Next Article in Journal
A Charging Algorithm for the Wireless Rechargeable Sensor Network with Imperfect Charging Channel and Finite Energy Storage
Next Article in Special Issue
Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation
Previous Article in Journal
A Calibration-Free Method Based on Grey Relational Analysis for Heterogeneous Smartphones in Fingerprint-Based Indoor Positioning
Previous Article in Special Issue
Y-DWMS: A Digital Watermark Management System Based on Smart Contracts
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Heuristic Approaches for Enhancing the Privacy of the Leader in IoT Networks

School of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, Zhejiang, China
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(18), 3886; https://doi.org/10.3390/s19183886
Submission received: 23 July 2019 / Revised: 4 September 2019 / Accepted: 6 September 2019 / Published: 9 September 2019
(This article belongs to the Special Issue Threat Identification and Defence for Internet-of-Things)

Abstract

:
The privacy and security of the Internet of Things (IoT) are emerging as popular issues in the IoT. At present, there exist several pieces of research on network analysis on the IoT network, and malicious network analysis may threaten the privacy and security of the leader in the IoT networks. With this in mind, we focus on how to avoid malicious network analysis by modifying the topology of the IoT network and we choose closeness centrality as the network analysis tool. This paper makes three key contributions toward this problem: (1) An optimization problem of removing k edges to minimize (maximize) the closeness value (rank) of the leader; (2) A greedy (greedy and simulated annealing) algorithm to solve the closeness value (rank) case of the proposed optimization problem in polynomial time; and (3)UpdateCloseness (FastTopRank)—algorithm for computing closeness value (rank) efficiently. Experimental results prove the efficiency of our pruning algorithms and show that our heuristic algorithms can obtain accurate solutions compared with the optimal solution (the approximation ratio in the worst case is 0.85) and outperform the solutions obtained by other baseline algorithms (e.g., choose k edges with the highest degree sum).

1. Introduction

1.1. Background

In recent years, centrality analysis, a kind of network analysis tool, has been applied in the area of Internet of Things (IoT) and can be used to analyze the topology of the IoT network. For example, closeness centrality can be chosen as the measurement for IoT device selection by identifying the central nodes in the dynamic IoT network [1]. However, if attackers use centrality analysis to find the important nodes in the IoT network, they can launch more accurate attacks such as DDoS attacks or deceive the important nodes to spread fraudulent information in the network [2]. As a consequence, defensive strategies against malicious centrality analysis are especially necessary, i.e., the question turns into “How to avoid being detected by malicious centrality analysis?”.
As far as we know, few researchers have focused on this question in the area of Internet of Things (IoT) and the research most relevant to this question was proposed by Waniek [3]. Inspired by Waniek’s work, our work aims at helping the leader in the IoT network avoid being detected by malicious closeness analysis. Closeness centrality [4] is chosen as the measurement of the importance of the nodes in the IoT network and leader (the protected target of our work) is the node that has the highest closeness value in the network. The leader often has the greatest impact on other nodes or has the clearest understanding of the network [5] and it is vulnerable to be analyzed and attacked by attackers.
Against this background, to guarantee individual privacy and cyber security, we attempt to solve the above problem by removing limited links in the network to help the leader not be found by the attackers who use the closeness centrality analysis. Two cases of closeness value and rank are concerned. In both cases, we assume that the attacker finds the leader node by top-k algorithm and in the closeness value case the leader node does not know the exact value of k and has to minimize its closeness value. To evade attacker’s analysis, the leader needs to remove limited links in the network (guaranteeing the connectivity of the network) and minimize (maximize) its closeness value (rank). In our work, formally, the above problem is considered to be an optimization problem: “ How to minimize (maximize) the closeness value (rank) of the leader by removing k edges ? ”

1.2. Our Contributions

This paper is the expansion of the shorter conference version presented at the 5th International Symposium on Security and Privacy in Social Networks and Big Data. The contributions of our initial conference paper show as follows:
  • An optimization problem of removing k edges to minimize the closeness value of the leader and its complexity analysis.
  • A greedy algorithm to solve the proposed optimization problem in polynomial time and theoretical proof of the lower bound of its solution.
  • An effective pruning algorithm—UpdateCloseness for computing closeness value after removing an edge.
  • Experimental evaluation of the efficiency and accuracy of the proposed algorithms.
In this paper, we extend the optimization problem proposed in the conference paper to the closeness rank case. The contributions of this paper show as follows:
  • An optimization problem of removing k edges to maximize the closeness rank of the leader and its complexity analysis.
  • An approximation algorithm (GSA) combing greedy algorithm and simulated annealing algorithm to solve the proposed optimization problem in polynomial time.
  • An effective pruning algorithm—FastTopRank for computing closeness rank of the high ranking nodes.
  • Experimental evaluation of the efficiency and accuracy of the proposed algorithms.

2. Preliminaries

2.1. Basic Notation

Let G = ( V , E ) be a network which is a simple undirected graph, and which has n : = | V | nodes and m : = | E | edges. The edge with u , v V is denoted as ( u , v ) . For the node u, N ( u ) denotes the neighbors of u, i.e., N ( u ) = { v | ( u , v ) E } . For nodes u and v, P = { u , , v } denotes the shortest path between u and v and d u v denotes the distance of the shortest path P.
Given a set of edges R E , G ( R ) denotes the subgraph after removing the set of edges R in G, i.e., G ( R ) = ( V , E / R ) . Also, after removing a set of edges R, the shortest-path distance between node u and node v can be denoted as d u v ( R ) .
Closeness centrality was proposed by Beauchamp [4]. This measurement quantifies the importance of a given node according to the shortest-path distances from the given node to all other nodes and requires the connectivity of the network. For a given node u, the normalized closeness centrality c u is defined as follows:
c u = n 1 v V \ { u } d u v
The closeness rank of the node u is denoted as r u and it is possible that the closeness values of two nodes are equal. To measure the rank of them, standard competition ranking (“1224” ranking) is used in this paper.

2.2. Related Work

2.2.1. Closeness Algorithm

In tradition schemes, the closeness value of s node can be computed by running a breadth-first search (BFS) in the network and it requires O ( n + m ) time. Therefore, it requires O ( n ( n + m ) ) to obtain the closeness rank of the node by computing all closeness values of each nodes. Obviously, the IoT network is a kind of complex network and the traditional way to compute the closeness value and rank is infeasible in our work. The related works of closeness computation algorithm of our work are as follows:
Top-k closeness and approximate closeness rank: In real-life scenarios, people pay more attention to identifying top-k nodes in the network or the rank of a node than the closeness value of a node. Okamoto [6] proposed the first study of top-k closeness algorithm and several works are proposed to improve this algorithm [7,8,9,10]. Saxena [11] first proposed closeness rank approximation algorithm by sigmoid curve and the time complexity is O ( m ) . Bisenius [12] first proposed a dynamic top-k closeness algorithm, i.e., computing the top-k nodes after removing or adding an edge.
Dynamic update closeness: To compute the closeness value in the dynamic network, several pieces of research try to update value or rank after edge deletion and addition. Tong [13] analyzed the characteristics of edge deletion and addition on centrality and proposed a scalable and efficient algorithm to find the edges that help information propagation in the network. Santos [14] proposed an approximation closeness value algorithm that can be used after edge deletion. Sarıyüce [15], Kas [16] and Yen [17] proposed their novel closeness value update algorithm in the dynamic network.
The pruning algorithms UpdateCloseness and FastTopRank are inspired by Yen’s work [17] and Bergamini’s work [7] mentioned above, respectively.

2.2.2. Topic

To the best of our knowledge, there are two works whose topics are closely related to our work. Table 1 shows the comparison between our work with the existing related works. Our work differs from [3,19] in several aspects as follows:
  • Please note that [3,19] focused on the optimization of the value after updating edges. In a further step, we propose methods that can achieve the optimization of the closeness value and rank simultaneously.
  • As shown in Rochat’s work [21], harmonic centrality only performs a little better in the unconnected network. However, usually the Internet of Things needs to be connected. Hence, differing from Crescenzi’s work [19], we choose closeness centrality as the measurement of identifying the importance of a node.
  • We extend the selection range of the removing edges from the neighbors of the target node to the entire network despite the extra time cost.

3. Problem Definition

3.1. Theoretical Definition

In this section, we propose the basic theoretical definitions of the optimization problems mentioned in Section 1 and analyze the complexity of the problems. We choose the node with the highest closeness (also called leader) and attempt to minimize (maximize) its closeness value (rank) by removing limited edges.
Definition 1 (Leader Closeness Value Minimization Problem)
The problem is defined by a tuple ( G , u , R , k ) . Let G = ( V , E ) be a network which is unweighted, undirected and connected, u V is leader with the maximum closeness value, R E is the set of edges that to be removed, k Z denotes the maximum of the edges to be removed. The problem is to find a set of edges, R E and | R | k , and G ( R ) = ( V , E \ R ) is connected, and R is in:
arg min R E , | R | k c u ( G ( R ) ) .
Definition 2 (Leader Closeness Rank Maximization Problem) 
The problem is defined by a tuple ( G , u , R , k ) . Let G = ( V , E ) be a network which is unweighted, undirected and connected, u V is leader with the maximum closeness value, R E is the set of edges that to be removed, k Z denotes the maximum of the edges to be removed. The problem is to find a set of edges, R E and | R | k , and G ( R ) = ( V , E \ R ) is connected, and R is in:
arg max R E , | R | k r u ( G ( R ) ) .
In the problem LCVMIN and LCRMAX, we assume that the modified network G ( R ) is still connected after removing the edges of set R to remain the integrity of the network. We consider a budget k to limit the negative effects of removing edges on the network. For ease in explanation, the networks in our work are undirected unweighted.

3.2. Complexity Analysis

In this section, we study the optimization problems from the computational point of view. We prove the NP-hard of the LCVMIN and LCRMAX problem by Theorem 1 and 2 as follows. In the following Theorem 1 and 2, we will make use of the Hamiltonian cycle problem to prove that LCVMIN and LCRMAX problem cannot be solved by a polynomial-time scheme unless P = N P and these two problems are NP-hard.
Theorem 1.
Leader Closeness Value Minimization Problem is NP-hard.
Proof. Reduction from Hamiltonian cycle problem to the LCVMIN problem: 
First, we propose the decision version of the LCVMIN problem: given a connected and undirected network G = ( V , E ) , the leaderu, a budget k Z and a value x R , does there exist a set of edges to be removed R such that R E , | R | k and the modified network G ( R ) is still connected and c u ( R ) x ?
To prove the decision version problem is NP-hard, the possible smallest closeness value of the node m in the connected and undirected network is denoted as t N and we find that m = n 1 i = 1 n 1 i = 2 n for the case that the leaderu is the end of a path (Figure 1). This kind of network can be denoted as M and the closeness value of the leader u is m, i.e., c u = 2 n . Hence, we select an arbitrary instance of the Hamiltonian cycle problem (i.e., whether there is a cycle through the network that visits each node exactly once) and convert it into an arbitrary instance of the decision version of the LCVMIN problem, such that reduce the closeness value of the leader to a value smaller than or equal to m.
Given an arbitrary network G = ( V , E ) (undirected and connected), we will show that if G has a Hamiltonian cycle then it is possible to obtain M by removing | E | | V | + 1 edges as follows:
  • At first, we choose a set of edges R * = { e 1 , , e m } , and | R * | = m = | E | | V | . After removing the set of edges R * , there is a Hamiltonian cycle in the modified network G * = ( V , E \ R * ) = ( V , E * ) .
  • Secondly, for the leader u in the Hamiltonian cycle, there are two edges ( u , w ) , ( u , v ) E * and after removing one of these two edges, the target network M is obtained and the closeness value of the leaderu, c u = 2 n .
We have proposed the procedure of the reduction above and will present an example of the reduction. We use bold red line to represent the deleted edge (Figure 2a). After removing all bold red lines, there exists a Hamiltonian cycle in the graph (Figure 2b) and in Figure 2c we can find a Hamiltonian path from u to v, which is the minimum case of the closeness of the leader node u. Therefore, we have proved that the LCVMIN problem is NP-hard by this reduction. □
Theorem 2. 
Leader Closeness Rank Maximization Problem is NP-hard.
Proof. Reduction from Hamiltonian cycle problem to the LCRMAX problem: 
Similar to Theorem 1, we can find that the node u in Figure 1 also has the maximum closeness rank, i.e., we can make leader the last in the graph by the reduction from Hamiltonian cycle problem to the LCRMAX problem. Therefore, we can prove that the LCRMAX problem is NP-hard by this reduction and a simple example is shown in Figure 2. □

4. Approach

In Section 3, we define the LCVMIN and LCRMAX optimization problem and prove the NP-hard of the LCVMIN and LCRMAX problem. To solve these two optimization problems in real-life scenarios, in this section, we design two approximation algorithms to find the set of edges to be removed to minimize (maximize) leader node’s closeness value (rank) in polynomial time and design two pruning algorithms to compute the closeness value (rank) in limited time.

