Underwater wireless sensor network coverage vulnerability repair algorithm based on cluster partitioning

A vulnerability repair and coverage technology, applied in network planning, network topology, wireless communication, etc., can solve the problems of limited node energy, difficult to replace batteries, network paralysis, etc.

Active Publication Date: 2019-04-16
哈工科讯(沈阳)智能工业技术有限公司
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the underwater environment, the node energy is limited and it is difficult to replace the battery. If the node energy is exhausted, it will cause network coverage loopholes, and even local network paralysis, which greatly affects network performance.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Underwater wireless sensor network coverage vulnerability repair algorithm based on cluster partitioning
  • Underwater wireless sensor network coverage vulnerability repair algorithm based on cluster partitioning
  • Underwater wireless sensor network coverage vulnerability repair algorithm based on cluster partitioning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] Step 1: Use the topological model of the 3D dense network to divide the entire 3D space into multiple identical virtual components, and ensure that there is a sensor node that can work normally in each segmented unit, and it can be determined that the entire sensor network is highly covered of.

[0075] Step 2: Vulnerability detection. Make relevant definitions and establish a mapping between segmentation units and coverage matrices to find failure nodes in some segmentation units that appear, assuming that coverage holes may appear in the cluster, and then divide the center of the unit according to the relationship between the perceived radius of the vulnerability edge node and the distance The length determines whether there is really a coverage hole;

[0076] Step 2.1: Relevant Definitions

[0077] Definition 1: Coverage C r : The coverage of the sensor network refers to the sensing range V of sensor nodes 1 ,V 2 ,...,V n The intersection of and the monitoring ar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an underwater wireless sensor network coverage vulnerability repair algorithm based on cluster partitioning, comprising the following steps: using a topological model of a three-dimensional dense network to divide the entire three-dimensional space into multiple identical virtual component units; finding a failure node and a vulnerability edge node by establishing mappingbetween a coverage matrix and a dividing unit, and analyzing the relationship between the perceived radius of the vulnerability edge node and the center length from the dividing unit to detect the vulnerability; and selecting a key location and a supplementary node location. Based on the above information and the related definition of a cluster dormancy scheduling algorithm, through vulnerabilitydetection, determination of a supplementary node, finding and awakening of a new supplementary node until the success and moving of the awakened node, coverage vulnerability repair is realized, thereby achieving high coverage, high connectivity and low energy consumption of the network.

Description

technical field [0001] The invention belongs to the topology control technology of an underwater wireless sensor network, and in particular relates to an underwater wireless sensor network coverage loophole repair algorithm based on cluster division. Background technique [0002] Water resources are an indispensable precious wealth for human survival and development. 72% of the earth's surface is covered by various water bodies such as rivers, lakes and oceans. Therefore, how to rationally develop underwater resources and reduce dependence on land resources , has become one of the important means for the sustainable development of man and nature. Underwater sensor networks (UWSNs) have broad application prospects in ocean monitoring and resource discovery, and can effectively collect data such as water temperature, water pressure, water flow direction, seabed topography, and seabed mineral deposits. Therefore, UWSNs have become the focus of current research. hotspot. Howev...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W16/18H04W24/04H04W52/02H04W84/18
CPCH04W16/18H04W24/04H04W52/0203H04W84/18Y02D30/70
Inventor 张文波谭小波张林丛付立冬魏宣任
Owner 哈工科讯(沈阳)智能工业技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products