Abstract
We consider methodologies for managing risk in a telecommunication network based on identification of the critical nodes. The objective is to minimize the number of vertices whose deletion results in disconnected components which are constrained by a given cardinality. This is referred to as the CARDINALITY CONSTRAINED CRITICAL NODE PROBLEM (CC-CNP), and finds application in epidemic control, telecommunications, and military tactical planning, among others. From a telecommunication perspective, the set of critical nodes helps determine which players should be removed from the network in the event of a virus outbreak. Conversely, in order to maintain maximum global connectivity, it should be ensured that the critical nodes remain intact and as secure as possible. The presence of these nodes make a network vulnerable to attacks as they are crucial for the overall connectivity. This is a variation of the CRITICAL NODE DETECTION PROBLEM which has a known complexity and heuristic procedure. In this chapter, we review the recent work in this area, provide formulations based on integer linear programming and develop heuristic procedures for CC-CNP. We also examine the relations of CC-CNP with the well known NODE DELETION PROBLEM and discuss complexity results as a result of this relation.
Date: Feb 2009.
This project was partially funded by Air Force Research Laboratory.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ahuja RK, Magnanti TL, Orlin JB (1993) Network flows: Theory, algorithms, and applications. Prentice-Hall, Englewood Cliffs, NJ
Arulselvan A, Commander CW, Elefteriadou L, Pardalos PM (2009) Detecting critical nodes in sparse graphs. Comput Oper Res, 36(7):2193–2200
Bavelas A (1948) A mathematical model for group structure. Hum Org 7:16–30
Borgatti SP (2006) Identifying sets of key players in a network. Comput Math Org Theory 12(1):21–34
Cohen R, Erez K, ben Avraham D, Havlin S (2000) Efficient immunization strategies for computer networks and populations. Phys Rev Lett 85:4626
Coley DA (1999) An introduction to genetic algorithms for scientists and engineers. World Scientific, Singapore
Freeman LC (1979) Centrality in social networks I: Conceptual clarification. Social Netw 1:215–239
Garey MR, Johnson DS (1979) Computers and intractability: A guide to the theory of NP-completeness. W.H. Freeman, New York
Glover F, Laguna M, Martà R (2000) Fundamentals of scatter search and path-relinking. Contr Cybernet 39:653–684
Harper PR, de Senna V, Vieira IT, Shahani AK (2005) A genetic algorithm for the project assignment problem. Comput Oper Res 32:1255–1265
Krebs V (2002) Uncloaking terrorist networks. First Monday 7(4) http://www.firstmonday.dk/issue74/krebs/index.html
Krishnamoorthy MS, Deo N (1979) Node-deletion NP-complete problems. SIAM J Comput 8(4):619–625
Lewis J, Yannakakis M (1980) The node-deletion problem for hereditary properties is NP-complete. J Comput Syst Sci 20(2):219–230
Lund C, Yannakakis M (1993) The approximation of maximum subgraph problems. In: ICALP ’93: Proceedings of the 20th International Colloquium on Automata, Languages and Programming, London, UK. Springer, Berlin, pp 40–51
Mitchell M (1996) An introduction to genetic algorithms. MIT, Cambridge, MA
Oliveira CAS, Pardalos PM, Querido TM (2004) Integer formulations for the message scheduling problem on controller area networks. In: Grundel D, Murphey R, Pardalos P (eds) Theory and algorithms for cooperative systems. World Scientific, Singapore, pp 353–365
Resende MGC, Werneck RF (2006) A hybrid multistart heuristic for the uncapacitated facility location problem. Eur J Oper Res 174:54–68
Resende MGC, Werneck RF (2007) A fast swap-based local search procedure for location problems. Ann Oper Res. doi: 10.1007/s10479–006–0154–0
Spears WM, DeJong KA (1991) On the virtues of parameterized uniform crossover. In Proceedings of the 4th International Conference on Genetic Algorithms, San Diego, CA, USA, pp 230–236
Wislon JM (1997) A genetic algorithm for the generalised assignment problem. J Oper Res Soc 48:804–809
Zhou T, Fu Z-Q, Wang B-H (2006) Epidemic dynamics on complex networks. Progr Nat Sci 16(5):452–457
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Arulselvan, A., Commander, C.W., Shylo, O., Pardalos, P.M. (2011). Cardinality-Constrained Critical Node Detection Problem. In: Gülpınar, N., Harrison, P., Rüstem, B. (eds) Performance Models and Risk Management in Communications Systems. Springer Optimization and Its Applications, vol 46. Springer, New York, NY. https://doi.org/10.1007/978-1-4419-0534-5_4
Download citation
DOI: https://doi.org/10.1007/978-1-4419-0534-5_4
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4419-0533-8
Online ISBN: 978-1-4419-0534-5
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)