4.1. Approximation Algorithm for LCVMIN Problem

4.1.1. Greedy Algorithm

In this section, we consider a greedy algorithm to obtain an approximate solution of the optimization problem(LCVMIN) in polynomial time, and the detail of the original greedy algorithm is shown in Algorithm 1. Our greedy algorithm attempts to find the edge e E which minimizes the closeness value of the leader at each iteration (Line 3–7). Despite that greedy algorithm can obtain solutions in polynomial time, we have to run BFS ( breadth-first search ) to compute the closeness value after removing an edge at line 5 in Algorithm 1, which requires O ( n + m ) and is infeasible in real-life complex networks. Therefore, in our work, we provide a pruning algorithm to reduce the number of traversed edges and nodes when recomputing the leader’s closeness value after removing an edge. We name it as UpdateCloseness algorithm and this pruning algorithm is inspired by Yen’s work [17].
Algorithm 1: GreedyReduction.
Sensors 19 03886 i001

4.1.2. The Approximation Ratio of the Greedy Algorithm

In this section, we prove that the greedy algorithm can offer an approximate solution to the LCVMIN problem while the greedy solution can have a ( 1 1 e )-approximation ratio. To complete this proof, the shortest-path sum function is chosen as the objective function of this proof, not the closeness computation function. In other words, the LCVMIN problem has been converted into the shortest-path sum maximization problem and the greedy solutions to this problem can obtain a ( 1 1 e )-approximation ratio by proving its monotone and submodular [22]. The detail is shown in Theorem 3.
Theorem 3. 
For the leader node u, let R * be the optimal solution of the LCVMIN problem, and let R be the solution obtained by greedy algorithm, and given the shortest-path sum function f ( R ) = v V \ { u } d u v ( R ) . Then f ( R ) f ( R * ) = v V \ { u } d u v ( R ) v V \ { u } d u v ( R * ) 1 1 e .
Proof. 
We assume that the connectivity of the network cannot be influenced by edge deletion. First, for the given network G = ( V , E ) , we can observe that the shortest-path distance between the leader node u and the other node t, d u t ( E \ e ) , cannot be decreased by edge deletion, i.e., d u t ( E \ e ) d u t ( E ) . Therefore we find that for any subset of solutions for LCVMIN problem A R , f ( A e ) f ( A ) for all edges e R A where R is the solution set for LCVMIN problem. We prove that the shortest-path sum function f is monotone.
Second, we assume that there are two solutions for LCVMIN, A and B, and A B R . For each edge e R B , we should prove that
f ( A e ) f ( A ) f ( B e ) f ( B )
Or another form of expression as follows:
v V \ { u } d u v ( A e ) v V \ { u } d u v ( A ) v V \ { u } d u v ( B e ) v V \ { u } d u v ( B )
To prove the inequality (5), we discuss two possible cases as follows:
(1) We assume that all the shortest path distances between the target node and the other nodes remain constant after removing an edge e, i.e., v V \ { u } d u v ( A e ) v V \ { u } d u v ( A ) = 0 . In this case, we must prove that
0 v V \ { u } d u v ( B e ) v V \ { u } d u v ( B )
this inequation can only hold when v V \ { u } d u v ( B e ) = v V \ { u } d u v ( B ) because f is monotone which has been proved above.
(2) We assume a set of edges C = R B and v V \ { u } d u v ( B C ) = v V \ { u } d u v ( R ) . Hence, we must prove that
v V \ { u } d u v ( B ) v V \ { u } d u v ( A ) > v V \ { u } d u v ( A C ) v V \ { u } d u v ( R )
In inequation (7), v V \ { u } d u v ( B ) v V \ { u } d u v ( A ) > 0 because f is monotone. Meanwhile, A C R and therefore, by the monotone of the function, v V \ { u } d u v ( A C ) v V \ { u } d u v ( R ) < 0 . Hence, the inequation (7) is proved. Now, we have proved inequation (5) by the above two cases and hence, the submodular of the shortest-path sum function f is proved.
Considering the optimal solution for the LCVMIN problem R * and let R be the solution obtained by the greedy algorithm, according to the Nemhauser’s work [22], we can prove that:
f ( R ) ( 1 1 e ) f ( R * )
Thus, Theorem 3 is proved. □
Corollary 1.
The LCVMIN problem subjected to a cardinality constraint admits a 1 1 e approximation algorithm.
Therefore, we have exploited that the greedy approximation algorithm can obtain a solution of the LCVMIN optimization problem in a lower bound 1 1 e 0.63 . Furthermore, in Section 5, we show that the solution obtained by the greedy approximation algorithm can be more accurate than this lower bound.

4.1.3. Example of the UpdateCloseness Algorithm

The goal of our UpdateCloseness algorithm is to update the shortest paths of the nodes which is affected by removing an edge and avoid recomputing closeness value by traversing the entire network. In this section, we propose a simple example to illustrate the principle of our UpdateCloseness algorithm. Suppose that we have a network G = ( V , E ) , leader t and its BFS tree G B in Figure 3, we attempt to remove an arbitrary edge e = ( u , v ) E in the network and d t v d t u . By observing the BFS tree G B , we investigate that there are three edge deletion cases as follows:
  • d t u = d t v : Since the ends of the removed edge e, u and v are at the same level of the bfs tree, it will not influence the shortest paths from t to all other nodes, i.e., c t ( e ) = c t .
  • d t v > d t u and w N ( v ) , d t w = d t u : Assume that for s V , there exists a shortest path P = ( t , , u , v , , s ) in G B . Since after removing the edge ( u , v ) , there still exists a shortest path P = ( t , , w , v , , s ) which has the same length, i.e., d t s ( e ) = d t s as shown in Figure 3b. Hence, it will not influence the shortest paths from t to all other nodes, i.e., c t ( e ) = c t .
  • d t v > d t u and w N ( v ) , d t w > d t u : Since after removing the edge ( u , v ) , as shown in Figure 3c, d t v ( e ) = d t w + 1 > d t v , so an update of the closeness value c t ( e ) is needed, specifically update the shortest paths of the affected nodes, v and its child nodes which have no neighbors in the upper level of the BFS tree (blacked out in Figure 3c).

4.1.4. UpdateCloseness Algorithm

From the above observation, we have found that there are three cases after removing an edge in the network and only Case 3 needs to update the shortest paths of the affected node set. Due to such property, we propose the UpdateCloseness algorithm for the purpose of updating the closeness value of leader after removing an edge. The goal of our UpdateCloseness algorithm is to reduce the time cost of running a BFS, s.t., reduce the number of traversed edges and nodes when computing the sum of all shortest paths. The whole process of UpdateCloseness algorithm is summarized in Algorithm 2. In line 1–6, just similar to the Case 1 and 2 in Figure 3, if we find that the removed edge will not change the shortest paths from leader to all other nodes in the network, the algorithm will return the original closeness value and shortest paths array d.
Algorithm 2: UpdateCloseness.
Sensors 19 03886 i002
As mentioned in the example above, if the removed edge is similar to the Case 3, we must find the affected node set in the network. Therefore, we design an algorithm FindAffectSet to achieve this goal and the detail of this algorithm is shown in Algorithm 3. The result of Algorithm 3 is the affected node set S. In Algorithm 3, e n d is denoted as the node of the removed edge e E which is in the lower level of the BFS tree. The queue Q is designed to run a search in the child nodes of the node e n d to find the affected node set (lines 3–8). For each neighbor node of the node extracted from the queue Q, if there are no neighbors in the upper level of the BFS tree (line 7), it will be pushed into the queue Q. This search repeats until the queue Q is empty. By this pruning search, the affected node set S is found.
Algorithm 3: FindAffectSet.
Sensors 19 03886 i003
After finding the affected nodes set S (line 7 in Algorithm 2), we need to update the shortest paths from leader to all other affected nodes. For each node extracted from S, if it has neighbor nodes in the same level of the BFS tree, we update its distance from its neighbor node which is the nearest to leader t and update the total of all distances to t (lines 10–12 in Algorithm 2). This procedure will be repeated until all nodes in S have been updated and at last our UpdateCloseness algorithm will return the updated closeness value c u p and the updated shortest paths array d . Intuitively, we can use this array d in the next computation of the closeness value.

4.1.5. Time Complexity Analysis

The time complexity of our pruning algorithm is analyzed in this section. In traditional way, after removing an edge, we must recompute the closeness value by BFS, which requires O ( n + m ) . In our UpdateCloseness algorithm, we can reduce the traverse time by pruning the number of nodes that have to be traversed. In Case 1 or Case 2, the time complexity of the UpdateCloseness algorithm is only O ( 1 ) . In Case 3, the number of the traversed nodes and edges is defined as τ n m , whose worst case is O ( n + m ) ; however, the worst case rarely happens, as shown in Section 5. We can find that the time complexity of our UpdateCloseness algorithm in Case 3 is O ( τ n m ) and therefore the greedy algorithm’s time complexity is O ( k · m · τ n m ) . In most cases, we exploit that our UpdateCloseness algorithm can reduce plenty of time compared to BFS.

4.2. Approximation Algorithm for LCRMAX Problem (GSA)

In Section 3 we exploit that the optimization problem of closeness rank maximization is NP-hard. Hence, to obtain approximate solution in polynomial time, we consider a heuristic method combining greedy algorithm and simulated annealing algorithm (GSA). Algorithm 4 shows the detail of the heuristic algorithm. In the early work, we have found that the optimal solution in small-scale network is made up of neighbor nodes of leader which have higher degree. Hence, in Algorithm 4, we sort the neighbors of leader, i.e., N ( u ) in the descending order of degree (Line 1) so as to make the results obtained by greedy algorithm closer to the optimal solution. Due to the fact that we find that only greedy algorithm cannot obtain a ( 1 1 e ) approximation ratio like the value case, we exploit simulated annealing algorithm which takes greedy solution as an initial solution for the purpose of converging faster to a better solution in less time (line 9) and the detail of simulated annealing algorithm is shown in Algorithm 5.
Algorithm 4: Greedy and Simulated Annealing algorithm (GSA).
Sensors 19 03886 i004
Algorithm 5: Simulated Annealing algorithm.
Sensors 19 03886 i005

4.2.1. The Reason for Proposing this Heuristic Method

Compared with the value approximation algorithm, we not only use the greedy algorithm to obtain the approximate solution due to the fact that the optimization problem in the closeness rank case is not submodular and there are situations where the gap between the approximate solution obtained by greedy algorithm and optimal solution is very huge. Table 2 shows a simple example to compare the closeness value case with the rank case.
In the closeness value case, generally, the closeness value decreases as the number of removed edges increases. Therefore, we can distinguish each edge by the closeness value result after removing it. Thus, the greedy algorithm works well in this case and we prove the monotone and submodular of this problem in Theorem 3. However, this does not apply in the rank case. In the network that leader has a huge advantage over other nodes in terms of closeness value (for example the scale-free network), when the size of the removed edges is less than 5, the probability of improving leader’s rank is very little, in other words, the rank of leader remains unchanged in most cases. Also, after removing a certain number of edges, the rank of leader can dramatically decrease, e.g., as shown in Table 2, after removing 5 edges, the leader’s rank varies from 1 to 6. In this example, the network has 17 nodes and leader has 15 neighbors, which satisfying the characteristics of scale-free network. In other words, except for one node, other nodes in the network have direct links with leader. Hence, the closeness value of leader is 0.94, which is close to the theoretical maximum of closeness value. The closeness values of other nodes in the network are mostly between 0.5 and 0.7, which are far less than leader. Therefore, we find that if the number of deleted edges is less than 5, then the closeness value of leader is still the largest in all the cases of edge deletion. In all cases, the minimum value of closeness is about 0.7, and the rank of leader is still 1, but the gap between leader and other nodes has been reduced. When five edges are deleted, the closeness value of leader drops to about 0.66 in the optimal case. At this time, there exist five nodes whose closeness value all around 0.69, so the optimal solution for deleting five edges is 6.
In this example, it is hard for the original greedy algorithm to obtain an approximation solution due to the fact that it cannot distinguish each edge if the rank remains unchanged. Hence, we consider combining the greedy algorithm with simulated annealing algorithm to make the approximate solution closer to the optimal solution.

4.2.2. FastTopRank Algorithm

The heuristic algorithm proposed above has to compute the closeness rank of leader after removing an edge, which needs to solve the all-pairs-shortest-path (APSP) problem. The basic algorithm solving APSP problem is expensive, nearly O ( n ( n + m ) ) by running BFS for each node. Therefore, we propose a pruning algorithm, inspired by Bergamini’s top-k algorithm [7], to quickly compute the closeness rank of the given node. Compared to the UpdateCloseness algorithm, in this algorithm we attempt to reduce the times of BFS to compute the closeness rank.
The principle of our FastTopRank algorithm is to reduce the execution time of BFS when computing the rank of the top node for the reason that we would remove limited edges in the network and it is hard to dramatically reduce the top node’s rank. Differing from the Top-k algorithm [7], we assume that the value of k is equal to the number of nodes in the network, and we stop the algorithm when getting the accurate rank of the top node.
In Algorithm 6, first, we compute the lower bound of the sum of the shortest paths for all nodes v V by the two approaches proposed by Bergamini [7] (Line 3–4). The details of two lower bound algorithm are shown in Algorithms 7 and 8. Furthermore, in our algorithm, we design a priority queue Q to store all nodes order by increasing S ( v ) . Please note that we choose the minimum of both lower bounds by level and neighbor (Line 5–8). To obtain the rank of the top node u, we extract a node with the minimum sum of the shortest paths S * from the head of Q (Line 11). If S * is just the lower bound (i.e., v i s i t e d [ v * ] : = f a l s e ), Algorithm 6 will compute the exact value of the sum of shortest paths and insert it into Q. For the case that S * is the exact value of the sum of the shortest paths (i.e., v i s i t e d [ v * ] : = t r u e ), we can append this node and its S * to the top rank node list (Line 12–14). If fortunately we find the top node is in the top rank node list, we can sort the list by S and then obtain the accurate rank of the top node (Line 15–17).
Obviously, the lower bound close to the exact sum of the shortest paths can reduce the iterations to find the rank of the top node. We choose the minimum of two kinds of lower bounds which are proposed in Bergamini’s work [7] for this reason. Beyond that, the time complexity of our fast rank algorithm is O ( ( n + m ) · k + k l o g k + μ n m ) , where k is the number of iterations to find the accurate rank each of which needs to run BFS and k l o g k represents the time to sort the top rank note list. Also, μ n m is the approximate time complexity of the two lower bound algorithms, whose exact complexity is based on the diameter of the network [7]. Despite that our algorithms may not be faster than the original algorithm when computing the node with low rank due to the reason that k n , s.t. the number of running BFS is nearly n. Our FastTopRank algorithm can significantly reduce the times of BFS, i.e., k n when asserting the rank of top nodes (the most cases of our optimization problem).
Algorithm 6: FastTopRank algorithm.
Sensors 19 03886 i006
Algorithm 7: Level-based lower bound for undirected graphs
Sensors 19 03886 i007
Algorithm 8: Neighborhood-based lower bound for undirected graphs
Sensors 19 03886 i008

5. Experiment

In this section, we report the results of our experiments which examine the efficiency and accuracy of the proposed algorithms in Section 4. We implemented all algorithms in Python and ran all codes in a computer equipped with 16 GB memory and an Intel i5-8500 CPU (3.0 GHz) with 6 cores.

5.1. Dataset

To measure our algorithms, we have chosen some real-life networks and several random networks generated by different models. There are mainly three kinds of randomly generated networks as follows:
  • Random network, which is generated by the Erdos–Renyi model [23]. The generated network can be denoted as G ( n , p ) with n nodes and p connection probability. This kind of network is denoted as ER.
  • Small-world network, which is generated by the Watts–Strogatz model [24]. The generated graph can be denoted as G ( n , k , p ) with n nodes, k average degree and p rewiring edge probability. This kind of network is denoted as WS.
  • Scale-free network, which is generated by the Barabási–Albert model [25]. The generated graph can be denoted as G ( n , m ) with n nodes and m edges to connect a new node with existing nodes. This kind of network is denoted as BA.
Normally, we generate corresponding size of random networks which are undirected and connected as needed and the specific size will be shown in each experiment. Moreover, we have selected some real-life networks and the detail of these networks is shown in Table 3. Some of the real-life networks are undirected and connected and the others are the networks transformed from the directed networks. All these networks are collected from the website of KONECT [26], SNAP [27] and Network Repository [28]. Due to the page limit, we only choose some typical results (3-4 networks) of some experiments.

5.2. Closeness Value Case Results

5.2.1. Evaluate UpdateCloseness Algorithm

In this section, we evaluate the efficiency of our UpdateCloseness algorithm by comparing the computation time with BFS algorithm. To measure the efficiency of our algorithm, we proposed the notation of average speed up ratio T as follows:
T = t B F S t u p d a t e
where t B F S and t u p d a t e denote the average time cost by BFS algorithm and UpdateCloseness algorithm, respectively. We consider that the efficiency of the algorithm depends on the network size and the network topology and therefore, we conduct two different experiments to estimate the efficiency as follows:
  • First, randomly generate networks in different size and kinds (BA, WS and ER). Then, randomly choose the node v V and a removed edge e E in the chosen network, then calculate the closeness value by BFS and UpdateCloseness for each time. We choose the average times by repeating it for 5000 times.
  • First, choose some real-life complex networks as the datasets. Then, randomly choose the node v V and a removed edge e E in the chosen network, then calculate the closeness value by BFS and UpdateCloseness for each time. We choose the average times by repeating it for 5000 times.
Please note that in these two experiments, we assume that the closeness value has been computed before removing an edge and we estimate the efficiency when removing an edge. Also, there are three kinds of network size (≈ | E | | V | ) of our randomly generated network, 5, 10, 15 and the node size varies from 100 to 5000.
Figure 4 shows the average speed up ratio in different sizes and kinds of randomly generated networks. Regardless of the size and kind, our UpdateCloseness algorithm is always faster than the original BFS algorithm and the speed up ratio gradually increases as the network sizes ( | V | ) increases. In most cases, the speed up ratio tends to depend on | E | | V | and we confirm that our algorithm works well in complex networks.
Table 4 shows the average speed up ratio in the real-life complex networks. We find that our algorithm still works well in complex networks and the average speed up ratio T 30 . To summarize, the results of these experiments prove the efficiency of our UpdateCloseness algorithm in different networks, i.e., it works better than the original BFS algorithm in each case and it usually can achieve an speed up rate of more than ten in different kinds and sizes of networks.

5.2.2. Compare Greedy Solution with the Optimal Solution

In this section, we estimate the accuracy of the approximation greedy algorithm by comparing its solution with the optimal solution in small-scale networks. Due to the limited computation resources, we select several real-life and randomly generated networks with dozens of nodes and edges as datasets and size of these networks is shown in Table 5.
Moreover, the budget of the removed edges k ranges from 1 to 5 (some to 7) and we proposed the notation of minimum approximation ratio (denoted by Min Appro Ratio) as the worst case in every budget k and it presents the ratio between the greedy solution and the optimal solution
Table 5 shows the Min Appro Ratio of each network and we discover that the worst case of our approximate greedy algorithm is far more accurate than the theorical lower bound ( 1 1 e 0 . 63 ) which has been proved in Section 4.
Figure 5 shows the differences between the optimal solution and greedy approximate solution in each budget k ( due to limited space, we only choose four typical results in all networks ). Obviously, our approximate greedy algorithm can significantly minimize the closeness value of the leader in seconds compared with nearly 2 days to obtain the optimal solution by brute-force search when the budget k = 7 .

5.2.3. Compare Approximate Greedy Algorithm with Other Baseline Algorithms

In this section, we choose some baseline algorithms as comparison to evaluate the accuracy of our approximate greedy algorithm in the complex network. Different strategies of removing edges in the baseline algorithms are shown as follows:
  • Random: randomly and uniformly select k edges in the whole network.
  • Top-k degree: choose k edges with the highest degree sum.
  • Top-k closeness: choose k edges with the highest closeness value sum.
  • Top-k neighbor degree: choose k edges in the neighbor of the leader node with the highest degree.
Please note that the first baseline algorithm is easy to understand and can be implement within a short time. Furthermore, the fourth baseline algorithm is a kind of variety of the ROAM algorithm in Waniek’s work [3]. Table 6 shows the detail of all real-life and randomly generated complex networks used in this comparison experiment.
Figure 6 shows the different results in random networks or real-life networks ( due to limited space, we only choose four typical results in all networks ). We observe that our greedy algorithm works better than other four comparison algorithms in general and the three top-k algorithms can only obtain lower approximation results. Random algorithm performs poorly in all networks because there are limited edges whose deletion can contribute to closeness decrement in complex networks.

5.3. Closeness Rank Case Results

5.3.1. Evaluate FastTopRank Algorithm

In this section, similar to the experiment in the closeness value case, we conduct an experiment to evaluate the efficiency of the FastTopRank algorithm. First, due to the fact that our algorithm can compute the exact closeness rank of the node in the top rank rapidly, we choose to speed up rate of the nodes with top-50 rank as the standard of this experiment. Furthermore, we denote the notation of speed up rate T r a n k as follows:
T r a n k = T w h o l e T p a r t i a l
where T p a r t i a l and T w h o l e denote the time cost of FastTopRank and traditional algorithm (computing the closeness value of all nodes and sorting them).
In this experiment, we compute the rank of the nodes ranking from 1 to 50 in the network by two algorithms for three times and take the average to compute the speed up rate T r a n k . Figure 7 shows the results in different networks. Obviously, our algorithm can significantly reduce the time when computing the top-5 nodes and it still works when computing the nodes with low rank.

5.3.2. Compare the Solution of GSA Algorithm with the Optimal Solution

In this experiment, we test our GSA algorithm in some small-scale networks and compare its solution with the optimal solution obtained by brute-force search. The networks of this experiment are shown in Table 5 and results are shown in Table 7. Due to the limitation of computation resources, the budget of the removed edges only ranges from 1 to 5 and we just choose three typical results due to the page limit.
In most cases, the solution of our GSA algorithm is the same or very close to the optimal solution. However, there are still some situations where the approximate solution is far from the optimal solution in the network such as BA network whose leader’s degree is particularly high and we find that its optimal solution, i.e., the closeness rank of leader remains the first until removing as many edges as possible. Hence, in this situation, the number of optimal solutions is few and it is hard for our algorithm to obtain an approximate solution.

5.3.3. Compare GSA Algorithm with Other Baseline Algorithms

In this section, to estimate the accuracy of our GSA algorithm in the complex network, we compare our algorithm with the following baseline algorithms:
  • Greedy Neighbor: the greedy algorithm that chooses the neighbor edges that maximize the closeness rank each time.
  • Top-k degree: choose k edges with the highest degree sum.
  • Top-k closeness: choose k edges with the highest closeness value sum.
  • Top-k neighbor degree: choose k edges in the neighbor of the leader node with the highest degree.
In the earlier experiment, we have found that the optimal solution consists of neighbor edges in most cases, and removing limited edges cannot change the closeness rank of leader. Therefore, differing from the comparison with the optimal solution, in this experiment we set the range of the budget of removing edges at 10–50% of the degree of the leader to protect the integrity of network as much as possible and make the effect of improving the closeness rank more obvious. Furthermore, in general, we assume that the network remains connected after removing the edge set generated by base line algorithms.
Table 8, Table 9 and Table 10 show the results of this experiment. We find that the GSA algorithm can improve the results obtained by the greedy neighbor algorithms and the other three baseline algorithms perform poorly in all networks. Furthermore, we find that removing limited edges in the WS and ER networks can significantly increase the rank of the leader.

6. Conclusions

We present two optimization problems of hiding leader in the IoT networks by minimizing (maximizing) closeness value (rank). We show finding optimal solutions is NP-hard. Hence, we propose two heuristic algorithms to solve optimization problems in polynomial time and prove that the greedy algorithm can obtain a ( 1 1 e ) -approximation ratio. We also provide two pruning algorithms to reduce the time cost of BFS algorithm and compute the closeness value of each nodes in the complex networks. Experimental results show that our pruning algorithms can reduce the time by at least 10 times to calculate the closeness value (rank) compared with original algorithms and our heuristic algorithms can be close to the optimal solutions and outperform the solutions by the baseline algorithms.
In the future, we would like to combine our work with existing studies of privacy preservation in IoT focus on access control model, such as context-aware access control model [30,31,32,33,34], to ensure the privacy and security of IoT networks. We hope to construct a context-aware access control policy framework combining the idea of our dynamic update algorithm and can dynamic update the access control policy in limited time.

Author Contributions

All authors contributed to the paper. G.W.: Funding acquisition; Z.W.: Project administration; Y.R.: Supervision; J.J.: Writing—original draft; J.S.: Writing—review & editing; Z.Z.: Supervision.

