Restoration of minimum cascade mobile for wireless sensor networks
-
摘要:
针对复杂应用场景中无线传感器网络节点失效导致的连通性故障问题,提出了一种最小级联移动的修复方法.当网络中某节点发生失效时,通过割点检测算法判断该失效节点是否对网络连通性造成影响.若该失效节点为割点,则认为该节点对网络连通性影响较大,需要对网络进行修复.该失效节点的邻居节点间距离若小于等于节点通信半径,通过邻居节点间直接建立通信链路的方式对网络进行修复.该失效节点的邻居节点间距离若大于节点通信半径,利用节点度与节点间欧式距离选举最佳候选节点,通过通信半径与邻居节点位置计算其待移动位置,最佳候选节点移动到位置后与其他邻居节点建立通信链路.实验结果表明,该方法能够有效对节点失效后的网络进行修复.该方法在修复过程中减少了修复节点的移动距离,降低了修复节点的能量损耗,延长了网络寿命.
Abstract:Aiming at the problem of connectivity failure caused by node failure in complex application scenarios of wireless sensor networks, a restoration method of minimum cascade mobility is proposed. When a node in the network fails, the cut point detection algorithm is used to determine whether the failed node affects the network connectivity. If the failure node is a cut point, it is considered that the node has a great impact on the network connectivity and needs to be restored. If the distance between the neighbor nodes of the failed node is less than or equal to the communication radius of the node, the network is restored by directly establishing communication links between the neighbor nodes. If the distance between the neighbor nodes of the failed node is greater than the communication radius of the node, the best candidate node is selected by the degree of node and the Euclidean distance between nodes, and the location to be moved is calculated by the communication radius and the location of the neighbor node. After the best candidate node moves to the location, it establishes a communication link with other neighbor nodes. Experimental results show that this method can effectively restore the network after the node failure. In the process of restoration, this method reduces the moving distance of the restoration node, reduces the energy loss of the restoration node, and prolongs the network life.
-
表 1 仿真参数
参数 数值 E0(J) 10 Efs(pJ·bit-1·m-2 10 Emp(pJ·bit-1·m-4) 0.001 3 Eda(nJ/bit) 5 Eelec(nJ/bit) 50 Emov(J/m) 0.1 数据包长度(bit) 256 仿真时间(h) 10 -
[1] LIU C X, XIONG W, ZHANG Y, et al. Research on invulnerability technology of node attack in space-based information network based on complex network[J]. Electronics, 2019, 8(5): 507. DOI: 10.3390/electronics8050507. [2] AL ZUBAIDIE M, ZHANG Z W, ZHANG J. REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs[J]. Applied Sciences, 2020, 10(6): 2007. DOI: 10.3390/app10062007. [3] 姚玉坤, 李小勇, 徐栋梁, 等. 基于加权分簇的移动无线传感器网络拓扑维护算法[J]. 微电子学与计算机, 2018, 35(8): 55-59. DOI: 10.19304/j.cnki.issn1000-7180.2018.08.011.YAO Y K, LI X Y, XU D L, et al. Weighted clustering based on topology maintenance algorithm of mobile wireless sensor network[J]. Microelectronics & Computer, 2018, 35(8): 55-59. DOI: 10.19304/j.cnki.issn1000-7180.2018.08.011. [4] 王晓璇, 王珺, 贾莹莹, 等. 无线传感器网络拓扑修复算法综述[J]. 计算机工程, 2018, 44(8): 93-99. DOI: 10.19678/j.issn.1000-3428.0046771.WANG X X, WANG J, JIA Y Y, et al. Survey of network topology recovery algorithms in wireless sensor network[J]. Computer Engineering, 2018, 44(8): 93-99. DOI: 10.19678/j.issn.1000-3428.0046771. [5] 陈雯柏, 崔晓丽, 郝翠, 等. 一种物联网系统层次型抗毁性拓扑构建方法[J]. 北京邮电大学学报, 2018, 41(5): 103-109. DOI: 10.13190/j.jbupt.2018-172.CHEN W B, CUI X L, HAO C, et al. Hierarchical invulnerability topology construction method for IoT system[J]. Journal of Beijing University of Posts and Telecommunications, 2018, 41(5): 103-109. DOI: 10.13190/j.jbupt.2018-172. [6] 王槐元, 丁旭, 王力立, 等. 无线传感器网络中目标连通覆盖算法[J]. 南京理工大学学报, 2017, 41(3): 285-293. DOI: 10.14177/j.cnki.32-1397n.2017.41.03.003.WANG H Y, DING X, WANG L L, et al. Target connected coverage algorithm for wireless sensor networks[J]. Journal of Nanjing University of Science and Technology, 2017, 41(3): 285-293. DOI: 10.14177/j.cnki.32-1397n.2017.41.03.003. [7] 李艳艳, 梁家荣. 无线传感器网络的3连通多跳控制集[J]. 计算机应用研究, 2020, 37(11): 3451-3455. DOI: 10.19734/j.issn.1001-3695.2019.08.0306.LI Y Y, LIANG J R. 3-connected r-hop dominating sets in wireless sensor networks[J]. Application Research of Computers, 2020, 37(11): 3451-3455. DOI: 10.19734/j.issn.1001-3695.2019.08.0306. [8] 李文锋, 符修文. 无线传感器网络抗毁性[J]. 计算机学报, 2015, 38(3): 625-647. DOI: 10.3724/SP.J.1016.2015.00625.LI W F, FU X W. Survey on invulnerability of wireless sensor network[J]. Chinese Journal of Computer, 2015, 38(3): 625-647. DOI: 10.3724/SP.J.1016.2015.00625. [9] ABBASI A A, YOUNIS M, AKKAYA K. Movement-assisted connectivity restoration in wireless sensor and actor networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2008, 20(9): 1366-1379. DOI: 10.1109/TPDS.2008.246. [10] 张生凤, 王坤达, 吴晓蓓. 时间容忍条件下无线传感器网络节点失效修复[J]. 计算机工程与设计, 2018, 39(8): 2443-2451. DOI: 10.16208/j.issn1000-7024.2018.08.009.ZHANG S F, WANG K D, WU X B. Node failure restoration based on time tolerance manner in wireless sensor network[J]. Computer Engineering and Design, 2018, 39(8): 2443-2451. DOI: 10.16208/j.issn1000-7024.2018.08.009. [11] SREEJITH V, ANUPAMA K R, GUDINO L J, et al. Partition discovery and connectivity restoration in wsn using mobile relays[C]//Proceedings of the 2015 International Conference of Distributed Computing and Networking. New York, NY, USA: Association for Computing Machinery, 2015: 1-9. DOI: 10.1145/2684464.2684487. [12] AKRAM V K, DA DEVIREN O. TAPU: Test and pick up-based k-connectivity restoration algorithm for wireless sensor networks[J]. Turkish Journal of Electrical Engineering and Computer Sciences, 2019, 27(2): 985-997. DOI: 10.3906/elk-1801-49. -