| Literature DB >> 26633405 |
Ying Zhang1, Wei Chen2, Jixing Liang3, Bingxin Zheng4, Shengming Jiang5.
Abstract
It is expected that in the near future wireless sensor network (WSNs) will be more widely used in the mobile environment, in applications such as Autonomous Underwater Vehicles (AUVs) for marine monitoring and mobile robots for environmental investigation. The sensor nodes' mobility can easily cause changes to the structure of a network topology, and lead to the decline in the amount of transmitted data, excessive energy consumption, and lack of security. To solve these problems, a kind of efficient Topology Control algorithm for node Mobility (TCM) is proposed. In the topology construction stage, an efficient clustering algorithm is adopted, which supports sensor node movement. It can ensure the balance of clustering, and reduce the energy consumption. In the topology maintenance stage, the digital signature authentication based on Error Correction Code (ECC) and the communication mechanism of soft handover are adopted. After verifying the legal identity of the mobile nodes, secure communications can be established, and this can increase the amount of data transmitted. Compared to some existing schemes, the proposed scheme has significant advantages regarding network topology stability, amounts of data transferred, lifetime and safety performance of the network.Entities:
Keywords: identity authentication; nodes mobility; security topology control; soft handover; wireless sensor network
Year: 2015 PMID: 26633405 PMCID: PMC4721703 DOI: 10.3390/s151229782
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1The schematic model of the network.
Figure 2The mobility of the nodes.
Figure 3The clustering flowchart.
Figure 4A schematic description of nodes’ mobility in a sensor network.
Figure 5The original random deployment of the nodes.
Figure 6The structure of network after the movement of 10% of the nodes.
Figure 7The clustering topology of network for a new round after nodes’ movement.
The topology change result after the movement of the nodes.
| A | B | C | D | E | F | ||
|---|---|---|---|---|---|---|---|
| Topology without movement | No. of cluster head | Base Station | 36 | 29 | 22 | 57 | 92 |
| Number of nodes | 16 | 17 | 16 | 17 | 13 | 16 | |
| Topology after movement | No. of cluster head | Base Station | 41 | 72 | 50 | 81 | 82 |
| Number of nodes | 15 | 15 | 18 | 15 | 15 | 17 | |
Figure 8The relationship of transmission data and the percentage of mobile nodes.
Figure 9The influence of nodes’ speed on the network death time.
Figure 10Comparison of the nodes’ survival numbers for three schemes.