Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 1 of 1
Full-Text Articles in Computer Engineering
A Network Topology Control And Identity Authentication Protocol With Support For Movable Sensor Nodes, Ying Zhang, Wei Chen, Jixing Liang, Bingxin Zheng, Shengming Jiang
A Network Topology Control And Identity Authentication Protocol With Support For Movable Sensor Nodes, Ying Zhang, Wei Chen, Jixing Liang, Bingxin Zheng, Shengming Jiang
Computer Science Faculty Research
It is expected that in the near future wireless sensor network (WSNs) will be more widely used in the mobile environment, in applications such as Autonomous Underwater Vehicles (AUVs) for marine monitoring and mobile robots for environmental investigation. The sensor nodes’ mobility can easily cause changes to the structure of a network topology, and lead to the decline in the amount of transmitted data, excessive energy consumption, and lack of security. To solve these problems, a kind of efficient Topology Control algorithm for node Mobility (TCM) is proposed. In the topology construction stage, an efficient clustering algorithm is adopted, which …