A combined routing path and node importance network invulnerability evaluating method for ad hoc network

Weiling Zhou, Bo Li, Zhongjiang Yan, Mao Yang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

In this paper, a new network invulnerability evaluation model based on routing path and node importance is proposed. The core of the invulnerability algorithm lies in two levels, comprehensive consideration of the influencing factors of network to point-to-line network invulnerability. The algorithm considers the influence of the proportion of important nodes of the network on the invulnerability of the network, and considers the influence of the number of paths between the communication nodes on the invulnerability of the path. Through simulation comparison, it is found that this algorithm improves the sensitivity of network invulnerability to the number of paths, and is suitable for communication networks in the case of multiple routing paths.

Original languageEnglish
Title of host publicationWireless Internet - 12th EAI International Conference, WiCON 2019, Proceedings
EditorsDer-Jiunn Deng, Ai-Chun Pang, Chun-Cheng Lin
PublisherSpringer
Pages20-33
Number of pages14
ISBN (Print)9783030529871
DOIs
StatePublished - 2020
Event12th EAI International Conference on Wireless Internets, WiCON 2019 - TaiChung, Taiwan, Province of China
Duration: 26 Nov 201927 Nov 2019

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
Volume317 LNICST
ISSN (Print)1867-8211

Conference

Conference12th EAI International Conference on Wireless Internets, WiCON 2019
Country/TerritoryTaiwan, Province of China
CityTaiChung
Period26/11/1927/11/19

Keywords

  • Ad hoc network
  • Network invulnerability
  • Node importance
  • Routing path

Fingerprint

Dive into the research topics of 'A combined routing path and node importance network invulnerability evaluating method for ad hoc network'. Together they form a unique fingerprint.

Cite this