
Research Article
Data Security Sharing Method of Opportunistic Network Routing Nodes Based on Knowledge Graph and Big Data
@INPROCEEDINGS{10.1007/978-3-031-50577-5_11, author={Xucheng Wan and Yan Zhao}, title={Data Security Sharing Method of Opportunistic Network Routing Nodes Based on Knowledge Graph and Big Data}, proceedings={Multimedia Technology and Enhanced Learning. 5th EAI International Conference, ICMTEL 2023, Leicester, UK, April 28-29, 2023, Proceedings, Part III}, proceedings_a={ICMTEL PART 3}, year={2024}, month={2}, keywords={Knowledge Graph Big Data Opportunistic Network Routing Node Data Security Data Sharing}, doi={10.1007/978-3-031-50577-5_11} }
- Xucheng Wan
Yan Zhao
Year: 2024
Data Security Sharing Method of Opportunistic Network Routing Nodes Based on Knowledge Graph and Big Data
ICMTEL PART 3
Springer
DOI: 10.1007/978-3-031-50577-5_11
Abstract
Opportunity network is one of the main network types for data sharing applications today. Due to the completely self-organized and distributed characteristics of its own structure, there is a greater security risk in the process of data sharing. Therefore, an opportunity based on knowledge graph and big data is proposed. Research on data security sharing method of network routing nodes. Analyze the opportunistic network routing protocol, expound the data sharing mode of the opportunistic network routing nodes, represent the opportunistic network based on the knowledge graph, calculate the influence degree parameter of the routing node, build the routing node influence propagation model based on this, formulate the routing node data publishing/subscribing rules, combined with Secure multi-party computing big data builds a routing node data security sharing architecture to realize the secure sharing of opportunistic network routing node data. The experimental results show that after the method is applied, the minimum value of the shared data packet loss rate reaches 4%, and the maximum value of the data sharing safety factor reaches 0.98, which fully confirms that the method has a better data security sharing effect.