CN111800201A - Method for identifying key nodes of Sink node underwater acoustic sensor network - Google Patents
Method for identifying key nodes of Sink node underwater acoustic sensor network Download PDFInfo
- Publication number
- CN111800201A CN111800201A CN202010584590.2A CN202010584590A CN111800201A CN 111800201 A CN111800201 A CN 111800201A CN 202010584590 A CN202010584590 A CN 202010584590A CN 111800201 A CN111800201 A CN 111800201A
- Authority
- CN
- China
- Prior art keywords
- node
- network
- nodes
- expression
- degree
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B13/00—Transmission systems characterised by the medium used for transmission, not provided for in groups H04B3/00 - H04B11/00
- H04B13/02—Transmission systems in which the medium consists of the earth or a large mass of water thereon, e.g. earth telegraphy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/12—Discovery or management of network topologies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Abstract
The invention provides a method for identifying key nodes of a Sink node underwater acoustic sensor network, which is characterized in that 7 characteristics of the use degree, hop distance, degree, betweenness, compactness, feature vector centrality and vulnerability of the Sink node underwater acoustic sensor network are collected and multi-dimensional characteristics are fused to finally obtain an importance evaluation value of each node, so that very effective prerequisite information is provided for network topology control and safety protection. The invention carries out multidimensional, effective and accurate evaluation on the importance of each node in the network, can greatly improve the delivery rate and the throughput of the network and reduce the network delay. Meanwhile, under the hostile environment, by strengthening the defense on own key nodes, the potential threats are eliminated in time, and the own network security is enhanced.
Description
Technical Field
The invention relates to the technical field of underwater acoustic sensor networks, in particular to a Sink node underwater acoustic sensor network key node identification method which can provide necessary information for the topological control and safety protection of an underwater acoustic sensor network.
Background
Abundant resources are stored in oceans, and the realization of ocean observation, resource exploration and development is one of the most concerned problems of various ocean countries at present. In recent years, the underwater acoustic sensor network has made great progress due to the expansion of the field of application of marine information, and has been applied to marine military, research on marine environment and weather, development of marine resources, and the like.
The underwater acoustic sensor network mostly adopts a Sink node topological structure due to the service requirement. There are two types of nodes in the network architecture: one is a buoy node deployed on the water surface, which is also called a Sink node; the other is a common sensor node deployed in the underwater space of a designated area. The Sink node is provided with a wireless modem and a hydroacoustic modem, and the wireless modem and the hydroacoustic modem are used for communication among the Sink node, the Sink node and the monitoring center. The latter uses the communication between Sink node and ordinary sensor node. The common sensor node is only provided with a underwater sound modem, and the node can communicate with the neighbor node by using the device. Since all the Sink nodes are equipped with wireless modems, any Sink node which successfully receives the data packet can quickly forward the data packet to other Sink nodes or a monitoring center through wireless communication. The structure can ensure that the underwater acquisition node can quickly send data to the overwater node and send the data to a network manager through a satellite.
In practical application of the underwater acoustic sensor network, each node is located at a position with different network topologies and has unequal resources, so that each node plays different roles in the network. Therefore, there are some key nodes, and once these nodes fail, they will cause network segmentation, communication interruption, data packet loss, etc., which greatly affect the connectivity of the network, and further cause the network communication to fail to operate normally. Meanwhile, as the key node is in a key position in the network, once malicious behaviors occur in the key node, the network performance is sharply reduced. Therefore, efficient discovery of critical nodes can provide the necessary information for network topology control and security protection.
Because the key nodes have important influence on the network, the research on key node identification at home and abroad obtains a plurality of achievements, and some key node identification algorithms are proposed and summarized as follows: single index identification algorithms, composite index identification algorithms, identification algorithms based on destructive equivalence to critical ideas, and the like.
However, through analysis of the existing key node algorithm, the existing algorithm is only limited to the calculation of the topology, and the influence of various factors (the traffic size, the communication environment and the like) when the node actually runs in the network is not considered. The existing key node identification algorithm is researched for a land network, and a key node identification technology for an underwater network is not available. Therefore, it is meaningful to provide a key node identification algorithm for the underwater acoustic sensor network.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a method for identifying key nodes of a Sink node underwater acoustic sensor network. In order to quickly find key nodes in a network in the working process of an underwater acoustic sensor network, provide necessary information for further network topology control and safety protection, and provide a method for identifying the key nodes of a Sink node underwater acoustic sensor network aiming at the problems that the underwater network has the requirement on the importance of the nodes in the topology and safety protection, the importance of the nodes is difficult to evaluate and the like. According to the invention, by collecting 7 characteristics of the service degree, hop distance, degree, betweenness, compactness, feature vector centrality and vulnerability of the Sink node underwater acoustic sensor network and carrying out multi-dimensional feature fusion, the importance evaluation value of each node is finally obtained, thereby providing very effective prerequisite information for network topology control and safety protection.
The technical scheme adopted by the invention for solving the technical problem comprises the following steps:
the first step is as follows: the Sink node is used as a destination node and collects each communication path in the network working process;
in the network working process, when each node forwards a data packet, the node number and the position information of the node are added into the data packet, and finally, a destination node receives a data packet communication path except data and the position information of each node;
the second step is that: generating a network topological graph;
according to the communication path obtained in the first step, whether a path exists between any two points in the network is known; if the path is connected, connecting the two nodes, otherwise, not connecting, and simultaneously calculating the length of each path according to the node position information to finally obtain a network topological graph;
the third step: calculating the degree, betweenness, compactness, feature vector centrality, vulnerability and use degree feature values of each node;
according to the topological graph obtained in the second step, the degree D (a), the betweenness B (a), the compactness C (i), the feature vector centrality E (a), the vulnerability V (i) and the use degree U (a) of each node are respectively calculated by expressions (1) - (6);
(1) the expression for the degree D (a) is:
Wherein a, i is a node vaAnd node viV represents the set of all nodes in the network;
(2) the expression of the betweenness B (a) is:
wherein P (i, j) is node viAnd vjThe shortest path number between P (i, a, j) is node viAnd vjBetween via node vaThe shortest path number of (2);
(3) the expression for the compactness C (i) is:
in the formula dijRepresenting a node viAnd vjThe length of the shortest path between;
(4) the expression of the feature vector centrality e (a) is:
where λ is a constant satisfying the equation Mx ═ λ x, and M is the adjacency matrix { x ] of the topological undirected graph1,x2,...,xi,...,xnIs a feature vector;
(5) the expression for vulnerability V (i) is:
in the formula (I), the compound is shown in the specification,is the global efficiency of the network, FiIs to remove node viAnd the network global efficiency behind all edges;
(6) the degree of use u (a) is expressed as:
in the formula (I), the compound is shown in the specification,indicating node v in the t-last communicationaAs the number of times the communication node is used;
the fourth step: counting the hop count of each node of the network and calculating the hop distance characteristic value;
the hop count of each node is added into the data packet, and finally the hop count is sent to the Sink destination node along with the data packet; the destination node counts the hop count of each node of the network, and then calculates the hop distance H (a) corresponding to each node, wherein the expression of the hop distance H (a) is as follows:
H(a)=h(a)-h(s) (7)
wherein h(s) represents the hop count of the Sink node, and h (a) represents the hop count of the a node;
the fifth step: data preprocessing normalization;
forming a vector [ a ] by each eigenvalue of all nodes calculated in the third step and the fourth stepi1,…,ain]]Wherein a isi1A value representing an ith characteristic of the first node; the 7 eigenvalues of all nodes in the network are respectively degree, betweenness, compactness, eigenvector centrality, vulnerability, use degree and hop distance, and the 7 eigenvalues finally form a decision matrix A ═ aij)7×nNormalizing the decision matrix A to obtain a normalized decision matrix B ═ (B)ij)7×nWherein:
and a sixth step: constructing a weighting specification matrix;
the normalized decision matrix B obtained from the fifth step is (B)ij)m×nConstructing a weighting norm matrix C ═ (C)ij)7×nThe expression of the weighting specification matrix is:
cij=wj·bij,i=1,2,,m;j=1,2,…,n (9)
wherein w ═ w1,w2,...wn]TGiving a weight vector of each characteristic value for a decision maker;
the seventh step: determining a positive ideal solution and a negative ideal solution, and solving the distance from each node to the positive ideal scheme and the negative ideal scheme;
the positive ideal solution expression is:
the negative ideal solution expression is:
the distance from the positive ideal solution is expressed as:
the distance to the negative ideal solution is expressed as:
eighth step: calculating the comprehensive evaluation index f of each nodei *I.e. importance, and is arranged from large to small; the expression of the comprehensive evaluation index is as follows:
finally, the importance evaluation value f of each node in the network is obtainedi *Selecting an importance evaluation value fi *The first 10% of nodes are used as key nodes, and next-step network topology control and safety protection are performed on the key nodes, so that the efficiency of the network topology control and safety protection is improved.
The method has the beneficial effects that the method for identifying the key nodes of the Sink node underwater acoustic sensor network can be used for carrying out multidimensional, effective and accurate evaluation on the importance of each node in the network in a complex underwater environment. In the topology control of the underwater acoustic sensor network, the delivery rate and the throughput of the network can be greatly improved and the network delay is reduced by controlling the identified key nodes. Meanwhile, in an enemy environment, by strengthening defense on key nodes of the own party, if replacement nodes and safety monitoring are added in due time, potential threats are eliminated in time, and the network safety of the own party is enhanced. Therefore, the invention has great significance for the research of the network topology of the underwater acoustic sensor network, promotes the application and development of the network space safety in the underwater sensor network, and provides a technical basis for the development of the air-sea integrated network in China.
Drawings
FIG. 1 is a general process block diagram of the present invention.
FIG. 2 is a network simulation scenario of the present invention
FIG. 3 network topology graph generated during simulation of the present invention
Fig. 4 is a simulation result of the importance evaluation value of each node according to the present invention.
Detailed Description
The invention is further illustrated with reference to the following figures and examples.
Taking an EALR layered opportunistic routing protocol widely used in the underwater acoustic sensor network as an example, the following embodiments of corresponding key node identification are given:
a Sink node underwater acoustic sensor network node scene based on an earr hierarchical opportunistic routing protocol is shown in fig. 2, and information transmission is performed between nodes by using acoustic signals. And the node No. 1 is a Sink node and is distributed on the water surface. The 2-21 nodes are all ordinary nodes and are distributed at positions of different depths underwater according to task requirements, and the ordinary nodes send data to the Sink node according to self service requirements.
As shown in fig. 1, the steps of the technical solution adopted by the present invention to solve the technical problem are as follows:
the first step is as follows: the Sink node is used as a destination node and collects each communication path in the network working process;
in the network working process, when each node forwards a data packet, the number and the position information of the node are added into the data packet, and finally, a destination node receives a data packet communication path except data and the position information of each node, for example, the data packet communication path is forwarded from the node No. 10 to the node No. 1 through the nodes No. 7, 5 and 3, namely the communication path of 10-7-5-3-1;
the second step is that: generating a network topological graph;
according to the communication path obtained in the first step, whether a path exists between any two points in the network is known; if the path is connected, connecting the two nodes, otherwise, not connecting, and simultaneously calculating the length of each path according to the node position information to finally obtain a network topological graph;
the third step: calculating the degree, betweenness, compactness, feature vector centrality, vulnerability and use degree feature values of each node;
according to the topological graph obtained in the second step, the degree D (a), the betweenness B (a), the compactness C (i), the feature vector centrality E (a), the vulnerability V (i) and the use degree U (a) of each node are respectively calculated by expressions (1) - (6);
(1) the expression for the degree D (a) is:
Wherein a, i is a node vaAnd node viV represents the set of all nodes in the network;
(2) the expression of the betweenness B (a) is:
wherein P (i, j) is node viAnd vjThe shortest path number between P (i, a, j) is node viAnd vjBetween via node vaThe shortest path number of (2);
(3) the expression for the compactness C (i) is:
in the formula dijRepresenting a node viAnd vjThe length of the shortest path between;
(4) the expression of the feature vector centrality e (a) is:
where λ is a constant satisfying the equation Mx ═ λ x, and M is the adjacency matrix of the topological undirected graph, { x1,x2,...,xi,...,xnIs a feature vector;
(5) the expression for vulnerability V (i) is:
in the formula (I), the compound is shown in the specification,is the global efficiency of the network, FiIs to remove node viAnd the network global efficiency behind all edges;
