Skip to main content

A Combined Routing Path and Node Importance Network Invulnerability Evaluating Method for Ad Hoc Network

  • Conference paper
  • First Online:
Wireless Internet (WiCON 2019)

Abstract

In this paper, a new network invulnerability evaluation model based on routing path and node importance is proposed. The core of the invulnerability algorithm lies in two levels, comprehensive consideration of the influencing factors of network to point-to-line network invulnerability. The algorithm considers the influence of the proportion of important nodes of the network on the invulnerability of the network, and considers the influence of the number of paths between the communication nodes on the invulnerability of the path. Through simulation comparison, it is found that this algorithm improves the sensitivity of network invulnerability to the number of paths, and is suitable for communication networks in the case of multiple routing paths.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Li, K., Wang, H.: Research on invulnerability of scale-free network with a unified method. Int. J. Arts Technol. 11(3), 266–284 (2019)

    Article  Google Scholar 

  2. He, S., Jin, C., Wei, H., Liu, Q.: A measure method for network invulnerability based on improved albert algorithm. In: International Conference on Instrumentation (2011)

    Google Scholar 

  3. Albert, R., Jeong, H., Barabasi, A.L.: Error and attack tolerance of complex networks. Nature 340(1), 378–382 (2000)

    Article  MathSciNet  Google Scholar 

  4. Fu, X., Yao, H., Yang, Y.: Exploring the invulnerability of wireless sensor networks against cascading failures. Inf. Sci. (2019)

    Google Scholar 

  5. Wen, C., Zhang, X.: The invulnerability of robust communication network. In: IEEE International Conference on Communication Software & Networks (2016)

    Google Scholar 

  6. Luo, J.-J., Feng, Y.-H., Zuo, C.: Analysis on the invulnerability of network based on scale-free network, pp. 1519–1522 (2018)

    Google Scholar 

  7. Rao, Y.P., Lin, J.Y., Hou, D.T.: Evaluation method for network invulnerability based on shortest route number. J. Commun. 30(4), 113–117 (2009)

    Google Scholar 

  8. Yun, F., Hong, L.Z., Hai, T.Y.: Research of new certain metrics of network invulnerability. Adv. Mater. Res. 301–303, 1322–1326 (2011)

    Google Scholar 

  9. Li, E., Gong, J., Huang, J.: Analysis about functional invulnerability of convergent network based on function chain. Binggong Xuebao/Acta Armamentarii 40(7), 1450–1459 (2019)

    Google Scholar 

  10. Zhao, D.J., Yang, H.T., Jian, J., Yu, H.: Modeling and simulation of the invulnerability of space information network. In: International Conference on Internet Technology & Applications (2010)

    Google Scholar 

  11. Peng, K., Huang, B.: The invulnerability studies on data center network. Int. J. Secur. Appl. 9(11), 167–186 (2015)

    Google Scholar 

  12. Tian, X.W., Liu, S.Y., Zhang, Z.H., Dong, H.J.: A topology optimal algorithm for improving the invulnerability of scale-free networks. In: International Conference on Information System & Artificial Intelligence (2017)

    Google Scholar 

  13. Bao, X.-C., Dai, F.-S., Han, W.-Z.: Evaluation method of network invulnerability based on disjoint paths in topology. Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Syst. Eng. Electron. 34(1), 168–174 (2012)

    Google Scholar 

  14. Chen, H.-H., Lin, A.-M.: Complex network characteristics and invulnerability simulating analysis of supply chain. J. Netw. 7(3), 591–597 (2012)

    Google Scholar 

  15. Wu, J., Tan, S.-Y., Tan, Y.-J., Deng, H.-Z.: Analysis of invulnerability in complex networks based on natural connectivity. Complex Syst. Complex. Sci. 11(1), 77–86 (2014)

    Google Scholar 

  16. Jiang, L., Zhang, F., Yang, R., Xu, K.: Influence of sensor nodes on the invulnerability of tree network. Telkomnika (Telecommun. Comput. Electron. Control) 13(4), 1242–1250 (2015)

    Article  Google Scholar 

  17. Fu, X., Li, W., Fortino, G.: Empowering the invulnerability of wireless sensor networks through super wires and super nodes, pp. 561–568 (2013)

    Google Scholar 

  18. Feng, H., Li, C., Xu, Y.: Invulnerability analysis of vehicular ad hoc networks based on temporal networks. In: IEEE International Conference on Computer & Communications (2017)

    Google Scholar 

  19. Feng, H.-F., Li, C.-H.: Invulnerability analysis of vehicle self-organizing network based on complex network. Comput. Appl. 36(7), 1789–1792 (2016)

    Google Scholar 

Download references

Acknowledgement

This work was supported in part by the National Natural Science Foundations of CHINA (Grant No.61771392, 61771390, 61871322, 61501373 and 61271279), the National Science and Technology Major Project (Grant No. 2015ZX03002006-004 and 2016ZX03001018-004), and Science and Technology on Avionics Integration Laboratory (Grant No. 20185553035).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhongjiang Yan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhou, W., Li, B., Yan, Z., Yang, M. (2020). A Combined Routing Path and Node Importance Network Invulnerability Evaluating Method for Ad Hoc Network. In: Deng, DJ., Pang, AC., Lin, CC. (eds) Wireless Internet. WiCON 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 317. Springer, Cham. https://doi.org/10.1007/978-3-030-52988-8_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-52988-8_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-52987-1

  • Online ISBN: 978-3-030-52988-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics