透過您的圖書館登入
IP:3.144.253.161
  • 學位論文

以人工蜂群演算法延長無線感測網路之生命期

An Artificial Bee Colony besed Algorithm to Extend Network Lifetime in Wireless Sensor Networks

指導教授 : 陳榮靜
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


由於在無線感測網路(Wireless Sensor Networks, WSNs)中的感測節點感測到的資料(溫度、濕度、壓力等)通常具有保密性和完整性,因此在我們先前的研究中提出輕量化無線感測網路入侵偵測系統,透過巡守節點(Patrol Node)以巡迴方式傳送攻擊特徵封包,偵測異常的感測節點,但攻擊特徵封包在巡守節點之間若沒有一條良好的傳送路徑,會造成感測節點的電池能源消耗快速,而降低整個無線網路的生命期。本研究為巡守節點的高耗能傳送攻擊特徵封包路徑問題做探討,利用人工蜂群(Artificial Bee Colony, ABC)演算法,找出一條低耗能的路徑來傳送攻擊特徵封包,以提升整體無線感測網路能源效率。本研究提出的方法共分為三個階段,初始化階段、工蜂階段與旁觀者蜂階段。在初始化階段隨機產生1組的路徑後,工蜂階段與旁觀者蜂階段會被重複執行以更新路徑直到滿足最大的迴圈次數,而最短的路徑在每次迴圈結束後會被儲存下來。本實驗結果顯示本研究提出的方法可以有效的節省感測節點的能源,而延長無線感測網路的生命期。

並列摘要


Due to the sensed data (temperature, humidity, pressure and so on) of sensor nodes need to consider the confidentiality and integrity in Wireless Sensor Network (WSN), an intrusion detection system called patrol intrusion detection system (PIDS) is proposed. The PIDS transmits an attack feature packet by roam way among patrol nodes to detect malicious sensor nodes. However, if there is not good roam path to transmit attack feature packet, sensor nodes'' battery energy will consume rapidly to make WSN lifetime reduce. Artificial Bee Colony (ABC) algorithm is utilized to find a low power consumption path for transmitting attack feature packet and promoting energy efficiency in WSN. The method of the research is divided into three phases, initialization phase, employed bees phase and onlooker bees phase. In initialization phase, the method will randomly create a population of initial path. After that, the employed bees phase and the onlooker bees phase are invoked iteratively until the maximum iteration number is reached. The shortest path after each cycle is registered. The experiment result indicates that ABC-based algorithm can save battery energy consumption of sensor nodes effectively, so that WSN lifetime is extended.

參考文獻


[1] 林志偉(2005),「在無線隨機感測器網路中高效率及能源節省之多播傳輸協定」,碩士論文,電腦與通信工程研究所。
[5] K. Akkaya and M. Youngish(2005), “A Survey on Routing Protocols for Wireless Sensor Networks,” Ad Hoc Network, vol. 3, no. 3, pp. 325-349.
[6] G. Anastasi, M. Conti, M. D. Francesco, and A. Passarella(2009), “Energy Conservation in Wireless Sensor Networks : A survey,” Ad Hoc Networks, vol.7, no. 3, pp. 537-568.
[9] D. I. Curiac, M. Plastoi, O. Banias, and C. Volosencu(2010), “Software Development for Malicious Nodes Discovery in Wireless Sensor Network Security,” Fourth International Conference on Sensor Technologies and Applications, pp. 402-407.
[10] M. Dorigo, M. Birattari, and T. Stutzle(2006), “Ant Colony Optimization,” IEEE Computational Intelligence Magazine, vol. 1, no. 4. pp. 28-39.

延伸閱讀