Skip to main content
Log in

A secure and robust multilayer network with optimum inter layer links under budget constraints

  • 1205: Emerging Technologies for Information Hiding and Forensics in Multimedia Systems
  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Most of the complex systems consist of multiple subsystems and can be modeled as multilayer networks. These networks are prone to random or strategical attacks and end up disintegrating the entire multilayer network. These attacks can’t be avoided, but a model can be proposed to restore the network to make it secure and robust. In multilayer networks, each inter-layer link has its own cost (in terms of money) associated with it. The total cost of the inter-layer links is considered as the available budget. In the present work, a method is proposed to introduce the optimal number of inter-layer links (under budget constraints) to maintain the robustness of the multilayer network. For the simulation purpose, three variants of the artificial multilayer networks and data set EU-Air Transport Networks are considered. Simulation results reveal that for the multilayer network constructed with random network layers, approx. 65% of the available budget is utilized. Nearly 70% of the total nodes are connected to a mutually connected giant component (MCGC) via inter-layer links. However, for the Configuration model, using the almost total available budget, nearly all the nodes from the considered network layers are present in MCGC. Finally, in the case of the empirical dataset, by using approx. 75% of the available budget, almost 80% of the total nodes from the considered network layers are connected to MCGC via inter-layer links.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Baxter G, Dorogovtsev S, Goltsev A, Mendes J (2012) Avalanche collapse of interdependent networks. Phys Rev Lett 109(24):248,701

    Article  Google Scholar 

  2. Bianconi G, Dorogovtsev SN (2014) Multiple percolation transitions in a configuration model of a network of networks. Phys Rev E 89(6):062,814

    Article  Google Scholar 

  3. Boccaletti S, Bianconi G, Criado R, Del Genio CI, Gómez-Gardenes J, Romance M, Sendina-Nadal I, Wang Z, Zanin M (2014) The structure and dynamics of multilayer networks. Phys Rep 544(1):1–122

    Article  MathSciNet  Google Scholar 

  4. Bonacich P (1972) Factoring and weighting approaches to status scores and clique identification. J Math Soc 2(1):113–120

    Article  Google Scholar 

  5. Brandes U (2001) A faster algorithm for betweenness centrality. J Math Soc 25(2):163–177

    Article  Google Scholar 

  6. Buldyrev SV, Parshani R, Paul G, Stanley HE, Havlin S (2010) Catastrophic cascade of failures in interdependent networks. Nature 464 (7291):1025

    Article  Google Scholar 

  7. Cardillo A, Gomez-Gardenes J, Zanin M, Romance M, Papo D, Del Pozo F, Boccaletti S (2013) Emergence of network features from multiplexity. Scientif Rep 3:1344. http://complex.unizar.es/atnmultiplex/

    Article  Google Scholar 

  8. Chattopadhyay S, Dai H, Hosseinalipour S et al (2017) Designing optimal interlink patterns to maximize robustness of interdependent networks against cascading failures. IEEE Trans Commun 65(9):3847–3862

    Article  Google Scholar 

  9. Chattopadhyay S, Dai H et al (2019) Maximization of robustness of interdependent networks under budget constraints. IEEE Transactions on Network Science and Engineering

  10. Cover TM, Thomas JA (2012) Elements of information theory. Wiley, Hoboken

    MATH  Google Scholar 

  11. Feng F, Wang L (2013) Robustness measure of china’s railway network topology using relative entropy. Discret Dyn Nat Soc 2013

  12. Gao J, Buldyrev SV, Havlin S, Stanley HE (2011) Robustness of a network of networks. Phys Rev Lett 107(19):195,701

    Article  Google Scholar 

  13. Gao J, Buldyrev SV, Stanley HE, Havlin S (2012) Networks formed from interdependent networks. Nat Phys 8(1):40

    Article  Google Scholar 

  14. Gu CG, Zou SR, Xu XL, Qu YQ, Jiang YM, Liu HK, Zhou T et al (2011) Onset of cooperation between layered networks. Phys Rev E 84 (2):026,101

    Article  Google Scholar 

  15. Jiang Y, Hu A, Song Y (2014) The evaluation of complex networks’ robustness based on entropy measure

  16. Kivelä M, Arenas A, Barthelemy M, Gleeson JP, Moreno Y, Porter MA (2014) Multilayer networks. J Complex Netw 2(3):203–271

    Article  Google Scholar 

  17. Koç Y, Warnier M, Kooij RE, Brazier FM (2013) An entropy-based metric to quantify the robustness of power grids against cascading failures. Safety Sci 59:126–134

    Article  Google Scholar 

  18. Liu Y, Zhao C, Yi D, Eugene Stanley H (2019) Robustness of partially interdependent networks under combined attack. Chaos An Interdiscipl J Nonlinear Sci 29(2):021,101

    Article  Google Scholar 

  19. Min B, Gwak SH, Lee N, Goh KI (2016) Layer-switching cost and optimality in information spreading on multiplex networks. Scientif Rep 6(21):392

    Google Scholar 

  20. Parandehgheibi M, Modiano E (2013) Robustness of interdependent networks: The case of communication networks and the power grid. In: 2013 IEEE Global communications conference (GLOBECOM). IEEE, pp 2164–2169

  21. Parshani R, Buldyrev SV, Havlin S (2010) Interdependent networks: Reducing the coupling strength leads to a change from a first to second order percolation transition. Phys Rev Tett 105(4):048,701

    Google Scholar 

  22. Parshani R, Rozenblat C, Ietri D, Ducruet C, Havlin S (2011) Inter-similarity between coupled networks. EPL (Europhys Lett) 92(6):68,002

    Article  Google Scholar 

  23. Pastor-Satorras R, Castellano C (2016) Distinct types of eigenvector localization in networks. Scientif Rep 6(18):847

    Google Scholar 

  24. Pradhan P, Yadav A, Dwivedi SK, Jalan S (2017) Optimized evolution of networks for principal eigenvector localization. Phys Rev E 96(2):022,312

    Article  Google Scholar 

  25. Rachdi M, Waku J, Hazgui H, Demongeot J (2020) Entropy as a robustness marker in genetic regulatory networks. Entropy 22(3):260

    Article  MathSciNet  Google Scholar 

  26. Radicchi F (2015) Percolation in real interdependent networks. Nat Phys 11(7):597

    Article  Google Scholar 

  27. Schneider CM, Moreira AA, Andrade JS, Havlin S, Herrmann HJ (2011) Mitigation of malicious attacks on networks. Proc Nat Acad Sci 108(10):3838–3841

    Article  Google Scholar 

  28. Shorten D, Nitschke G (2018) Exploring exploration catastrophes in various network models. In: Artificial life conference proceedings. MIT Press, pp 374–381

  29. Son S, Bizhani G, Christensen C, Grassberger P, Paczuski M (2012) Epl 97, 16006.[8] cm schneider, nam araú,jo, s. havlin and hj herrmann. arXiv:1106.3234

  30. Suweis S, Grilli J, Banavar JR, Allesina S, Maritan A (2015) Effect of localization on the stability of mutualistic ecological networks. Nat Commun 6(10):179

    Google Scholar 

  31. Van Nimwegen E (2006) Influenza escapes immunity along neutral networks. Science 314(5807):1884–1886

    Article  Google Scholar 

  32. Van Nimwegen E, Crutchfield JP, Huynen M (1999) Neutral evolution of mutational robustness. Proc Nat Acad Sci 96(17):9716–9720

    Article  Google Scholar 

  33. Watanabe S, Kabashima Y (2014) Cavity-based robustness analysis of interdependent networks: Influences of intranetwork and internetwork degree-degree correlations. Phys Rev E 89(1):012,808

    Article  Google Scholar 

  34. Zhang Y, Arenas A, Yağan O (2018) Cascading failures in interdependent systems under a flow redistribution model. Phys Rev E 97(2):022,307

    Article  Google Scholar 

Download references

Acknowledgment

This work was supported by Science and Engineering Research Board (SERB), DST, Government of India under MATRICS project F. No. MTR/2019/000631.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rajesh Kumar.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix

Appendix

The optimization problem of determining the number of optimal inter-layer links is mapped to the Knapsack-Problem. The structure of the considered problem is described as follows: Weights of the items are the cost of inter-layer links. The number of items is inter-layer links. The total cost of the items is the available budget for the considered inter-layer links. Thus, the optimization problem is to determine the optimal number of inter-layer links connecting the nodes from the network layers that maximize the total degrees of nodes at respective network layers. Higher degree nodes at the different network-layer enable to increase the size of MCGC (ϕ) and enhance the robustness of the considered multilayer networks.

The method to obtain optimal set \(\mathcal {E}^{\star }_{\alpha ,{\beta }}\) of ILLs is presented as follows:

Let \(V_{\alpha }^{\star } \subseteq {V}_{\alpha } \) and \(V_{\beta }^{\star } \subseteq {V}_{\beta }\) be the optimal sets of nodes such that degree \(k_{i}^{\alpha }\) of \(i_{\alpha } \in V_{\alpha }^{\star }\) and \(k_{i}^{\beta }\) of \(i_{\beta } \in V_{\beta }^{\star }\) maximize the values of Qα and Qβ respectively. Then, optimal set of ILLs \(\mathcal {E}^{\star }_{\alpha ,{\beta }}\) is obtained from \(\mathcal {E}_{\alpha ,{\beta }}\) by choosing the ILLs connecting the node \(i_{\alpha } \in V_{\alpha }^{\star }\) to the node \(j_{\beta } \in V_{\beta }^{\star }\) which maintains the robustness ϕ of the MLN. Therefore, the considered problem is formulated into an optimization problem with objective function given by,

$$ \begin{array}{@{}rcl@{}} &&{Maximize} {\sum}_{i=1}^{l}k_{i}^{\alpha} x_{i}^{\alpha}{}\\ &&Subject to {\sum}_{i=i}^{l} c_{i}^{\alpha,{\beta}}x_{i}^{\alpha}\leq b\\ &&c_{i}^{\alpha,{\beta}}\geq 0 , c_{i}^{\alpha,{\beta}}\leq C* \eta_{max} \end{array} $$
(8)

where, \(x_{i}^{\alpha } \in \{0,1\}\) is a decision variable indicating the decision of choosing a node iα with degree \(k_{i}^{\alpha }\) from the set Vα and l is the number of nodes in the set \({V}^{\star }_{\alpha }\). Optimal set \(V_{\beta }^{\star }\) is obtained in similar way. Sets of nodes \(V_{\alpha }^{\star }\) and \(V_{\beta }^{\star }\) are obtained by using the Algorithm 1. A brief description of the Algorithm 1 is provided below (Fig. 13).

  • The Algorithm 1 takes four input parameters, namely set of costs of ILLs (\(\mathcal {C}\)), set of the degree of nodes (\(\mathcal {D}\)), available budget (b) and number of nodes N and returns the optimal set of nodes V.

  • In step 1, two tables T[N,\(\mathcal {C}\)], K[N,\(\mathcal {C}\)] are initialized with all the entries 0. Table T is updated with the values of the cost of ILLs depending upon the conditions in steps 6-10 and table K is updated with entries of 1.

  • Variable ci holds the cost of i th ILL, while di keeps the degree of i th node as shown in steps 4 and 5 respectively.

  • In step 6, if the condition holds true then tables T and K are updated in step 7 and 8 respectively.

  • In the steps 13-17, optimal set of nodes V is obtained according to (6).

figure a
Table 11 Meaning of the acronyms used in the manuscript

Now, the working of Algorithm 1 is provided with an example. Let D = {2, 3, 4}, \(\mathcal {C}=\{1,2,3\}\), N = 3 and b = 3. For i = 1, c1 = 1, c = 0 and d1 = 2 and condition in step 6 is not satisfied. Therefore according to step 7, T[1,0]= 0. Now, for i = 1 (in the outer loop in step 2), c1 = 1, c = 1 and d1 = 2 (inner loop in step 3) the condition in step 6 is satisfied and T[1,1]= 2 and K[1,1]= 1. In this way, in each iteration, the values of the tables T and K are updated. The optimal set V is recovered from the table K in the following way. According to step 12, the value of \(b^{\prime }=3\) and K[3,3]= 0. Hence, the condition in the step 14 is not satisfied and V is not appended. Now, the value of i = 2 and K[2,3]= 1. Therefore, the condition in the step 14 is satisfied and V is updated with 2 and so on. Thus, for the considered example, V = {1, 2}.

Fig. 13
figure 13

Flow chart of Algorithm 1. Input parameters are, set of costs of ILLs (\(\mathcal {C}\)), set of the degree of nodes (\(\mathcal {D}\)), available budget (b) and number of nodes N. Output is the optimal set nodes V

The meaning of acronyms and variables used in the paper are mentioned in Tables 11 and 12 respectively.

Table 12 Meaning of the variables used the manuscript

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, R., Singh, A. & Bala, M. A secure and robust multilayer network with optimum inter layer links under budget constraints. Multimed Tools Appl 81, 19609–19635 (2022). https://doi.org/10.1007/s11042-021-11110-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11110-9

Keywords

Navigation