Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-pftt2 Total loading time: 0 Render date: 2024-05-20T13:48:12.182Z Has data issue: false hasContentIssue false

13 - Optimization of the network structure

from PART III - NETWORK FUNCTION: DYNAMICS AND APPLICATIONS

Published online by Cambridge University Press:  05 August 2013

Reuven Cohen
Affiliation:
Bar-Ilan University, Israel
Shlomo Havlin
Affiliation:
Bar-Ilan University, Israel
Get access

Summary

In this chapter we present results for the robustness of complex networks under multiple waves of simultaneous targeted attacks in which the highest degree nodes are removed and random attacks (or failures), in which fractions pt and pr, respectively, of the nodes are removed until the network collapses [TPC+05]. It is shown that the network design, which optimizes network robustness, has a bimodal degree distribution, with a fraction r of the nodes having degree k2 = (
k‪ − 1 + r)/r and the remainder of the nodes having degree k1 = 1, where 
k‪ is the average degree of all the nodes. The optimal value of r approaches pt/pr for pt/pr ≪ 1.

Introduction

The resilience of real-world networks to random attacks or to attacks targeted at the highest degree nodes is of much interest [AJB00, CEbH00, CEbH01, CNSW00, Pax97, PSS05, VSS04]. Many real-world networks are robust to random attacks but vulnerable to targeted attacks on the most important nodes. It is important to understand how to design networks that are optimally robust against both types of attacks, with examples being terrorist attacks on physical networks and attacks by hackers on computer networks. In Chapter 10 we considered the case in which there was only one type of attack on a given network, that is, the network was subject to either a random attack or to a targeted attack but not subject to different types of attack simultaneously, which is a more realistic scenario.

Type
Chapter
Information
Complex Networks
Structure, Robustness and Function
, pp. 145 - 153
Publisher: Cambridge University Press
Print publication year: 2010

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×