CN111800201A - Method for identifying key nodes of Sink node underwater acoustic sensor network - Google Patents

Method for identifying key nodes of Sink node underwater acoustic sensor network Download PDF

Info

Publication number
CN111800201A
CN111800201A CN202010584590.2A CN202010584590A CN111800201A CN 111800201 A CN111800201 A CN 111800201A CN 202010584590 A CN202010584590 A CN 202010584590A CN 111800201 A CN111800201 A CN 111800201A
Authority
CN
China
Prior art keywords
node
network
nodes
expression
degree
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010584590.2A
Other languages
Chinese (zh)
Other versions
CN111800201B (en
Inventor
申晓红
员一帆
王海燕
孙霖
马石磊
李宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Hanzhi Ruientropy Technology Co ltd
Original Assignee
Northwestern Polytechnical University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Northwestern Polytechnical University filed Critical Northwestern Polytechnical University
Priority to CN202010584590.2A priority Critical patent/CN111800201B/en
Publication of CN111800201A publication Critical patent/CN111800201A/en
Application granted granted Critical
Publication of CN111800201B publication Critical patent/CN111800201B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B13/00Transmission systems characterised by the medium used for transmission, not provided for in groups H04B3/00 - H04B11/00
    • H04B13/02Transmission systems in which the medium consists of the earth or a large mass of water thereon, e.g. earth telegraphy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Abstract

The invention provides a method for identifying key nodes of a Sink node underwater acoustic sensor network, which is characterized in that 7 characteristics of the use degree, hop distance, degree, betweenness, compactness, feature vector centrality and vulnerability of the Sink node underwater acoustic sensor network are collected and multi-dimensional characteristics are fused to finally obtain an importance evaluation value of each node, so that very effective prerequisite information is provided for network topology control and safety protection. The invention carries out multidimensional, effective and accurate evaluation on the importance of each node in the network, can greatly improve the delivery rate and the throughput of the network and reduce the network delay. Meanwhile, under the hostile environment, by strengthening the defense on own key nodes, the potential threats are eliminated in time, and the own network security is enhanced.

Description

Method for identifying key nodes of Sink node underwater acoustic sensor network
Technical Field
The invention relates to the technical field of underwater acoustic sensor networks, in particular to a Sink node underwater acoustic sensor network key node identification method which can provide necessary information for the topological control and safety protection of an underwater acoustic sensor network.
Background
Abundant resources are stored in oceans, and the realization of ocean observation, resource exploration and development is one of the most concerned problems of various ocean countries at present. In recent years, the underwater acoustic sensor network has made great progress due to the expansion of the field of application of marine information, and has been applied to marine military, research on marine environment and weather, development of marine resources, and the like.
The underwater acoustic sensor network mostly adopts a Sink node topological structure due to the service requirement. There are two types of nodes in the network architecture: one is a buoy node deployed on the water surface, which is also called a Sink node; the other is a common sensor node deployed in the underwater space of a designated area. The Sink node is provided with a wireless modem and a hydroacoustic modem, and the wireless modem and the hydroacoustic modem are used for communication among the Sink node, the Sink node and the monitoring center. The latter uses the communication between Sink node and ordinary sensor node. The common sensor node is only provided with a underwater sound modem, and the node can communicate with the neighbor node by using the device. Since all the Sink nodes are equipped with wireless modems, any Sink node which successfully receives the data packet can quickly forward the data packet to other Sink nodes or a monitoring center through wireless communication. The structure can ensure that the underwater acquisition node can quickly send data to the overwater node and send the data to a network manager through a satellite.
In practical application of the underwater acoustic sensor network, each node is located at a position with different network topologies and has unequal resources, so that each node plays different roles in the network. Therefore, there are some key nodes, and once these nodes fail, they will cause network segmentation, communication interruption, data packet loss, etc., which greatly affect the connectivity of the network, and further cause the network communication to fail to operate normally. Meanwhile, as the key node is in a key position in the network, once malicious behaviors occur in the key node, the network performance is sharply reduced. Therefore, efficient discovery of critical nodes can provide the necessary information for network topology control and security protection.
Because the key nodes have important influence on the network, the research on key node identification at home and abroad obtains a plurality of achievements, and some key node identification algorithms are proposed and summarized as follows: single index identification algorithms, composite index identification algorithms, identification algorithms based on destructive equivalence to critical ideas, and the like.
However, through analysis of the existing key node algorithm, the existing algorithm is only limited to the calculation of the topology, and the influence of various factors (the traffic size, the communication environment and the like) when the node actually runs in the network is not considered. The existing key node identification algorithm is researched for a land network, and a key node identification technology for an underwater network is not available. Therefore, it is meaningful to provide a key node identification algorithm for the underwater acoustic sensor network.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a method for identifying key nodes of a Sink node underwater acoustic sensor network. In order to quickly find key nodes in a network in the working process of an underwater acoustic sensor network, provide necessary information for further network topology control and safety protection, and provide a method for identifying the key nodes of a Sink node underwater acoustic sensor network aiming at the problems that the underwater network has the requirement on the importance of the nodes in the topology and safety protection, the importance of the nodes is difficult to evaluate and the like. According to the invention, by collecting 7 characteristics of the service degree, hop distance, degree, betweenness, compactness, feature vector centrality and vulnerability of the Sink node underwater acoustic sensor network and carrying out multi-dimensional feature fusion, the importance evaluation value of each node is finally obtained, thereby providing very effective prerequisite information for network topology control and safety protection.
The technical scheme adopted by the invention for solving the technical problem comprises the following steps:
the first step is as follows: the Sink node is used as a destination node and collects each communication path in the network working process;
in the network working process, when each node forwards a data packet, the node number and the position information of the node are added into the data packet, and finally, a destination node receives a data packet communication path except data and the position information of each node;
the second step is that: generating a network topological graph;
according to the communication path obtained in the first step, whether a path exists between any two points in the network is known; if the path is connected, connecting the two nodes, otherwise, not connecting, and simultaneously calculating the length of each path according to the node position information to finally obtain a network topological graph;
the third step: calculating the degree, betweenness, compactness, feature vector centrality, vulnerability and use degree feature values of each node;
according to the topological graph obtained in the second step, the degree D (a), the betweenness B (a), the compactness C (i), the feature vector centrality E (a), the vulnerability V (i) and the use degree U (a) of each node are respectively calculated by expressions (1) - (6);
