The identification of key nodes plays an important role in improving the robustness of the transportation network.For different types of transportation networks,the effect of the same identification method may be diff...The identification of key nodes plays an important role in improving the robustness of the transportation network.For different types of transportation networks,the effect of the same identification method may be different.It is of practical significance to study the key nodes identification methods corresponding to various types of transportation networks.Based on the knowledge of complex networks,the metro networks and the bus networks are selected as the objects,and the key nodes are identified by the node degree identification method,the neighbor node degree identification method,the weighted k-shell degree neighborhood identification method(KSD),the degree k-shell identification method(DKS),and the degree k-shell neighborhood identification method(DKSN).Take the network efficiency and the largest connected subgraph as the effective indicators.The results show that the KSD identification method that comprehensively considers the elements has the best recognition effect and has certain practical significance.展开更多
One of the major constraints of wireless sensor networks is limited energy available to sensor nodes because of the small size of the batteries they use as source of power. Clustering is one of the routing techniques ...One of the major constraints of wireless sensor networks is limited energy available to sensor nodes because of the small size of the batteries they use as source of power. Clustering is one of the routing techniques that have been using to minimize sensor nodes’ energy consumption during operation. In this paper, A Novel Clustering Algorithm for Energy Efficiency in Wireless Sensor Networks (ANCAEE) has been proposed. The algorithm achieves good performance in terms of minimizing energy consumption during data transmission and energy consumptions are distributed uniformly among all nodes. ANCAEE uses a new method of clusters formation and election of cluster heads. The algorithm ensures that a node transmits its data to the cluster head with a single hop transmission and cluster heads forward their data to the base station with multi-hop transmissions. Simulation results show that our approach consumes less energy and effectively extends network utilization.展开更多
This paper considers an underwater acoustic sensor network with one mobile surface node to collect data from multiple underwater nodes,where the mobile destination requests retransmission from each underwater node ind...This paper considers an underwater acoustic sensor network with one mobile surface node to collect data from multiple underwater nodes,where the mobile destination requests retransmission from each underwater node individually employing traditional automatic-repeat-request(ARQ) protocol.We propose a practical node cooperation(NC) protocol to enhance the collection efficiency,utilizing the fact that underwater nodes can overhear the transmission of others.To reduce the source level of underwater nodes,the underwater data collection area is divided into several sub-zones,and in each sub-zone,the mobile surface node adopting the NC protocol could switch adaptively between selective relay cooperation(SRC) and dynamic network coded cooperation(DNC) .The difference of SRC and DNC lies in whether or not the selected relay node combines the local data and the data overheard from undecoded node(s) to form network coded packets in the retransmission phase.The NC protocol could also be applied across the sub-zones due to the wiretap property.In addition,we investigate the effects of different mobile collection paths,collection area division and cooperative zone design for energy saving.The numerical results showthat the proposed NC protocol can effectively save energy compared with the traditional ARQ scheme.展开更多
Aiming at developing a node scheduling protocol for sensor networks with fewer active nodes,we propose a coordinated node scheduling protocol based on the presentation of a solution and its optimization to determine w...Aiming at developing a node scheduling protocol for sensor networks with fewer active nodes,we propose a coordinated node scheduling protocol based on the presentation of a solution and its optimization to determine whether a node is redundant.The proposed protocol can reduce the number of working nodes by turning off as many redundant nodes as possible without degrading the coverage and connectivity.The simulation result shows that our protocol outperforms the peer with respect to the working node number and dynamic coverage percentage.展开更多
In recent times,real time wireless networks have found their applicability in several practical applications such as smart city,healthcare,surveillance,environmental monitoring,etc.At the same time,proper localization...In recent times,real time wireless networks have found their applicability in several practical applications such as smart city,healthcare,surveillance,environmental monitoring,etc.At the same time,proper localization of nodes in real time wireless networks helps to improve the overall functioning of networks.This study presents an Improved Metaheuristics based Energy Efficient Clustering with Node Localization(IM-EECNL)approach for real-time wireless networks.The proposed IM-EECNL technique involves two major processes namely node localization and clustering.Firstly,Chaotic Water Strider Algorithm based Node Localization(CWSANL)technique to determine the unknown position of the nodes.Secondly,an Oppositional Archimedes Optimization Algorithm based Clustering(OAOAC)technique is applied to accomplish energy efficiency in the network.Besides,the OAOAC technique derives afitness function comprising residual energy,distance to cluster heads(CHs),distance to base station(BS),and load.The performance validation of the IM-EECNL technique is carried out under several aspects such as localization and energy efficiency.A wide ranging comparative outcomes analysis highlighted the improved performance of the IM-EECNL approach on the recent approaches with the maximum packet delivery ratio(PDR)of 0.985.展开更多
When energy consumption by wireless sensor nodes gets off balance, partitions in the network appear because several of the nodes stop functioning. The respective network’s lifetime also diminishes. This problem is co...When energy consumption by wireless sensor nodes gets off balance, partitions in the network appear because several of the nodes stop functioning. The respective network’s lifetime also diminishes. This problem is commonly known as the “hot spot” or “energy hole” phenomenon. To resolve this issue, a Multi-Hop Decentralized Cluster-Based Routing (MDCR) protocol is proposed. This algorithm uses orphan nodes as intermediate nodes to form inter-cluster multi-hop routing and balance the energy consumption among sensor nodes. Simulation experiments have shown that MDCR is significantly better at prolonging network lifetime compared to the Adaptive Decentralized Re-Clustering Protocol.展开更多
The wireless sensor network (WSN) is one of the budding exploring areas and fast rising fields in wireless communications. The sensor nodes in the network are generally small-size, low-cost, low-power and multi-functi...The wireless sensor network (WSN) is one of the budding exploring areas and fast rising fields in wireless communications. The sensor nodes in the network are generally small-size, low-cost, low-power and multi-function capabilities. Wireless sensor networks (WSNs) are used for various applications;since numerous sensor nodes are usually deployed on remote and inaccessible places, the employment and preservation should be easy and scalable. Sensor nodes in the field being run out of energy quickly has been an issue and many energy efficient routing protocols have been proposed to solve this problem and preserve the long life of the network. This paper work proposes a hierarchical based node activation routing technique which shows energy efficiency. This technique selects cluster head with highest residual energy in each communication round of transmission to the base station from the cluster heads. Hierarchical based node activation routing technique with different levels of hierarchy simulation results prolongs the lifetime of the network compared to other clustering schemes and communication rounds of simulation increase significantly.展开更多
As a representative of chain-based protocol in Wireless Sensor Networks (WSNs), EEPB is an elegant solution on energy efficiency. However, in the latter part of the operation of the network, there is still a big probl...As a representative of chain-based protocol in Wireless Sensor Networks (WSNs), EEPB is an elegant solution on energy efficiency. However, in the latter part of the operation of the network, there is still a big problem: reserving energy of the node frequently presents the incapacity of directly communicating with the base station, at the same time capacity of data acquisition and transmission as normal nodes. If these nodes were selected as LEADER nodes, that will accelerate the death process and unevenness of energy consumption distribution among nodes.This paper proposed a chain routing algorithm based ontraffic prediction model (CRTP).The novel algorithmdesigns a threshold judgment method through introducing the traffic prediction model in the process of election of LEADER node. The process can be dynamically adjusted according to the flow forecasting. Therefore, this algorithm lets the energy consumption tend-ing to keep at same level. Simulation results show that CRTP has superior performance over EEPB in terms of balanced network energy consumption and the prolonged network life.展开更多
Based on the social network analysis methods and human network, this paper randomly selected 44 students (31 males and 13 females) as the research objects, and it used the UCINET software to analyze the friendship bet...Based on the social network analysis methods and human network, this paper randomly selected 44 students (31 males and 13 females) as the research objects, and it used the UCINET software to analyze the friendship between them of which 43 used WeChat and 44 used QQ, and it also used the tool Netdraw to visualize the network sociogram. By mining the four aspects of density, accessibility, centrality, block model, the results demonstrated that QQ social network and WeChat social network existed the phenomenon of small world, leaders and subgroups, and the key nodes of QQ human network were more than WeChat network. Through using the key nodes, it can push the precise and efficient information and improve the accuracy of information transmission and impact among network members.展开更多
SG (smart grids) is an intelligent power grid in which the diverse nodes should communicate different types of information which have different communication requirements with CS (control stations). There exist se...SG (smart grids) is an intelligent power grid in which the diverse nodes should communicate different types of information which have different communication requirements with CS (control stations). There exist several RATs (radio access technologies), with diversification in quality of service character which respect to the SG nodes communication requirements. On the other side, spectrum is becoming a rare source and its demands request is increasing exponentially. Therefore, resource allocation to support different types of SG nodes should be elaborated so that the resource efficiency is maximized while the SG communication requirements are respected. Using a CF (cost function) based on the SG node requirements and RATs characteristics to find the desirability value of every RATs for a certain node type accomplish this goal in combination with prioritizing the different SG nodes types based on SG goals by creating a priority table for RATs and different SG node types. The main node communication requirements are formulized to be used in the CF in this paper. The numerical results show that the proposed method defines the desirability value of each RAT for a certain SG node type that helps to make a priority table by using the SG node prioritization table.展开更多
Aiming at the problem that it is difficult to build model and identify the vulnerable equipment for aviation armament System-of-Systems(SoS)due to complex equipment interaction relationships and high confrontation,the...Aiming at the problem that it is difficult to build model and identify the vulnerable equipment for aviation armament System-of-Systems(SoS)due to complex equipment interaction relationships and high confrontation,the interdependent network theory is introduced to solve it.Firstly,a two-layer heterogeneous interdependent network model for aviation armament SoS is proposed,which reflects the information interaction,functional dependency and inter-network dependence effectively.Secondly,using the attack cost to describe the confrontation process and taking the comprehensive impact on kill chains as the entry point,the node importance index and the attack cost measurement method are constructed.Thirdly,the identification of vulnerable nodes is transformed into the optimization problem of node combinatorial selection,and the vulnerable node identification method based on tabu search is proposed.Based on vulnerable nodes,a robustness enhancement strategy for aviation armament SoS network is presented.Finally,the above methods are used to an aerial confrontation SoS,and the results verify the rationality and effectiveness of the proposed methods.展开更多
Dynamic graph neural networks(DGNNs)have demonstrated their extraordinary value in many practical applications.Nevertheless,the vulnerability of DNNs is a serious hidden danger as a small disturbance added to the mode...Dynamic graph neural networks(DGNNs)have demonstrated their extraordinary value in many practical applications.Nevertheless,the vulnerability of DNNs is a serious hidden danger as a small disturbance added to the model can markedly reduce its performance.At the same time,current adversarial attack schemes are implemented on static graphs,and the variability of attack models prevents these schemes from transferring to dynamic graphs.In this paper,we use the diffused attack of node injection to attack the DGNNs,and first propose the node injection attack based on structural fragility against DGNNs,named Structural Fragility-based Dynamic Graph Node Injection Attack(SFIA).SFIA firstly determines the target time based on the period weight.Then,it introduces a structural fragile edge selection strategy to establish the target nodes set and link them with the malicious node using serial inject.Finally,an optimization function is designed to generate adversarial features for malicious nodes.Experiments on datasets from four different fields show that SFIA is significantly superior to many comparative approaches.When the graph is injected with 1%of the original total number of nodes through SFIA,the link prediction Recall and MRR of the target DGNN link decrease by 17.4%and 14.3%respectively,and the accuracy of node classification decreases by 8.7%.展开更多
基金supported by the National Natural Science Foundation of China(Grant No.61961019)the Youth Key Project of the Natural Science Foundation of Jiangxi Province of China(Grant No.20202ACBL212003).
文摘The identification of key nodes plays an important role in improving the robustness of the transportation network.For different types of transportation networks,the effect of the same identification method may be different.It is of practical significance to study the key nodes identification methods corresponding to various types of transportation networks.Based on the knowledge of complex networks,the metro networks and the bus networks are selected as the objects,and the key nodes are identified by the node degree identification method,the neighbor node degree identification method,the weighted k-shell degree neighborhood identification method(KSD),the degree k-shell identification method(DKS),and the degree k-shell neighborhood identification method(DKSN).Take the network efficiency and the largest connected subgraph as the effective indicators.The results show that the KSD identification method that comprehensively considers the elements has the best recognition effect and has certain practical significance.
文摘One of the major constraints of wireless sensor networks is limited energy available to sensor nodes because of the small size of the batteries they use as source of power. Clustering is one of the routing techniques that have been using to minimize sensor nodes’ energy consumption during operation. In this paper, A Novel Clustering Algorithm for Energy Efficiency in Wireless Sensor Networks (ANCAEE) has been proposed. The algorithm achieves good performance in terms of minimizing energy consumption during data transmission and energy consumptions are distributed uniformly among all nodes. ANCAEE uses a new method of clusters formation and election of cluster heads. The algorithm ensures that a node transmits its data to the cluster head with a single hop transmission and cluster heads forward their data to the base station with multi-hop transmissions. Simulation results show that our approach consumes less energy and effectively extends network utilization.
基金supported in part by National Key Research and Development Program of China under Grants No.2016YFC1400200 and 2016YFC1400204National Natural Science Foundation of China under Grants No.41476026,41676024 and 41376040Fundamental Research Funds for the Central Universities of China under Grant No.220720140506
文摘This paper considers an underwater acoustic sensor network with one mobile surface node to collect data from multiple underwater nodes,where the mobile destination requests retransmission from each underwater node individually employing traditional automatic-repeat-request(ARQ) protocol.We propose a practical node cooperation(NC) protocol to enhance the collection efficiency,utilizing the fact that underwater nodes can overhear the transmission of others.To reduce the source level of underwater nodes,the underwater data collection area is divided into several sub-zones,and in each sub-zone,the mobile surface node adopting the NC protocol could switch adaptively between selective relay cooperation(SRC) and dynamic network coded cooperation(DNC) .The difference of SRC and DNC lies in whether or not the selected relay node combines the local data and the data overheard from undecoded node(s) to form network coded packets in the retransmission phase.The NC protocol could also be applied across the sub-zones due to the wiretap property.In addition,we investigate the effects of different mobile collection paths,collection area division and cooperative zone design for energy saving.The numerical results showthat the proposed NC protocol can effectively save energy compared with the traditional ARQ scheme.
基金the National Natural Science Foundation of China(Grant No.60533110 and No.90604013)the Scientific Research Foundation of Harbin Institute of Technology(Grant No. HIT2002.74)
文摘Aiming at developing a node scheduling protocol for sensor networks with fewer active nodes,we propose a coordinated node scheduling protocol based on the presentation of a solution and its optimization to determine whether a node is redundant.The proposed protocol can reduce the number of working nodes by turning off as many redundant nodes as possible without degrading the coverage and connectivity.The simulation result shows that our protocol outperforms the peer with respect to the working node number and dynamic coverage percentage.
基金supported by Ulsan Metropolitan City-ETRI joint cooperation project[21AS1600,Development of intelligent technology for key industriesautonomous human-mobile-space autonomous collaboration intelligence technology].
文摘In recent times,real time wireless networks have found their applicability in several practical applications such as smart city,healthcare,surveillance,environmental monitoring,etc.At the same time,proper localization of nodes in real time wireless networks helps to improve the overall functioning of networks.This study presents an Improved Metaheuristics based Energy Efficient Clustering with Node Localization(IM-EECNL)approach for real-time wireless networks.The proposed IM-EECNL technique involves two major processes namely node localization and clustering.Firstly,Chaotic Water Strider Algorithm based Node Localization(CWSANL)technique to determine the unknown position of the nodes.Secondly,an Oppositional Archimedes Optimization Algorithm based Clustering(OAOAC)technique is applied to accomplish energy efficiency in the network.Besides,the OAOAC technique derives afitness function comprising residual energy,distance to cluster heads(CHs),distance to base station(BS),and load.The performance validation of the IM-EECNL technique is carried out under several aspects such as localization and energy efficiency.A wide ranging comparative outcomes analysis highlighted the improved performance of the IM-EECNL approach on the recent approaches with the maximum packet delivery ratio(PDR)of 0.985.
文摘When energy consumption by wireless sensor nodes gets off balance, partitions in the network appear because several of the nodes stop functioning. The respective network’s lifetime also diminishes. This problem is commonly known as the “hot spot” or “energy hole” phenomenon. To resolve this issue, a Multi-Hop Decentralized Cluster-Based Routing (MDCR) protocol is proposed. This algorithm uses orphan nodes as intermediate nodes to form inter-cluster multi-hop routing and balance the energy consumption among sensor nodes. Simulation experiments have shown that MDCR is significantly better at prolonging network lifetime compared to the Adaptive Decentralized Re-Clustering Protocol.
文摘The wireless sensor network (WSN) is one of the budding exploring areas and fast rising fields in wireless communications. The sensor nodes in the network are generally small-size, low-cost, low-power and multi-function capabilities. Wireless sensor networks (WSNs) are used for various applications;since numerous sensor nodes are usually deployed on remote and inaccessible places, the employment and preservation should be easy and scalable. Sensor nodes in the field being run out of energy quickly has been an issue and many energy efficient routing protocols have been proposed to solve this problem and preserve the long life of the network. This paper work proposes a hierarchical based node activation routing technique which shows energy efficiency. This technique selects cluster head with highest residual energy in each communication round of transmission to the base station from the cluster heads. Hierarchical based node activation routing technique with different levels of hierarchy simulation results prolongs the lifetime of the network compared to other clustering schemes and communication rounds of simulation increase significantly.
文摘As a representative of chain-based protocol in Wireless Sensor Networks (WSNs), EEPB is an elegant solution on energy efficiency. However, in the latter part of the operation of the network, there is still a big problem: reserving energy of the node frequently presents the incapacity of directly communicating with the base station, at the same time capacity of data acquisition and transmission as normal nodes. If these nodes were selected as LEADER nodes, that will accelerate the death process and unevenness of energy consumption distribution among nodes.This paper proposed a chain routing algorithm based ontraffic prediction model (CRTP).The novel algorithmdesigns a threshold judgment method through introducing the traffic prediction model in the process of election of LEADER node. The process can be dynamically adjusted according to the flow forecasting. Therefore, this algorithm lets the energy consumption tend-ing to keep at same level. Simulation results show that CRTP has superior performance over EEPB in terms of balanced network energy consumption and the prolonged network life.
文摘Based on the social network analysis methods and human network, this paper randomly selected 44 students (31 males and 13 females) as the research objects, and it used the UCINET software to analyze the friendship between them of which 43 used WeChat and 44 used QQ, and it also used the tool Netdraw to visualize the network sociogram. By mining the four aspects of density, accessibility, centrality, block model, the results demonstrated that QQ social network and WeChat social network existed the phenomenon of small world, leaders and subgroups, and the key nodes of QQ human network were more than WeChat network. Through using the key nodes, it can push the precise and efficient information and improve the accuracy of information transmission and impact among network members.
文摘SG (smart grids) is an intelligent power grid in which the diverse nodes should communicate different types of information which have different communication requirements with CS (control stations). There exist several RATs (radio access technologies), with diversification in quality of service character which respect to the SG nodes communication requirements. On the other side, spectrum is becoming a rare source and its demands request is increasing exponentially. Therefore, resource allocation to support different types of SG nodes should be elaborated so that the resource efficiency is maximized while the SG communication requirements are respected. Using a CF (cost function) based on the SG node requirements and RATs characteristics to find the desirability value of every RATs for a certain node type accomplish this goal in combination with prioritizing the different SG nodes types based on SG goals by creating a priority table for RATs and different SG node types. The main node communication requirements are formulized to be used in the CF in this paper. The numerical results show that the proposed method defines the desirability value of each RAT for a certain SG node type that helps to make a priority table by using the SG node prioritization table.
基金supported by the Fundamental Research Funds for the Central Universities,China.
文摘Aiming at the problem that it is difficult to build model and identify the vulnerable equipment for aviation armament System-of-Systems(SoS)due to complex equipment interaction relationships and high confrontation,the interdependent network theory is introduced to solve it.Firstly,a two-layer heterogeneous interdependent network model for aviation armament SoS is proposed,which reflects the information interaction,functional dependency and inter-network dependence effectively.Secondly,using the attack cost to describe the confrontation process and taking the comprehensive impact on kill chains as the entry point,the node importance index and the attack cost measurement method are constructed.Thirdly,the identification of vulnerable nodes is transformed into the optimization problem of node combinatorial selection,and the vulnerable node identification method based on tabu search is proposed.Based on vulnerable nodes,a robustness enhancement strategy for aviation armament SoS network is presented.Finally,the above methods are used to an aerial confrontation SoS,and the results verify the rationality and effectiveness of the proposed methods.
基金supported by the National Natural Science Foundation of China(NSFC)(62172377,61872205)the Shandong Provincial Natural Science Foundation,China(ZR2019MF018)the Startup Research Foundation for Distinguished Scholars(202112016).
文摘Dynamic graph neural networks(DGNNs)have demonstrated their extraordinary value in many practical applications.Nevertheless,the vulnerability of DNNs is a serious hidden danger as a small disturbance added to the model can markedly reduce its performance.At the same time,current adversarial attack schemes are implemented on static graphs,and the variability of attack models prevents these schemes from transferring to dynamic graphs.In this paper,we use the diffused attack of node injection to attack the DGNNs,and first propose the node injection attack based on structural fragility against DGNNs,named Structural Fragility-based Dynamic Graph Node Injection Attack(SFIA).SFIA firstly determines the target time based on the period weight.Then,it introduces a structural fragile edge selection strategy to establish the target nodes set and link them with the malicious node using serial inject.Finally,an optimization function is designed to generate adversarial features for malicious nodes.Experiments on datasets from four different fields show that SFIA is significantly superior to many comparative approaches.When the graph is injected with 1%of the original total number of nodes through SFIA,the link prediction Recall and MRR of the target DGNN link decrease by 17.4%and 14.3%respectively,and the accuracy of node classification decreases by 8.7%.