Advertisement

Network-Wide Robustness to Area Attacks

  • Qing Zhou
  • Long Gao
  • Ruifang Liu
  • Shuguang Cui
Chapter
Part of the SpringerBriefs in Computer Science book series (BRIEFSCOMPUTER)

Abstract

In this chapter, we consider the network-wide robustness to area attacks. We first give four properties that a good network robustness measure should possess. We then propose a new measure for network robustness: the percentage of surviving communication pairs, which can be proven to satisfy the desired four properties. We further compare other existing network robustness measures against the proposed one. Afterwards, we analyze the robustness of the LCR random network and the traditional random network.

References

  1. 1.
    Boesch FT, Harary F, Kabell JA (1981) Networks 11(1):57–63. doi:10.1002/net. 3230110106MathSciNetMATHCrossRefGoogle Scholar
  2. 2.
    Phillips CA (1993) In: Proceedings of ACM symposium on theory of computing, vol 25. ACM, New York, p 776. doi:10.1145/167088.167286Google Scholar
  3. 3.
    Wood RK (1993) Math Comput Model 17(2):1. doi:10.1016/0895-7177(93)90236-RMATHCrossRefGoogle Scholar
  4. 4.
    Bingol L (2001) A lagrangian heuristic for solving a network interdiction problem. Master’s thesis, Naval Postgraduate SchoolGoogle Scholar
  5. 5.
    Royset JO, Wood RK (2008) INFORMS J Comput 19(2):175. doi:10.1287/ijoc.1060. 0191MathSciNetCrossRefGoogle Scholar
  6. 6.
    Motter AE, Lai YC (2002) Phys Rev E 66(6):065102. doi:10.1103/PhysRevE.66. 065102CrossRefGoogle Scholar
  7. 7.
    Sachtjen M, Carreras B, Lynch V (2000) Phys Rev E 61(5):4877. doi:10.1103/ PhysRevE.61.4877CrossRefGoogle Scholar
  8. 8.
    Goh KI, Kahng B, Kim D (2002) Phys Rev Lett 88(10):108701. doi:10.1103/ PhysRevLett.88.108701CrossRefGoogle Scholar
  9. 9.
    Watts D (2002) Proc Natl Acad Sci 99(9), 5766. doi:10.1073/pnas.082090499MathSciNetMATHCrossRefGoogle Scholar
  10. 10.
    Moreno Y, Gomez J, Pacheco A (2002) Europhys Lett 58(4):630. doi:10.1209/epl/ i2002-00442-2CrossRefGoogle Scholar
  11. 11.
    Willinger W, Govindan R, Jamin S, Paxson V, Shenker S (2002) Proc Natl Acad Sci 99(1), 2573. doi:10.1073/pnas.012583099CrossRefGoogle Scholar
  12. 12.
    Callaway DS, Newman MEJ, Strogatz SH, Watts DJ (2000) Phys Rev Lett 85:5468. doi:10.1103/PhysRevLett.85.5468CrossRefGoogle Scholar
  13. 13.
    Ball F, Mollison D, Scalia-Tomba G (1997) Ann Appl Probab 7(1):46. doi:10.1214/ aoap/1034625252MathSciNetMATHCrossRefGoogle Scholar
  14. 14.
    Newman MEJ, Watts DJ (1999) Phys Rev E 60(6):7332. doi:10.1103/PhysRevE.60. 7332CrossRefGoogle Scholar
  15. 15.
    Cohen R, Erez K, ben Avraham D, Havlin S (2000) Phys Rev Lett 85:4624. doi:10.1103/PhysRevLett.85.4626Google Scholar
  16. 16.
    Zhou Q, Gao L, Cui S (2010) In: Proceedings of IEEE GLOBECOM. IEEE, Piscataway, pp 368–372. doi:10.1109/GLOCOMW.2010.5700343Google Scholar
  17. 17.
    Foster JS, Gjelde E, Graham WR, Hermann RJ, Kluepfel HM, Lawson RL, Soper GK, Wood LL, Woodard JB (2004) Report of the commission to assess the threat to the united states from electromagnetic pulse (emp) attack. http://www.empcommission.org/docs/empctextunderscoreexectextunderscorerpt.pdf. Accessed 20 Apr 2012
  18. 18.
    Radasky W (2007) High-altitude electromagnetic pulse (hemp): a threat to our way of life. http://www.todaysengineer.org/2007/Sep/HEMP.asp. Accessed 20 Apr 2012
  19. 19.
    Ozdamar L, Ekinci E, Kucukyazici B (2004) Ann Oper Res 129:217. doi:10.1023/B: ANOR.0000030690.27939.39MathSciNetCrossRefGoogle Scholar
  20. 20.
    Radwan AE, Hobeika AG, Sivasailam D (1985) Inst Transp Eng J 55(9):25Google Scholar
  21. 21.
    Young S, Balluz L, Malilay J (2004) Sci Total Environ 322:3. doi:10.1016/ S0048-9697(03)00446-7CrossRefGoogle Scholar
  22. 22.
    Feng QS, Chen JF, Ai MY (2010) J Acta Petrolei Sinica 1:139Google Scholar
  23. 23.
    Wang JW, Rong LL (2009) Elsevier Saf Sci 47(10):1332. doi:10.1016/j.ssci.2009.02.002CrossRefGoogle Scholar
  24. 24.
    Pastor-Satorras R, Vazquez A, Vespignani A (2001) Phys Rev Lett 87(25):258701. doi:10.1103/PhysRevLett.87.258701CrossRefGoogle Scholar
  25. 25.
    Cohen R, Erez K, Ben-Avraham D, Havlin S (2001) Phys Rev Lett 86(16):3682. doi:10.1103/PhysRevLett.86.3682CrossRefGoogle Scholar
  26. 26.
    Gligor VD (1984) Proc IEEE Trans Softw Eng 10(3), 320. doi:10.1109/TSE.1984. 5010241CrossRefGoogle Scholar
  27. 27.
    Peng T, Leckie C, Ramamohanarao K (2007) ACM Comput Surv 39(1):1. doi:10. 1145/1216370.1216373CrossRefGoogle Scholar
  28. 28.
    Mirkovic J, Reiher P (2004) ACM Comput Commun Rev 34(2):39. doi:10.1145/ 997150.997156CrossRefGoogle Scholar
  29. 29.
    Burch H, Cheswick B (2000) In: Proceedings of the USENIX LISA. USENIX Association, Berkeley, pp 319–327Google Scholar
  30. 30.
    Savage S, Wetherall D, Karlin A, Anderson T (2000) ACM Comput Commun Rev 30(4):295. doi:10.1145/347057.347560CrossRefGoogle Scholar
  31. 31.
    Snoeren AC, Partridge C, Sanchez LA, Jones CE, Tehakountio F, Kent ST, Strayer WT (2001) ACM Comput Commun Rev 31(4):3. doi:10.1145/964723.383060CrossRefGoogle Scholar
  32. 32.
    Albert R, Jeong H, Barabasi AL (1999) Nature 6749:130Google Scholar
  33. 33.
    Barabasi AL, Albert R (1999) Science 286(5439):509MathSciNetCrossRefGoogle Scholar
  34. 34.
    Barabasi AL, Albert R, Jeong H (2000) Phys A Stat Mech Appl 281(1–4):69. doi:10.1016/S0378-4371(00)00018-2CrossRefGoogle Scholar
  35. 35.
    Faloutsos M, Faloutsos P, Faloutsos C (1999) Comput Commun Rev 29(4):251. doi:10.1145/316194.316229CrossRefGoogle Scholar
  36. 36.
    Li W, Cai X (2004) Phys Rev E 69(4):046106. doi:10.1103/PhysRevE.69.046106CrossRefGoogle Scholar
  37. 37.
    Albert R, Jeong H, Barabasi AL (2000) Nature 406(6794):378. doi:10.1038/35019019CrossRefGoogle Scholar
  38. 38.
    Neumayer S, Zussman G, Cohen R, Modiano E (2009) In: Proceedings of IEEE INFOCOM. IEEE, Piscataway, pp 1566–1574. doi:10.1109/INFCOM.2009.5062074Google Scholar
  39. 39.
    Brown G, Carlyle WM, Salmeron J, Wood K (2005) Tutorials in operations research. INFORMS, Hanover, pp 102–123Google Scholar
  40. 40.
    Brown G, Carlyle M, Salmeron J, Wood K (2006) Informs 36(6):530. doi:10.1287/ inte.1060.0252Google Scholar
  41. 41.
    Kephart J, White S (1991) IEEE computer society symposium on research in security and privacy. IEEE, Los Alamitos, pp 343–359. doi:10.1109/RISP.1991.130801Google Scholar
  42. 42.
    Gallos LK, Cohen R, Argyrakis P, Bunde A, Havlin S (2005) Phys Rev Lett 94(18):188701. doi:10.1103/PhysRevLett.94.188701Google Scholar
  43. 43.
    Magoni D (2003) IEEE J Sel Areas Commun 21(6):949. doi:10.1109/JSAC.2003. 814364Google Scholar
  44. 44.
    Agarwal P, Efrat A, Ganjugunte S, Sankararaman S, Hay D, Zussman G (2011) In: Proceedings of IEEE INFOCOM. IEEE, New York, pp 1521–1529. doi:10.1109/ INFCOM.2011.5934942Google Scholar
  45. 45.
    Sen A, Banerjee S, Ghosh P, Shirazipourazad S (2009) In: Proceedings 47th annual allerton conference on communication, control, and computing. IEEE, Piscataway, pp 1430–1437. doi:10.1109/ALLERTON.2009.5394506Google Scholar
  46. 46.
    Liu J, Jiang X, Nishiyama H, Kato N (2011) IEEE Trans Veh Technol 60(5):2253. doi:10.1109/TVT.2011.2114684Google Scholar
  47. 47.
    Kim K, Venkatasabramanian N (2010) In: Proceedings of IEEE GLOBECOM. IEEE, Piscataway, pp 1–5. doi:10.1109/GLOCOM.2010.5685229Google Scholar
  48. 48.
    Neumayer S, Modiano E (2010) In: Proceedings of IEEE INFOCOM. IEEE, New York, pp 1–9. doi:10.1109/INFCOM.2010.5461984Google Scholar
  49. 49.
    Mathew P (2003) Random geometric graphs. Oxford University Press, OxfordGoogle Scholar
  50. 50.
    Mathew P (2003) Random geometric graphs. Oxford University Press, OxfordMATHGoogle Scholar
  51. 51.
    Schlick T (2002) Molecular modeling and simulation: an interdisciplinary guide. Springer, New YorkMATHGoogle Scholar
  52. 52.
    Manna SS, Sen P (2002) Phys Rev E 66(3):066114. doi:10.1103/PhysRevE.66.066114Google Scholar
  53. 53.
    Ebel H, Mielsch L, Bornholdt S (2002) Phys Rev E 66:35103. doi:10.1103/PhysRevE. 66.035103CrossRefGoogle Scholar
  54. 54.
    Meester R, Roy R (1996) Continuum percolation. Cambridge University Press, New YorkMATHCrossRefGoogle Scholar
  55. 55.
    Chung F, Lu L (2003) Internet Math 1(1):91. doi:10.1080/15427951.2004.10129081MathSciNetMATHCrossRefGoogle Scholar
  56. 56.
    Level 3 Communication Corp (2012) Level 3 communications network map. http://www.level3.com/en/resource-library/maps/level-3-network-map/. Accessed 20 Apr 2012

Copyright information

© The Authors 2013

Authors and Affiliations

  • Qing Zhou
    • 1
  • Long Gao
    • 2
  • Ruifang Liu
    • 3
  • Shuguang Cui
    • 1
  1. 1.Texas A&M UniversityCollege StationUSA
  2. 2.Hitachi Research LabSanta ClaraUSA
  3. 3.Beijing University of Posts and TelecommunicationsBeijingP. R. China

Personalised recommendations