Abstract
Due to limited resource and changing environments, wireless sensor networks are susceptible to device failures. In this paper, we evaluate network’s vulnerability under potential device failures or attacking. Specifically, we model wireless sensors and their operating procedure as an S-T network, where the information rate regarding the network performance is defined. The network robustness is evaluated via considering how network capacity varies when network changes. The evaluation process turns out to be a maximum flow interdiction problem, which is then solved by transforming into a dual formation and approximating with a linear programming. Lastly, via numerical simulation, the proposed scheme is shown to be well suitable for evaluating network’s robustness.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Akyildiz, I.F.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 (2002)
Dekker, A.H., Colbert, B.D.: Network robustness and graph topology. In: Proceedings of the 27th Australasian Conference on Computer Science, vol. 26, pp. 359–368 (2004)
Jun, W., Barahona, M., Yue-Jin, T.: Natural connectivity of complex networks. Chin. Phys. Lett. 27(7), 078902 (2010)
Tizghadam, A., Leon-Garcia, A.: LSP and back up path setup in MPLS networks based on path criticality index. In: IEEE International Conference on Communications, pp. 441–448 (2007)
Tizghadam, A., Leon-Garcia, A.: On congestion in mission critical networks. In: INFOCOM Workshops. IEEE (2008)
Tizghadam, A., Leon-Garcia, A.: On robust traffic engineering in transport networks. In: IEEE Globecom IEEE Global Telecommunications Conference. IEEE (2008)
Tizghadam, A., Leon-Garcia, A.: Survival value of communication networks. In: INFOCOM Workshops. IEEE (2009)
Schieber, T.A., Carpi, L., Frery, A.C., Rosso, O.A.: Information theory perspective on network robustness. Phys. Lett. A 380(3), 359–364 (2016)
Dhuli, S., Gopi, C., Nath Singh, Y.: Analysis of network robustness for finite sized wireless sensor networks. Eprint arXiv (2016)
Titouna, C., Nait-Abdesselam, F., Khokhar, A.: A multivariate outlier detection algorithm for wireless sensor networks. In: IEEE ICC 2019, pp. 1–6 (2019)
Ford, L.R., Fulkerson, D.R.: Maximal flow through a network. Can. J. Math. 8(3), 399–404 (1965)
Boykov, Y., Kolmogorov, V.: An experimental comparison of min-cut/max-flow algorithms for energy minimization in vision. IEEE Trans. Pattern Anal. Mach. Intell. 26(9), 1124–1137 (2004)
Wood, R.K.: Deterministic network interdiction. Math. Comput. Model. 17(2), 1–18 (1993)
Mahlous, A.R., Fretwell, R.J., Chaourar, B.: MFMP: max flow multipath routing algorithm. In: European Symposium on Computer Modeling and Simulation, Liverpool, pp. 359–368 (2008)
Ohara, Y., Imahori, S., Van Meter, R.: MARA: maximum alternative routing algorithm. In: IEEE INFOCOM, Rio de Janeiro, pp. 298–306 (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Wu, K., Zhang, Z., Hu, X., Sun, B., Chen, C. (2020). Vulnerability Analysis of Wireless Sensor Networks via Maximum Flow Interdiction. In: Li, B., Zheng, J., Fang, Y., Yang, M., Yan, Z. (eds) IoT as a Service. IoTaaS 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 316. Springer, Cham. https://doi.org/10.1007/978-3-030-44751-9_26
Download citation
DOI: https://doi.org/10.1007/978-3-030-44751-9_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-44750-2
Online ISBN: 978-3-030-44751-9
eBook Packages: Computer ScienceComputer Science (R0)