Jiangwen Wan

Learn More
In wireless sensor networks (WSNs), there are numerous factors that may cause network congestion problems, such as the many-to-one communication modes, mutual interference of wireless links, dynamic changes of network topology and the memory-restrained characteristics of nodes. All these factors result in a network being more vulnerable to congestion. In(More)
For wireless sensor networks (WSNs), many factors, such as mutual interference of wireless links, battlefield applications and nodes exposed to the environment without good physical protection, result in the sensor nodes being more vulnerable to be attacked and compromised. In order to address this network security problem, a novel trust evaluation(More)
In light of the problems of low recognition efficiency, high false rates and poor localization accuracy in traditional pipeline security detection technology, this paper proposes a type of hierarchical leak detection and localization method for use in natural gas pipeline monitoring sensor networks. In the signal preprocessing phase, original monitoring(More)
Localization is one of the supporting technologies in wireless sensor networks. In this paper, a novel SL-R distributed algorithm is formally described, designed, implemented and evaluated. The algorithm includes two stages. In first stage, sampling is carrying out based on received anchor information and the initial position estimate of sensor node comes(More)
A limit DV-hop (LDV-hop) algorithm is put forward based on comprehensive analysis of DV-hop localization algorithms, in order to satisfy the characters of low cost and low power in WSNs. The least hop number between nodes and landmarks is counted firstly and the distance in hops is then computed. Finally the coordinates of nodes are determined. LDV-hop(More)
Trust management is suitable for handling the internal security problems in wireless sensor networks. However, trust management schemes usually neglect the selfishness of normal nodes and regard malicious nodes as never cooperate. Thus, to ensure trustworthiness and encourage nodes to cooperate, incentive mechanisms are in pressing demand for trust(More)
Due to the unique characteristics of disruption-tolerant networks (DTNs), such as sporadic and unpredictable connectivity, routing protocols in DTNs are facing many challenges. Message propagation follows the manner of store-carry-and-forward and the existing opportunistic data forwards routings under the hypothesis that each individual node is ready to(More)
To reduce the energy consumption in wireless sensor networks during target tracking, a distributed target tracking method applied in asynchronous wireless sensor networks was proposed. Firstly, the dynamic clusters were constructed and adjusted according to the distances between nodes and target, which were the unit for time computing. The cluster headers(More)