首页 | 本学科首页   官方微博 | 高级检索  
     

一种物联网系统层次型抗毁性拓扑构建方法
引用本文:陈雯柏,崔晓丽,郝翠,王文凯. 一种物联网系统层次型抗毁性拓扑构建方法[J]. 北京邮电大学学报, 2018, 41(5): 103-109,114. DOI: 10.13190/j.jbupt.2018-172
作者姓名:陈雯柏  崔晓丽  郝翠  王文凯
作者单位:北京信息科技大学 自动化学院, 北京 100101
摘    要:针对物联网系统复杂应用环境中由关键节点失效导致的系统拓扑结构的脆弱性问题,提出了一种抗毁性k-连通拓扑结构的构建方法.首先把系统分成若干个互不交叠的簇,然后对网络中存在的关键节点进行检测,并利用簇头节点的移动性构建以关键节点为中心的局部k-连通拓扑结构,达到去除关键节点和提高网络抗毁性的目的.构建了簇间的k-连通拓扑结构,给出了物联网智能安防系统应用仿真实验,并通过节点的介数中心性、网络的平均连通度和网络的鲁棒性验证了所提抗毁性方案的可行性和有效性.

关 键 词:物联网系统  关键节点  局部k-连通拓扑结构  抗毁性  
收稿时间:2018-08-06

Hierarchical Invulnerability Topology Construction Method for IoT System
CHEN Wen-bai,CUI Xiao-li,HAO Cui,WANG Wen-kai. Hierarchical Invulnerability Topology Construction Method for IoT System[J]. Journal of Beijing University of Posts and Telecommunications, 2018, 41(5): 103-109,114. DOI: 10.13190/j.jbupt.2018-172
Authors:CHEN Wen-bai  CUI Xiao-li  HAO Cui  WANG Wen-kai
Affiliation:School of Automation, Beijing Information Science and Technology University, Beijing 100101, China
Abstract:To enhance the system topology vulnerability caused by the failure of critical nodes in the Internet of Things (IoT) system based complex application environments, a construction method of the survivable k-connected topology is proposed. Firstly, all nodes of network system are classified into non-overlapping clusters. Then, the cut points existed in the network are detected, and the cut point centered a local k-connected topology is constructed by use of the motion of the cluster head nodes, so that the critical nodes can be effectively removed to improve the network survivability. Finally, all the cluster head nodes are selected to form the backbone network which also acts as the global inter-cluster k-connected topology. The proposed method is evaluated by the simulation in an IoT-based intelligent monitoring system. The results proves the feasibility and validity of the proposed method in terms of the betweeness centrality of nodes, the network average connectivity and the network robustness.
Keywords:internet of things system  critical nodes  local k-connected topology  invulnerability  
本文献已被 万方数据 等数据库收录!
点击此处可从《北京邮电大学学报》浏览原始摘要信息
点击此处可从《北京邮电大学学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号