无线传感器网络中跨层设计研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着硬件和无线技术的研究进展,诸如嵌入式技术、传感器技术、微机电系统(Micro-Electro-Mechanical Systems)、通信技术、分布式信息处理以及网络技术等,使得低成本、低功耗、小尺寸、多功能的传感器节点得到广泛的发展和应用。这种由具有通信、计算以及信息处理而无需基础设施的传感器节点形成的网络被称为无线传感器网络,已经被用来从物理世界收集数据。它们感知物理世界,在网内处理这些数据,然后使用无线多跳的方式与基站进行通信。无线传感器网络在广泛的应用领域内具有重大影响,这些应用范围从军事到科学、工业、农业、医疗保健等领域,无线传感器网络重新界定了我们的生活和工作的社会方式。
     无线传感器网络是大型网络,在一个网络中所部署的节点数可以从成百上千个到成千上万个不等,这些传感器通常是由电池供电,节点的可靠性较低,节点资源有限,信道的容量随着网络的控制参数、环境不断发生变化,造成网络拓扑多变,传统的分层设计不能适应无线传感器网络的需要。不同协议栈层之间交互以及信息共享的跨层设计技术,可以提高无线传感器网络系统的性能以及资源的利用率,降低分层协议相关的开销,提高效率。本文针对无线传感器网络自身的特点,使用跨层设计技术,在能量效率、服务质量、网络安全等方面进行了探索和研究。主要的工作如下:
     1.对WSNs引入跨层设计的原因进行分析,对WSNs跨层设计使用的常用理论方法和技术等进行归纳总结,给出了WSNs跨层设计的概念,分析了WSNs跨层设计的动机与益处,并将WSNs跨层设计分为两大类,即全新抽象设计方法和兼容跨层设计方法,并对它们进行了分析和比较。
     2.为了满足WSNs应用的QoS需求,以及资源受限的节点能够充分利用所得到的资源,提出了基于尺度的无线传感器网络协同中继跨层QoS路由解决方案。为该方案建立了网络模型、路由模型以及能量消耗模型,提出了优化的MAC方法和MCRICQR算法。节点感知的数据对时延敏感性的不同,接入信道以及使用信道的方法也不相同,使用基于定时器的MAC方法,来解决节点使用介质问题;节点根据时延敏感性、能量、信道、拥塞以及与汇点的距离等综合因素形成一个选择度量,度量最大的节点根据自己所处状态自主选择直接转发、中继转发以及跃进转发数据包,即节点根据应用层、网络层、MAC层以及物理层等多层参数来选择NHF、RFN以及LPF,降低数据包传输的时延,提高可靠性,实现负载均衡,提高网络吞吐量,延长网络寿命。该算法具有较好的鲁棒性和自适应性。
     3.针对WSNs节点数目多,分布范围广以及动态的拓扑等特性,为了实现网络能量高效,提出了跨层自适应周期分簇路由模型(CACR)。该模型由两部分构成:(1)使用跨层自适应簇首选举算法,选举出簇首;(2)在簇首将数据包传送给汇点时,使用跨层簇间路由模型算法。为了实现簇内和簇间通信时选择最佳能量效率节点,以上算法考虑节点剩余能量、能量消耗因子、RSSI以及距离能耗指标,依据剩余能量动态调整簇首工作周期,均衡网络节点能量;在数据包发送时,将物理层的功率调整到最适合的水平,从而提高整个网络的能量效率,延长网络寿命。
     4.针对WSNs网络节点易受安全攻击的特性,若只考虑单一层次的安全方案对WSNs而言存在诸多局限性的问题,为无线传感器网络提出了一个跨层安全框架。该安全框架由能量高效的跨层安全框架和基于簇的安全密钥管理(CSK)方案组成。并对所提出的跨层安全框架在能量效率、探测和抵御DoS攻击、源真实性和数据验证等方面进行分析。将所提出的WSNs跨层安全框架在WBSNs网络中应用进行仿真。为了实现所提出的安全方案,提出了3个算法:(1)簇首与簇成员之间分发簇密钥;(2)节点向汇点传输数据安全算法以及(3)汇点端的安全算法。仿真结果表明,所提出的安全框架和密钥管理方案是能量高效的,并且可以对一定的恶意节点进行防范。
With the development of hardware and wireless technology, such as embedded-system, sensor technology, Micro-Electro-Mechanical Systems(MEMS), communication, distributed information processing and network technology, which have made the low cost, low power consumption, small size, multi-functional sensor nodes widely developed and applied. Wireless sensor networks(WSNs) are composed of infrastructure-less sensor nodes that have the capabilities of communication, computation and processing information. WSNs are used to collect information from physical world, they sense physical world, process intra-net data, and then transmit the information to the base station by multi-hop. WSNs have significantly impacted on many fields, these applications include military, science, industry, agriculture, medical care and other areas, which redefine the social styles of our life and work.
