Stability of Dominating Sets in Complex Networks against Random and Targeted Attacks

نویسندگان

  • F. Molnár
  • N. Derzsy
  • B. K. Szymanski
  • G. Korniss
چکیده

We conduct an extensive numerical analysis of the effects of network damage on dominating sets that occur at either randomly selected nodes or at the highest-degree nodes, in synthetic scale-free and real complex networks. We focus on the fraction of nodes that remain dominated after the damage has occurred, defined as stability. We find that minimum dominating sets (MDS), despite being optimal for minimum cost influencing and information spreading, are particularly vulnerable to both types of network damage. However, suboptimal (larger) dominating sets, selected by heuristic methods, have higher stability due to increased redundancy of selected dominators. We also propose two new algorithms for finding dominating sets with freely adjustable set sizes and resulting stabilities. Given identical set sizes, the stability of our dominating sets are at least as high as those provided by MDS or heuristic methods.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Building Damage-Resilient Dominating Sets in Complex Networks against Random and Targeted Attacks

We study the vulnerability of dominating sets against random and targeted node removals in complex networks. While small, cost-efficient dominating sets play a significant role in controllability and observability of these networks, a fixed and intact network structure is always implicitly assumed. We find that cost-efficiency of dominating sets optimized for small size alone comes at a price o...

متن کامل

Random Key Pre-Distribution Techniques against Sybil Attacks

Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...

متن کامل

Robustness envelopes of networks

We study the robustness of networks under node removal, considering random node failure, as well as targeted node attacks based on network centrality measures. Whilst both of these have been studied in the literature, existing approaches tend to study random failure in terms of average-case behavior, giving no idea of how badly network performance can degrade purely by chance. Instead of consid...

متن کامل

Robustness in a space of complex networks

Models of complex networks have various properties which can be measured in real networks (WWW, social networks, biological networks), e.g. degree distribution, modularity, hierarchy, assortativity etc. Determining how robust these models are could have important implications for real-world network stability, but this direction of research has seen only some progress. For example, it was shown ...

متن کامل

$k$-core percolation on complex networks: Comparing random, localized and targeted attacks

The type of malicious attack inflicting on networks greatly influences their stability under ordinary percolation in which a node fails when it becomes disconnected from the giant component. Here we study its generalization, k-core percolation, in which a node fails when it loses connection to a threshold k number of neighbors. We study and compare analytically and by numerical simulations of k...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014