Font Size: a A A

Research On Energy Hole Suppression In Non-Uniform Node Distribution Networks

Posted on:2022-07-18Degree:MasterType:Thesis
Country:ChinaCandidate:C WangFull Text:PDF
GTID:2518306326484774Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
In the current technology environment,the problem of limited energy in wireless sensor networks has not been effectively solved.Minimizing the energy loss of sensor nodes in the operation process has become the optimal solution.In wireless sensor networks(WSNs),the energy hole problem is caused by the energy depletion of nodes in a certain area,which makes WSNs unable to effectively monitor the monitoring area.In the absence of attackers,the network itself may produce energy hole problem due to unreasonable energy consumption;In the presence of attackers,nodes in the network may run out of energy and form energy holes due to a large number of packets sent by attackers.Therefore,in order to avoid energy hole in wireless sensor network as much as possible,this paper proposes the energy balance routing strategy and the suppression method of energy hole attack respectively in order to optimize and solve the energy hole in wireless sensor network by means of the normal operation and the presence of malicious attackers.The work content and innovation analysis related to this study are as follows:(1)In this study,fuzzy clustering method is used to realize the direct data transmission between the nodes in the cluster and the cluster head node.The improved a * algorithm is used to optimize the routing from the cluster head node to the sink node between the cluster heads to realize the global optimal routing planning.(2)Based on the NSGA-II algorithm,this paper makes an innovative research.On the basis of ensuring the effective operation of wireless sensor networks,aiming at the energy hole problem,it proposes the network sleep mechanism,and achieves the purpose of energy saving through the optimal sleep scheduling.(3)Aiming at the attack environment,real-time detection of malicious attack packets based on openflow protocol,discard the detected packets,trace and suppress the malicious source nodes,to ensure the normal operation of the network.
Keywords/Search Tags:Wireless sensor network, energy hole, energy balance, attack suppression
PDF Full Text Request
Related items