淡江大學機構典藏:Item 987654321/35169
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 62797/95867 (66%)
Visitors : 3739234      Online Users : 419
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/35169


    Title: 在無線行動感測網路中保護一易受入侵之區域
    Other Titles: On protecting a vulnerable area in mobile sensor networks
    Authors: 鄭建華;Cheng, Chien-hua
    Contributors: 淡江大學資訊工程學系碩士班
    石貴平;Shih, Kuei-ping
    Keywords: 行動感測網路;覆蓋能力;入侵者;感測薄弱區域;Mobile Sensor Networks;Coverage;Voronoi Diagram;Intruder;Vulnerable Area
    Date: 2008
    Issue Date: 2010-01-11 06:06:22 (UTC+8)
    Abstract: 隨著無線通訊的進步,以往的軍事戰場上皆利用派駐軍隊來保護自己的疆土。如今,即可利用感測器的感測能力來進行入侵者偵測,減少防守時所需消耗的人力資源。本篇論文探討在無線感測網路中,如何使網路被認為是很重要的區域不成為受到Sensor Nodes感測能力最薄弱路徑的一部分,進而達到防禦的目的。本論文提出一個藉由Sensor Nodes的移動來改變網路上入侵者入侵的路徑,使之不入侵網路上的Vulnerable Area,因為Vulnerable Area視為一很重要的區域。為了避免消耗過多Sensor Nodes的電量,本篇論文所提出的演算法只需移動少數的Sensor Nodes,即可改變網路上受到Sensor Nodes感測能力最薄弱的路徑,並且解決了Sensor Nodes移動後仍再進入Vulnerable Area的問題,由於每個Sensor Nodes的剩餘電量不一,因此亦考慮了所移動的Sensor Nodes是否有足夠的電量進行移動,以完成改變入侵者入侵的路徑。實驗結果顯示出,本論文所提出的方法可以使Sensor Nodes以較少的移動消耗電量與移動的Sensor Nodes個數,使得網路中受到Sensor Nodes感測能力最薄弱的路徑不再經過Vulnerable Area,且達到節省電量的效果。
    This thesis discusses on how to let the vulnerable area in the network will not be affected by the sensor node''s sensing ability as the weakest path of the network in wireless sensor networks. This paper addresses by moving sensor nodes to change the vulnerable path in the network so that it does not cross the vulnerable area in the network, hence it achieves the purpose of defense. In order to avoid excessive consumption of electricity to the sensor nodes, the algorithms which this paper proposed only deals with moving a small number of paths to the sensor nodes, then by using the sensor node''s sensing ability it then can detect the weakest path. The simulation results shows that the proposed VAPM algorithm can reduce the total energy consumption for changing the vulnerable path, and the energy consumption will not affected by network density and the radius of the vulnerable area.
    Appears in Collections:[Graduate Institute & Department of Computer Science and Information Engineering] Thesis

    Files in This Item:

    File SizeFormat
    0KbUnknown253View/Open

    All items in 機構典藏 are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback