• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Qin, Wan Yadong, Li Lei, and Duan Shihong. Multi-Channel Reliability Modeling and Analysis for IEEE802.15.4 in Industrial Environment[J]. Journal of Computer Research and Development, 2009, 46(12): 1971-1984.
Citation: Wang Qin, Wan Yadong, Li Lei, and Duan Shihong. Multi-Channel Reliability Modeling and Analysis for IEEE802.15.4 in Industrial Environment[J]. Journal of Computer Research and Development, 2009, 46(12): 1971-1984.

Multi-Channel Reliability Modeling and Analysis for IEEE802.15.4 in Industrial Environment

More Information
  • Published Date: December 14, 2009
  • Wireless sensor network protocol design is highly depended on the link characteristics of the network environment. In real application field, link reliability is vulnerable to environment interferences. But there are little works which reveal the temporal variation and multi-channel difference characteristics of the link reliability. The authors present a statistics approach according to the temporal and frequency characteristics of link reliability in industrial environment. Two variables, i.e. packet drop rate (PDR) and packet drop sequence (PDS) are introduced to describe the relationship of link reliability with time and frequency. Through the measurements in typical environments like iron and steel factory and experimental factory in USTB with IEEE 802.15.4 compliant transceivers, it is found that the PDR of a certain range follows logistic distribution or log-logistic distribution, and the interval between two dropped packets for a given PDR follows lognormal distribution as well. Furthermore, based on the analysis of the link reliability, a link layer statistical model is presented and two proposals for IEEE802.15.4e are evaluated on the new model. The simulation results show that the network reliability can be improved when taking the statistic characteristics of the link variations into consideration in the design of high reliable protocols.
  • Related Articles

    [1]Zhang Lei, He Chongde, Wei Lifei. Efficient and Malicious Secure Three-Party Private Set Intersection Computation Protocols for Small Sets[J]. Journal of Computer Research and Development, 2022, 59(10): 2286-2298. DOI: 10.7544/issn1000-1239.20220471
    [2]Ma Haiyan, Liang Yongquan, Ji Shujuan, Li Da. A Trust-Distrust Based Reputation Attacks Defending Strategy and Its Stability Analysis[J]. Journal of Computer Research and Development, 2018, 55(12): 2685-2702. DOI: 10.7544/issn1000-1239.2018.20170587
    [3]Sun Yong, Tan Wenan, Jin Ting, Zhou Liangguang. A Collaborative Collusion Detection Method Based on Online Clustering[J]. Journal of Computer Research and Development, 2018, 55(6): 1320-1332. DOI: 10.7544/issn1000-1239.2018.20170231
    [4]Wang Tiefeng, Cai Ying, Zhang Yujie. Reputation-Based Defense Scheme Against Pollution Attacks on Network Coding[J]. Journal of Computer Research and Development, 2016, 53(11): 2491-2499. DOI: 10.7544/issn1000-1239.2016.20150502
    [5]Hu Jianli, Zhou Bin, Wu Quanyuan, Li Xiaohua. A Reputation Based Attack-Resistant Distributed Trust Management Model for P2P Networks[J]. Journal of Computer Research and Development, 2011, 48(12): 2235-2241.
    [6]Miao Guangsheng, Feng Dengguo, Su Purui. A Collusion Detector Based on Fuzzy Logic in P2P Trust Model[J]. Journal of Computer Research and Development, 2011, 48(12): 2187-2200.
    [7]Xie Zhen, Bi Jingping, Li Ye. A Consecutive-Behaviors-Observing-Based Neighbor Evaluation Model in P2P Network[J]. Journal of Computer Research and Development, 2010, 47(6): 1098-1106.
    [8]Jin Yu, Gu Zhimin, and Ban Zhijie. A New Reputation Management Mechanism Based on Bi-Ratings in Peer-to-Peer Systems[J]. Journal of Computer Research and Development, 2008, 45(6).
    [9]Wu Peng, Wu Guoxin, and Fang Qun. A Reputation-Based Trust Model Based on Probability and Statistics for P2P Systems[J]. Journal of Computer Research and Development, 2008, 45(3): 408-416.
    [10]Wu Peng, Wu Guoxin, and Fang Qun. A Reputation-Based Trust Model Based on Probability and Statistics for P2P Systems[J]. Journal of Computer Research and Development, 2008, 45(3): 408-416.

Catalog

    Article views (687) PDF downloads (466) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return