Computer Science ›› 2020, Vol. 47 ›› Issue (11A): 339-344.doi: 10.11896/jsjkx.200100109

• Computer Network • Previous Articles     Next Articles

Study on Optimization of Heterogeneous Data Fusion Model in Wireless Sensor Network

HUANG Ting-ting, FENG Feng   

  1. School of Information Engineering,Ningxia University,Yinchuan 750021,China
  • Online:2020-11-15 Published:2020-11-17
  • About author:HUANG Ting-ting,born in 1995,postgraduate,is a member of China Computer Federation.Her main research interests include Internet of things technology and applications.
    FENG Feng,born in 1971,Ph.D,professor,master's supervisor.His main research interests include information systems engineering and applications and Internet of things technology and applications.
  • Supported by:
    This work was supported by the National Natural Science Foundation of China(71561023) and Ningxia Key R&D Program Key Project(2018BFG02003).

Abstract: Aiming at the problems of energy consumption and network security in wireless sensor network,this paper proposes a data fusion model of wireless sensor network from the point of view of data fusion.The model introduces information entropy to realize a new way of calculating trust degree,completes the establishment of trust mechanism with monitoring and filtering of abnormal data,and improves the security and reliability of wireless sensor network through trust mechanism.In order to solve the problem of poor estimation effect and filtering divergence in strong nonlinear systems,the unscented Kalman filter algorithm is super imposed and the attenuation factor is introduced in the observation noise covariance matrix when the unscented Kalman filter is used for the first time.The simulation results show that the proposed algorithm improves the accuracy of filtering results compared with the traditional algorithm.

Key words: Algorithm optimization, Mixed cluster structure, Multi-sensor data fusion, Trust mechanism, Unscented Kalman filter

CLC Number: 

  • TP212.9
[1] ZOU P H.Research on wireless sensor network security and data fusion technology [D].Beijing:Beijing Jiaotong University,2018.
[2] LIU X Z,ZHU R B,ANJUM A,et al.Intelligent data fusion algorithm based on hybrid delay-aware adaptive clustering in wireless sensor networks[J].Future Generation Computer Systems,2020,104:1-14.
[3] QIU L D,LIU T J,LIN N,et al.Data fusion algorithm of wireless sensor network based on deep learning model [J].Journal of Sensor Technology,2014,27(12):1704-1709.
[4] ZHANG F,ZHENG H Y,DING Q L.Data fusion model of wireless sensor networks based on trust and weight [J].Computer Science,2017,44(5):37-41,60.
[5] SU F J,DU K Y.An energy-saving opportunity routing algorithm based on trust in WSNs [J].Computer Science,2020,47(2):300-305.
[6] LIANG S,DENG X Y,JIANG W.Optimal data fusion based on information quality function[J].Applied Intelligence,2019,49(11).
[7] YE Z W,WEN T,LIU Z Y,et al.Wsns secure data fusion algorithm based on trust model [J].Journal of Northeastern University (Natural Science Edition),2019,40(6):789-794.
[8] GAO B B,HU G G,GAO S S,et al.Multi-Sensor Optimal Data Fusion Based on the Adaptive Fading Unscented Kalman Filter[J].Sensors,2018,18(2).
[9] MASCHI LUIS F C,PINTO ALEX S R,MENEGUETTE R I,et al.Data Summarization in the Node by Parameters (DSNP): Local Data Fusion in an IoT Environment[J].Sensors,2018,18(3).
[10] SUN G L,ZHANG Z Y,ZHENG B W,et al.Multi-Sensor Data Fusion Algorithm Based on Trust Degree and Improved Gene-tics[J].Sensors,2019,19(9).
[11] DAS S,BARANI S,WAGH S,et al.Extending lifetime of wireless sensor networks using multi-sensor data fusion[J].Sādhanā,2017,4:1083-1090.
[12] GAO Y Q.Research on key technologies of data aggregation in the Internet of things environment [D].Beijing:Beijing University of Posts and Telecommunications,2019.
[13] YIN N.Research on Trust Security Related Technologies inWireless Sensor Networks [D].Nanjing:Nanjing University of Posts and Telecommunications,2018.
[14] ALPER AKCA M,ÖNDER E.Multiple Model Kalman and Particle Filters and Applications:A Survey[J].IFAC-Papers OnLine,2019,52(3):73-78.
[15] YANG F,ZHENG L T,WANG J Q,et al.Double-layer unscentedkalman filter [J].Journal of Automatic Chemistry,2019,45(7):1386-1391.
[16] CUI L L,WANG X,XU Y G,et al.A novel Switching Unscented Kalman Filter method for remaining useful life prediction of rolling bearing[J].Measurement,2019,135:678-684.
[17] WANG G Q,ZHANG Y G,WANG X D.Iterated maximum correntropy unscented Kalman filters for non-Gaussian systems[J].Signal Processing,2019,163:87-94.
[18] WANG Y J,CHEN Z H.A framework for state-of-charge and remaining discharge time prediction using unscented particle filter[J].Applied Energy,2020,260.
[19] LI X M,ZHAO C S,ZHANG L K.Adaptive square root untracked particle filtering algorithm and its application [J].Bulletin of Surveying and Mapping,2018(12):6-9,14.
[20] ZHANG K,TAO J F,HE S S.Improved particle filtering algorithm based on ukf and optimal combination strategy[J].Computer Engineering and Science,2017,39(8):1483-1488.
[1] WANG Bing-zhou, WANG Hui-bin, SHEN Jie, ZHANG Li-li. FastSLAM Algorithm Based on Adaptive Fading Unscented Kalman Filter [J]. Computer Science, 2020, 47(9): 213-218.
[2] QU Guang-qiang, SUN Bin. Study on Trustworthy Backtracking Mechanism of Experimental Teaching Fund Based on Blockchain [J]. Computer Science, 2019, 46(11A): 553-556.
[3] LIU Jian-sheng, YOU Zhen-xu, YUE Guang-xue, WANG Jie-tai, LIU Jian-hua. Research Progress of Network Trust [J]. Computer Science, 2018, 45(11): 13-28.
[4] LIU Kai-yang. AP-I:An Index to Quickly Answer Predictive Queries for Moving Objects [J]. Computer Science, 2017, 44(Z6): 314-318.
[5] CHEN Xiao-qing, LU Hui-juan, GUAN Wei and ZHENG Wen-bin. Wavelet Kernel Extreme Learning Machine Algorithm Based on Detecting Particle Swarm Optimization [J]. Computer Science, 2016, 43(Z6): 77-80.
[6] XU Xue-fei, LI Jian-hua, YANG Ying-hui and GUO Rong. Military Aeronautical Communication Spectrum Sharing Trust Mechanism Based on Cloud Model [J]. Computer Science, 2016, 43(9): 169-174.
[7] SHU Jian and LIANG Chang-yong. Dynamic Trust Model Based on DS Evidence Theory under Cloud Computing Environment [J]. Computer Science, 2016, 43(8): 105-109.
[8] SONG Yuan-zhang. P2P Botnet Detection Based on Permutation Entropy and Multi-sensor Data Fusion on Decision Level [J]. Computer Science, 2016, 43(7): 141-146.
[9] CHEN Hao and HUANG Hai-ping. Key Management Scheme of Wireless Sensor Network Based on Trust Evaluation Algorithm between Nodes [J]. Computer Science, 2015, 42(Z6): 395-398.
[10] MENG Fan-xi,QU Hong and HOU Meng-shu. Method of Short-term Load Forecasting Based on GA and SVM [J]. Computer Science, 2014, 41(Z6): 91-93.
[11] ZHANG Kang-jie and WANG Qi-zhi. Application of Unscented Kalman Filter in Rotary Table Tennis Trajectory Prediction [J]. Computer Science, 2014, 41(1): 83-87.
[12] LIU Kai-yang. Improved Construction Algorithm for K-Reach Index [J]. Computer Science, 2013, 40(Z6): 299-301.
[13] LI Jun,XUE Wei and GAN Xu-yang. Improved Trust Mechanism Based on EigenRep Trust Model [J]. Computer Science, 2013, 40(7): 113-115.
[14] SUN Tao,ZHAO Guo-sheng and WANG Bin. Trust Optimization Search p2p Node Localization Algorithm [J]. Computer Science, 2013, 40(7): 71-73.
[15] . Trust Measuring Model Based on Social Factors of Users and their Behavior [J]. Computer Science, 2013, 40(1): 127-131.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!