Building Damage-Resilient Dominating Sets in Complex Networks against Random and Targeted Attacks
نویسندگان
چکیده
We study the vulnerability of dominating sets against random and targeted node removals in complex networks. While small, cost-efficient dominating sets play a significant role in controllability and observability of these networks, a fixed and intact network structure is always implicitly assumed. We find that cost-efficiency of dominating sets optimized for small size alone comes at a price of being vulnerable to damage; domination in the remaining network can be severely disrupted, even if a small fraction of dominator nodes are lost. We develop two new methods for finding flexible dominating sets, allowing either adjustable overall resilience, or dominating set size, while maximizing the dominated fraction of the remaining network after the attack. We analyze the efficiency of each method on synthetic scale-free networks, as well as real complex networks.
منابع مشابه
Stability of Dominating Sets in Complex Networks against Random and Targeted Attacks
We conduct an extensive numerical analysis of the effects of network damage on dominating sets that occur at either randomly selected nodes or at the highest-degree nodes, in synthetic scale-free and real complex networks. We focus on the fraction of nodes that remain dominated after the damage has occurred, defined as stability. We find that minimum dominating sets (MDS), despite being optimal...
متن کاملNetwork resilience against intelligent attacks constrained by the degree-dependent node removal cost
We study the resilience of complex networks against attacks in which nodes are targeted intelligently, but where disabling a node has a cost to the attacker which depends on its degree. Attackers have to meet these costs with limited resources, which constrains their actions. A network’s integrity is quantified in terms of the efficacy of the process that it supports. We calculate how the optim...
متن کامل2-Peak and 3-Peak Optimal Complex Networks
A central issue in complex networks is tolerance to random failures and intentional attacks. Current literature emphasizes the dichotomy between networks with a power-law node connectivity distribution, which are robust to random failures but fragile to targeted attacks, versus networks with an exponentially decaying connectivity distribution, which are less tolerant to failures but more resili...
متن کاملTwo-peak and three-peak optimal complex networks.
A central issue in complex networks is tolerance of random failures and intentional attacks. Current literature emphasizes the dichotomy between networks with a power-law node connectivity distribution, which are robust to random failures but fragile to targeted attacks, versus networks with an exponentially decaying connectivity distribution, which are less tolerant to failures but more resili...
متن کاملRandom Key Pre-Distribution Techniques against Sybil Attacks
Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...
متن کامل