Journal of Sensors

Journal of Sensors / 2021 / Article
Special Issue

Recent Advances in Security and Privacy for Wireless Sensor Networks 2020

View this Special Issue

Research Article | Open Access

Volume 2021 |Article ID 8820413 | https://doi.org/10.1155/2021/8820413

Shudong Li, Yanshan Chen, Xiaobo Wu, Xiaochun Cheng, Zhihong Tian, "Power Grid-Oriented Cascading Failure Vulnerability Identifying Method Based on Wireless Sensors", Journal of Sensors, vol. 2021, Article ID 8820413, 12 pages, 2021. https://doi.org/10.1155/2021/8820413

Power Grid-Oriented Cascading Failure Vulnerability Identifying Method Based on Wireless Sensors

Academic Editor: Iftikhar Ahmad
Received24 Apr 2020
Revised28 Aug 2020
Accepted22 May 2021
Published28 Jun 2021

Abstract

In our paper, we study the vulnerability in cascading failures of the real-world network (power grid) under intentional attacks. Here, we use three indexes (, , -shell) to measure the importance of nodes; that is, we define three attacks, respectively. Under these attacks, we measure the process of cascade effect in network by the number of avalanche nodes, the time steps, and the speed of the cascade propagation. Also, we define the node’s bearing capacity as a tolerant parameter to study the robustness of the network under three attacks. Taking the power grid as an example, we have obtained a good regularity of the collapse of the network when the node’s affordability is low. In terms of time and speed, under the betweenness-based attacks, the network collapses faster, but for the number of avalanche nodes, under the degree-based attack, the number of the failed nodes is highest. When the nodes’ bearing capacity becomes large, the regularity of the network’s performances is not obvious. The findings can be applied to identify the vulnerable nodes in real networks such as wireless sensor networks and improve their robustness against different attacks.

1. Introduction

Nowadays, people’s daily life is increasingly dependent on electricity, but the failures and blackout happened in the electricity system has resulted in heavy losses and a huge impact on people’s lives. There are a lot of famous examples like the massive power failure on the West Coast of United States in September 2011, the breakdown of Ukraine’s electricity system under malicious attacks and the blackout in New York city in July 2019, and the massive power failure on the U.S. West Coast in 2019. Therefore, to this day, the research on the power grid is still hot. The current research on network robustness mainly includes these aspects: research based on power grid structure, analysis based on cascading effects, how to identify network attacks, and how to defend network attacks.

In terms of structural analysis, Huang [1] et al. (2013) used the theory of complex networks and obtained the distribution of risk energy along the path in the vulnerability analysis of cascading faults considering branch structures. Based on graph theory technology, Correa [2] et al. (2013) obtained the applicability conclusion of the graph theory method for the vulnerability of power grids by comparing the physical flow model and the statistical indicators of scale-free graphs. Based on the normalization effect of neighboring nodes and the weight distribution of nodes in the network, Wang [3] et al. (2014) studied the different roles of low-load and high-load nodes and the relationship between some parameters in the network and the strongest level of robustness. Finally, through numerical simulation, they obtained the parameter values corresponding to the model at the strongest level of robustness. Ouyang [4] et al. (2014) used the betweenness based-model (BBM), direct current power flow model (DCPFM), and purely topological model(PTM) to study network robustness under intentional attacks based on betweenness, degree, importance, and maximum traffic. Yang [5] et al. (2015) discussed the relationship between community structure and network robustness and proposed a three-step strategy to improve network robustness while maintaining the degree distribution and the structure of the network community.

In terms of analysis based on cascading effects, considering the traffic load, Tan [6] et al. (2015) used the Barabasi-Albert scale-free network and interdependent Erdos-Renyi random graph to research the effect of the coupling mode on the cascade effect. Through research, Erdos-Renyi random graphs are fragile and robust. However, the interdependent Barabasi-Albert scale-free network is vulnerable to intentional attacks and the random attacks. These results are similar for interdependent communication networks and power grids, for the nonvulnerability under intentional attacks and the actual interdependent system. Cai [7] et al. (2016) analyzed the complex effects of cascading faults by modeling the interdependence between power systems and dispatch data networks. Their simulation results show that under random attacks, the probability of catastrophic failure of the power grid combined with the mesh structure is higher than that with a double-star structure; while under intentional attacks, the transmission performance of the mesh network is better than that of the double-star structure. Hai-PengRen [8] et al. (2016) proposed a new load distribution for the cascade effect and a node removal rule, that is, in the opposite direction of the flow, removing the first overload node, and then the network distributes the load and continues cascading process. This method has proven to suppress large-scale cascading failures. According to the maximum flow theory, Wenli [9] et al. (2016) proposed a model of cascading failure. Their results show that the node load distribution has a great impact on the cascading dynamics and the tolerance parameter threshold. Kornbluth [10] et al. (2018) use the node’s betweenness centrality as the load to research the cascading effect of the network when the node’s load is overloaded. They study the functional relationship between the initial attack and the number of surviving nodes at the end of the cascade PF strength under different tolerance values in Erdös-Renyi graphs and random regular graphs.

In terms of how to identify network attacks, Yan [11] et al. (2017) analyzed the vulnerability of the transmission network under sequential topology attack and proposed a method based on -learning. This method can identify the critical attack sequence considering the dynamic behavior of the physical system. Wang [12] et al. (2017) developed a smart search method based on state-space pruning to identify incidents of cyber attacks. They used the stochastic chemistry method and particle swarm optimization algorithm and took the IEEE system as an example to verify the efficiency and of the method. Lei [13] et al. (2020) proposed a distributed iterative positioning algorithm based on the abandonment strategy of the sensor relative to its neighbor’s center of gravity coordinates. The algorithm uses relative distance calculations to locate the data packet loss through the neighbor’s communication link. And they accurately locate the sensor through this algorithm. Daniel [14] et al. (2020) proposed an algorithm that shows the relationship between the variance of the attacker’s signal and how far away the nodes are, which solves the problem of constructing a centralized and distributed version of Nesterov with the best fixed parameters.

In terms of how to defend network attacks, Zheng [15] et al. (2014) proposed a weighting strategy for edges, that is, designing the path length of the edge as the product of the clustering coefficients of the edge nodes and calculating the corrected neutrality center of the edge and applying it as a weight to the cascade model. It is found that the weighting scheme based on the modified betweenness centrality makes the three networks of the modular network, scale-free network, and small-world network all better than the original betweenness centrality networks that are more robust against edge attack. Liu [16] et al. (2015) found two ways to reduce the system vulnerability: (1) protect nodes with high degree and (2) increase the degree of correlation between networks. Guo [17] et al. (2017) proposed a vulnerability analysis method using the Cyber-Physical Power System (CPPS) model composed of the physical layer, network layer, and network physical interface and used this method to calculate the performance index of the model before and after the cascade failure. By comparing different attack strategies and interface strategies, they concluded that CPPS should protect high-indexed nodes and is more vulnerable to malicious attacks. Wang [18] et al. (2018) proposed a strategy to defend against cyber attacks by studying electronic computing physical systems (ECPSs). Besides, they also provided a weight adjustment strategy to work out the problem of unbalanced current caused by the split event. In the paper, their assessment of vulnerability has five aspects: robustness, economic cost, degree of damage, fragile equipment, and trigger points. Ma [19] et al. (2019) proposed a scale-free network model that can more effectively control the propagation of cascading faults. In their model, the connection load of any two nodes is defined, taking into account the degree and intermediateness of the nodes. Irshaad [20] et al. (2019) combined cognitive dynamic and state estimation systems in the smart network and proposed a new SG metric: entropy state. The manager achieves the goal of improving the entropy state by reconfiguring the weights of the sensors in the grid and dynamically optimizing the state estimation process. And CDS is the best choice for monitoring systems.

It can be seen from the above literature review that scholars understand the network structure and cascading effects and use sensors to identify attacks and defend them. In this article, we default to the identification of sensors and attach importance to defense to protect high-load nodes. However, rather than studying structural defenses, we value the impact of the network after an attack. We recorded not only the number of nodes in the network that crashed but also the speed and time of the crash. Because we believe that under the technical recognition of sensors, understanding the law of network collapse is of great practical significance for future defenses.

We break this article into three sections. In Section I, we will introduce the load distribution model of the network. In Section II, we will show three attacks. In Section III, we will list some indicators to show the extent to which the network is crashing. In Section IV, we will present the results graphically and analyze them. Finally, we will give the conclusion.

2. Results and Discussion

2.1. The Cascading Failure Model
2.1.1. Load Distribution Model

It can be seen from multiple studies that the load of a node is often estimated by the node’s betweenness centrality [21, 22]. Therefore, in our paper, we set the betweenness centrality of the node as its load.

In reality, when a node is crashed by an attack, its load is distributed to other nodes in the network [23]. There are two distribution methods, global distribution and local distribution. Global distribution seems to be more comprehensive, but in actual research, global distribution calculation is huge, and in global distribution, the load is distributed in inverse proportion to the distance. On the contrary, distributing load to neighboring nodes is effective and reasonable. On the one hand, it can show the level after the collapse of the network. On the other hand, calculations are greatly reduced. Local distribution is not single, for example, using game theory [24]. Consequently, we adopt the local distribution method of node load distribution to its neighboring nodes after a node fails in this article, which is more suitable for research.

As shown in Figure 1, when the node crashes, it allocates its own load to its neighboring node set in a certain form. When a node is a neighboring node that exceeds its maximum load, the node fails and continues to be distributed to its neighboring nodes, which results in the cascade effect. Until the assigned nodes in the network do not exceed the maximum load, the process of cascading faults stops [25].

2.1.2. Cascade-Related Indicators

To measure the cascading effect of the network, you need to define some relevant indicators.

First of all, as mentioned above, we define the initial load () of node [26] as the node’s betweenness centrality ().

Secondly, define the maximum load () that the node can withstand [27]. The definition is as follows:

In the formula, is a tunable parameter, ranging from 0 to 1, indicating the performance of the nodes [28]. The larger the value of α, the better the load-carrying capacity of the node.

The next is how to distribute. At time , as node failed, its neighboring node increases the load () as

where is any node of set . The load distributed from the node is added to each neighboring node. If the one of neighboring nodes exceeds its maximum load, the node fails [29].

2.1.3. Simulated Attack Model

In general, our model is to achieve intentional attacks in reality by selecting high-load nodes to attack. After being attacked, the attacked node will distribute its load to neighboring nodes, that is, using the previous load distribution model. When any neighboring node’s load exceeds its capacity, it will collapse and continue to distribute its load, thus form a series of chain reactions [30, 31]. And we will simulate this process through a computer to get our final conclusion.

2.2. Three Attack Strategies

We examine the survivability of the network under intentional attacks [32] in this article. Under intentional attacks, important nodes in the network will be attacked. Important nodes are often measured by the node’s betweenness centrality, degree [33], -shell [34] value, etc. Therefore, we study three attacks that sort these three metrics in descending order to attack. The three attacks are as follows: (1)Betweenness attack ( attack): based on the abovementioned distribution method, we sort all nodes in descending order of the betweenness centrality, then attack the top nodes(2)Degree-based attack ( attack): The nodes to be attacked are arranged in descending order of degrees, and the rest are the same as the betweenness-based attack(3)-shell-based attack: keep the other conditions the same and arrange the attacked nodes in descending order according to the value of -shell. For the definition of -shell, see the Figure 2 below

Attack the nodes according to these three attacks, and then through certain indicators [35], we can see the degree of network collapse. Next, we will introduce the evaluation indicators.

2.3. Evaluation Indicators

Obviously, the degree of network collapse [36, 37] is bound up with the number of nodes that fail. The quantity available is an important indicator. On the other hand, due to the cascading effect, the moments when different nodes fail are not necessarily the same. Therefore, we must first define the time of the cascade. With quantity and time, we naturally think of another indicator—speed. Below, we will explain these three indicators in detail. (1)Time: As for the time, we define the time of the attack as the moment 0 (), the time of the neighboring nodes fail caused by the attacked nodes as the moment 1(), and so on to define the cascade moment. In addition, what we can get from this is that the last moment recorded is the time () used for the cascade effect(2)The number of failed nodes: Aiming to analyze the collapse of the network in the cascade effect process, we count the nodes that fail at different times ( ()). By adding these numbers, we can get the total number of nodes that fail, calculated as follows:(3)The number of noncrashed nodes: Knowing the total number of nodes () in the power grid and the number of failure nodes, we can easy to calculate the nodes that did not fail, excluding the number of nodes that have attacked (), calculated as follows:(4)Speed of cascade: Speed is the quotient of quantity () and time (). Here, the time it takes for the cascade effect to start and end. The quantity () here refers to the total number of nodes that fail. The specific formula is as follows:

All in all, it is easy to know that the total number of failure nodes shows the degree of network collapse, and time and speed show the effects of different attacks. Then, based on these indicators, from the results, we can detect the effect of the cascade effect of the network under different attack conditions.

