scholarly journals Study on the scale-free topology model with strong intrusion-tolerance ability in wireless sensor networks

2014 ◽  
Vol 63 (9) ◽  
pp. 090503
Author(s):  
Liu Hao-Ran ◽  
Yin Wen-Xiao ◽  
Dong Ming-Ru ◽  
Liu Bin
2018 ◽  
Vol 14 (9) ◽  
pp. 155014771880062 ◽  
Author(s):  
Yourui Huang ◽  
Zhenping Chen ◽  
Tao Han ◽  
Xiaotao Liu

Aimed at the limited energy supply and imperfect topological tolerance for underground wireless sensor networks, one energy-efficient random-walk scale-free topology model is proposed in this article, and a power network topology structure with adjustable rate index gets generated. At first, the network is divided into several clusters, and the cluster heads are selected with the use of random-walk strategy. During the growth of the network, with the introduction of preferred connection for scale-free network, together with considering both the node’s residual energy and the distance among nodes, nodes with larger residual energy present higher connectivity probability, so that the energy balance of the network gets realized. Simulation results show that the communication among the cluster heads selected by the proposed random-walk scale-free topology model presents not only the power-law characteristics of scale-free networks but also has better stability, higher fault tolerance, and it can still balance the energy consumption for nodes and the network and therefore can prolong the lifetime of the network.


2015 ◽  
Vol 19 (4) ◽  
pp. 625-628 ◽  
Author(s):  
Yuhui Jian ◽  
Erwu Liu ◽  
Zhengqing Zhang ◽  
Xinyu Qu ◽  
Rui Wang ◽  
...  

2017 ◽  
Vol 25 (5) ◽  
pp. 2944-2959 ◽  
Author(s):  
Tie Qiu ◽  
Aoyang Zhao ◽  
Feng Xia ◽  
Weisheng Si ◽  
Dapeng Oliver Wu

2019 ◽  
Vol 8 (2) ◽  
pp. 2074-2078

In an age where breaches occurrence is precisely numerous, it is essential to safeguard confidential figures including patron records, intellectual property, assessment and enlargement, prospect business plans, and all sorts of confidential facts more proficiently. It is substantial to administer a network to safeguard information. Cyber mugs tear into information systems, accertion in these attacks leads to node deterioration, hence a structure is obligatory which can combat cyber mugs to shield our information nodes in WSNs. To cope with these attacks we adopt an efficient technique for enhancing robustness of scale-free wireless sensor networks. Scale-free networks are not affected much by random thefts but they become defenseless against malicious theft. To overcome this shortcoming this paper presents an enhanced technique , here we have a MAX node which is enclosed with small rate nodes, each MAX node will be highly secured by adopting ROSE algorithm by altering edges keen on to a closed structure to upgrade robustness of a network . This phenomena is achieved by forming a scale-free topology using basic BA model. In this paper, work is done on two operations that is rate diversity and edge value operations, to mold system further vigorous to malicious attacks. System is further encrypted by providing every single node with a private key in a sub network.


Sign in / Sign up

Export Citation Format

Share Document