-
Analysis and Optimization of Robustness in Multiplex Flow Networks Against Cascading Failures
Authors:
Orkun İrsoy,
Osman Yağan
Abstract:
Networked systems are susceptible to cascading failures, where the failure of an initial set of nodes propagates through the network, often leading to system-wide failures. In this work, we propose a multiplex flow network model to study robustness against cascading failures triggered by random failures. The model is inspired by systems where nodes carry or support multiple types of flows, and fai…
▽ More
Networked systems are susceptible to cascading failures, where the failure of an initial set of nodes propagates through the network, often leading to system-wide failures. In this work, we propose a multiplex flow network model to study robustness against cascading failures triggered by random failures. The model is inspired by systems where nodes carry or support multiple types of flows, and failures result in the redistribution of flows within the same layer rather than between layers. To represent different types of interdependencies between the layers of the multiplex network, we define two cases of failure conditions: layer-independent overload and layer-influenced overload. We provide recursive equations and their solutions to calculate the steady-state fraction of surviving nodes, validate them through a set of simulation experiments, and discuss optimal load-capacity allocation strategies. Our results demonstrate that allocating the total excess capacity to each layer proportional to the mean effective load in the layer and distributing that excess capacity equally among the nodes within the layer ensures maximum robustness. The proposed framework for different failure conditions allows us to analyze the two overload conditions presented and can be extended to explore more complex interdependent relationships.
△ Less
Submitted 1 April, 2025; v1 submitted 10 February, 2025;
originally announced February 2025.
-
On the Interplay of Clustering and Evolution in the Emergence of Epidemic Outbreaks
Authors:
Mansi Sood,
Hejin Gu,
Rashad Eletreby,
Swarun Kumar,
Chai Wah Wu,
Osman Yagan
Abstract:
In an increasingly interconnected world, a key scientific challenge is to examine mechanisms that lead to the widespread propagation of contagions, such as misinformation and pathogens, and identify risk factors that can trigger large-scale outbreaks. Underlying both the spread of disease and misinformation epidemics is the evolution of the contagion as it propagates, leading to the emergence of d…
▽ More
In an increasingly interconnected world, a key scientific challenge is to examine mechanisms that lead to the widespread propagation of contagions, such as misinformation and pathogens, and identify risk factors that can trigger large-scale outbreaks. Underlying both the spread of disease and misinformation epidemics is the evolution of the contagion as it propagates, leading to the emergence of different strains, e.g., through genetic mutations in pathogens and alterations in the information content. Recent studies have revealed that models that do not account for heterogeneity in transmission risks associated with different strains of the circulating contagion can lead to inaccurate predictions. However, existing results on multi-strain spreading assume that the network has a vanishingly small clustering coefficient, whereas clustering is widely known to be a fundamental property of real-world social networks. In this work, we investigate spreading processes that entail evolutionary adaptations on random graphs with tunable clustering and arbitrary degree distributions. We derive a mathematical framework to quantify the epidemic characteristics of a contagion that evolves as it spreads, with the structure of the underlying network as given via arbitrary {\em joint} degree distributions of single-edges and triangles. To the best of our knowledge, our work is the first to jointly analyze the impact of clustering and evolution on the emergence of epidemic outbreaks. We supplement our theoretical finding with numerical simulations and case studies, shedding light on the impact of clustering on contagion spread.
△ Less
Submitted 25 September, 2024;
originally announced September 2024.
-
Spreading Processes with Mutations over Multi-layer Networks
Authors:
Mansi Sood,
Anirudh Sridhar,
Rashad Eletreby,
Chai Wah Wu,
Simon A. Levin,
H. Vincent Poor,
Osman Yagan
Abstract:
A key scientific challenge during the outbreak of novel infectious diseases is to predict how the course of the epidemic changes under different countermeasures that limit interaction in the population. Most epidemiological models do not consider the role of mutations and heterogeneity in the type of contact events. However, pathogens have the capacity to mutate in response to changing environment…
▽ More
A key scientific challenge during the outbreak of novel infectious diseases is to predict how the course of the epidemic changes under different countermeasures that limit interaction in the population. Most epidemiological models do not consider the role of mutations and heterogeneity in the type of contact events. However, pathogens have the capacity to mutate in response to changing environments, especially caused by the increase in population immunity to existing strains and the emergence of new pathogen strains poses a continued threat to public health. Further, in light of differing transmission risks in different congregate settings (e.g., schools and offices), different mitigation strategies may need to be adopted to control the spread of infection. We analyze a multi-layer multi-strain model by simultaneously accounting for i) pathways for mutations in the pathogen leading to the emergence of new pathogen strains, and ii) differing transmission risks in different congregate settings, modeled as network-layers. Assuming complete cross-immunity among strains, namely, recovery from any infection prevents infection with any other (an assumption that will need to be relaxed to deal with COVID-19 or influenza), we derive the key epidemiological parameters for the proposed multi-layer multi-strain framework. We demonstrate that reductions to existing network-based models that discount heterogeneity in either the strain or the network layers can lead to incorrect predictions for the course of the outbreak. In addition, our results highlight that the impact of imposing/lifting mitigation measures concerning different contact network layers (e.g., school closures or work-from-home policies) should be evaluated in connection with their effect on the likelihood of the emergence of new pathogen strains.
△ Less
Submitted 24 January, 2023; v1 submitted 10 October, 2022;
originally announced October 2022.
-
IRS-Assisted Millimeter Wave Communications: Joint Power Allocation and Beamforming Design
Authors:
Yue Xiu,
Yang Zhao,
Yang Liu,
Jun Zhao,
Osman Yagan,
Ning Wei
Abstract:
Intelligent reflecting surface (IRS) technology offers more feasible propagation paths for millimeter-wave (mmWave) communication systems to overcome blockage than existing technologies. In this paper, we consider a downlink wireless system with the IRS and formulate a joint power allocation and beamforming design problem to maximize the weighted sum-rate, which is a multi-variable optimization pr…
▽ More
Intelligent reflecting surface (IRS) technology offers more feasible propagation paths for millimeter-wave (mmWave) communication systems to overcome blockage than existing technologies. In this paper, we consider a downlink wireless system with the IRS and formulate a joint power allocation and beamforming design problem to maximize the weighted sum-rate, which is a multi-variable optimization problem. To solve the problem, we propose a novel alternating manifold optimization based beamforming algorithm. Simulation results show that our proposed optimization algorithm outperforms existing algorithms significantly in improving the weighted sum-rate of the wireless communication system.
△ Less
Submitted 24 December, 2020; v1 submitted 21 January, 2020;
originally announced January 2020.
-
Secure Connectivity of Heterogeneous Wireless Sensor Networks Under a Heterogeneous On-Off Channel Model
Authors:
Rashad Eletreby,
Osman Yagan
Abstract:
In this paper, we investigate the secure connectivity of wireless sensor networks utilizing the heterogeneous random key predistribution scheme, where each sensor node is classified as class-$i$ with probability $μ_i$ for $i=1,\ldots,r$ with $μ_i>0$ and $\sum_{i=1}^r μ_i=1$. A class-$i$ sensor is given $K_i$ cryptographic keys selected uniformly at random from a key pool of size $P$. After deploym…
▽ More
In this paper, we investigate the secure connectivity of wireless sensor networks utilizing the heterogeneous random key predistribution scheme, where each sensor node is classified as class-$i$ with probability $μ_i$ for $i=1,\ldots,r$ with $μ_i>0$ and $\sum_{i=1}^r μ_i=1$. A class-$i$ sensor is given $K_i$ cryptographic keys selected uniformly at random from a key pool of size $P$. After deployment, two nodes can communicate securely if they share at least one cryptographic key. We consider the wireless connectivity of the network using a heterogeneous on-off channel model, where the channel between a class-$i$ node and a class-$j$ node is on (respectively, off) with probability $α_{ij}$ (respectively, $1-α_{ij}$) for $i,j=1,\ldots,r$. Collectively, two sensor nodes are adjacent if they i) share a cryptographic key and ii) have a wireless channel in between that is on. We model the overall network using a composite random graph obtained by the intersection of inhomogeneous random key graphs (IRKG) $\mathbb{K}(n;\pmbμ,\pmb{K},P)$ with inhomogeneous Erdős-Rényi graphs (IERG) $\mathbb{G}(n;\pmbμ, \pmbα)$. The former graph is naturally induced by the heterogeneous random key predistribution scheme, while the latter is induced by the heterogeneous on-off channel model. More specifically, two nodes are adjacent in the composite graph if they are i) adjacent in the IRKG i.e., share a cryptographic key and ii) adjacent in the IERG, i.e., have an available wireless channel. We investigate the connectivity of the composite random graph and present conditions (in the form of zero-one laws) on how to scale its parameters so that it i) has no secure node which is isolated and ii) is securely connected, both with high probability when the number of nodes gets large. We also present numerical results to support these zero-one laws in the finite-node regime.
△ Less
Submitted 20 August, 2019;
originally announced August 2019.
-
Modeling and Analysis of Cascading Failures in Interdependent Cyber-Physical Systems
Authors:
Yingrui Zhang,
Osman Yagan
Abstract:
Integrated cyber-physical systems (CPSs), such as the smart grid, are increasingly becoming the underpinning technology for major industries. A major concern regarding such systems are the seemingly unexpected large-scale failures, which are often attributed to a small initial shock getting escalated due to intricate dependencies within and across the individual counterparts of the system. In this…
▽ More
Integrated cyber-physical systems (CPSs), such as the smart grid, are increasingly becoming the underpinning technology for major industries. A major concern regarding such systems are the seemingly unexpected large-scale failures, which are often attributed to a small initial shock getting escalated due to intricate dependencies within and across the individual counterparts of the system. In this paper, we develop a novel interdependent system model to capture this phenomenon, also known as cascading failures. Our framework consists of two networks that have inherently different characteristics governing their intra-dependency: i) a cyber-network where a node is functional as long as it belongs to the largest connected (i.e., giant) component; and ii) a physical network where nodes are given an initial flow and a capacity, and failure of a node results with redistribution of its flow to the remaining nodes, upon which further failures might take place due to overloading (i.e., the flow of a node exceeding its capacity). Furthermore, it is assumed that these two networks are inter-dependent. For simplicity, we consider a one-to-one interdependency model where every node in the cyber-network is dependent upon and supports a single node in the physical network, and vice versa. We provide a thorough analysis of the dynamics of cascading failures in this interdependent system initiated with a random attack. The system robustness is quantified as the surviving fraction of nodes at the end of cascading failures, and is derived in terms of all network parameters involved (e.g., degree distribution, load/capacity distribution, failure size, etc.). Analytic results are supported through an extensive numerical study. Among other things, these results demonstrate the ability of our model to capture the unexpected nature of large-scale failures and provide insights on improving system robustness.
△ Less
Submitted 20 July, 2018;
originally announced July 2018.
-
Attack vulnerability of power systems under an equal load redistribution model
Authors:
Talha Cihad Gulcu,
Vaggos Chatziafratis,
Yingrui Zhang,
Osman Yagan
Abstract:
This paper studies the vulnerability of flow networks against adversarial attacks. In particular, consider a power system (or, any system carrying a physical flow) consisting of $N$ transmission lines with initial loads $L_1, \ldots , L_N$ and capacities $C_1, \ldots, C_N$, respectively; the capacity $C_i$ defines the maximum flow allowed on line $i$. Under an equal load redistribution model, wher…
▽ More
This paper studies the vulnerability of flow networks against adversarial attacks. In particular, consider a power system (or, any system carrying a physical flow) consisting of $N$ transmission lines with initial loads $L_1, \ldots , L_N$ and capacities $C_1, \ldots, C_N$, respectively; the capacity $C_i$ defines the maximum flow allowed on line $i$. Under an equal load redistribution model, where load of failed lines is redistributed equally among all remaining lines, we study the {\em optimization} problem of finding the best $k$ lines to attack so as to minimize the number of {\em alive} lines at the steady-state (i.e., when cascades stop). This is done to reveal the worst-case attack vulnerability of the system as well as to reveal its most vulnerable lines. We derive optimal attack strategies in several special cases of load-capacity distributions that are practically relevant. We then consider a modified optimization problem where the adversary is also constrained by the {\em total} load (in addition to the number) of the initial attack set, and prove that this problem is NP-Hard. Finally, we develop heuristic algorithms for selecting the attack set for both the original and modified problems. Through extensive simulations, we show that these heuristics outperform benchmark algorithms under a wide range of settings.
△ Less
Submitted 4 April, 2018;
originally announced April 2018.