Diversity and Trust to Increase Structural Robustness in Networks

In a networked system, any change in the underlying network structure, such as node and link removals due to an attack, could severely affect the overall system behavior. Typically, by adding more links and connections between nodes, networks can be made structurally robust. However, this approach is not always feasible, especially in sparse networks. In this paper, we aim to improve the structural robustness in networks using the notions of diversity and trustiness. Diversity means that nodes in a network are of different types and have many variants. Trustiness means that a small subset of nodes are immune to failures and attacks. We show that by combining diversity and trustiness within the network, we can significantly limit the attacker's ability to change the underlying network structure by strategically removing nodes. Using pairwise connectivity as a measure, we show that by appropriately distributing trusted nodes and assigning types to nodes, network robustness can be significantly improved. We analyze the complexity of diversifying and computing a set of trusted nodes, and then present heuristics to compute attacks consisting of node removals. We also present heuristics to defend networks against such attacks by distributing node types and trusted nodes. Finally, we evaluate our results on various networks to demonstrate the usefulness of our approach.

[1]  Aron Laszka,et al.  Improving Network Connectivity and Robustness Using Trusted Nodes With Application to Resilient Consensus , 2018, IEEE Transactions on Control of Network Systems.

[2]  Shreyas Sundaram,et al.  Resilient Asymptotic Consensus in Robust Networks , 2013, IEEE Journal on Selected Areas in Communications.

[3]  Sencun Zhu,et al.  Improving sensor network immunity under worm attacks: A software diversity approach , 2016, Ad Hoc Networks.

[4]  Mauricio Barahona,et al.  Spectral Measure of Structural Robustness in Complex Networks , 2011, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[5]  Robert E. Tarjan,et al.  Augmentation Problems , 1976, SIAM J. Comput..

[6]  Harish Sethu,et al.  On achieving software diversity for improved network security using distributed coloring algorithms , 2004, CCS '04.

[7]  Cristina Nita-Rotaru,et al.  Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes , 2015, IEEE Trans. Dependable Secur. Comput..

[8]  Yevgeniy Vorobeychik,et al.  Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening , 2018, 2018 IEEE International Conference on Industrial Internet (ICII).

[9]  Roberto Aringhieri,et al.  Local search metaheuristics for the critical node problem , 2016, Networks.

[10]  Zeev Nutov,et al.  Approximating Node-Connectivity Augmentation Problems , 2009, Algorithmica.

[11]  Mario Ventresca,et al.  Efficiently identifying critical nodes in large complex networks , 2015 .

[12]  Panos M. Pardalos,et al.  Detecting critical nodes in sparse graphs , 2009, Comput. Oper. Res..

[13]  Biswanath Mukherjee,et al.  Disaster survivability in optical communication networks , 2013, Comput. Commun..

[14]  Mario Ventresca,et al.  Global search algorithms using a combinatorial unranking-based problem representation for the critical node detection problem , 2012, Comput. Oper. Res..

[15]  Hamamache Kheddouci,et al.  The Critical Node Detection Problem in networks: A survey , 2018, Comput. Sci. Rev..

[16]  Shreyas Sundaram,et al.  On the Impact of Trusted Nodes in Resilient Distributed State Estimation of LTI Systems , 2018, 2018 IEEE Conference on Decision and Control (CDC).

[17]  Shreyas Sundaram,et al.  Secure distributed observers for a class of linear time invariant systems in the presence of Byzantine adversaries , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[18]  Panos M. Pardalos,et al.  On New Approaches of Assessing Network Vulnerability: Hardness and Approximation , 2012, IEEE/ACM Transactions on Networking.