Quantifying the Robustness of Network Controllability

Conference Paper (2019)
Author(s)

P. Sun (TU Delft - Network Architectures and Services)

P. Van Van Mieghem (TU Delft - Network Architectures and Services)

Rob Kooij (Singapore University of Technology and Design, TU Delft - Quantum & Computer Engineering)

Zhidong He (TU Delft - Network Architectures and Services)

PFA Van Mieghem (TU Delft - Network Architectures and Services)

Research Group
Network Architectures and Services
Copyright
© 2019 P. Sun, P.F.A. Van Mieghem, Robert Kooij, Z. He, Piet Van Mieghem
DOI related publication
https://doi.org/10.1109/ICSRS48664.2019.8987628
More Info
expand_more
Publication Year
2019
Language
English
Copyright
© 2019 P. Sun, P.F.A. Van Mieghem, Robert Kooij, Z. He, Piet Van Mieghem
Research Group
Network Architectures and Services
Pages (from-to)
66-76
ISBN (print)
978-1-7281-4782-6
ISBN (electronic)
978-1-7281-4781-9
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

In this paper, we propose closed-form analytic approximations for the minimum number of driver nodes needed to fully control networks, where links are removed according to both random and targeted attacks. Our approximations rely on the concept of critical links. A link is called critical if its removal increases the required number of driver nodes. We validate our approximation on both real-world and synthetic networks. For random attacks, the approximation is always very good, as long as the fraction of removed links is smaller than the fraction of critical links. For some cases, the approximation is still accurate for larger fractions of removed links. The approximation for an attack, where first the critical links are removed, is also accurate, as long as the fraction of removed links is sufficiently small. Finally, we show that the critical link attack is the most effective among 4 considered attacks, as long as the fraction of removed links is smaller than the fraction of critical links.

Files

License info not available