期刊文献+

一种改进的传感器网络分簇分层路由协议 被引量:2

An improved clustering hierarchical routing protocol for wireless sensor networks
下载PDF
导出
摘要 在分析了无线传感器网络中传统的LEACH和LEACH-C路由协议基础上,结合MTE路由协议思想,提出了一种新的改进型分簇分层路由协议(improved clustering hierarchical routing protocol,ICH).文中簇首节点可以采用多跳方式传输数据包,且在选择中继节点时考虑节点剩余能量,对进入下一轮的条件进行了限制.实验表明,改进后的ICH协议的节点存活率比LEACH-C好. After analyzing the LEACH,LEACH-C hierarchical protocols and MTE protocol,we proposed a new routing protocol called ICH(improved clustering hierarchical routing protocol) for wireless sensor networks.The cluster-heads use the multi-hop communication mode to transfer data packets.And the energy of the node was considered in the selection of relaying nodes.We put forward the restrictive conditions when the network will go into the next round.Experiment result shows that the ICH acts better than LEACH-C at the...
出处 《中国计量学院学报》 2010年第3期241-245,270,共6页 Journal of China Jiliang University
基金 浙江省科技攻关计划项目(No.2007c23098)
关键词 无线传感器网络 分簇 分层路由协议 wireless sensor networks clustering hierarchical routing protocol
  • 相关文献

参考文献17

二级参考文献257

共引文献2443

同被引文献17

  • 1黄俊.传感器网络目标恢复算法研究[J].中国计量学院学报,2006,17(3):228-232. 被引量:4
  • 2Adrian Perrig,Robert Szewczyk,J.D. Tygar,Victor Wen,David E. Culler.SPINS: Security Protocols for Sensor Networks[J]. Wireless Networks . 2002 (5) 被引量:1
  • 3YANG L S,ZHU H,WEI Y,et al.A trust evaluationframework in distributed networks:Vulnerability analysisand defense against attacks. Proceedings of 25th IEEEinternational conference on computer communications . 2007 被引量:1
  • 4CURICA D,BANIAS O,DRANGA O.Malicious node de-tection in wireless sensor networks using an autoregressiontechnique. Third international conference on networ-king and services (ICNS07) . 2008 被引量:1
  • 5ZHANG M W,YANG B,ZHANG W Z,et al.Using trust metric to detect malicious behaviors in WSNs. 8th ACIS international conference on software engineer-ing,artificial intelligence,networking,and parallel dis-tributed computing . 2007 被引量:1
  • 6CURIAC D I,Madalin P,BANIAS O,et al.Software de-velopment for malicious nodes discovery in wireless sensornetwork security. 4th international conference onsensor technologies and applications . 2010 被引量:1
  • 7FANG L,CHENG X Z,CHEN C.Insider attacker detec-tion in wireless sensor networks. 26th internationalconference on computer communications . 2007 被引量:1
  • 8GANERIWAL S,SRIVASTAVA M B.Reputation-basedframework for high integrity sensor networks. Pro-ceedings of the 2nd ACM workshop on Security of ad hocand sensor networks (SASN 04) . 2004 被引量:1
  • 9ATAKLI I M,HUHong-bing,CHEN Yu,et al.Malicious node de-tection in wireless sensor networks using weighted trust evaluation. Proc of Spring Simulation Multi Conference . 2008 被引量:1
  • 10W. R. Pires,T. H. P. Figueiredo,H. C. Wong,A. A. F. Loureiro.Malicious node detection in wireless sensor networks. 18th Int‘l Parallel and Distributed Processing Symp . 2004 被引量:1

引证文献2

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部