Abstract
In this paper, a new network invulnerability evaluation model based on routing path and node importance is proposed. The core of the invulnerability algorithm lies in two levels, comprehensive consideration of the influencing factors of network to point-to-line network invulnerability. The algorithm considers the influence of the proportion of important nodes of the network on the invulnerability of the network, and considers the influence of the number of paths between the communication nodes on the invulnerability of the path. Through simulation comparison, it is found that this algorithm improves the sensitivity of network invulnerability to the number of paths, and is suitable for communication networks in the case of multiple routing paths.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Li, K., Wang, H.: Research on invulnerability of scale-free network with a unified method. Int. J. Arts Technol. 11(3), 266–284 (2019)
He, S., Jin, C., Wei, H., Liu, Q.: A measure method for network invulnerability based on improved albert algorithm. In: International Conference on Instrumentation (2011)
Albert, R., Jeong, H., Barabasi, A.L.: Error and attack tolerance of complex networks. Nature 340(1), 378–382 (2000)
Fu, X., Yao, H., Yang, Y.: Exploring the invulnerability of wireless sensor networks against cascading failures. Inf. Sci. (2019)
Wen, C., Zhang, X.: The invulnerability of robust communication network. In: IEEE International Conference on Communication Software & Networks (2016)
Luo, J.-J., Feng, Y.-H., Zuo, C.: Analysis on the invulnerability of network based on scale-free network, pp. 1519–1522 (2018)
Rao, Y.P., Lin, J.Y., Hou, D.T.: Evaluation method for network invulnerability based on shortest route number. J. Commun. 30(4), 113–117 (2009)
Yun, F., Hong, L.Z., Hai, T.Y.: Research of new certain metrics of network invulnerability. Adv. Mater. Res. 301–303, 1322–1326 (2011)
Li, E., Gong, J., Huang, J.: Analysis about functional invulnerability of convergent network based on function chain. Binggong Xuebao/Acta Armamentarii 40(7), 1450–1459 (2019)
Zhao, D.J., Yang, H.T., Jian, J., Yu, H.: Modeling and simulation of the invulnerability of space information network. In: International Conference on Internet Technology & Applications (2010)
Peng, K., Huang, B.: The invulnerability studies on data center network. Int. J. Secur. Appl. 9(11), 167–186 (2015)
Tian, X.W., Liu, S.Y., Zhang, Z.H., Dong, H.J.: A topology optimal algorithm for improving the invulnerability of scale-free networks. In: International Conference on Information System & Artificial Intelligence (2017)
Bao, X.-C., Dai, F.-S., Han, W.-Z.: Evaluation method of network invulnerability based on disjoint paths in topology. Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Syst. Eng. Electron. 34(1), 168–174 (2012)
Chen, H.-H., Lin, A.-M.: Complex network characteristics and invulnerability simulating analysis of supply chain. J. Netw. 7(3), 591–597 (2012)
Wu, J., Tan, S.-Y., Tan, Y.-J., Deng, H.-Z.: Analysis of invulnerability in complex networks based on natural connectivity. Complex Syst. Complex. Sci. 11(1), 77–86 (2014)
Jiang, L., Zhang, F., Yang, R., Xu, K.: Influence of sensor nodes on the invulnerability of tree network. Telkomnika (Telecommun. Comput. Electron. Control) 13(4), 1242–1250 (2015)
Fu, X., Li, W., Fortino, G.: Empowering the invulnerability of wireless sensor networks through super wires and super nodes, pp. 561–568 (2013)
Feng, H., Li, C., Xu, Y.: Invulnerability analysis of vehicular ad hoc networks based on temporal networks. In: IEEE International Conference on Computer & Communications (2017)
Feng, H.-F., Li, C.-H.: Invulnerability analysis of vehicle self-organizing network based on complex network. Comput. Appl. 36(7), 1789–1792 (2016)
Acknowledgement
This work was supported in part by the National Natural Science Foundations of CHINA (Grant No.61771392, 61771390, 61871322, 61501373 and 61271279), the National Science and Technology Major Project (Grant No. 2015ZX03002006-004 and 2016ZX03001018-004), and Science and Technology on Avionics Integration Laboratory (Grant No. 20185553035).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Zhou, W., Li, B., Yan, Z., Yang, M. (2020). A Combined Routing Path and Node Importance Network Invulnerability Evaluating Method for Ad Hoc Network. In: Deng, DJ., Pang, AC., Lin, CC. (eds) Wireless Internet. WiCON 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 317. Springer, Cham. https://doi.org/10.1007/978-3-030-52988-8_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-52988-8_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-52987-1
Online ISBN: 978-3-030-52988-8
eBook Packages: Computer ScienceComputer Science (R0)