Skip to main content
Erschienen in: Annals of Telecommunications 7-8/2019

05.12.2018

Three-dimensional Voronoi Diagram–based Self-deployment Algorithm in IoT Sensor Networks

verfasst von: Xiaojiang Tang, Li Tan, Anbar Hussain, Minji Wang

Erschienen in: Annals of Telecommunications | Ausgabe 7-8/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the rapid development of 4G/5G technology and the Internet of Things (IoT), data security and privacy problems are becoming more serious. Wireless sensor networks (WSNs), as the main data source of IoT, are an important stage to ensure data availability and data privacy protection. In this paper, a novel deployment algorithm for 3D WSNs based on the Voronoi diagram is proposed. The algorithm uses the characteristics of adjacency and fast partition of the Voronoi diagram to realize fast division of the 3D monitoring area, calculates the center of each Voronoi area as the latest position of node, repeatedly builds the Voronoi diagram to maximize the coverage of the monitoring area, and maximizes the availability and integrity of data. At the same time, the 4G/5G communication technology is used to realize communication between nodes, and data encryption is used to improve data security. An improved algorithm is also proposed to adapt to different deployment conditions. In this paper, data and privacy security are protected from data sources, and the effectiveness of the algorithm is tested by computer simulation.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Liang C, Wang X, Zhang X, Zhang Y, Sharif K, Tan YA (2018) A payload-dependent packet rearranging covert channel for mobile VoIP traffic. Inf Sci 465:162–173CrossRef Liang C, Wang X, Zhang X, Zhang Y, Sharif K, Tan YA (2018) A payload-dependent packet rearranging covert channel for mobile VoIP traffic. Inf Sci 465:162–173CrossRef
3.
Zurück zum Zitat Zhang X, Liang C, Zhang Q, Li Y, Zheng J, Tan YA (2018) Building covert timing channels by packet rearrangement over mobile networks. Inf Sci 445-446:66–78MathSciNetCrossRef Zhang X, Liang C, Zhang Q, Li Y, Zheng J, Tan YA (2018) Building covert timing channels by packet rearrangement over mobile networks. Inf Sci 445-446:66–78MathSciNetCrossRef
4.
Zurück zum Zitat Tan YA, Xue Y, Liang C, Zheng J, Zhang Q, Zheng J, Li Y (2018) A root privilege management scheme with revocable authorization for android devices. J Netw Comput Appl 107:69–82CrossRef Tan YA, Xue Y, Liang C, Zheng J, Zhang Q, Zheng J, Li Y (2018) A root privilege management scheme with revocable authorization for android devices. J Netw Comput Appl 107:69–82CrossRef
5.
Zurück zum Zitat Liang C, Tan YA, Zhang X, Wang X, Zheng J, Zhang Q (2018) Building packet length covert channel over mobile VoIP traffics. J Netw Comput Appl 118:144–153CrossRef Liang C, Tan YA, Zhang X, Wang X, Zheng J, Zhang Q (2018) Building packet length covert channel over mobile VoIP traffics. J Netw Comput Appl 118:144–153CrossRef
6.
Zurück zum Zitat Xue Y, Tan YA, Liang C, Zhang CY, Zheng J (2018) An optimized data hiding scheme for deflate codes. Soft Comput 22(13):4445–4455CrossRef Xue Y, Tan YA, Liang C, Zhang CY, Zheng J (2018) An optimized data hiding scheme for deflate codes. Soft Comput 22(13):4445–4455CrossRef
7.
Zurück zum Zitat Guan Z, Li J, Wu L, Zhang Y, Wu J, Du X (2017) Achieving efficient and secure data acquisition for cloud-supported internet of things in smart grid. IEEE Internet Things J 4(6):1934–1944 Guan Z, Li J, Wu L, Zhang Y, Wu J, Du X (2017) Achieving efficient and secure data acquisition for cloud-supported internet of things in smart grid. IEEE Internet Things J 4(6):1934–1944
8.
Zurück zum Zitat Guan Z, Si G, Zhang X, Wu L, Guizani N, Du X, Ma Y (2018) Privacy-preserving and efficient aggregation based on blockchain for power grid communications in smart communities. IEEE Commun Mag 56(7):1–7CrossRef Guan Z, Si G, Zhang X, Wu L, Guizani N, Du X, Ma Y (2018) Privacy-preserving and efficient aggregation based on blockchain for power grid communications in smart communities. IEEE Commun Mag 56(7):1–7CrossRef
9.
Zurück zum Zitat Rawat P, Singh KD, Chaouchi H, Bonnin JM (2014) Wireless sensor networks: a survey on recent developments and potential synergies. J Supercomput 68(1):1–48CrossRef Rawat P, Singh KD, Chaouchi H, Bonnin JM (2014) Wireless sensor networks: a survey on recent developments and potential synergies. J Supercomput 68(1):1–48CrossRef
10.
Zurück zum Zitat Winkler M, Tuchs KD, Hughes K, Barclay G (2008) Theoretical and practical aspects of military wireless sensor networks. Journal of Telecommunications & Information Technology 12(4):263–264 Winkler M, Tuchs KD, Hughes K, Barclay G (2008) Theoretical and practical aspects of military wireless sensor networks. Journal of Telecommunications & Information Technology 12(4):263–264
11.
Zurück zum Zitat Fan L, Lei X, Yang N, Duong TQ, Karagiannidis GK (2016) Secure multiple amplify-and-forward relaying with cochannel interference. IEEE J Sel Top Sign Proces 10(8):1494–1505CrossRef Fan L, Lei X, Yang N, Duong TQ, Karagiannidis GK (2016) Secure multiple amplify-and-forward relaying with cochannel interference. IEEE J Sel Top Sign Proces 10(8):1494–1505CrossRef
12.
Zurück zum Zitat Li Y, Wang G, Nie L, Wang Q, Tan W (2018) Distance metric optimization driven convolutional neural network for age invariant face recognition. Pattern Recogn 75:51–62 Li Y, Wang G, Nie L, Wang Q, Tan W (2018) Distance metric optimization driven convolutional neural network for age invariant face recognition. Pattern Recogn 75:51–62
13.
Zurück zum Zitat Lin W, Wu Z, Lin L, Wen A, Li J (2017) An ensemble random forest algorithm for insurance big data analysis. Ieee Access 5:16568–16575 Lin W, Wu Z, Lin L, Wen A, Li J (2017) An ensemble random forest algorithm for insurance big data analysis. Ieee Access 5:16568–16575
14.
Zurück zum Zitat Zhou Z, Dong M, Ota K, Wang G, Yang LT (2016) Energy-efficient resource allocation for d2d communications underlaying cloud-ran-based lte-a networks. IEEE Internet Things J 3(3):428–438CrossRef Zhou Z, Dong M, Ota K, Wang G, Yang LT (2016) Energy-efficient resource allocation for d2d communications underlaying cloud-ran-based lte-a networks. IEEE Internet Things J 3(3):428–438CrossRef
15.
Zurück zum Zitat Lin W, Xu SY, Li J, Xu L, Peng Z (2015) Design and theoretical analysis of virtual machine placement algorithm based on peak workload characteristics. Soft Comput 27(7):1–14MATH Lin W, Xu SY, Li J, Xu L, Peng Z (2015) Design and theoretical analysis of virtual machine placement algorithm based on peak workload characteristics. Soft Comput 27(7):1–14MATH
16.
Zurück zum Zitat He P, Deng Z, Wang H, Liu Z (2016) Model approach to grammatical evolution: theory and case study. Soft Comput 20(9):3537–3548CrossRefMATH He P, Deng Z, Wang H, Liu Z (2016) Model approach to grammatical evolution: theory and case study. Soft Comput 20(9):3537–3548CrossRefMATH
17.
Zurück zum Zitat Zheng J, Tan YA, Zhang Q, Zhang X, Zhu L, Zhang Q (2018) Cross-cluster asymmetric group key agreement for wireless sensor networks. Sci China Inf Sci 61(4):048103MathSciNetCrossRef Zheng J, Tan YA, Zhang Q, Zhang X, Zhu L, Zhang Q (2018) Cross-cluster asymmetric group key agreement for wireless sensor networks. Sci China Inf Sci 61(4):048103MathSciNetCrossRef
18.
Zurück zum Zitat Wang H, Wang W, Cui Z, Zhou X, Zhao J, Li Y (2018) A new dynamic firefly algorithm for demand estimation of water resources. Inf Sci 438:95–106MathSciNetCrossRef Wang H, Wang W, Cui Z, Zhou X, Zhao J, Li Y (2018) A new dynamic firefly algorithm for demand estimation of water resources. Inf Sci 438:95–106MathSciNetCrossRef
19.
Zurück zum Zitat Lin TY, Santoso HA, Wu KR, Wang GL (2017) Enhanced deployment algorithms for heterogeneous directional mobile sensors in a bounded monitoring area. IEEE Trans Mob Comput 16(3):744–758 Lin TY, Santoso HA, Wu KR, Wang GL (2017) Enhanced deployment algorithms for heterogeneous directional mobile sensors in a bounded monitoring area. IEEE Trans Mob Comput 16(3):744–758
20.
Zurück zum Zitat Sun Z, Zhang Q, Li Y, & Tan YA (2016). Dppdl: a dynamic partial-parallel data layout for green video surveillance storage. IEEE Trans Circuits Syst Video Technol, pp(99):1–1 Sun Z, Zhang Q, Li Y, & Tan YA (2016). Dppdl: a dynamic partial-parallel data layout for green video surveillance storage. IEEE Trans Circuits Syst Video Technol, pp(99):1–1
21.
Zurück zum Zitat Sung TW, Yang CS (2014) Voronoi-based coverage improvement approach for wireless directional sensor networks. J Netw Comput Appl 39(1):202–213CrossRef Sung TW, Yang CS (2014) Voronoi-based coverage improvement approach for wireless directional sensor networks. J Netw Comput Appl 39(1):202–213CrossRef
22.
Zurück zum Zitat Watfa MK (2006) Coverage issues in wireless sensor networks[D]. The University of Oklahoma, Oklahoma Watfa MK (2006) Coverage issues in wireless sensor networks[D]. The University of Oklahoma, Oklahoma
23.
Zurück zum Zitat Yu X, Zhang C, Xue Y, Zhu H, Li Y, Tan YA (2017) An extra-parity energy saving data layout for video surveillance. Multimedia Tools Appl 77(C):1–21 Yu X, Zhang C, Xue Y, Zhu H, Li Y, Tan YA (2017) An extra-parity energy saving data layout for video surveillance. Multimedia Tools Appl 77(C):1–21
25.
Zurück zum Zitat Li F, Luo J, Wang W, He Y (2015) Autonomous deployment for load balancing, surface coverage in sensor networks. Wireless Commun IEEE Trans on Wireless 14(1):279–293CrossRef Li F, Luo J, Wang W, He Y (2015) Autonomous deployment for load balancing, surface coverage in sensor networks. Wireless Commun IEEE Trans on Wireless 14(1):279–293CrossRef
26.
Zurück zum Zitat Brown T, Wang Z, Shan T, Wang F, & Xue J (2016). On wireless video sensor network deployment for 3D indoor space coverage. Southeastcon. IEEE pp. 1–8 Brown T, Wang Z, Shan T, Wang F, & Xue J (2016). On wireless video sensor network deployment for 3D indoor space coverage. Southeastcon. IEEE pp. 1–8
27.
Zurück zum Zitat Temel S, Unaldi N, Kaynak O (2013) On deployment of wireless sensors on 3-d terrains to maximize sensing coverage by utilizing cat swarm optimization with wavelet transform. IEEE Trans Syst Man Cybern Syst Hum 44(1):111–120CrossRef Temel S, Unaldi N, Kaynak O (2013) On deployment of wireless sensors on 3-d terrains to maximize sensing coverage by utilizing cat swarm optimization with wavelet transform. IEEE Trans Syst Man Cybern Syst Hum 44(1):111–120CrossRef
28.
Zurück zum Zitat Akbarzadeh V, Gagne C, Parizeau M, Argany M, Mostafavi MA (2013) Probabilistic sensing model for sensor placement optimization based on line-of-sight coverage. IEEE Trans Instrum Meas 62(2):293–303CrossRef Akbarzadeh V, Gagne C, Parizeau M, Argany M, Mostafavi MA (2013) Probabilistic sensing model for sensor placement optimization based on line-of-sight coverage. IEEE Trans Instrum Meas 62(2):293–303CrossRef
29.
Zurück zum Zitat Topcuoglu HR, Ermis M, Sifyan M (2011) Positioning and utilizing sensors on a 3-d terrain part ii—solving with a hybrid evolutionary algorithm. IEEE Trans Syst Man Cybern Part C Appl Rev 41(4):470–480CrossRef Topcuoglu HR, Ermis M, Sifyan M (2011) Positioning and utilizing sensors on a 3-d terrain part ii—solving with a hybrid evolutionary algorithm. IEEE Trans Syst Man Cybern Part C Appl Rev 41(4):470–480CrossRef
30.
Zurück zum Zitat Li X, Ci L, Yang M, Tian C, Li X (2012) Deploying three-dimensional mobile sensor networks based on virtual forces algorithm. Commun Comput Inform Sci 334:204–216CrossRef Li X, Ci L, Yang M, Tian C, Li X (2012) Deploying three-dimensional mobile sensor networks based on virtual forces algorithm. Commun Comput Inform Sci 334:204–216CrossRef
31.
Zurück zum Zitat Boufares N, Khoufi I, Minet P, Saidane L, Ben Saied Y (2015) Three dimensional mobile wireless sensor networks redeployment based on virtual forces. In: 2015 International Wireless Communications and Mobile Computing Conference (IWCMC), Dubrovnik, pp 563–568 Boufares N, Khoufi I, Minet P, Saidane L, Ben Saied Y (2015) Three dimensional mobile wireless sensor networks redeployment based on virtual forces. In: 2015 International Wireless Communications and Mobile Computing Conference (IWCMC), Dubrovnik, pp 563–568
32.
Zurück zum Zitat Boufares N, Minet P, Khoufi I, Saidane L (2017) Covering a 3D flat surface with autonomous and mobile wireless sensor nodes. In: 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, pp 1628–1633 Boufares N, Minet P, Khoufi I, Saidane L (2017) Covering a 3D flat surface with autonomous and mobile wireless sensor nodes. In: 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, pp 1628–1633
33.
Zurück zum Zitat Yang H, Xunbo LI, Wang Z, Wenjie YU, Huang B (2016) A novel sensor deployment method based on image processing and wavelet transform to optimize the surface coverage in wsns. Chin J Electron 25(3):495–502CrossRef Yang H, Xunbo LI, Wang Z, Wenjie YU, Huang B (2016) A novel sensor deployment method based on image processing and wavelet transform to optimize the surface coverage in wsns. Chin J Electron 25(3):495–502CrossRef
Metadaten
Titel
Three-dimensional Voronoi Diagram–based Self-deployment Algorithm in IoT Sensor Networks
verfasst von
Xiaojiang Tang
Li Tan
Anbar Hussain
Minji Wang
Publikationsdatum
05.12.2018
Verlag
Springer International Publishing
Erschienen in
Annals of Telecommunications / Ausgabe 7-8/2019
Print ISSN: 0003-4347
Elektronische ISSN: 1958-9395
DOI
https://doi.org/10.1007/s12243-018-0686-8

Weitere Artikel der Ausgabe 7-8/2019

Annals of Telecommunications 7-8/2019 Zur Ausgabe

Neuer Inhalt