     WSNs are large-scale networks deployed hundreds to thousands of nodes powered by batteries. The original network layering structure can't fulfill the demands of wireless sensor networks, because of their lower reliability and limited resources, the dynamic topology of network and the variable capacity of wireless channel along with the control parameter and environment of the network. Cross-layer design technology that allow interaction and information sharing between different protocol stacks can improve the performance of wireless sensor network system as well as resource utilization, and also can reduce the overhead significantly caused by layered protocol. This dissertation aims to the characteristics of wireless sensor networks, and mainly focus on cross layer design of wireless sensor networks, which includes cross layer design for energy efficient, service of quality and security of networks. The main research work is as follows:
     1. We analyze the reasons of cross layer design introduced to WSNs, and review the theoretical methods and techniques of cross layer design, and define cross layer design for WSNs. The motivations and advantages of cross layer design for WSNs are analyzed. Cross layer design for WSNs is divided into two categories, namely new abstract design method and compatible cross layer design method, and then evaluate and compare them with performance.
     2. We proposed a cross-layer QoS routing algorithm which is metric-based cooperative relay initiative forwarding(MCRICQR), in order to meet the QoS of application for WSNs, as well as more resource-efficient for the resource-constrained nodes. We depict a network model, routing model and energy consumption model. An optimal MAC method and MCRICQR algorithm are studied. Timer-based MAC method is used to solve the problem of using the medium and channel based on time-delay sensibility of data that the node sensing. Nodes form a metric according to sensibility, energy, channel, congestion and distance to sink. The node with maximal metric forwards or relays or leapfrogs the data in term of it's own states, i.e., nodes make a choice for NHF, RFN or LPF to relay packets according to parameters from different layers, such as application layer, network layer, MAC layer and physical layer. They can reduce the transmission delay of packets, improve the reliability and network throughput, achieve load balance, and prolong the lifetime of the network. It has better robustness and adaptability.
     3. As WSNs have excessive node, widely deployed and dynamic topology, a cross-layer adaptive round distributed cluster-based routing model (CACR) is proposed to achieve more energy efficient. The model consists of two parts:(1) the cross-layer adaptive cluster head election algorithm to elect the cluster head;(2) During data is transmitting to the sink by cluster heads, a cross layer routing of adjacent clusters model algorithm is used. In order to implement energy efficiency for the intra-cluster and inter-clusters communications, the algorithms premeditate the factors, such as residual energy of the nodes, energy consumption factor, RSSI and the distance-energy consumption index. Cluster head work cycle is dynamic adjusted based on residual energy to balance network energy. Transmit power is adjusted to the most suitable level when packet is sending, so as to improve the network energy efficiency, and prolong the lifetime of network.
     4. A cross layer security framework for WSNs is presented. When a single level of security solution is considered, it exists limitation as the nodes are vulnerable to attack. The security framework is composed of energy-efficient cross-layer security framework and cluster-based secure key management scheme (CSK). And the security framework in energy efficiency, detection and defense against the DoS attack, source authenticity and data validation analysis were carried out. The cross-layer security framework is applied and simulated in WBSNs. In order to implement the security scheme, three algorithms are proposed:(1) Distributed cluster key among cluster heads and their member;(2) Secure algorithms transmitting data to sink node and (3) the security algorithm on sink-side. We evaluated the algorithms. Simulation results show that the secure framework and key management scheme is energy efficient, and they can prevent against stacks of malicious nodes.
引文
[1]Theodore S. Rappaport[美]著,周文安,付秀华,王志辉等译.无线通信原理与应用[M].第2版.北京:电子工业出版社,2011.
    [2]Akyildiz I. F, Su W., Sankarasubramaniam Y, Cayirci E. Wireless sensor network:a survey[J]. Computer Networks,2002,38(4):393-422.
    [3]任丰原,黄海宁,林闯.无线传感网络[J].软件学报,2003,14(7):1282-1290.
    [4]崔莉,鞠海玲,苗勇,李天璞,刘巍,赵泽.无线传感器网络研究进展[J].计算机研究与发展,2005,42(1):147-163.
    [5]孙利民,李建中,孙渝,朱红松.无线传感器网络[M].第1版.北京:清华大学出出版社,2005.
    [6]Jennifer Yick, Biswanath Mukherjee, Dipak Ghosal. Wireless sensor network survey[J]. Computer Networks,2008(52):2292-2330.
    [7]Greenfield, Adam. Everyware:the dawning age of ubiquitous computing[M].1st ed. New Riders,2006.
    [8]Kevin Ashton. That'Internet of Things'Thing[J]. RFID Journal, July 2009.
    [9]无线龙编著.现代无线传感网概论[M].第1版.北京:冶金工业出版社,2011.
    [10]于宏毅,李鸥,张效义.无线传感器网络理论、技术与实现[M].第1版.北京:国防工业出版社,2008.
    [11]Holger Karl, Andreas Willig[德]著.邱天爽,唐洪等译.无线传感器网络协议与体系结构[M].第1版,北京:电子工业出版社,2007.
    [12]于宏毅.无线移动自组织网[M].第1版.北京:人民邮电出版社,2005
    [13]郑少仁,王海涛,赵志峰,米志超Ad Hoc网络技术[M].第1版.北京:人民邮电出版社,2005.
    [14]L.V. Hoesel, T. Nieberg, J. Wu, P.J.M. Havinga. Prolonging the lifetime of wireless sensor networks by cross-layer interaction[J]. IEEE Wireless Communications Magazine, 2004(11):78-86.
    [15]Giuseppe Anastasi, Marco Conti, Mario Di Francesco et al. Energy conservation in wireless sensor networks:A survey. Ad Hoc Networks,2009(7):537-568.
    [16]Deborah E. Wireless Sensor Networks Tutorial Part IV:Sensor Network Protocols. Atlanta, Georgia, USA:Westin Peachtree Plaza,2002:23-28.
    [17]Edgar H, Callaway. Wireless Sensor Network:Architectures and Protocols[M].1st ed. Auerbach publications, CRC Press company,2003.
    [18]王殊,严毓杰,胡富平,屈晓旭.无线传感器网络的理论及应用[M].第1版.北京:北京航空航天大学出版社,2007.
    [19]Hart, J. K. and Martinez, K. Environmental Sensor Networks:A revolution in the earth system science[J]. Earth-Science Reviews,2006(78):177-191.
    [20]G. Wener-Allen, K. Lorincz, M. Ruiz et al. Deploying a wireless sensor network on an active volcano[J]. IEEE Internet Computing,2006,10(3):18-25.
    [21]I. Vasilescu, K. Kotay, D. Rus et al. Data collection, storage, and retrieval with an underwater sensor network[C]. In Proceedings of the 3rd international conference on Embedded networked sensor systems (SenSys'05, ACM),2005:154-165, New York, USA.
    [22]FireBug Wildland fire monitoring system, http://www.libelium.com/wireless_sensor_networks to detec forest fires/
    [23]Ma, Y., Richards, M., Ghanem M. et al. Air Pollution Monitoring and Mining Based on Sensor Grid in London[J]. Sensors,2008,8(6).
    [24]P. A Garcia. Methodology for the Deployment of Sensor Networks [J]. IEEE Transactions On Knowledge And Data Engineering,2011,11 (4).
    [25]Anastasi et al. A Comprehensive Analysis of the MAC Unreliability Problem in IEEE 802.15.4 Wireless Sensor Networks[J]. IEEE Transactions on Industrial Informatics, 2011,7(1):52-65.
    [26]Viani F., Rocca P., Benedetti M. Et al. Electromagnetic passive localization and tracking of moving targets in a WSN-infrastructured environment [J]. Inverse Problems,2010,26 (7).
    [27]Viani F., Rocca P., Oliveri G. Et al. Localization, tracking, and imaging of targets in wireless sensor networks:An invited review[J]. Radio Science,2011,46(5).
    [28]Global Environment for Networking Innovation (GENI), http://www.geni.net/.
    [29]Future INternet Design (FIND), http://www.nets-find.net/.
    [30]Smarter Planet strategy, http://www.ibm.com/smarterplanet/us/en/.
    [31]Internet of Things-An action plan for Europe, http://ec.europa.eu/information_society/ policy/rfid/documents/commiot2009.pdf.
    [32]Wireless HART, http://hartcomm.org/hcf/news/pr2010/WirelessHART_approved_by_IEC.html.
    [33]ISA 100, http://www.isa.org.
    [34]MyriaNed, http://www.es.ele.tue.nl/nes/content/publications/NAS11.pdf
    [35]TinyOS website, http://www.tinyos.net.
    [36]Q. Cao, T. Abdelzaher, J. Stankovic et al. The LiteOS Operating System:Towards Unix-Like Abstractions for Wireless Sensor Networks[C] Proceedings of the 7th international conference on Information processing in sensor networks,2008.
    [37]Contiki, http://www.contiki-os.Org/p/about-contiki.html.
    [38]A. Varga. The omnet++ discrete event simulation system, http://www.omnetpp.org.
    [39]对OPNET的介绍,http://211.71.69.172/net/sub/opnet.htm
    [40]对ns2的相关资料,http://www.isi.edu/nsnam/ns/
    [41]对TOSSIM的相关资料,http://www.ecaa.ntu.edu.tw/weifang/WSN/TinyOS1.ppt.
    [42]对GloMoSim的相关资料,http://pcl.cs.ucla/projects/gloosim.html.
    [43]Vineet Srivastava, Mehul Motani. Cross-Layer Design:A Survey and the Road Ahead[J]. IEEE communication magazine, December 2005.
    [44]Vijay T. Raisinghani, Sridhar Iyer. Cross-Layer Feedback Architecture for Mobile Device Protocol Stacks[J]. IEEE Communications Magazine,2006,85-92.
    [45]Xiaojun Lin, Ness B. Shroff, R. Srikant. A Tutorial on Cross-Layer Optimization in Wireless Networks[J]. IEEE Journal of Selected Areas in Communications,2006, 24(8):1452-1463.
    [46]Bethrouz A. Forouzan, Firouz Mosharraf[美]Computer networks:a top-down approach [M]北京:机械工业出版社,2012.
    [47]Wie Ye, John Heidemann, Deborah Estrin. An energy efficient mac protocol for wireless sensor networks[C]. In proceedings of IEEE Infocom,2002,1567-1576,New York.
    [48]Al-Karaki J. N., Kamal A. E. Routing techniques in wireless sensor networks:a survey[J]. IEEE Wireless Communications,2004,11(6).
    [49]Cardei M, Du DZ. Improving wireless sensor network lifetime through power aware organization[J]. ACM Wireless Networks,2005(11):333-340.
    [50]Ning Xu. A survey on wireless sensor network applications[EB/OL]. http://courses.cs. tamu.edu/rabi/cpsc617/resources/sensor%20nw-survey.pdf. University of Southern California
    [51]Jin Zhu. Energy efficient organization and modeling of wireless sensor networks[D]. Ph.D. Dissertation, New Jersey Institute of Technology, August 2005.
    [52]Rossi M., Zorzi. Integrated Cost-Based MAC and Routing Techniques for Hop Count Forwarding Wireless Sensor Networks[J]. IEEE Transactions on Mobile Computing, 2007,6(4):434-446.
    [53]Ghosh, Chittabrata Xie, Bin Agrawal, Dharma P. ROPAS:Cross-Layer Cognitive Architecture for Mobile UWB Networks [J]. Journal of Computer Science and Technology,2008,23(3):413-425.
    [54]Yunxia Chen, Qing Zhao. An integrated approach to energy-aware medium access for wireless sensor networks[J]. IEEE transactions on signal processing,2007,55 (7):3429-3444.
    [55]Mehmet C. Vuran, Ian F. Akyildiz. XLP:A Cross-Layer Protocol for Efficient Communication in Wireless Sensor Networks[J]. IEEE Transactions on Mobile Computing,2010,9(11):1578-1591.
    [56]Mario Di Francesco, Giuseppe Anastasi, Marco Conti, Sajal K. Das, Vincenzo Neri. Reliability and Energy-Efficiency in IEEE 802.15.4/ZigBee Sensor Networks:An Adaptive and Cross-Layer Approach[J]. IEEE Journal on Selected Areas in Communications,2011,29(8):1508-1524.
    [57]Geoffrey G. Messier, Jennifer A. Hartwell, and Robert J. Davies. A Sensor Network Cross-Layer Power Control Algorithm that Incorporates Multiple-Access Interference[J]. IEEE Transactions on Wireless Communications,2008,7(8):2877-2883.
    [58]张国霞,王潜平,黄海,谈玮,郭永玲.无线传感器网络跨层通信协议的设计[J].微计算机信息,2008,24(2-1):133-134,245.
    [59]周晓芳.无线传咸器网络中路由协议的跨层设计研究[D].中国科学技术大学博士论文,2010.
    [60]Zongkai Yang, Shengbin Liao, Wenqing Cheng. Joint power control and rate adaptation in wireless sensor networks[J]. Ad Hoc Networks,2009(7):401-410.
    [61]Xiao-Hui Lin, Yu-Kwong Kwok, Hui Wang. Cross-layer design for energy efficient communication in wireless sensor networks[J]. Wireless Communications and Mobile Computing,2009(9):251-268.
    [62]Kulkarni S, Iyer A, Rosenberg C. An address-light, integrated MAC and routing protocol for wireless sensor networks [J]. IEEE/ACM Transactions on Networking 2006, 14(4):793-806.
    [63]Ahmed Badi. Reliable, Energy-Aware Cross-Layer Protocol for Wireless Sensor Networks[D]. Ph.D. Dissertation, Florida Atlantic University, Boca Raton, FL,2009.
    [64]Shamik Sengupta, Mainak Chatterjee, Kevin A. Kwiat. A Game Theoretic Framework for Power Control in Wireless Sensor Networks[J]. IEEE Transactions on Computers, 2010,59(2):231-242.
    [65]Antonio G. Ruzzelli, Gregory M.P. O'Hare, Raja Jurdak. MERLIN:Cross-layer integration of MAC and routing for low duty-cycle sensor networks[J]. Ad Hoc Networks,2008(6):1238-1257.
    [66]Misra S, Reisslein M, Xue G. A survey of multimedia streaming in wireless sensor networks. IEEE Communications Surveys & Tutorials,2008,10(4):18-39.
    [67]Choi JY, Kim HS, Baek I, Kwon WH. Cell based energy density aware routing:a new protocol for improving the lifetime of wireless sensor networks [J]. Computer Communications,2005,28(11):1293-302.
    [68]Yuan Y, Yang Z, He Z, He J. An integrated energy aware wireless transmission system for QoS provisioning in wireless sensor network[J]. Computer Communications 2006, 29(2):162-72.
    [69]Shu T, Krunz M. Energy-efficient power/rate control and scheduling in hybrid TDMA/CDMA wireless sensor networks. Computer Networks,2009;53(9):1395-408.
    [70]Kawadia V., Kumar P.R. A cautionary perspective on cross-layer design[J]. IEEE Wireless Communications,2005,12(1):3-11.
    [71]Jun Yuan, Wei Yu. Joint Source Coding, Routing and Power Allocation in Wireless Sensor Networks[J]. IEEE Transactions on Communications,2008,56(6):886-896.
    [72]Sajjad Ahmad Madani. Cross Layer Design for Low Power Wireless Sensor Networks[D]. Ph.D. Dissertation,Vienna University of Technology,2008.
    [73]Tag der m"undlichen Pr"ufung. A Framework Architecture for Energy-Aware Routing Protocols in Wireless Sensor Networks[D]. Ph.D. Dissertation, Fachbereich Elektrotechnik und Informatik der Universit"at Siegen,2009.
    [74]E. Felemban; Chang-Gun Lee, Ekici, E. MMSPEED:multipath Multi-SPEED protocol for QoS guarantee of reliability and.Timeliness in wireless sensor networks[J]. IEEE Transactions on Mobile Computing,2006,5(6):738-754.
    [75]Y. Yuan, Z. Yang, Z. He et al. An integrated energy aware wireless transmission system for QoS provisioning in wireless sensor network[J]. Computer Communications,2006 (29):162-172.
    [76]J.C. Mundarath, P. Ramanathan, B.D. Van Veen. A quality of service aware cross-layer approach for wireless ad hoc networks with smart antennas[J]. Ad Hoc Networks,2009, 7(5):891-903.
    [77]A. Mahapatra, K. Anand, D. P. Agrawal. QoS and energy aware routing for real-time traffic in wireless sensor networks[J]. Computer Communications,2006(29):437-445.
    [78]刘建.下一代无线网络的跨层优化MAC研究[D].山东大学博士论文,2008.
    [79]蹇强,龚正虎,朱培栋,桂春梅.无线传感器网络MAC协议研究进展[J].软件学报,2008,19(2):389-403.
    [80]陈杰.无线网络中资源分配与频谱接入研究[D].浙江大学博士论文,2008.
    [81]Atilla Eryilmaz, Asuman Ozdaglar, Devavrat Shah, Eytan Modiano. Distributed Cross-Layer Algorithms for the Optimal Control of Multihop Wireless Networks[J]. IEEE/ACM Transactions on Networking,2010,18(2):638-651.
    [82]K. Chen, S. H. Shan, K. Nahrstedt. Cross-Layer design for data accessibility in mobile ad hoc networks[J]. Wireless Personal Communications,2002,21(1):49-76.
    [83]I.F. Akyildiz, T. Melodia, K.R. Chowdhury, A survey on wireless multimedia sensor networks[J]. Computer Networks,2007(51):921-960.
    [84]David Tse, Pramod Viswanath. Fundamentals of Wireless Communication[M]. Cambridge University Press,2004.
    [85]赵贤敬.无线网络中协作通信技术的研究[D].南京邮电大学博士论文,2007.
    [86]罗明胜,黄联芬,姚彦.无线网络跨层设计的研究现状及展望[J].移动通信,2005(7):95-98.
    [87]Z. Ji et al. Exploiting Medium Access Diversity in Rate Adaptive Wireless LANs[C]. Proc. ACMAnnual Int'l. Symp. Mobile Comp. and Net., Philadelphia, PA, Oct.2004.
