Cascading failure in the wireless sensor scale-free networks

2015 ◽  
Vol 24 (5) ◽  
pp. 050506 ◽  
Author(s):  
Hao-Ran Liu ◽  
Ming-Ru Dong ◽  
Rong-Rong Yin ◽  
Li Han
2018 ◽  
Vol 29 (06) ◽  
pp. 1850044 ◽  
Author(s):  
Zhichao Ju ◽  
Jinlong Ma ◽  
Jianjun Xie ◽  
Zhaohui Qi

To control the spread of cascading failure on scale-free networks, we propose a new model with the betweenness centrality and the degrees of the nodes which are combined. The effects of the parameters of the edge weight on cascading dynamics are investigated. Five metrics to evaluate the robustness of the network are given: the threshold parameter ([Formula: see text]), the proportion of collapsed edges ([Formula: see text]), the proportion of collapsed nodes ([Formula: see text]), the number of nodes in the largest connected component ([Formula: see text]) and the number of the connected component ([Formula: see text]). Compared with the degrees of nodes’ model and the betweenness of the nodes’ model, the new model could control the spread of cascading failure more significantly. This work might be helpful for preventing and mitigating cascading failure in real life, especially for small load networks.


2008 ◽  
Vol 372 (36) ◽  
pp. 5778-5782 ◽  
Author(s):  
Z.J. Bao ◽  
Y.J. Cao ◽  
L.J. Ding ◽  
Z.X. Han ◽  
G.Z. Wang

2019 ◽  
Vol 8 (2) ◽  
pp. 2074-2078

In an age where breaches occurrence is precisely numerous, it is essential to safeguard confidential figures including patron records, intellectual property, assessment and enlargement, prospect business plans, and all sorts of confidential facts more proficiently. It is substantial to administer a network to safeguard information. Cyber mugs tear into information systems, accertion in these attacks leads to node deterioration, hence a structure is obligatory which can combat cyber mugs to shield our information nodes in WSNs. To cope with these attacks we adopt an efficient technique for enhancing robustness of scale-free wireless sensor networks. Scale-free networks are not affected much by random thefts but they become defenseless against malicious theft. To overcome this shortcoming this paper presents an enhanced technique , here we have a MAX node which is enclosed with small rate nodes, each MAX node will be highly secured by adopting ROSE algorithm by altering edges keen on to a closed structure to upgrade robustness of a network . This phenomena is achieved by forming a scale-free topology using basic BA model. In this paper, work is done on two operations that is rate diversity and edge value operations, to mold system further vigorous to malicious attacks. System is further encrypted by providing every single node with a private key in a sub network.


2018 ◽  
Vol 14 (05) ◽  
pp. 118 ◽  
Author(s):  
Yang Xiao

To address the node cascading failure (CF) of the wireless sensor networks (WSNs), considering such factors as node load and maximum capacity in scale-free topology, this paper establishes the WSN dynamic fault tolerant topology model based on node cascading failure, analyses the relationships between node load, topology and dynamic fault tolerance, and demonstrates the proposed model through simulation test. It studies the effects of topology parameter and load in case of random node failure in the network node cascading failure, and utilizes the theoretical derivation method to derive the structural feature of scale-free topology and the capacity limit for the WSNs large-scale cascading failure, effectively enhancing the cascading fault tolerance of traditional WSNs. The simulation test results show that, with the degree distribution parameter <em>C</em> increasing, the minimum network node degree will increase accordingly, and in highly intensive topology, the dynamic fault tolerance will be better; with the parameter<em> λ </em>increasing, the maximum degree of the network node will gradually decrease, and the degree distribution of topology structure tends to be uniform, so that the large-scale cascading failure caused by node failure will have less influence on the WSN, and further improve the dynamic fault tolerance performance of the system.


Pramana ◽  
2019 ◽  
Vol 92 (4) ◽  
Author(s):  
Zhichao Ju ◽  
Jinlong Ma ◽  
Jianjun Xie ◽  
Yanpeng Wang ◽  
Huimin Cui ◽  
...  

2009 ◽  
Vol 20 (08) ◽  
pp. 1291-1298 ◽  
Author(s):  
JIAN-WEI WANG ◽  
LI-LI RONG

Assume the initial load of an edge ij in a network to be Lij =[(ki ∑a ∈ Γi ka)(kj ∑b ∈ Γj kb)]α with ki and kj being the degrees of the nodes connected by the edge, where α is a tunable parameter which controls the strength of the edge initial load, and Γi and Γj are the sets of neighboring nodes of i and j, respectively. We investigate the cascading phenomenon of uncorrelated scale-free networks subject to two different attacking strategies on edges, i.e. attacking on the edges with the highest loads or the lowest loads (LL). By the critical threshold of edge capacity quantifying the network robustness, we numerically discuss the effects of two attacks for the network vulnerability. Interestingly, it is found that the attack on the edge with the LL is highly effective in disrupting the structure of the attacked network when α < 0.5. In the case of α = 0.5, the effects of two attacks for the network robustness against cascading failures are almost identical. We furthermore provide the theoretical prediction support for the numerical simulations. These results may be very helpful for real-life networks to protect the key edges selected effectively to avoid cascading-failure-induced disasters.


Sign in / Sign up

Export Citation Format

Share Document