3. Result Analysis

Based on the previous model and evaluation indicators, we test it using the U.S. grid as an example. This power grid is a network with 4941 nodes and 6,594 edges. Here, we assume that the edges of the network [38] are unweighted, and the distribution of the load is undirected.

3.1. Preliminary Analysis

As mentioned above, we will record the number of nodes that fail at each moment in the cascade effect. Therefore, we will initially display it in a three-dimensional graph.

Through the adjustment of α and the adjustment of attack modes, we can have different results. Among them, we will find some novel conclusions. Next, we will present them in turn.

As can be seen from the vertical perspective of Figure 3, under the attack, the number of nodes in the cascade effect increases with time, showing a trend of increasing first and then decreasing. From the horizontal perspective, as the number of attacked nodes increases, so does the number of collapse nodes in the cascade effect. And it can be roughly seen that with the increasing of the number of attacked nodes, the total time of the cascade effect generally decreases.

Next, we use the same distribution method to perform the same operation on nodes sorted by degree (). The result is shown in Figure 4.

It can be seen from Figure 4 that the horizontal and vertical images are roughly the same as the attacks, but in the attack, when the node performance is good, that is, when is large, attacking a few important nodes has little impact on the entire network.

At last, we use the -shell to measure the importance that is sorted by -shell, attack the node with a large value of k-shell, and use the same distribution method to record the number of failure nodes, as shown in Figure 5.

It can be seen from Figure 5 that the image in the horizontal and vertical directions is roughly the same as the two modes, but compared to the previous two attack mode, this attack mode has a large time span and shows a fault phenomenon, as shown in Figure 5(a). The first 40 attacked nodes and less than 40 show roughly the same effect on the network, but when the number of attack nodes is greater than 40, the result of the attack is significantly different. This may be related to the point ordering with the same -shell value.

3.2. Advanced Analysis

When is determined, in a three-dimensional graph, we can know the time of the crash () and the number of crashed nodes at different times ( ()) and compare the network crashes that attacked different numbers of nodes. However, we do not know whether the final total number of crashed nodes () still has such regularity. Therefore, we introduce a two-dimensional graph to depict the total number of crashed nodes. In addition, we also depict time and speed accordingly.

From (a) and (b) of Figure 6, we see a strange phenomenon, and the more attacked nodes, the fewer the number of failed nodes. This is counterintuitive. However, there is a possible reason to explain this phenomenon; that is, the node that was attacked at the beginning is closely related to the nodes that are added later. The load allocated by the previous crashed node causes the subsequent node to fail. On how to answer this question, we draw a graph of the number of nodes without fail [39] (Figure 7). It turns out that for both the -shell and the attack, this explanation is feasible. As for how to explain the attack, at this time, we should consider the phenomenon that the neighboring nodes fail at the same time, and the load cannot be distributed. Whether it is caused by one or both, we can conclude that, based on the previous model, increasing the number of attack nodes does not necessarily lead to an increase in network crash, especially for the attack.

From Figures 6 and 7, we have not reached a good conclusion. However, from a time and speed perspective, we found good results. It can be seen from Figures 8 and 9 that when is small, the speed and time of collapse reflect a better law. As the number of attacked nodes increases, the time spent by cascade effect decreases, and the speed of collapse increases. In addition, among the three attacks, the attack has the shortest time and the fastest speed, followed by the attack. When is greater than or equal to 0.6, the volatility of the data is larger, and the law is not very obvious, but it can still be seen that the attack is more destructive to the power grid.

From this, we reasonably guess that the size of the alpha has an effect on the number of nodes that fail. To do this, we set as the independent variable [40], set the number of failure nodes as the dependent variable, and plot the results as follows.

It can be seen from Figure 10 that as the value of increases, the number of failure nodes decreases. But as for the attack and the attack, the reduction trend is not obvious. Nevertheless, some phenomena can be found from them. As you can see from Figure 10(a), that when attacking 50 nodes, no matter how large , the number of nodes fail by the betweenness-based attack is greater than the -shell attack. However, when the number of attacks increased, there was almost no difference in the number of failure nodes by the two modes. When the number of attacked nodes is 200, the number of failure nodes by the -shell attack is greater than that of the attack. On the other hand, the number of failure nodes in the network is closely related to the load capacity of the nodes for the attack. In this case, improving the node’s performance is very effective to ensure network security.

4. Conclusions

Through the above studies, we can draw some preliminary conclusions about the cascade effect. The specific conclusions will be listed in the following points. (1)From the preliminary analysis, it can be roughly seen that at any time , as the number of attacked nodes increases, so does the number of failure nodes, and the total crash time decreases(2)However, Figures 6 and 7 show that the increase in the number of attacked nodes does not result in an increase in the total number of crashed nodes and a decrease in the number of noncrashed nodes. Based on the data of the number of crashed and noncrashed nodes, compared with the three attack methods, attack is affected more(3)Combined with the crash time and crash speed, it can be seen that the attack has the fastest crash speed and the shortest crash time. Therefore, it can be known that in the attack mode, the robustness of the network is the lowest, especially when is small(4)Improving the load-carrying capacity of a node is a good protection measure. Judging from the results, the load-carrying capacity of nodes has more influence on the degree of network collapse than the number of attack nodes, especially in attack(5)When the alpha is small, the cascading effect takes less time and is faster than the -shell under the attack. However, the number of failure nodes under the attack is less than that of -shell. Therefore, we cannot conclude that the attack is stronger. If it is assumed that there is no way to intervene before the cascade effect stops, then the -shell attack can be considered stronger(6)When is large and there are many attacked nodes, based on our model, our conclusions above may no longer be applicable

In the above conclusions, the results have revealed the topological vulnerability of cascade in the power grid systems under different attacks and could be used to design the robust topology of wireless sensor networks [41, 42]. The understanding of the process of network collapse is conducive to better erection and use of sensor detection. Under certain measures, this is a favorable measure to deal with the network cascade effect. But for other real networks [4348], the results are maybe different. So, we will study the vulnerability in other real-world networks with considering the community structure [49] in the future.

Data Availability

No data were used to support this study.

Conflicts of Interest

S.L., Y.C., X.W., Z.T., and X.C. declare no conflicts of interest that are directly related to the submitted work.

Authors’ Contributions

Shudong Li and Yanshan Chen contributed equally to this work.

Acknowledgments

This research was funded by the Key R&D Program of Guangdong Province (No. 2019B010136003), NSFC (Nos. U1803263 and 61672020), Project of Shandong Province Higher Educational Science and Technology Program (No. J16LN61), National Key Research and Development Program of China (No. 2019QY1406), and Guangdong Province Universities and Colleges Pearl River Scholar Funded Scheme (2019).

References

  1. X. C. Huang, H. Qi, X. P. Zhang, L. F. Lu, and Y. Y. Hu, “Analysis on power grid vulnerability considering cascading failure of branch,” Applied Mechanics and Materials, vol. 433-435, pp. 1254–1257, 2013. View at: Publisher Site | Google Scholar
  2. G. J. Correa and J. M. Yusta, “Grid vulnerability analysis based on scale-free graphs versus power flow models,” Electric Power Systems Research, vol. 101, pp. 71–79, 2013. View at: Publisher Site | Google Scholar
  3. J. Wang, C. Zhang, Y. Huang, and C. Xin, “Attack robustness of cascading model with node weight,” Nonlinear Dynamics, vol. 78, no. 1, pp. 37–48, 2014. View at: Publisher Site | Google Scholar
  4. M. Ouyang, L. Zhao, Z. Pan, and L. Hong, “Comparisons of complex network based models and direct current power flow model to analyze power grid vulnerability under intentional attacks,” Physica A: Statistical Mechanics and its Applications, vol. 403, pp. 45–53, 2014. View at: Publisher Site | Google Scholar
  5. Y. Yang, Z. Li, Y. Chen, X. Zhang, and S. Wang, “Improving the robustness of complex networks with preserving community structure,” PLoS One, vol. 10, no. 2, article e0116551, 2015. View at: Publisher Site | Google Scholar
  6. F. Tan, Y. Xia, and Z. Wei, “Robust-yet-fragile nature of interdependent networks,” Physical Review E, vol. 91, no. 5, 2015. View at: Publisher Site | Google Scholar
  7. Y. Cai, Y. Cao, Y. Li, T. Huang, and B. Zhou, “Cascading failure analysis considering interaction between power grids and communication networks,” IEEE Transactions on Smart Grid, vol. 7, no. 1, pp. 530–538, 2016. View at: Publisher Site | Google Scholar
  8. H.-P. Ren, J. Song, R. Yang, M. S. Baptista, and C. Grebogi, “Cascade failure analysis of power grid using new load distribution law and node removal rule,” Physica A: Statistical Mechanics and its Applications, vol. 442, pp. 239–251, 2016. View at: Publisher Site | Google Scholar
  9. W. Fan, S. Huang, and S. Mei, “Invulnerability of power grids based on maximum flow theory,” Physica A: Statistical Mechanics and its Applications, vol. 462, pp. 977–985, 2016. View at: Publisher Site | Google Scholar
  10. Y. Kornbluth, G. Barach, Y. Tuchman, B. Kadish, G. Cwilich, and S. V. Buldyrev, “Network overload due to massive attacks,” Physical Review E, vol. 97, no. 5, 2018. View at: Publisher Site | Google Scholar
  11. J. Yan, H. He, X. Zhong, and Y. Tang, “Q-learning-based vulnerability analysis of smart grid against sequential topology attacks,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 1, pp. 200–210, 2017. View at: Publisher Site | Google Scholar
  12. M. Wang, Y. Xiang, and L. Wang, “Identification of critical contingencies using solution space pruning and intelligent search,” Electric Power Systems Research, vol. 149, pp. 220–229, 2017. View at: Publisher Site | Google Scholar
  13. L. Shi, Q. C. Liu, J. L. Shao, and Y. Cheng, “Distributed localization in wireless sensor networks under denial-of-service attacks,” IEEE Control Systems Letters, vol. 5, pp. 493–498, 2021. View at: Publisher Site | Google Scholar
  14. D. Silvestre, J. P. Hespanha, and D. Silvestre, “Resilient desynchronization for decentralized medium access control,” IEEE Control Systems Letters, vol. 5, pp. 803–808, 2020. View at: Google Scholar
  15. Y. Zheng, F. Liu, and Y.-W. Gong, “Robustness in weighted networks with cluster structure,” Mathematical Problems in Engineering, vol. 2014, Article ID 292465, 8 pages, 2014. View at: Publisher Site | Google Scholar
  16. X. Liu, H. Peng, and J. Gao, “Vulnerability and controllability of networks of networks,” Chaos, Solitons& Fractals, vol. 80, pp. 125–138, 2015. View at: Publisher Site | Google Scholar
  17. J. Guo, Y. Han, C. Guo, F. Lou, and Y. Wang, “Modeling and vulnerability analysis of cyber-physical power systems considering network topology and power flow properties,” Energies, vol. 10, no. 1, p. 87, 2017. View at: Publisher Site | Google Scholar
  18. Y. Wang, G. Yan, and R. Zheng, “Vulnerability assessment of electrical cyber-physical systems against cyber attacks,” Applied Sciences, vol. 8, no. 5, p. 768, 2018. View at: Publisher Site | Google Scholar
  19. J. Ma and Z. Ju, “Cascading failure model of scale-free networks for avoiding edge failure,” Peer-to-Peer Networking and Applications, vol. 12, no. 6, pp. 1627–1637, 2019. View at: Publisher Site | Google Scholar
  20. M. I. Oozeer and S. Haykin, “Cognitive dynamic system for control and cyber-attack detection in smart grid,” IEEE Access, vol. 7, pp. 78320–78335, 2019. View at: Publisher Site | Google Scholar
  21. A. E. Motter, T. Nishikawa, and Y.-C. Lai, “Range-based attack on links in scale-free networks: are long-range links responsible for the small-world phenomenon?” Physical Review E, vol. 66, no. 6, 2002. View at: Publisher Site | Google Scholar
  22. A. E. Motter, “Cascade Control and Defense in Complex Networks,” Physical Review Letters, vol. 93, no. 9, 2004. View at: Publisher Site | Google Scholar
  23. M. Li, Y. Sun, H. Lu, S. Maharjan, and Z. Tian, “Deep reinforcement learning for partially observable data poisoning attack in crowdsensing systems,” IEEE Internet of Things Journal, vol. 7, no. 7, pp. 6266–6278, 2020. View at: Publisher Site | Google Scholar
  24. C. Liu, H. Guo, Z. Li, X. Gao, and S. Li, “Coevolution of multi-game resolves social dilemma in network population,” Applied Mathematics and Computation, vol. 341, pp. 402–407, 2019. View at: Publisher Site | Google Scholar
  25. P. Zhu, X. Wang, S. Li, Y. Guo, and Z. Wang, “Investigation of epidemic spreading process on multiplex networks by incorporating fatal properties,” Applied Mathematics and Computation, vol. 359, pp. 512–524, 2019. View at: Publisher Site | Google Scholar
  26. M. Zheng, S. Li, D. Lu, W. Wang, X. Wu, and D. Zhao, “Structural vulnerability of power grid under malicious node-based attacks,” Communications in Computer and Information Science, vol. 1123, pp. 446–453, 2019. View at: Publisher Site | Google Scholar
  27. X. (. J.). du, M. Zhang, K. Nygard, S. Guizani, and H. H. Chen, “Self-healing sensor networks with distributed decision making,” International Journal of Sensor Networks, vol. 2, no. 5/6, pp. 289–298, 2007. View at: Publisher Site | Google Scholar
  28. S. Li, D. Zhao, X. Wu, Z. Tian, A. Li, and Z. Wang, “Functional immunization of networks based on message passing,” Applied Mathematics and Computation, vol. 366, article 124728, 2020. View at: Publisher Site | Google Scholar
  29. Z. Tian, C. Luo, J. Qiu, X. du, and M. Guizani, “A distributed deep learning system for web attack detection on edge devices,” IEEE Transactions on Industrial Informatics, vol. 16, no. 3, pp. 1963–1971, 2020. View at: Publisher Site | Google Scholar
  30. H. Zhang, C. Zhai, G. Xiao, and T. C. Pan, “An optimal control approach to identifying the worst-case cascading failures in power systems,” IEEE Transactions on Control of Network Systems, vol. 7, no. 2, pp. 956–966, 2019. View at: Publisher Site | Google Scholar
  31. H. Zhang, C. Zhai, G. Xiao, and T. C. Pan, “Identifying critical risks of cascading failures in power systems,” IET Generation, Transmission & Distribution, vol. 13, no. 12, pp. 2438–2445, 2019. View at: Publisher Site | Google Scholar
  32. H. Yang, S. Li, X. Wu, H. Lu, and W. Han, “A novel solutions for malicious code detection and family clustering based on machine learning,” IEEE Access, vol. 7, no. 1, pp. 148853–148860, 2019. View at: Publisher Site | Google Scholar
  33. R. Yin, X. Yin, M. Cui, and Y. Xu, “Node importance evaluation method based on multi-attribute decision-making model in wireless sensor networks,” EURASIP Journal on Wireless Communications and Networking, vol. 2019, 14 pages, 2019. View at: Google Scholar
  34. Z. Yi, X. Wu, and F. Li, “Ranking spreaders in complex networks based on the most influential neighbors,” Discrete Dynamics in Nature and Society, vol. 2018, Article ID 3649079, 6 pages, 2018. View at: Publisher Site | Google Scholar
  35. J. Qiu, Z. Tian, C. Du, Q. Zuo, S. Su, and B. Fang, “A survey on access control in the age of internet of things,” IEEE Internet of Things Journal, vol. 7, no. 6, pp. 4682–4696, 2020. View at: Publisher Site | Google Scholar
  36. X. Du, M. Rozenblit, and M. Shayman, “Implementation and performance analysis of SNMP on a TLS/TCP base,” in 2001 IEEE/IFIP International Symposium on Integrated Network Management Proceedings. Integrated Network Management VII. Integrated Management Strategies for the New Millennium (Cat. No. 01EX470), pp. 453–466, Seattle, WA, USA, May 2001. View at: Publisher Site | Google Scholar
  37. Y. Li, S. Li, Y. Chen, P. He, X. Wu, and W. Han, “Electric power grid invulnerability under intentional edge-based attacks,” in Dependability in Sensor, Cloud, and Big Data Systems and Applications, vol. 1123 of Communications in Computer and Information Science, pp. 454–461, Springer, 2019. View at: Google Scholar
  38. P. Zhu, X. Wang, D. Jia, Y. Guo, S. Li, and C. Chu, “Investigating the co-evolution of node reputation and edge-strategy in prisoner's dilemma game,” Applied Mathematics and Computation, vol. 386, p. 125474, 2020. View at: Publisher Site | Google Scholar
  39. Z. Tian, X. Gao, S. Su, and J. Qiu, “Vcash: a novel reputation framework for identifying denial of traffic service in internet of connected vehicles,” IEEE Internet of Things Journal, vol. 7, no. 5, pp. 3901–3909, 2020. View at: Publisher Site | Google Scholar
  40. X. Du, M. Guizani, Y. Xiao, and H.-H. Chen, “Defending DoS attacks on broadcast authentication in wireless sensor networks,” in 2008 IEEE International Conference on Communications, Beijing, China, 2008. View at: Google Scholar
  41. L. Wu, X. Du, W. Wang, and B. Lin, “An out-of-band authentication scheme for Internet of Things using blockchain technology,” in 2018 International Conference on Computing, Networking and Communications (ICNC), Maui, Hawaii, USA, March 2018. View at: Publisher Site | Google Scholar
  42. X. Huang and X. Du, “Achieving big data privacy via hybrid cloud,” in 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 512–517, Toronto, Ontario, Canada, May 2014. View at: Publisher Site | Google Scholar
  43. D. Zhao, L. Wang, Z. Wang, and G. Xiao, “Virus propagation and patch distribution in multiplex networks: modeling, analysis and optimal allocation,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 7, pp. 1755–1767, 2019. View at: Publisher Site | Google Scholar
  44. D. Zhao, G. Xiao, Z. Wang, L. Wang, and L. Xu, “Minimum Dominating set of multiplex networks: definition, application and identification,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, pp. 1–15, 2020. View at: Publisher Site | Google Scholar
  45. S. D. Li, D. N. Lu, X. B. Wu, W. Han, and D. Zhao, “Enhancing the power grid robustness against cascading failures under node-based attacks,” Modern Physics Letters B, vol. 35, no. 9, article 2150152, 2021. View at: Publisher Site | Google Scholar
  46. D. Zhao, S. Yang, X. Han, S. Zhang, and Z. Wang, “Dismantling and vertex cover of network through message passing,” IEEE Transactions on Circuits & Systems II-Express Briefs, vol. 67, no. 11, pp. 2732–2736, 2020. View at: Publisher Site | Google Scholar
  47. K. Huang, Z. Wang, and M. Jusup, “Incorporating latent constraints to enhance inference of network structure,” IEEE Transactions on Network Science and Engineering, vol. 7, no. 1, pp. 466–475, 2020. View at: Publisher Site | Google Scholar
  48. W. B. Du, X. L. Zhou, M. Jusup, and Z. Wang, “Physics of transportation: Towards optimal capacity using the multilayer network framework,” Scientific Reports, vol. 6, no. 1, p. 19059, 2016. View at: Publisher Site | Google Scholar
  49. S. D. Li, L. Y. Jiang, X. B. Wu, W. H. Han, D. Zhao, and Z. Wang, “A weighted network community detection algorithm based on deep learning,” Applied Mathematics and Computation, vol. 401, no. 7, Article ID 126012, 2021. View at: Publisher Site | Google Scholar

Copyright © 2021 Shudong Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Related articles

No related content is available yet for this article.
 PDF Download Citation Citation
 Download other formatsMore
 Order printed copiesOrder
Views362
Downloads371
Citations

Related articles

No related content is available yet for this article.

Article of the Year Award: Outstanding research contributions of 2021, as selected by our Chief Editors. Read the winning articles.