(6) the degree of use u (a) is expressed as:
in the formula (I), the compound is shown in the specification,indicating node v in the t-last communicationaAs the number of times the communication node is used;
the fourth step: counting the hop count of each node of the network and calculating the hop distance characteristic value;
the hop count of each node is added into the data packet, and finally the hop count is sent to the Sink destination node along with the data packet; the destination node counts the hop count of each node of the network, and then calculates the hop distance H (a) corresponding to each node, wherein the expression of the hop distance H (a) is as follows:
H(a)=h(a)-h(s) (7)
wherein h(s) represents the hop count of the Sink node, and h (a) represents the hop count of the a node;
the fifth step: data preprocessing normalization;
all sections calculated in the third and fourth stepsEach eigenvalue of a point constitutes a vector ai1,…,ain]Wherein a isi1A value representing an ith characteristic of the first node; the 7 eigenvalues of all nodes in the network are respectively degree, betweenness, compactness, eigenvector centrality, vulnerability, use degree and hop distance, and the 7 eigenvalues finally form a decision matrix A ═ aij)7×nNormalizing the decision matrix A to obtain a normalized decision matrix B ═ (B)ij)7×nWherein:
and a sixth step: constructing a weighting specification matrix;
the normalized decision matrix B obtained from the fifth step is (B)ij)m×nConstructing a weighting norm matrix C ═ (C)ij)7×nThe expression of the weighting specification matrix is:
cij=wj·bij,i=1,2,…,m;j=1,2,…,n (9)
wherein w ═ w1,w2,...wn]TGiving a weight vector of each characteristic value for a decision maker;
the seventh step: determining a positive ideal solution and a negative ideal solution, and solving the distance from each node to the positive ideal scheme and the negative ideal scheme;
the positive ideal solution expression is:
the negative ideal solution expression is:
the distance from the positive ideal solution is expressed as:
the distance to the negative ideal solution is expressed as:
eighth step: calculating the comprehensive evaluation index f of each nodei *I.e. importance, and is arranged from large to small; the expression of the comprehensive evaluation index is as follows:
finally, the importance evaluation value f of each node in the network is obtainedi *Selecting an importance evaluation value fi *The first 10% of nodes are used as key nodes, and next-step network topology control and safety protection are performed on the key nodes, so that the efficiency of the network topology control and safety protection is improved.
The specific implementation steps are as follows:
the first step is as follows: no. 1 node as destination node for collecting each communication path in network working process
In the network working process, when the underwater common nodes 2-21 transmit the data packet, the node number and the position information (x _ position, y _ position) of the node are added into the data packet. Finally, node 1, upon receiving the packet, stores each communication path (e.g., 3-16-1) within the packet. And meanwhile, the position information of the nodes 2 to 21 is updated.
The second step is that: generating a network topology map
And the node 1 analyzes whether a path exists between any two points in the network according to the communication path saved in the first step. If 3-16-1, a path exists between node No. 3 and node No. 16, and a path exists between node No. 16 and node No. 1. If the path is passed, the two nodes are connected, otherwise, the two nodes are not connected. And meanwhile, the length of each path is calculated according to the node position information, and finally the whole network topological graph is obtained. As shown in fig. 3.
The third step: 5 characteristics of the topological hierarchy and the use degree characteristics are calculated.
In the simulation process of the invention, 7 characteristic values of each node are calculated as shown in a graph 4:
TABLE 4 node eigenvalues
The fourth step: and collecting the use degree characteristics of the nodes in the network.
In the network operation process, the node 1 updates the hop count of the node 2-21 at regular time according to the node hop count information carried in the hierarchical control packet. And (4) according to the formula (7), subtracting the node hop count of No. 1 from the node hop count to calculate the hop distance H (a) of the No. 2-21 nodes. The calculation results are shown in table 4.
The fifth step: and preprocessing the characteristic raw data.
The degree D (a), the number B (a), the compactness C (i), the feature vector centrality E (a), the fragility V (i), the jump distance H (a) and the usage U (a) obtained by the calculation are processed into a normalized decision matrix by a formula (8).
And a sixth step: constructing a weighted norm matrix
Considering that the above 7 features represent different aspects of node importance, each criterion is compared pairwise and assigned a relative importance. The degree of use reflects the fact that the node was actually used in the network for the last period of time. The hop distance also represents the distance between the node at the current moment and the destination node No. 1. Betweenness and vulnerability reflect the indirect control ability of one node over other nodes throughout the network. The compactness reflects the position of the node in the topology, either near the center or at the edges. The feature vector centrality reflects the influence of neighbors.
Therefore, by the above comprehensive consideration, a weight vector is finally given:
w=[0.16,0.13,0.09,0.03,0.13,0.19,0.27]
w represents the proportion of degree D (a), medium B (a), compactness C (i), feature vector centrality E (a), fragility V (i), jump distance H (a) and use degree U (a) in the evaluation process of importance degree. The normalized decision matrix B obtained from the fifth step is (B)ij)m×nThe weighting norm matrix C is constructed by the formula (9) ═ Cij)m×n。
The seventh step: determining a positive ideal solution and a negative ideal solution and solving the distance from each node to the positive ideal scheme and the negative ideal scheme
And (4) calculating a positive ideal solution and a negative ideal solution according to the result of the sixth step and the formulas (10) and (11). The distance of each node from the positive ideal solution and the negative ideal solution is then calculated according to equations (12) (13).
The positive ideal solution is a virtual optimal solution that does not exist in the decision set, and each attribute value of the solution is the optimal value of the attribute in the decision matrix. While a negative ideal solution is a virtual worst case solution, each attribute value of which is the worst value for that attribute in the decision matrix. The distances from the nodes 2-21 to the positive ideal solution and the negative ideal solution are calculated and compared. Nodes closer to the positive ideal solution and further from the negative ideal solution are the most important nodes, and vice versa are the least important nodes in the network.
Eighth step: calculating the comprehensive evaluation index f of each node according to the formula (14)i *I.e., importance, and is arranged from large to small. And selecting the first 20% of nodes as key nodes, and performing next-step network topology control and safety protection aiming at the key nodes, so that the efficiency of the network topology control and safety protection is improved.
And aiming at the process, the performance of the OPNET is simulated by adopting the OPNET. As shown in fig. 2, the network size is set to 2km × 5km, one Sink node is randomly deployed on the upper layer of the network, and other common sensor nodes are deployed on the lower layer of the network and are responsible for acquiring data. The number of the sensor nodes is 21, and the sensor nodes are randomly distributed in the network domain. The maximum communication distance of all nodes is 1km, the maximum transmitting power is 1W, the receiving power is 0W, and the energy consumption in idle is 0W. And the common sensor node randomly sends acquired data to the Sink node according to the service requirement. BPSK modulation is used in the physical layer, CDMA is used in the MAC layer, and the transmission rate of the acoustic modem is 5000bps, and the simulation result is shown in fig. 4.
In the simulation result of fig. 4, the x direction is the node number, and the y direction is the importance of the node identified by the key node identification method. From simulation results, it can be seen that 2, 3, 14, 15, and 16 of all the nodes are nodes closest to the Sink node, and meanwhile, the nodes with more output transmission pass through, and the importance is higher. And the nodes 7, 8 and 9 are used as the nodes at the bottom layer of the network, so that the opportunity of participating in communication is not much, and the importance degree is lower. In conclusion, the key node identification algorithm can accurately identify the importance of the node in the network.