(1) the expression for the degree D (a) is:
Figure BDA0002554187780000021
in the formula
Figure BDA0002554187780000031
Wherein a, i is a node vaAnd node viV represents the set of all nodes in the network;
(2) the expression of the betweenness B (a) is:
Figure BDA0002554187780000032
wherein P (i, j) is node viAnd vjThe shortest path number between P (i, a, j) is node viAnd vjBetween via node vaThe shortest path number of (2);
(3) the expression for the compactness C (i) is:
Figure BDA0002554187780000033
in the formula dijRepresenting a node viAnd vjThe length of the shortest path between;
(4) the expression of the feature vector centrality e (a) is:
Figure BDA0002554187780000034
where λ is a constant satisfying the equation Mx ═ λ x, and M is the adjacency matrix { x ] of the topological undirected graph1,x2,...,xi,...,xnIs a feature vector;
(5) the expression for vulnerability V (i) is:
Figure BDA0002554187780000035
in the formula (I), the compound is shown in the specification,
Figure BDA0002554187780000036
is the global efficiency of the network, FiIs to remove node viAnd the network global efficiency behind all edges;
(6) the degree of use u (a) is expressed as:
Figure BDA0002554187780000037
in the formula (I), the compound is shown in the specification,
Figure BDA0002554187780000038
indicating node v in the t-last communicationaAs the number of times the communication node is used;
the fourth step: counting the hop count of each node of the network and calculating the hop distance characteristic value;
the hop count of each node is added into the data packet, and finally the hop count is sent to the Sink destination node along with the data packet; the destination node counts the hop count of each node of the network, and then calculates the hop distance H (a) corresponding to each node, wherein the expression of the hop distance H (a) is as follows:
H(a)=h(a)-h(s) (7)
wherein h(s) represents the hop count of the Sink node, and h (a) represents the hop count of the a node;
the fifth step: data preprocessing normalization;
forming a vector [ a ] by each eigenvalue of all nodes calculated in the third step and the fourth stepi1,…,ain]]Wherein a isi1A value representing an ith characteristic of the first node; the 7 eigenvalues of all nodes in the network are respectively degree, betweenness, compactness, eigenvector centrality, vulnerability, use degree and hop distance, and the 7 eigenvalues finally form a decision matrix A ═ aij)7×nNormalizing the decision matrix A to obtain a normalized decision matrix B ═ (B)ij)7×nWherein:
Figure BDA0002554187780000041
and a sixth step: constructing a weighting specification matrix;
the normalized decision matrix B obtained from the fifth step is (B)ij)m×nConstructing a weighting norm matrix C ═ (C)ij)7×nThe expression of the weighting specification matrix is:
cij=wj·bij,i=1,2,,m;j=1,2,…,n (9)
wherein w ═ w1,w2,...wn]TGiving a weight vector of each characteristic value for a decision maker;
the seventh step: determining a positive ideal solution and a negative ideal solution, and solving the distance from each node to the positive ideal scheme and the negative ideal scheme;
the positive ideal solution expression is:
Figure BDA0002554187780000042
the negative ideal solution expression is:
Figure BDA0002554187780000043
the distance from the positive ideal solution is expressed as:
Figure BDA0002554187780000044
the distance to the negative ideal solution is expressed as:
Figure BDA0002554187780000051
eighth step: calculating the comprehensive evaluation index f of each nodei *I.e. importance, and is arranged from large to small; the expression of the comprehensive evaluation index is as follows:
Figure BDA0002554187780000052
finally, the importance evaluation value f of each node in the network is obtainedi *Selecting an importance evaluation value fi *The first 10% of nodes are used as key nodes, and next-step network topology control and safety protection are performed on the key nodes, so that the efficiency of the network topology control and safety protection is improved.
The method has the beneficial effects that the method for identifying the key nodes of the Sink node underwater acoustic sensor network can be used for carrying out multidimensional, effective and accurate evaluation on the importance of each node in the network in a complex underwater environment. In the topology control of the underwater acoustic sensor network, the delivery rate and the throughput of the network can be greatly improved and the network delay is reduced by controlling the identified key nodes. Meanwhile, in an enemy environment, by strengthening defense on key nodes of the own party, if replacement nodes and safety monitoring are added in due time, potential threats are eliminated in time, and the network safety of the own party is enhanced. Therefore, the invention has great significance for the research of the network topology of the underwater acoustic sensor network, promotes the application and development of the network space safety in the underwater sensor network, and provides a technical basis for the development of the air-sea integrated network in China.
Drawings
FIG. 1 is a general process block diagram of the present invention.
FIG. 2 is a network simulation scenario of the present invention
FIG. 3 network topology graph generated during simulation of the present invention
Fig. 4 is a simulation result of the importance evaluation value of each node according to the present invention.
Detailed Description
The invention is further illustrated with reference to the following figures and examples.
Taking an EALR layered opportunistic routing protocol widely used in the underwater acoustic sensor network as an example, the following embodiments of corresponding key node identification are given:
a Sink node underwater acoustic sensor network node scene based on an earr hierarchical opportunistic routing protocol is shown in fig. 2, and information transmission is performed between nodes by using acoustic signals. And the node No. 1 is a Sink node and is distributed on the water surface. The 2-21 nodes are all ordinary nodes and are distributed at positions of different depths underwater according to task requirements, and the ordinary nodes send data to the Sink node according to self service requirements.
As shown in fig. 1, the steps of the technical solution adopted by the present invention to solve the technical problem are as follows:
the first step is as follows: the Sink node is used as a destination node and collects each communication path in the network working process;
in the network working process, when each node forwards a data packet, the number and the position information of the node are added into the data packet, and finally, a destination node receives a data packet communication path except data and the position information of each node, for example, the data packet communication path is forwarded from the node No. 10 to the node No. 1 through the nodes No. 7, 5 and 3, namely the communication path of 10-7-5-3-1;
the second step is that: generating a network topological graph;
according to the communication path obtained in the first step, whether a path exists between any two points in the network is known; if the path is connected, connecting the two nodes, otherwise, not connecting, and simultaneously calculating the length of each path according to the node position information to finally obtain a network topological graph;
the third step: calculating the degree, betweenness, compactness, feature vector centrality, vulnerability and use degree feature values of each node;
according to the topological graph obtained in the second step, the degree D (a), the betweenness B (a), the compactness C (i), the feature vector centrality E (a), the vulnerability V (i) and the use degree U (a) of each node are respectively calculated by expressions (1) - (6);
(1) the expression for the degree D (a) is:
Figure BDA0002554187780000061
in the formula
Figure BDA0002554187780000062
Wherein a, i is a node vaAnd node viV represents the set of all nodes in the network;
(2) the expression of the betweenness B (a) is:
Figure BDA0002554187780000063
wherein P (i, j) is node viAnd vjThe shortest path number between P (i, a, j) is node viAnd vjBetween via node vaThe shortest path number of (2);
(3) the expression for the compactness C (i) is:
Figure BDA0002554187780000064
in the formula dijRepresenting a node viAnd vjThe length of the shortest path between;
(4) the expression of the feature vector centrality e (a) is:
Figure BDA0002554187780000071
where λ is a constant satisfying the equation Mx ═ λ x, and M is the adjacency matrix of the topological undirected graph, { x1,x2,...,xi,...,xnIs a feature vector;
(5) the expression for vulnerability V (i) is:
Figure BDA0002554187780000072
in the formula (I), the compound is shown in the specification,
Figure BDA0002554187780000073
is the global efficiency of the network, FiIs to remove node viAnd the network global efficiency behind all edges;
(6) the degree of use u (a) is expressed as:
Figure BDA0002554187780000074
in the formula (I), the compound is shown in the specification,
Figure BDA0002554187780000075
indicating node v in the t-last communicationaAs the number of times the communication node is used;
the fourth step: counting the hop count of each node of the network and calculating the hop distance characteristic value;
the hop count of each node is added into the data packet, and finally the hop count is sent to the Sink destination node along with the data packet; the destination node counts the hop count of each node of the network, and then calculates the hop distance H (a) corresponding to each node, wherein the expression of the hop distance H (a) is as follows:
H(a)=h(a)-h(s) (7)
wherein h(s) represents the hop count of the Sink node, and h (a) represents the hop count of the a node;
the fifth step: data preprocessing normalization;
all sections calculated in the third and fourth stepsEach eigenvalue of a point constitutes a vector ai1,…,ain]Wherein a isi1A value representing an ith characteristic of the first node; the 7 eigenvalues of all nodes in the network are respectively degree, betweenness, compactness, eigenvector centrality, vulnerability, use degree and hop distance, and the 7 eigenvalues finally form a decision matrix A ═ aij)7×nNormalizing the decision matrix A to obtain a normalized decision matrix B ═ (B)ij)7×nWherein:
Figure BDA0002554187780000076
and a sixth step: constructing a weighting specification matrix;
the normalized decision matrix B obtained from the fifth step is (B)ij)m×nConstructing a weighting norm matrix C ═ (C)ij)7×nThe expression of the weighting specification matrix is:
cij=wj·bij,i=1,2,…,m;j=1,2,…,n (9)
wherein w ═ w1,w2,...wn]TGiving a weight vector of each characteristic value for a decision maker;
the seventh step: determining a positive ideal solution and a negative ideal solution, and solving the distance from each node to the positive ideal scheme and the negative ideal scheme;
the positive ideal solution expression is:
Figure BDA0002554187780000081
the negative ideal solution expression is:
Figure BDA0002554187780000082
the distance from the positive ideal solution is expressed as:
Figure BDA0002554187780000083
the distance to the negative ideal solution is expressed as:
Figure BDA0002554187780000084
eighth step: calculating the comprehensive evaluation index f of each nodei *I.e. importance, and is arranged from large to small; the expression of the comprehensive evaluation index is as follows:
Figure BDA0002554187780000085
finally, the importance evaluation value f of each node in the network is obtainedi *Selecting an importance evaluation value fi *The first 10% of nodes are used as key nodes, and next-step network topology control and safety protection are performed on the key nodes, so that the efficiency of the network topology control and safety protection is improved.
The specific implementation steps are as follows:
the first step is as follows: no. 1 node as destination node for collecting each communication path in network working process
In the network working process, when the underwater common nodes 2-21 transmit the data packet, the node number and the position information (x _ position, y _ position) of the node are added into the data packet. Finally, node 1, upon receiving the packet, stores each communication path (e.g., 3-16-1) within the packet. And meanwhile, the position information of the nodes 2 to 21 is updated.
The second step is that: generating a network topology map
