• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Fu Xiuwen, Li Wenfeng, Duan Ying. Invulnerability of Clustering Wireless Sensor Network Towards Cascading Failures[J]. Journal of Computer Research and Development, 2016, 53(12): 2882-2892. DOI: 10.7544/issn1000-1239.2016.20150455
Citation: Fu Xiuwen, Li Wenfeng, Duan Ying. Invulnerability of Clustering Wireless Sensor Network Towards Cascading Failures[J]. Journal of Computer Research and Development, 2016, 53(12): 2882-2892. DOI: 10.7544/issn1000-1239.2016.20150455

Invulnerability of Clustering Wireless Sensor Network Towards Cascading Failures

More Information
  • Published Date: November 30, 2016
  • Current researches of cascading failures of wireless sensor network (WSN) mainly focus on peer-to-peer (P2P) structure. However, in real scenarios most of sensor networks always collect and deliver environmental data via clustering structure. Therefore, through observing the heterogeneity of connections in clustered networks, we construct a cascading failure model of wireless sensor network by introducing the concept of “sensing load” and “relay load”. Besides that, we discuss the relevant features between key parameters of cascading model and invulnerability of two typical clustering topologies (i.e., scale-free topology and random topology). In order to constrain the scale of cascading failures, we also discuss how to select cluster heads to enlarge their capacity to achieve this purpose. The simulation and theoretical results show that the network invulnerability is negatively correlated to the proportion of cluster heads p and positively correlated to the allocation coefficient A. When adjustment coefficient α=1, the invulnerability of the network is optimized. When adjustment coefficient α<1, choosing cluster heads with fewer cluster-cluster connections is a more efficient way to enhance the network invulnerability. When adjustment coefficient α>1, choosing cluster heads with more cluster-cluster connections is more cost-effective. When adjustment coefficient α=1, the scale of cascading failures is not related to the selecting schemes of cluster heads.
  • Related Articles

    [1]Jiang Zetao, Huang Qinyang, Zhang Huijuan, Jin Xin, Huang Jingfan, Liao Peiqi. Unpaired Low-Light Image Enhancement Method Based on Global Consistency[J]. Journal of Computer Research and Development, 2025, 62(4): 876-887. DOI: 10.7544/issn1000-1239.202330904
    [2]Qu Zhiguo, Chen Weilong, Sun Le, Liu Wenjie, Zhang Yanchun. ECG-QGAN: A ECG Generative Information System Based on Quantum Generative Adversarial Networks[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440527
    [3]Xue Zhihang, Xu Zheming, Lang Congyan, Feng Songhe, Wang Tao, Li Yidong. Text-to-Image Generation Method Based on Image-Text Semantic Consistency[J]. Journal of Computer Research and Development, 2023, 60(9): 2180-2190. DOI: 10.7544/issn1000-1239.202220416
    [4]Guo Zhengshan, Zuo Jie, Duan Lei, Li Renhao, He Chengxin, Xiao Yingjie, Wang Peiyan. A Generative Adversarial Negative Sampling Method for Knowledge Hypergraph Link Prediction[J]. Journal of Computer Research and Development, 2022, 59(8): 1742-1756. DOI: 10.7544/issn1000-1239.20220074
    [5]Dai Hong, Sheng Lijie, Miao Qiguang. Adversarial Discriminative Domain Adaptation Algorithm with CapsNet[J]. Journal of Computer Research and Development, 2021, 58(9): 1997-2012. DOI: 10.7544/issn1000-1239.2021.20200569
    [6]Qian Yaguan, He Niannian, Guo Yankai, Wang Bin, Li Hui, Gu Zhaoquan, Zhang Xuhong, Wu Chunming. An Evasion Algorithm to Fool Fingerprint Detector for Deep Neural Networks[J]. Journal of Computer Research and Development, 2021, 58(5): 1106-1117. DOI: 10.7544/issn1000-1239.2021.20200903
    [7]Yu Haitao, Yang Xiaoshan, Xu Changsheng. Antagonistic Video Generation Method Based on Multimodal Input[J]. Journal of Computer Research and Development, 2020, 57(7): 1522-1530. DOI: 10.7544/issn1000-1239.2020.20190479
    [8]Jiang Bin, Liu Hongyu, Yang Chao, Tu Wenxuan, Zhao Zilong. A Face Inpainting Algorithm with Local Attribute Generative Adversarial Networks[J]. Journal of Computer Research and Development, 2019, 56(11): 2485-2493. DOI: 10.7544/issn1000-1239.2019.20180656
    [9]Zhang Han, Guo Yuanbo, Li Tao. Domain Named Entity Recognition Combining GAN and BiLSTM-Attention-CRF[J]. Journal of Computer Research and Development, 2019, 56(9): 1851-1858. DOI: 10.7544/issn1000-1239.2019.20180733
    [10]Song Kehui, Zhang Ying, Zhang Jiangwei, Yuan Xiaojie. A Generative Model for Synthesizing Structured Datasets Based on GAN[J]. Journal of Computer Research and Development, 2019, 56(9): 1832-1842. DOI: 10.7544/issn1000-1239.2019.20180353
  • Cited by

    Periodical cited type(2)

    1. 陈传毅,戴卫军. 基于贝叶斯网的高维数据隐藏模式挖掘. 计算机仿真. 2021(01): 287-290+349 .
    2. 黄德胜. 社交网站数据采集与热点分析技术研究. 微型电脑应用. 2021(04): 66-69 .

    Other cited types(1)

Catalog

    Article views (1172) PDF downloads (386) Cited by(3)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return