Improving Network Connectivity Using Trusted Nodes and Edges
Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos

Citation
Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos. "Improving Network Connectivity Using Trusted Nodes and Edges". American Control Conference (ACC 2017), May, 2017.

Abstract
Network connectivity is a primary attribute and a characteristic phenomenon of any networked system. A high connectivity is often desired within networks; for instance to increase robustness to failures, and resilience against attacks. A typical approach to increasing network connectivity is to strategically add links; however adding links is not always the most suitable option. In this paper, we propose an alternative approach to improving network connectivity, that is by making a small subset of nodes and edges “trusted,” which means that such nodes and edges remain intact at all times and are insusceptible to failures. We then show that by controlling the number of trusted nodes and edges, any desired level of network connectivity can be obtained. Along with characterizing network connectivity with trusted nodes and edges, we present heuristics to compute a small number of such nodes and edges. Finally, we illustrate our results on various networks.

Electronic downloads

Citation formats  
  • HTML
    Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon
    Koutsoukos. <a
    href="http://www.cps-forces.org/pubs/241.html"
    >Improving Network Connectivity Using Trusted Nodes and
    Edges</a>, American Control Conference (ACC 2017),
    May, 2017.
  • Plain text
    Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon
    Koutsoukos. "Improving Network Connectivity Using
    Trusted Nodes and Edges". American Control Conference
    (ACC 2017), May, 2017.
  • BibTeX
    @inproceedings{AbbasLaszkaVorobeychikKoutsoukos17_ImprovingNetworkConnectivityUsingTrustedNodesEdges,
        author = {Waseem Abbas and Aron Laszka and Yevgeniy
                  Vorobeychik and Xenofon Koutsoukos},
        title = {Improving Network Connectivity Using Trusted Nodes
                  and Edges},
        booktitle = {American Control Conference (ACC 2017)},
        month = {May},
        year = {2017},
        abstract = {Network connectivity is a primary attribute and a
                  characteristic phenomenon of any networked system.
                  A high connectivity is often desired within
                  networks; for instance to increase robustness to
                  failures, and resilience against attacks. A
                  typical approach to increasing network
                  connectivity is to strategically add links;
                  however adding links is not always the most
                  suitable option. In this paper, we propose an
                  alternative approach to improving network
                  connectivity, that is by making a small subset of
                  nodes and edges âtrusted,â which means that
                  such nodes and edges remain intact at all times
                  and are insusceptible to failures. We then show
                  that by controlling the number of trusted nodes
                  and edges, any desired level of network
                  connectivity can be obtained. Along with
                  characterizing network connectivity with trusted
                  nodes and edges, we present heuristics to compute
                  a small number of such nodes and edges. Finally,
                  we illustrate our results on various networks. },
        URL = {http://cps-forces.org/pubs/241.html}
    }
    

Posted by Waseem Abbas on 2 Mar 2017.
Groups: forces
For additional information, see the Publications FAQ or contact webmaster at cps-forces org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.