Abstract-In order to adapt to the multi network convergence of IoT, this paper summarizes the development status, existing problems and further research priorities of the Internet of Things (IoT) and wireless sensor networks (WSNs). Based on that, a generation method of the energy-saving and intrusion-tolerant self-organizing redundancy cellular architecture wireless sensor network (SORCA-W) topology is proposed to realize the interconnection of multiple sensor networks based on the improvement of the SORCA protocol of the wireless sensor topology. Through this generation method, the network can be firstly divided into hexagonal topology network structures according to the location of nodes, then the neighbor node table can be judged and modified by collection of other network nodes and the network name can be added, so that multiple WSNs can be connected for communication to complete the multinetwork integration in the perception layer of IoT.Keywords Internet of Things; wireless sensor networks; perceptual requirements; topology
IntroductionThe IoT, an integration of existing networks [1][2], is a ubiquitous network built on the Internet. It is growing along with the progress of various networks, especially the improvement on the process of the wireless sensor originals. WSNs are the most important part of the IoT [3] and an essential composition of the perception layer of the IoT. The functions of wireless sensor nodes become more diverse with the development of science and technology. Different perception nodes can perceive the information that people need and transfer it to the terminal applications timely and stably, which is a further expansion of the original network and a critical material foundation for the development of the IoT [4]. Security issues of WSNs will be more prominent under the growth of the IoT. The major problems and concerns are as follows: firstly, the existing security technologies fail to meet the requirement of multi-network integration of the IoT; secondly, how to avoid the impact of the newly-added nodes on other networks; thirdly, how to identify different network nodes and how to cooperate; fourthly, whether there are security risks during the message transmission and how to ensure the security of messages in reposting and how to repost messages of 24