Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Ad Hoc network key node identification method fused with deletion method

A key node and identification method technology, applied in the field of network security, can solve problems such as many key nodes, high algorithm time complexity, and difficult to distinguish node criticality, and achieve good adaptability, accurate identification results, and low time complexity Effect

Inactive Publication Date: 2017-06-30
ELECTRONICS ENG COLLEGE PLA
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the methods of network key node identification are mainly divided into two categories: the first category is social network analysis method: including: degree value method, betweenness method, k-shell decomposition method, eigenvector method, semi-local centrality method, etc., these The method is to equate the criticality of the nodes with the salience, and the research on the indicators does not destroy the integrity of the network; although the intermediary method can accurately grasp the overall topology information of the network, it seems to have a good effect on the identification of key nodes, but its The time complexity of the algorithm is relatively high, and it is not suitable for large-scale dynamic Ad Hoc networks; although the semi-local centrality method can quickly identify the key nodes of large-scale networks, this method only considers the degree of nodes within the range of four hops. relationship, and cannot accurately give the key nodes of the network
The second type is the node deletion method, which is the destructiveness of the network after the key equivalent of the node is deleted, and the research on the index destroys the integrity of the network
Although the node contraction method can identify the key nodes of the network by measuring the degree of network cohesion after node contraction, when multiple nodes have the same network topology after contraction, the criticality of these nodes is difficult to distinguish
Although the node deletion method based on the k-hop range can quickly identify the key nodes of a large-scale Ad Hoc network, if there are too many segmentation points in the network itself, the identified key nodes will be unable to distinguish because of the large number. criticality

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ad Hoc network key node identification method fused with deletion method
  • Ad Hoc network key node identification method fused with deletion method
  • Ad Hoc network key node identification method fused with deletion method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] Example 1: see Figure 1 to Figure 5 , a kind of Ad Hoc network key node identification method of fusion deletion method, comprises the following steps:

[0042] A. Let the graph G=(V,L) be an unweighted and undirected network composed of n nodes and m links, where V={v 1 ,v 2 ,...,v n} is the set of all nodes in the network, L={l 1 , l 2 ,...,l m} is the set of links between all nodes;

[0043] B. Define the k-hop range of network nodes, k-hop local key nodes, split points and k-hop split points;

[0044]The k-hop range of a node refers to the range of all nodes that can be reached by the node in its shortest path less than or equal to k hops, and its topology includes all nodes within the k-hop range of the node and all links between these nodes road;

[0045] The k-hop local key node refers to the key node within the k-hop range, and when the number of nodes contained in the k-hop range is equal to n, this type of key node is called a global key node; if the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a dynamic Ad Hoc network key node identification method. The dynamic Ad Hoc network key node identification method comprises the following steps of: constructing an Ad Hoc network model, defining the connectivity of an Ad Hoc network, defining the connectivity of the Ad Hoc network after nodes are deleted, defining the key degree of Ad Hoc network nodes, dynamically identifying Ad Hoc network key nodes, and determining the key performance sequence of the Ad Hoc network nodes. The dynamic Ad Hoc network key node identification method disclosed by the invention solves the following problems in the existing algorithm: key nodes of a network are difficultly given; the key performances of the identified key nodes cannot be distinguished; the existing algorithm is not suitable for key node identification of a large-scale network or a dynamic network, etc. Thereby, the identification efficiency of the Ad Hoc network key nodes is further increased; and the security and the reliability of the Ad Hoc network are improved.

Description

technical field [0001] The invention belongs to the technical field of network security, in particular to an Ad Hoc network key node identification method based on a fusion deletion method. Background technique [0002] Ad Hoc network is a kind of self-organizing network, and its topology structure will change with the movement of communication nodes. Therefore, when identifying key nodes, a fast and effective method is needed to adapt to its dynamically changing topology structure. . At present, the methods of network key node identification are mainly divided into two categories: the first category is social network analysis method: including: degree value method, betweenness method, k-shell decomposition method, eigenvector method, semi-local centrality method, etc., these The method is to equate the criticality of the nodes with the salience, and the research on the indicators does not destroy the integrity of the network; although the intermediary method can accurately...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W84/18
CPCH04W12/00H04W84/18
Inventor 雷迎科蔡晓霞李鹏飞陈红姜丽叶涛
Owner ELECTRONICS ENG COLLEGE PLA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products