Skip to main content
Top

2020 | OriginalPaper | Chapter

A Combined Routing Path and Node Importance Network Invulnerability Evaluating Method for Ad Hoc Network

Authors : Weiling Zhou, Bo Li, Zhongjiang Yan, Mao Yang

Published in: Wireless Internet

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, a new network invulnerability evaluation model based on routing path and node importance is proposed. The core of the invulnerability algorithm lies in two levels, comprehensive consideration of the influencing factors of network to point-to-line network invulnerability. The algorithm considers the influence of the proportion of important nodes of the network on the invulnerability of the network, and considers the influence of the number of paths between the communication nodes on the invulnerability of the path. Through simulation comparison, it is found that this algorithm improves the sensitivity of network invulnerability to the number of paths, and is suitable for communication networks in the case of multiple routing paths.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Li, K., Wang, H.: Research on invulnerability of scale-free network with a unified method. Int. J. Arts Technol. 11(3), 266–284 (2019)CrossRef Li, K., Wang, H.: Research on invulnerability of scale-free network with a unified method. Int. J. Arts Technol. 11(3), 266–284 (2019)CrossRef
2.
go back to reference He, S., Jin, C., Wei, H., Liu, Q.: A measure method for network invulnerability based on improved albert algorithm. In: International Conference on Instrumentation (2011) He, S., Jin, C., Wei, H., Liu, Q.: A measure method for network invulnerability based on improved albert algorithm. In: International Conference on Instrumentation (2011)
3.
go back to reference Albert, R., Jeong, H., Barabasi, A.L.: Error and attack tolerance of complex networks. Nature 340(1), 378–382 (2000)MathSciNetCrossRef Albert, R., Jeong, H., Barabasi, A.L.: Error and attack tolerance of complex networks. Nature 340(1), 378–382 (2000)MathSciNetCrossRef
4.
go back to reference Fu, X., Yao, H., Yang, Y.: Exploring the invulnerability of wireless sensor networks against cascading failures. Inf. Sci. (2019) Fu, X., Yao, H., Yang, Y.: Exploring the invulnerability of wireless sensor networks against cascading failures. Inf. Sci. (2019)
5.
go back to reference Wen, C., Zhang, X.: The invulnerability of robust communication network. In: IEEE International Conference on Communication Software & Networks (2016) Wen, C., Zhang, X.: The invulnerability of robust communication network. In: IEEE International Conference on Communication Software & Networks (2016)
6.
go back to reference Luo, J.-J., Feng, Y.-H., Zuo, C.: Analysis on the invulnerability of network based on scale-free network, pp. 1519–1522 (2018) Luo, J.-J., Feng, Y.-H., Zuo, C.: Analysis on the invulnerability of network based on scale-free network, pp. 1519–1522 (2018)
7.
go back to reference Rao, Y.P., Lin, J.Y., Hou, D.T.: Evaluation method for network invulnerability based on shortest route number. J. Commun. 30(4), 113–117 (2009) Rao, Y.P., Lin, J.Y., Hou, D.T.: Evaluation method for network invulnerability based on shortest route number. J. Commun. 30(4), 113–117 (2009)
8.
go back to reference Yun, F., Hong, L.Z., Hai, T.Y.: Research of new certain metrics of network invulnerability. Adv. Mater. Res. 301–303, 1322–1326 (2011) Yun, F., Hong, L.Z., Hai, T.Y.: Research of new certain metrics of network invulnerability. Adv. Mater. Res. 301–303, 1322–1326 (2011)
9.
go back to reference Li, E., Gong, J., Huang, J.: Analysis about functional invulnerability of convergent network based on function chain. Binggong Xuebao/Acta Armamentarii 40(7), 1450–1459 (2019) Li, E., Gong, J., Huang, J.: Analysis about functional invulnerability of convergent network based on function chain. Binggong Xuebao/Acta Armamentarii 40(7), 1450–1459 (2019)
10.
go back to reference Zhao, D.J., Yang, H.T., Jian, J., Yu, H.: Modeling and simulation of the invulnerability of space information network. In: International Conference on Internet Technology & Applications (2010) Zhao, D.J., Yang, H.T., Jian, J., Yu, H.: Modeling and simulation of the invulnerability of space information network. In: International Conference on Internet Technology & Applications (2010)
11.
go back to reference Peng, K., Huang, B.: The invulnerability studies on data center network. Int. J. Secur. Appl. 9(11), 167–186 (2015) Peng, K., Huang, B.: The invulnerability studies on data center network. Int. J. Secur. Appl. 9(11), 167–186 (2015)
12.
go back to reference Tian, X.W., Liu, S.Y., Zhang, Z.H., Dong, H.J.: A topology optimal algorithm for improving the invulnerability of scale-free networks. In: International Conference on Information System & Artificial Intelligence (2017) Tian, X.W., Liu, S.Y., Zhang, Z.H., Dong, H.J.: A topology optimal algorithm for improving the invulnerability of scale-free networks. In: International Conference on Information System & Artificial Intelligence (2017)
13.
go back to reference Bao, X.-C., Dai, F.-S., Han, W.-Z.: Evaluation method of network invulnerability based on disjoint paths in topology. Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Syst. Eng. Electron. 34(1), 168–174 (2012) Bao, X.-C., Dai, F.-S., Han, W.-Z.: Evaluation method of network invulnerability based on disjoint paths in topology. Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Syst. Eng. Electron. 34(1), 168–174 (2012)
14.
go back to reference Chen, H.-H., Lin, A.-M.: Complex network characteristics and invulnerability simulating analysis of supply chain. J. Netw. 7(3), 591–597 (2012) Chen, H.-H., Lin, A.-M.: Complex network characteristics and invulnerability simulating analysis of supply chain. J. Netw. 7(3), 591–597 (2012)
15.
go back to reference Wu, J., Tan, S.-Y., Tan, Y.-J., Deng, H.-Z.: Analysis of invulnerability in complex networks based on natural connectivity. Complex Syst. Complex. Sci. 11(1), 77–86 (2014) Wu, J., Tan, S.-Y., Tan, Y.-J., Deng, H.-Z.: Analysis of invulnerability in complex networks based on natural connectivity. Complex Syst. Complex. Sci. 11(1), 77–86 (2014)
16.
go back to reference Jiang, L., Zhang, F., Yang, R., Xu, K.: Influence of sensor nodes on the invulnerability of tree network. Telkomnika (Telecommun. Comput. Electron. Control) 13(4), 1242–1250 (2015)CrossRef Jiang, L., Zhang, F., Yang, R., Xu, K.: Influence of sensor nodes on the invulnerability of tree network. Telkomnika (Telecommun. Comput. Electron. Control) 13(4), 1242–1250 (2015)CrossRef
17.
go back to reference Fu, X., Li, W., Fortino, G.: Empowering the invulnerability of wireless sensor networks through super wires and super nodes, pp. 561–568 (2013) Fu, X., Li, W., Fortino, G.: Empowering the invulnerability of wireless sensor networks through super wires and super nodes, pp. 561–568 (2013)
18.
go back to reference Feng, H., Li, C., Xu, Y.: Invulnerability analysis of vehicular ad hoc networks based on temporal networks. In: IEEE International Conference on Computer & Communications (2017) Feng, H., Li, C., Xu, Y.: Invulnerability analysis of vehicular ad hoc networks based on temporal networks. In: IEEE International Conference on Computer & Communications (2017)
19.
go back to reference Feng, H.-F., Li, C.-H.: Invulnerability analysis of vehicle self-organizing network based on complex network. Comput. Appl. 36(7), 1789–1792 (2016) Feng, H.-F., Li, C.-H.: Invulnerability analysis of vehicle self-organizing network based on complex network. Comput. Appl. 36(7), 1789–1792 (2016)
Metadata
Title
A Combined Routing Path and Node Importance Network Invulnerability Evaluating Method for Ad Hoc Network
Authors
Weiling Zhou
Bo Li
Zhongjiang Yan
Mao Yang
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-52988-8_3

Premium Partner