The search functionality is under construction.

IEICE TRANSACTIONS on Fundamentals

The Invulnerability of Traffic Networks under New Attack Strategies

Xin-Ling GUO, Zhe-Ming LU, Hui LI

  • Full Text Views

    0

  • Cite this

Summary :

In this paper, invulnerability and attack strategies are discussed for the undirected unweighted urban road networks and the directed weighted taxi networks of Beijing. Firstly, five new attack strategies, i.e., Initial All Degree (IAD), Initial All Strength (IAS), Recalculated Closeness (RC), Recalculated All Degree (RAD) and Recalculated All Strength (RAS) and five traditional attack strategies, i.e., Initial Degree (ID), Initial Betweenness (IB), Initial Closeness (IC), Recalculated Degree (RD) and Recalculated Betweenness (RB) are adopted to provoke the nodes failure. Secondly, we assess the impacts of these attack strategies using two invulnerability metrics, i.e., S (the relative size of the giant component) and E (the average network efficiency) through simulation experiments by MATLAB. Furthermore, we obtain some conclusions on the basis of the simulation results. Firstly, we discover that IB is more efficient than others for the undirected unweighted 5th ring Beijing road network based on S, and IB is more efficient than others at the beginning while ID is more efficient than IB at last based on E, while IAD causes a greater damage than IAS for the directed weighted 5th ring Beijing taxi network no matter with metrics S or E. Secondly, we find that dynamic attacks are more efficient than their corresponding static attacks, and RB is more destructive than others in all attack graphs while RAD is more destructive than RAS in all attack graphs. Moreover, we propose some suggestions to advance the reliability of the networks according to the simulation results. Additionally, we notice that the damage between ID (RD) and IAD (RAD) is similar due to the large proportion of two-way roads, and we realize that global measures should be employed to estimate the best attack strategy on the basis of that we find the best attack strategy changes with the nodes failure.

Publication
IEICE TRANSACTIONS on Fundamentals Vol.E100-A No.10 pp.2106-2112
Publication Date
2017/10/01
Publicized
Online ISSN
1745-1337
DOI
10.1587/transfun.E100.A.2106
Type of Manuscript
PAPER
Category
Graphs and Networks

Authors

Xin-Ling GUO
  Zhejiang University
Zhe-Ming LU
  Zhejiang University
Hui LI
  Hainan University

Keyword