TY - GEN
T1 - Improving network connectivity using trusted nodes and edges
AU - Abbas, Waseem
AU - Laszka, Aron
AU - Vorobeychik, Yevgeniy
AU - Koutsoukos, Xenofon
N1 - Funding Information:
This work was supported in part by the National Science Foundation (CNS-1238959) and by the Air Force Research Laboratory (FA 8750-14-2-0180).
Publisher Copyright:
© 2017 American Automatic Control Council (AACC).
PY - 2017/6/29
Y1 - 2017/6/29
N2 - Network connectivity is a primary attribute and a characteristic phenomenon of any networked system. A high connectivity is often desired within networks; for instance to increase robustness to failures, and resilience against attacks. A typical approach to increasing network connectivity is to strategically add links; however adding links is not always the most suitable option. In this paper, we propose an alternative approach to improving network connectivity, that is by making a small subset of nodes and edges 'trusted,' which means that such nodes and edges remain intact at all times and are insusceptible to failures. We then show that by controlling the number of trusted nodes and edges, any desired level of network connectivity can be obtained. Along with characterizing network connectivity with trusted nodes and edges, we present heuristics to compute a small number of such nodes and edges. Finally, we illustrate our results on various networks.
AB - Network connectivity is a primary attribute and a characteristic phenomenon of any networked system. A high connectivity is often desired within networks; for instance to increase robustness to failures, and resilience against attacks. A typical approach to increasing network connectivity is to strategically add links; however adding links is not always the most suitable option. In this paper, we propose an alternative approach to improving network connectivity, that is by making a small subset of nodes and edges 'trusted,' which means that such nodes and edges remain intact at all times and are insusceptible to failures. We then show that by controlling the number of trusted nodes and edges, any desired level of network connectivity can be obtained. Along with characterizing network connectivity with trusted nodes and edges, we present heuristics to compute a small number of such nodes and edges. Finally, we illustrate our results on various networks.
UR - http://www.scopus.com/inward/record.url?scp=85027023999&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85027023999&partnerID=8YFLogxK
U2 - 10.23919/ACC.2017.7962974
DO - 10.23919/ACC.2017.7962974
M3 - Conference contribution
AN - SCOPUS:85027023999
T3 - Proceedings of the American Control Conference
SP - 328
EP - 333
BT - 2017 American Control Conference, ACC 2017
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2017 American Control Conference, ACC 2017
Y2 - 24 May 2017 through 26 May 2017
ER -