Skip to main content

Vulnerability Analysis of Wireless Sensor Networks via Maximum Flow Interdiction

  • Conference paper
  • First Online:
IoT as a Service (IoTaaS 2019)

Abstract

Due to limited resource and changing environments, wireless sensor networks are susceptible to device failures. In this paper, we evaluate network’s vulnerability under potential device failures or attacking. Specifically, we model wireless sensors and their operating procedure as an S-T network, where the information rate regarding the network performance is defined. The network robustness is evaluated via considering how network capacity varies when network changes. The evaluation process turns out to be a maximum flow interdiction problem, which is then solved by transforming into a dual formation and approximating with a linear programming. Lastly, via numerical simulation, the proposed scheme is shown to be well suitable for evaluating network’s robustness.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Akyildiz, I.F.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 (2002)

    Article  Google Scholar 

  2. Dekker, A.H., Colbert, B.D.: Network robustness and graph topology. In: Proceedings of the 27th Australasian Conference on Computer Science, vol. 26, pp. 359–368 (2004)

    Google Scholar 

  3. Jun, W., Barahona, M., Yue-Jin, T.: Natural connectivity of complex networks. Chin. Phys. Lett. 27(7), 078902 (2010)

    Article  Google Scholar 

  4. Tizghadam, A., Leon-Garcia, A.: LSP and back up path setup in MPLS networks based on path criticality index. In: IEEE International Conference on Communications, pp. 441–448 (2007)

    Google Scholar 

  5. Tizghadam, A., Leon-Garcia, A.: On congestion in mission critical networks. In: INFOCOM Workshops. IEEE (2008)

    Google Scholar 

  6. Tizghadam, A., Leon-Garcia, A.: On robust traffic engineering in transport networks. In: IEEE Globecom IEEE Global Telecommunications Conference. IEEE (2008)

    Google Scholar 

  7. Tizghadam, A., Leon-Garcia, A.: Survival value of communication networks. In: INFOCOM Workshops. IEEE (2009)

    Google Scholar 

  8. Schieber, T.A., Carpi, L., Frery, A.C., Rosso, O.A.: Information theory perspective on network robustness. Phys. Lett. A 380(3), 359–364 (2016)

    Article  Google Scholar 

  9. Dhuli, S., Gopi, C., Nath Singh, Y.: Analysis of network robustness for finite sized wireless sensor networks. Eprint arXiv (2016)

    Google Scholar 

  10. Titouna, C., Nait-Abdesselam, F., Khokhar, A.: A multivariate outlier detection algorithm for wireless sensor networks. In: IEEE ICC 2019, pp. 1–6 (2019)

    Google Scholar 

  11. Ford, L.R., Fulkerson, D.R.: Maximal flow through a network. Can. J. Math. 8(3), 399–404 (1965)

    MathSciNet  MATH  Google Scholar 

  12. Boykov, Y., Kolmogorov, V.: An experimental comparison of min-cut/max-flow algorithms for energy minimization in vision. IEEE Trans. Pattern Anal. Mach. Intell. 26(9), 1124–1137 (2004)

    Article  Google Scholar 

  13. Wood, R.K.: Deterministic network interdiction. Math. Comput. Model. 17(2), 1–18 (1993)

    Article  MathSciNet  Google Scholar 

  14. Mahlous, A.R., Fretwell, R.J., Chaourar, B.: MFMP: max flow multipath routing algorithm. In: European Symposium on Computer Modeling and Simulation, Liverpool, pp. 359–368 (2008)

    Google Scholar 

  15. Ohara, Y., Imahori, S., Van Meter, R.: MARA: maximum alternative routing algorithm. In: IEEE INFOCOM, Rio de Janeiro, pp. 298–306 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Keyu Wu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wu, K., Zhang, Z., Hu, X., Sun, B., Chen, C. (2020). Vulnerability Analysis of Wireless Sensor Networks via Maximum Flow Interdiction. In: Li, B., Zheng, J., Fang, Y., Yang, M., Yan, Z. (eds) IoT as a Service. IoTaaS 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 316. Springer, Cham. https://doi.org/10.1007/978-3-030-44751-9_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-44751-9_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-44750-2

  • Online ISBN: 978-3-030-44751-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics