Journal of Frontiers of Computer Science and Technology ›› 2022, Vol. 16 ›› Issue (12): 2765-2774.DOI: 10.3778/j.issn.1673-9418.2208006
• Network and Information Security • Previous Articles Next Articles
Received:
2022-07-19
Revised:
2022-09-21
Online:
2022-12-01
Published:
2022-12-16
About author:
GUO Xinming, born in 1979, M.S., associate professor, M.S. supervisor, professional member of CCF. His research interests include Internet of things technology and cyberspace security.Supported by:
通讯作者:
+E-mail: guoxinming118@126.com作者简介:
郭新明(1969—),男,陕西蓝田人,硕士,副教授,硕士生导师,CCF专业会员,主要研究方向为物联网技术、网络空间安全。基金资助:
CLC Number:
GUO Xinming, CAI Junwei. WVSN Intrusion Detection Full-View Weak Barrier β-QoM Enhanced Construction Algorithm[J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(12): 2765-2774.
郭新明, 蔡军伟. WVSN入侵检测全视角弱栅栏β-QoM增强构建算法[J]. 计算机科学与探索, 2022, 16(12): 2765-2774.
Add to citation manager EndNote|Ris|BibTeX
URL: http://fcst.ceaj.org/EN/10.3778/j.issn.1673-9418.2208006
参数名称 | 值 |
---|---|
带状监测区域(L×W)/m2 | 140×60 |
r/m | 15~20 |
γ | π/3 |
θ | π/2 |
部署节点数 | 100~1 500 |
Table 1 Parameter setting of simulation platform
参数名称 | 值 |
---|---|
带状监测区域(L×W)/m2 | 140×60 |
r/m | 15~20 |
γ | π/3 |
θ | π/2 |
部署节点数 | 100~1 500 |
算法名称 | 栅栏类型 | β-QoM | 首次成功构建栅栏时的平均部署节点数 | 100%构建栅栏的临界点平均部署节点数 |
---|---|---|---|---|
CPFWBβEC | 全视角、弱 | 有 | 145 | 380 |
W-GraProj | 全视角、弱 | 无 | 240 | 550 |
D-eTriB | 全视角、强 | 有 | 460 | 890 |
Table 2 Comparison of algorithm performance
算法名称 | 栅栏类型 | β-QoM | 首次成功构建栅栏时的平均部署节点数 | 100%构建栅栏的临界点平均部署节点数 |
---|---|---|---|---|
CPFWBβEC | 全视角、弱 | 有 | 145 | 380 |
W-GraProj | 全视角、弱 | 无 | 240 | 550 |
D-eTriB | 全视角、强 | 有 | 460 | 890 |
[1] | 司鹏举. 无线传感器网络覆盖优化方法研究[D]. 沈阳: 东北大学, 2018. |
SI P J. Research on optimization methods for coverage in wireless sensor network[D]. Shenyang: Northeastern University, 2018. | |
[2] |
JUNEJA S, KAUR K, SINGH H. An intelligent coverage optimization and link-stability routing for energy efficient wireless sensor network[J]. Wireless Networks, 2022, 28: 705-719.
DOI URL |
[3] | KHALAF O I, ABDULSAHIB G M, SABBAR B M. Optimization of wireless sensor network coverage using the bee algorithm[J]. Journal of Information Science and Engineering, 2020, 36(2): 377-386. |
[4] | 张春雨, 刘晓东, 孙丽君, 等. 基于主成分布谷鸟搜索算法的WSN覆盖优化[J]. 电子测量技术, 2021, 44(18): 129-135. |
ZHANG C Y, LIU X D, SUN L J, et al. Coverage optimization of WSN based on cuckoo search algorithm with principal component analysis[J]. Electronic Measurement Technology, 2021, 44(18): 129-135. | |
[5] | 王振东, 汪嘉宝, 李大海. 一种增强型麻雀搜索算法的无线传感器网络覆盖优化研究[J]. 传感技术学报, 2021, 34(6): 818-828. |
WANG Z D, WANG J B, LI D H. Study on WSN optimization coverage of an enhanced sparrow search algorithm[J]. Chinese Journal of Sensors and Actuators, 2021, 34(6): 818-828. | |
[6] |
KUMAR R, DHINGRA S. A coverage hole detection and repair algorithm in wireless sensor networks[J]. Cluster Computing, 2019, 22(S5): 12473-12480.
DOI URL |
[7] |
DEZFOULI N N, BARATI H. A distributed energy-efficient approach for hole repair in wireless sensor networks[J]. Wireless Networks, 2020, 26: 1839-1855.
DOI URL |
[8] | 罗鑫. 基于改进粒子群算法的无线传感器网络覆盖漏洞修复[J]. 国外电子测量技术, 2021, 40(9): 87-92. |
LUO X. Coverage hole repair in WSNs based on improved PSO[J]. Foreign Electronic Measurement Technology, 2021, 40(9): 87-92. | |
[9] | 陈文萍, 杨萌, 洪弋, 等. 视频传感器网络覆盖问题[J]. 计算机应用, 2013, 33(6): 1489-1522. |
CHEN W P, YANG M, HONG Y, et al. Coverage problems in visual sensor networks[J]. Journal of Computer Applications, 2013, 33(6): 1489-1522.
DOI URL |
|
[10] | WANG Y, CAO G H. On full-view coverage in camera sensor networks[C]// Proceedings of the 30th IEEE International Conference on Computer Communications, Shanghai, Apr 10-15, 2011. Piscataway: IEEE, 2011: 1781-1789. |
[11] | 孙利民, 张书钦, 李志, 等. 无线传感器网络理论及应用[M]. 北京: 清华大学出版社, 2018. |
SUN L M, ZHANG S Q, LI Z, et al. Theory and application of wireless sensor network[M]. Beijing: Tsinghua University Press, 2018. | |
[12] | WANG Y, CAO G H. Achieving full-view coverage in camera sensor networks[J]. ACM Transactions on Sensor Networks, 2013, 10(1): 711-742. |
[13] |
XU P, CHANG I H, CHANG C Y, et al. A distributed barrier coverage mechanism for supporting full view in wireless visual sensor networks[J]. IEEE Access, 2019, 7: 156895-156906.
DOI URL |
[14] | 尤炳棋, 徐向华, 王然. 一种视频传感器网络的栅栏覆盖方法[J]. 电子科技, 2018, 31(3): 28-31. |
YOU B Q, XU X H, WANG R. A barrier coverage method for camera sensor network[J]. Electronic Science and Technology, 2018, 31(3): 28-31. | |
[15] | CHANG C Y, HSIAO C Y, MING H Y, et al. Surveillance algorithms for barrier coverage in wireless camera sensor networks[C]// Proceedings of the 2018 International Conference on Electronics Technology, Chengdu, May 23-27, 2018. Piscataway: IEEE, 2018: 111-115. |
[16] | MA H, YANG M, LI D, et al. Minimum camera barrier coverage in wireless camera sensor networks[C]// Proceedings of the IEEE INFOCOM 2012, Orlando, Mar 25-30, 2012. Piscataway: IEEE, 2012: 217-225. |
[17] | GAO X F, RUI Y, FAN W, et al. Optimization of full-view barrier coverage with rotatable camera sensors[C]// Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, Atlanta, Jun 5-8, 2017. Washington: IEEE Computer Society, 2017: 870-879. |
[18] | CHENG C F, TSAI K T. Barrier coverage in wireless visual sensor networks with importance of image consideration[C]// Proceedings of the 7th International Conference on Ubiquitous and Future Networks, Sapporo, Jul 7-10, 2015. Piscataway: IEEE, 2015: 793-798. |
[19] |
CHENG C F, TSAI K T. Encircled belt-barrier coverage in wireless visual sensor networks[J]. Pervasive and Mobile Computing, 2017, 38(1): 233-256.
DOI URL |
[20] | 邢文训, 谢金星. 现代优化计算方法[M]. 北京: 清华大学出版社, 2005. |
XING W X, XIE J X. Modern optimization calculation methods[M]. Beijing: Tsinghua University Press, 2005. | |
[21] | LALAMA A, KHERNANE N, MOSTEFAOUI A. Closed peripheral coverage in wireless multimedia sensor networks[C]// Proceedings of the 15th ACM International Symposium on Mobility Management and Wireless Access, Miami, Nov 21-25, 2017. New York: ACM, 2017: 121-128. |
[22] | 冯富宝. 集合覆盖问题研究[D]. 济南: 山东大学, 2006: 13-15. |
FENG F B. Study on set cover problem[D]. Jinan: Shandong University, 2006: 13-15. |
[1] | DONG Xinyu, XIE Bin, ZHAO Xusheng, GAO Xinbao. Wireless Network Intrusion Detection Algorithm Based on Multiple Perspectives Hierarchical Clustering [J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(12): 2752-2764. |
[2] | LIU Tonglai, ZHANG Zikai, WU Jigang. System Model and Access Control Schemes for Medical Image Collaborative Analysis [J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(8): 1779-1791. |
[3] | LIU Chunhong, ZHANG Zhihua, JIAO Jie, CHENG Bo. Structured Prediction Method for Small Sample Workload Sequences [J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(7): 1552-1560. |
[4] | QU Dapeng, ZHANG Jiankun, LYU Guoxin, GAO Chengxi, SONG Qi. Bandwidth-Delay Aware Congestion Control Mechanism in Named Data Networking [J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(5): 1076-1086. |
[5] | CHEN Xueyan, ZHANG Zhiming, YANG Wei, LI Ping, XIONG Xiaoyong. Lightweight Selective Forwarding Attack Detection for Wireless Sensor Networks [J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(4): 865-876. |
[6] | YU Daming, ZHANG Zhen. FSDC: Flexible and Highly Scalable Data Center Network Structure [J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(4): 855-864. |
[7] | CHEN Shenglei, QIU Yitao, JIANG Congfeng, ZHANG Jilin, YU Jun, LIN Jiangbin, YAN Longchuan, REN Zujie, WAN Jian. Workload Characterization of Online and Offline Services in Co-located Data Centers [J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(4): 822-834. |
[8] | GUO Hui, QIAO Ting. Analysis of Multiple Antenna Covert Communication Technology Assisted by Artificial Noise [J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(3): 574-581. |
[9] | ZHAO Haijun, HE Chunlin, PU Bin, CHEN Yihong. Modeling and Solving of Sensor Network Lifetime Problem with Coverage Model [J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(3): 565-573. |
[10] | GUAN Zheng, HU Yang, YANG Zhijun, HE Min. Weighted Scheduling Algorithm Based on In-Band Full-Duplex Link for Distributed WLAN [J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(2): 372-383. |
[11] |
XU Dan1+, SHENG Yonghong2, JU Dapeng2, WU Jianping1, WANG Dongsheng2,3 . High Effective Two-round Remote File Fast Synchronization Algorithm [J]. Journal of Frontiers of Computer Science and Technology, 2011, 5(1): 38-49. |
[12] | ZHAN Hengfei1+, YANG Yuexiang2, FANG Hong2. Research and Optimization of Nutch Distributed Crawler [J]. Journal of Frontiers of Computer Science and Technology, 2011, 5(1): 68-74. |
[13] |
HAN Jin +; XIE Junyuan . Application Research of Inject Attack Sequence Searching Algorithm for Secu-rity Protocol Verification* [J]. Journal of Frontiers of Computer Science and Technology, 2010, 4(7): 608-616. |
[14] | WANG Haiyan+, WANG Ying, WANG Ruchuan. Research on Backward Trust Chain Discovery Algorithms in Open Network Environment* [J]. Journal of Frontiers of Computer Science and Technology, 2010, 4(7): 637-645. |
[15] | TIAN Xinguang1+, CHENG Xueqi1, CHEN Xiaojuan2, DUAN Miyi1, XU Hongbo1. Masquerade Detection Towards Network Users on Unix and Linux Platforms* [J]. Journal of Frontiers of Computer Science and Technology, 2010, 4(6): 500-510. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
/D:/magtech/JO/Jwk3_kxyts/WEB-INF/classes/