首页> 外文学位 >Enhanced Deployment Strategy for Role-based Hierarchical Application Agents in Wireless Sensor Networks with Established Clusterheads.
【24h】

Enhanced Deployment Strategy for Role-based Hierarchical Application Agents in Wireless Sensor Networks with Established Clusterheads.

机译:具有已建立的簇头的无线传感器网络中基于角色的分层应用程序代理的增强型部署策略。

获取原文
获取原文并翻译 | 示例

摘要

Efficient self-organizing virtual clusterheads that supervise data collection based on their wireless connectivity, risk, and overhead costs, are an important element of Wireless Sensor Networks (WSNs). This function is especially critical during deployment when system resources are allocated to a subsequent application. In the presented research, a model used to deploy intrusion detection capability on a Local Area Network (LAN), in the literature, was extended to develop a role-based hierarchical agent deployment algorithm for a WSN. The resulting model took into consideration the monitoring capability, risk, deployment distribution cost, and monitoring cost associated with each node.;Changing the original LAN methodology approach to model a cluster-based sensor network depended on the ability to duplicate a specific parameter that represented the monitoring capability. Furthermore, other parameters derived from a LAN can elevate costs and risk of deployment, as well as jeopardize the success of an application on a WSN. A key component of the approach presented in this research was to reduce the costs when established clusterheads in the network were found to be capable of hosting additional detection agents. In addition, another cost savings component of the study addressed the reduction of vulnerabilities associated with deployment of agents to high volume nodes.;The effectiveness of the presented method was validated by comparing it against a type of a power-based scheme that used each node's remaining energy as the deployment value. While available energy is directly related to the model used in the presented method, the study deliberately sought out nodes that were identified with having superior monitoring capability, cost less to create and sustain, and are at low-risk of an attack. This work investigated improving the efficiency of an intrusion detection system (IDS) by using the proposed model to deploy monitoring agents after a temperature sensing application had established the network traffic flow to the sink. The same scenario was repeated using a power-based IDS to compare it against the proposed model. To identify a clusterhead's ability to host monitoring agents after the temperature sensing application terminated, the deployed IDS utilized the communication history and other network factors in order to rank the nodes. Similarly, using the node's communication history, the deployed power-based IDS ranked nodes based on their remaining power. For each individual scenario, and after the IDS application was deployed, the temperature sensing application was run for a second time. This time, to monitor the temperature sensing agents as the data flowed towards the sink, the network traffic was rerouted through the new intrusion detection clusterheads. Consequently, if the clusterheads were shared, the re-routing step was not preformed.;Experimental results in this research demonstrated the effectiveness of applying a robust deployment metric to improve upon the energy efficiency of a deployed application in a multi-application WSN. It was found that in the scenarios with the intrusion detection application that utilized the proposed model resulted in more remaining energy than in the scenarios that implemented the power-based IDS. The algorithm especially had a positive impact on the small, dense, and more homogeneous networks. This finding was reinforced by the smaller percentage of new clusterheads that was selected. Essentially, the energy cost of the route to the sink was reduced because the network traffic was rerouted through fewer new clusterheads. Additionally, it was found that the intrusion detection topology that used the proposed approach formed smaller and more connected sets of clusterheads than the power-based IDS. As a consequence, this proposed approach essentially achieved the research objective for enhancing energy use in a multi-application WSN.
机译:有效的自组织虚拟群集头基于无线连接,风险和间接费用来监督数据收集,是无线传感器网络(WSN)的重要组成部分。在将系统资源分配给后续应用程序的部署过程中,此功能尤其重要。在提出的研究中,文献中扩展了用于在局域网(LAN)上部署入侵检测功能的模型,以开发用于WSN的基于角色的分层代理部署算法。生成的模型考虑了与每个节点相关的监视能力,风险,部署分发成本和监视成本。更改基于LAN的原始方法论模型来建模基于群集的传感器网络取决于复制表示特定参数的能力。监控能力。此外,从LAN派生的其他参数可能会增加成本和部署风险,并危及WSN上应用程序的成功。本研究提出的方法的关键组成部分是当发现网络中已建立的簇头能够托管其他检测代理时,降低成本。此外,该研究的另一个节省成本的组件解决了减少与将代理部署到大容量节点相关的漏洞。通过与使用每个节点的基于电源的方案类型进行比较,验证了所提出方法的有效性剩余能量作为部署价值。虽然可用能量与所提出的方法中使用的模型直接相关,但研究有意地找出了具有较高监视能力,创建和维护成本较低且处于低攻击风险的节点。这项工作研究了在温度传感应用程序建立到接收器的网络流量之后,通过使用建议的模型部署监视代理程序来提高入侵检测系统(IDS)的效率。使用基于电源的IDS将其与建议的模型进行比较,重复了相同的场景。为了确定温度传感应用终止后群集头托管监视代理的能力,已部署的IDS利用通信历史记录和其他网络因素来对节点进行排名。类似地,使用节点的通信历史记录,已部署的基于电源的IDS根据节点的剩余电量对节点进行排名。对于每个单独的场景,在部署IDS应用程序之后,将再次运行温度感测应用程序。这次,为了监视数据流向接收器时的温度感应代理,网络流量通过新的入侵检测群集头重新路由。因此,如果共享簇头,则不会执行重新路由步骤。该研究的实验结果表明,应用健壮的部署指标来提高多应用WSN中已部署应用的能源效率是有效的。结果发现,与采用基于电源的IDS的方案相比,在采用了提议模型的入侵检测应用程序的方案中,其剩余能量更多。该算法尤其对小型,密集和更均匀的网络产生了积极影响。选择的新簇头的百分比较小,进一步证明了这一发现。实质上,由于通过较少的新簇头重新路由了网络流量,因此减少了到达接收器的路由的能源成本。此外,发现使用提议的方法的入侵检测拓扑比基于电源的IDS形成了更小且连接更多的簇头集。结果,该提出的方法实质上达到了在多应用WSN中增强能源使用的研究目标。

著录项

  • 作者

    Gendreau, Audrey.;

  • 作者单位

    Nova Southeastern University.;

  • 授予单位 Nova Southeastern University.;
  • 学科 Computer Science.;Remote Sensing.;Information Technology.
  • 学位 Ph.D.
  • 年度 2014
  • 页码 115 p.
  • 总页数 115
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号