Optimization coverage conserving protocol with authentication in wireless sensor networks
In the k -coverage process of target nodes, substantial data redundancy occurs, which leads to the phenomenon of congestion, reducing the network communication capability and coverage as well as accelerating network energy consumption. Therefore, this article proposes an Optimization Coverage Conser...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2017-03-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1177/1550147717695561 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832555317231091712 |
---|---|
author | Zeyu Sun Longxing Li Xuelun Li Xiaofei Xing Yuanbo Li |
author_facet | Zeyu Sun Longxing Li Xuelun Li Xiaofei Xing Yuanbo Li |
author_sort | Zeyu Sun |
collection | DOAJ |
description | In the k -coverage process of target nodes, substantial data redundancy occurs, which leads to the phenomenon of congestion, reducing the network communication capability and coverage as well as accelerating network energy consumption. Therefore, this article proposes an Optimization Coverage Conserving Protocol with Authentication. This protocol provides a solution to obtain the largest coverage probability for multi-nodes. In the optimization and authenticated calculation, the protocol provides the calculation method and verification process of the expected value of multi-node coverage; when the moving target nodes are continuously covered, this protocol provides a process to solve for the focused target nodes; when there is redundancy coverage, this article provides a process to calculate the coverage probability when any sensor node is covered by a redundant node. Furthermore, through comparisons of the coverage quality and network lifetime with other algorithms, the performance indexes of this protocol have been substantially increased by the simulation experiment, which verified the effectiveness and viability of the protocol in this article. |
format | Article |
id | doaj-art-a845540644c14f25b5b45e8b2416e248 |
institution | Kabale University |
issn | 1550-1477 |
language | English |
publishDate | 2017-03-01 |
publisher | Wiley |
record_format | Article |
series | International Journal of Distributed Sensor Networks |
spelling | doaj-art-a845540644c14f25b5b45e8b2416e2482025-02-03T05:48:31ZengWileyInternational Journal of Distributed Sensor Networks1550-14772017-03-011310.1177/1550147717695561Optimization coverage conserving protocol with authentication in wireless sensor networksZeyu Sun0Longxing Li1Xuelun Li2Xiaofei Xing3Yuanbo Li4School of Electronic and Information Engineering, Xi’an Jiaotong University, Xi’an, ChinaSchool of Computer and Information Engineering, Luoyang Institute of Science and Technology, Luoyang, ChinaSchool of Electronic Information Engineering, Tianjin University, Tianjin, ChinaSchool of Computer Science and Educational Software, Guangzhou University, Guangzhou, ChinaSchool of Computer and Information Engineering, Luoyang Institute of Science and Technology, Luoyang, ChinaIn the k -coverage process of target nodes, substantial data redundancy occurs, which leads to the phenomenon of congestion, reducing the network communication capability and coverage as well as accelerating network energy consumption. Therefore, this article proposes an Optimization Coverage Conserving Protocol with Authentication. This protocol provides a solution to obtain the largest coverage probability for multi-nodes. In the optimization and authenticated calculation, the protocol provides the calculation method and verification process of the expected value of multi-node coverage; when the moving target nodes are continuously covered, this protocol provides a process to solve for the focused target nodes; when there is redundancy coverage, this article provides a process to calculate the coverage probability when any sensor node is covered by a redundant node. Furthermore, through comparisons of the coverage quality and network lifetime with other algorithms, the performance indexes of this protocol have been substantially increased by the simulation experiment, which verified the effectiveness and viability of the protocol in this article.https://doi.org/10.1177/1550147717695561 |
spellingShingle | Zeyu Sun Longxing Li Xuelun Li Xiaofei Xing Yuanbo Li Optimization coverage conserving protocol with authentication in wireless sensor networks International Journal of Distributed Sensor Networks |
title | Optimization coverage conserving protocol with authentication in wireless sensor networks |
title_full | Optimization coverage conserving protocol with authentication in wireless sensor networks |
title_fullStr | Optimization coverage conserving protocol with authentication in wireless sensor networks |
title_full_unstemmed | Optimization coverage conserving protocol with authentication in wireless sensor networks |
title_short | Optimization coverage conserving protocol with authentication in wireless sensor networks |
title_sort | optimization coverage conserving protocol with authentication in wireless sensor networks |
url | https://doi.org/10.1177/1550147717695561 |
work_keys_str_mv | AT zeyusun optimizationcoverageconservingprotocolwithauthenticationinwirelesssensornetworks AT longxingli optimizationcoverageconservingprotocolwithauthenticationinwirelesssensornetworks AT xuelunli optimizationcoverageconservingprotocolwithauthenticationinwirelesssensornetworks AT xiaofeixing optimizationcoverageconservingprotocolwithauthenticationinwirelesssensornetworks AT yuanboli optimizationcoverageconservingprotocolwithauthenticationinwirelesssensornetworks |