Claims (1)
1. A method for identifying key nodes of a Sink node underwater acoustic sensor network is characterized by comprising the following steps:
the first step is as follows: the Sink node is used as a destination node and collects each communication path in the network working process;
in the network working process, when each node forwards a data packet, the node number and the position information of the node are added into the data packet, and finally, a destination node receives a data packet communication path except data and the position information of each node;
the second step is that: generating a network topological graph;
according to the communication path obtained in the first step, whether a path exists between any two points in the network is known; if the path is connected, connecting the two nodes, otherwise, not connecting, and simultaneously calculating the length of each path according to the node position information to finally obtain a network topological graph;
the third step: calculating the degree, betweenness, compactness, feature vector centrality, vulnerability and use degree feature values of each node;
according to the topological graph obtained in the second step, the degree D (a), the betweenness B (a), the compactness C (i), the feature vector centrality E (a), the vulnerability V (i) and the use degree U (a) of each node are respectively calculated by expressions (1) - (6);
(1) the expression for the degree D (a) is:
Wherein a, i is a node vaAnd node viV represents the set of all nodes in the network;
(2) the expression of the betweenness B (a) is:
wherein P (i, j) is node viAnd vjThe shortest path number between P (i, a, j) is node viAnd vjBetween via node vaThe shortest path number of (2);
(3) the expression for the compactness C (i) is:
in the formula dijRepresenting a node viAnd vjThe length of the shortest path between;
(4) the expression of the feature vector centrality e (a) is:
where λ is a constant satisfying the equation Mx ═ λ x, and M is the adjacency matrix of the topological undirected graph, { x1,x2,...,xi,...,xnIs a feature vector;
(5) the expression for vulnerability V (i) is:
in the formula (I), the compound is shown in the specification,is the global efficiency of the network, FiIs to remove node viAnd the network global efficiency behind all edges;
(6) the degree of use u (a) is expressed as:
in the formula (I), the compound is shown in the specification,indicating node v in the t-last communicationaAs the number of times the communication node is used;
the fourth step: counting the hop count of each node of the network and calculating the hop distance characteristic value;
the hop count of each node is added into the data packet, and finally the hop count is sent to the Sink destination node along with the data packet; the destination node counts the hop count of each node of the network, and then calculates the hop distance H (a) corresponding to each node, wherein the expression of the hop distance H (a) is as follows:
H(a)=h(a)-h(s) (7)
wherein h(s) represents the hop count of the Sink node, and h (a) represents the hop count of the a node;
the fifth step: data preprocessing normalization;
forming a vector [ a ] by each eigenvalue of all nodes calculated in the third step and the fourth stepi1,…,ain]Wherein a isi1A value representing an ith characteristic of the first node; the 7 eigenvalues of all nodes in the network are respectively degree, betweenness, compactness, eigenvector centrality, vulnerability, use degree and hop distance, and the 7 eigenvalues finally form a decision matrix A ═ aij)7×nNormalizing the decision matrix A to obtain a normalized decision matrix B ═ (B)ij)7×nWherein:
and a sixth step: constructing a weighting specification matrix;
the normalized decision matrix B obtained from the fifth step is (B)ij)m×nConstructing a weighting norm matrix C ═ (C)ij)7×nThe expression of the weighting specification matrix is:
cij=wj·bij,i=1,2,…,m;j=1,2,…,n (9)
wherein w ═ w1,w2,...wn]TGiving a weight vector of each characteristic value for a decision maker;
the seventh step: determining a positive ideal solution and a negative ideal solution, and solving the distance from each node to the positive ideal scheme and the negative ideal scheme;
the positive ideal solution expression is:
the negative ideal solution expression is:
the distance from the positive ideal solution is expressed as:
the distance to the negative ideal solution is expressed as:
eighth step: calculating the comprehensive evaluation index f of each nodei *I.e. importance, and is arranged from large to small; expression of the overall evaluation index asThe following:
