Font Size: a A A

Research On Self Protection Problem Of Wireless Sensor Network

Posted on:2011-07-26Degree:MasterType:Thesis
Country:ChinaCandidate:J B ChengFull Text:PDF
GTID:2178360305476533Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Wireless Sensor Network has received extensive attention and been highly hoped since the concept came up. In recent years, all kinds of products of wireless sensor network have been put into application. Especially after Premier Jiabao Wen proposed the vision of "China perception", the wireless sensor network and the internet of things industry has been flourishing in China. Under this circumstance, the academia and the industry need to pay more attention to the research of the wireless sensor network.Many researchers have done many researches about the self-protection problem of wireless sensor network. However, from the point of practical applications,the efficiency and the applicability of the self-protection algorithms still need to be improved. In this paper, new algorithms have been given on the base of existing researches.Firstly, a new algorithm is given in connection with the features of limited energy, computing and communicating ability, and also k-self-protection and multiple protection sets problems are probed after that.Secondly, in connection with the request of connectivity and scalability of the wireless sensor network, a method solving connected protection set is given. The method is based on the hierarchical idea and it can generate a smaller protection set. And also the protection set is connected. With the algorithms are given, the simulations of the algorithms are also conducted to show the performance of the methods.Lastly, the future work is planed.In summary, this paper gives new methods about self protection problem on the base of existing studying. These new methods are approximation algorithm because of the feature of the wireless sensor network. On the same time, the methods take good consideration about the scalability and the distributed demand.
Keywords/Search Tags:WSN, self-protection, local information, approximation algorithm
PDF Full Text Request
Related items