Conference PaperPDF Available

A novel approach to network's topology evolution and robustness optimization of scale free networks

Authors:

Abstract and Figures

Internet of Things (IoT) is rapidly increasing day by day due to its involvement in many applications such as electric grids, biological networks, transport networks, etc. In complex network theory, the model based on Scale Free Networks (SFNs) is more suitable for IoT. The SFNs are robust against random attacks; however, vulnerable to malicious attacks. Furthermore, as the size of a network increases, its robustness decreases. Therefore, in this paper, we propose a novel topology evolution approach to enhance the robustness of SFNs. Initially, we divide the network area into upper and lower parts. The nodes are deployed equally in both parts and connected via one-to-many correspondence. The distribution is made because small sized networks are more robust against malicious attacks. Moreover, we use k-core decomposition to calculate the hierarchical changes in the nodes' degree. In addition, the core-based and degree-based attacks are performed to analyze the robustness of SFNs. For the network optimization, we compare the Genetic Algorithm (GA) with Artificial Bee Colony (ABC) and Bacterial Foraging Algorithm (BFA). In the optimization process, the node's distance based edge swap is performed to draw long links in the network because these links make the network more robust.
Content may be subject to copyright.
A novel approach to network’s topology evolution
and robustness optimization of scale free networks
Muhammad Usman1, Nadeem Javaid2, Syed Minhal Abbas2, Muhammad Mohsin Javed2,
Muhammad Aqib Waseem3, Muhammad Owais2
1Department of Electrical and Computer Engineering, COMSATS University Islamabad, Islamabad 44000, Pakistan
2Department of Computer Science, COMSATS University Islamabad, Islamabad 44000, Pakistan
3Department of Computer Science, Bahauddin Zakariya University, Multan 60000, Pakistan
Email: usmaneng9@gmail.com, minhal.abbas514@gmail.com, mmohsinjaved007@gmail.com,
owaisbhutta98@gmail.com, ansariaqib786@gmail.com
Corresponding Author: nadeemjavaidqau@gmail.com; www.njavaid.com
Abstract—Internet of Things (IoT) is rapidly increasing day by
day due to its involvement in many applications such as electric
grids, biological networks, transport networks, etc. In complex
network theory, the model based on Scale Free Networks (SFNs)
is more suitable for IoT. The SFNs are robust against random
attacks; however, vulnerable to malicious attacks. Furthermore,
as the size of a network increases, its robustness decreases.
Therefore, in this paper, we propose a novel topology evolution
approach to enhance the robustness of SFNs. Initially, we divide
the network area into upper and lower parts. The nodes are
deployed equally in both parts and connected via one-to-many
correspondence. The distribution is made because small sized
networks are more robust against malicious attacks. Moreover,
we use k-core decomposition to calculate the hierarchical changes
in the nodes’ degree. In addition, the core-based and degree-
based attacks are performed to analyze the robustness of SFNs.
For the network optimization, we compare the Genetic Algorithm
(GA) with Artificial Bee Colony (ABC) and Bacterial Foraging
Algorithm (BFA). In the optimization process, the node’s distance
based edge swap is performed to draw long links in the network
because these links make the network more robust.
Index Terms—scale free networks, robustness, optimization,
malicious attack, network topology, edge swap
I. INTRODUCTION
The Wireless Sensor Networks (WSNs) have various appli-
cations in electric grids [1, 2], transportation [3], military [4,
5], healthcare [6, 7], smart homes [8] etc. In the WSNs, sensor
nodes take environmental information, including temperature,
moisture, radiations, air quality, etc., [9]. This information is
then transmitted to the central control unit i.e., a base station
or a hub to make important decisions about the network.
When the sensor nodes join the network, the WSNs become
an integrated part of the Internet of Things (IoT).
The sensor nodes in the IoT network are properly arranged
in the form of a topology [10]. The construction of network
topology is based on graph theory where nodes are considered
as vertices and the connections between them as edges. In
complex networks, Small World Networks (SWNs) [11] and
Scale Free Networks (SFNs) [12] are two models mostly used
in the IoT [13]. In SWNs the nodes have average shortest path
length and high clustering coefficient, whereas in SFNs nodes’
degree follows a power-law distribution. The power-law proves
that the SFNs have a small number of high degree nodes
and a large number of low degree nodes. The nodes in the
network can be classified into two categories: homogeneous
and heterogeneous. The homogeneous nodes have the same
communication range, bandwidth and energy, whereas these
characteristics vary in heterogeneous nodes. Homogeneous
nodes are generally considered in the study of SFNs. The
SFNs are generated by following the famous Barab´
asi Albert
(BA) model [12]. The model consists of two processes: growth
and preferential attachment process. The network grows with
the addition of nodes asynchronously and the preferential
attachment defines that a new node connects with the high
degree nodes in the network.
Recently, there has been an exponential increase in the
number of IoT devices therefore, the IoT networks are be-
coming dense. Consequently, these networks are becoming
vulnerable to failure or attacks [14]. By considering attacks for
SFNs, they are mainly classified as random and malicious. In
random attacks, a node is removed randomly from the network.
However, malicious attacks happen on the important nodes
[15]. The importance of the nodes is usually measured based
on their degree and the attack on them termed as High Degree
Adaptive (HDA) attacks. The SFNs are robust against random
attacks; however, they are vulnerable to malicious attacks.
The robustness is the ability of a network to resist attacks.
Many methods are available to measure the robustness such
as conditional connectivity, Laplacian matrix [16], Natural
Connectivity (NC) [17] etc. However, these measures have
high computational cost; therefore, Schneider et al. [18] pro-
posed a robustness measure based on the percolation theory. It
states when the attacks happen on the high degree nodes, the
network fragments into multiple subgraphs. The robustness R
is calculated as,
R=1
N1
N1
X
N=0
MCSn
N(1)
Where, Nis the total number of nodes in a network, 1
N1
is a normalization factor, MC Snis maximum connected
subgraphs after nth high degree node removed and summation
means nodes removal after each attack is considered.
The robustness is greatly reduced after the removal of
important nodes or edges [19] from the network. Their impor-
tance is usually based on degree and betweenness centrality.
The edge degree is calculated as,
dij =pkikj(2)
Here, dij is the degree of edge, kiand kjare degree of nodes
iand j, respectively.
To increase the robustness of a network, the easy approach
is to add edges between nodes [20], [21]. However, it is prac-
tically not possible to add edges among all the nodes, because
of the cost constraint. The network should be optimized to
achieve high robustness without adding cost. Therefore, the
independent edges are required in the process of optimization.
The two edges are considered to be independent if they are in
the communication range of each other and they are adjacent
to each other. The robustness of the network is calculated after
performing the edge swap. If the robustness increases, then the
edge swap is accepted and the topology is updated. Otherwise,
the next pair of independent edges are searched and the same
process is repeated.
For the SFNs, the onion-like structure is proved to be
robust against malicious attacks [22]. Its core consists of high
degree nodes surrounded by the rings of nodes whose degree
decreases hierarchically. Each ring presents the same degree
nodes in the network. A perfect onion-like structure proves
that the network robustness is enhanced. However, the long
tail of low degree nodes is formed that affects the robustness
of the network.
By considering the importance of SFNs, the following
contributions are presented in this paper:
to increase the robustness, small sized networks are
evolved because they are more robust against malicious
attacks,
networks are connected by one-to-many correspondence
i.e., a node in a network A is linked with more than one
node of the network B and vice versa. These links’ degree
distribution follow power-law,
the nodes’ degree in an onion-like structure changes
hierarchically. Therefore, it is calculated by k-core de-
composition,
the edges are swapped to make long links in the network
because the existence of these links make the network
robust against malicious attacks. A high degree node
connects with the node having a low degree and present
far as compared to other neighboring nodes,
Genetic Algorithm (GA), Artificial Bee Colony (ABC)
and Bacterial Foraging Optimization (BFO) algorithms
are used and we select one that has better performance.
The rest of the paper is organized as follows: related work
studies are presented in Section II. Section III describes
the edge swap mechanism to enhance the robustness. Scale
free networks topology evolution and robustness optimization
are demonstrated in Section IV. In the last Section V the
conclusion and future work are explained.
II. RE LATE D WO RK
The SFNs are vulnerable to malicious attacks and a lot
of real world networks have scale free nature. Therefore, to
resist attacks these networks need to be optimized to have
a proper structure. Global edge swap based Hill Climbing
(HC) algorithm in [22] enhances the robustness; however, HC
traps into local optima. Moreover, the local optima problem is
solved by introducing the local edge swap [23]. For the WSNs
construction, the node’s communication range is limited that is
addressed in [24]. For SFNs, onion-like structure considers the
importance of node’s degree in rings therefore, same degree
nodes need to be connected with each other. Furthermore,
when a node removes, its respective edges should be used
to enhance the topological parameters of the network. By
increasing the nodes in Maximam Connected Subgraph (MCS)
robustness can be increased [25].
The optimization of SFNs is an NP-hard problem because of
the large number of edges in a network. Heuristic algorithms
are used to solve these problems, GA is among them. Classical
GA stops convergence to a sub-optimal solution that is called
premature convergence. It happens due to less population di-
versity. In optimization, the global optimal solution is required.
Therefore, [26, 27] deals with the premature convergence
problem of GA. Multi-population is used to achieve high
diversity. However, the computation cost is increased due
to operations on multi-population. Therefore, [28] solves the
premature convergence with less computation cost by self-
competition among individuals. The same problem is solved
using the local search operation by the authors in [29]. On the
other hand, to get the optimal solution quickly an algorithm
is proposed in [30]. During the evolution of the network
against attacks, the fault probability is not considered. The
fault probability and preferential attachment based network
evolution is proposed in [31].
In optimizing SFNs, a single objective is considered so far.
However, a network that is optimized for nodes attack collapse
when the links attack happens and vice versa. The SFNs are
vulnerable to malicious attacks; therefore, to optimize them
according to the attacks on high degree nodes and links,
Multi-Objective Optimization (MOO) is required. Therefore,
the authors in [19] proposed a MOO algorithm. It consists of
two phases: sampling and optimization. The sampling phase is
used to generate the diverse population and the optimization
phase is used to enhance the robustness.
Furthermore, the robustness of an undirected network is
discussed so far; however, directedness is also an important
network feature. By considering the directedness of the net-
work two important variables emergence of cooperation and
controllability robustness are used to define the resilience of
a network against different attacks.
Moreover, no practical approach is available to understand
the correlation between a network’s topology features and their
robustness by considering controllability. From the theoretical
analysis, it is impossible to define this relation at that time.
Therefore, to control networks for better utilizing them a
practical approach is proposed by [32].
All of the above algorithms although improve the robustness
of the networks; however, have high computation costs. Due to
this, self-optimization is not possible. Therefore, an Artificial
Intelligence (AI) based robustness optimization technique is
proposed in [33]. The back propagation is used to find the
optimal solution. However, it is not suitable for different size
of networks and edge densities.
III. EDGE SWAP
The SFNs topology is represented as a graph G=
(V, E )where set of Nnodes represented as vertices V=
{1,2, ..., N }and the set of M edges are shown as E=
{emp|m, p Vand m6=p}. The edge swap is used because
nodes’ degree remains the same. To perform the edge swap,
the edges emp and eno should be independent. To prove the
independency of edges, they should follow two conditions:
nodes m, n, o and pshould be in the communication
range of each other,
there is no extra edge between nodes except emp and eno.
The edge swap is performed in the Fig. 1. In the orig-
inal network topology, as shown in Fig. 1(a), the nodes
m, n, o, and pfulfills the independent edges conditions. We
have two alternative connections as shown in Fig. 1(b) and
Fig. 1(c). The idea behind this edge swap is to enhance the
robustness of the network. After performing the edge swap,
robustness is calculated. If the robustness is improved then the
edge swap is accepted; otherwise, a new independent edge pair
is found. When edges are considered in edge swap, they are
marked. So that they can not be considered in the next edge
swap process. By marking edges, the number of redundant
operations can be reduced.
Considering the importance of edge swap, two types of edge
swaps are performed.
1) Random edge swap
2) Degree based edge swap
A. Random edge swap
In random edge swap, edges are randomly selected in the
network and the swap is made. Since, the network structure
consists of different topological features and some nodes are
more densely connected than the rest of the network. So, the
random edge swap may affect the network structure. Moreover,
in the SFNs there is more number of low degree nodes;
therefore, the probability of edges selection of low degree
nodes is high.
m
p
n
o
m
p
n
o
m
p
n
o
(a) (b) (c)
Fig. 1. Edge swap mechanism
B. Degree based edge swap
In a degree based edge swap, two high degree nodes are
selected in the network. Afterward, their neighboring nodes
that have a low degree are selected. These nodes must be
different so that they follow the independent edge conditions.
The degree based edge swap makes the similar degree nodes
connect. Since, the onion-like structure consists of rings that
have same degree of nodes. Therefore, the existence of edges
between same degree nodes enhances the robustness.
IV. SCA LE F RE E NE TW OR KS TOPOLOGY EVO LU TI ON A ND
ROB US TN ES S OP TI MI ZATI ON
In this section, the complete process of network topology
evolution is discussed. The proposed network topology pro-
vides the solutions to the limitations that are discussed in the
Table. I. Moreover, the degree of the node based on k-core
decomposition is found to know the hierarchically changes
in the network degree. Furthermore, the network optimization
against the attacks is discussed.
A. Network topology evolution
A network having a small number of nodes is more robust
against the malicious attacks [24], [27], [29]. Therefore, to
generate a robust network topology, nodes are distributed
equally into two parts. In each part, the networks are evolved
by considering the power-law distribution. There are two
ways to connect both parts of the network: one-to-one cor-
respondence and one-to-many correspondence. In one-to-one
correspondence each node of network A is connected with a
node of network B. However, in one-to-many correspondence,
a node in network A is connected with more than one node
of network B and vice versa. One-to-many correspondence is
preferred because it makes the network more robust [34].
In Fig. 2, the network topology evolution is shown. The
dotted line shows the division of the network. In both parts,
equal number of nodes are randomly deployed. The blue nodes
are used to denote network A (NA), black nodes are used for
network B (NB)and NMdenotes the mutual nodes of both
networks. The black solid lines represent the connectivity links
(CL) while the dotted lines are used for mutual links (ML).
Both upper and lower parts form a network by synchronously
adding edges for each node.
NA
NB
NM
CL
ML
C1
C2
C3
C4
Fig. 2. Network topology evolution
B. Nodes degree distribution based on k-core
In the network, the nodes’ have different degrees. Due to
the power-law distribution in SFNs, there are more low degree
nodes as compared to high degree nodes. Therefore, to find
the hierarchical change of nodes’ degree in SFNs, k-core
decomposition as shown in Fig. 2 is performed.
Different rings represent the existence of different degree
nodes. In k-core decomposition, nodes’ removal starts with
low degree nodes and these nodes are placed in C4. After
that, the degree of the nodes is recalculated and low degree
nodes are placed in C3. The process continues until the highest
degree nodes are removed from the network. In Fig. 2 C1 is
the highest core consisting of the most important nodes based
on degree.
C. Attacks on the designed topology
The attackers have complete information about the network
and can make new attacks to paralyze it. So, the defenders
should take measures against these attacks to make the network
robust. Therefore, malicious attacks based on inner core nodes
and nodes’ degree based on rings are considered. At first,
the inner core nodes are removed because they have more
influence on the network. In Fig. 3, the attack on inner core
nodes is shown and red color nodes (NR) are removed from
the network. Due to the better topology evolution, initially, by
removing high degree nodes the network is still connected.
So, multiple attacks are required to fragment the network.
After attacks are made on the core nodes, the network is
divided into multiple subgraphs. High degree nodes present
in the subgraphs as shown in Fig. 4 are removed and the
robustness is calculated. Red nodes represent the removed
nodes of the inner core nodes and white shaded area represents
the MCS. Yellow nodes are the highest degree nodes in their
respected subgraphs.
To increase the number of nodes in MCS, edge swap is
made at the outer core nodes because after the removal of high
degree nodes long tails of low degree nodes are created. Swap
NA
NB
NM
NR
CL
ML
Fig. 3. Attack based on inner core nodes
of low degree nodes’ edges increases the number of nodes
in MCS. In the proposed model edges are swapped without
changing nodes degree. So, the cost remains the same in that
operation.
Random edge swap increases the computational cost due to
redundant operations. Therefore, the edge swap should be kept
minimum. So, to increase the robustness it is more important
that the topology evolved better than by improved it through
edges swap.
The nodes’ degree attack based on rings enables the attack-
ers to remove a specific portion of the network. Due to the
existence of long tails, the nodes removal using this approach
has less computational cost.
D. Robustness optimization of the network by heuristic algo-
rithms
Due to the premature convergence of GA and high com-
putational cost required to solve the problem, two heuristic
algorithms Artificial Bee Colony (ABC) and Bacterial Forag-
ing Optimization (BFO) are used. In both of these algorithms,
a random position change is required to find the global optimal
solution in the search space. In SFNs, a random position
change is not possible; therefore, a degree based edge swap
and a random edge swap are made. When the operators in
these algorithms improve the robustness then degree based
edge swap is performed. However, when they trap into local
optima random edge swap is performed [22].
V. CONCLUSION
The SFNs have become attractive due to their property
to resist random attacks. However, they are vulnerable to
malicious attacks. Therefore, this paper studies the importance
of topology design to enhance the robustness of SFNs. The
small sized networks are more robust against malicious attacks
as compared to large scale networks; therefore, the network is
evolved by dividing the total number of nodes equally into two
parts. The power-law distribution is followed in both parts.
After that, the networks are connected using one-to-many
TABLE I
MAPPING OF THE IDENTIFIED LIMITATIONS WITH PROPOSED SOLUTIONS AND THEIR VALIDATIONS
Limitations identified Proposed solutions Validations
L1: Large sized networks are more vulnerable
to malicious attacks
S1: Proposed topology evolution technique
makes small networks
V1: Network is divided into two parts; in each
part, the topology evolved [12]
L2: The interdependent links do not following
power-law [34]
S2: Using the interdependent links concept,
networks are connected by power-law
V2: Through the degree distribution of the
mutual nodes, the power-law is validated
L3: There are no predefined criteria to know
how nodes’ degree changes in onion-like
structure
S3: k-core decomposition is used to find the
same degree nodes in the network
V3: After the network deployment, nodes are
removed based on the degree and same degree
nodes are connected with each other
L4: Edge swap using the Degree Difference
Operation (DDO) increases redundant opera-
tion
S4: Edge swap is done on the basis of the
distance between nodes because the long links
make the network more robust
V4: Through performing distance based edge
swap the robustness of the network is calcu-
lated
L5: Premature convergence of GA S5: Optimization is done by ABC and BFO V5: For different network structures, robust-
ness is calculated
NA
NB
NM
NR
CL
ML
Fig. 4. Attack based on high degree nodes that are part of MCS
correspondence. Then the random and malicious attacks are
performed on both parts. The network becomes robust because
the nodes are removed in one part; however, the second part
of the network is still connected. The effect of attacks on the
proposed network is considered and the network is optimized
by GA, ABC and BFO. The experimental results prove that
the network robustness is increased against malicious attacks.
Furthermore, the onion-like structure consists of high degree
nodes that are at the center of the network are removed using
the k-core decomposition. The high degree attack is more
vulnerable to the network as compared to the core based attack.
In the future, the proposed scheme will be validated through
simulations on the synthetic and real-world networks.
REFERENCES
[1] Ali Hadi Abdulwahid. Power grid surveillance and
control based on wireless sensor network technologies:
Review and future directions. In Journal of Physics:
Conference Series, volume 1773, page 012004. IOP
Publishing, 2021.
[2] Irfan Al-Anbagi, Melike Erol-Kantarci, and Hussein T
Mouftah. A delay mitigation scheme for wsn-based smart
grid substation monitoring. In 2013 9th International
Wireless Communications and Mobile Computing Con-
ference (IWCMC), pages 1470–1475. IEEE, 2013.
[3] Jyoti R Dubey and Ankit R Bhavsar. Wsn-based driver
cabinet monitoring system for the fleet of long-route
vehicles. In Data Science and Intelligent Applications,
pages 499–508. Springer, 2021.
[4] Milica Pejanovi ´
c Djuriˇ
si´
c, Zhilbert Tafa, Goran Dimi´
c,
and Veljko Milutinovi´
c. A survey of military applications
of wireless sensor networks. In 2012 Mediterranean
conference on embedded computing (MECO), pages 196–
199. IEEE, 2012.
[5] Mohd Nazri Ismail, Mohd‘Afizi Shukran, Mohd
Rizal Mohd Isa, Mohd Adib, and Omar Zakaria.
Establishing a soldier wireless sensor network (wsn)
communication for military operation monitoring.
International Journal of Informatics and Communication
Technology, 7(2):89–95, 2018.
[6] Yuan Zhang, Limin Sun, Houbing Song, and Xiaojun
Cao. Ubiquitous wsn for healthcare: Recent advances
and future prospects. IEEE Internet of Things Journal,
1(4):311–318, 2014.
[7] Hossam Mahmoud Ahmad Fahmy. Wsn applications. In
Concepts, Applications, Experimentation and Analysis of
Wireless Sensor Networks, pages 67–232. Springer, 2021.
[8] Saqib Kazmi, Nadeem Javaid, M. Mughal, Mariam Ak-
bar, Syed Hassan Ahmed, and Nabil Alrajeh. Towards
optimization of metaheuristic algorithms for iot enabled
smart homes targeting balanced demand and supply of
energy. IEEE Access, PP:1–1, 10 2017.
[9] Dunfan Ye, Daoli Gong, and Wei Wang. Application of
wireless sensor networks in environmental monitoring. In
2009 2nd international conference on power electronics
and intelligent transportation system (PEITS), volume 1,
pages 205–208. IEEE, 2009.
[10] Giulia De Masi. The impact of topology on internet of
things: A multidisciplinary review. In 2018 Advances
in Science and Engineering Technology International
Conferences (ASET), pages 1–6. IEEE, 2018.
[11] Duncan J Watts and Steven H Strogatz. Col-
lective dynamics of ‘small-world’networks. nature,
393(6684):440–442, 1998.
[12] Albert-L´
aszl´
o Barab´
asi and R´
eka Albert. Emergence of
scaling in random networks. science, 286(5439):509–
512, 1999.
[13] Insoo Sohn. Small-world and scale-free network models
for iot systems. Mobile Information Systems, 2017, 2017.
[14] Talha Qureshi, Nadeem Javaid, A.s Al-Mogren, Asad
Khan, Hisham Almajed, and Irfan Mohiuddin. An
adaptive enhanced differential evolution strategies for
topology robustness in internet of things. International
Journal of Web and Grid Services, 01 2021.
[15] Talha Qureshi, Nadeem Javaid, A.s Al-Mogren, Zain
Abubaker, Hisham Almajed, and Irfan Mohiuddin. At-
tack resistance based topology robustness of scale-free
internet of things for smart cities. International Journal
of Web and Grid Services, pages 202–203, 01 2021.
[16] Russell Merris. Laplacian matrices of graphs: a survey.
Linear algebra and its applications, 197:143–176, 1994.
[17] Frank Harary. Conditional connectivity. Networks,
13(3):347–357, 1983.
[18] Christian M Schneider, Andr´
e A Moreira, Jos´
e S An-
drade, Shlomo Havlin, and Hans J Herrmann. Mitiga-
tion of malicious attacks on networks. Proceedings of
the National Academy of Sciences, 108(10):3838–3841,
2011.
[19] Mingxing Zhou and Jing Liu. A two-phase multiobjective
evolutionary algorithm for enhancing the robustness of
scale-free networks against multiple malicious attacks.
IEEE transactions on cybernetics, 47(2):539–552, 2016.
[20] Alina Beygelzimer, Geoffrey Grinstein, Ralph Linsker,
and Irina Rish. Improving network robustness by edge
modification. Physica A: Statistical Mechanics and its
Applications, 357(3-4):593–612, 2005.
[21] Zhong Yuan Jiang and Man Gui Liang. Improving
the network load balance by adding an edge. In Ad-
vanced Materials Research, volume 433, pages 5147–
5151. Trans Tech Publ, 2012.
[22] Hans J Herrmann, Christian M Schneider, Andr´
e A Mor-
eira, Jos´
e S Andrade Jr, and Shlomo Havlin. Onion-like
network topology enhances robustness against malicious
attacks. Journal of Statistical Mechanics: Theory and
Experiment, 2011(01):P01027, 2011.
[23] Pierre Buesser, Fabio Daolio, and Marco Tomassini.
Optimizing the robustness of scale-free networks with
simulated annealing. In International conference on
adaptive and natural computing algorithms, pages 167–
176. Springer, 2011.
[24] Tie Qiu, Aoyang Zhao, Feng Xia, Weisheng Si, and
Dapeng Oliver Wu. Rose: Robustness strategy for scale-
free wireless sensor networks. IEEE/ACM Transactions
on Networking, 25(5):2944–2959, 2017.
[25] Lei Rong and Jing Liu. A heuristic algorithm for
enhancing the robustness of scale-free networks based
on edge classification. Physica A: Statistical Mechanics
and its Applications, 503:503–515, 2018.
[26] Tie Qiu, Jie Liu, Weisheng Si, Min Han, Huansheng
Ning, and Mohammed Atiquzzaman. A data-driven
robustness algorithm for the internet of things in smart
cities. IEEE Communications Magazine, 55(12):18–23,
2017.
[27] Tie Qiu, Jie Liu, Weisheng Si, and Dapeng Oliver Wu.
Robustness optimization scheme with multi-population
co-evolution for scale-free wireless sensor networks.
IEEE/ACM Transactions on Networking, 27(3):1028–
1042, 2019.
[28] Tie Qiu, Zilong Lu, Keqiu Li, Guoliang Xue, and
Dapeng Oliver Wu. An adaptive robustness evolution
algorithm with self-competition for scale-free internet
of things. In IEEE INFOCOM 2020-IEEE Conference
on Computer Communications, pages 2106–2115. IEEE,
2020.
[29] Mingxing Zhou and Jing Liu. A memetic algorithm for
enhancing the robustness of scale-free networks against
malicious attacks. Physica A: Statistical Mechanics and
its Applications, 410:131–143, 2014.
[30] ZhengHong Deng, Jiwei Xu, Qun Song, Bin Hu, Tao Wu,
and Panfei Huang. Robustness of multi-agent formation
based on natural connectivity. Applied Mathematics and
Computation, 366:124636, 2020.
[31] Shihong Hu and Guanghui Li. Tmse: A topology mod-
ification strategy to enhance the robustness of scale-free
wireless sensor networks. Computer Communications,
157:53–63, 2020.
[32] Yang Lou, Lin Wang, Kim-Fung Tsang, and Guanrong
Chen. Towards optimal robustness of network con-
trollability: An empirical necessary condition. IEEE
Transactions on Circuits and Systems I: Regular Papers,
67(9):3163–3174, 2020.
[33] Ning Chen, Tie Qiu, Xiaobo Zhou, Keqiu Li, and Mo-
hammed Atiquzzaman. An intelligent robust networking
mechanism for the internet of things. IEEE Communica-
tions Magazine, 57(11):91–95, 2019.
[34] Pengshuai Cui, Peidong Zhu, Ke Wang, Peng Xun, and
Zhuoqun Xia. Enhancing robustness of interdependent
network by adding connectivity and dependence links.
Physica A: Statistical Mechanics and its Applications,
497:185–197, 2018.
... On the other hand, the functional characteristics of node objects make it impossible to simply rely on graph theory for critical node analysis; otherwise, important nodes, such as servers hosting critical business systems, would not be accurately identified. This places new demands on future critical node identification, critical link discovery and network robustness optimization [28][29][30] from the perspective of multilayer networks. Current technological tools in the field of artificial intelligence show relevant advantages in solving complex real-world problems [31,32], and the application of methods such as reinforcement learning and graphical neural networks will be an important support for further research on the characteristics and robustness of multilayer network dynamics. ...
Article
Full-text available
The Internet creates multidimensional and complex relationships in terms of the composition, application and mapping of social users. Most of the previous related research has focused on the single-layer topology of physical device networks but ignored the study of service access relationships and the social structure of users on the Internet. Here, we propose a composite framework to understand how the interaction between the physical devices network, business application network, and user role network affects the robustness of the entire Internet. In this paper, a multilayer network consisting of a physical device layer, business application layer and user role layer is constructed by collecting experimental network data. We characterize the disturbance process of the entire multilayer network when a physical entity device fails by designing nodal disturbance to investigate the interactions that exist between the different network layers. Meanwhile, we analyze the characteristics of the Internet-oriented multilayer network structure and propose a heuristic multilayer network topology generation algorithm based on the initial routing topology and networking pattern, which simulates the evolution process of multilayer network topology. To further analyze the robustness of this multilayer network model, we combined a total of six target node ranking indicators including random strategy, degree centrality, betweenness centrality, closeness centrality, clustering coefficient and network constraint coefficient, performed node deletion simulations in the experimental network, and analyzed the impact of component types and interactions on the robustness of the overall multilayer network based on the maximum component change in the network. These results provide new insights into the operational processes of the Internet from a multi-domain data fusion perspective, reflecting that the coupling relationships that exist between the different interaction layers are closely linked to the robustness of multilayer networks.
Research Proposal
Full-text available
In this synopsis, robustness of the Scale-Free Networks (SFNs) is enhanced against malicious attacks through optimization. To achieve this, the edge’s degree and nodes’ distance based edge swap operations are used in the proposed Improved Scale-Free Networks (ISFNs) scheme. In the edge’s degree based operation, nodes of similar degrees are linked. Moreover, connections of the nearest nodes are made in distance based edge swap. These operations help to achieve a better onion-like structure without changing the degree distribution of the network. Therefore, the network becomes robust against malicious attacks. Furthermore, to make the network robust against realistic attacks, the variable attacks are considered. Apart from that, a Network Topology Evolution Scheme (NTES) is proposed to prevent SFNs from random and malicious attacks. In this scheme, the network field is divided into two parts with uniformly distributed nodes. After the network’s evolution, the nodes are linked with each other through one-to-many correspondence. The division of the network field is made by considering that a network is robust if its size is small. Moreover, to study the hierarchical changes in the degree of nodes, k-core decomposition is used. In addition, nodes’ degrees and core based attacks are performed on the network to evaluate the performance of the proposed scheme. Furthermore, the network robustness is analyzed using three optimization techniques: Artificial Bee Colony (ABC), Bacterial Foraging Optimization (BFO) and Genetic Algorithm (GA). The techniques are compared with each other and a technique that efficiently optimizes the network to increase the robustness is selected. In the optimization process, we make use of three edge swap methods. Due to the edge swap, the network robustness is enhanced without changing the degree distribution, so the addition of nodes/links is not required to increase the robustness. In addition, the network robustness of SFNs is enhanced against the malicious attacks. For that purpose, initially, a parameterless optimization algorithm JAYA is used because it requires less computational efforts as compared to the heuristic techniques. Then, as the edge swap plays an important role to enhance the robustness of SFNs, therefore, the edge swaps are classified into three categories. For each category, effects on the network’s topological parameters such as average shortest path length, assortativity and clustering coefficient are analyzed. Next, the robustness is enhanced with the addition of nodes in the maximum connected subgraphs and the protection of bridge edges maintain the network connectivity. Moreover, optimized network is analyzed for different attack strengths.
Thesis
Full-text available
During the past few decades, the Internet of Things (IoT) has made remarkable progress in many real-world applications including healthcare, military, transportation, etc. Multiple sensor nodes are deployed in these _elds to get the required data. Different network topologies are used in IoT and scale-free is one of them. It is mostly preferred due to its robust behavior against random node removal, however, the network collapsed because of malicious attacks. Therefore, in this thesis, robustness of the scale-free networks is enhanced against malicious attacks through optimization. To achieve this, the edge's degree and nodes' distance based edge swap operations are used in the proposed Improved Scale-Free Networks (ISFNs) scheme. In the edge's degree based operation, nodes of similar degrees are linked. Moreover, the connections of the nearest nodes are made in distance based edge swap. These operations help to achieve a better onion-like structure without changing the degree distribution of the network. Therefore, the network becomes robust against malicious attacks. Moreover, no new links or nodes are added in the optimization process, therefore, no extra cost is incurred. Furthermore, to make the network more robust against realistic attacks, the variable attacks are considered. Simulation results of the proposed scheme are compared with ROSE and Simulated Annealing (SA) for different number of nodes. The proposed scheme outperforms the existing techniques for different numbers of nodes and against the low degree, high degree and random attacks. Moreover, ISFNs has 13% and 23% better network robustness as compared to ROSE and SA, respectively. Network Topology Evolution Scheme (NTES) is proposed to prevent the scale-free networks from random and malicious attacks. In this scheme, the network field is divided into two parts with uniformly distributed nodes. After the network's evolution, the nodes are linked with each other through one-to-many correspondence. The division of the network field is made by considering that a network is robust if its size is small. Moreover, to study the hierarchical changes in the degree of nodes, k-core decomposition is used. In addition, nodes' degrees and core based attacks are performed on the network to evaluate the performance of the proposed scheme. Furthermore, the network robustness is analyzed using three optimization techniques: Artificial Bee Colony (ABC), Bacterial Foraging Optimization (BFO) and Genetic Algorithm (GA). The techniques are compared with each other and a technique that efficiently optimizes the network to increase the robustness is selected. In the optimization process, we make use of three edge swap methods. Due to the edge swap, the network robustness is enhanced without changing the degree distribution, so the addition of nodes/links is not required to increase the robustness. Furthermore, NTES is compared with Barabasi Albert (BA) model and Hill Climbing (HC) algorithm against random and malicious attacks. The simulation results show that the proposed NTES optimized using GA outperforms BA and HC by 46.90% and 57.08%, respectively, in terms of robustness. In addition, the network robustness of Scale Free Networks (SFNs) is enhanced against the malicious attacks. For that purpose, initially, a parameterless optimization algorithm JAYA is used because it requires less computational efforts as compared to the heuristic techniques. Then, as the edge swap plays an important role to enhance the robustness of SFNs, therefore, the edge swaps are classified into three categories. For each category, effects on the network's topological parameters such as average shortest path length, assortativity and clustering coefficient are analyzed. Next, the robustness is enhanced with the addition of nodes in the maximum connected subgraphs and the protection of bridge edges maintain the network connectivity. Moreover, optimized network is analyzed for different attack strengths. In simulations, the comparison of JAYA is made with two existing algorithms: ROSE and Simulated Annealing (SA). The network optimized by JAYA has a better robustness against random and malicious attacks, as compared to the existing algorithms. Furthermore, among the edge swap categories, the degree dependent edge swap is better to increase the robustness of SFNs. Moreover, the addition of nodes into the maximum connected subgraphs enhances the robustness and the protection of bridge edges ensures the network connectivity in all the algorithms. Furthermore, the robustness against different attack strengths are analyzed and the results show that high attacks strength paralyzed the network more efficiently.
Article
Full-text available
In this paper, two algorithms enhanced differential evolution (EDE) and adaptive EDE (AEDE) are proposed. The proposed algorithms improve the robustness of the IoT network without changing the degree distribution of nodes. The EDE algorithm maintains the diversity in a solution space through the tri-vector mutation operation and explores the hidden areas. The crossover phase makes the algorithm's convergence fast towards the global optima. The AEDE dynamically changes the probabilities of multiple operations of the EDE with the changing environment. Also, it maintains the balance between the diversity of solution space and the convergence speed through adaptive probabilities. The EDE performs 7.13%, 31.6% and 41.8% better as compared to GA, SA and HA, respectively. The AEDE outperforms the GA, SA and HA with 11%, 35.3% and 45.4% better efficiency, respectively. The proposed algorithms outperform existing algorithms in terms of robustness and convergence speed.
Article
Full-text available
In Internet of Things (IoTs), the increase in the number of devices is directly proportional to the number of applications. The exponential growth of devices increases both the network complexity and risk against topology robustness. Moreover, the network is also prone to targeted and malicious attacks. In this paper, Enhanced Angle Sum Operation ROSE (EASO-ROSE), Enhanced ROSE, Adaptive Genetic Algorithm (AGA) and Cluster Adaptive Genetic Algorithm (CAGA) are proposed to cater the topology robustness issue for IoT enabled smart cities. In addition, the proposed solutions keep the nodes' initial degree distribution unchanged by maintaining the scale-free nature of the topology. Enhanced ROSE and EASO-ROSE significantly improve the topology robustness by calculating the difference in nodes' degree while rearranging the surrounding angles according to the highest degree node. CAGA and AGA also significantly improve the topology robustness by using adaptive probabilities of crossover and mutation that guide both algorithms to converge towards global optimum solution. Extensive simulations are preformed to evaluate the performance of the proposed strategies. Schneider R is used as a performance metric in the simulations. The results depict that the proposed algorithms perform 61.3%, 48.3%, 45.5% and 34.95%, better than simulating annealing algorithm.
Article
Full-text available
To better understand the correlation between network topological features and the robustness of network controllability in a general setting, this paper suggests a practical approach to searching for optimal network topologies with given numbers of nodes and edges. Since theoretical analysis seems impossible at least in the present time, exhaustive search based on optimization techniques is employed, firstly for a group of small-sized networks that are realistically workable, where exhaustive means 1) all possible network structures with the given numbers of nodes and edges are computed and compared, and 2) all possible node-removal sequences are considered. A main contribution of this paper is the observation of an empirical necessary condition (ENC) from the results of exhaustive search, which shrinks the search space to quickly find an optimal solution. ENC shows that the maximum and minimum in- and out-degrees of an optimal network structure should be almost identical, or within a very narrow range, i.e., the network should be extremely homogeneous. Edge rectification towards the satisfaction of the ENC is then designed and evaluated. Simulation results on large-sized synthetic and real-world networks verify the effectiveness of both the observed ENC and the edge rectification scheme. As more operations of edge rectification are performed, the network is getting closer to exactly satisfying the ENC, and consequently the robustness of the network controllability is enhanced towards optimum.
Article
The robustness of multi-agent topology has great importance to the design of multi-agent formation, while to improve the robustness of the topology without increasing its cost is also very important. In this paper, we proposed an optimization method for the robustness of multi-agent formation. The natural connectivity is used for measuring the robustness of multi-agent formation. Through analysis, the formation optimization problem is transformed into a 0–1 nonlinear programming problem. In order to solve the problem quickly, the paper presents a genetic algorithm based on chaotic search optimization. When the method given in this paper is applied to specific requirements, only the constraint conditions need to be modified, so the method has good universality. The results show that the optimized network can significantly improve the robustness of the network.
Article
In smart cities, the Internet of Things (IoT) consists of many low-power smart nodes. Its robustness is essential for protection of communication in data science against node failures caused by energy shortage or cyber-attacks. Scale-free networking topology, widely applied in IoT, is effectively resilient to random attacks but is vulnerable to malicious ones in which high-degree nodes are made to fail. The prohibitively high computational cost of existing robustness optimization algorithms is an obstacle to efficient topology self-optimization. To solve this problem, a novel robust networking model based on artificial intelligence is proposed to improve IoT topology robustness to protect its communication. Using the Back-Propagation neural network learning algorithm, the model extracts topology features from a dataset by supervised training. The experimental results show that the model achieves better prediction accuracy, thereby optimizing the topology with minimal computation overhead.
Article
Wireless sensor networks (WSNs) have been the popular targets for cyberattacks these days. One type of network topology for WSNs, the scale-free topology, can effectively withstand random attacks in which the nodes in the topology are randomly selected as targets. However, it is fragile to malicious attacks in which the nodes with high node degrees are selected as targets. Thus, how to improve the robustness of the scale-free topology against malicious attacks becomes a critical issue. To tackle this problem, this paper proposes a Robustness Optimization scheme with multi-population Co-evolution for scale-free wireless sensor networKS (ROCKS) to improve the robustness of the scale-free topology. We build initial scale-free topologies according to the characteristics of WSNs in the real-world environment. Then, we apply our ROCKS with novel crossover operator and mutation operator to optimize the robustness of the scale-free topologies constructed for WSNs. For a scale-free WSNs topology, our proposed algorithm keeps the initial degree of each node unchanged such that the optimized topology remains scale-free. Based on a well-known metric for the robustness against malicious attacks, our experiment results show that ROCKS roughly doubles the robustness of initial scale-free WSNs, and outperforms two existing algorithms by about 16% when the network size is large.
Article
The study investigates and develops components for implementing an effective and efficient militaryknowledge/information/communication in closed network architecture. Since, military personnel are always on the move, the dissemination of knowledge/information/communication needs a mobile platform to accommodate mobility of people. The mobile and wireless network platform should be able to sustain the remoteness and seclusion of military operation areas. Communication is one of key problems of a military operation, especially, due to environmental constraints. This study proposes on establishing a future soldier communication device with mobile Wireless Sensor Network (WSN) and mobile network to suit the infantry operations in the jungle. The operational areas are considered to restricted and challenging locations. Wireless Sensor Network (WSN) will become inexpensive and common over the next decade. Thus, a thorough study is vital to develop the most suitable smart equipment and network requirements for Malaysia's military eco-system. Finally, this study has successfully developed new smart device prototype using WSN approach for military operation. In addition, this prototype can be used for Search and Rescue (SAR) operation. This prototype is able to transmit death and location status, movement location status, health monitoring and status to the base station.