Determining Source–Destination Connectivity in Uncertain Networks: Modeling and Solutions

Determination of source–destination connectivity in networks has long been a fundamental problem, where most existing works are based on deterministic graphs that overlook the inherent uncertainty in network links. To overcome such limitation, this paper models the network as an uncertain graph, where each edge <inline-formula> <tex-math notation="LaTeX">$e$ </tex-math></inline-formula> exists independently with some probability <inline-formula> <tex-math notation="LaTeX">$p(e)$ </tex-math></inline-formula>. The problem examined is that of determining whether a given pair of nodes, a source <inline-formula> <tex-math notation="LaTeX">$s$ </tex-math></inline-formula> and a destination <inline-formula> <tex-math notation="LaTeX">$t$ </tex-math></inline-formula>, are connected by a path or separated by a cut. Assuming that during each determining process we are associated with an underlying graph, the existence of each edge can be unraveled through edge testing at a cost of <inline-formula> <tex-math notation="LaTeX">$c(e)$ </tex-math></inline-formula>. Our goal is to find an optimal strategy incurring the minimum expected testing cost with the expectation taken over all possible underlying graphs that form a product distribution. Formulating it into a combinatorial optimization problem, we first characterize the computational complexity of optimally determining source–destination connectivity in uncertain graphs. Specifically, through proving the NP-hardness of two closely related problems, we show that, contrary to its counterpart in deterministic graphs, this problem cannot be solved in polynomial time unless P = NP. Driven by the necessity of designing an exact algorithm, we then apply the Markov decision process framework to give a dynamic programming algorithm that derives the optimal strategies. As the exact algorithm may have prohibitive time complexity in practical situations, we further propose two more efficient approximation schemes compromising the optimality. The first one is a simple greedy approach with linear approximation ratio. Interestingly, we show that naive as it is, and it enjoys significantly better performance guarantee than some other seemingly more sophisticated algorithms. Second, by harnessing the submodularity of the problem, we further design a more elaborate algorithm with better approximation ratio. The effectiveness of the proposed algorithms is justified through extensive simulations on three real network data sets, from which we demonstrate that the proposed algorithms yield strategies with smaller expected cost than conventional heuristics.

[1]  Martin L. Puterman,et al.  Markov Decision Processes: Discrete Stochastic Dynamic Programming , 1994 .

[2]  Lisa Hellerstein,et al.  Evaluation of DNF Formulas , 2014, ISAIM.

[3]  Li Xiao,et al.  Improving unstructured peer-to-peer systems by adaptive connection establishment , 2005, IEEE Transactions on Computers.

[4]  Xinbing Wang,et al.  Node Density and Delay in Large-Scale Wireless Networks With Unreliable Links , 2014, IEEE/ACM Transactions on Networking.

[5]  Navendu Jain,et al.  Understanding network failures in data centers: measurement, analysis, and implications , 2011, SIGCOMM.

[6]  Mihalis Yannakakis,et al.  Suboptimal Cuts: Their Enumeration, Weight and Number (Extended Abstract) , 1992, ICALP.

[7]  David Liben-Nowell,et al.  The link-prediction problem for social networks , 2007 .

[8]  Stanford,et al.  Learning to Discover Social Circles in Ego Networks , 2012 .

[9]  Haim Kaplan,et al.  Learning with attribute costs , 2005, STOC '05.

[10]  Dimitris Papadias,et al.  Uncertain Graph Processing through Representative Instances , 2015, TODS.

[11]  M. Newman,et al.  The structure of scientific collaboration networks. , 2000, Proceedings of the National Academy of Sciences of the United States of America.

[12]  Henry A. Kautz,et al.  Modeling The Interplay of People's Location, Interactions, and Social Ties , 2013, IJCAI.

[13]  Lisa Hellerstein,et al.  Approximation Algorithms for Stochastic Boolean Function Evaluation and Stochastic Submodular Set Cover , 2013, SODA.

[14]  Uri Zwick,et al.  A Fully Dynamic Reachability Algorithm for Directed Graphs with an Almost Linear Update Time , 2016, SIAM J. Comput..

[15]  Mihalis Yannakakis,et al.  Shortest Paths Without a Map , 1989, Theor. Comput. Sci..

[16]  Shouling Ji,et al.  Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks , 2014, IEEE Transactions on Mobile Computing.

[17]  Jun Zhao,et al.  Probabilistic Key Predistribution in Mobile Networks Resilient to Node-Capture Attacks , 2017, IEEE Transactions on Information Theory.

[18]  Jun Zhao,et al.  $k$ -Connectivity in Random Key Graphs With Unreliable Links , 2015, IEEE Transactions on Information Theory.

[19]  Dimitris Papadias,et al.  The pursuit of a good possible world: extracting representative instances of uncertain graphs , 2014, SIGMOD Conference.

[20]  Haixun Wang,et al.  Distance-Constraint Reachability Computation in Uncertain Graphs , 2011, Proc. VLDB Endow..

[21]  Ian T. Foster,et al.  Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design , 2002, ArXiv.

[22]  Jun Zhao,et al.  Topological Properties of Wireless Sensor Networks Under the Q-Composite Key Predistribution Scheme With Unreliable Links (CMU-CyLab-14-002) , 2014 .

[23]  Xinbing Wang,et al.  Optimal determination of source-destination connectivity in random graphs , 2014, MobiHoc '14.

[24]  Xinbing Wang,et al.  Complexity vs. optimality: Unraveling source-destination connection in uncertain graphs , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[25]  Charu C. Aggarwal,et al.  Discovering highly reliable subgraphs in uncertain graphs , 2011, KDD.

[26]  Francesco Buccafurri,et al.  Discovering Links among Social Networks , 2012, ECML/PKDD.

[27]  Sibo Wang,et al.  Reachability queries on large dynamic graphs: a total order approach , 2014, SIGMOD Conference.

[28]  Jie Tang,et al.  Transfer Link Prediction across Heterogeneous Social Networks , 2015 .

[29]  David R. Karger,et al.  A randomized fully polynomial time approximation scheme for the all terminal network reliability problem , 1995, STOC '95.

[30]  Venkatesan Guruswami,et al.  Query strategies for priced information (extended abstract) , 2000, STOC '00.

[31]  Tonguç Ünlüyurt,et al.  Sequential testing of complex systems: a review , 2004, Discret. Appl. Math..

[32]  Michael O. Ball,et al.  Computational Complexity of Network Reliability Analysis: An Overview , 1986, IEEE Transactions on Reliability.

[33]  Eytan Modiano,et al.  A robust optimization approach to backup network design with random failures , 2015, 2011 Proceedings IEEE INFOCOM.

[34]  Wei Cheng,et al.  3D Underwater Sensor Network Localization , 2009, IEEE Transactions on Mobile Computing.

[35]  F. Chung,et al.  Connected Components in Random Graphs with Given Expected Degree Sequences , 2002 .

[36]  Alex X. Liu,et al.  Quantifying and Querying Network Reachability , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.

[37]  Andreas Krause,et al.  Adaptive Submodularity: Theory and Applications in Active Learning and Stochastic Optimization , 2010, J. Artif. Intell. Res..

[38]  Éva Tardos,et al.  Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..

[39]  Xinbing Wang,et al.  Are We Connected? Optimal Determination of Source–Destination Connectivity in Random Networks , 2017, IEEE/ACM Transactions on Networking.

[40]  Hemant Kowshik,et al.  Information aggregation in sensor networks , 2011 .

[41]  Richard M. Karp,et al.  Monte-Carlo Approximation Algorithms for Enumeration Problems , 1989, J. Algorithms.

[42]  Paul Erdös,et al.  On random graphs, I , 1959 .

[43]  Jun Zhao,et al.  Topological Properties of Secure Wireless Sensor Networks Under the $q$ -Composite Key Predistribution Scheme With Unreliable Links , 2017, IEEE/ACM Transactions on Networking.