And the node 1 analyzes whether a path exists between any two points in the network according to the communication path saved in the first step. If 3-16-1, a path exists between node No. 3 and node No. 16, and a path exists between node No. 16 and node No. 1. If the path is passed, the two nodes are connected, otherwise, the two nodes are not connected. And meanwhile, the length of each path is calculated according to the node position information, and finally the whole network topological graph is obtained. As shown in fig. 3.
The third step: 5 characteristics of the topological hierarchy and the use degree characteristics are calculated.
Node 1 calculates the degree D (a), the betweenness B (a), the compactness C (i), the feature vector centrality E (a) and the vulnerability V (i) of nodes 2-21 according to the network topology of FIG. 3 by the above formulas (1), (2), (3), (4) and (5). Meanwhile, the utilization degree U (a) of the No. 2-21 node in the communication of nearly 100 times is calculated by the formula (6) according to the communication path. The calculation results are shown in table 4.
In the simulation process of the invention, 7 characteristic values of each node are calculated as shown in a graph 4:
TABLE 4 node eigenvalues
Figure BDA0002554187780000091
The fourth step: and collecting the use degree characteristics of the nodes in the network.
In the network operation process, the node 1 updates the hop count of the node 2-21 at regular time according to the node hop count information carried in the hierarchical control packet. And (4) according to the formula (7), subtracting the node hop count of No. 1 from the node hop count to calculate the hop distance H (a) of the No. 2-21 nodes. The calculation results are shown in table 4.
The fifth step: and preprocessing the characteristic raw data.
The degree D (a), the number B (a), the compactness C (i), the feature vector centrality E (a), the fragility V (i), the jump distance H (a) and the usage U (a) obtained by the calculation are processed into a normalized decision matrix by a formula (8).
And a sixth step: constructing a weighted norm matrix
Considering that the above 7 features represent different aspects of node importance, each criterion is compared pairwise and assigned a relative importance. The degree of use reflects the fact that the node was actually used in the network for the last period of time. The hop distance also represents the distance between the node at the current moment and the destination node No. 1. Betweenness and vulnerability reflect the indirect control ability of one node over other nodes throughout the network. The compactness reflects the position of the node in the topology, either near the center or at the edges. The feature vector centrality reflects the influence of neighbors.
Therefore, by the above comprehensive consideration, a weight vector is finally given:
w=[0.16,0.13,0.09,0.03,0.13,0.19,0.27]
w represents the proportion of degree D (a), medium B (a), compactness C (i), feature vector centrality E (a), fragility V (i), jump distance H (a) and use degree U (a) in the evaluation process of importance degree. The normalized decision matrix B obtained from the fifth step is (B)ij)m×nThe weighting norm matrix C is constructed by the formula (9) ═ Cij)m×n
The seventh step: determining a positive ideal solution and a negative ideal solution and solving the distance from each node to the positive ideal scheme and the negative ideal scheme
And (4) calculating a positive ideal solution and a negative ideal solution according to the result of the sixth step and the formulas (10) and (11). The distance of each node from the positive ideal solution and the negative ideal solution is then calculated according to equations (12) (13).
The positive ideal solution is a virtual optimal solution that does not exist in the decision set, and each attribute value of the solution is the optimal value of the attribute in the decision matrix. While a negative ideal solution is a virtual worst case solution, each attribute value of which is the worst value for that attribute in the decision matrix. The distances from the nodes 2-21 to the positive ideal solution and the negative ideal solution are calculated and compared. Nodes closer to the positive ideal solution and further from the negative ideal solution are the most important nodes, and vice versa are the least important nodes in the network.
Eighth step: calculating the comprehensive evaluation index f of each node according to the formula (14)i *I.e., importance, and is arranged from large to small. And selecting the first 20% of nodes as key nodes, and performing next-step network topology control and safety protection aiming at the key nodes, so that the efficiency of the network topology control and safety protection is improved.
And aiming at the process, the performance of the OPNET is simulated by adopting the OPNET. As shown in fig. 2, the network size is set to 2km × 5km, one Sink node is randomly deployed on the upper layer of the network, and other common sensor nodes are deployed on the lower layer of the network and are responsible for acquiring data. The number of the sensor nodes is 21, and the sensor nodes are randomly distributed in the network domain. The maximum communication distance of all nodes is 1km, the maximum transmitting power is 1W, the receiving power is 0W, and the energy consumption in idle is 0W. And the common sensor node randomly sends acquired data to the Sink node according to the service requirement. BPSK modulation is used in the physical layer, CDMA is used in the MAC layer, and the transmission rate of the acoustic modem is 5000bps, and the simulation result is shown in fig. 4.
In the simulation result of fig. 4, the x direction is the node number, and the y direction is the importance of the node identified by the key node identification method. From simulation results, it can be seen that 2, 3, 14, 15, and 16 of all the nodes are nodes closest to the Sink node, and meanwhile, the nodes with more output transmission pass through, and the importance is higher. And the nodes 7, 8 and 9 are used as the nodes at the bottom layer of the network, so that the opportunity of participating in communication is not much, and the importance degree is lower. In conclusion, the key node identification algorithm can accurately identify the importance of the node in the network.

