Vulnerability of information transport on temporal networks to link removal

Journal Article (2025)
Author(s)

L. Zou (TU Delft - Multimedia Computing)

H. Wang (TU Delft - Multimedia Computing)

Research Group
Multimedia Computing
DOI related publication
https://doi.org/10.1109/TNSE.2025.3555409
More Info
expand_more
Publication Year
2025
Language
English
Research Group
Multimedia Computing
Bibliographical Note
Green Open Access added to TU Delft Institutional Repository 'You share, we take care!' - Taverne project https://www.openaccess.nl/en/publishing/publisher-deals Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.@en
Issue number
4
Volume number
12
Pages (from-to)
2932-2941
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Communications networks such as vehicle and social contact networks are temporal networks, where autos/individuals are connected only when they are close to each other. These networks facilitate the propagation of information. Traffic between any two nodes demanded at any time is routed along the fastest time-respecting path. In this work, we investigate the vulnerability of information transport on temporal networks to link removal. The objective is to understand the removal of which types of links deteriorate the efficiency/speed of information transport the most. Identifying such critical links will enable better intervention to facilitate/prohibit the spread of (mis)information. To identify critical links, we propose link-removal strategies based on transport efficiency between two end nodes of each link, properties of links in the aggregated network, and in routing paths respectively. Each strategy ranks links according to their corresponding properties and removes links with the highest measures. Strategies are evaluated via the relative change in transport efficiency after link removal in real-world networks. We find that the path-based strategy performs the best: links appear more often and occur early in the fastest time-respecting paths tend to be critical. Via comprehensive analysis, we explain this strategy's out-performance and its dependency on network properties.

Files

Vulnerability_of_Information_T... (pdf)
(pdf | 2.68 Mb)
- Embargo expired in 27-09-2025
License info not available