In wireless sensor networks, the high density of node’s distribution will result in transmission collision and energy dissipation of redundant data. To resolve the above problems, an energy-efficient sleep scheduling mechanism with similarity measure for wireless sensor networks (ESSM) is proposed, which will schedule the sensors into the active or sleep mode to reduce energy consumption effectively. Firstly, the optimal competition radius is estimated to organize the all sensor nodes into several clusters to balance energy consumption. Secondly, according to the data collected by member nodes, a fuzzy matrix can be obtained to measure the similarity degree, and the correlation function based on fuzzy theory can be defined to divide the sensor nodes into different categories. Next, the redundant nodes will be selected to put into sleep state in the next round under the premise of ensuring the data integrity of the whole network. Simulations and results show that our method can achieve better performances both in proper distribution of clusters and improving the energy efficiency of the networks with prerequisite of guaranteeing the data accuracy.
For resource-constrained IoT systems, data collection is one of the fundamental operations to reduce the energy dissipation of sensor nodes and improve the network lifetime. However, an anomaly or deviation will exert a great influence on the quality of data collected, especially for a data aggregation scheme. By taking into account dataaware clustering and detection of anomalous events, a similarity-aware data aggregation using a fuzzy c-means approach for wireless sensor networks is proposed. Firstly, by using a fuzzy c-means approach, the clustering process can be performed to organize sensors into clusters based on data similarity. Next, an effective support degree function is defined for further outlier diagnosis. Afterwards, the appropriate weight of valid data can be obtained by taking advantage of the probability distribution characteristics of normal samples within a certain period. Finally, the aggregation result in the cluster can be estimated. Practical database-based simulations have confirmed that the proposed data aggregation method can achieve better performance than traditional methods in terms of data outlier detection accuracy and relative recovery error.
The rapid development of wireless communications has brought endless new types of services or applications for human beings. The emergence of many kinds of communication equipments makes the public frequency band more and more crowded [1]. At present, most of the wireless communication systems employ fixed spectrum allocation mechanism. Only authorized users can be allowed to access the corresponding authorized spectrum resources, which will lead to inefficient usage of the licensed spectrum. From the report issued by International Telecommunication Union (ITU), there are still plenty of free spectrum resources within certain authorized bands at specific temporal and spatial scenarios. In cognitive radio (CR) system, by dynamically adjusting transmission power, carrier frequency, modulation and other parameters, SUs can utilize the spectrum holes as well as avoid interference with primary users (PUs). By applying cognitive radio technology, the SUs can fully access free authorized bands and apply suitable
To detect the primary user’s activity accurately in cognitive radio sensor networks, cooperative spectrum sensing is recommended to improve the sensing performance and the reliability of spectrum-sensing process. However, spectrum-sensing data falsification attack being launched by malicious users may lead to fatal mistake of global decision about spectrum availability at the fusion center. It is a tough task to mitigate the negative effect of spectrum-sensing data falsification attack and even eliminate these attackers from the network. In this article, we first discuss the randomly false attack model and analyze the effects of two classes of attacks, individual and collaborative, on the global sensing performance at the fusion center. Afterwards, a linear weighted combination scheme is designed to eliminate the effects of the attacks on the final sensing decision. By evaluating the received sensing result, each user can be assigned a weight related to impact factors, which includes result consistency degree and data deviation degree. Furthermore, an adaptive reputation evaluation mechanism is introduced to discriminate malicious and honest sensor node. The evaluation is conducted through simulations, and the results reveal the benefits of the proposed in aspect of mitigation of spectrum-sensing data falsification attack.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.