Abstract
In this chapter, we present the simulation results of this monograph. In the first part, we present the simulation results to evaluate both the link-level and network-wide robustness of the LCR random network under area attacks and compare it against that of the traditional random network. In the second part, we show the simulation results on a fiber plant of a major network provider [56]. We first assume that the topology information of this fiber network is known and show the expected number of attacked links by using the theoretical result of the fixed network case. Then without knowing the detail information about this fiber network but only some high-level statistical information, such like the node number, the link number, and the link length, we present the results by assuming that the fiber network is a LCR random network and a traditional random network, respectively.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Boesch FT, Harary F, Kabell JA (1981) Networks 11(1):57–63. doi:10.1002/net. 3230110106
Phillips CA (1993) In: Proceedings of ACM symposium on theory of computing, vol 25. ACM, New York, p 776. doi:10.1145/167088.167286
Wood RK (1993) Math Comput Model 17(2):1. doi:10.1016/0895-7177(93)90236-R
Bingol L (2001) A lagrangian heuristic for solving a network interdiction problem. Master’s thesis, Naval Postgraduate School
Royset JO, Wood RK (2008) INFORMS J Comput 19(2):175. doi:10.1287/ijoc.1060. 0191
Motter AE, Lai YC (2002) Phys Rev E 66(6):065102. doi:10.1103/PhysRevE.66. 065102
Sachtjen M, Carreras B, Lynch V (2000) Phys Rev E 61(5):4877. doi:10.1103/ PhysRevE.61.4877
Goh KI, Kahng B, Kim D (2002) Phys Rev Lett 88(10):108701. doi:10.1103/ PhysRevLett.88.108701
Watts D (2002) Proc Natl Acad Sci 99(9), 5766. doi:10.1073/pnas.082090499
Moreno Y, Gomez J, Pacheco A (2002) Europhys Lett 58(4):630. doi:10.1209/epl/ i2002-00442-2
Willinger W, Govindan R, Jamin S, Paxson V, Shenker S (2002) Proc Natl Acad Sci 99(1), 2573. doi:10.1073/pnas.012583099
Callaway DS, Newman MEJ, Strogatz SH, Watts DJ (2000) Phys Rev Lett 85:5468. doi:10.1103/PhysRevLett.85.5468
Ball F, Mollison D, Scalia-Tomba G (1997) Ann Appl Probab 7(1):46. doi:10.1214/ aoap/1034625252
Newman MEJ, Watts DJ (1999) Phys Rev E 60(6):7332. doi:10.1103/PhysRevE.60. 7332
Cohen R, Erez K, ben Avraham D, Havlin S (2000) Phys Rev Lett 85:4624. doi:10.1103/PhysRevLett.85.4626
Zhou Q, Gao L, Cui S (2010) In: Proceedings of IEEE GLOBECOM. IEEE, Piscataway, pp 368–372. doi:10.1109/GLOCOMW.2010.5700343
Foster JS, Gjelde E, Graham WR, Hermann RJ, Kluepfel HM, Lawson RL, Soper GK, Wood LL, Woodard JB (2004) Report of the commission to assess the threat to the united states from electromagnetic pulse (emp) attack. http://www.empcommission.org/docs/empctextunderscoreexectextunderscorerpt.pdf. Accessed 20 Apr 2012
Radasky W (2007) High-altitude electromagnetic pulse (hemp): a threat to our way of life. http://www.todaysengineer.org/2007/Sep/HEMP.asp. Accessed 20 Apr 2012
Ozdamar L, Ekinci E, Kucukyazici B (2004) Ann Oper Res 129:217. doi:10.1023/B: ANOR.0000030690.27939.39
Radwan AE, Hobeika AG, Sivasailam D (1985) Inst Transp Eng J 55(9):25
Young S, Balluz L, Malilay J (2004) Sci Total Environ 322:3. doi:10.1016/ S0048-9697(03)00446-7
Feng QS, Chen JF, Ai MY (2010) J Acta Petrolei Sinica 1:139
Wang JW, Rong LL (2009) Elsevier Saf Sci 47(10):1332. doi:10.1016/j.ssci.2009.02.002
Pastor-Satorras R, Vazquez A, Vespignani A (2001) Phys Rev Lett 87(25):258701. doi:10.1103/PhysRevLett.87.258701
Cohen R, Erez K, Ben-Avraham D, Havlin S (2001) Phys Rev Lett 86(16):3682. doi:10.1103/PhysRevLett.86.3682
Gligor VD (1984) Proc IEEE Trans Softw Eng 10(3), 320. doi:10.1109/TSE.1984. 5010241
Peng T, Leckie C, Ramamohanarao K (2007) ACM Comput Surv 39(1):1. doi:10. 1145/1216370.1216373
Mirkovic J, Reiher P (2004) ACM Comput Commun Rev 34(2):39. doi:10.1145/ 997150.997156
Burch H, Cheswick B (2000) In: Proceedings of the USENIX LISA. USENIX Association, Berkeley, pp 319–327
Savage S, Wetherall D, Karlin A, Anderson T (2000) ACM Comput Commun Rev 30(4):295. doi:10.1145/347057.347560
Snoeren AC, Partridge C, Sanchez LA, Jones CE, Tehakountio F, Kent ST, Strayer WT (2001) ACM Comput Commun Rev 31(4):3. doi:10.1145/964723.383060
Albert R, Jeong H, Barabasi AL (1999) Nature 6749:130
Barabasi AL, Albert R (1999) Science 286(5439):509
Barabasi AL, Albert R, Jeong H (2000) Phys A Stat Mech Appl 281(1–4):69. doi:10.1016/S0378-4371(00)00018-2
Faloutsos M, Faloutsos P, Faloutsos C (1999) Comput Commun Rev 29(4):251. doi:10.1145/316194.316229
Li W, Cai X (2004) Phys Rev E 69(4):046106. doi:10.1103/PhysRevE.69.046106
Albert R, Jeong H, Barabasi AL (2000) Nature 406(6794):378. doi:10.1038/35019019
Neumayer S, Zussman G, Cohen R, Modiano E (2009) In: Proceedings of IEEE INFOCOM. IEEE, Piscataway, pp 1566–1574. doi:10.1109/INFCOM.2009.5062074
Brown G, Carlyle WM, Salmeron J, Wood K (2005) Tutorials in operations research. INFORMS, Hanover, pp 102–123
Brown G, Carlyle M, Salmeron J, Wood K (2006) Informs 36(6):530. doi:10.1287/ inte.1060.0252
Kephart J, White S (1991) IEEE computer society symposium on research in security and privacy. IEEE, Los Alamitos, pp 343–359. doi:10.1109/RISP.1991.130801
Gallos LK, Cohen R, Argyrakis P, Bunde A, Havlin S (2005) Phys Rev Lett 94(18):188701. doi:10.1103/PhysRevLett.94.188701
Magoni D (2003) IEEE J Sel Areas Commun 21(6):949. doi:10.1109/JSAC.2003. 814364
Agarwal P, Efrat A, Ganjugunte S, Sankararaman S, Hay D, Zussman G (2011) In: Proceedings of IEEE INFOCOM. IEEE, New York, pp 1521–1529. doi:10.1109/ INFCOM.2011.5934942
Sen A, Banerjee S, Ghosh P, Shirazipourazad S (2009) In: Proceedings 47th annual allerton conference on communication, control, and computing. IEEE, Piscataway, pp 1430–1437. doi:10.1109/ALLERTON.2009.5394506
Liu J, Jiang X, Nishiyama H, Kato N (2011) IEEE Trans Veh Technol 60(5):2253. doi:10.1109/TVT.2011.2114684
Kim K, Venkatasabramanian N (2010) In: Proceedings of IEEE GLOBECOM. IEEE, Piscataway, pp 1–5. doi:10.1109/GLOCOM.2010.5685229
Neumayer S, Modiano E (2010) In: Proceedings of IEEE INFOCOM. IEEE, New York, pp 1–9. doi:10.1109/INFCOM.2010.5461984
Mathew P (2003) Random geometric graphs. Oxford University Press, Oxford
Mathew P (2003) Random geometric graphs. Oxford University Press, Oxford
Schlick T (2002) Molecular modeling and simulation: an interdisciplinary guide. Springer, New York
Manna SS, Sen P (2002) Phys Rev E 66(3):066114. doi:10.1103/PhysRevE.66.066114
Ebel H, Mielsch L, Bornholdt S (2002) Phys Rev E 66:35103. doi:10.1103/PhysRevE. 66.035103
Meester R, Roy R (1996) Continuum percolation. Cambridge University Press, New York
Chung F, Lu L (2003) Internet Math 1(1):91. doi:10.1080/15427951.2004.10129081
Level 3 Communication Corp (2012) Level 3 communications network map. http://www.level3.com/en/resource-library/maps/level-3-network-map/. Accessed 20 Apr 2012
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 The Authors
About this chapter
Cite this chapter
Zhou, Q., Gao, L., Liu, R., Cui, S. (2013). Simulation Results. In: Network Robustness under Large-Scale Attacks. SpringerBriefs in Computer Science. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-4860-0_5
Download citation
DOI: https://doi.org/10.1007/978-1-4614-4860-0_5
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-4859-4
Online ISBN: 978-1-4614-4860-0
eBook Packages: Computer ScienceComputer Science (R0)