finally, the importance evaluation value f of each node in the network is obtainedi *Selecting an importance evaluation value fi *The first 10% of nodes are used as key nodes, and next-step network topology control and safety protection are performed on the key nodes, so that the efficiency of the network topology control and the safety protection is improved.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010584590.2A CN111800201B (en) | 2020-06-24 | 2020-06-24 | Method for identifying key nodes of Sink node underwater acoustic sensor network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010584590.2A CN111800201B (en) | 2020-06-24 | 2020-06-24 | Method for identifying key nodes of Sink node underwater acoustic sensor network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111800201A true CN111800201A (en) | 2020-10-20 |
CN111800201B CN111800201B (en) | 2021-06-15 |
Family
ID=72803794
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010584590.2A Active CN111800201B (en) | 2020-06-24 | 2020-06-24 | Method for identifying key nodes of Sink node underwater acoustic sensor network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111800201B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113708953A (en) * | 2021-07-10 | 2021-11-26 | 西北工业大学 | Underwater acoustic sensor network anti-damage method based on node importance balance |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103476051A (en) * | 2013-09-11 | 2013-12-25 | 华北电力大学(保定) | Method for evaluating importance of nodes in communication network |
CN104469836A (en) * | 2014-11-24 | 2015-03-25 | 河海大学常州校区 | Method for building multi-dimension trust model in underwater sensor network |
CN106100877A (en) * | 2016-06-02 | 2016-11-09 | 东南大学 | A kind of power system reply network attack vulnerability assessment method |
CN106231609A (en) * | 2016-09-22 | 2016-12-14 | 北京工商大学 | A kind of underwater sensor network Optimization deployment method based on highest priority region |
CN106488526A (en) * | 2016-12-22 | 2017-03-08 | 西北工业大学 | Mobile multi-hop underwater acoustic network dynamic method for self-locating based on layering |
CN106850254A (en) * | 2016-12-20 | 2017-06-13 | 国网新疆电力公司信息通信公司 | Key node recognition methods in a kind of power telecom network |
CN107994948A (en) * | 2017-12-30 | 2018-05-04 | 山东省科学院海洋仪器仪表研究所 | A kind of mobile Sink paths planning methods for underwater heterogeneous sensor network |
CN108464032A (en) * | 2015-10-16 | 2018-08-28 | 罗马大学 | The routing policy of node in underwater network and the method for re-transmission policy and its realization device are managed in a manner of adaptive and engagement |
CN108684052A (en) * | 2018-07-13 | 2018-10-19 | 南京理工大学 | Radio link quality prediction technique in a kind of high-freedom degree underwater sensor network |
US20180351842A1 (en) * | 2015-03-31 | 2018-12-06 | Zuora, Inc. | Systems and methods for live testing performance conditions of a multi-tenant system |
CN109409730A (en) * | 2018-10-22 | 2019-03-01 | 西南交通大学 | A kind of energy microgrid site selecting method based on complex network characteristic evaluation |
CN109672570A (en) * | 2019-01-15 | 2019-04-23 | 海南大学 | A kind of underwater sound cognitive sensor network multiple access method of adaptive-flow |
US10332384B1 (en) * | 2018-07-26 | 2019-06-25 | Observables, Inc. | Actions and communications responsive to real-time events incorporating local, remote and learned information |
-
2020
- 2020-06-24 CN CN202010584590.2A patent/CN111800201B/en active Active
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103476051A (en) * | 2013-09-11 | 2013-12-25 | 华北电力大学(保定) | Method for evaluating importance of nodes in communication network |
CN104469836A (en) * | 2014-11-24 | 2015-03-25 | 河海大学常州校区 | Method for building multi-dimension trust model in underwater sensor network |
US20180351842A1 (en) * | 2015-03-31 | 2018-12-06 | Zuora, Inc. | Systems and methods for live testing performance conditions of a multi-tenant system |
CN108464032A (en) * | 2015-10-16 | 2018-08-28 | 罗马大学 | The routing policy of node in underwater network and the method for re-transmission policy and its realization device are managed in a manner of adaptive and engagement |
CN106100877A (en) * | 2016-06-02 | 2016-11-09 | 东南大学 | A kind of power system reply network attack vulnerability assessment method |
CN106231609A (en) * | 2016-09-22 | 2016-12-14 | 北京工商大学 | A kind of underwater sensor network Optimization deployment method based on highest priority region |
CN106850254A (en) * | 2016-12-20 | 2017-06-13 | 国网新疆电力公司信息通信公司 | Key node recognition methods in a kind of power telecom network |
CN106488526A (en) * | 2016-12-22 | 2017-03-08 | 西北工业大学 | Mobile multi-hop underwater acoustic network dynamic method for self-locating based on layering |
CN107994948A (en) * | 2017-12-30 | 2018-05-04 | 山东省科学院海洋仪器仪表研究所 | A kind of mobile Sink paths planning methods for underwater heterogeneous sensor network |
CN108684052A (en) * | 2018-07-13 | 2018-10-19 | 南京理工大学 | Radio link quality prediction technique in a kind of high-freedom degree underwater sensor network |
US10332384B1 (en) * | 2018-07-26 | 2019-06-25 | Observables, Inc. | Actions and communications responsive to real-time events incorporating local, remote and learned information |
CN109409730A (en) * | 2018-10-22 | 2019-03-01 | 西南交通大学 | A kind of energy microgrid site selecting method based on complex network characteristic evaluation |
CN109672570A (en) * | 2019-01-15 | 2019-04-23 | 海南大学 | A kind of underwater sound cognitive sensor network multiple access method of adaptive-flow |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113708953A (en) * | 2021-07-10 | 2021-11-26 | 西北工业大学 | Underwater acoustic sensor network anti-damage method based on node importance balance |
CN113708953B (en) * | 2021-07-10 | 2022-07-05 | 西北工业大学 | Underwater acoustic sensor network anti-damage method based on node importance balance |
Also Published As
Publication number | Publication date |
---|---|
CN111800201B (en) | 2021-06-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Luo et al. | A survey of routing protocols for underwater wireless sensor networks | |
Liu et al. | AUV-aided hybrid data collection scheme based on value of information for internet of underwater things | |
Chaaf et al. | Energy-efficient relay-based void hole prevention and repair in clustered multi-AUV underwater wireless sensor network | |
CN110049528B (en) | Mobile credible data collection method based on credible value utility in sensor network | |
CN103906164A (en) | Maritime search and rescue wireless sensor network topology structure and topology control method thereof | |
CN105578388A (en) | Maritime search and rescue wireless sensing network system and robustness route method thereof | |
Khasawneh et al. | Pressure based routing protocol for underwater wireless sensor networks: A survey | |
CN104883676A (en) | Cooperative safety communication method in multi-UAV environment | |
CN108289285A (en) | A kind of ocean wireless sensor network is lost data and is restored and reconstructing method | |
CN107969008B (en) | Centralized routing calculation method for software defined sensor network | |
CN111800201B (en) | Method for identifying key nodes of Sink node underwater acoustic sensor network | |
Chen et al. | DARP: A depth adaptive routing protocol for large-scale underwater acoustic sensor networks | |
Lin et al. | Fast node clustering based on an improved birch algorithm for data collection towards software-defined underwater acoustic sensor networks | |
CN109842888B (en) | Underwater acoustic channel quality dynamic evaluation and prediction method and system for underwater sensor network | |
Moussaoui et al. | Clustered chain founded on ant colony optimization energy efficient routing scheme for under-water wireless sensor networks | |
Alhazmi et al. | Energy aware approach for underwater wireless sensor networks scheduling: UMOD_LEACH | |
Natarajan et al. | Adaptive Time Difference of Time of Arrival in Wireless Sensor Network Routing for Enhancing Quality of Service. | |
CN113411766A (en) | Intelligent Internet of things comprehensive sensing system and method | |
CN109121178A (en) | One kind carrying out energy heterogeneous star networking route designing method based on Artificial Potential Field | |
Albarakati et al. | Reconfigurable underwater embedded systems architectures | |
Jianping et al. | SM-UAN: A software-defined underwater acoustic network of multi-controllers for inland waterway systems | |
Waghmare et al. | Efficient data aggregation methodology for Wireless Sensor Network | |
Singh et al. | UNDERWATER BASED ADHOC NETWORKS: A brief survey to its challenges, feasibility and issues | |
Matsuura | Maximizing lifetime of multiple data aggregation trees in wireless sensor networks | |
CN113708953A (en) | Underwater acoustic sensor network anti-damage method based on node importance balance |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20221118 Address after: 710075 2-310-29, Qing'an Park, No. 9, Gaoxin Second Road, High tech Zone, Xi'an, Shaanxi Patentee after: Xi'an Hanzhi Ruientropy Technology Co.,Ltd. Address before: 710072 No. 127 Youyi West Road, Shaanxi, Xi'an Patentee before: Northwestern Polytechnical University |