Association Journal of CSIAM
Supervised by Ministry of Education of PRC
Sponsored by Xi'an Jiaotong University
ISSN 1005-3085  CN 61-1269/O1

Chinese Journal of Engineering Mathematics ›› 2018, Vol. 35 ›› Issue (2): 137-154.doi: 10.3969/j.issn.1005-3085.2018.02.002

Previous Articles     Next Articles

Several Topology Control and Invulnerability Application in Wireless Sensor Networks: An Overview

WANG Yue-jiao1,   LIU San-yang2,   MA Zhong1   

  1. 1- Xi'an Microelectronics Technology Institute, Xi'an 710065
    2- School of Mathematics and Statistics, Xidian University, Xi'an 710126
  • Received:2016-01-21 Accepted:2017-11-02 Online:2018-04-15 Published:2018-06-15
  • Supported by:
    The Science Foundation Funded Project of China Postdoctoral (166553); the Technology Innovation Funds for the Ninth Academy of China Aerospace (2016JY06).

Abstract: This article considers the theoretical study, simulation validation and performance analysis to make a deep overview on the topology control technology in wireless sensor networks. Topological structure automatically varies with the increasing, reduction and mobility of nodes, and topology control aims to self-organize construct global topology of connected network through the sensor nodes in order to ensure the connectivity and coverage of the network. In this article, the theoretical basis and numerical steps of four kinds of topology control algorithms are emphatically summarized. Then, two types of topological evolution algo-rithms are declaimed in detail to improve the network invulnerability, which contains an evolving model of scale-free networks and a construction of $k$ connected networks. That is, a mobile network topology model with local-area preference and a node scheduling optimization model based on $k$ connected networks are respectively proposed. Finally, we expound the prospect of topology control algorithm, introduction of mobile nodes, exploration of balanced control algorithms, application of complex network theory and combination with traditional algorithm and intelligent algorithm.

Key words: topology control, network invulnerability, scale-free networks, $k$ connected networks

CLC Number: