Abstract
A model that can describe the functioning of large-scale systems with a dynamical and adaptive network topology is developed. Dynamical graph theory is chosen as the mathematical tools on which the model is based. Therefore, the functioning of the ad hoc network is represented as a set of static graphs, each of which corresponds to a certain timestamp. Dynamic graphs allow one to track changes in the network and mark them as legitimate or illegitimate. The choice of key parameters of the developed model is based on the practical experience of researchers involved in the detection of different attacks in ad hoc networks, which makes the model a priori focused on subsequent security analysis.
REFERENCES
Kalinin, M.O., Zubkov, E.A., Suprun, A.F., and Pechenkin, A.I., Prevention of attacks on dynamic routing in self-organizing adhoc networks using swarm intelligence, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 977–983. https://doi.org/10.3103/S0146411618080163
Jhaveri, R.H., Patel, S.J., and Jinwala, D.C., DoS attacks in mobile ad hoc networks: A survey, Second Int. Conf. on Advanced Computing & Communication Technologies, Rohtak, India, 2012, IEEE, 2012, pp. 535–541. https://doi.org/10.1109/ACCT.2012.48
Hamdi, M.M., Audah, L., Abood, M.S., Rashid, S.A., Mustafa, A.S., Mahdi, H., and Al-Hiti, A.S., A review on various security attacks in vehicular ad hoc networks, Bull. Electr. Eng. Inf., 2021, vol. 10, no. 5, pp. 2627–2635. https://doi.org/10.11591/eei.v10i5.3127
Harary, F. and Gupta, G., Dynamic graph models, Math. Comput. Modell. 1997, vol. 25, no. 7, pp. 79–87. https://doi.org/10.1016/S0895-7177(97)00050-2
Zhang, D. and Sterbenz, J.P., Modelling critical node attacks in MANETs, Self-Organizing Systems. IWSOS 2013, Elmenreich, W., Dressler, F., and Loreto, V., Eds., Lecture Notes in Computer Science, vol. 8221, Berlin: Springer, 2014, pp. 127–138. https://doi.org/10.1007/978-3-642-54140-7_11
Kovun, V.A. and Kashira, I.L., Quantitative approach to evaluating the influence of literary works using the graph theory, Vestn. Voronezhskogo Gos. Univ. Ser.: Sist. Anal. Inf. Tekhnol., 2019, no. 3, pp. 177–185.
Freeman, L.C., A set of measures of centrality based upon betweenness, Sociometry, 1977, vol. 40, no. 1, pp. 35–41. https://doi.org/10.2307/3033543
Shcherbakova, N., Measures of centrality in networks, Probl. Inf., 2015, no. 2, pp. 18–30.
Chen, P., Xie, H., Maslov, S., and Redner, S., Finding scientific gems with Google’s PageRank algorithm, J. Informetrics, 2007, vol. 1, no. 1, pp. 8–15. https://doi.org/10.1016/j.joi.2006.06.001
Brin, S. and Page, L., The anatomy of a large-scale hypertextual Web search engine, Comput. Networks ISDN Syst., 1998, vol. 30, nos. 1–7, pp. 107–117. https://doi.org/10.1016/S0169-7552(98)00110-X
Zhang, Sh., Zhang, Zh., Liu, Ch., Gu, W., Yang, Ch., Fang, Yu., and Wang, J., Vulnerabilities of mobile ad hoc network using centrality metrics, 2017 Int. Conf. on Computer Technology, Electronics and Communication (ICCTEC), Dalian, China, 2017, IEEE, 2017, pp. 1370–1373. https://doi.org/10.1109/ICCTEC.2017.00300
Dietzel, S., Petit, J., Heijenk, G., and Kargl, F., Graph-based metrics for insider attack detection in VANET multihop data dissemination protocols, IEEE Trans. Veh. Technol., 2013, vol. 62, no. 4, pp. 1505–1518. https://doi.org/10.1109/TVT.2012.2236117
Rmayti, M., Begriche, Y., Khatoun, R., Khoukhi, L., and Mammeri, A., Graph-based wormhole attack detection in mobile ad hoc networks (MANETs), Fourth Int. Conf. on Mobile and Secure Services (MobiSecServ), Miami Beach, Fla., 2018, IEEE, 2018, pp. 1–6. https://doi.org/10.1109/MOBISECSERV.2018.8311439
Zegzhda, D., Kalinin, M., Krundyshev, V., Lavrova, D., Moskvin, D., and Pavlenko, E., Application of bioinformatics algorithms for polymorphic cyberattacks detection, Inf. Avtom., 2021, vol. 20, no. 4, pp. 820–844. https://doi.org/10.15622/ia.20.4.3
Kalinin, M. and Krundyshev, V., Sequence alignment algorithms for intrusion detection in the internet of things, Nonlinear Phenom. Complex Syst., 2020, vol. 23, no. 4, pp. 397–404. https://doi.org/10.33581/1561-4085-2020-23-4-397-404
Zegzhda, P., AI-based security for the smart networks, SIN 2020: 13th Int. Conf. on Security of Information and Networks, Merkez, Turkey, 2020, Örs, B. and Elçi, A., Eds., New York: Association for Computing Machinery, 2020, p. 22. https://doi.org/10.1145/3433174.3433593
Kalinin, M., Krundyshev, V., and Zegzhda, D., AI methods for neutralizing cyber threats at unmanned vehicular ecosystem of smart city, The Economics of Digital Transformation, Devezas, T., Leitão, J., and Sarygulov, A., Eds., Studies on Entrepreneurship, Structural Change and Industrial Dynamics, Cham: Springer, 2021, pp. 157–171. https://doi.org/10.1007/978-3-030-59959-1_10
Kalinin, M., Krundyshev, V., and Zegzhda, P., Cybersecurity risk assessment in smart city infrastructures, Machines, 2021, vol. 9, no. 4, p. 78. https://doi.org/10.3390/machines9040078
Borgatti, S.P., Identifying sets of key players in a social network, Comput. Math. Organ. Theory, 2006, vol. 12, no. 1, pp. 21–34. https://doi.org/10.1007/s10588-006-7084-x
Funding
The research is funded by the Russian Science Foundation, project no. 22-21-20008, https://rscf.ru/project/22-21-20008/.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
The author declares that he has no conflicts of interest.
Additional information
Translated by I. Obrezanova
About this article
Cite this article
Pavlenko, E.Y. Functional Model of Adaptive Network Topology of Large-Scale Systems Based on Dynamical Graph Theory. Aut. Control Comp. Sci. 56, 1016–1024 (2022). https://doi.org/10.3103/S0146411622080168
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411622080168