|Table of Contents|

Geographical routing protocol of wireless sensor networksbased on trustful space-time protocol(PDF)

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

Issue:
2018年06期
Page:
671-
Research Field:
Publishing date:

Info

Title:
Geographical routing protocol of wireless sensor networksbased on trustful space-time protocol
Author(s):
Tian Xianghong
Division of Academic Affairs,Jinling Institute of Technology,Nanjing 211169,China
Keywords:
trustful space-time protocol wireless sensor networks geographical routing protocol internet of things
PACS:
TP391
DOI:
10.14177/j.cnki.32-1397n.2018.42.06.006
Abstract:
A geographical routing protocol based on trustful space-time protocol(TSTP)is proposed to use the network resources efficiently. The distance and time to live(TTL)are used as routing metrics,and the spatial distortion algorithm is introduced to map any metric to a transmission time offset and evaluate the influence of different metric combinations. Authenticated,encrypted,timed,and geo-referenced messages are provided in a resource-efficient way. Simulation results show the end to end delay,fairness and transmission ratio of TSTP present good performance in a series of network scene.

References:

[1] 孙利民. 无线传感网络[M]. 北京:清华大学出版社,2005.
[2]叶进,杨婧,宋晓燕. 无线传感器网络中基于定向扩散协议的跨层拥塞控制方法[J]. 传感技术学报,2012,25(1):124-128.
Ye Jin,Yang Jing,Song Xiaoyan. Cross-layer congestion control method based on directed diffusion protocol in wireless sensor networks[J]. Journal of Transduction Technology,2012,25(1):124-128.
[3]唐晨,王汝传,黄海平,等. 基于信息熵的无线传感器网络数据融合方案[J]. 东南大学学报(自然科学版),2008,38(Sup1):276-279.
Tang Chen,Wang Ruchuan,Huang Haiping,et al. Data fusion scheme for wireless sensor networks based on information entropy[J]. Journal of Southeast University(Natural Science Edition),2008,38(Sup1):276-279.
[4]Shanthi K,Murugan D. Pair-wise key agreement and hop-by-hop authentication protocol for MANET[J]. Wireless Networks,2017,23(4):1-9.
[5]Siva P T,Kadhirvelu D. An en-route scheme of filtering data in wireless sensor network[J]. International Journal of Research in Computer Applications & Robotics,2014,2(11):150-157.
[6]Nogueira J,Wong H,Loureiro A A F,et al. Wireless sensor network security[C]//Wireless and Mobile Network Security:Security Basics,Security in On-the-shelf and Emerging Technologies. London,UK:ISTE,2016:140-146.
[7]Lee S,Jeong D,Baik D K. Path prediction-based sensor filtering method[C]//2015 IEEE Sensors. Busan,South Korea:IEEE,2016:1-4.
[8]熊亚男. 无线传感器网络LEACH协议的研究与安全改进[D]. 广州:华南理工大学自动化科学与工程学院,2016.
[9]徐世武,王平. WSN中基于事件驱动的簇型时间同步协议[J]. 计算机系统应用,2016,25(4):162-166.
Xu Shiwu,Wang Ping. Clustering time synchronization protocol based on event driven for wireless sensor network[J]. Computer Systems & Applications,2016,25(4):162-166.
[10]魏俊. 基于通信系统的协议序列应用研究[D]. 南京:南京理工大学电子工程与光电技术学院,2016.
[11]Zhang Shuguang,Zhou Xuehai,Yang Feng,et al. En-route filtering strategy against selective discarding in wireless sensor networks[J]. Journal of Beijing University of Posts & Telecommunications,2016,39(1):68-73.
[12]Nikolidakis S A,Kandris D,Vergados D D,et al. Energy efficient routing in wireless sensor networks through balanced clustering[J]. Algorithms,2013,6(1):29-42.
[13]Nouh S,Geta Z. Energy aware GPSR routing protocol in a WSN[J]. Journal of EEA,2009,26:1-9.
[14]Wang Lijuan,Liang Haitao. Research and improvement of the wireless sensor network routing algorithm GPSR[C]//International Conference on Computing,Measurement,Control and Sensor Network. Taiyuan,China:IEEE,2012:83-86.
[15]Sun Lin,Zhang Zhenjiang. Enhancements of authenticated differentiated pre-distribution key methodology based on GPSR[J]. Lecture Notes in Electrical Engineering,2014,260:817-825.

Memo

Memo:
-
Last Update: 2018-12-30