The Research of Scale-free Sensor Network Topology Evolution Based on Cloud Computing

نویسندگان

  • Takayuki Kushida
  • Wei Zhang
  • Nan Jiang
  • Lihua Li
  • Xiaoyan Luo
چکیده

Cloud computing is fundamental for wireless sensor network. Firstly massive data is gathered by Wireless sensor. Then those data is sent to platform of cloud computing. In the platform data is shared and transferred. The whole System is controlled and managed. In the process reliable and integrity of data depends on performance of wireless sensor Networks Topology control is one of core key factors which can influence performance of wireless-sensor networks (WSN). So how to design topology structure with high reliable and survivability is becoming the important subject on wireless-sensor networks. For the issue, a topology evolution strategy based on scale-free network with energy efficient is proposed. First by clustering algorithm cluster nodes are distributed evenly. Then those nodes start evolving in accordance with random walk processes on scale-free network. Since some key factors such as residual energy of node and node degree are taken into account in evolving procedure, network topology obtains quality features such as load and energy balance. So the network is quite practical. Finally the simulation shows that network topology from the evolution algorithm have good robustness regardless of deliberate and random attack. Consequently robustness feature of wireless-sensor network under severe environment is satisfied. Subject Categories and Descriptors: C.2.1 [Network Architecture and Design]: Network topology; I.1.2 [Algorithms]: Nonalgebraic algorithms; C.2.1 [Network Architecture and Design]: Wireless communication General Terms: Network Topology, Wireless Sensor Networks, Cloud Computing

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Communication-Aware Traffic Stream Optimization for Virtual Machine Placement in Cloud Datacenters with VL2 Topology

By pervasiveness of cloud computing, a colossal amount of applications from gigantic organizations increasingly tend to rely on cloud services. These demands caused a great number of applications in form of couple of virtual machines (VMs) requests to be executed on data centers’ servers. Some of applications are as big as not possible to be processed upon a single VM. Also, there exists severa...

متن کامل

Task Scheduling Algorithm Using Covariance Matrix Adaptation Evolution Strategy (CMA-ES) in Cloud Computing

The cloud computing is considered as a computational model which provides the uses requests with resources upon any demand and needs.The need for planning the scheduling of the user's jobs has emerged as an important challenge in the field of cloud computing. It is mainly due to several reasons, including ever-increasing advancements of information technology and an increase of applications and...

متن کامل

Efficient Data Mining with Evolutionary Algorithms for Cloud Computing Application

With the rapid development of the internet, the amount of information and data which are produced, are extremely massive. Hence, client will be confused with huge amount of data, and it is difficult to understand which ones are useful. Data mining can overcome this problem. While data mining is using on cloud computing, it is reducing time of processing, energy usage and costs. As the speed of ...

متن کامل

RESCUE: Reputation based Service for Cloud User Environment

Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...

متن کامل

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015