    [88]W.Qi, M.A.Abu-Rgheff. Cross-layer signalling for next-generation wireless systems[J]. IEEE Wireless Communications and Networking,2003(2):1084-1089.
    [89]A. J. Goldsmith, S. B. Wicker. Design challenges for energy constrained Ad Hoc wireless networks[J]. IEEE Wireless Communications Magazine,2002,9(4):8-27.
    [90]张先迪,李正良.图论及其应用[M].第1版,北京:清华大学出版社,2005.
    [91]严蔚敏,陈文博.数据结构及应用算法教程[M].修订版,北京:清华大学出版社,2011.
    [92]刁在筠,刘桂真,宿洁,马建华编著.运筹学[M].第3版,北京:高等教育出版社,2007年.
    [93]刑文训,谢金星.现代优化计算方法[M].第2版,北京:清华大学出版社,2005.
    [94]林元烈编著.应用随机过程[M].北京:清华大学出版社,2004.
    [95]莱因哈德·泽尔腾[德]著,黄涛译.策略理性模型[M].北京:首都经济贸易大学出版社.2000.
    [96]王凌.智能优化算法及其应用[M].北京:清华大学出版社,2001.
    [97]牛建军,邓志东,李超.无线传感器网络分布式调度方法研究[J].自动化学报,2011,37(5):517-528.
    [98]李方敏,徐文君,刘新华.无线传感器网络功率控制技术[J].软件学报,2008,19(3),PP:-716-732.
    [99]S. Guha, S. Khuller. Approximation Alogrithms for Connected Dominating Set[J]. Algorithmica,1998(20):374-387.
    [100]Min Cao, Vivek Raghunathan, P. R. Kumar. Cross-Layer Exploitation of MAC Layer Diversity in Wireless Networks[C]. IEEE 14th International Conference on Network Protocols, ICNP'06:332-341.
    [101]A. Cerpa, D. Estrin. ASCENT:Adaptive Self-Configuring Sensor Networks Topologies [C]. In Proceesings of the INFOCOM, NY, June 2002.
    [102]Raja Jurdak, Pierre Baldi, Cristina Videira Lopes. Adaptive Low Power Listening for wireless sensor networks[J]. IEEE Transactions on Mobile Computing,2007, 6(8):988-1004.
    [103]R. Braden, T. Faber, M. Handley. From Protocol Stack to Protocol Heap-Role-Based Architecture[C]. in Proc. Hot Topics in Networking(HOTNETS I), Princeton, NJ,2002.
    [104]F. Bai, G. Bhaskara, A. Helmy. Building the Blocks of Protocol Design and Analysis-Challenges and Lessons Learned from Case Studies on Mobile Ad Hoc Routing and Micro-Mobility Protocols[J]. ACM SIGCOMM Computer Communications Review, 2004,34(3):57-69.
    [105]P. Th. Eugster, P. A. Felber, R. Guerraoui et al. The Many Faces of Publish/Subscribe. ACM Computing Survey,2003,35(2):114-131.
    [106]D. Culler, P. Dutta, C. Tien Ee et al. Towards a Sensor Network Architecture:Lowering the Waistline[C]. Proceeding. Workshop Hot Topics in Operating Systems (HotOS X), 2005:1-5.
    [107]B. Raman, P. Bhagwat, S. Seshan. Arguments for cross-layer optimization in Bluetooth scatternets[C]. in Proc.2001 Symposium on Application and the Internet,pp:176-184.
    [108]L. Tong, Q. Zhao, G. Mergen. Multipacket Reception in Random Access Wireless Networks:From Signal Processing to Optimal Medium Access Control[C]. IEEE Communications Magazine, pp:108-112,2001.
    [109]M. Chiang. Balancing Transport and Physical Layers in Wireless Multihop Networks: Jointly Optimal Congestion Control and Power Control [J]. IEEE Journal on Selected Area in Communications,2005(23):104-116.
    [110]Zongkai Yang, Shengbin Liao, Wenqing Cheng. Joint Power control and rate adaptation in wireless sensor networks[J]. Ad Hoc Networks,2009(7):401-410.
    [111]Lucas D.P. Mendes, Joel J.P.C. Rodrigues. A survey on cross-layer solutions for wireless sensor networks [J]. Journal of Network and Computer Applications,2011, 34(2):523-534.
    [112]Welian Su, Tat L. Tim. Cross-layer design and optimization for wireless sensor networks [C]. Proceeding of the Seventh ACIS International Conference on Software Engineering, Artifical Intelligence, Networking, and Parallel/Distributed Computing (SNPD'06),2006.
    [113]T. Melodia, I.F. Akyildiz. Cross-layer QoS-aware communication for ultra wide band wireless multimedia sensor networks. IEEE Journal on Selected Areas in Communications 2010,28(5):653-63.
    [114]J.N. Laneman, D.N.C. Tse, G.W. Wornell. Cooperative diversity in wireless networks: Efficient protocols and outage behavior[J]. IEEE Transactions on Information Theory,2004,50(12):3062-3080.
    [115]Andrea Glodsmith[美]著,杨泓文,李卫东,郭文彬等译.无线通信[M].北京:人民邮电出版社,2007.
    [116]Y. Li, A. Ephremides. A joint scheduling, power control, and routing algorithm for ad hoc wireless networks[J]. Ad Hoc Networks,2007(5):959-973.
    [117]M. L. Sichitiu. Cross-layer scheduling for power efficiency in wireless sensor networks[C]. INFOCOM 2004.
    [118]V.C. Gungor, M.C. Vuran, O.B. Akan. On the cross-layer interactions between congestion and contention in wireless sensor and actor networks[J]. Ad Hoc Networks, 2007(5):897-909.
    [119]D. Kliazovich, F. Granelli. Cross-layer congestion control in ad hoc wireless networks[J]. Ad Hoc Networks,2006 (4):687-708.
    [120]P. Skraba, H. Aghajan, A. Bahai. Cross-layer optimization for high density sensor networks:Distributed passive routing Decisions[C].in Proc. Ad-Hoc Now'04, Vancouver, July 2004.
    [121]R. Manda, S. Cui, S. Lall et al. Cross-layer design for lifetime maximization in interference-limited wireless sensor networks[C]. In:Proc. IEEE INFOCOM 2005: 1964-1975.
    [122]L Chen, SH Low, M. Chiang et al. Jointly optimal congestion control, routing, and scheduling for wireless ad hoc networks. In Proc. IEEE Inform.2006,Barcelona.
    [123]T. He,J. A Stankovic, C. Lu et al. SPEED:A Stateless Protocol for Real-Time Communication in Sensor Networks[C]. Proceedings of the 23rd International Conference on Distributed Computing Systems,ICDCS'03.
    [124]Akkaya K, Younis M. An energy-aware QoS routing protocol for wireless sensor networks[C]. Proc of IEEE Workshop on Mobile and Wireless Networks. Piscataway: IEEE,2003:710-715.
    [125]Qian Hang et al. Cross-layer QoS Support for multimedia delivery over wireless Intenet. EURASIP Journal on Applied Signal Processing,2005(2):207-219.
    [126]崔勇,吴建平,徐恪等.互联网络服务质量路由算法研究综述[J].软件学报,2002,13(11):2065-2075.
    [127]Kay J, Frolik J. Quality of service analysis and control for wireless sensor networks. IEEE International Conference on Mobile Ad-hoc and Sensor Systems, MOSS 2004:359-368.
    [128]D. Goodman; N. Mandayam. Power control for wireless data[J]. IEEE Personal Communications,2000,7(2):48-54.
    [129]S. Ganeriwal, R. Kumar, M.B. Srivastava. Timing-sync protocol for sensor networks[C]. Proc. ACM SenSys'03,2003:138-149.
    [130]Wireless LAN Medium Access Control(MAC) and Physical Layer(PHY) Specifications, IEEE Standard 802.11, June 1999.
    [131]P. Gupta, P. R. Kumar. The capacity of wireless networks[J]. IEEE Transactions on Information Theory,2000,46(2):388-404.
    [132]R Rugin, G Mazzini. A simple and efficient MAC-routing integrated algorithm for sensor network[C]. IEEE International Conference on Communications,2004: 3499-2503.
    [133]W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan. Energy-efficient communication protocol for wireless microsensor networks [A]. In:Proc. of the 33rd Annual Hawaii International Conference System Sciences, IEEE Computer Society,2000:3005-3014.
    [134]A. Manjeshwar, D.P. Agrawal. TEEN:A protocol for enhanced efficiency in wireles sensor networks[C]. IEEE Computer Society, International Proc. of the 15th Parallel and Distributed Procesing Symp,2001:2009-2015.
    [135]O. Younis, Fahmy S. HEED:A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks [A]. IEEE Transactions on Mobile Computing,2004,3(4): 336-379.
    [136]S. Bandyopadhyay, E.J. Coyle. An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks [C]. IEEE INFOCOM Communications Societies,2003, 1713-1723.
    [137]李成法,陈贵海,叶懋等.一种基于非均匀分簇的无线传感器网络路由协议[J].计算机学报,2007,30(1):27-36.
    [138]刘明,曹建农,陈贵海,陈力军,王晓敏,龚海刚EADEEG:能量感知的无线传感器网络数据收集协议[J].软件学报,2007,18(5):1092-1109.
    [139]徐楠,孙亚民,于继明,卢先领.无线传感器网络CDPMR路由算法研究[J].计算 机工程,2009,35(20):109-111.
    [140]Bai Yuebin, Liu Shujuan, Sha Mo et al. An Energy Optimization Protocol Based on Cross-Layer for Wireless Sensor Networks[J]. Journal of Communications. 2008,3(6):27-34.
    [141]F. Bouabdallah, N. Bouabdallah, R. Boutaba. Cross-Layer Design for Energy Conservation in Wireless Sensor Networks[C]. IEEE International Conference on Communications, ICC'09.2009,6:1-6.
    [142]K. Sohrabi, J. Gao, V. Ailawadhi et al. Protocols for self-organization of a wireless sensor network[J]. IEEE Personal Communications 2000,7(5):16-27.
    [143]CC1000 A unique UHF RF Transceiver. http://focus.ti.com/lit/ds/symlink/cc1000.pdf.
    [144]Texas Instruments Corp. CC2430 datasheet [EB/OL]. http://www.ti.com/lit/ds/symlink/ cc2430.pdf.
    [145]Galluccio L.,Leonardi A.,Morabito Get al. A MAC/Routing cross-layer approach to geographic forwarding in wireless sensor networks[J]. Ad Hoc Networks,2007,5:872-884.
    [146]D W Carman, P S Kruus, B J Matt. Constraints and Approaches for Distributed Sensor Network Security[R]. September 1,2000. NAI Labs Technical Report #00-010.
    [147]F. Hu, N. K. Sharma. Security considerations in ad hoc sensor networks[J]. Ad Hoc Networks,2005,3(1):12-23.
    [148]William Stallings[美]著,孟庆树,王丽娜,傅建明等译.密码编码学与网络安全:原理与实践(第四版),北京:电子工业出版社,2006.
    [149]A. D. Wood, J. A. Stankovic. Denial of Service in Sensor Networks[J]. IEEE Computer, 2002,35(10):54-62.
    [150]Xiaojiang Du, Hsiao-Hwa Chen. Security in Wireless Sensor Networks [J]. IEEE Wireless Communications,2008(8):61-66.
    [151]V. C. Giruka, M. Singhal, J. Royalty, S. Vara. Security in wireless sensor networks[J]. Wireless Commununications and Mobile Computing,2008,8(1):1-24.
    [152]A. Perrig, R. Szewcyzyk, J.D. Tygar et al. SPINS:Security protocols for sensor networks[J]. Wireless Networks.2002,8(5):521-534.
    [153]Sencun Zhu, Sanjeev Setia, Sushil Jajodia. LEAP:Efficient Security Mechanism for Large-Scale Distributed Sensor Networks[C]. Proceedings of the 10th ACM conference on Computer and communications Security, Washington,2003, pp:62-72.
    [154]C. Karlof, N. Sastry, D. Wagner. TinySec:A Link Layer Security Architecture for Wireless Sensor Networks[C]. In Proceedings of the 2nd ACM Conference on Embedded Networked Sensor Systems (SenSys 2004),2004,pp:162-175.
    [155]T. Park, K.G.. Shin. LISP:A Lightweight Security Protocol for Wireless Sensor Networks [J]. ACM Transactions on Embedded Computing Systems,2004, 3(3):634-660.
    [156]. Rahani Muraleedharan, Lisa Ann Osadciw. Seurity:cross layer protocol in wireless sensor network. INFOCOM 2006,25th IEEE International Conference on Computer Communications. Proceedings Volume, Issue,23-29 April 2006 pp:1-2.
    [157]方倩,赵晓群.无线传感器网络的安全地理位置跨层协议[J].传感技术学报,2008,,21(5):841-845.
    [158]W.R. Claycomb, D. Shin. A novel node level security policy framework for wireless sensor networks[J]. Journal of Network and Computer Applications,2011, 34(1):418-428.
    [159]G. Thamilarasu, R. Sridhar. XLSEC-A Distributed Cross-layer Framework for Security in Wireless Sensor Networks[C]. IEEE 6th CCNC'09, Consumer Communications and Networking Conference,2009.
    [160]Asad Amir Pirzada, Chris. Circumventing Sinkhole and Wormhole in Wireless Sensor Networks. nternationl Workshop on Wireless Ad Hoc Networks,2005.
    [161]H. Chan, A. Perrig, D. Song. Random key predistribution schemes for sensor networks[C]. In Proc. of the 2003 IEEE Symp. on Security and Privacy, Washington, IEEE Computer Society,2003:197-213.
    [162]FW Scheller, U Wollenberger, A Warsinke, F Lisdat. Research and development in biosensors[J]. Current Opinion in Biotechnology,2001,12(1):35-40.