Claims (1)

1. A method for identifying key nodes of a Sink node underwater acoustic sensor network is characterized by comprising the following steps:
the first step is as follows: the Sink node is used as a destination node and collects each communication path in the network working process;
in the network working process, when each node forwards a data packet, the node number and the position information of the node are added into the data packet, and finally, a destination node receives a data packet communication path except data and the position information of each node;
the second step is that: generating a network topological graph;
according to the communication path obtained in the first step, whether a path exists between any two points in the network is known; if the path is connected, connecting the two nodes, otherwise, not connecting, and simultaneously calculating the length of each path according to the node position information to finally obtain a network topological graph;
the third step: calculating the degree, betweenness, compactness, feature vector centrality, vulnerability and use degree feature values of each node;
according to the topological graph obtained in the second step, the degree D (a), the betweenness B (a), the compactness C (i), the feature vector centrality E (a), the vulnerability V (i) and the use degree U (a) of each node are respectively calculated by expressions (1) - (6);
(1) the expression for the degree D (a) is:
Figure FDA0002554187770000011
in the formula
Figure FDA0002554187770000012
Wherein a, i is a node vaAnd node viV represents the set of all nodes in the network;
(2) the expression of the betweenness B (a) is:
Figure FDA0002554187770000013
wherein P (i, j) is node viAnd vjThe shortest path number between P (i, a, j) is node viAnd vjBetween via node vaThe shortest path number of (2);
(3) the expression for the compactness C (i) is:
Figure FDA0002554187770000014
in the formula dijRepresenting a node viAnd vjThe length of the shortest path between;
(4) the expression of the feature vector centrality e (a) is:
Figure FDA0002554187770000021
where λ is a constant satisfying the equation Mx ═ λ x, and M is the adjacency matrix of the topological undirected graph, { x1,x2,...,xi,...,xnIs a feature vector;
(5) the expression for vulnerability V (i) is:
Figure FDA0002554187770000022
in the formula (I), the compound is shown in the specification,
Figure FDA0002554187770000023
is the global efficiency of the network, FiIs to remove node viAnd the network global efficiency behind all edges;
(6) the degree of use u (a) is expressed as:
Figure FDA0002554187770000024
in the formula (I), the compound is shown in the specification,
Figure FDA0002554187770000025
indicating node v in the t-last communicationaAs the number of times the communication node is used;
the fourth step: counting the hop count of each node of the network and calculating the hop distance characteristic value;
the hop count of each node is added into the data packet, and finally the hop count is sent to the Sink destination node along with the data packet; the destination node counts the hop count of each node of the network, and then calculates the hop distance H (a) corresponding to each node, wherein the expression of the hop distance H (a) is as follows:
H(a)=h(a)-h(s) (7)
wherein h(s) represents the hop count of the Sink node, and h (a) represents the hop count of the a node;
the fifth step: data preprocessing normalization;
forming a vector [ a ] by each eigenvalue of all nodes calculated in the third step and the fourth stepi1,…,ain]Wherein a isi1A value representing an ith characteristic of the first node; the 7 eigenvalues of all nodes in the network are respectively degree, betweenness, compactness, eigenvector centrality, vulnerability, use degree and hop distance, and the 7 eigenvalues finally form a decision matrix A ═ aij)7×nNormalizing the decision matrix A to obtain a normalized decision matrix B ═ (B)ij)7×nWherein:
Figure FDA0002554187770000026
and a sixth step: constructing a weighting specification matrix;
the normalized decision matrix B obtained from the fifth step is (B)ij)m×nConstructing a weighting norm matrix C ═ (C)ij)7×nThe expression of the weighting specification matrix is:
cij=wj·bij,i=1,2,…,m;j=1,2,…,n (9)
wherein w ═ w1,w2,...wn]TGiving a weight vector of each characteristic value for a decision maker;
the seventh step: determining a positive ideal solution and a negative ideal solution, and solving the distance from each node to the positive ideal scheme and the negative ideal scheme;
the positive ideal solution expression is:
Figure FDA0002554187770000031
the negative ideal solution expression is:
Figure FDA0002554187770000032
the distance from the positive ideal solution is expressed as:
Figure FDA0002554187770000033
the distance to the negative ideal solution is expressed as:
Figure FDA0002554187770000034
eighth step: calculating the comprehensive evaluation index f of each nodei *I.e. importance, and is arranged from large to small; expression of the overall evaluation index asThe following:
Figure FDA0002554187770000036
finally, the importance evaluation value f of each node in the network is obtainedi *Selecting an importance evaluation value fi *The first 10% of nodes are used as key nodes, and next-step network topology control and safety protection are performed on the key nodes, so that the efficiency of the network topology control and the safety protection is improved.
CN202010584590.2A 2020-06-24 2020-06-24 Method for identifying key nodes of Sink node underwater acoustic sensor network Active CN111800201B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010584590.2A CN111800201B (en) 2020-06-24 2020-06-24 Method for identifying key nodes of Sink node underwater acoustic sensor network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010584590.2A CN111800201B (en) 2020-06-24 2020-06-24 Method for identifying key nodes of Sink node underwater acoustic sensor network

Publications (2)

Publication Number Publication Date
CN111800201A true CN111800201A (en) 2020-10-20
CN111800201B CN111800201B (en) 2021-06-15

Family

ID=72803794

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010584590.2A Active CN111800201B (en) 2020-06-24 2020-06-24 Method for identifying key nodes of Sink node underwater acoustic sensor network

Country Status (1)

Country Link
CN (1) CN111800201B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113708953A (en) * 2021-07-10 2021-11-26 西北工业大学 Underwater acoustic sensor network anti-damage method based on node importance balance

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103476051A (en) * 2013-09-11 2013-12-25 华北电力大学(保定) Method for evaluating importance of nodes in communication network
CN104469836A (en) * 2014-11-24 2015-03-25 河海大学常州校区 Method for building multi-dimension trust model in underwater sensor network
CN106100877A (en) * 2016-06-02 2016-11-09 东南大学 A kind of power system reply network attack vulnerability assessment method
CN106231609A (en) * 2016-09-22 2016-12-14 北京工商大学 A kind of underwater sensor network Optimization deployment method based on highest priority region
CN106488526A (en) * 2016-12-22 2017-03-08 西北工业大学 Mobile multi-hop underwater acoustic network dynamic method for self-locating based on layering
CN106850254A (en) * 2016-12-20 2017-06-13 国网新疆电力公司信息通信公司 Key node recognition methods in a kind of power telecom network
CN107994948A (en) * 2017-12-30 2018-05-04 山东省科学院海洋仪器仪表研究所 A kind of mobile Sink paths planning methods for underwater heterogeneous sensor network
CN108464032A (en) * 2015-10-16 2018-08-28 罗马大学 The routing policy of node in underwater network and the method for re-transmission policy and its realization device are managed in a manner of adaptive and engagement
CN108684052A (en) * 2018-07-13 2018-10-19 南京理工大学 Radio link quality prediction technique in a kind of high-freedom degree underwater sensor network
US20180351842A1 (en) * 2015-03-31 2018-12-06 Zuora, Inc. Systems and methods for live testing performance conditions of a multi-tenant system
CN109409730A (en) * 2018-10-22 2019-03-01 西南交通大学 A kind of energy microgrid site selecting method based on complex network characteristic evaluation
CN109672570A (en) * 2019-01-15 2019-04-23 海南大学 A kind of underwater sound cognitive sensor network multiple access method of adaptive-flow
US10332384B1 (en) * 2018-07-26 2019-06-25 Observables, Inc. Actions and communications responsive to real-time events incorporating local, remote and learned information

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103476051A (en) * 2013-09-11 2013-12-25 华北电力大学(保定) Method for evaluating importance of nodes in communication network
CN104469836A (en) * 2014-11-24 2015-03-25 河海大学常州校区 Method for building multi-dimension trust model in underwater sensor network
US20180351842A1 (en) * 2015-03-31 2018-12-06 Zuora, Inc. Systems and methods for live testing performance conditions of a multi-tenant system
CN108464032A (en) * 2015-10-16 2018-08-28 罗马大学 The routing policy of node in underwater network and the method for re-transmission policy and its realization device are managed in a manner of adaptive and engagement
CN106100877A (en) * 2016-06-02 2016-11-09 东南大学 A kind of power system reply network attack vulnerability assessment method
CN106231609A (en) * 2016-09-22 2016-12-14 北京工商大学 A kind of underwater sensor network Optimization deployment method based on highest priority region
CN106850254A (en) * 2016-12-20 2017-06-13 国网新疆电力公司信息通信公司 Key node recognition methods in a kind of power telecom network
CN106488526A (en) * 2016-12-22 2017-03-08 西北工业大学 Mobile multi-hop underwater acoustic network dynamic method for self-locating based on layering
CN107994948A (en) * 2017-12-30 2018-05-04 山东省科学院海洋仪器仪表研究所 A kind of mobile Sink paths planning methods for underwater heterogeneous sensor network
CN108684052A (en) * 2018-07-13 2018-10-19 南京理工大学 Radio link quality prediction technique in a kind of high-freedom degree underwater sensor network
US10332384B1 (en) * 2018-07-26 2019-06-25 Observables, Inc. Actions and communications responsive to real-time events incorporating local, remote and learned information
CN109409730A (en) * 2018-10-22 2019-03-01 西南交通大学 A kind of energy microgrid site selecting method based on complex network characteristic evaluation
CN109672570A (en) * 2019-01-15 2019-04-23 海南大学 A kind of underwater sound cognitive sensor network multiple access method of adaptive-flow

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113708953A (en) * 2021-07-10 2021-11-26 西北工业大学 Underwater acoustic sensor network anti-damage method based on node importance balance
CN113708953B (en) * 2021-07-10 2022-07-05 西北工业大学 Underwater acoustic sensor network anti-damage method based on node importance balance

Also Published As

Publication number Publication date
CN111800201B (en) 2021-06-15

Similar Documents

Publication Publication Date Title
Luo et al. A survey of routing protocols for underwater wireless sensor networks
Liu et al. AUV-aided hybrid data collection scheme based on value of information for internet of underwater things
Chaaf et al. Energy-efficient relay-based void hole prevention and repair in clustered multi-AUV underwater wireless sensor network
CN110049528B (en) Mobile credible data collection method based on credible value utility in sensor network
CN103906164A (en) Maritime search and rescue wireless sensor network topology structure and topology control method thereof
CN105578388A (en) Maritime search and rescue wireless sensing network system and robustness route method thereof
Khasawneh et al. Pressure based routing protocol for underwater wireless sensor networks: A survey
CN104883676A (en) Cooperative safety communication method in multi-UAV environment
CN108289285A (en) A kind of ocean wireless sensor network is lost data and is restored and reconstructing method
CN107969008B (en) Centralized routing calculation method for software defined sensor network
CN111800201B (en) Method for identifying key nodes of Sink node underwater acoustic sensor network
Chen et al. DARP: A depth adaptive routing protocol for large-scale underwater acoustic sensor networks
Lin et al. Fast node clustering based on an improved birch algorithm for data collection towards software-defined underwater acoustic sensor networks
CN109842888B (en) Underwater acoustic channel quality dynamic evaluation and prediction method and system for underwater sensor network
Moussaoui et al. Clustered chain founded on ant colony optimization energy efficient routing scheme for under-water wireless sensor networks
Alhazmi et al. Energy aware approach for underwater wireless sensor networks scheduling: UMOD_LEACH
Natarajan et al. Adaptive Time Difference of Time of Arrival in Wireless Sensor Network Routing for Enhancing Quality of Service.
CN113411766A (en) Intelligent Internet of things comprehensive sensing system and method
CN109121178A (en) One kind carrying out energy heterogeneous star networking route designing method based on Artificial Potential Field
Albarakati et al. Reconfigurable underwater embedded systems architectures
Jianping et al. SM-UAN: A software-defined underwater acoustic network of multi-controllers for inland waterway systems
Waghmare et al. Efficient data aggregation methodology for Wireless Sensor Network
Singh et al. UNDERWATER BASED ADHOC NETWORKS: A brief survey to its challenges, feasibility and issues
Matsuura Maximizing lifetime of multiple data aggregation trees in wireless sensor networks
CN113708953A (en) Underwater acoustic sensor network anti-damage method based on node importance balance

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20221118

Address after: 710075 2-310-29, Qing'an Park, No. 9, Gaoxin Second Road, High tech Zone, Xi'an, Shaanxi

Patentee after: Xi'an Hanzhi Ruientropy Technology Co.,Ltd.

Address before: 710072 No. 127 Youyi West Road, Shaanxi, Xi'an

Patentee before: Northwestern Polytechnical University