[1]易琼,王珺. 恶劣环境下无线传感器网络数据存储策略研究[J].计算机技术与发展,2015,25(11):139-144.
 YI Qiong,WANG Jun. Research on Data Storage Strategy in Wireless Sensor Networks Deployed in Challenging Environments[J].,2015,25(11):139-144.
点击复制

 恶劣环境下无线传感器网络数据存储策略研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
25
期数:
2015年11期
页码:
139-144
栏目:
安全与防范
出版日期:
2015-11-10

文章信息/Info

Title:
 Research on Data Storage Strategy in Wireless Sensor Networks Deployed in Challenging Environments
文章编号:
1673-629X(2015)11-0139-06
作者:
 易琼王珺
 南京邮电大学 通信与信息工程学院
Author(s):
 YI QiongWANG Jun
关键词:
 数据存储间歇式连接传感器网络数据重分配数据复制
Keywords:
 data storageintermittently connected sensor networksdata redistributiondata replication
分类号:
TP393
文献标志码:
A
摘要:
 在恶劣环境下,无线传感器网络需要长时间监测大量数据,因而没有必要部署高功率的基站以收集实时的数据,而网络内节点包括sink节点在内又会由于各种原因(电池耗尽、敌人攻击、自然灾害等)发生故障,因此如何高效地存储感知数据成为恶劣环境下无线传感器网络的一个关键问题.文中对恶劣环境下无线传感器网络中已有的数据存储策略进行了综述.首先概述了无线传感器网络的结构模型和能量模型;然后详细探讨了各种数据存储策略,从引发节点失效的不同原因以及不同的优化目标对其进行分类,重点介绍了各存储策略的核心思想,并从适用性、节点能耗、网络生命周期等方面分析了各种实现方案的优缺点;最后给出了研究结论,并指出了该问题的进一步研究方向.
Abstract:
 In challenging environment,wireless sensor networks need to take a long time to monitor a large number of data,thus there is no need to deploy high-powered base stations to collect real-time data. Furthermore,sensor nodes including sink nodes may fail due to various reasons (battery depletion,enemy attacks and natural disasters) ,therefore,how to efficiently store sensory data in such cases be-comes a key issue. It reviews the existing data storage strategies for wireless sensor networks under harsh environments. First,the network model and energy model are introduced,then various data storage strategies are summarized,and classification is given from the perspec-tive of different causes of node failures and different optimization goals. Following that,the core idea of each storage strategy is discussed in detail. Meanwhile,their advantages and disadvantages are analyzed in terms of applicability,energy consumption and lifetime of net-work. Finally,some conclusions and potential future research directions for this problem are pointed out.

相似文献/References:

[1]刘翔 程文青 刘威.一种从XML建立关系数据库的模式映射方法[J].计算机技术与发展,2007,(02):1.
 LIU Xiang,CHENG Wen-qing,LIU Wei.Method of Constructing Relational Database from XML Based on Schema- Mapping[J].,2007,(11):1.
[2]柳向斌 张志勇 黄涛.基于数据仓库环境下的数据可用性研究[J].计算机技术与发展,2006,(05):16.
 LIU Xiang-bin,ZHANG Zhi-yong,HUANG Tao.Research of Data Usability Based on Data Warehouse[J].,2006,(11):16.
[3]刘哲哿 刘晓洁 刘仕一.源结构无关的数据库备份系统的设计与实现[J].计算机技术与发展,2011,(02):5.
 LIU Zhe-ge,LIU Xiao-jie,LIU Shi-yi.Design and Implementation of Source-Structure-Independent Database Backup System[J].,2011,(11):5.
[4]倪红军.基于Android系统的数据存储访问机制研究[J].计算机技术与发展,2013,(06):90.
 NI Hong-jun.Study of Data Storage Access Mechanism Based on Android System[J].,2013,(11):90.
[5]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(11):1.
[6]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(11):5.
[7]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(11):13.
[8]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(11):21.
[9]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(11):25.
[10]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(11):29.
[11]徐芳辰[],沈苏彬[]. 一种基于OpenStack的云存储方案[J].计算机技术与发展,2015,25(11):76.
 XU Fang-chen[],SHEN Su-bin[]. A Cloud Storage Solution Based on OpenStack[J].,2015,25(11):76.
[12]肖洁,袁嵩,谭天. 大数据时代数据隐私安全研究[J].计算机技术与发展,2016,26(05):91.
 XIAO Jie,YUAN Song,TAN Tian. Research on Data Privacy in Big Data Age[J].,2016,26(11):91.
[13]张龙昌,刘冬升,杨艳红,等. 数字图书馆云计算研究[J].计算机技术与发展,2016,26(08):98.
 ZHANG Long-chang,LIU Dong-sheng,YANG Yan-hong,et al. Research on Cloud Computing for Digital Library[J].,2016,26(11):98.

更新日期/Last Update: 2016-01-05