skip to main content
10.1145/3232116.3232135acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiciipConference Proceedingsconference-collections
research-article

Research on Topology Control Algorithm in Heterogeneous wireless sensor networks Based on the Game Theory

Authors Info & Claims
Published:19 May 2018Publication History

ABSTRACT

Given that the selfish behavior performed by saving energy when the nodes of heterogeneous sensor network is transmitting data, the decline or even rejection in providing data forward services for the neighbor nodes, and the consequence of decline or even paralysis of network communication capability, we put forward a game theory-based topology control algorithm(GTTCA) of heterogeneous wireless sensor network after making consideration for the effects that nodes' transmission power and residual energy exert on the sensor network topology. We also design a revenue function related to transmission power, residual energy and the degree of participation (the possibility nodes participating in transmitting data services). The constant game between network nodes and the adjustment in transmission power is to select the strategy maximizing the revenue function to construct the optimal path with the neighbor nodes. By theoretical analysis, after a period of time, the function converges to a stable state, namely, Nash equilibrium state. Through stimulation experiment, compared with the existing algorithm, the one in this paper is able to efficiently adjust the transmission power of nodes, balance the network energy consumption, and to some extent, prolong the life cycle of network.

References

  1. Xiong Zili, Han Lansheng, Xu Hangbo, Fu Cai, Liu Buyu. Game-based Intrusion Detection Mode of Wireless Sensor Network {J}. Computer Science, 2017, 44(6A): 326--332.Google ScholarGoogle Scholar
  2. Joshi G P, Nam S Y, Kim S W. Decentralized Predictive MAC Protocol for Ad Hoc Cognitive Radio Networks {J}. Wireless Personal Communications, 2014, 74(2): 803--821. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Liu Zhouzhou, Li Wenwei. Topology Control Algorithm Based on Scale-free Feature in Wireless Sensor Networks {J}. Journal of Transducer Technology, 2017, 30(10):1578--1582.Google ScholarGoogle Scholar
  4. Ghosh, Y. Wang, B-Krishnamachari. Efficient and Distribute Topology Control in 3-Dimensional Wireless Networks {C}. In Proceedings of the 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks(SECON), San Diego, USA, 2007: 18--21.Google ScholarGoogle Scholar
  5. Heizelman W, Chandrakasan A, Balakrishman H. An Application specific Protocol Architecture for Wireless Microsensor Networks{J}. IEEE Transactions on Wireless Communications, 2002, (10):660--670. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Nash J. Equilibrium points in n-person games{C}.The Proceedings of the National Academy of Sciences. 1950,36: 48--49.Google ScholarGoogle ScholarCross RefCross Ref
  7. Zhao Baohua, Zhang Wei, Li Jing, Qu Yugui, Zhang Yingtang. The Participation Degree Model of Energy Saving in Sensor Networ {J}. Chinese Journal of Electronics, 2006, 34(11):1994--1998.Google ScholarGoogle Scholar
  8. Ren H L, Menc M. Game-theoretic modeling of joint topology control and power scheduling for Wireless Sensor Network {J}. IEEE Transactions on Automation Science and Engineering, 2009, 6(4): 3182--3192.Google ScholarGoogle Scholar
  9. Younis O, Falmy S. Heed: A hybrid, energy-efficient, distributed clustering approach for Ad hoc sensor network {J}. IEEE Transactions on Mobile Computing, 2004, 3(4): 366--379.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Haixiang Tao, Shang Zhang, Cifa Chen (2018). A Design of Wsn Based Locking System. Acta Informatica Malaysia, 2(1): 04--06.Google ScholarGoogle Scholar

Index Terms

  1. Research on Topology Control Algorithm in Heterogeneous wireless sensor networks Based on the Game Theory

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICIIP '18: Proceedings of the 3rd International Conference on Intelligent Information Processing
      May 2018
      249 pages
      ISBN:9781450364966
      DOI:10.1145/3232116

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 19 May 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate87of367submissions,24%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader