Abstract
Most of the complex systems consist of multiple subsystems and can be modeled as multilayer networks. These networks are prone to random or strategical attacks and end up disintegrating the entire multilayer network. These attacks can’t be avoided, but a model can be proposed to restore the network to make it secure and robust. In multilayer networks, each inter-layer link has its own cost (in terms of money) associated with it. The total cost of the inter-layer links is considered as the available budget. In the present work, a method is proposed to introduce the optimal number of inter-layer links (under budget constraints) to maintain the robustness of the multilayer network. For the simulation purpose, three variants of the artificial multilayer networks and data set EU-Air Transport Networks are considered. Simulation results reveal that for the multilayer network constructed with random network layers, approx. 65% of the available budget is utilized. Nearly 70% of the total nodes are connected to a mutually connected giant component (MCGC) via inter-layer links. However, for the Configuration model, using the almost total available budget, nearly all the nodes from the considered network layers are present in MCGC. Finally, in the case of the empirical dataset, by using approx. 75% of the available budget, almost 80% of the total nodes from the considered network layers are connected to MCGC via inter-layer links.
Similar content being viewed by others
References
Baxter G, Dorogovtsev S, Goltsev A, Mendes J (2012) Avalanche collapse of interdependent networks. Phys Rev Lett 109(24):248,701
Bianconi G, Dorogovtsev SN (2014) Multiple percolation transitions in a configuration model of a network of networks. Phys Rev E 89(6):062,814
Boccaletti S, Bianconi G, Criado R, Del Genio CI, Gómez-Gardenes J, Romance M, Sendina-Nadal I, Wang Z, Zanin M (2014) The structure and dynamics of multilayer networks. Phys Rep 544(1):1–122
Bonacich P (1972) Factoring and weighting approaches to status scores and clique identification. J Math Soc 2(1):113–120
Brandes U (2001) A faster algorithm for betweenness centrality. J Math Soc 25(2):163–177
Buldyrev SV, Parshani R, Paul G, Stanley HE, Havlin S (2010) Catastrophic cascade of failures in interdependent networks. Nature 464 (7291):1025
Cardillo A, Gomez-Gardenes J, Zanin M, Romance M, Papo D, Del Pozo F, Boccaletti S (2013) Emergence of network features from multiplexity. Scientif Rep 3:1344. http://complex.unizar.es/atnmultiplex/
Chattopadhyay S, Dai H, Hosseinalipour S et al (2017) Designing optimal interlink patterns to maximize robustness of interdependent networks against cascading failures. IEEE Trans Commun 65(9):3847–3862
Chattopadhyay S, Dai H et al (2019) Maximization of robustness of interdependent networks under budget constraints. IEEE Transactions on Network Science and Engineering
Cover TM, Thomas JA (2012) Elements of information theory. Wiley, Hoboken
Feng F, Wang L (2013) Robustness measure of china’s railway network topology using relative entropy. Discret Dyn Nat Soc 2013
Gao J, Buldyrev SV, Havlin S, Stanley HE (2011) Robustness of a network of networks. Phys Rev Lett 107(19):195,701
Gao J, Buldyrev SV, Stanley HE, Havlin S (2012) Networks formed from interdependent networks. Nat Phys 8(1):40
Gu CG, Zou SR, Xu XL, Qu YQ, Jiang YM, Liu HK, Zhou T et al (2011) Onset of cooperation between layered networks. Phys Rev E 84 (2):026,101
Jiang Y, Hu A, Song Y (2014) The evaluation of complex networks’ robustness based on entropy measure
Kivelä M, Arenas A, Barthelemy M, Gleeson JP, Moreno Y, Porter MA (2014) Multilayer networks. J Complex Netw 2(3):203–271
Koç Y, Warnier M, Kooij RE, Brazier FM (2013) An entropy-based metric to quantify the robustness of power grids against cascading failures. Safety Sci 59:126–134
Liu Y, Zhao C, Yi D, Eugene Stanley H (2019) Robustness of partially interdependent networks under combined attack. Chaos An Interdiscipl J Nonlinear Sci 29(2):021,101
Min B, Gwak SH, Lee N, Goh KI (2016) Layer-switching cost and optimality in information spreading on multiplex networks. Scientif Rep 6(21):392
Parandehgheibi M, Modiano E (2013) Robustness of interdependent networks: The case of communication networks and the power grid. In: 2013 IEEE Global communications conference (GLOBECOM). IEEE, pp 2164–2169
Parshani R, Buldyrev SV, Havlin S (2010) Interdependent networks: Reducing the coupling strength leads to a change from a first to second order percolation transition. Phys Rev Tett 105(4):048,701
Parshani R, Rozenblat C, Ietri D, Ducruet C, Havlin S (2011) Inter-similarity between coupled networks. EPL (Europhys Lett) 92(6):68,002
Pastor-Satorras R, Castellano C (2016) Distinct types of eigenvector localization in networks. Scientif Rep 6(18):847
Pradhan P, Yadav A, Dwivedi SK, Jalan S (2017) Optimized evolution of networks for principal eigenvector localization. Phys Rev E 96(2):022,312
Rachdi M, Waku J, Hazgui H, Demongeot J (2020) Entropy as a robustness marker in genetic regulatory networks. Entropy 22(3):260
Radicchi F (2015) Percolation in real interdependent networks. Nat Phys 11(7):597
Schneider CM, Moreira AA, Andrade JS, Havlin S, Herrmann HJ (2011) Mitigation of malicious attacks on networks. Proc Nat Acad Sci 108(10):3838–3841
Shorten D, Nitschke G (2018) Exploring exploration catastrophes in various network models. In: Artificial life conference proceedings. MIT Press, pp 374–381
Son S, Bizhani G, Christensen C, Grassberger P, Paczuski M (2012) Epl 97, 16006.[8] cm schneider, nam araú,jo, s. havlin and hj herrmann. arXiv:1106.3234
Suweis S, Grilli J, Banavar JR, Allesina S, Maritan A (2015) Effect of localization on the stability of mutualistic ecological networks. Nat Commun 6(10):179
Van Nimwegen E (2006) Influenza escapes immunity along neutral networks. Science 314(5807):1884–1886
Van Nimwegen E, Crutchfield JP, Huynen M (1999) Neutral evolution of mutational robustness. Proc Nat Acad Sci 96(17):9716–9720
Watanabe S, Kabashima Y (2014) Cavity-based robustness analysis of interdependent networks: Influences of intranetwork and internetwork degree-degree correlations. Phys Rev E 89(1):012,808
Zhang Y, Arenas A, Yağan O (2018) Cascading failures in interdependent systems under a flow redistribution model. Phys Rev E 97(2):022,307
Acknowledgment
This work was supported by Science and Engineering Research Board (SERB), DST, Government of India under MATRICS project F. No. MTR/2019/000631.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix
Appendix
The optimization problem of determining the number of optimal inter-layer links is mapped to the Knapsack-Problem. The structure of the considered problem is described as follows: Weights of the items are the cost of inter-layer links. The number of items is inter-layer links. The total cost of the items is the available budget for the considered inter-layer links. Thus, the optimization problem is to determine the optimal number of inter-layer links connecting the nodes from the network layers that maximize the total degrees of nodes at respective network layers. Higher degree nodes at the different network-layer enable to increase the size of MCGC (ϕ) and enhance the robustness of the considered multilayer networks.
The method to obtain optimal set \(\mathcal {E}^{\star }_{\alpha ,{\beta }}\) of ILLs is presented as follows:
Let \(V_{\alpha }^{\star } \subseteq {V}_{\alpha } \) and \(V_{\beta }^{\star } \subseteq {V}_{\beta }\) be the optimal sets of nodes such that degree \(k_{i}^{\alpha }\) of \(i_{\alpha } \in V_{\alpha }^{\star }\) and \(k_{i}^{\beta }\) of \(i_{\beta } \in V_{\beta }^{\star }\) maximize the values of Qα and Qβ respectively. Then, optimal set of ILLs \(\mathcal {E}^{\star }_{\alpha ,{\beta }}\) is obtained from \(\mathcal {E}_{\alpha ,{\beta }}\) by choosing the ILLs connecting the node \(i_{\alpha } \in V_{\alpha }^{\star }\) to the node \(j_{\beta } \in V_{\beta }^{\star }\) which maintains the robustness ϕ of the MLN. Therefore, the considered problem is formulated into an optimization problem with objective function given by,
where, \(x_{i}^{\alpha } \in \{0,1\}\) is a decision variable indicating the decision of choosing a node iα with degree \(k_{i}^{\alpha }\) from the set Vα and l is the number of nodes in the set \({V}^{\star }_{\alpha }\). Optimal set \(V_{\beta }^{\star }\) is obtained in similar way. Sets of nodes \(V_{\alpha }^{\star }\) and \(V_{\beta }^{\star }\) are obtained by using the Algorithm 1. A brief description of the Algorithm 1 is provided below (Fig. 13).
-
The Algorithm 1 takes four input parameters, namely set of costs of ILLs (\(\mathcal {C}\)), set of the degree of nodes (\(\mathcal {D}\)), available budget (b) and number of nodes N and returns the optimal set of nodes V⋆.
-
In step 1, two tables T[N,\(\mathcal {C}\)], K[N,\(\mathcal {C}\)] are initialized with all the entries 0. Table T is updated with the values of the cost of ILLs depending upon the conditions in steps 6-10 and table K is updated with entries of 1.
-
Variable ci holds the cost of i th ILL, while di keeps the degree of i th node as shown in steps 4 and 5 respectively.
-
In step 6, if the condition holds true then tables T and K are updated in step 7 and 8 respectively.
-
In the steps 13-17, optimal set of nodes V⋆ is obtained according to (6).
Now, the working of Algorithm 1 is provided with an example. Let D = {2, 3, 4}, \(\mathcal {C}=\{1,2,3\}\), N = 3 and b = 3. For i = 1, c1 = 1, c = 0 and d1 = 2 and condition in step 6 is not satisfied. Therefore according to step 7, T[1,0]= 0. Now, for i = 1 (in the outer loop in step 2), c1 = 1, c = 1 and d1 = 2 (inner loop in step 3) the condition in step 6 is satisfied and T[1,1]= 2 and K[1,1]= 1. In this way, in each iteration, the values of the tables T and K are updated. The optimal set V⋆ is recovered from the table K in the following way. According to step 12, the value of \(b^{\prime }=3\) and K[3,3]= 0. Hence, the condition in the step 14 is not satisfied and V⋆ is not appended. Now, the value of i = 2 and K[2,3]= 1. Therefore, the condition in the step 14 is satisfied and V⋆ is updated with 2 and so on. Thus, for the considered example, V⋆ = {1, 2}.
The meaning of acronyms and variables used in the paper are mentioned in Tables 11 and 12 respectively.
Rights and permissions
About this article
Cite this article
Kumar, R., Singh, A. & Bala, M. A secure and robust multilayer network with optimum inter layer links under budget constraints. Multimed Tools Appl 81, 19609–19635 (2022). https://doi.org/10.1007/s11042-021-11110-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-11110-9