• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Fu Xiuwen, Li Wenfeng, Duan Ying. Invulnerability of Clustering Wireless Sensor Network Towards Cascading Failures[J]. Journal of Computer Research and Development, 2016, 53(12): 2882-2892. DOI: 10.7544/issn1000-1239.2016.20150455
Citation: Fu Xiuwen, Li Wenfeng, Duan Ying. Invulnerability of Clustering Wireless Sensor Network Towards Cascading Failures[J]. Journal of Computer Research and Development, 2016, 53(12): 2882-2892. DOI: 10.7544/issn1000-1239.2016.20150455

Invulnerability of Clustering Wireless Sensor Network Towards Cascading Failures

More Information
  • Published Date: November 30, 2016
  • Current researches of cascading failures of wireless sensor network (WSN) mainly focus on peer-to-peer (P2P) structure. However, in real scenarios most of sensor networks always collect and deliver environmental data via clustering structure. Therefore, through observing the heterogeneity of connections in clustered networks, we construct a cascading failure model of wireless sensor network by introducing the concept of “sensing load” and “relay load”. Besides that, we discuss the relevant features between key parameters of cascading model and invulnerability of two typical clustering topologies (i.e., scale-free topology and random topology). In order to constrain the scale of cascading failures, we also discuss how to select cluster heads to enlarge their capacity to achieve this purpose. The simulation and theoretical results show that the network invulnerability is negatively correlated to the proportion of cluster heads p and positively correlated to the allocation coefficient A. When adjustment coefficient α=1, the invulnerability of the network is optimized. When adjustment coefficient α<1, choosing cluster heads with fewer cluster-cluster connections is a more efficient way to enhance the network invulnerability. When adjustment coefficient α>1, choosing cluster heads with more cluster-cluster connections is more cost-effective. When adjustment coefficient α=1, the scale of cascading failures is not related to the selecting schemes of cluster heads.
  • Related Articles

    [1]Yu Zishu, Wang Yifan, Zeng Chen, Zhang Xingzhou, Peng Xiaohui, Xu Zhiwei. Grip System for Multi-Runtime Support in Things-Edge-Cloud Collaborative Applications[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440676
    [2]Zhang Xiaodong, Zhang Chaokun, Zhao Jijun. State-of-the-Art Survey on Edge Intelligence[J]. Journal of Computer Research and Development, 2023, 60(12): 2749-2769. DOI: 10.7544/issn1000-1239.202220192
    [3]Wang Rui, Qi Jianpeng, Chen Liang, Yang Long. Survey of Collaborative Inference for Edge Intelligence[J]. Journal of Computer Research and Development, 2023, 60(2): 398-414. DOI: 10.7544/issn1000-1239.202110867
    [4]Zhang Wenzhu, Yu Jinghua. Task Offloading Strategy in Mobile Edge Computing Based on Cloud-Edge-End Cooperation[J]. Journal of Computer Research and Development, 2023, 60(2): 371-385. DOI: 10.7544/issn1000-1239.202110803
    [5]Su Mingfeng, Wang Guojun, Li Renfa. Resource Deployment with Prediction and Task Scheduling Optimization in Edge Cloud Collaborative Computing[J]. Journal of Computer Research and Development, 2021, 58(11): 2558-2570. DOI: 10.7544/issn1000-1239.2021.20200621
    [6]Huang Qianyi, Li Zhiyang, Xie Wentao, Zhang Qian. Edge Computing in Smart Homes[J]. Journal of Computer Research and Development, 2020, 57(9): 1800-1809. DOI: 10.7544/issn1000-1239.2020.20200253
    [7]Yue Guangxue, Dai Yasheng, Yang Xiaohui, Liu Jianhua, You Zhenxu, Zhu Youkang. Model of Trusted Cooperative Service for Edge Computing[J]. Journal of Computer Research and Development, 2020, 57(5): 1080-1102. DOI: 10.7544/issn1000-1239.2020.20190077
    [8]Shi Weisong, Zhang Xingzhou, Wang Yifan, Zhang Qingyang. Edge Computing: State-of-the-Art and Future Directions[J]. Journal of Computer Research and Development, 2019, 56(1): 69-89. DOI: 10.7544/issn1000-1239.2019.20180760
    [9]Deng Xiaoheng, Guan Peiyuan, Wan Zhiwen, Liu Enlu, Luo Jie, Zhao Zhihui, Liu Yajun, Zhang Honggang. Integrated Trust Based Resource Cooperation in Edge Computing[J]. Journal of Computer Research and Development, 2018, 55(3): 449-477. DOI: 10.7544/issn1000-1239.2018.20170800
    [10]Zhao Ziming, Liu Fang, Cai Zhiping, Xiao Nong. Edge Computing: Platforms, Applications and Challenges[J]. Journal of Computer Research and Development, 2018, 55(2): 327-337. DOI: 10.7544/issn1000-1239.2018.20170228

Catalog

    Article views (1172) PDF downloads (386) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return