Optimization coverage conserving protocol with authentication in wireless sensor networks

In the k -coverage process of target nodes, substantial data redundancy occurs, which leads to the phenomenon of congestion, reducing the network communication capability and coverage as well as accelerating network energy consumption. Therefore, this article proposes an Optimization Coverage Conser...

Full description

Saved in:
Bibliographic Details
Main Authors: Zeyu Sun, Longxing Li, Xuelun Li, Xiaofei Xing, Yuanbo Li
Format: Article
Language:English
Published: Wiley 2017-03-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1177/1550147717695561
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832555317231091712
author Zeyu Sun
Longxing Li
Xuelun Li
Xiaofei Xing
Yuanbo Li
author_facet Zeyu Sun
Longxing Li
Xuelun Li
Xiaofei Xing
Yuanbo Li
author_sort Zeyu Sun
collection DOAJ
description In the k -coverage process of target nodes, substantial data redundancy occurs, which leads to the phenomenon of congestion, reducing the network communication capability and coverage as well as accelerating network energy consumption. Therefore, this article proposes an Optimization Coverage Conserving Protocol with Authentication. This protocol provides a solution to obtain the largest coverage probability for multi-nodes. In the optimization and authenticated calculation, the protocol provides the calculation method and verification process of the expected value of multi-node coverage; when the moving target nodes are continuously covered, this protocol provides a process to solve for the focused target nodes; when there is redundancy coverage, this article provides a process to calculate the coverage probability when any sensor node is covered by a redundant node. Furthermore, through comparisons of the coverage quality and network lifetime with other algorithms, the performance indexes of this protocol have been substantially increased by the simulation experiment, which verified the effectiveness and viability of the protocol in this article.
format Article
id doaj-art-a845540644c14f25b5b45e8b2416e248
institution Kabale University
issn 1550-1477
language English
publishDate 2017-03-01
publisher Wiley
record_format Article
series International Journal of Distributed Sensor Networks
spelling doaj-art-a845540644c14f25b5b45e8b2416e2482025-02-03T05:48:31ZengWileyInternational Journal of Distributed Sensor Networks1550-14772017-03-011310.1177/1550147717695561Optimization coverage conserving protocol with authentication in wireless sensor networksZeyu Sun0Longxing Li1Xuelun Li2Xiaofei Xing3Yuanbo Li4School of Electronic and Information Engineering, Xi’an Jiaotong University, Xi’an, ChinaSchool of Computer and Information Engineering, Luoyang Institute of Science and Technology, Luoyang, ChinaSchool of Electronic Information Engineering, Tianjin University, Tianjin, ChinaSchool of Computer Science and Educational Software, Guangzhou University, Guangzhou, ChinaSchool of Computer and Information Engineering, Luoyang Institute of Science and Technology, Luoyang, ChinaIn the k -coverage process of target nodes, substantial data redundancy occurs, which leads to the phenomenon of congestion, reducing the network communication capability and coverage as well as accelerating network energy consumption. Therefore, this article proposes an Optimization Coverage Conserving Protocol with Authentication. This protocol provides a solution to obtain the largest coverage probability for multi-nodes. In the optimization and authenticated calculation, the protocol provides the calculation method and verification process of the expected value of multi-node coverage; when the moving target nodes are continuously covered, this protocol provides a process to solve for the focused target nodes; when there is redundancy coverage, this article provides a process to calculate the coverage probability when any sensor node is covered by a redundant node. Furthermore, through comparisons of the coverage quality and network lifetime with other algorithms, the performance indexes of this protocol have been substantially increased by the simulation experiment, which verified the effectiveness and viability of the protocol in this article.https://doi.org/10.1177/1550147717695561
spellingShingle Zeyu Sun
Longxing Li
Xuelun Li
Xiaofei Xing
Yuanbo Li
Optimization coverage conserving protocol with authentication in wireless sensor networks
International Journal of Distributed Sensor Networks
title Optimization coverage conserving protocol with authentication in wireless sensor networks
title_full Optimization coverage conserving protocol with authentication in wireless sensor networks
title_fullStr Optimization coverage conserving protocol with authentication in wireless sensor networks
title_full_unstemmed Optimization coverage conserving protocol with authentication in wireless sensor networks
title_short Optimization coverage conserving protocol with authentication in wireless sensor networks
title_sort optimization coverage conserving protocol with authentication in wireless sensor networks
url https://doi.org/10.1177/1550147717695561
work_keys_str_mv AT zeyusun optimizationcoverageconservingprotocolwithauthenticationinwirelesssensornetworks
AT longxingli optimizationcoverageconservingprotocolwithauthenticationinwirelesssensornetworks
AT xuelunli optimizationcoverageconservingprotocolwithauthenticationinwirelesssensornetworks
AT xiaofeixing optimizationcoverageconservingprotocolwithauthenticationinwirelesssensornetworks
AT yuanboli optimizationcoverageconservingprotocolwithauthenticationinwirelesssensornetworks