energy efficient clustering protocol for wireless sensor networks
CN111314988B (en) Annular wireless sensor network clustering method based on optimal cluster number
CN113365323A (en) Low-energy-consumption multipath transmission method for wireless sensor network
KR101023499B1 (en) Apparatus and method for transmitting data in wireless sensor network by clustering
Choi et al. Regional clustering scheme in densely deployed wireless sensor networks for weather monitoring systems
CN114980252B (en) Low-power-consumption sleep control method and system for terminal equipment of Internet of things
Cho et al. An energy-efficient cluster-based routing in wireless sensor networks
Zhang et al. A distributed framework for low-latency data collection in battery-free wireless sensor networks
Hoque et al. EAGBRP: A Gateway Based Routing Protocol for Heterogeneous Wireless Sensor Networks
Zhong et al. Continuous contour mapping in sensor networks
Xiao et al. Adaptive freeshape clustering for balanced energy saving in the WirelessHART networks
CN114222348A (en) High-energy-efficiency wireless sensor network route control method based on reverse planning
CN107770751A (en) A kind of smart home environment monitoring system
Mohammad et al. Implementation of Multihop technique in DEC Protocol
KR101505179B1 (en) Method for analysis of energy efficient cluster ratio and the hierarchical wireless sensor network system the method applied thereto
CN112911518A (en) Large-scale WSN dynamic clustering method based on target omnidirectional tracking
CN104270797B (en) Network clustering method of wireless sensor based on side betweenness
Seth et al. Real-Time Implementation of Energy-Efficient Clustering Protocol in WSN

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20231107

Address after: 117000 No. 130, Guangyu Road, Pingshan District, Benxi City, Liaoning Province

Patentee after: BENXI STEEL (GROUP) INFORMATION AUTOMATION CO.,LTD.

Address before: 230000 floor 1, building 2, phase I, e-commerce Park, Jinggang Road, Shushan Economic Development Zone, Hefei City, Anhui Province

Patentee before: Dragon totem Technology (Hefei) Co.,Ltd.

Effective date of registration: 20231107

Address after: 230000 floor 1, building 2, phase I, e-commerce Park, Jinggang Road, Shushan Economic Development Zone, Hefei City, Anhui Province

Patentee after: Dragon totem Technology (Hefei) Co.,Ltd.

Address before: 110000 58 Shenbei New Area Road South, Shenyang, Liaoning.

Patentee before: LIAONING University

TR01 Transfer of patent right