Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Coverage Vulnerability Repair Algorithm Based on Cluster Partition for Underwater Wireless Sensor Networks

A wireless sensor and network coverage technology, applied in the field of underwater wireless sensor network coverage vulnerability repair algorithm, can solve problems such as limited node energy, difficult to replace batteries, network coverage loopholes, etc., to achieve low network energy consumption and high network coverage , the effect of high connectivity energy consumption

Active Publication Date: 2021-08-31
哈工科讯(沈阳)智能工业技术有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the underwater environment, the node energy is limited and it is difficult to replace the battery. If the node energy is exhausted, it will cause network coverage loopholes, and even local network paralysis, which greatly affects network performance.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Coverage Vulnerability Repair Algorithm Based on Cluster Partition for Underwater Wireless Sensor Networks
  • A Coverage Vulnerability Repair Algorithm Based on Cluster Partition for Underwater Wireless Sensor Networks
  • A Coverage Vulnerability Repair Algorithm Based on Cluster Partition for Underwater Wireless Sensor Networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] Step 1: Use the topological model of the 3D dense network to divide the entire 3D space into multiple identical virtual components, and ensure that there is a sensor node that can work normally in each segmented unit, and it can be determined that the entire sensor network is highly covered of.

[0075] Step 2: Vulnerability detection. Make relevant definitions and establish a mapping between segmentation units and coverage matrices to find failure nodes in some segmentation units that appear, assuming that coverage holes may appear in the cluster, and then segment the center of the unit according to the relationship between the perceived radius of the vulnerability edge node and the distance The length determines whether there is really a coverage hole;

[0076] Step 2.1: Relevant Definitions

[0077] Definition 1: Coverage C r : The coverage of the sensor network refers to the sensing range V of sensor nodes 1 ,V 2 ,...,V n The intersection of and the monitoring a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The algorithm for repairing coverage loopholes in underwater wireless sensor networks based on cluster division includes the following content: use the topology model of the 3D dense network to divide the entire 3D space into multiple identical virtual components; Find the failure node and the edge node of the vulnerability through the mapping, analyze the relationship between the perceived radius of the edge node of the vulnerability and the distance from the center length of the segmentation unit to detect the vulnerability; select the key position and the position of the supplementary node. Based on the above information and the relevant definitions of the cluster dormancy scheduling algorithm, through vulnerability detection, determining supplementary nodes, finding and waking up new supplementary nodes until successful, and moving the awakened nodes to achieve coverage vulnerability repair, so as to achieve high network coverage, high connectivity and low energy consumption.

Description

technical field [0001] The invention belongs to the topology control technology of an underwater wireless sensor network, and in particular relates to an underwater wireless sensor network coverage loophole repair algorithm based on cluster division. Background technique [0002] Water resources are an indispensable precious wealth for human survival and development. 72% of the earth's surface is covered by various water bodies such as rivers, lakes and oceans. Therefore, how to rationally develop underwater resources and reduce dependence on land resources , has become one of the important means for the sustainable development of man and nature. Underwater sensor networks (UWSNs) have broad application prospects in ocean monitoring and resource discovery, and can effectively collect data such as water temperature, water pressure, water flow direction, seabed topography, and seabed mineral deposits. Therefore, UWSNs have become the focus of current research. hotspot. Howev...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W16/18H04W24/04H04W52/02H04W84/18
CPCH04W16/18H04W24/04H04W52/0203H04W84/18Y02D30/70
Inventor 张文波谭小波张林丛付立冬魏宣任
Owner 哈工科讯(沈阳)智能工业技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products