Research Article

Ferry Node Identification Model for the Security of Mobile Ad Hoc Network

Algorithm 1

: Algorithm for calculating the importance of structural holes.
Input: node set G
Output: structural hole constraint coefficient, , of all nodes in G
(1)for : //G is the node set of the opportunistic network
(2) Calculate k (i)
(3)for :
(4) Calculate Q (i)
(5)for :
(6) for : // is the set of all neighboring nodes of node i
(7)  Calculate
(8)  for :
(9)   Calculate and
(10)  Calculate
(11)for :
(12) Calculate
(13)for :
(14) Calculate
(15)return Ln