Funding

This work was supported by the Natural Science Foundation of China (Grant No. 61872120), Natural Science Foundation of Zhejiang Province (Grant No. LY18F030007, LY18F020017 andLQY19G030001), and Key Technologies, System and Application of Cyberspace Big Search, Major Project of Zhejiang Lab (Grant No. 2019DH0ZX01).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Elmazi, D.; Cuka, M.; Ikeda, M.; Barolli, L. Effect of Size of Giant Component for actor node selection in WSANs: A comparison study. Concurr. Comput. Pract. Exp. 2019. [Google Scholar] [CrossRef]
  2. Zhou, B.; Pei, J.; Luk, W. A brief survey on anonymization techniques for privacy preserving publishing of social network data. ACM Sigkdd Explor. Newsl. 2008, 10, 12–22. [Google Scholar] [CrossRef]
  3. Waniek, M.; Michalak, T.P.; Wooldridge, M.J.; Rahwan, T. Hiding individuals and communities in a social network. Nat. Hum. Behav. 2018, 2, 139. [Google Scholar] [CrossRef]
  4. Beauchamp, M.A. An improved index of centrality. Behav. Sci. 1965, 10, 161–163. [Google Scholar] [CrossRef] [PubMed]
  5. Berno, B. Network formation with closeness incentives. In Networks, Topology and Dynamics; Springer: Berlin/Heidelberg, Germany, 2009; pp. 95–109. [Google Scholar]
  6. Okamoto, K.; Chen, W.; Li, X.Y. Ranking of Closeness Centrality for Large-Scale Social Networks; Springer: Berlin/Heidelberg, Germany, 2008; pp. 186–195. [Google Scholar]
  7. Bergamini, E.; Borassi, M.; Crescenzi, P.; Marino, A.; Meyerhenke, H. Computing top-k closeness centrality faster in unweighted graphs. In Proceedings of the Eighteenth Workshop on Algorithm Engineering and Experiments (ALENEX), Arlington, VA, USA, 10 January 2016; pp. 68–80. [Google Scholar]
  8. Borassi, M.; Crescenzi, P.; Marino, A. Fast and simple computation of top-k closeness centralities. arXiv 2015, arXiv:1507.01490. [Google Scholar]
  9. Le Merrer, E.; Le Scouarnec, N.; Trédan, G. Heuristical top-k: Fast estimation of centralities in complex networks. Inf. Process. Lett. 2014, 114, 432–436. [Google Scholar] [CrossRef]
  10. Olsen, P.W.; Labouseur, A.G.; Hwang, J.H. Efficient top-k closeness centrality search. In Proceedings of the 2014 IEEE 30th International Conference on Data Engineering (ICDE), Chicago, IL, USA, 31 March–4 April 2014; pp. 196–207. [Google Scholar]
  11. Saxena, A.; Gera, R.; Iyengar, S. A heuristic approach to estimate nodes’ closeness rank using the properties of real world networks. Soc. Netw. Anal. Min. 2019, 9, 3. [Google Scholar] [CrossRef]
  12. Bisenius, P.; Bergamin, E.; Angriman, E.; Meyerhenke, H. Computing top-k closeness centrality in fully-dynamic graphs. In Proceedings of the Twentieth Workshop on Algorithm Engineering and Experiments (ALENEX), New Orleans, LA, USA, 7–8 January 2018; pp. 21–35. [Google Scholar]
  13. Tong, H.; Prakash, B.A.; Eliassi-Rad, T.; Faloutsos, M.; Faloutsos, C. Gelling, and melting, large graphs by edge manipulation. In Proceedings of the 21st ACM international conference on Information and knowledge management, Maui, HI, USA, 29 October–2 November 2012; pp. 245–254. [Google Scholar]
  14. Santos, E.E.; Korah, J.; Murugappan, V.; Subramanian, S. Efficient anytime anywhere algorithms for closeness centrality in large and dynamic graphs. In Proceedings of the IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), Chicago, IL, USA, 23–27 May 2016; pp. 1821–1830. [Google Scholar]
  15. Sariyuce, A.E.; Kaya, K.; Saule, E.; Catalyurek, U.V. Incremental algorithms for network management and analysis based on closeness centrality. arXiv 2013, arXiv:1303.0422. [Google Scholar]
  16. Kas, M.; Carley, K.M.; Carley, L.R. Incremental closeness centrality for dynamically changing social networks. In Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Niagara, ON, Canada, 25–28 August 2013; pp. 1250–1258. [Google Scholar]
  17. Yen, C.C.; Yeh, M.Y.; Chen, M.S. An efficient approach to updating closeness centrality and average path length in dynamic networks. In Proceedings of the IEEE 13th International Conference on Data Mining, Dallas, TX, USA, 7–10 December 2013; pp. 867–876. [Google Scholar]
  18. Shaw, M.E. Group structure and the behavior of individuals in small groups. J. Psychol. 1954, 38, 139–149. [Google Scholar] [CrossRef]
  19. Crescenzi, P.; D’angelo, G.; Severini, L.; Velaj, Y. Greedily improving our own closeness centrality in a network. ACM Trans. Knowl. Discov. Data 2016, 11, 9. [Google Scholar] [CrossRef]
  20. Marchiori, M.; Latora, V. Harmony in the small-world. Phys. A Stat. Mech. Its Appl. 2000, 285, 539–546. [Google Scholar] [CrossRef] [Green Version]
  21. Rochat, Y. Closeness Centrality Extended to Unconnected Graphs: the Harmonic Centrality Index. Available online: http://infoscience.epfl.ch/record/200525 (accessed on 15 June 2019).
  22. Nemhauser, G.L.; Wolsey, L.A.; Fisher, M.L. An analysis of approximations for maximizing submodular set functions—I. Math. Program. 1978, 14, 265–294. [Google Scholar] [CrossRef]
  23. Erds, P.; Rényi, A. On random graphs I. Publ. Math. Debr. 1959, 6, 290–297. [Google Scholar]
  24. Watts, D.J.; Strogatz, S.H. Collective dynamics of ‘small-world’networks. Nature 1998, 393, 440. [Google Scholar] [CrossRef] [PubMed]
  25. Barabási, A.L.; Albert, R. Emergence of scaling in random networks. Science 1999, 286, 509–512. [Google Scholar] [CrossRef] [PubMed]
  26. Kunegis, J. Konect: The koblenz network collection. In Proceedings of the 22nd International Conference on World Wide Web, Rio de Janeiro, Brazil, 13–17 May 2013; pp. 1343–1350. [Google Scholar]
  27. Leskovec, J.; Krevl, A. SNAP Datasets: Stanford Large Network Dataset Collection. Available online: http://snap.stanford.edu/data (accessed on 30 June 2019).
  28. Rossi, R.A.; Ahmed, N.K. The Network Data Repository with Interactive Graph Analytics and Visualization. In Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, Austin, TX, USA, 25–30 January 2015. [Google Scholar]
  29. Krebs, V.E. Mapping networks of terrorist cells. Connections 2002, 24, 43–52. [Google Scholar]
  30. Trnka, M.; Cerny, T. On security level usage in context-aware role-based access control. In Proceedings of the 31st Annual ACM Symposium on Applied Computing, Pisa, Italy, 4–8 April 2016; pp. 1192–1195. [Google Scholar]
  31. Kayes, A.; Han, J.; Rahayu, W.; Dillon, T.; Islam, M.S.; Colman, A. A policy model and framework for context-aware access control to information resources. Comput. J. 2018, 62, 670–705. [Google Scholar] [CrossRef]
  32. Colombo, P.; Ferrari, E. Enhancing NoSQL datastores with fine-grained context-aware access control: A preliminary study on MongoDB. Int. J. Cloud Comput. 2017, 6, 292–305. [Google Scholar] [CrossRef]
  33. Kayes, A.; Rahayu, W.; Dillon, T.; Chang, E.; Han, J. Context-aware access control with imprecise context characterization for cloud-based data resources. Future Gener. Comput. Syst. 2019, 93, 237–255. [Google Scholar] [CrossRef]
  34. Cheng, C.; Lu, R.; Petzoldt, A.; Takagi, T. Securing the Internet of Things in a quantum world. IEEE Commun. Mag. 2017, 55, 116–120. [Google Scholar] [CrossRef]
Figure 1. The minimum (maximum) case of closeness value (rank).
Figure 1. The minimum (maximum) case of closeness value (rank).
Sensors 19 03886 g001
Figure 2. The specific steps of the reduction from the Hamiltonian cycle problem to the LCVMIN and LCRMAX problem: (a) original sample network, (b) modified network with a Hamiltonian cycle, (c) modified network with a Hamiltonian path.
Figure 2. The specific steps of the reduction from the Hamiltonian cycle problem to the LCVMIN and LCRMAX problem: (a) original sample network, (b) modified network with a Hamiltonian cycle, (c) modified network with a Hamiltonian path.
Sensors 19 03886 g002
Figure 3. Three cases of the edge deletion.
Figure 3. Three cases of the edge deletion.
Sensors 19 03886 g003
Figure 4. The average speed up ratio T in different sizes and kinds of random networks.
Figure 4. The average speed up ratio T in different sizes and kinds of random networks.
Sensors 19 03886 g004
Figure 5. The comparison of the optimal and greedy closeness value results.
Figure 5. The comparison of the optimal and greedy closeness value results.
Sensors 19 03886 g005
Figure 6. The comparison of the greedy algorithm with the baseline algorithms.
Figure 6. The comparison of the greedy algorithm with the baseline algorithms.
Sensors 19 03886 g006
Figure 7. Evaluate the efficiency of the FastTopRank algorithm.
Figure 7. Evaluate the efficiency of the FastTopRank algorithm.
Sensors 19 03886 g007
Table 1. Comparison with related works.
Table 1. Comparison with related works.
SchemeEdges UpdatedMeasurementSelection RangeHidden EffectSolution Goal
Waniek [3]Addition and DeletionDegree Centrality [18]NeighborsYesValue
Crescenzi [19]AdditionHarmonic Centrality [20]NeighborsNoValue
Our workDeletionCloseness Centrality [4]Entire NetworkYesValue and Rank
Table 2. The simple example to compare the closeness value cases with the rank cases.
Table 2. The simple example to compare the closeness value cases with the rank cases.
Delete EdgesCloseness Value (Optimal)Closeness Rank (Optimal)Closeness Rank (Greedy)
10.8911
20.8411
30.7611
40.6911
50.6661
Table 3. Real-life datasets.
Table 3. Real-life datasets.
Network | V | | E | Network Type
WTC [29]3664Terrorist Network
bali1763Terrorist Network
moreno-rhesus1669Animal Social Network
aves-weaver-social2462Animal Social Network
Dolphins62159Animal Social Network
ContiguousUSA49107Infrastructure Network
david112425Lexical Network
Jazz1982742Collaboration Network
arenas-email11335451Communication Network
arenas-pgp10,68024,316Interaction Network
as-caida26,475106,762Internet Network
ucidata-gama1658Social Network
moreno-taro2239Social Network
moreno-beach37105Social Network
moreno-oz2171839Social Network
FB-tvshow389217,262Social Network
FB-politician590841,729Social Network
FB-government705789,455Social Network
Table 4. Complex network datasets used in evaluating the efficiency of our UpdateCloseness algorithm.
Table 4. Complex network datasets used in evaluating the efficiency of our UpdateCloseness algorithm.
Network | V | | E | Speed up Ratio
arenas-email1133545126.52
FB-tvshow389217,26228.95
FB-politician590841,72932.59
FB-government705789,45536.15
arenas-pgp10,68024,31632.24
as-caida26,475106,76231.46
Table 5. Datasets used in comparing greedy solutions with the optimal solutions.
Table 5. Datasets used in comparing greedy solutions with the optimal solutions.
Network | V | | E | Min Appro Ratio
WTC36640.9632
bali17630.9130
aves-weaver-social24620.9556
moreno-rhesus16690.9200
moreno-beach371051.0000
moreno-taro22390.8852
dolphins621590.9600
contiguous-usa491071.0000
ucidata-gama16580.9231
Random graph30550.8511
Scale-free30560.9437
Small-world30600.9174
Table 6. Datasets used in comparing greedy solution with the other algorithms.
Table 6. Datasets used in comparing greedy solution with the other algorithms.
Network | V | | E |
Jazz1982742
moreno-oz2171839
david112425
FB-tvshow389217,262
FB-politician590841,729
arenas-email11335451
BA-511005475
BA-1010009900
BA-15100014,775
ER-510005025
ER-10100010,029
ER-15100014,917
WS-510005000
WS-10110010,000
WS-15110015,000
Table 7. Compare the optimal solution with the approximate solutions.
Table 7. Compare the optimal solution with the approximate solutions.
Aves-Weaver-SocialDolphinsMoreno_Rhesus
kOptimalGreedyGSAOptimalGreedyGSAOptimalGreedyGSA
1111333111
211110610656
311123172310810
4111363636101010
5515505050131113
Table 8. The comparison of the approximate algorithm with the baseline algorithms: moreno-oz.
Table 8. The comparison of the approximate algorithm with the baseline algorithms: moreno-oz.
kGreedyGSATop-k-DegreeTop-k-ClosenessTop-k-Neighbor
522111
622111
722111
834111
956111
1056112
1156112
1268112
1389112
1499112
151010112
161320113
171719115
181923115
192225115
202432115
213035115
223539115
233839118
2446522110
2552542110
2654623111
2763653119
2867733120
Table 9. The comparison of the approximate algorithm with the baseline algorithms: er-150.
Table 9. The comparison of the approximate algorithm with the baseline algorithms: er-150.
kGreedyGSATop-k-DegreeTop-k-ClosenessTop-k-Neighbor
326112
466226
51222666
63030111111
73333202021
84242303029
96161333333
107094424242
1194111425252
12111111426170
13119124527878
14122128617795
151401407877111
161401437777118
171441447777124
181451467777135
191481487777138
Table 10. The comparison of the approximate algorithm with the baseline algorithms: er-200.
Table 10. The comparison of the approximate algorithm with the baseline algorithms: er-200.
kGreedyGSATop-k-DegreeTop-k-ClosenessTop-k-Neighbor
468111
51010112
61111116
71419126
82636119
935371611
10404011017
11546041633
126577101637
1389104111647
1488104112455
15111118102465
16129156263777
17162177334088
181771813355112
191841863365141
201891923773156
211951974773179

Share and Cite

MDPI and ACS Style

Ji, J.; Wu, G.; Shuai, J.; Zhang, Z.; Wang, Z.; Ren, Y. Heuristic Approaches for Enhancing the Privacy of the Leader in IoT Networks. Sensors 2019, 19, 3886. https://doi.org/10.3390/s19183886

AMA Style

Ji J, Wu G, Shuai J, Zhang Z, Wang Z, Ren Y. Heuristic Approaches for Enhancing the Privacy of the Leader in IoT Networks. Sensors. 2019; 19(18):3886. https://doi.org/10.3390/s19183886

Chicago/Turabian Style

Ji, Jie, Guohua Wu, Jinguo Shuai, Zhen Zhang, Zhen Wang, and Yizhi Ren. 2019. "Heuristic Approaches for Enhancing the Privacy of the Leader in IoT Networks" Sensors 19, no. 18: 3886. https://doi.org/10.3390/s19183886

APA Style

Ji, J., Wu, G., Shuai, J., Zhang, Z., Wang, Z., & Ren, Y. (2019). Heuristic Approaches for Enhancing the Privacy of the Leader in IoT Networks. Sensors, 19(18), 3886. https://doi.org/10.3390/s19183886

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop