Recognition method of key nodes in SN-UASN based on TOPSIS

Yifan Yuan, Xiaohong Shen, Ke He, Haiyan Wang, Lin Sun, Shilei Ma

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

In Underwater Acoustic Sensor Networks (UASN), certain key nodes in the network will cause network partition, communication failure, packet loss once they failed to work. Also, because the key nodes are key positions of the UASN, once the malicious behavior of the key nodes occurs, the network performance will drop sharply. This paper first puts forward the key node recognition method for UASN. Also, we propose node usage and hop distance factors to evaluate node's importance. Five factors at the topological level are combined, and using Technique for Order Performance by Similarity to Ideal Solution (TOPSIS) method to evaluate the importance of each node in the UASN. In the experiment, the key nodes are replaced by attack nodes to verify the performance of the algorithm. Experiment results show that the algorithm has a good and effective value.

Original languageEnglish
Title of host publicationICSPCC 2020 - IEEE International Conference on Signal Processing, Communications and Computing, Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728172019
DOIs
StatePublished - 21 Aug 2020
Event2020 IEEE International Conference on Signal Processing, Communications and Computing, ICSPCC 2020 - Macau, China
Duration: 21 Aug 202023 Aug 2020

Publication series

NameICSPCC 2020 - IEEE International Conference on Signal Processing, Communications and Computing, Proceedings

Conference

Conference2020 IEEE International Conference on Signal Processing, Communications and Computing, ICSPCC 2020
Country/TerritoryChina
CityMacau
Period21/08/2023/08/20

Keywords

  • hop distance
  • Key nodes
  • Node importance
  • TOPSIS
  • UASN
  • usage

Fingerprint

Dive into the research topics of 'Recognition method of key nodes in SN-UASN based on TOPSIS'. Together they form a unique fingerprint.

Cite this