Abstract

An Invulnerability Algorithm for Wireless Sensor Network's Topology Based on Distance and Energy

Highlights

  • To improve the topological stability of wireless sensor networks, an anti-destructive algorithm based on energy-aware weighting is proposed

  • Using topology control to improve the invulnerability of the network and ensure the ability to perform various complex tasks is important for wireless sensing network applications [5, 6]

  • Topology control is the process of selecting neighbour nodes with certain rules and forming an optimal network structure, which is the basis of network implementation protocol, and the topological structure is the foundation of network survival

Read more

Summary

NTRODUCTION

The fifth-generation (5G) technology is booming and growing rapidly. 5G technology promotes the application of sensor nodes to the narrowband Internet of Things (NB-IoT) deployment scheme with low latency and high rate transmission [1]. To extend the life of the sensor nodes in the topology, Barabási et al [7] proposed a scale-free network model to characterize the large scale properties of complex networks, which has the characteristics of a power-law distribution. To achieve good robustness in the harsh environment, Zheng and Liu [19] constructed a scale-free network model, but they did not consider the influence of communication radius on node energy consumption, resulting in a shorter network lifetime. For balancing the energy consumption of nodes, Sun et al. Wen-bai CHEN et al.: An Invulnerability Algorithm for Wireless Sensor Network's Topology Based on Distance and Energy [22] proposed an energy-aware weighted dynamic topology control (WDTC) algorithm based on MST to consider residual energy information in connected topology construction. From the perspective of the antidestruction of wireless sensor networks, an energyweighted topological invulnerability control algorithm (EWTIC) is proposed to construct the network and is further verified by simulation

RELEVANT KNOWLEDGE AND RELATED DEFINITIONS
Related Definitions
Energy Model
AN ENERGY-WEIGHTED TOPOLOGY INVULNERABILITY ALGORITHM
LMST Algorithm
WDTC Algorithm
An Energy-weighted Topology Invulnerability Algorithm
EWITC Algorithm
Algorithm Steps
Topology Diagram
SIMULATION AND ANALYSIS
Performance Evolution
Robustness
Betweenness Centrality
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.