Survivable strategy set design for malicious attack propagation in NEMO scenario
نویسندگان
چکیده
منابع مشابه
Survivable strategy set design for malicious attack propagation in NEMO scenario
Large-scale failures triggered by undesirable events such as natural disasters, massive power malfunction, and malicious attacks are attracting serious concerns in communication network infrastructure perspective. However, there have been few survivability strategy analyses in network mobility (NEMO) scenarios. To properly address this issue, this paper proposes two novel survivability strategi...
متن کاملA Fast Strategy to Find Solution for Survivable Multicommodity Network
This paper proposes an immediately efficient method, based on Benders Decomposition (BD), for solving the survivable capacitated network design problem. This problem involves selecting a set of arcs for building a survivable network at a minimum cost and within a satisfied flow. The system is subject to failure and capacity restriction. To solve this problem, the BD was initially proposed with ...
متن کاملBoosting Set Constraint Propagation for Network Design
This paper reconsiders the deployment of synchronous optical networks (SONET), an optimization problem naturally expressed in terms of set variables. Earlier approaches, using either MIP or CP technologies, focused on symmetry breaking, including the use of SBDS, and the design of effective branching strategies. This paper advocates an orthogonal approach and argues that the thrashing behavior ...
متن کاملOn Survivable Set Connectivity
In the Set Connectivity problem, we are given an n-node edge-weighted undirected graph and a collection of h set pairs (Si, Ti), where Si and Ti are subsets of nodes. The goal is to compute a min-cost subgraph H so that, for each set pair (Si, Ti), there exists at least one path in H between some node in Si and some node in Ti. In this paper, we initiate the study of the Survivable Set Connecti...
متن کاملDigital Image Watermarking for Malicious Attack
In this paper, a copyright protection method for digital image with 1/T rate forward error correction (FEC) is proposed. In the proposed method, the original image is lossless and the watermark is robust to malicious attacks. The watermark logo is fused with noise bits to improve the security, and later XORed with the feature value of the image by 1/T rate FEC. During extraction, the watermark ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: EURASIP Journal on Wireless Communications and Networking
سال: 2016
ISSN: 1687-1499
DOI: 10.1186/s13638-016-0719-9